[ Schedule ]

10:30 - 13:00
Royal I

Industry Workshop I

By Amazon Web Services

Royal II

... Developing and Nurturing Policy Thinking

Maple I

Automating detection, analysis & mitigation through modern software tools

Industry Workshop II

By Juniper & Inspira 

10:30 - 16:00
Maple II

Hands-On Workshop

Limited Seats & Paid Workshop 

13:00 - 14:00
14:00 - 16:00
Royal I

Industry Workshop IV

By CISCO

Royal II

Lessons on building an effective SecOps architecture

By McAfee

Maple I

Industry Workshop VI

By Tata Communications

16:00 - 16:30
16:30 - 18:00
Royal I

 … ‘Most Innovative Security Product of the Year’

18:30 - 19:30

By Invite Only    

 

07:00 - 09:00
08:00 - 09:00
Maple II

Presented By DSCI

Breakfast Session II

Royal II

pollination of inspiring imagery and quixotic storylines  

Presented By DSCI

Breakfast Session I

09:00 - 10:00
Pearl

Welcome Address- Ms. Rama Vedashree – Chief Executive Officer, Data Security Council of India

Inaugural Address- Mr. Rishad Premj– Chief Strategy Officer & Member of the Board, Wipro Ltd. and Chairman, NASSCOM

Special Address by Chief Guest - Shri Ajay Sawhney – Honourable Secretary, Ministry of Electronics & IT, Government of India

10:00 - 11:00
Pearl

…..policy initiatives, contexts of digitization, data flows & global diplomacy

Plenary Session I

11:00 - 11:30
11:30 - 13:00
13:00 - 14:00
Royal II

Luncheon Meeting by

Tata Communications

Maple II

​​​​​​​​​​​​​Luncheon Meeting by

FireEye

14:00 - 15:00
Pearl I

…threat detection, policy management, anywhere enforcement, automated remediation

Track II

Royal I

Data, intelligence, targets, approaches, tools, capabilities, skills & operations

Track I 

Pearl II

… When digitization is driven by cloud, automation, blockchain, IT/OT convergence & complex supply chain

Track III

14:30 - 15:30
Royal II

Round Table Meeting by Tenable 

15:00 - 16:00
Pearl I

… Applications, products, devices, services, operations & marketing ops

Track II 

Pearl II

… Goals of inclusion, digitization & innovation hinge on managing speed and security

Track III

Room: Maple II

Track III 

Royal I

… Switching from a fail-safe to safe-to-fail approach

Track I

16:00 - 16:45
Pearl I

… Global realities, possibilities & aspirations but rising walls

Track II

Royal I

… An alternate but becoming a driving force in devising security defense & managing liabilities 

Track I

Pearl II

… What is right? Sewer Rat or Bubble Boy

Track III

16:00 - 17:30
Royal II

Marketing & Rising Privacy Concerns

16:00 - 17:00
Maple I

Panel discussion on Digital Risk Management 

16:45 - 17:00
17:00 - 18:00
18:00 - 19:00
Royal II

Cosmic truths and weird nature and how they are driving computing 

Visual Treat

Royal I

… Who should be made responsible for fake news? Society that fall for it or One who makes it viral?

 

18:15 - 19:15
Maple I

…Role, facets, attributes & character now and in the future

Creative Exercise:  Drawing Cognitive Map

19:15 - 20:30
Pearl

  Corporate, Product and Law Enforcement Segments

20:30 - 22:00
07:00 - 09:00
08:00 - 09:00
Royal II

Breakfast Session

Maple II

... Taking modern thinking’s to solve security and privacy problems

09:00 - 10:30
Maple I
09:15 - 10:15
Royal I

 User convenience, innovation, serving public goods or profiteering

Track I 

Pearl II

Track III

Pearl I

… Rearchitecting security products, solutions and enforcement using AI

Track II

10:15 - 10:30
10:30 - 11:30
Royal I

… Workload protection, orchestration, automation, container/docker security

Track I 

Pearl I

… predication, identification, prioritization and rapid mitigation

Track II 

Pearl II

…Approaches, alternatives, strategies, threat Intelligence, technologies & operations

Track III

11:30 - 12:00
11:30 - 12:30
Maple I
12:00 - 13:00
Pearl II

… Sourcing, collaboration models  diversity quotient and retention

Track III

Pearl I

… Scenario planning, outlining objectives, examining strategic alternatives, balancing interests, driving actors & realizing opportunities

Track II

Royal I

… the past, present and future of Cybercrime Investigation

Track I

13:00 - 14:00
Royal II
14:00 - 15:30
Pearl
15:30 - 16:30
Pearl
16:30 - 17:15
Pearl
17:15 - 17:30
Pearl
Terms of Service | Privacy Policy | Disclaimer
© DSCI. All Rights Reserved