Image
0
ABOUT

NASSCOM-DSCI Annual Information Security Summit 2022

20, 21 & 22 December, 2022

The seventeenth edition of the Annual Information Security Summit(AISS) is slated to happen in physical mode on December 20, 21 & 22, 2022. Over the past sixteen years, AISS has witnessed increasingly compelling, relevant and futuristic content that gets shaped by multiple factors and contexts and has endeavoured to cover the entire spectrum of Cyber Security & Data Protection. The contribution of the industry has been immense and continues to shape its journey.

Amidst the rapidly changing business and technology landscape and highly volatile cyberspace, it becomes important to stay current on the present context and anticipate the challenges in the offing. AISS agenda is typically characterized by presence of a diverse set of themes, sub themes, topics and sub-topics, multiple tracks, varied session formats and plethora of activities and experiences that make up for a rich three-day engagement and learning for the delegates.

AISS 2021 Report
Technology Trends

Broad Focus

Engineering Security Engineering Security

SecOps is CollabOps SecOps is CollabOps

Resiliency of digital enterprises Resiliency of digital enterprises

Cyber Physical System Security: Regulation and ground realities Cyber Physical System Security: Regulation and ground realities

Software supply chain security Software supply chain security

Strategy: scenario and actuals Strategy: scenario and actuals

Critical technology and geopolitics Critical technology and geopolitics

Consolidate or innovate Consolidate or innovate

RegTech RegTech

Frauds: local operator; Global design Frauds: local operator; Global design

Ransomware: what we really need? Ransomware: what we really need?

TVM: when the world is meshing up TVM: when the world is meshing up

Level 3 below: attacks on hardware & embedded Level 3 below: attacks on hardware & embedded

Identities: you and your machines Identities: you and your machines

Cloud: Planes of Security Thinking Cloud: Planes of Security Thinking

Privacy:  Starting, progressing or ...waiting? Privacy: Starting, progressing or ...waiting?

EVENT SCHEDULE

List of Sessions
that are Planned

9:00 am - 06:00 pm
Ebony
CyberSecurity Hackathon | 20th Dec, 2022 from 9am to 6pm CyberSecurity Hackathon | 20th Dec, 2022 from 9am to 6pm
9:30 am - 05:00 pm
Royal 2
Hands-On Hardware Security Workshop

09:30 am - 01:00 pm | Firmware Reverse Engineering with Ghidhra » Read more

Ghidra is a software reverse engineering (SRE) suite of tools developed by the NSA. Among many other things it can do, Ghidhra helps in the firmware reverse engineering of embedded systems. With the widespread prevalence of embedded systems, the participants will be trained to get started with Ghidhra and evaluate one firmware image taken from a device in production.

Prerequisites: The target audience is beginners in reverse engineering, and no pre-requisite knowledge is required.

02:00 pm - 05:00 pm | Bluetooth Hacking » Read more

Participants will be trained in Bluetooth hacking using low-cost hardware tools and open-source software. By the end of the event, they will successfully perform a replay attack on a popular consumer-grade device.

Prerequisites: Although a beginner-friendly workshop, a high-level understanding of BLE will be nice-to-have. However, BLE basics shall be covered during the workshop.

10:00 am - 11:30 am
Maple 1

Masterclass by Blancco

How to securely sanitize your device to prevent data leak?

Maple 2

Masterclass by SentinelOne

Myths and Realities of XDR: Ask the experts the what, the how and the why of XDR

Royal 1

Masterclass by Tenable

Identifying and Detecting Active Directory Attacks
Hands-on Workshop. Carry your laptops.
11:30 am - 01:00 pm
Maple 1

Masterclass by Forescout

Protecting Your Digital Terrain by Building Zero Trust Architecture and Fostering Automation

Royal 1

Masterclass by Trellix

C.A.R.E (Collaboration & Automated Response Exercise) SecOps

Maple 2

Masterclass by Tata Consultancy Services

Reimagining Cybersecurity : Integrated Platforms are the Future
01:00 pm - 02:00 pm
Lunch Break
02:00 pm - 03:30 pm
Maple 1

Masterclass by Netscope

Let's get Sassy - critical enablers for the modern enterprise

Maple 2

Masterclass by Target

Synergistic Product Security

Royal 1

Masterclass by Qualys

Track 1: Vulnerability Lifecycle management, Risk based Vulnerability Management & Risk Quantification and Treatment
Hands-on Workshop. Carry your laptops.
Track 2: Modern Infrastructure Protection-Cloud, Container and Serverless
Hands-on Workshop. Carry your laptops.
03:30 pm - 04:00 pm
Tea Break & Networking
04:00 pm - 04:30 pm
Maple

Fireside Chat by Infosys

Platform Powered Cyber Security Services
04:30 pm - 06:00 pm
Maple

Diversity Session

Diversity and Inclusion Track: Women in Security
08:00 am - 09:00 am
Royal

Breakfast Session

Safeguarding the Human Brain from Brainjacking
09:30 am - 09:45 am
Pearl
What's in AISS 2022
09:45 am - 10:30 am
Pearl

Plenary Session

Digital Economy and Digital Risks

... Bringing technology, architecture, policy, and law enforcement efforts together

10:30 am - 10:45 am
Tea Break
10:45 am - 11:30 am    Pearl
Inaugural Session

Book Launch

Gearing up for Digital ++ : Reimagining Security and Trust
11:30 am - 11:45 am
Pearl

Keynote by Crowdstrike

Let’s Talk Digital
11:45 am - 12:00 pm
Pearl

Keynote by 3rd Eye

Building a Skilled DFIR Community
12:00 pm - 12:15 pm
Pearl

Keynote by SentinelOne

The Future is Autonomous: Cybersecurity with AI-powered Automation
12:15 pm - 12:30 pm
Pearl

Keynote by Ramognee

Q2P - Quantify, Prioritize and Protect
12:30 pm - 12:45 pm
Pearl

Launch by Qualys

Simplifying Cloud-Native Security - Introducing Qualys TotalCloud with FlexScan
12:45 pm - 01:00 pm
Pearl

Keynote by Qualys

The nextGen CISO
01:00 pm - 02:00 pm
Lunch
02:00 pm - 05:00 pm
Ebony
Digital Forensics Sub-Summit

02:00 pm - 02:30 pm
Inauguration


Ebony
Digital Forensics Pathshala

02:30 pm - 02:45 pm
Evolving Ransomware Threats & Law Enforcement...What needs to be done?

02:45 pm - 03:00 pm
Evidence Recovery from Damaged & Non-responsive Digital Devices

03:00 pm - 03:15 pm
Automating Digital Forensics & Incident Response

03:15 pm - 03:30 pm
Role of Digital Evidence Expert Testimony - the US Experience

03:30 pm - 03:45 pm
Smart Cities & Digital Forensics... Future Challenges

03:45 pm - 04:00 pm
Paradigms for Attribution of Dark Web Forensics


Ebony

04:00 pm - 05:00 pm

Moot Court Session on Handling of Digital Evidence in Crime Investigation
02:00 pm - 03:30 pm
Pearl 2

Design Thinking Workshop *** By invite only ***

Leveraging Design Thinking, Frameworks, Principles, Practices for Security
02:00 pm - 02:45 pm
Maple 1

Track Session

DevSecOps: What it is in Reality?

... Interventions, processes, story boards, recording, tools, and responsibilities


Maple 2

Track Session

Time Synchronization: Why it Matters?

... For your and national cyber security design and operations


Royal 1

Track Session

Information Warfare in 2022

... What Russia Ukraine conflict teaches us?


Royal 2

Track Session

PUFs: A Paradigm of IOT Security

... Secure communication protocols for IoT security

02:00 pm - 03:00 pm
Pearl 1
Cryptography 2023 - Concerns, Charter & Cheers
02:45 pm - 03:30 pm
Maple 1

Track Session

Data Ownership and Sovereignty

... What it really means? And, how they shape your cloud strategies


Maple 2

Track Session

Resilient Industry 4.0

... Architecture, capabilities, strategies for OT incident response


Royal 1

Track Session

Hybrid Infra: Continuous Compliance

... Technology and Process Design, Automation, and Demonstration


Royal 2

Track Session

Ransomware: Clear and Present Danger

... A real and imminent threat demanding fundamental changes

03:30 pm - 04:15 pm
Maple 1

Track Session

Identity: A New Perimeter

... When is borderless, hybrid, cloud enabled, and extending


Maple 2

Track Session

Cloud Security Governance & Assurance

... Inculcating trust via disciplined implementation


Royal 1

Track Session

FinTech Innovations, Integrating them Securely

... Security when increasing number of FinTechs participating in the transaction processing


Royal 2

Track Session

CSMA: Cyber Security Mesh Architecture

... Interoperability, coordination, integration, extension, flexibility, and scalability

04:15 pm - 04:45 pm
Tea Break
04:45 pm - 05:00 pm
Pearl

Keynote by Blancco

A penalty of 285 crore - Learnings from a real-life case. How an updated Data Sanitization policy helps you achieve Security & Compliance?
05:00 pm - 05:15 pm
Pearl

Keynote by Grant Thornton Bharat

Ransomware - A business Perspective
05:15 pm - 05:30 pm
Pearl

Keynote by Lookout

Endpoint to Cloud Security
05:30 pm - 06:15 pm
Pearl

Plenary Session

CISO in the Techade

... What would be the role of the CISO in the Technology Decade

06:30 pm - 08:30 pm    Pearl

Innovation Box Partner

Threatcop | Kratikal
DSCI Innovation Box
08:23 pm - 08:30 pm
Pearl

Keynote by Sectona

08:30 pm onwards
Networking Dinner
08:00 am - 09:00 am
Royal

Breakfast Session

Obsession of ChatGPT: Generative AI

... how would it alter the world and what questions does it raise?

09:00 am - 10:00 am
Pearl

Plenary Session

Breach Ramifications : a Multi-front Battle

... Customer, Media, Regulators, Security Agencies, and Citizens

10:00 am - 11:30 am
Ebony

Townhall with CERT-IN

Working towards a team India coordinated response to Cyber Incidents

... stepping up defences and plugging the gaps

10:00 am - 10:45 am
Maple 1

Track Session

Global War and Your Cyber Frontiers

... Can you isolate your borders from the cyber fallout of the war


Maple 2

Track Session

Cloud Native Attacks: Diving into the Depth

... real world examples


Royal 1

Track Session

Decade of Authentication

... Enabling digitization possibilities (offline, contactless, cyber-physical, M2M, etc.)


Royal 2

Track Session

Planning for Metaverse?

... Security challenges, considerations, use cases

10:45 am - 11:30 am
Maple 1

Track Session

Data Enterprise: Micro Objectives and Macro Issues

... Ethics, Privacy, Competition, Innovation, and Openness


Maple 2

Track Session

OT SecOps

... Building security operations in SCADA/OT environment


Royal 1

Track Session

Cyber Deterrence: Attribution and Signals

... Challenges of imperfection and unverifiability


Royal 2

Track Session

The Future of Enterprise Networking

... Connecting And Securing Everything

11:30 am - 11:45 am
Tea Break
11:45 am - 12:00 pm
Pearl

Keynote by Microsoft

Securing More with Less – Cybersecurity Strategies for CISOs in 2023
12:00 pm - 12:15 pm
Pearl

Keynote by Kaspersky

A converged IT-OT cybersecurity. Core-process protection for Industrial Enterprises.
12:15 pm - 12:30 pm
Pearl

Keynote by Delinea

Securing Privilege: How PAM helps Security Leaders
12:30 pm - 12:45 pm
Pearl

Keynote by NetSkope

Data Security in a world of Cloud Adoption
12:45 pm - 01:00 pm
Pearl

Keynote by Target

Democratising Security Through Modernization
 
Pearl

Special address by Sectona

01:00 pm - 02:00 pm
Lunch
02:00 pm - 04:00 pm
Workshop with Government e Marketplace (GeM)
02:00 pm - 05:00 pm
Ebony
Privacy Sub-Summit

02:00 pm - 02:15 pm | Welcome Address

02:15 pm - 02:30 pm | Privacy & Policy Highlights

02:30 pm - 03:15 pm | Deliberation with DPOs: Organizing Internal Privacy Function

03:15 pm - 03:35pm | Catering to the evolving Privacy expectations

03:35 pm - 04:00pm | Operationalizing Privacy by Design

04:00 pm - 05:30 pm | Privacy legisprudence in India - A look at the DPB and everything in between

02:00 pm - 02:45 pm
Maple 1

Track Session

Risk adaptive and intelligence-driven cybersecurity

... Proactive detection and response


Maple 2

Track Session

Strategic Alternatives: SASE or SSE or SD-WAN?

... Ensuring threat awareness, data awareness, zero trust, and edge security & flexibility


Royal 1

Track Session

App Modernization: Security Agenda

... Taking care of volume, velocity, diversity, heterogeneity, and agility


Royal 2

Track Session

Cyberphysical: Every thing will be Digitized

... Security and privacy considerations in digitization ideas, innovation, and plans

02:45 pm - 03:30 pm
Maple 1

Track Session

Payment: Unimaginable Possibilities but Uncontrollable Frauds?

... Bringing technology, architectures, policy, and law enforcement efforts together


Maple 2

Track Session

Playbooks: Making your Investment work

... In responding to incidents [SIEM, SOAR, EDR, XDR]


Royal 1

Track Session

Year of XDR

... Imperatives, Enablers, Technologies, & Possibilities


Royal 2

Track Session

Open Cybersecurity Schema Framework

... Strengthening security posture with data normalization

03:30 pm - 04:15 pm
Maple 1

Track Session

Approaches for Security Consolidation

... Ways, methods, technologies, and architectures


Maple 2

Track Session

SBOM: Software and Supply Chain Security

... Software getting all attention of supply chain security


Royal 1

Track Session

Public Sector Digitization

... Embedding security and privacy in the strategic, tactical, and operational plans


Royal 2

Track Session

Pain points of Cyber workforce building

... demand-supply gap, scale of requirements, depth of the subject, lack of technical infrastructure and disaggregated efforts

04:15 pm - 04:45 pm
Tea Break
04:45 pm - 05:00 pm
Pearl

Keynote by Sectrio

05:00 pm - 05:15 pm
Pearl

Keynote by LastPass

Password Management: Strengthening the First Line of Defence
05:15 pm - 05:30 pm
Pearl

Keynote by Kosmos1

The Journey into Identity-based Authentication and the Passwordless World.
05:30 pm - 05:45 pm
Pearl

Keynote by Armis

Identify your attack surface and strengthen security with unified asset intelligence
05:45 pm - 06:05 pm
Pearl

Fireside chat with CloudSEK

What happens when Cyber Security Companies get Breached
06:05 pm - 06:50 pm
Pearl

Plenary Session

Large scale Digitization : State of Security & Privacy

... assessing preparedness, institutional capabilities and developmental policies

07:00 pm - 09:00 pm
Pearl
08:45 pm - 08:52 pm
Pearl

Keynote by Seqrite

09:00 pm onwards
Networking Dinner
EVENT SPEAKERS

Know Who's Speaking

Who Should Attend?

C Level Executives

Chief Executive Officers
Chief Information Security Officers
Chief Technology Officers
Chief Information Officers
Chief Innovation Officers
Chief Digital Officers
Chief Privacy Officers

Policy Makers & Influencers

Public Policy Makers
Think Tanks
Regulators

Government

Government CISOs
Research Scientists
Security Teams

Security & Privacy Professionals

Heads of Information Security Functions
Forensic Experts
Solution Architects
Consultants
Implementers & Managers

Academia & Research

Security Researchers
Academic Leaders
Institutional Heads
Scholars

Technology & Innovation

Digital Transformation Experts
Data Scientists

THOSE WHO MAKE AISS 2022 POSSIBLE

Our Sponsors, Partners & Exhibitors