



.
.
.





NASSCOM–DSCI Annual Information Security Summit [AISS 2017]
"India Meets for Security"
The 12th edition of NASSCOM – DSCI Annual Information Security Summit [AISS] is scheduled on 13th, 14th, and 15th December 2017. With digital advancements all over the world, cyber security is the need of the hour and AISS serves as the perfect platform for the amalgamation of ideas and convergence of leaders where India Meets for Security. AISS provides a unique platform to engage, deliberate and extend the cyber security paradigm to greater heights. It’s a confluence of security thought leaders and rich content insights to emancipate the possibilities and opportunities of this cyber world. This year the agenda leaps beyond technology know-hows to inspire actions and change the way people approach security.
AISS 2017 will focus on Innovation & Entrepreneurship, Cognitive Security, Digital Payments, Capacity Building, Malware/APTs, Product Security & DevSecOps, Resilience & Breach Response, Data Protection/GDPR and more. A glimpse of the few interesting sessions include Machine Learning for Cyber Security, Crypto Debate, Scope & Future of Digital Forensics, Security Design Thinking, Potent & Wider cyber attacks, Cyber Security framework for Smart Cities, SMBs embracing digital evolution, Demystifying Cybercrime strategy for Corporates and more would underscore the discussions at AISS 2017.
AISS witnesses participation from professionals from diverse industry sectors, decision makers, leaders and influencers, policy makers, government, law enforcement officers and think tanks. Three days at AISS would be full of opportunities, experience, and possibilities. The summit will provide you an opportunity of gaining the mind share of the security community professionals, network with security decision-makers and influencers, engage people from various sectors, demonstrate your capabilities and develop business opportunity and relationship.
AISS will closely track industry and business trends, strategies, approaches, best practices and deliberate on the changing nature of threats and their impact on various industry sectors. It will focus on in-depth ramifications of these developments for India’s preparedness to address its internal and global challenges in Cyber Security. AISS 2017 will investigate into key technical, engineering, architectural, procedural and policy issues shaping the security ecosystem. Industry experts will share insights on how these trends are shaping various verticals.
With 70+ sessions, 150+ speakers and 1000+ participants, AISS 2017 will host plenaries, debates, keynotes, visionary talks, in-depth workshops, parallel tracks, focus group meetings and round tables showcasing rich security driven deliberations and call for action.
Other highlights include ‘SEGAMATHON- Security Gamification Hackathon’, Simulations, Demo Theater, Roast Sessions, Student Zone. Witnessing the rising acceptance and popularity of DSCI Excellence Awards, it will be hosted as always but with greater pomp and show, to recognize best practices adopted by the industry, exemplary work carried out in the field of security and privacy, and reward visionary leaders. It will also host DSCI ‘Innovation Box’ for identifying the ‘Most Innovative Security Product of the Year’.
Let’s come together and approach Security through Stimulating Discourse & Compelling Actions!








Event-Highlights

70
Sessions

150
Speakers

40
Exhibitors

50
Sponsors

1000
Attendees
Special Attractions



Agenda


Boosting Your SOC with Automation, Orchestration and Cyber-Simulation
Sponsored By Cyber bit
Venue :- Royal 2
The complex, scaled, advanced and targeted threat landscape demands overhauling of Incident Response capabilities. One decision required to address an incident has to deal with increasing number of contexts. The actions required to manage an incident are multi-dimensional, interdependent, sequential and parallel. Automation tasks, enriched by desired contextual data, would help in speeding up decisions and reducing response time. Action is often an outcome of visibility and context available.... Read More
Secure Clouds are Happy Clouds
Sponsored By PaloAlto Networks
Venue:- Maple 1
While embracing the cloud, Public or Private, certainly has its benefits, it also has its share of challenges – most notably around the security of your apps and data. Wherever your apps and data live – on-premise or in the cloud – attackers will find a way in and protecting them in the cloud introduces the... Read More



Cyber Security of Critical Information Infrastructure Systems
Sponsored By DSCI - McAfee – ACPL
Venue :- Maple 1
Evolution in mobile payment standards leading to enhanced customer experience
Sponsored By Master Card
Venue :- Royal 1
With the changes in consumer’s preferences to use their mobile phones as the primary device for commerce, the upcoming changes in EMV 3DS 2.0 payment protocols is expected to significantly improve the payment experience. It will not only be an end to end native mobile experience but will also be more secure owing to the... Read More
Essence of cryptology
Workshop By DSCI
Venue :- Royal 2
Critical Information Infrastructure (CII) Organizations are experiencing the transition from closed networks to enterprise networks to public internet to deliver its business leveraging industrial internet of devices (IIoT). The ability of collecting data from wide variety of sensors, integration and connectivity leveraging... Read More





Project Immortality: Ethical Enquiry
… Ethical and moral consequences of intervention of tech research in biology
Breakfast Session II
Venue:- Maple 2
If there is one universal fear across humanity, irrespective of their colour, creed or country, then that is Death. Attaining immortality has always been the ultimate goal of human life... Read More
Bio Hacks
… When attacks transcend the limits to explore unchartered territories
Biohacking is anything that involves manipulating your body in some way outside of a formal space, like a hospital or research setting. It can be gene modification, implanting devices of various kinds within the human body, etc. What is unique about biohacking is, because it’s outside of a formal... Read More


Right to Privacy while the Country is becoming Data Rich
… What it means for a nation and businesses?
Plenary Session I
Venue:- Pearl
Rapid emergence of disruptive technologies and digitization of services and transactions are exercising great influence on the functioning of society. The Digital India mission has been instrumental in leveraging these technological advancements as it facilitates citizens to get connected... Read More




Endpoints Regaining Attention of Security: Focus on Detection and Response
… Evolution of Endpoint Protection Platforms (EPP), their imperatives in security architectures
Track II (Enterprise Security)
Venue- Pearl 1
The traditional way of implementing endpoint security was to deploy an anti-malware software on endpoints. As the endpoint security products evolved, the software installed on endpoints gained more capabilities such as firewall, host intrusion detection system, USB monitoring, etc. This provided a certain level of comfort to information security managers but it didn’t last long. With time, as threats and... Read More
Critical capabilities for securing IoT paradigm
… At level of hardware, chipset, protocol, connectivity, asset, authentication, network & application
Track III (Innovation)
The power of Internet to connect, communicate and remotely manage millions of networked devices is becoming pervasive. Market and nations are gung-ho about IoT phenomena globally and so does India. As per pundits, the IoT devices count would reach 20 to 30 billion by 2020. IoT uses cases underlying IoT architectural components such as protocols, networks, sensors, associated IT systems and gateways warrant robust cyber security architecture... Read More

Machine Learning for the Practical CISO
Are you a CISO thinking of buying machine learning solutions? Tired of the vendor hype about AI? This must-attend session with 3 experts cuts through the marketing jargon.
They'll clarify how machine learning works (and more importantly, where it doesn't), show you how to evaluate solutions, and also explore how attackers will use AI against you.
By Smokescreen , Netmonstery, Security Brigade
Venue:- MapIe 1
Each and every day techniques in artificial intelligence (AI) and machine learning are changing our view of the world. They are... Read More

Machine Learning for Cyber Security: Demonstrating Use Cases
… How security problems are solved using ML
Track I (Technology)
Venue- Royal 1
Protecting the workload moving on Cloud
… How to secure dynamic distribution of workload on on-prim & cloud?
Track II (Enterprise Security)
Venue- Pearl 2
The vast majority of businesses running on-premises infrastructure have either already moved to cloud or planning to move at least a part of their infrastructure onto the cloud. On one hand, moving to cloud enhances organization’s agility for workload management but on the other, it demands concerted efforts for managing security posture which requires a separate strategy for its protection than the traditional... Read More
Blockchain for Cyber Security
Demonstrating Use Cases … How security problems are solved using Blockchain “
Track III (Innovation)
Venue- Pearl 1
One may not have experienced the emergence of computers or the Internet, but for sure everyone today is inundated with blockchain ‘up and down’ streams. It is a wildfire which is spreading everywhere and trying to emerge as a solution to every problem of this planet. ‘Bitcoin’ is believed to be the birth of blockchain when it comes to large and complex application of it. It is a peer-to-peer ledger which is distributed... Read More

Nuances of Mobile Technologies: How can Digital Payments leverage them?
… Changing role of Mobility- from personal & social transactions to financial transaction processing
Track I (Technology)
Venue- Royal 1
Mobile phones/systems with Internet connectivity are becoming one stop shop for most of our needs in daily life. The growth of smart phones witnessed over the years, made almost all electronic companies to venture in this field and benefit from its evolvement. Certain financial initiatives at the national level such as licensing payments banks, demonetization, evolution of digital currencies, exploded the no. of digital... Read More
Scope and Future of Digital Forensics
...Investigative opportunities & challenges while drowning in digital data !
Track III (Innovation)
Venue- Pearl 1
The growing espousal of the Digital forensics in nearly all types of investigations viz., Criminal, civil or administrative investigations, the scientific plausibility of the result of such investigations has been improving considerably. Digital forensics help the investigators to create a hypothetical event reconstruction that may assist in the probes. Digital forensics in India and worldwide has evolved and advanced around the technical revolutions... Read More
Strategic Thinking for Security
… Exercising your options to manage complexity, diversity, agility, quantum, and scalability of challenges
Venue : Pearl 2
Cyber security is no longer a non-strategic domain. It is indicated as we follow billion dollar organizations and every week we hear of a cyber security breach and its impact on nations and industry ecosystem. With stakes so high, the government and business leaders must start thinking about cyber security in a new way. The cyber threats and challenges are increasing at an unfathomable rate. Governments and organizations... Read More









Beyond Awareness
…Using Science of Habits For Secure User Behaviour
Breakfast Session II
Venue:- Royal 2
Why do we eat french fries, despite knowing they are bad for our health? Because awareness alone is not sufficient to change user habits. In this session, you'll learn about the latest research on behavioral psychology and the "habit cycle." Humans execute more than 40% of... Read More
Security Design Thinking
… Exploring the concepts of design thinking to solve security problems
Breakfast Session IV
Venue:- Maple 2
While designing solutions, revitalizing structures and processes, setting up objectives and strategies, articulating goals, motivating teams, organizing efforts, driving change, bring shift in paradigms making transactions sensitive to security and privacy.... Read More

Potent & Wider attacks (Wannacry): Putting your Security at Test
… Vulnerabilities, patching, legacies, assets, backups, recovery, operations, response, sharing & collaboration
Track I [Threat Response]
Venue:- Royal 1
Session Brief
Earlier this year, it became evident that targeted attacks is just one of the threats that companies face. Massive global cyber-attacks, such as WannaCry and NotPetya/Petwrap ransomware,... Read More
Security Investigative Journalism
… How media investigates and reports security and privacy?
Track II [Policy & collaborations]
Venue:- Pearl 1
Media with its speedy and all-pervasiveness nature has been ushering and influencing minds since ages. In the current age of digital media, information being used, presented and consumed has even greater power to impact the masses. As cyber security has emerged as one of the key discussions at global forums and in the public interest, it is imperative to discuss the role of media in cyber security... Read More
Cyber Security framework for smart cities
… taking the leap from ideation to implementation
Track III [Governance & Preparedness]
Venue:- Pearl 2
Technology with its ever increasing pace has encroached into everyone’s life. Whether it’s a smartphone or smart accessory or smart wearable or smart anything, there would be hardly anyone who has never interacted with anything Smart. One can discuss at length the definition of smart in “smart-X” (X being the proxy), but can never define it without using the terms connectivity, mobility, intelligence and analytics. And... Read More


Making Deception Central in Managing Security
…Key strategy to contain sophisticated attacks deploying lateral movement techniques
Track I [Threat Response]
Venue:- Royal 1
To prevent attacks or reduce business impact, pace of detection is key but it’s always better to identify the attacker even before it reaches the network. Illusive network and deception technologies are a way to do so. These... Read More
Cyber Warfare: Will it take place?
… Assessing hype and reality of cyber warfare
Track II [Policy & collaborations]
Venue:- Pearl 1
Unlike physical space, cyberspace is a manmade landscape of interconnected devices and networks. Organizations must connect and remain connected, to this Internet in order to compete in today's markets. Government agencies, businesses, and educational organizations utilize computers to such an extent that their routine operations would significantly be held up if their computer systems or network impede. While using of computer and computer system... Read More
Security Innovation…
How the CISOs are responding ?
Track III [Governance & Preparedness]
Venue:- Pearl 2
Innovation in the world of Security is driven by multitude of factors. Two noteworthy of them being- What will the Future Cybersecurity Landscape Look like & What Type of Solutions are needed to address the Most Critical Pain Points. CISOs across the industry... Read More


Zero-days targeting Business Applications
… Malicious actors targeting renowned ERP applications, worry for critical sector
Track I [Threat Response]
Venue:- Royal 1
Today, zero-day vulnerabilities are one of the worst nightmares for every CISO. The threat of an undisclosed vulnerability in an organization’s ERP system, without a preventative patch available, is frightening.
ERP systems often... Read More
Security at the speed of Digitizing Businesses
… Imperatives of contextual, embedded, engineering focused, intelligence driven & automated approach
Track II [Policy & collaborations]
Venue:- Pearl 1
We live in a truly amazing time – a hyperconnected, digital world where people, processes, data, and things are connected in ways that stir the imagination. The effects of an increasingly digitized world are now reaching into every corner of our lives. Digitization is transforming businesses through models like delivery control in form of personalized services, customer... Read More
Demystifying Cybercrime strategy for corporate boards
…Insider threats , Litigations and regulatory investigations
Track III [Governance & Preparedness]
Cybersecurity breach incidents continue to increase in number and frequency that is compelling the board of directors to focus on the oversight and management of the cybersecurity incidents. The financial losses and irreparable reputational damage such incidents inflict cannot be overcome unless there is a clear strategy defined by the board to deal with it. Many corporations are making wise investments related to security that is aiding to create a... Read More

Luncheon Meeting On Neutralising Attackers- How to stop all forms of attacks
By Forescout
Venue:- Royal 2




Future of Crime
… How the world of crime & crime investigation would be shaped in the digital age
Technological evolution has gifted our world with uncountable possibilities. Every new technology or innovation has its detrimental flip side but still we fail to imagine how they can be used against us. At the same time, criminals are canny enough to understand the emerging technology landscape... Read More


Speakers

Dr. Hoda Al Khzaimi
Research Assistant Professor, Engineering; Director, Center of Cyber Security, NYU , Abu Dhabi

Dr. Lt Gen R S Panwar (Retd)
A Distinguished Alumnus Awardee of IIT Bombay, with four decades of military experience in technology based warfare.

Mr. Pravesh Sharma
Responsible for Information Security and Technology Risk, India at Fidelity International
Steering Committee

Mr. Vivek Srivastav
SVP - Research and Innovation at Reserve Bank Information Technology Pvt. Ltd.
Tickets
Sponsorship Benefits

Associate with Largest
Industry Event on Security

Make your Brand Visible &
promote your Key Messages

Gain mindshare of Security
Community & professionals

Meet Security Leaders of
various Industry Sectors

Engage with Policy Makers &
Security Thinkers

Network with Decision Makers
& Influencers

Demonstrate your capabilities
& solutions

Join Engineering &
Architectural Discussions

Develop Business Opportunity
& Relationship
Blogs

Hunting Security Threats
Threat Hunting is the next stage of evolution for organizations seeking to advance their cyber defence strategy. It is an indicator that an organization considers its security practices...[+]

The Future of Crime
Narrating fictional scenarios may set the pertinent context for deliberations on ‘The Future of Crime’. Popular movie ‘Minority Report’ directed by Steven Spielberg builds around the premise...[+]

Project Immortality: Ethical Enquiry
Defeating old age is not exactly a new concept, even our oldest work of literature in the world i.e. the epics of Gilgamesh deals with search for immortality. The only difference is that lately...[+]