.

.

.

NASSCOM–DSCI Annual Information Security Summit [AISS 2017]

"India Meets for Security"

The 12th edition of NASSCOM – DSCI Annual Information Security Summit [AISS] is scheduled on 13th, 14th, and 15th December 2017. With digital advancements all over the world, cyber security is the need of the hour and AISS serves as the perfect platform for the amalgamation of ideas and convergence of leaders where India Meets for Security. AISS provides a unique platform to engage, deliberate and extend the cyber security paradigm to greater heights. It’s a confluence of security thought leaders and rich content insights to emancipate the possibilities and opportunities of this cyber world. This year the agenda leaps beyond technology know-hows to inspire actions and change the way people approach security.

AISS 2017 will focus on Innovation & Entrepreneurship, Cognitive Security, Digital Payments, Capacity Building, Malware/APTs, Product Security & DevSecOps, Resilience & Breach Response, Data Protection/GDPR and more. A glimpse of the few interesting sessions include Machine Learning for Cyber Security, Crypto Debate, Scope & Future of Digital Forensics, Security Design Thinking, Potent & Wider cyber attacks, Cyber Security framework for Smart Cities, SMBs embracing digital evolution, Demystifying Cybercrime strategy for Corporates and more would underscore the discussions at AISS 2017.

AISS witnesses participation from professionals from diverse industry sectors, decision makers, leaders and influencers, policy makers, government, law enforcement officers and think tanks. Three days at AISS would be full of opportunities, experience, and possibilities. The summit will provide you an opportunity of gaining the mind share of the security community professionals, network with security decision-makers and influencers, engage people from various sectors, demonstrate your capabilities and develop business opportunity and relationship.

AISS will closely track industry and business trends, strategies, approaches, best practices and deliberate on the changing nature of threats and their impact on various industry sectors. It will focus on in-depth ramifications of these developments for India’s preparedness to address its internal and global challenges in Cyber Security. AISS 2017 will investigate into key technical, engineering, architectural, procedural and policy issues shaping the security ecosystem. Industry experts will share insights on how these trends are shaping various verticals.

With 70+ sessions, 150+ speakers and 1000+ participants, AISS 2017 will host plenaries, debates, keynotes, visionary talks, in-depth workshops, parallel tracks, focus group meetings and round tables showcasing rich security driven deliberations and call for action.

Other highlights include ‘SEGAMATHON- Security Gamification Hackathon’, Simulations, Demo Theater, Roast Sessions, Student Zone. Witnessing the rising acceptance and popularity of DSCI Excellence Awards, it will be hosted as always but with greater pomp and show, to recognize best practices adopted by the industry, exemplary work carried out in the field of security and privacy, and reward visionary leaders.  It will also host DSCI ‘Innovation Box’ for identifying the ‘Most Innovative Security Product of the Year’.

Let’s come together and approach Security through Stimulating Discourse & Compelling Actions!



Event-Highlights

icon-1

70

Sessions

icon-1

150

Speakers

icon-1

40

Exhibitors

icon-1

50

Sponsors

icon-1

1000

Attendees

Agenda

10:30 - 13:00

Boosting Your SOC with Automation, Orchestration and Cyber-Simulation

 Sponsored  By Cyber bit

 

Venue :- Royal 2

 

The complex, scaled, advanced and targeted threat landscape demands overhauling of Incident Response capabilities. One decision required to address an incident has to deal with increasing number of contexts. The actions required to manage an incident are multi-dimensional, interdependent, sequential and parallel. Automation tasks, enriched by desired contextual data, would help in speeding up decisions and reducing response time. Action is often an outcome of visibility and context available.... Read More

10:30 - 13:00

Secure Clouds are Happy Clouds

Sponsored By PaloAlto Networks

Venue:- Maple 1 

While embracing the cloud, Public or Private, certainly has its benefits, it also has its share of challenges – most notably around the security of your apps and data. Wherever your apps and data live – on-premise or in the cloud – attackers will find a way in and protecting them in the cloud introduces the... Read More

14:00 - 16:00

Evolution in mobile payment standards leading to enhanced customer experience

Sponsored By Master Card

Venue :-  Royal 1

With the changes in consumer’s preferences to use their mobile phones as the primary device for commerce, the upcoming changes in EMV 3DS 2.0 payment protocols is expected to significantly improve the payment experience. It will not only be an end to end native mobile experience but will also be more secure owing to the... Read More

14:00 - 16:00

Essence of cryptology

Workshop By DSCI 

Venue :-  Royal 2

Critical Information Infrastructure (CII) Organizations are experiencing the transition from closed networks to enterprise networks to public internet to deliver its business leveraging industrial internet of devices (IIoT). The ability of collecting data from wide variety of sensors, integration and connectivity leveraging... Read More

16:30 - 18:00

Innovation Box

… ‘Most innovative Security Product  of the Year’

 

Venue: Royal 1

16:30 - 18:00

SEGAMATHON

Security Games Hackathon 

08:00 - 09:00

Project Immortality: Ethical Enquiry

                  … Ethical and moral consequences of intervention of tech research in biology

Breakfast Session II

Venue:- Maple 2

If there is one universal fear across humanity, irrespective of their colour, creed or country, then that is Death. Attaining immortality has always been the ultimate goal of human life... Read More

08:00 - 09:00

Bio Hacks

… When attacks transcend the limits to explore unchartered territories

Biohacking is anything that involves manipulating your body in some way outside of a formal space, like a hospital or research setting. It can be gene modification, implanting devices of various kinds within the human body, etc. What is unique about biohacking is, because it’s outside of a formal... Read More

10:00 - 11:00

Right to Privacy while the Country is becoming Data Rich

… What it means for a nation and businesses?

Plenary Session I

Venue:- Pearl

Rapid emergence of disruptive technologies and digitization of services and transactions are exercising great influence on the functioning of society. The Digital India mission has been instrumental in leveraging these technological advancements as it facilitates citizens to get connected... Read More

14:00 - 15:00

Endpoints Regaining Attention of Security: Focus on Detection and Response

… Evolution of Endpoint Protection Platforms (EPP), their imperatives in security architectures

Track II  (Enterprise Security)

Venue- Pearl 1

The traditional way of implementing endpoint security was to deploy an anti-malware software on endpoints. As the endpoint security products evolved, the software installed on endpoints gained more capabilities such as firewall, host intrusion detection system, USB monitoring, etc. This provided a certain level of comfort to information security managers but it didn’t last long. With time, as threats and... Read More

14:00 - 15:00

Critical capabilities for securing IoT paradigm

… At level of hardware, chipset, protocol, connectivity, asset, authentication, network & application

Track III (Innovation)

The power of Internet to connect, communicate and remotely manage millions of networked devices is becoming pervasive. Market and nations are gung-ho about IoT phenomena globally and so does India. As per pundits, the IoT devices count would reach 20 to 30 billion by 2020. IoT uses cases underlying IoT architectural components such as protocols, networks, sensors, associated IT systems and gateways warrant robust cyber security architecture... Read More

14:00 - 15:30

Machine Learning for the Practical CISO

Are you a CISO thinking of buying machine learning solutions? Tired of the vendor hype about AI? This must-attend session with 3 experts cuts through the marketing jargon. 

They'll clarify how machine learning works (and more importantly, where it doesn't), show you how to evaluate solutions, and also explore how attackers will use AI against you.

By Smokescreen , Netmonstery, Security Brigade 

Venue:- MapIe 1

Each and every day techniques in artificial intelligence (AI) and machine learning are changing our view of the world. They are... Read More

15:00 - 16:00

Protecting the workload moving on Cloud

… How to secure dynamic distribution of workload on on-prim & cloud?

Track II  (Enterprise Security)

Venue- Pearl 2

The vast majority of businesses running on-premises infrastructure have either already moved to cloud or planning to move at least a part of their infrastructure onto the cloud. On one hand, moving to cloud enhances organization’s agility for workload management but on the other, it demands concerted efforts for managing security posture which requires a separate strategy for its protection than the traditional... Read More

15:00 - 16:00

Blockchain for Cyber Security

Demonstrating Use Cases … How security problems are solved using Blockchain “

Track III (Innovation)

Venue- Pearl 1

One may not have experienced the emergence of computers or the Internet, but for sure everyone today is inundated with blockchain ‘up and down’ streams. It is a wildfire which is spreading everywhere and trying to emerge as a solution to every problem of this planet. ‘Bitcoin’ is believed to be the birth of blockchain when it comes to large and complex application of it. It is a peer-to-peer ledger which is distributed... Read More

16:00 - 16:45

Nuances of Mobile Technologies: How can Digital Payments leverage them?

… Changing role of Mobility- from personal & social transactions to financial transaction processing

Track I (Technology)

Venue- Royal 1

Mobile phones/systems with Internet connectivity are becoming one stop shop for most of our needs in daily life. The growth of smart phones witnessed over the years, made almost all electronic companies to venture in this field and benefit from its evolvement. Certain financial initiatives at the national level such as licensing payments banks, demonetization, evolution of digital currencies, exploded the no. of digital... Read More

16:00 - 16:45

Scope and Future of Digital Forensics

...Investigative opportunities & challenges while drowning in digital data !

Track III (Innovation)

Venue- Pearl 1

The growing espousal of the Digital forensics in nearly all types of investigations viz., Criminal, civil or administrative investigations, the scientific plausibility of the result of such investigations has been improving considerably. Digital forensics help the investigators to create a hypothetical event reconstruction that may assist in the probes. Digital forensics in India and worldwide has evolved and advanced around the technical revolutions... Read More

16:00 - 16:45

Strategic Thinking for Security

… Exercising your options to manage complexity, diversity, agility, quantum, and scalability of challenges

 

Venue : Pearl 2

 

Cyber security is no longer a non-strategic domain. It is indicated as we follow billion dollar organizations and every week we hear of a cyber security breach and its impact on nations and industry ecosystem. With stakes so high, the government and business leaders must start thinking about cyber security in a new way. The cyber threats and challenges are increasing at an unfathomable rate. Governments and organizations... Read More

08:00 - 09:00

Beyond Awareness

…Using Science of Habits For Secure User Behaviour

Breakfast Session II 

Venue:- Royal 2

Why do we eat french fries, despite knowing they are bad for our health? Because awareness alone is not sufficient to change user habits. In this session, you'll learn about the latest research on behavioral psychology and the "habit cycle." Humans execute more than 40% of... Read More

08:00 - 09:00

Security Design Thinking

… Exploring the concepts of design thinking to solve security problems

Breakfast Session IV

Venue:- Maple 2

While designing solutions, revitalizing structures and processes, setting up objectives and strategies, articulating goals, motivating teams, organizing efforts, driving change, bring shift in paradigms making transactions sensitive to security and privacy.... Read More

09:15 - 10:15

Potent & Wider attacks (Wannacry): Putting your Security at Test

… Vulnerabilities, patching, legacies, assets, backups, recovery, operations, response, sharing & collaboration

Track I [Threat Response]

Venue:- Royal 1

Session Brief

Earlier this year, it became evident that targeted attacks is just one of the threats that companies face. Massive global cyber-attacks, such as WannaCry and NotPetya/Petwrap ransomware,... Read More

09:15 - 10:15

Security Investigative Journalism

… How media investigates and reports security and privacy?

Track II [Policy & collaborations]

Venue:- Pearl 1

Media with its speedy and all-pervasiveness nature has been ushering and influencing minds since ages.  In the current age of digital media, information being used, presented and consumed has even greater power to impact the masses. As cyber security has emerged as one of the key discussions at global forums and in the public interest, it is imperative to discuss the role of media in cyber security... Read More

09:15 - 10:15

Cyber Security framework for smart cities

… taking the leap from ideation to implementation

Track III  [Governance & Preparedness]

Venue:- Pearl 2

Technology with its ever increasing pace has encroached into everyone’s life. Whether it’s a smartphone or smart accessory or smart wearable or smart anything, there would be hardly anyone who has never interacted with anything Smart. One can discuss at length the definition of smart in “smart-X” (X being the proxy), but can never define it without using the terms connectivity, mobility, intelligence and analytics. And... Read More

10:30 - 11:30

Cyber Warfare: Will it take place?

 … Assessing hype and reality of cyber warfare

Track II [Policy & collaborations]

Venue:- Pearl 1

Unlike physical space, cyberspace is a manmade landscape of interconnected devices and networks. Organizations must connect and remain connected, to this Internet in order to compete in today's markets. Government agencies, businesses, and educational organizations utilize computers to such an extent that their routine operations would significantly be held up if their computer systems or network impede. While using of computer and computer system... Read More

10:30 - 11:30

Security Innovation…

How the CISOs are responding ?

Track III  [Governance & Preparedness]

Venue:- Pearl 2

Innovation in the world of Security is driven by multitude of factors. Two noteworthy of them being- What will the Future Cybersecurity Landscape Look like & What Type of Solutions are needed to address the Most Critical Pain Points.  CISOs across the industry... Read More

12:00 - 13:00

Zero-days targeting Business Applications

… Malicious actors targeting renowned ERP applications, worry for critical sector

Track I [Threat Response]

Venue:- Royal 1

Today, zero-day vulnerabilities are one of the worst nightmares for every CISO. The threat of an undisclosed vulnerability in an organization’s ERP system, without a preventative patch available, is frightening.

ERP systems often... Read More

12:00 - 13:00

Security at the speed of Digitizing Businesses

… Imperatives of contextual, embedded, engineering focused, intelligence driven & automated approach

Track II [Policy & collaborations]

Venue:- Pearl 1

 

We live in a truly amazing time – a hyperconnected, digital world where people, processes, data, and things are connected in ways that stir the imagination. The effects of an increasingly digitized world are now reaching into every corner of our lives.  Digitization is transforming businesses through models like delivery control in form of personalized services, customer... Read More

12:00 - 13:00

Demystifying Cybercrime strategy for corporate boards

…Insider threats , Litigations and regulatory investigations

Track III  [Governance & Preparedness]

Cybersecurity breach incidents continue to increase in number and frequency that is compelling the board of directors to focus on the oversight and management of the cybersecurity incidents. The financial losses and irreparable reputational damage such incidents inflict cannot be overcome unless there is a clear strategy defined by the board to deal with it. Many corporations are making wise investments related to security that is aiding to create a... Read More

15:20 - 15:30

TBD

Venue:- Pearl

15:45 - 16:45

Future of Crime

… How the world of crime & crime investigation would be shaped in the digital age

Technological evolution has gifted our world with uncountable possibilities. Every new technology or innovation has its detrimental flip side but still we fail to imagine how they can be used against us. At the same time, criminals are canny enough to understand the emerging technology landscape... Read More

Speakers

Abhijeet Nakahate,
+

Mr. Abhijeet Nakahate,

Solution Architect, Paloalto Networks

Krishna Sirohi
+

Mr. Krishna Sirohi

President, i2TB

Ram Awasthi
+

Mr. Ram Awasthi

CIO, Times Internet

Sachidananda Javli
+

Mr. Sachidananda Javli

Director - Cyber Security, PWC

(Dr.)Triveni Singh
+

Prof. (Dr.)Triveni Singh

Addl. SP, UP Police

Abhishek Rana
+

Mr. Abhishek Rana

Technology Head, Sofocle technologies

Aditya Bhatia
+

Mr. Aditya Bhatia

Senior Analyst, DSCI

Aditya Kakrania
+

Mr. Aditya Kakrania

Director, Security Innovation India

Ajay Bongirwar
+

Mr. Ajay Bongirwar

Region Head India & Middle East, Checkmarx.

Ajay Prakash Sawhney
+

Shri Ajay Prakash Sawhney

Secretary, Ministry of Electronics & Information Technology

Akshay Aggarwal
+

Mr. Akshay Aggarwal

Director, Solution Specialist, Oracle

Amajit Gupta
+

Mr. Amajit Gupta

Founder, MD and CEO,QED Sigma Innovations Private Limited

Aman Sethi
+

Mr. Aman Sethi

Associate Editor, Hindustan Times.

Amit Ramesh Sharma
+

Mr. Amit Ramesh Sharma

Sales Engineer, Cyberbit

Anand Ramamoorthy
+

Mr. Anand Ramamoorthy

Managing Director, India and SAARC mcAfee

Ankur jain
+

Ankur jain

Co-Founder, CEO ,The Achilles

Ankush Chowdhary
+

Mr. Ankush Chowdhary

Regional Head of Security (APJ) – Public Sector, AWS

Ankush Johar
+

Ankush Johar

Director, Lloyds Ventures

Arindam Roy
+

Mr. Arindam Roy

Director – India and South Asia, SANS Institute

Arvind Tilak
+

Dr. Arvind Tilak

CEO, Ascent Intellimation Pvt. Ltd.

Aseem Jakhar
+

Mr. Aseem Jakhar

Director - R&D at Payatu Software Labs

Ashish Tandon
+

Mr. Ashish Tandon

Founder & Chief Executive Officer, Indusface

Ashok Chandak
+

Mr. Ashok Chandak

Sr. Director Global Sales and Marketing, NXP Semiconductors

Ashutosh Jain
+

Ashutosh Jain

CISO, AXIS Bank

Aastha Dahmija
+

Ms. Aastha Dahmija

Manager - BD, DSCI

Atul Gupta
+

Mr. Atul Gupta

Partner, KPMG

Ben Herzberg
+

Ben Herzberg

Research Group Manager Imperva Inc

Bhavin B. Bhansali
+

Bhavin B. Bhansali

Founder, ProgIST Solutions

Bikash Barai
+

Mr. Bikash Barai

Co-founder, FireCompass

Bithal Bhardwaj
+

Bithal Bhardwaj

CISO, GE South Asia & Africa

Chandan Kumar
+

Mr. Chandan Kumar

Director- Marketing & Corporate Affairs, Huawei Telecommunications

Chandra Shekar Reddy
+

Mr. Chandra Shekar Reddy

Co - Founder, Cognore

Dan Lamorena
+

Mr. Dan Lamorena

CISSP, Vice President, Global Solutions, ForeScout Technologies

Debabrata Nayak
+

Dr. Debabrata Nayak

Chief Security Officer Huawei Telecommunications (India) Co., Pvt. Ltd.

Dhananjay Sharma
+

Dhananjay Sharma

Marketing and Outreach, TeamIndus

Clayton Jones
+

Mr. Clayton Jones

Regional Managing Director, Asia-Pacific, (ISC)²

Felix Mohan
+

Mr. Felix Mohan

CEO CISO Cybersecurity Pvt Ltd

Fredrik Forslund
+

Mr. Fredrik Forslund

Vice President, Enterprise & Cloud Erasure Solutions, Blancco

Gautam Pande
+

Mr. Gautam Pande

Director - Market Product Management, MasterCard

Gautam Pande
+

Mr. Gautam Pande

Director – Market Product management, MasterCard

Gulshan Rai
+

Dr. Gulshan Rai

NCSC, Govt. of India

H. Scott Tucker
+

Mr. H. Scott Tucker

President, Aptegra Consulting, LLC

Hari Kishore Kusumakar IPS
+

Mr. Hari Kishore Kusumakar IPS

Addl.CP, Kolkata City Police

Hoda Al Khzaimi
+

Dr. Hoda Al Khzaimi

Research Assistant Professor, Engineering; Director, Center of Cyber Security, NYU , Abu Dhabi

Indrajeet Bhuyan
+

Mr. Indrajeet Bhuyan

Security researcher

Iftekhar Hussain
+

Mr. Iftekhar Hussain

Senior SR. Cyber threat Protection, Microsoft

J Kesavardhanan
+

Mr. J Kesavardhanan

Founder and CEO, K7 Computing Pvt. Ltd

Kapil Awasthi
+

Mr. Kapil Awasthi

Principal Consultant, Anti-APT APAC Core , Check Point

K.Venkatesh Murthy
+

Mr. K.Venkatesh Murthy

Deputy Director, DSCI

Kamlesh Bajaj
+

Dr. Kamlesh Bajaj

Former CEO, DSCI

Karan Bajwa
+

Mr. Karan Bajwa

Managing Director, IBM India

Kaushik Saha
+

Dr. Kaushik Saha

CTO, Samsung R & D Institute India - Delhi

Krishna Sastry Pendyala
+

Mr. Krishna Sastry Pendyala

Executive Director, PwC

Lt Gen R S Panwar (Retd)
+

Dr. Lt Gen R S Panwar (Retd)

A Distinguished Alumnus Awardee of IIT Bombay, with four decades of military experience in technology based warfare.

Lucius Lobo
+

Mr. Lucius Lobo

CISO, Tech Mahindra

M S Vijay Raghvan
+

Mr. M S Vijay Raghvan

Former Advisor & Ex-official Secretary, Govt. of India

Madan Oberoi
+

Mr. Madan Oberoi

Joint Commissioner Special Cell, Delhi Police

 Madhvi Gupta,
+

Ms. Madhvi Gupta,

Consultant, DSCI

Mayank Joshi
+

Mayank Joshi

Head of Strategic Accounts, BlackBerry

Mayank Lau
+

Mayank Lau

Sr Consultant, DSCI

Minatee Mishra
+

Minatee Mishra

Lead Engineer, Security Center of Excellence at Philips

Monica Jasuja
+

Ms. Monica Jasuja

Head of Digital Payments, Mastercard

Muralidharan Ramachandran
+

Mr. Muralidharan Ramachandran

VP & Head - Cybersecurity CoE & Quality Assurance , Syntel

Narayan Neelakantan
+

Mr. Narayan Neelakantan

Co-founder & CEO, Block Armour

 Nikhil Pahwa
+

Mr. Nikhil Pahwa

Founder, Medianama.com

Philippe Courtot
+

Mr. Philippe Courtot

CEO & Chairman - Qualys Inc.

Pravesh Sharma
+

Mr. Pravesh Sharma

Responsible for Information Security and Technology Risk, India at Fidelity International

R Chandrashekhar
+

Mr. R Chandrashekhar

President, NASSCOM

Robert Gallagher
+

Mr. Robert Gallagher

Senior Consultant, Information Security, MasterCard

Raghav Bhaskar
+

Mr. Raghav Bhaskar

Founder and CEO, AppsPicket.com

Rahul Bhardwaj
+

Mr. Rahul Bhardwaj

Vice President - Information Security, FIS

 Rahul Gupta
+

Mr. Rahul Gupta

Director, KPMG

Rajesh Thapar
+

Rajesh Thapar

CISO, Yes Bank

Rakesh Kharwal
+

Mr. Rakesh Kharwal

Country Manager India & South Asia, IBM Security

Rama Vedashree
+

Rama Vedashree

CEO, Data Security Council of India

Raman Roy
+

Mr. Raman Roy

Chairman, NASSCOM

Ramesh Krishnamoorthy,
+

Ramesh Krishnamoorthy,

Head- FCSS & CISO, DBS Bank - India

RaviKiran S Avvaru
+

Mr. RaviKiran S Avvaru

Head of IT Department, Toyota-Kirloskar

Ravindranath Hirolikar
+

Mr. Ravindranath Hirolikar

VP & Global Head Information & Cyber Security, EXL

Rishi Mehta
+

Rishi Mehta

Director- Information Security, Target

Rishi Rajpal
+

Mr. Rishi Rajpal

Director – IT Governance, Concentrix Corporation

Rohan Parakh
+

Mr. Rohan Parakh

Senior Security Consultant Imperva Inc

Rohit Singh
+

Mr. Rohit Singh

Country Manager-AsiaPac & India, Telesoft Technologies Ltd

S. Chandrasekar
+

Mr. S. Chandrasekar

Group Director Government Affairs, Microsoft India

S.S. Sarma
+

Mr. S.S. Sarma

Scientist F Director, Cert-In

Sahir Hidayatullah
+

Sahir Hidayatullah

CEO, Smokescreen Technologies Pvt. Ltd

Saikat Datta
+

Mr. Saikat Datta

Policy Director, CIS

Samir Saran,
+

Mr. Samir Saran,

Vice President, Observer Research Foundation

Sandhya Chintala
+

Dr. Sandhya Chintala

Vice President NASSCOM & Executive Director, SSC NASSCOM

Sanjay Bahl
+

Sanjay Bahl

Director General, CERT-In

Sapan Talwar
+

Mr. Sapan Talwar

Founder & CEO, ARISTI NINJA

 Sathiyaseelan
+

Sathiyaseelan

Application & Integration ENGG head, L&T

Sharda Tickoo
+

Ms. Sharda Tickoo

Head Technology – Trend Micro India

Shivkumar Pandey
+

Shivkumar Pandey

Group CISO, BSE

Shomiron Das Gupta
+

Mr. Shomiron Das Gupta

Founder, NETMONASTERY

Shrikant Shitole
+

Mr. Shrikant Shitole

Senior Director & Country Head, FireEye

Sidharth Mutreja
+

Sidharth Mutreja

Regional Cyber Security Architect India, McAfee

Sidharth Pandey
+

Mr. Sidharth Pandey

Chief lead News & Investigations, Go-News 24x7

Shivangi Nadkarni
+

Shivangi Nadkarni

Co-founder & CEO at Arrka Consulting

Sivarama Krishnan
+

Mr. Sivarama Krishnan

Leader – Cyber Security Services, PWC India

Srinivas Poosarla
+

Srinivas Poosarla

Vice President and Head (Global), Privacy & Data Protection at Infosys

Subhash Subramaniam
+

Mr. Subhash Subramaniam

CISO, ICICI Bank

Sudarsan SD
+

Sudarsan SD

Group Leader, ABB

Sudeep Das
+

Mr. Sudeep Das

Technology Leader, IBM Security

Sumedh Thakar
+

Mr. Sumedh Thakar

Chief Product Officer, Qualys Inc

Sumit D Chowdhury
+

Mr. Sumit D Chowdhury

MD & CEO, Gaia Smart Cities

Sunder Krishnan
+

Sunder Krishnan

CRO, Reliance Insurance

Vakul Sharma
+

Mr. Vakul Sharma

Advocate, Supreme Court

Tarun Pant
+

Mr. Tarun Pant

CEO, Securely Share

Varun Seth
+

Mr. Varun Seth

Founder & CEO, Matisoft Labs

Venkata Swamy Karukuri
+

Mr. Venkata Swamy Karukuri

Sr. Principal Architect, CA Technologies

Venkatesh Krishnamoorthy
+

Venkatesh Krishnamoorthy

Country Manager, BSA India

Vidur Gupta
+

Mr. Vidur Gupta

Partner, EY

Vipin Goyal
+

Mr. Vipin Goyal

Director, Strategy & Operations, Veative

Vinayak Godse
+

Vinayak Godse

Sr. Director, DSCI

Vishal Salvi
+

Mr. Vishal Salvi

CISO & SVP , Infosys

Vishal Salvi
+

Vishal Salvi

CISO & SVP, Infosys

 Vivek Chudgar
+

Mr. Vivek Chudgar

Senior Director APAC, Mandiant Consulting

Yash Kadakia
+

Mr. Yash Kadakia

Founder & CTO, Security Brigade

Yash KS
+

Mr. Yash KS

Principal Software Architect, Qualys

Yogesh
+

Mr. Yogesh

Senior security consultant, Rapid7

Steering Committee

Sanjay Bahl
+

Dr. Sanjay Bahl

DG, Cert-In

Baljinder Singh
+

Mr. Baljinder Singh

Global CIO and Digital Transformation Leader

Kartik Shahani
+

Mr. Kartik Shahani

Director & Leader Security India / South Asia at IBM

Vivek Srivastav
+

Mr. Vivek Srivastav

SVP - Research and Innovation at Reserve Bank Information Technology Pvt. Ltd.

Vishal Salvi
+

Mr. Vishal Salvi

Chief Information Security Officer & SVP at Infosys

Tickets

Rs 10,000
REGULAR FEE
  • Inclusive of all Taxes
    On cancellation only 50% refund till 2nd Dec, no refund 2nd December onwards

Rs 7,000
BULK PARTICIPATION - 5 OR MORE
  • Inclusive of all Taxes
    On cancellation only 50% refund till 2nd Dec, no refund 2nd December onwards

Sponsors

Platinum

Silver

Excellence Award Category

Associate

Partners

Technology Innovation

Partner

Cyber Security Training

Segamathon

Workshop

Badge & lanyard

Skills

Media Partner

Webcast

Associate Partner

Exhibitors

  • 4004

    Indo - German Chamber of Commerce

  • 3997

    Klassify™

  • 3995

    SECUDE

  • 3976

    SEQRITE

  • 3974

    KHIKA

  • 3972

    3rd eye

  • 3970

    OhPhish

  • 3968

    FIDO ALLIANCE

  • 3931

    INNEFU

  • 3901

    SYSTECH

  • 3899

    AKS IT Services

  • 3885

    Spell Security

  • 3873

    eSECFORTE

  • 3871

    GlobalSign

  • 3800

    Telesoft

  • 3787

    PwC

  • 3903

    Fire Compass

  • Sponsorship Benefits

    Associate with Largest
    Industry Event on Security

    Make your Brand Visible &
    promote your Key Messages

    Gain mindshare of Security
    Community & professionals

    Meet Security Leaders of
    various Industry Sectors

    Engage with Policy Makers &
    Security Thinkers

    Network with Decision Makers
    & Influencers

    Demonstrate your capabilities
    & solutions

    Join Engineering &
    Architectural Discussions

    Develop Business Opportunity
    & Relationship

    Blogs

    img

    Hunting Security Threats

    Uday Mittal

    Threat Hunting is the next stage of evolution for organizations seeking to advance their cyber defence strategy. It is an indicator that an organization considers its security practices...[+]

    img

    The Future of Crime

    Mayank Lau

    Narrating fictional scenarios may set the pertinent context for deliberations on ‘The Future of Crime’. Popular movie ‘Minority Report’ directed by Steven Spielberg builds around the premise...[+]

    img

    Project Immortality: Ethical Enquiry

    Aastha Dhamija

    Defeating old age is not exactly a new concept, even our oldest work of literature in the world i.e. the epics of Gilgamesh deals with search for immortality. The only difference is that lately...[+]