Automating detection, analysis & mitigation through modern software tools
Industry Workshop II
By Juniper & Inspira
By Invite Only
…pollination of inspiring imagery and quixotic storylines
Presented By DSCI
Breakfast Session I
Welcome Address- Ms. Rama Vedashree – Chief Executive Officer, Data Security Council of India
Inaugural Address- Mr. Rishad Premj– Chief Strategy Officer & Member of the Board, Wipro Ltd. and Chairman, NASSCOM
Special Address by Chief Guest - Shri Ajay Sawhney – Honourable Secretary, Ministry of Electronics & IT, Government of India
…..policy initiatives, contexts of digitization, data flows & global diplomacy
Plenary Session I
…threat detection, policy management, anywhere enforcement, automated remediation
Track II
… Data, intelligence, targets, approaches, tools, capabilities, skills & operations
Track I
… When digitization is driven by cloud, automation, blockchain, IT/OT convergence & complex supply chain
Track III
… Applications, products, devices, services, operations & marketing ops
Track II
… Goals of inclusion, digitization & innovation hinge on managing speed and security
Track III
… Global realities, possibilities & aspirations but rising walls
Track II
… An alternate but becoming a driving force in devising security defense & managing liabilities
Track I
… Cosmic truths and weird nature and how they are driving computing
Visual Treat
… Who should be made responsible for fake news? Society that fall for it or One who makes it viral?
By Payatu
…Role, facets, attributes & character now and in the future
Creative Exercise: Drawing Cognitive Map
… User convenience, innovation, serving public goods or profiteering
Track I
… Rearchitecting security products, solutions and enforcement using AI
Track II
… Workload protection, orchestration, automation, container/docker security
Track I
… predication, identification, prioritization and rapid mitigation
Track II
…Approaches, alternatives, strategies, threat Intelligence, technologies & operations
Track III
… Sourcing, collaboration models diversity quotient and retention
Track III
… Scenario planning, outlining objectives, examining strategic alternatives, balancing interests, driving actors & realizing opportunities
Track II
… the past, present and future of Cybercrime Investigation
Track I