The 15th edition of the Annual Information Security Summit (AISS) is scheduled in a virtual mode on December 15, 16 & 17, 2020. Amidst the rapidly changing digitization landscape and the highly volatile cyberspace, it becomes important to stay current on the present context and anticipate the challenges in the offing.
AISS agenda is typically characterized by presence of a diverse set of themes, sub themes, topics and sub-topics, multiple tracks, varied session formats and plethora of activities and experiences that make up for a rich three-day engagement and learning for the delegates. This edition shall entail deliberations around the sub themes of architectural changes due to Digitization (Zero Trust, Microservices Security Architecture, Password Less Authentication), Cyber Security Strategy, Data Driven Organizations, 5G Security, Protection of Critical Infrastructure, End to End Encryption, Zero Knowledge Proofs, Crypto Innovation, Business Resiliency, Threat Hunting and Intelligence, Advanced Targeted Campaigns, Future of Work, Board Level Agenda, Cyber Insurance et. al
The 15th edition of the Annual Information Security Summit (AISS) is scheduled in a virtual mode on December 15, 16 & 17, 2020. Amidst the rapidly changing digitization landscape and the highly volatile cyberspace, it becomes important to stay current on the present context and anticipate the challenges in the offing.
AISS agenda is typically characterized by presence of a diverse set of themes, sub themes, topics and sub-topics, multiple tracks, varied session formats and plethora of activities and experiences that make up for a rich three-day engagement and learning for the delegates. This edition shall entail deliberations around the sub themes of architectural changes due to Digitization (Zero Trust, Microservices Security Architecture, Password Less Authentication), Cyber Security Strategy, Data Driven Organizations, 5G Security, Protection of Critical Infrastructure, End to End Encryption, Zero Knowledge Proofs, Crypto Innovation, Business Resiliency, Threat Hunting and Intelligence, Advanced Targeted Campaigns, Future of Work, Board Level Agenda, Cyber Insurance et. al
AISS 2020 shall host Sectoral Meetups, Sub Summits, Parallel Track Sessions, Fire Side Chats, Short Presentations, Masterclasses, Security Roaster, Academia paper presentation and host of other formats
The Summit shall also be hosting the Tenth edition of the Excellence Awards which have been celebrating the noteworthy contributions of individuals and organizations to the subject and profession of Cyber Security & Data Protection.
Broad Areas
Security for Borderless Workplaces
Digitization Enabling Security and Privacy
DevSecOps: Volume & Velocity of Development
Resiliency for Radically Uncertain Age
Active Threat Discovery & Management
Governance, when Liabilities are Rising
Cloud Security: Workload, Posture, Policy & Access
CDC: Excellence in the Security Operations
Hardware & IoT Security
Making Security Frictionless
Digital Crimes: Against Individual & Society
15 Dec, 2020 | 1:00 PM - 1:40 PM
15 Dec, 2020 | 5:05 PM - 5:10 PM
16 Dec, 2020 | 1:00 PM - 1:40 PM
Digital Forensic Sub-Summit
Short Lectures by renowned Digital Forensics Experts on practical issues related to procedures, technology and legal aspects
Speakers:
05:20 PM - 05:35 PM
Building a centralised Digital Forensics investigation platform... usage of A.I/M.L & Analytics
by Krishna Sastry Pendyala, Former Scientist, CFSL, Govt. Of India
05:35 PM - 05:50 PM
Examiner of Electronic Evidence - What our Indian Laws tell?
by Dr. Gaurav Gupta, Scientist, MeitY, Govt. of India
05:50 PM - 06:05 PM
Advanced Windows Forensics in Police Investigations
by Subrahmani Babu, Former Forensics Scientist, CERT-In
06:05 PM - 06:20 PM
Dealing with damaged digital storage devices
by Darshan Wadikar, Director-Technical, 3rd Eye Techno Solutions Pvt. Ltd.
06:20 PM - 06:35 PM
BEST practices while seeking Digital Forensics services from CFSLs/SFSLs
by Eswara Sai Prasad, Asst. Director, CFSL, Hyderabad
06:35 PM - 06:50 PM
Memory Forensics in police investigation- Case Study
by Shashidhar, Sr. Consultant, DSCI
06:50 PM - 07:05 PM
Role of Cloud Forensics in investigation
by Lee Reiber, COO, Oxygen Forensics, USA
16 Dec, 2020 | 5:15 PM - 7:15 PM
17 Dec, 2020 | 1:00 PM - 1:45 PM
Deployment of IoT devices comes with great responsibility to protect the devices and personal data collected by the devi...
READ MOREStrong encryption algorithm implementation is demanded by the end consumers and by the industry to protect individuals a...
READ MOREThe risk and severity of cyber-attacks have clearly grown over the last 5-6 months. In the Covid19 situation, dependence...
READ MOREDSCI hopes to bring out expert opinions and meaningful discussions in AISS 2020 around all the developments in Cybersecu...
READ MOREAs India is on the way to becoming a USD 1tn economy, the Government of India is working towards updating its National C...
READ MORESASE helps in providing higher access speed while managing the overall access control for the user....
READ MOREExperts believe that 5G technology will be 20 times faster and will have 120 times less latency than the current 4G tech...
READ MORE