AISS 2023
0
View Event Photos Watch Videos
ABOUT

Nasscom-DSCI Annual Information Security Summit 2023

19, 20 & 21 December, 2023

The eighteenth edition of the Annual Information Security Summit (AISS) is slated for December 19, 20 & 21, 2023. The journey charted by the Summit over the past seventeen years has been marked by increasingly compelling, relevant and futuristic content that gets shaped by multiple factors and contexts and has endeavoured to cover the entire spectrum of Cyber Security & Data Protection.

Amidst the rapidly changing digitization landscape and the highly volatile cyberspace, it becomes important to stay current on the present context and anticipate the challenges in the offing. AISS agenda is typically characterized by presence of a diverse set of themes, sub themes, topics and sub-topics, multiple tracks, varied session formats and plethora of activities and experiences that make up for a rich three-day engagement and learning for the delegates. This edition shall entail deliberations organized around the broad areas of Security Technology Leadership, Privacy at the Core, Security Engineering and Innovation, Quantum Safe Transition, Secure DPI, digital crimes spectrum, devsecops, Future of Security, resiliency of digital enterprises, mobile threat defence.

Read More AISS 2022 Report

Broad Focus

Transaction Security Transaction Security

Security in High-speed transfer Security in High-speed transfer

Quantum-safe transition / Quantum resiliency Quantum-safe transition / Quantum resiliency

ESG and conscious consumerism ESG and conscious consumerism

Security Engineering & Innovation Security Engineering & Innovation

OT Response & Recovery OT Response & Recovery

Privacy at the core Privacy at the core

Security of Digital Public Infrastructure Security of Digital Public Infrastructure

Extended Reality Converging technologies Extended Reality Converging technologies

Research Productization & Commercialization Research Productization & Commercialization

Security Technology Leadership Security Technology Leadership

Digital Crimes Spectrum Digital Crimes Spectrum

EVENT SPEAKERS

Know Who's Speaking

Ms. Abha Tiwari

Ms. Abha Tiwari

Data Privacy Officer, Tata Singapore Airlines
Mr. Abhishek Bansal

Mr. Abhishek Bansal

Head Non-Financial Risk and Chief Information Security Officer, Maxlife Insurance Co. Ltd
Mr. Abhishek Rai

Mr. Abhishek Rai

Sales Engineer, Trellix
Mr. Aditya Agarwal

Mr. Aditya Agarwal

Country Manager - India & SAARC, Netwitness
Mr. Aftab Syed

Mr. Aftab Syed

Country Manager, Skybox Security
Mr. Ajeesh John

Mr. Ajeesh John

Lead Engineer, Target
Mr. Akshaya Kumar Patel

Mr. Akshaya Kumar Patel

AGM (IT-Commn), NTPC Ltd
Mr. Ali Khan

Mr. Ali Khan

Global Head - IT Governance Risk Compliance & Audit, ZS Associates India Pvt. Ltd
Mr. Aman Taneja

Mr. Aman Taneja

Ikigai Law
Mr. Ambarish Kumar Singh

Mr. Ambarish Kumar Singh

CISO, Godrej & Boyce Mfg. Co. Ltd.
Mr. Amit Modi

Mr. Amit Modi

Chief Cyber Security Advisor, Kyndryl India
Mr. Amit Sharma

Mr. Amit Sharma

Senior Vice President & CISO, Info Edge India Ltd
Mr. Anand Krishnan

Mr. Anand Krishnan

Advisor, India Cyber Programme, BHC
Mr. Anand Pande

Mr. Anand Pande

Senior Vice President & CISO, GSTN
Mr. Anand Shankar

Mr. Anand Shankar

CISO, PowerGrid
Mr. Angshuman Karmakar

Mr. Angshuman Karmakar

Assistant Professor, IIT Kanpur
Mr. Anil Nama

Mr. Anil Nama

CIO, Cloud4C Services
Mr. Anil Valluri

Mr. Anil Valluri

MD & Vice President - India and SAARC, Palo Alto Networks
Ms. Anitha A

Ms. Anitha A

Lead Cybersecurity Analyst, Target
Ms. Annapurna Devi Kuchibhatla

Ms. Annapurna Devi Kuchibhatla

Chief Technology Officer, Bajaj Electronics
Ms. Anukriti Gupta

Ms. Anukriti Gupta

Data Science Professional
Ms. Anuprita Daga

Ms. Anuprita Daga

CISO, Yes Bank
Mr. Arindam Roy

Mr. Arindam Roy

Country Director - India and South Asia, SANS Institute
Mr. Arnav Khorana

Mr. Arnav Khorana

Specialist Regional Sales Manager - Cortex, Palo Alto Networks
Prof. Arunabha Mukhopadhyay

Prof. Arunabha Mukhopadhyay

Professor, Indian Institute of Management, Lucknow
Mr. Arvind Gupta

Mr. Arvind Gupta

Director, Vivekananda International Foundation
Mr. Arvind Sharma

Mr. Arvind Sharma

Solutions Architect, SecOps and Endpoint - APAC, Trellix
Mr. Arvind Sivaramakrishnan

Mr. Arvind Sivaramakrishnan

CIO, Karkinos Healthcare
Mr. Ashish Khanna

Mr. Ashish Khanna

CISO, Evalueserve
Mr. Ashish Tandon

Mr. Ashish Tandon

Founder & CEO, Indusface
Air Marshal Ashutosh Dixit

Air Marshal Ashutosh Dixit

AVSM, VM, VSM, Deputy Chief Of The Air Staff
Mr. Ashwani Paliwal

Mr. Ashwani Paliwal

Founder, SecOps Solution
Mr. Ashutosh Saxena

Mr. Ashutosh Saxena

Professor & Dean, R&D, CMR Technical Campus, Hyderabad
Mr. Atul Khatavkar

Mr. Atul Khatavkar

CISO, Serum Institute of India Pvt. Ltd.
Dr. Atul Kumar Pandey

Dr. Atul Kumar Pandey

NLIU Bhopal
Mr. Atul Kumar

Mr. Atul Kumar

Lead - Government Initiatives & Global Trade, DSCI
Mr. Avdhut Vishwasrao

Mr. Avdhut Vishwasrao

Sales Engineer, Trellix
Mr. B. Paparaju

Mr. B. Paparaju

Executive Director - CISO, ONGC
Mr. Baidyanath Kumar

Mr. Baidyanath Kumar

CISO and Data Protection Officer, JK Lakshmi Cement
Mr. Basil Dange

Mr. Basil Dange

CISO, Aditya Birla Sun Life AMC Ltd.
Dr. Bharat Saraf

Dr. Bharat Saraf

Director - Head, Privacy, PhonePe Pvt Ltd
Mr. Bhavesh Kumar

Mr. Bhavesh Kumar

CISO & DPO Cyber Security and IT Compliance, SK Finance Limited
Mr. Bhavin Bhansali

Mr. Bhavin Bhansali

Founder & CEO, Progist Solutions
Mr. Bikash Barai

Mr. Bikash Barai

Co-founder, Firecompass
Mr. Bimal Puri

Mr. Bimal Puri

Senior Vice President & CIO, SRF
Mr. Bithal Kumar Bhardwaj

Mr. Bithal Kumar Bhardwaj

CISO, GMR Group
Mr. Brijesh Miglani

Mr. Brijesh Miglani

Principal Consultant - APAC, Forcepoint
Mr. Chandrashekhar Basavanna

Mr. Chandrashekhar Basavanna

CEO, SecPod Technologies
Mr. Clayton Jones

Mr. Clayton Jones

Managing Director, Asia-Pacific, ISC2
Mr. Cyril Mohapatra

Mr. Cyril Mohapatra

Senior Vice President and Head of Digital - SDG, IndusInd Bank
Air Marshal Daljit Singh, PVSM AVSM VM (Retd)

Air Marshal Daljit Singh, PVSM AVSM VM (Retd)

Former Director EW Operations, Assistant Chief of Air Staff (Air Defence), Director General (Air Operations) and Air Officer Commanding-in-Chief
Dr. Debabrata Nayak

Dr. Debabrata Nayak

Head Cyber Security, Ericsson
Mr. Debjyoti Guha

Mr. Debjyoti Guha

Technical Director - India, Southeast Asia & Japan, Skybox Security
Mr. Deepak Chopra

Mr. Deepak Chopra

Team Lead - SE, F5
Mr. Deepak Kaul

Mr. Deepak Kaul

Sr. Security Consultant - India and SAARC, Forcepoint
Mr. Deepak Maheshwari

Mr. Deepak Maheshwari

Public Policy professional
Mr. Deepak Rout

Mr. Deepak Rout

Founder, Assuranz
Ms. Deepshikha Mohapatro

Ms. Deepshikha Mohapatro

Director - Security Governance & IT DR, Providence
Ms. Deepti George

Ms. Deepti George

Deputy ED and Head of Strateg, Dvara Research
Mr. Dhananjay Ganjoo

Mr. Dhananjay Ganjoo

Managing Director, F5
Mr. Dharshan Shanthamurthy

Mr. Dharshan Shanthamurthy

Founder & CEO, SISA
Mr. Dilip Panjwani

Mr. Dilip Panjwani

Global Head - Cybersecurity Technology Office & CoE, LTIMindtree
Mr. Dilip Singh

Mr. Dilip Singh

Chief Product Officer, QNu Labs
Mr. Dinesh Varma

Mr. Dinesh Varma

Prisma Cloud Business Leader - India & SAARC, Palo Alto Networks
Ms. Divya Gupta

Ms. Divya Gupta

Information Security & Data Privacy Leader, IKEA India Private Limited
Mr. Diwakar Dayal

Mr. Diwakar Dayal

Managing Director and Country Manager, SentinelOne India and SAARC
Dr. Durga Prasad Dube

Dr. Durga Prasad Dube

Executive Vice President, Reliance Industries Limited
Mr. Gagan Sugandh

Mr. Gagan Sugandh

Sr. Solution Architech, India, Tenable
Mr. Gaurav Gupta

Mr. Gaurav Gupta

Director, Risk Advisory, Deloitte
Mr. Gaurav Varshney

Mr. Gaurav Varshney

Assistant Professor, CSE, IIT Jammu
Ms. Geeta Gurnani

Ms. Geeta Gurnani

CTO, IBM Technology, IBM India and South Asia
Mr. Gigi Joseph

Mr. Gigi Joseph

Outstanding Scientist (OS) & Chief Information Security Officer, Bhabha Atomic Research Centre
Mr. Govind Kedia

Mr. Govind Kedia

IP Strategist & Patent Expert, Artic Invent
Mr. Gowdhaman Jothilingam

Mr. Gowdhaman Jothilingam

Global CISO, Head of Information Technology, LatentView Analytics
Air Marshal G S Bedi, AVSM, VM, VSM, (Ret'd)

Air Marshal G S Bedi, AVSM, VM, VSM, (Ret'd)

Former Advisor at the High Commission of India, London, Director General (Inspection & Safety)
Mr. Harpreet Walia

Mr. Harpreet Walia

Senior Manager, Product Management, Digicert
Mr. Himanshu Sharma

Mr. Himanshu Sharma

General Manager, Dalmia Bharat Group
Mr. Huzefa Motiwala

Mr. Huzefa Motiwala

Director, Systems Engineering, India & SAARC, Palo Alto Networks
Mr. Igor Loskutov

Mr. Igor Loskutov

Executive President, Rusolut
Prof. Indranath Gupta

Prof. Indranath Gupta

Professor, Jindal Global Law School
Mr. Irshadh A Rasheed

Mr. Irshadh A Rasheed

Partner, Cybersecurity, EY
Mr. Jacxine Fernandez

Mr. Jacxine Fernandez

VP - Information Security, Bangalore International Airport Ltd
Mr. Jagannath PV

Mr. Jagannath PV

Global Data Privacy Officer, LTIMindtree
Dr. Jagannath Sahoo

Dr. Jagannath Sahoo

CISO, Gujarat Fluorochemicals Limited
Dr Jagendra Singh

Dr Jagendra Singh

Associate Professor, SCSET, Bennett University
Mr. Jaspreet Singh

Mr. Jaspreet Singh

Partner - Clients and Markets Leader, Grant Thornton Bharat
Mr. Jayant Gupta

Mr. Jayant Gupta

Executive Director Information Systems, HPCL
Mr. Jaydeep Ruparelia

Mr. Jaydeep Ruparelia

CEO, Co-Founder, Infopercept Consulting Pvt Ltd
Mr. Jinendra Khobare

Mr. Jinendra Khobare

Sr. Solution Architect, SecureLayer7
Mr. Jitendra Tripathi

Mr. Jitendra Tripathi

Head, Cyber Security Operations, Reliance Jio Information Security Group
Mr. Jnana Ranjan Dash

Mr. Jnana Ranjan Dash

Head - Information Security (CISO), HPCL Mittal Energy Limited
Ms. Joyce Rodriguez

Ms. Joyce Rodriguez

Partner, Risk Advisory, Deloitte India
Mr. K. K. Mookhey

Mr. K. K. Mookhey

Founder & CEO, Network Intelligence
Mr. K N Yashavantha Kumar

Mr. K N Yashavantha Kumar

DSP, Karnataka Police
Mr. Kalpesh Bharat Doshi

Mr. Kalpesh Bharat Doshi

Group CISO, HDFC Life
Mr. Kapil Mehrotra

Mr. Kapil Mehrotra

Group CTO and CISO, Dhanuka Agritech
Mr. Karthik Muthukrishnan

Mr. Karthik Muthukrishnan

Head of Cloud Security, Vaisala
Mr. Kartik Shinde

Mr. Kartik Shinde

Partner, Cybersecurity, EY
Mr. Kartikeya Raman

Mr. Kartikeya Raman

Associate Partner, Mazars
Ms. Kavitha Kadambi

Ms. Kavitha Kadambi

CISO, Infosys
Mr. Kinshuk De

Mr. Kinshuk De

Head - Incident Response, Cyber Security Practice, Tata Consultancy Services
Mr. Kiran Vangaveti

Mr. Kiran Vangaveti

CEO and Founder, BluSapphire Cyber Systems Pvt Limited
Mr. Kishan Kendre

Mr. Kishan Kendre

Head - Information Security, Blue Star India
Mr. Koushik Sivaraman

Mr. Koushik Sivaraman

Global Head, Security Consulting & Research, CloudSEK
Ms. Krishna Guha Roy

Ms. Krishna Guha Roy

Director IT(CIO) South Asia Region, Nestle
Mr. Krishna Sastry Pendyala

Mr. Krishna Sastry Pendyala

Former Scientist, DFSS, MHA
Mr. Krishnadev A

Mr. Krishnadev A

Cybersecurity Pre-Sales, Innspark Solutions
Mr. Krishnan Nair

Mr. Krishnan Nair

Director, Delivery Engineering and Transformation, UST
Mr. Kush Kaushik

Mr. Kush Kaushik

COO, Scrut Automation
Ms. Lavanya Ravi

Ms. Lavanya Ravi

Solutions Engineer, Cybersecurity, BGSW
Mr. Liton Nandy

Mr. Liton Nandy

CIO/ED, IOCL
Mr. Lokesh Balu

Mr. Lokesh Balu

Security Consultant, Dell India IT
Ms. Maanya Vaidyanathan

Ms. Maanya Vaidyanathan

Data Privacy Business Partner and Regional DPO, Dr. Reddy's Laboratories
Mr. Mahipal Singh

Mr. Mahipal Singh

Senior Solutions Engineer, Akamai Technologies
Mr. Manish Mimani

Mr. Manish Mimani

Founder & CEO, Protectt.ai Labs Pvt Ltd
Mr. Manish Sehgal

Mr. Manish Sehgal

Partner, Risk Advisory, Deloitte
Mr. Manish Sinha

Mr. Manish Sinha

Director Sales Engineering-India and SAARC, Trellix
Maj. Gen Manjeet Singh

Maj. Gen Manjeet Singh

NCSC, Joint Secretary (Cyber)
Mr. Manojkumar Parmar

Mr. Manojkumar Parmar

Founder, CEO & CTO, AIShield
Mr. Manoj Taskar

Mr. Manoj Taskar

Sales Director - India, XMCyber
Mr. Mayur Desai

Mr. Mayur Desai

Head of Station - Global Security, Invesco Ltd.
Mr. Midhun Chandra Babu

Mr. Midhun Chandra Babu

Country Manager, Recorded Future
Mr. Milind Trivedi

Mr. Milind Trivedi

General Manager - Cybersecurity, Schneider Electric
Mr. Mohit Rampal

Mr. Mohit Rampal

Founder & CEO, Ramognee
Ms. Monisha

Ms. Monisha

Heads Security Servies, IBM Asia Project
Mr. Monnappa K A

Mr. Monnappa K A

Security Professional (Black Hat/HITB/BruCON)
Mr. Mubin E Shaikh

Mr. Mubin E Shaikh

Partner, Cybersecurity, EY
Air Commodore Mukund Kane (Ret'd)

Air Commodore Mukund Kane (Ret'd)

Former Station Commander, Director (Mobile Comm. & Networks) and Principal Director (Comm)
Mr. Murali Rao

Mr. Murali Rao

Cybersecurity Consulting Leader, EY
Mr. Nandan Gandre

Mr. Nandan Gandre

Head Risk & Application Security, IIFL Home Loan
Mr. Narayan Neelakantan

Mr. Narayan Neelakantan

Co-founder & CEO, Block Armour
Mr. Narayanan R

Mr. Narayanan R

Head - Channels & Alliances, India & SAARC, Claroty
Mr. Navaneethan M

Mr. Navaneethan M

Senior Industry Leader
Mr. Navin Kaul

Mr. Navin Kaul

Partner, EY
Ms. Neha Taneja

Ms. Neha Taneja

SGM & CISO, Hero Motocorp
Mr. Nihal Pasham

Mr. Nihal Pasham

Lead Cyber Security Architect, BGSW
Mr. Nikhil Nande

Mr. Nikhil Nande

Regional Sales Director - Enterprise Security, HCLSoftware
Mohammed Obaid Shaikh

Mohammed Obaid Shaikh

Product Specialist, Rapifuzz
Mr. Oleg Shaburov

Mr. Oleg Shaburov

Threat Intelligence BDM, Kaspersky
Prof. Pandu Rangan

Prof. Pandu Rangan

Professor, IISC Bangalore
Mr. Parag Parab

Mr. Parag Parab

SE Manager, F5
Mr. Pavan Kushwaha

Mr. Pavan Kushwaha

Founder & CEO, Threatcop Inc.
Mr. Pinakin Dave

Mr. Pinakin Dave

Country Manager - South Asia, OneSpan Inc
Mr. Piyush Singh

Mr. Piyush Singh

Founder, Inclusive FinTech Hub
Ms. Pooja Bansal

Ms. Pooja Bansal

Director - Information Security, Fareportal India Pvt Ltd
Ms. Pooja Chatrath

Ms. Pooja Chatrath

CIO, Oncquest Laboratories Ltd.
Ms. Pooja Shimpi

Ms. Pooja Shimpi

CEO & Founder, SyberNow Solutions
Mr. Pradipto Chakrabarty

Mr. Pradipto Chakrabarty

Regional Director, CompTIA
Ms. Pradnya Manwar

Ms. Pradnya Manwar

Sr. Director - Cybersecurity and Information Security, Sutherland Global
Mr. Prakash Bodla

Mr. Prakash Bodla

Global Electronics Platform Leader, Carrier
Mr. Prakash Kumar Ranjan

Mr. Prakash Kumar Ranjan

CISO, Indiabulls Housing Finance Ltd
Mr. Pramod Bhasin

Mr. Pramod Bhasin

Chairman, DSCI
Mr. Pranav Bhopatkar

Mr. Pranav Bhopatkar

Director Cybersecurity High Growth Regions, Honeywell
Mr. Prateek Bhajanka

Mr. Prateek Bhajanka

APJ Field CISO, Sentinelone
Mr. Praveen Khosla

Mr. Praveen Khosla

Pro Vice Chancellor, Chitkara University
CDR Praveen Kumar

CDR Praveen Kumar

Group CISO, Zee
Mr. Praveen Sasidharan

Mr. Praveen Sasidharan

Partner, Risk Advisory, Deloitte India
Mr. Praveen Sengar

Mr. Praveen Sengar

Global CEO, ETEK
Mr. Prayukth KV

Mr. Prayukth KV

Customer Success Head, Sectrio
Ms. Preeti Singh

Ms. Preeti Singh

Head of Technology Security Risk and Compliance, Osttra Services
Ms. Priya Gora

Ms. Priya Gora

Leading GRC and Global DPO, Axtria
Ms. Priyamvadha Vembar

Ms. Priyamvadha Vembar

Head Cybersecurity Practice, Bosch Global Software Technologies
Mr. Puneet Ahuja

Mr. Puneet Ahuja

Regional Director - Technical, Palo Alto Networks
Mr. Pushkal Mishra

Mr. Pushkal Mishra

CISO, Dr. Lal Path Labs
Dr. R. S. Amutha

Dr. R. S. Amutha

Principal Technical officer, CSIR
Mr. Rahul Aggarwal

Mr. Rahul Aggarwal

Partner, Cyber Security, PwC India
Mr. Rahul Modgil

Mr. Rahul Modgil

CISO, EPFO
Mr. Rahul Pandey

Mr. Rahul Pandey

Regional Technical Director, HCLSoftware
Mr. Rahul Pathak

Mr. Rahul Pathak

Senior Product Manager - Device Trust, Digicert
Mr. Rahul Sasi

Mr. Rahul Sasi

Co-founder & CEO, CloudSEK
Mr. Rajesh Jain

Mr. Rajesh Jain

Global Practice Head, Security Engineering, Wipro
Air Marshal Rajesh Kumar, PVSM, AVSM, VM, ADC, (Ret'd)

Air Marshal Rajesh Kumar, PVSM, AVSM, VM, ADC, (Ret'd)

Former Commander-in-Chief, Strategic Forces Command
Mr. Rajesh Kumar, IPS

Mr. Rajesh Kumar, IPS

CEO, I4C
Mr. Rajesh Kumar

Mr. Rajesh Kumar

Sr. Vice President and CISO, EXL
Lt. Gen. (Retd) Dr Rajesh Pant

Lt. Gen. (Retd) Dr Rajesh Pant

Former NCSC and Present Chairman, Cyber Security Association of India
Mr. Rajesh Thapar

Mr. Rajesh Thapar

CISO, AXIS Bank
Ms. Rama Devi

Ms. Rama Devi

Director Emerging Technologies & Officer on Special Duty ITE&C Department, Govt. of Telengana
Ms. Ramadevi Sangu

Ms. Ramadevi Sangu

CISO, Hindustan Zinc Limited
Mr. Ramakant Mohapatra

Mr. Ramakant Mohapatra

Director - Privacy and Data Protection, EdgeVerve (an Infosys Company)
Mr. Ramachandra Kulkarni

Mr. Ramachandra Kulkarni

Managing Director, Goldman Sachs Private Limited
Mr. Ramesh Gurram

Mr. Ramesh Gurram

CISO, Multi Commodity Exchange of India Ltd
Mr. Ramsunder Papineni

Mr. Ramsunder Papineni

President Global Sales, Vehere
Ms. Ranjini Sethupathy

Ms. Ranjini Sethupathy

Director - Information Security, Sony
Ms. Reena Bengeri

Ms. Reena Bengeri

Independent Consultant Privacy Advisory and Compliance
Mr. Rishi Rajpal

Mr. Rishi Rajpal

Vice President Global Security, Concentrix Ltd.
Mr. Rohit Andani

Mr. Rohit Andani

Team Lead - SE, F5
Mr. Rohit Das

Mr. Rohit Das

Partner - Cyber & IT Risk Leader, Grand Thornton Bharat
Mr. Rohit Raman

Mr. Rohit Raman

Managing Partner and APAC Sales Head, ETEK International India Pvt. Ltd.
Mr. Rohit Sharma

Mr. Rohit Sharma

Head - Cyber Security, Adani Power Limited
Mr. Saikat Datta

Mr. Saikat Datta

Founder & CEO, DeepStrat
Mr. Saket Verma

Mr. Saket Verma

Director - Security and Resiliency Practice, Kyndryl India
Ms. Saloni Verma

Ms. Saloni Verma

Sr. Engineering Manager, Target
Mr. Sambit Sinha

Mr. Sambit Sinha

Partner - Cyber Security, Ernst & Young LLP
Mr. Sameer Ratolikar

Mr. Sameer Ratolikar

Senior Executive Vice President & CISO, HDFC Bank
Prof. Sandeep K. Shukla

Prof. Sandeep K. Shukla

Rajiv and Ritu Batra Endowed Chair of Cyber Security, C3I CENTER IITK
Mr. Sandeep Khanna

Mr. Sandeep Khanna

Director IS & CISO, UIDAI
Ms. Santha Subramoni

Ms. Santha Subramoni

Cybersecurity Leader, Tata Consultancy Services
Lt. Col Santosh Khadsare

Lt. Col Santosh Khadsare

Digital Forensics Expert
Mr. Sapan Talwar

Mr. Sapan Talwar

Global CISO, Perfetti Van Melle
Mr. Satyanandan Atyam

Mr. Satyanandan Atyam

Chief Risk Officer, Tata Aig General Insurance
Dr. Shailendra Fuloria

Dr. Shailendra Fuloria

CISO, Nagarro
Mr. Shanker Ramrakhiani

Mr. Shanker Ramrakhiani

Group CISO, IIFL Group
Mr. Shanker Sareen

Mr. Shanker Sareen

Head - Marketing, Sentinelone
Ms. Shannon Coe

Ms. Shannon Coe

Director, Global Data Policy, U.S. Dept. of Commerce
Mr Shashidhar T K

Mr Shashidhar T K

Principal Consultant, DSCI
Ms Shehnaz Ahmed

Ms Shehnaz Ahmed

Senior Resident Fellow and Lead, Vidhi Centre for Legal Policy
Mr. Sheldon Fernandes

Mr. Sheldon Fernandes

Application Security and Performace, Akamai Technologies
Mr. ShivKumar Pandey

Mr. ShivKumar Pandey

Group CISO, Adani
Mr. Shrikant Shitole

Mr. Shrikant Shitole

CEO, iValue InfoSolutions Pvt. Ltd.
Mr. Siddharth Gandhi

Mr. Siddharth Gandhi

COO - APAC, 1Kosmos
Mr. Sidharth Deb

Mr. Sidharth Deb

Manager, Public Policy, The Quantum Hub
Ms. Smriti Sharma

Ms. Smriti Sharma

Data Privacy Manager, Flipkart
Mr. Some Nath Kundu

Mr. Some Nath Kundu

CISO, NTPC Ltd.
Mr. Soumick Bhattacharya

Mr. Soumick Bhattacharya

CISO & CDPO, Mankind Pharma
Mr. Sreedhar Pedda

Mr. Sreedhar Pedda

Director Engineering, Target
Mr. Srihari Kotni

Mr. Srihari Kotni

Sr. Director - Chief Information Security Officer, Pine Labs
Mr. Sriniva Japeyajula

Mr. Sriniva Japeyajula

Mr. Srinivas Poosarla

Mr. Srinivas Poosarla

Sr. VP and Global Chief Privacy Officer, Infosys
Dr. Sriram Birudavolu

Dr. Sriram Birudavolu

CEO - Cyber Security, CoE, DSCI
Mr. Sriram Lakshmanan

Mr. Sriram Lakshmanan

VP Information Security, Genpact
Mr. Steve Dsouza

Mr. Steve Dsouza

Vice President - Enterprise Risk Management & CISO, ICICI LOMBARD
Dr. Sudarsan

Dr. Sudarsan

Executive Director, CDAC
Mr. Sudeep Kumar Das

Mr. Sudeep Kumar Das

Head SE, India & SAARC, Tenable
Dr. Sumit Kumar Yadav

Dr. Sumit Kumar Yadav

Asst. Director (Systems), Income Tax Department
Ms. Sumitra Biswal

Ms. Sumitra Biswal

Cybersecurity Architect, Bosch Global Software Technologies (BGSW)
Mr. Sundareshwar Krishnamurthy

Mr. Sundareshwar Krishnamurthy

Leader & Partner, Cyber Security, PwC India
Mr. Susheel Kumar

Mr. Susheel Kumar

Chief General Manager (BIS) and CISO, GAIL (India) Limited
Mr. Suvin Mullaseril

Mr. Suvin Mullaseril

Head of Systems Engineering-South India & Sri Lanka, Palo Alto Networks
Mr. Syam Pillai

Mr. Syam Pillai

Senior Specialist Systems Engineer Cortex JAPAC, Palo Alto Networks
Justice Talwant Singh

Justice Talwant Singh

High Court, Delhi
Mr. Tanin Chakraborty

Mr. Tanin Chakraborty

Sr. Director - Global Data Privacy Officer, Biocon Biologics
Mr. Tarun Kaura

Mr. Tarun Kaura

Leader — Cyber Advisory, Risk Advisory, Deloitte India
Prof. Triveni Singh, Ex IPS

Prof. Triveni Singh, Ex IPS

PhD, Futurecrime Researcher
Mr. Tushar Haralkar

Mr. Tushar Haralkar

Principal Technical Sales Leader - Security Software, IBM India and South Asia
Mr. Tushar Srivastava

Mr. Tushar Srivastava

Founder & Managing Partner, JT Attorney Alliance
Mr. Umesh Kumar

Mr. Umesh Kumar

Head - Cyber Security, Godfrey Phillips India Ltd
Mr. Upendra Mardikar

Mr. Upendra Mardikar

Executive Vice President & CISO, Tiaa
Dr. Uttam Kumar

Dr. Uttam Kumar

Head - Security Operations, Airtel
Mr. Vaibhav Mehrotra

Mr. Vaibhav Mehrotra

CEO, Secuvy Inc
Ms. Vaishali B Shivshankar

Ms. Vaishali B Shivshankar

Head of Marketing, India & Saarc, F5
Mr. Vakul Sharma

Mr. Vakul Sharma

Managing Partner, Vakul Corporate Advisory
Mr. Vandit Sharma

Mr. Vandit Sharma

Product Manager, Ramognee
Mr. Vaibhav Kumar

Mr. Vaibhav Kumar

Senior Manager Sales APAC, Cellebrite
Mr. Venkat Krish

Mr. Venkat Krish

SVP, Enterprise Sales, SEQRITE
Mr. Venkat Melam

Mr. Venkat Melam

Executive Director, JP Morgan Chase
Mr. Venkat Ramshet

Mr. Venkat Ramshet

Founder, Flexible IR
Mr. Venkatesh Murthy

Mr. Venkatesh Murthy

Senior Director, DSCI
Mr. Vijay Kolli

Mr. Vijay Kolli

Regional Vice President, Akamai
Mr. Vijay Lele

Mr. Vijay Lele

Advisory Security Software Technical Sales, IBM India South Asia
Mr. Vikas Gaur

Mr. Vikas Gaur

Vice President - Cybersecurity Controls, Moody's Corporation
Mr. Vikram Mehta

Mr. Vikram Mehta

Founder & CEO, cy5.io
Mr. Vinayak Godse

Mr. Vinayak Godse

CEO, DSCI
Mr. Vinod Bhat

Mr. Vinod Bhat

CIO, Vistara - TATA SIA Airlines Ltd
Mr. Visagan Subburayalu

Mr. Visagan Subburayalu

Senior Director Technology Cybersecurity, Target
Mr. Vishal Mohanani

Mr. Vishal Mohanani

Regional Sales Director - India, Armis
Mr. Vishal Salvi

Mr. Vishal Salvi

CEO, Quick Heal Technologies Ltd
Dr. Vishal Saraswat

Dr. Vishal Saraswat

Senior Security Architect and Crypto Expert, Bosch Engineering and Business Solutions
Mr. Vivek Abraham

Mr. Vivek Abraham

Senior Director, External Strategy - India & South Asia, Salesforce
Mr. Vivek Gupta

Mr. Vivek Gupta

Hitachi Systems
Mr. Yashaswi Mudumbai

Mr. Yashaswi Mudumbai

Director - Sales Engineering(India & SAARC), Sentinel One
Mr. Yashwanth Singh

Mr. Yashwanth Singh

Security Engineer, Embedded Systems, BGSW
Dr. Yask

Dr. Yask

CISO, IOCL
Dr. Yusuf Hashmi

Dr. Yusuf Hashmi

Group CISO, Jubilant Bhartia Group
Mr. Yuvraj Pradhan

Mr. Yuvraj Pradhan

Director Solutions Engineering, APJ, SonicWall
View All Speakers
Watch Out for

Key Sub-Events

DSCI Excellence Awards
DSCI Innovation Box
OT Security Sub-Summit
Women in Security
CyberSecurity Hackathon
Digital Forensics Sub-Summit
Hands-on Trainings

Who Should Attend?

 
C Level Executives

Chief Executive Officers
Chief Information Security Officers
Chief Technology Officers
Chief Information Officers
Chief Innovation Officers
Chief Digital Officers
Chief Privacy Officers

 
Policy Makers & Influencers

Public Policy Makers
Think Tanks
Regulators

 
Government

Government CISOs
Research Scientists
Security Teams

 
Security & Privacy Professionals

Heads of Information Security Functions
Forensic Experts
Solution Architects
Consultants
Implementers & Managers

 
Academia & Research

Security Researchers
Academic Leaders
Institutional Heads
Scholars

 
Technology & Innovation

Digital Transformation Experts
Data Scientists

EVENT SCHEDULE

Sessions that are Planned

19 Dec'23
09:00 am - 05:30 pm

Overview:

The general consensus amongst systems programmers (and by extension embedded systems developers) has been that you can either have fine-grained system control or performance or safety (or some combination of 2 of these 3) but you can't have all three.

Rust is the first mainstream (i.e. popular) programming language to provide programmers the ability to write code without this compromise via its novel ownership and borrowing concept. Rust's ownership and borrowing model coupled with the fact that we do not require a garbage collector for memory management has pushed Rust's adoption into domains that were exclusively dominated by languages such as C/C++.

This talk will focus on what Rust has to offer to an embedded systems security software engineer - safety by construction, zero-cost abstractions, no hidden states, powerful compile-time checks. These features have allowed us to build demonstrators with sizeable benefits such as better performance/watt, smaller code-sizes and lower code complexity with a significantly higher bar on safety and security. As an example, we have an open-source project called rustBoot - a prototype standalone bootloader, written entirely in Rust, designed to run on anything from a microcontroller to a system on chip.

Installing the tools

In this file you'll find instructions on how to install the tools we'll use during the course. All of these tools are available for Linux, macOS and Windows users. We'll need the tools to write and compile our Rust code, and allow for remote mentoring. Important: these instructions are to be followed at home, before the start of the first tutorial. If you have any problems with installation, contact the trainers! We won't be addressing installation problems during the first tutorial.

Rust and Cargo

First we'll need rustc, the standard Rust compiler. rustc is generally not invoked directly, but through cargo, the Rust package manager. rustup takes care of installing rustc and cargo. This part is easy: go to https://rustup.rs and follow the instructions. Please make sure you're installing the latest default toolchain. Once done, run

rustc -V && cargo -V

The output should be something like this:

rustc 1.67.1 (d5a82bbd2 2023-02-07)

cargo 1.67.1 (8ecd4f20a 2023-01-10)

Using Rustup, you can install Rust toolchains and components. More info:

Rustfmt and Clippy

To avoid discussions, Rust provides its own formatting tool, Rustfmt. We'll also be using Clippy, a collection of lints to analyze your code, that catches common mistakes for you. You'll notice that Rusts Clippy can be a very helpful companion. Both Rustfmt and Clippy are installed by Rustup by default.

To run Rustfmt on your project, execute:

cargo fmt

To run clippy:

cargo clippy

More info:

Visual Studio Code

During the course, we will use Visual Studio Code (vscode) to write code in. Of course, you're free to use your favorite editor, but if you encounter problems, you can't rely on support from us.

You can find the installation instructions here: https://code.visualstudio.com/.

We will install some plugins as well. The first one is Rust-Analyzer. Installation instructions can be found here https://marketplace.visualstudio.com/items?itemName=rust-lang.rust-analyzer

Rust-Analyzer provides a lot of help during development and in indispensable when getting started with Rust.

The last plugin we'll use is CodeLLDB. This plugin enables debugging Rust code from within vscode. You can find instructions here: https://marketplace.visualstudio.com/items?itemName=vadimcn.vscode-lldb.

More info:

Git

We will use Git as version control tool. If you haven't installed Git already, you can find instructions here: https://git-scm.com/book/en/v2/Getting-Started-Installing-Git.

If you're new to Git, you'll also appreciate GitHubs intro to Git https://docs.github.com/en/get-started/using-git/about-git and the Git intro with vscode, which you can find here: https://www.youtube.com/watch?v=i_23KUAEtUM.

More info: https://www.youtube.com/playlist?list=PLg7s6cbtAD15G8lNyoaYDuKZSKyJrgwB

Introduction (30 minutes)

  • Overview of embedded systems and their security challenges
  • Importance of memory safety in embedded systems programming
  • Introduction to Rust as a memory-safe programming language

Understanding Memory Safety Vulnerabilities (60 minutes)

  • Common memory safety vulnerabilities in embedded systems programming
  • Real-world examples of memory safety vulnerabilities causing security breaches
  • How memory safety vulnerabilities can be exploited by attackers

Rust for Memory-Safe Embedded Systems Programming (60 minutes)

  • Key features of Rust that make it suitable for memory-safe embedded systems programming
  • Hands-on demonstration of Rust's memory safety mechanisms using simple examples
  • Discussion of Rust's memory management and ownership model

Building a Secure Bootloader with Rust (using rustBoot as a real-world example) (60 minutes)

  • Overview of secure bootloader systems and their importance in embedded devices
  • Step-by-step implementation of a secure bootloader in Rust
  • Discussion of security best practices and considerations for embedded systems development

Hands-on Demonstration and Q&A (30 minutes)

  • Live demonstration of the secure bootloader implementation
  • Q&A session to address audience questions and clarifications

Conclusion

  • Summary of key takeaways from the training
  • Resources for further learning and exploration of memory safety in embedded systems programming

Nihal Pasham

Nihal Pasham

Lead Cyber Security Architect, BGSW

Nihal is a systems security architect with Bosch. He specializes in automotive, industrial and enterprise systems security. He has been a part of the connected-devices industry for over 14+ years, researched and integrated security solutions for Fortune's top 50 in APJ and India and provides technical leadership in the following areas - IoT (sensor/edge/gateway) security, Connected Systems Security, DDoS mitigation, Embedded high assurance computing.

Yashwanth Singh

Yashwanth Singh

Security Engineer, Embedded systems, BGSW

Yashwanth is a systems security engineer at Bosch, focused on safeguarding the integrity and reliability of embedded systems. With over 4 years of professional experience in the embedded field, he is an expert Rust and C programmer, demonstrating a special interest in low-level programming. His expertise spans across a wide range of platforms, security standards and best practices - Post Quantum, Embedded Systems Security, Operating Systems and WebAssembly (WASM).

Lavanya Ravi

Lavanya Ravi

Solutions Engineer, Cybersecurity, BGSW

Lavanya Ravi is a technical business development associate at Bosch with a focus on Open Source activities and manages an advocacy program for the adoption of safe-systems programming languages in Rust.

Register for Training

19 Dec'23
09:00 am - 05:30 pm

Moving beyond DevSecOps and best practices in the new regulated world. A hands-on approach to setting strategic security and privacy objectives, delivering, and measuring performance.

Overview:

Cybersecurity and privacy governance and practices must adopt regulatory requirements such as EU GDPR, India's DPDP Bill, EU NIS2 Directive and California Consumer Privacy Act.

Incorporating regulatory frameworks like EU GDPR, India's DPDP Bill, EU NIS2 Directive, and California Consumer Privacy Act is crucial for effective cybersecurity and privacy governance. In this learning session, participants, including Cybersecurity executives, Privacy Officers, Product Owners, Managers, Scrum Masters, and Engineers, will explore the nuanced responsibilities and skills of different stakeholders in security. The focus extends beyond traditional methods to embrace Privacy by Design (PbD), navigate regulatory compliance, and integrate technology-driven DevOps processes for efficient data collection.

Achieving a successful DevSecPrivOps practice requires collaborative efforts from diverse stakeholders. Through agile methodologies, backlog management, and agile ceremonies, participants will set strategic organizational security objectives, handle control execution, and measure performance. Practical approaches will be applied to capture security and privacy requirements, emphasizing Security by Design, Privacy by Design, Secure Development, Audit executions, and compliance evidence. The session will also address the translation of strategic security and privacy objectives into actionable items for leaders and managers, empowering engineers and product teams to manage and demonstrate corporate and regulatory compliance, including Privacy by Design (PbD). The holistic approach involves managing security and privacy backlogs both as a single product and as an organization-wide portfolio.

Agile Methodology

  • Agile methods are the key to delivering business objectives. Unclear agile processes will negatively impact product deliveries. DevOps and DevSecPrivOps cannot overcome the limitations of agile processes. You will need good knowledge and experience of successful agile processes.
  • Good working knowledge and experience of agile software development methods.
  • Knowledge and understanding of agile ceremonies.

Tools

  • Working knowledge of any agile backlog management tool such as Jira or Azure DevOps
  • Working knowledge of documentation tooling such as Sharepoint or Confluence.
  • Expert level knowledge of agile backlog management tools is required to manage DevSecPrivOps portfolio in multiple products across a company.
  • Must have access to tools such as Jira or Azure DevOps. You can create a free account with Azure DevOps.
  • A laptop, so that you can try out the implementation in your own Agile software.

Karthik Muthukrishnan

Karthik Muthukrishnan

Head of Cloud Security, Vaisala

Karthik is the Head of Cloud Security at Vaisala. Vaisala a global leader in weather, environmental, and industrial measurements headquartered in Vantaa, Finland. The Curiosity Rover on Mars has Vaisala pressure and humidity sensor on board.

Karthik is a security executive with extensive experience advising and managing risk for global corporations. He has held cybersecurity leadership roles in global companies in charge of cybersecurity governance, strategy, and effective execution.

Register for Training
09:00 am - 06:00 pm
CyberSecurity Hackathon | Capture the Flag
Pearl 2
10:00 am - 11:30 am

Workshop by Deloitte

Simulated Data Protection Strategies: Safeguarding Data & Privacy Across the Lifecycle
Royal 1

Workshop by Palo Alto

A day in the life of a "FUTURE SOC" analyst
Maple 1

Workshop by SkyBox Security

4 Steps to Continuous Exposure Management: From Identifying attack paths to combatting real risks
Maple 2
11:30 am - 01:00 pm

Workshop by SentinelOne

Mastering Endpoint Security: From Evaluation to Implementation
Royal 1

Workshop by Forcepoint

Enforce Data Security Compliance with Data Security Everywhere
Royal 2

Workshop by Trellix

Trellix Ransomware Detection and Response Workshop
Maple 1

Workshop by Akamai

Evolving threat landscape: Navigating the changing dynamics of cloud security
Maple 2
01:00 pm - 02:00 pm
Lunch Break
02:00 pm - 03:30 pm

Workshop by Target

Cybersecurity Symphony: Endpoint Security and Incident Response Strategies
Royal 1

Workshop by Tenable

Cloud Security Strategy - Essential Building Blocks and Maturity Journey
Hands-on Workshop. Carry your laptops.
Royal 2

Workshop by IBM

Gearing up for DPDP Act: Simplifying data security & governance for the hybrid cloud era
Maple 1

Workshop by F5

Secure Apps & API's Everywhere
Maple 2
03:30 pm - 04:00 pm
Tea Break & Networking
04:00 pm - 04:20 pm

Special Address by Target

Leading cybersecurity with the community
Maple
04:20 pm - 05:20 pm
Beyond CISO

... Career Path Beyond and With Security

Royal
Stepping into the role of CISO

... Key Considerations and Imperatives

Maple
05:30 pm - 06:30 pm
Secure Transactions: Strategies for Fortifying Digital Payments
Royal
Success through diversity-leaning into authentic self
Maple
06:30 pm - 07:15 pm

Special Session by Threatcop

Building a People Security Culture Catering to Human Aspects of Security
Royal
08:00 am onwards
Breakfast Session
Royal
09:15 am - 09:30 am
What's in AISS 2023
Pearl
09:30 am - 10:15 am

Plenary Session 1

Cyber Resiliency of Enterprises & National Economies

... Realtime, Managed, Systematized, and Governed

Pearl
10:15 am - 11:30 am
Inaugural Session
Pearl
11:30 am - 11:45 am

Keynote by Palo Alto Networks

Simplifying Security Through Consolidation
Pearl
11:45 am - 12:00 pm

Keynote by CloudSEK

Securing the Future: Mastering the Complexities of Today's Software Supply Chains
Pearl
12:00 pm - 12:20 pm

Fireside Chat by SentinelOne

AI versus AI: The New Cybersecurity Battlefield
Pearl
12:20 pm - 12:35 pm

Keynote by Kaspersky

Cybersecurity powered by Threat Intelligence
Pearl
12:35 pm - 12:50 pm

Keynote by Blusaphire

CyberSecurity: Navigating the Data Management Conundrum
Pearl
12:50 pm - 01:00 pm

Report Launch

Secure in India 2023

... GCC empowered global cyber and digital risk management

Pearl
01:00 pm - 02:00 pm
Lunch Break
02:00 pm - 05:30 pm
Digital Forensics Sub-Summit

Sub-Summit
Partner
British High Commission New Delhi

Ebony

02:00 pm - 02:30 pm
Inaugural Function


Digital Forensics Paata Shaala Third Edition

Short Lecture Sessions by Experts on practical issues related to procedures, technology and legal aspects of Digital Forensics

Anchor

02:30 pm - 02:45 pm
Enhancing Cyber Crime Co-operation between India and UK

02:45 pm - 03:00 pm
The Impact of Digital Transformation on Forensic Investigation

03:00 pm - 03:15 pm
Digital Forensics From Car Multimedia Systems

03:15 pm - 03:30 pm
Challenges in IoT Forensic Investigation... Foreseeing the Future

03:30 pm - 03:45 pm
Policing in the Age of Tech Innovations

03:45 pm - 04:00 pm
Anti-Forensics Detection Techniques... Scenario based


04:00 pm - 05:30 pm
Moot Court Session on Handling of Digital Evidence in Crime Investigation

This exclusive session would be simulation of the court proceedings aimed to sensitize the participants about the legal and technical aspects of digital evidence and its role in prosecuting cybercrime cases.

For this exercise, A sample cybercrime case scenario would be selected and different stages of trail proceedings will be simulated.

  • Collection of digital evidence
  • Testimony, affidavit and deposition of evidence
  • Chief and Cross examination
  • Interpretation of report by Expert under Indian Evidence Act & IT ACT, 2000
  • Legal aspects of digital evidence
  • Other important considerations
02:00 pm - 02:45 pm

Track Session 1

Next Big Attack Campaign

... Learning and Responding Collectively

Maple 1

Track Session 2

Cloud Conundrum: Digitization, Security, & Privacy

... Digitization through Cloud while Addressing Security, Privacy, & Policy Constraints

Maple 2

Track Session 3

Urgency of Overhauling the Way Security is Managed

... Why Professional Management of Security is Important

Royal 1

Track Session 4

Tech Stack for Privacy

... HSM, KYOK, Confidential Compute, Anonymization, HE, ZKP

Royal 2
03:00 pm - 04:00 pm

*** Invite only session ***

Manufacturing Meet-up
Pearl 2
02:45 pm - 03:30 pm

Track Session 5

Identity, the core of Digitization

... Robust Authentication, Access, & Authorization for Banking, IT and Physical Environments

Maple 1

Track Session 6

Network & Security: Consistent Convergence

... Architectural Consolidation [SASE] and Platformization of Security

Maple 2

Track Session 7

Future of Security

... Emerging Tech, Digitization & Innovation, Research Priorities, & Entrepreneurship Possibilities

Royal 1

Track Session 8

Cyber Security and Geopolitics

... Interdependency, Interplay, Preparedness, Arrangements, and Responses

Royal 2
03:30 pm - 04:15 pm

Track Session 9

Cyber Security: Research to Productization

... Imperatives for it, What it means, Vehicles to Achieve it, & What it Brings

Maple 1

Track Session 10

Your App in Consumer Device

... Mobile Threat Defense

Maple 2

Track Session 11

LLMs for Cyber Security

... Leveraging Generative AI for Security Defense

Royal 1

Track Session 12

Managing Security Real Time Basis

... Augmenting Threat Capabilities and Building Operational Competence

Royal 2
04:15 pm - 04:45 pm
Tea Break
04:45 pm - 05:05 pm

Fireside Chat by Seqrite

The Why and How of Simplifying Cybersecurity For The CISOs
Pearl
05:05 pm - 05:20 pm

Keynote by Secuvy

Unsupervised Machine Learning: Revolutionizing Sensitive Data Discovery for Privacy & Security
Pearl
05:20 pm - 05:30 pm

Special Address by Palo Alto

Why Palo Alto Networks is Optimistic
Pearl
05:30 pm - 06:15 pm

Plenary Session 2

Privacy, at the Core of Digital Business

... overhauling architecture, design, compliance monitoring and governance

Pearl
06:15 pm - 06:25 pm

Special address by SISA

The Future is Faster Than You Think
Pearl
06:30 pm - 08:30 pm    Pearl
DSCI Innovation Box

Innovation Box Partner Innspark

From Overwhelm to Proactive Resilience: Simplifying Cybersecurity in an Era of Excess Tools
08:30 pm onwards
Networking Dinner
08:00 am - 09:00 am

Breakfast Session

Complexity browsing
Royal
09:15 am - 10:00 am

Track Session 13

Security Technology Thinking & Leadership

... When Technology is Critical to Solve Security Challenges

Maple 1

Track Session 14

Leapfrogging to Advanced Security

... Tendering/ Procurement for Managed, OPEX Centric, & Performance Driven Security

Maple 2

Track Session 15

Regulatory Activism: Stringent Obligations & Expectations

... Creative Governance to Manage Security and Privacy Effectively while Ensuring Effective & Continuous Compliance

Royal 1

Track Session 16

Maturity of Data Centric Security Program

... Foundational, Reactive, & Proactive Capabilities, Processes, Operations & Governance

Royal 2
10:00 am - 10:45 am

Track Session 17

TECHADE: Responsibility of Security & Privacy Profession

... Seeing Beyond the Immediate Professional Needs

Maple 1

Track Session 18

Roadmap for Crypto Agility/Quantum Resiliency

... Practical Approaches, Tool Kit, Professional Skills, & Capabilities

Maple 2

Track Session 19

Zero-Trust Implementation

... Examining role of PKI and other Adaptive authentication models

Royal 1

Track Session 20

Threat Intel 2023

... Changing roles and intensity of threat intel in preparedness and response

Royal 2
10:30 am - 11:30 am

*** By invite only ***

Future of Data Protection in India: A Roadmap for Regulators
Ebony
12:00 am - 01:00 pm

*** By invite only ***

Navigating the regulatory landscape of Data Protection and AI
Ebony
10:45 am - 11:00 am
Tea Break
11:00 am - 11:45 am

Plenary Session 3

Platformized Security: Possibilities and Constraints

... Security Imperatives of Aggregate, Planetary Level, & Intelligence Efforts versus Local Constraints

Pearl
11:45 am - 12:00 pm

Keynote by Ramognee

Shaping Cybersecurity, 2030 and Beyond through Digital Resurgence
Pearl
12:00 pm - 12:15 pm

Keynote by 1Kosmos

Passwordless is just a feature - you need identity
Pearl
12:15 pm - 12:35 pm

Fireside Chat by Grant Thornton

Deepfakes
Pearl
12:35 pm - 12:50 pm

Keynote by ETEK

Journey to Proactive Cybersecurity
Pearl
12:50 pm - 01:05 pm

Keynote by Kyndrl

Unclear and present danger : New approaches towards new-age cyber threats!
Pearl
01:00 pm - 02:00 pm
Lunch
02:00 pm - 05:00 pm
Operational Technology Security Sub-Summit
Ebony

02:00 pm - 02:15 pm
Inaugural of the OT security Sub-Summit
... Unveiling of the theme

02:15 pm - 02:30 pm
Keynote

02:30 pm - 03:10 pm | Panel Discussion
OT security : Core Considerations
...Current state of OT security,emerging Threat Landscape in OT Security in INDIA

03:10 pm - 03:25 pm | Tech talk by Claroty
Insights and Solutions for a Resilient OT secure Future

03:25 pm - 03:40 pm | Tech talk by Tenable
Innovations in OT security Threat Defense

03:40 pm - 03:55 pm | Tech talk by Armis
Unifying OT Security for Resilience and Vigilance

03:55 pm - 04:10 pm | Tech talk by Sectrio
The Imperative Role of Security operations center in Critical Infrastructure Protection

04:10 pm - 04:50 pm | Panel Discussion
Navigating the Convergence: Developing the Expertise and Governance for Secure OT-IT Integration

04:50 pm - 05:00 pm
OT security Sub summit takeaways and vote of Thanks

02:00 pm - 02:45 pm

Track Session 21

Next in AppSec

... Cloud Native App Sec, Mobile Appsec, DevSecOp Automation, SBOM with Run Time Intelligence

Maple 1

Track Session 22

Resiliency for Digital Enterprises
Maple 2

Track Session 23

Recovering from Ransomware

... Prework, Type, Destination, Apps, Service, Data, Verification, & Integration

Royal 1

Track Session 24

DPO roles and responsibilities

... Privacy leadership and how is it different from other tech leadership role.

Royal 2
02:30 pm - 03:30 pm

*** By invite only ***

Session on IPR and patent filing
Pearl 2
02:45 pm - 03:30 pm

Track Session 25

SecOps: How to Choose?

... SIEM, SOAR, XDR, MSS, MDR, and XMDR

Maple 1

Track Session 26

Ransomware Case Study
Maple 2

Track Session 27

Identity 2025

... Examining future models of authentication and authorization

Royal 1

Track Session 28

New in Breach Attack Simulation

... Beyond Validation and Readiness Assessment

Royal 2
03:30 pm - 04:15 pm

Track Session 29

Data and Ransomware

... Encryption, Backup, Storage, Resiliency, and Recovery

Maple 1

Track Session 30

Security Open Sourced

... Building on Security Open-Source and Manage associated Pitfalls

Maple 2

Track Session 31

MUMTs, UAVs, SWARMs, & MRCAs

... Security of Autonomous & Intelligent Airborne Objects & Platforms

Royal 1

Track Session 32

Architecting for Data Protection

... Products and Enterprise Systems

Royal 2
04:15 pm - 04:45 pm
Tea Break
04:45 pm - 05:00 pm

Keynote by Secpod

Every Attacker Leverages Weakness, A New Dimension to Cybersecurity
Pearl
05:00 pm - 05:15 pm

Keynote by Akamai

Securing your cloud infrastructure, building business resilience
Pearl
05:15 pm - 05:35 pm

Special Session by Protectt.ai

Winning Customer Trust With Agile Mobile App Security - Protecting Identities, APIs & Frauds
Pearl
05:35 pm - 05:50 pm

Keynote by XMCyber

Fix Less Prevent More - The CTEM Way
Pearl
05:50 pm - 06:05 pm

Keynote by SecureLayer7

Frauds, Attacks, and Security Measures in Digital Commerce
Pearl
06:05 pm - 06:50 pm
Plenary Session 4
Pearl
06:50 pm - 07:00 pm

DSCI Report Launch

India Cybersecurity Domestic Market 2023
Pearl
Launching Ransomware Rapid Responders
Pearl
07:00 pm - 09:00 pm
DSCI Excellence Awards 2023
Pearl
THOSE WHO MAKE AISS 2023 POSSIBLE

Our Sponsors, Partners & Exhibitors

Registration

In-person event at The Leela Ambience Hotel, Gurugram
Training Pass
Embedded Systems Training with Rust
25,000
(incl. of taxes)
  • Get access to • Full Day Training - Day 1
    • Embedded Systems Training Certificate
    • 50% OFF - Day 2 & 3 AISS Pass
Training Pass
DevSecPrivOps In Practice Training
10,000
(excl. of taxes)
  • Get access to • Full Day Training - Day 1
    • DevSecPrivOps Training Certificate
     
Event Pass
Group Registration
10500 15000
(incl. of taxes)
  • 30% discount on registration of 3+ delegates
  • Get access to • All Workshops - Day 1
    • All Stage Access - Day 1, 2 & 3
    • All Networking Dinners
    • Innovation Box - Day 2
    • Excellence Awards - Day 3
    • Conference Attendee Certificate
SOLD OUT
Event Pass
Regular Pass
15000
(incl. of taxes)
  • Get access to • All Workshops - Day 1
    • All Stage Access - Day 1, 2 & 3
    • All Networking Dinners
    • Innovation Box - Day 2
    • Excellence Awards - Day 3
    • Conference Attendee Certificate
SOLD OUT
Event Pass
SHEroes Pass
10500 15000
(incl. of taxes)
  • 30% discount Valid for women delegates only
  • Get access to • All Workshops - Day 1
    • All Stage Access - Day 1, 2 & 3
    • All Networking Dinners
    • Innovation Box - Day 2
    • Excellence Awards - Day 3
    • Conference Attendee Certificate
SOLD OUT
Membership Pass
7500 15000
(incl. of taxes)
  • Get access to • All Workshops - Day 1
    • All Stage Access - Day 1, 2 & 3
    • All Networking Dinners
    • Innovation Box - Day 2
    • Excellence Awards - Day 3
    • Conference Attendee Certificate

Terms & Conditions:

  • Early Bird Pass: You have to make the payment within 15 days of sending your registration or by 31st October 2023, whichever comes earlier, failing which the offer will not be valid.
  • SHEroes Pass: The pass is valid to the women delegates only. Any registrations other than the specified will be rejected.
  • Regular Pass: You have to make the payment within 15 days of sending your registration or by 10th December 2023, whichever comes earlier, failing which the offer will not be valid.
  • Be in the AISS top list! Get in early and you could be one of 20 lucky winners to receive a prize of INR 1,000. Winners will be picked randomly from the first 200 participants.

DSCI Member's discount:

  • As a valuable DSCI member, get individual pass at discount of 50% on Rs. 15,000/-. Write to membership@dsci.in for more details.

Cancellations Policy:

  • The last date for request for cancellation of your registration is 30th November, 2023 with 75% refund. 25% of the fees would be withheld as processing fees at any given point of time. Substitutions are welcome till 18th December 2023.

Trending Now

Must Read Articles
Crafting a Business Case for OT Cybersecurity: Unlocking the Future of Security

Crafting a Business Case for OT Cybersecurity: Unlocking the Future of Security

Operational Technology (OT) is the backbone of modern industry, driving critical infrastructure and essential processes...

READ BLOG
Security Open Sourced - Building on security Open-Source and Manage associated Pitfalls

Security Open Sourced - Building on security Open-Source and Manage associated Pitfalls

Open-source security has unrivalled potential for innovation and agility thanks to its inherent transparency and...

READ BLOG
Learn The Role of A CISO In Today's Evolving Cybersecurity Landscape

Stepping into The Role of CISO - A Roadmap to Security Leadership

Security thinking has evolved tremendously over the past few years. The highly ambitious goal of digitization, which...

READ BLOG