Registration
Hackathon CTF
Know MoreWorkshop by Securonix
Harnessing AI for Next-Generation Threat Detection: Opportunities and Challenges
Workshop by Checkpoint
Workshop by Palo Alto
Workshop by SentinelOne
Mastering AI-Powered Threats in 2026
Workshop by IBM
DPDP Act Readiness in the Era of Hybrid Cloud, AI, and Quantum - Data Security and Privacy Blueprint with IBM Guardium
Workshop by Palo Alto
Lunch
Workshop by Tenable
Defending the AI-Driven Enterprise: A Workshop on Posture & Identity
Workshop by Trellix
Building a DPDP-Ready Enterprise: An Interactive Cybersecurity & Data Privacy Simulation
Workshop by Forcepoint + Hitachi
Exclusive Masterclass: Cloud Cyber Recovery Roundtable: Zero Hour
... When a Cyberattack Strikes Your Cloud, Will You Be Ready?
Think you can not only survive, but also recover from a cyberattack? Let's put that to the test—without any of the risk. This tabletop simulation will help participants gauge their readiness and walk away with immediate strategies to fortify their cloud defenses.
Tea Break & Networking
Networking Dinner & Cocktail
Registration
What's in AISS 2025?
Inaugural Address
Plenary 1: Resiliency, at a Nation Scale
... When the economy digitizes at speed, threats span domains, & geopolitics is contested
Threat Intel Corner 2.0: Threat Hunting using AI
The session will help attendees to explore how artificial intelligence can enhance modern threat hunting processes. The session will demonstrate how AI can assist analysts in identifying and investigating potential threats more efficiently.
Keynote by Akamai
The New Geography of Security: From Cloud to Edge to Everywhere
NCoE Investor Meet (Invite-Only)
Keynote by Indusface
No Prioritization Needed. Fix Every Vulnerability Instantly.
Lunch
Securing mobile apps against the modern Attack Vectors
... Banking trojan, device malware, data exfiltration, advanced phishing, reverse engineering app, etc.
Physical World becoming Intelligent
... AI in Physical world: security & privacy in models, architectures & compute
Secure Compute & Edge Hardware
... Confidentiality & Integrity in Hardware path: what it means for security & privacy
Passwordless now: Technology, Culture, & Liability
... Technology & data, lower administrative burden, and fair liability equation
Agentic AI: Can it Meet Security's Aspiration
... Cutting toil, delivering coverage, maintaining provenance, & ensuring compliance by default
Zero Trust: A Progress Report
... Ways & methods, Tech progress, adoption, integrations, impact, & challenges
Minimal Ops, Maximum Protection
... Next generation SOC: AI powered, automated, extended, orchestrated
Shift Left on Privacy
... embedding Data Protection in Early DevSecOps Stages
Cloud is Control Plane, Not a Place
... Bring attack focused shift, make security programmable, ensure technology provenance, and make security portable
Plenary 2
DSCI Celebrity Fireside Chat
DSCI INNOVATION BOX
Exclusive CISO Dinner (Invite-Only)
Networking Dinner
Registration
Breakfast Session
Threat Exposure, Continuous Management
... Knowing, prioritizing, validating, & remediating continuously and at a speed
Fortifying Trust
... Building India's Cybersecurity Resilience in the Generative AI Age
Next Gen CSR & Cyber
... Technology Driving Social Impact
Hit by Ransomware?
... Operate While Blind: What you would do for business resiliency
Strengthening Global ties in Cyber
... Building bridges between India and allies
Agents, Autonomy, & Swarms
... Machine generates 90% of traffic: what is means to threat topologies, kill-switches, & guardrails
Tea Break
Plenary 3: From Burden to Balance
... Optimizing National Security and Compliance Requirements
Lunch
Network Going Dark
... Challenges for detection and response due to encrypted traffic & protocols
Advances in Mobile App Security
... Edge AI, Runtime Security and Compliance Automation
Unifying Signals, Speeding up Response
... Multi-vector attacks at machine speed challenges detection, enrichment, correlation, and response
Resiliency Engineering & Cloud
... Resilience by math, scaled simulation, high fidelity emulation, dependency graph, competence envelop, and so on
Supply Chain Security: Tools & Instruments
... BOMs, Provenance, Signing, VEX Attestations, Watermarking, etc.
Beyond Compliance
... Building Adaptive Data Security for Financial Services
Digital Trust & Identity Governance
... From identities and entitlements to enforceable policy, provable evidence, and measurable risk reduction
Dark Web to Actionable Defense
... Intel to action, seeing before boom, faster containment, & defense operations
DevSecOps 2.0: Securing the Future of Autonomous Development
Plenary 4
EXCELLENCE AWARDS
Networking Dinner
Quantum Edge Sub-Summit
Welcome Note
NQM Mission - Building India's Quantum Ecosystem
Overview of India's Quantum Activities
Build Quantum in Sunrise State
Talk 1 - Insights from PQC Standardisation journey
Talk 2 - Bringing Quantum to Reality: Lessons from Implementors and Innovators
Readiness to Resilience - Insights from Quantum Implementors and Practitioners
State of Quantum Algorithms and Future
Beyond Classical Limits: The Art & Science of Quantum Algorithms
Introduction to DSCI Consortium
Lunch
Walkthrough NQM Migration Plan
Talk 3 - Quantum technologies / Activities in Europe or Frontiers of Quantum Science
Integrating Quantum Computing into Automotive : A Case Study from Hero MotoCorp
Quantum & Finance: Catalysing Systemic Advantage through Policy, Platform and Practical Deployment
Building the Quantum Economy: Strategic Investments and Emerging Opportunities
Healthcare Sub-Summit
Opening Address: State of digitization in India's Healthcare domain
Special Address: Towards a Secure, Resilient, and Inclusive Digital Health Ecosystem for Viksit Bharat
Keynote Address: Data Protection nuances imperatives in the Digital Health Ecosystem
Chief Guest Address
Unveiling of the DSCI-HIMSS Thought Leadership
Presentation around the report
Panel: Joining forces for building Cyber capacities in Indian Health Ecosystem
Tabletop Exercise for Healthcare CXOs
Digital Forensics Sub-Summit
AISS Inauguration
Digital Forensics Sub-Summit Inauguration
Panel Discussion
NextGen DFIR: Automating the hunt for digital evidence
̨Masterclass
Forensic Fails in Law Enforcement & Corporate Environment
- Improper collection and handling of Digital Evidence
- Broken Chain of Custody
- Learning from Mistakes
Lunch Break
̨Masterclass
Open Source Intelligence
- OSINT, GEOSINT, SOCMINT & Transport INT
- Artificial Intelligence & OSINT
- Combating AI based disinformation warfare
Digital Forensics Paata Shaala
Adoption of AI In DFIR
Digital Forensics Paata Shaala
Dealing with End-to-end encrypted platforms: technical & legal challenges
Digital Forensics Paata Shaala
The "High-Paying Job Abroad" Trap: Cybercrime Scam Compounds of Southeast Asia
Digital Forensics Paata Shaala
IoT Forensics
Digital Forensics Paata Shaala
Code, Coins, and Criminals: Inside Cryptocurrency Forensics
Special feature
DFIR Certification Preparation Workshop
Table Top Exercise and Court Room Simulation
Step inside a realistic crime scene packed with digital devices and their potential sources of evidence. Guided by a narrator, the audience follows the unfolding case background, investigation, and the critical search-and-seizure phase. As the Investigating Officer, IO Assistant, and Forensic Expert enact the operation, they intentionally make common mistakes, revealing how errors can compromise evidence. The scene progresses through the discovery, collection, and initial analysis of digital artefacts. This illustrates the frequent pitfalls and best practices required for successful modern cybercrime investigations.
OT Security Summit 2025
Inaugural & Keynote Session
Panel 1 - Power & Oil & Gas
Protecting the Energy Backbone - Generation to Downstream
Technical Talk 1
Visibility & Threat Detection for OT Environments
Technical Talk 2
Zero Trust in Industrial OT Networks
Networking Lunch
Panel 2 - Manufacturing, chemical, Cement, Steel & Automotive
From Assembly Lines to Secure Lines, Building Cyber Defense for Industry 4.0
Technical Talk 3
Self-Reliance in India through Integrated Ecosystem Security
Technical Talk 4
OT SOC 2.0, Building an Unified security operation centre
Technical Talk 5
Secure OT-Cloud Integration in Consumer Industries
Panel 3 - FMCG & Supply Chain
Supply Chain & Operational Trust in Consumer-Centric Sectors
Networking Tea Break
Engineering Defensible OT Systems for the Real World
Reflections by DSCI & Industry Thought Leaders
Privacy & Policy
Innovation related to Responsible AI in India (Mitigating bias tools, Privacy)
Digital Sovereignty: India's Strategic Autonomy in an AI-Driven World
Break / Networking
Building Trust in the AI Cloud: A Fireside on Cloud Security Imperatives
Break / Networking
PETs Imperative: Building Trust in the Age of AI and Big Data
Dinner
OT Security Summit 2025
Morning Keynote
Panel 5 - Defense, Aerospace & Space Systems
National Security at the Intersection of Operational Technology & Cyber
Technical Talk 6
Satellite & Space OT Security
Panel 6 - Telecom & Smart Infrastructure
Securing Telecom Networks, Smart Grids & Smart Cities
Technical Talk 7
Protecting Smart Buildings & IoT-Enabled Infrastructure
Technical Talk 8
Threat Intelligence & Hunting for OT Environments
Networking Lunch
Panel 7 - Maritime security
Cyber-Physical Resilience in India's Maritime Ecosystem
Panel 7 - Renewable Energy & Future-Ready OT
Securing the New Energy Transition - Renewables & Distributed Assets
Technical Talk 9
Streamlining Incident Response and Forensics in OT Environments
Fireside Chat
Strengthening Cyber-Physical Resilience for India's Critical Enterprises
Session - Mapping the Adversary
From ATT&CK for ICS to Defend, Advancing Proactive OT Cyber Defense in Critical Infrastructure
Closing Address
PULSE 2025 - Preparing & Upskilling Leaders in Security Education
Welcome Address
Building India's Next-Generation Cybersecurity Capabilities: Advancing Niche Technology Skills for a Secure Digital Future
Keynote Address
Shaping National Cyber Workforce Readiness in the Age of Generative AI
Plenary Session
Leadership in Action: How Tech Leaders Inspire, Influence, and Deliver
Fireside Chat
From Classrooms to Cyber Ranges: Strengthening Academia-Industry Collaboration with Global Insights and Policy Convergence
Panel Discussion
National Workforce Readiness: Building a Cyber-Skilled India by 2030
Lunch
Panel Discussion
Cyber Skilling for the Quantum Transition: Advancing India's Technical and Industry Readiness
Closing Remarks
Round Table Conference
Building a unified, industry-aligned cybersecurity curriculum framework for India that standardises education, strengthens faculty and hands-on learning, and ensures a future-ready talent pipeline.
Women In Security







