Registration
Hackathon CTF
Masterclass 1
Masterclass 2
Masterclass 3
Masterclass 4
Masterclass 5
Masterclass 6
Lunch
Masterclass 7
Masterclass 8
Masterclass 9
Tea Break & Networking
Networking Dinner
Registration
What's in AISS 2025?
Inaugural Address
Plenary 1: Resiliency, at a Nation Scale
... When the economy digitizes at speed, threats span domains, & geopolitics is contested
Mobile Attack Vectors and MTD
... Banking trojan, device malware, data exfiltration, advanced phishing, reverse engineering app, etc.
Physical World becoming Intelligent
... AI in Physical world: security & privacy in models, architectures & compute
Secure Compute & Edge Hardware
... Confidentiality & Integrity in Hardware path: what it means for security & privacy
Passwordless now: Technology, Culture, & Liability
... Technology & data, lower administrative burden, and fair liability equation
Agentic AI: Can it Meet Security's Aspiration
... Cutting toil, delivering coverage, maintaining provenance, & ensuring compliance by default
Zero Trust: A Progress Report
... Ways & methods, Tech progress, adoption, integrations, impact, & challenges
Minimal Ops, Maximum Protection
... Next generation SOC: AI powered, automated, extended, orchestrated
Shift Left on Privacy
... embedding Data Protection in Early DevSecOps Stages
Cloud is Control Plane, Not a Place
... Bring attack focused shift, make security programmable, ensure technology provenance, and make security portable
Plenary 2
Registration
Breakfast Session
Threat Exposure, Continuous Management
... Knowing, prioritizing, validating, & remediating continuously and at a speed
Hit by Ransomware?
... Operate While Blind: What you would do for business resiliency
Non-von-Neumann compute & Security
... What Photons, Memristors & Spikes mean for cyber security
Agents, Autonomy, & Swarms
... Machine generates 90% of traffic: what is means to threat topologies, kill-switches, & guardrails
Plenary 3
Network Going Dark
... Challenges for detection and response due to encrypted traffic & protocols
Advances in Mobile App Security
... Edge AI, Runtime Security and Compliance Automation
Unifying Signals, Speeding up Response
... Multi-vector attacks at machine speed challenges detection, enrichment, correlation, and response
Resiliency Engineering & Cloud
... Resilience by math, scaled simulation, high fidelity emulation, dependency graph, competence envelop, and so on
Supply Chain Security: Tools & Instruments
... BOMs, Provenance, Signing, VEX Attestations, Watermarking, etc.
Pager Attack: Threat Modeling of Phygital World
... Possibilities, Hype, & Realities of threats to physical world and human life
Digital Trust & Identity Governance
... From identities and entitlements to enforceable policy, provable evidence, and measurable risk reduction
Dark Web to Actionable Defense
... Intel to action, seeing before boom, faster containment, & defense operations
Buying for Use Cases, not for Technology
... Getting under the skin of security technologies—through use cases
Pulse 2025
Plenary 4
Quantum Sub Summit
Welcome Note
NQM Mission - Building India's Quantum Ecosystem
Overview of India's Quantum Activities
NIST - PQC Standardisation
Quantum Technologies
Quantum Resiliency
Quantum Communication walkthrough
Startup Pitch
Lunch
Walkthrough NQM Migration Plan
Real World Insights About Quantum Computing
PQC Enablement
Quantum In Finance
Investments In Quantum
Experience Zone
Digital Forensics Sub-Summit
AISS Inauguration
Digital Forensics Sub-Summit Inauguration
Panel Discussion
NextGen DFIR: Automating the hunt for digital evidence
̨Masterclass
Forensic Fails in Law Enforcement & Corporate Environment
- Improper collection and handling of Digital Evidence
- Broken Chain of Custody
- Learning from Mistakes
Lunch Break
̨Masterclass
Open Source Intelligence
- OSINT, GEOSINT, SOCMINT & Transport INT
- Artificial Intelligence & OSINT
- Combating AI based disinformation warfare
Digital Forensics Paata Shaala
AI-Driven Cyber Attack and Response
Digital Forensics Paata Shaala
Dealing with End-to-end encrypted platforms: technical & legal challenges
Digital Forensics Paata Shaala
The "High-Paying Job Abroad" Trap: Cybercrime Scam Compounds of Southeast Asia
Digital Forensics Paata Shaala
IoT Forensics
Digital Forensics Paata Shaala
Code, Coins, and Criminals: Inside Cryptocurrency Forensics
Special feature
DFIR Certification Preparation Workshop
Table Top Exercise and Court Room Simulation
Step inside a realistic crime scene packed with digital devices and their potential sources of evidence. Guided by a narrator, the audience follows the unfolding case background, investigation, and the critical search-and-seizure phase. As the Investigating Officer, IO Assistant, and Forensic Expert enact the operation, they intentionally make common mistakes, revealing how errors can compromise evidence. The scene progresses through the discovery, collection, and initial analysis of digital artefacts. This illustrates the frequent pitfalls and best practices required for successful modern cybercrime investigations.
Privacy & Policy
Innovation related to Responsible AI in India (Mitigating bias tools, Privacy)
Digital Sovereignty: India's Strategic Autonomy in an AI-Driven World
Break / Networking
Building Trust in the AI Cloud: A Fireside on Cloud Security Imperatives
Break / Networking
PETs Imperative: Building Trust in the Age of AI and Big Data
Dinner
OT Security Summit 2025
Inaugural & Keynote Session
Panel 1 - Power & Oil & Gas
Protecting the Energy Backbone - Generation to Downstream
Technical Talk 1
Visibility & Threat Detection for OT Environments
Technical Talk 2
Zero Trust in Industrial OT Networks
Networking Lunch
Panel 2 - Manufacturing, chemical, Cement, Steel & Automotive
From Assembly Lines to Secure Lines, Building Cyber Defense for Industry 4.0
Technical Talk 3
AI/ML in Predictive Maintenance & Cyber Defense
Technical Talk 4
OT SOC 2.0, Building an Unified security operation centre
Technical Talk 5
Secure OT-Cloud Integration in Consumer Industries
Panel 3 - FMCG & Supply Chain
Supply Chain & Operational Trust in Consumer-Centric Sectors
Networking Tea Break
Engineering Defensible OT Systems for the Real World
Reflections by DSCI & Industry Thought Leaders
Morning Keynote
Panel 5 - Defense, Aerospace & Space Systems
National Security at the Intersection of Operational Technology & Cyber
Technical Talk 6
Satellite & Space OT Security
Panel 6 - Telecom & Smart Infrastructure
Securing Telecom Networks, Smart Grids & Smart Cities
Technical Talk 7
Protecting Smart Buildings & IoT-Enabled Infrastructure
Technical Talk 8
Threat Intelligence & Hunting for OT Environments
Networking Lunch
Panel 7 - Maritime security
Cyber-Physical Resilience in India's Maritime Ecosystem
Panel 7 - Renewable Energy & Future-Ready OT
Securing the New Energy Transition - Renewables & Distributed Assets
Technical Talk 9
Streamlining Incident Response and Forensics in OT Environments
Fireside Chat
Strengthening Cyber-Physical Resilience for India's Critical Enterprises
Session - Mapping the Adversary
From ATT&CK for ICS to Defend, Advancing Proactive OT Cyber Defense in Critical Infrastructure
Closing Address
PULSE 2025 - Preparing & Upskilling Leaders in Security Education
Welcome Address
Building India's Next-Generation Cybersecurity Capabilities: Advancing Niche Technology Skills for a Secure Digital Future
Panel 1 - Power & Oil & Gas
Protecting the Energy Backbone - Generation to Downstream
Technical Talk 1
Visibility & Threat Detection for OT Environments
Technical Talk 2
Zero Trust in Industrial OT Networks
Networking Lunch
Panel 2 - Manufacturing, chemical, Cement, Steel & Automotive
From Assembly Lines to Secure Lines, Building Cyber Defense for Industry 4.0
Technical Talk 3
AI/ML in Predictive Maintenance & Cyber Defense
Technical Talk 4
OT SOC 2.0, Building an Unified security operation centre
Technical Talk 5
Secure OT-Cloud Integration in Consumer Industries
Panel 3 - FMCG & Supply Chain







