Registration
Hackathon CTF
Register NowOT Security Hackathon - Industrial Control Room Defenders
Register NowWorkshop by 
Harnessing AI for Next-Generation Threat Detection: Opportunities and Challenges
Workshop by 
Securing the AI-First Enterprise: Practical Defenses for LLMs & Agents
Workshop by 
The New Era of SOC with Cortex Cloud
Workshop by 
Mastering AI-Powered Threats in 2026
Workshop by 
DPDP Act Readiness in the Era of Hybrid Cloud, AI, and Quantum - Data Security and Privacy Blueprint with IBM Guardium
Workshop by 
AI Security - "Shielding the Smart"
Lunch
Workshop by 
Defending the AI-Driven Enterprise: A Workshop on Posture & Identity
Workshop by 
Building a DPDP-Ready Enterprise: An Interactive Cybersecurity & Data Privacy Simulation
Workshop by 
Future-Proofing Data Security Strategy
Tea Break & Networking
Indian Cybersecurity Diaspora Meet
Networking Dinner
Workshop by 
All Things API: Securing the Nervous System of the Digital World
Closed-door Session
Government Adoption Pathways for India's Emerging Technology Cybersecurity Products
Workshop by 
Cloud Cyber Recovery Roundtable: Zero Hour
... When a Cyberattack Strikes Your Cloud, Will You Be Ready?
Think you can not only survive, but also recover from a cyberattack? Let's put that to the test—without any of the risk. This tabletop simulation will help participants gauge their readiness and walk away with immediate strategies to fortify their cloud defenses.
NIC Engagement Powered by 
Special Session on Future of Cybersecurity for Government (Closed-door, Invite-Only)
Opening & Context Setting
Inaugural Address
Partner Address
Panel: ZTNA & UEM - Building Secure Digital Government Infrastructure
Panel: SOC, SIEM & SOAR - Next-Generation Security Operations
Panel: Forensics, RCA, Incident Logging, Mitigation & Behavioral Analysis
Cybersecurity & AI - Harnessing Opportunities, Mitigating Risks
Closing & Call To Action
Operationalising Privacy through PETs: From Concept to Use Case
CyberMixer 2.0
Quantum Edge Sub-Summit
Welcome Address
India's National Quantum Mission: Building a Globally Competitive Quantum Ecosystem
Deloitte x DSCI Report Launch
From Quantum Threat to Quantum Resilience: The Post-Quantum Cryptography Algorithm Journey
Operationalising Quantum Technologies: Journey & Learnings from Early Pioneers
Readiness to Resilience: Insights from Quantum Implementors and Practitioners
The Emerging Landscape of Quantum Algorithms: Foundational Advances, Practical Limits, and the Road Ahead
Lunch
Strategic Roadmap for Quantum Safe Migration - India
The European Quantum Leap: Photonic Innovation, Long-Term Research Priorities & Technology Pathways
The Age of Convergence: Accelerating Scientific Discovery with AI, Quantum and human Ingenuity
Quantum-Accelerated Engineering: Advancing Materials, Simulation, and Autonomy in Automotive and Aerospace
Quantum & Finance: Catalysing Systemic Advantage through Policy, Platform and Practical Deployment
Building a Quantum Economy: Strategic Investments and Emerging Opportunities
DSCI-HIMSS Healthcare Sub-Summit
Special Address: Towards a Secure, Resilient, and Inclusive Digital Health Ecosystem for Viksit Bharat
Keynote by Palo Alto
Keynote Address: Data Protection nuances imperatives in the Digital Health Ecosystem
Special Address: State of India's Healthcare: How much has changed since 2024
Unveiling of the DSCI-HIMSS Thought Leadership
Presentation on Thought Leadership
Panel Discussion: Cybersecurity: From locking out attackers, to unlocking trust in healthcare
Case Study/ Tabletop Exercise
Registration
FAIR CRQ Fireside Chat
Reducing Business Risk by Prioritising Cyber Risk through Cyber Risk Quantification
Inaugural Address
Report Launch
- Indian Cybersecurity Product Landscape Report 3.0 - A DSCI Research Study
- State of AI Adoption for Cybersecurity in India - A DSCI Report supported by Palo Alto Networks
Plenary 1: Resiliency, at a Nation Scale
... When the economy digitizes at speed, threats span domains, & geopolitics is contested
Keynote by 
The New Geography of Security: From Cloud to Edge to Everywhere
Keynote by 
Rethinking Threat Intelligence: A CISO's Guide to the Past, Present & Future
Keynote by 
Cloud Security Maturity Framework: Best practices to operationalise cloud security
Cloud complexity continues to grow in organisations as cloud and AI development accelerate. In response, many organisations have transformed their cloud security operating model, with over 50% of Wiz customers achieving zero critical issues across their cloud environment. This session will cover the best practices and insights from those journeys, including how to democratise security, prioritise risks, and consolidate siloed tooling while bringing along developers, DevOps, SOC, and now AI teams on the cloud security journey.
Keynote by 
Heroes Without Headlines: The CISOs Protecting What Matters
Keynote by 
The Trust Trifecta: Resilience, Sovereignty and AI-Defense.
Keynote by 
The Great Shift: Moving from Perimeter Defence to Data-Centric Posture by Design
Lunch
Securing mobile apps against the modern Attack Vectors
... Banking trojan, device malware, data exfiltration, advanced phishing, reverse engineering app, etc.
Physical World becoming Intelligent
... AI in Physical world: security & privacy in models, architectures & compute
Secure Compute & Edge Hardware
... Confidentiality & Integrity in Hardware path: what it means for security & privacy
Passwordless now: Technology, Culture, & Liability
... Technology & data, lower administrative burden, and fair liability equation
Agentic AI: Can it Meet Security's Aspiration
... Cutting toil, delivering coverage, maintaining provenance, & ensuring compliance by default
Zero Trust: A Progress Report
... Ways & methods, Tech progress, adoption, integrations, impact, & challenges
Minimal Ops, Maximum Protection
... Next generation SOC: AI powered, automated, extended, orchestrated
Shift Left on Privacy
... embedding Data Protection in Early DevSecOps Stages
Generative AI adoption and compliance
Keynote by 
From Security to Agility: Reimagining Enterprise Value with AI beyond what exists
Keynote by 
Exposure Management in the Realm of AI
Fireside Chat by 
Reimagining Mobile Apps and Agentic AI Security in the Digital First Economy
Keynote by 
Transforming Cyber Defence Through Agentic AI
Plenary 2: Future of Global Cybersecurity Cooperation
... reflecting on key dimensions
Fire-side Chat
Strengthening Cyber Security Posture & Preparedness of States
DSCI INNOVATION BOX
Networking Dinner
Threat Intel Corner 2.0: Threat Hunting using AI
The session will help attendees to explore how artificial intelligence can enhance modern threat hunting processes. The session will demonstrate how AI can assist analysts in identifying and investigating potential threats more efficiently.
Closed-door Session
Cyber Workforce Readiness: Enterprise Capability Gaps & Skilling Pathways for India
RTC by 
Guarding the Enterprise AI Stack: From Prompt Attacks to Safe Automation
NCoE Investor Meet
Welcome Address
Where the Next Five Years Are Headed: Cyber, AI & the Opportunity Map
Startup Pitch Showcase
Startup-Investor Networking
CISO Experience Lunch by 
Secure AI by Design
Experiential Engagement by 
The Board Lens: AI, Cyber Risk & the Art of Staying Ahead
RTC by
| 
Cyber Resilience and Zero Trust Data Protection
Exclusive CISO Dinner by 
Digital Forensics Sub-Summit
AISS Inauguration
Panel Discussion
NextGen DFIR: Automating the hunt for digital evidence
Digital Forensics Sub-Summit Inauguration
̨Masterclass
Forensic Fails in Law Enforcement & Corporate Environment
- Improper collection and handling of Digital Evidence
- Broken Chain of Custody
- Learning from Mistakes
Lunch Break
̨Masterclass
Open Source Intelligence
- OSINT, GEOSINT, SOCMINT & Transport INT
- Artificial Intelligence & OSINT
- Combating AI based disinformation warfare
Digital Forensics Paata Shaala
Short lectures on contemporary topics related to cybercrimes and digital forensics
Digital Forensics Paata Shaala
Adoption of AI In DFIR
Digital Forensics Paata Shaala
Building Trust at Scale- Global Compliance Principles
Digital Forensics Paata Shaala
Cyber Slavery: The "High-Paying Job Abroad" Trap - Cybercrime Scam Compounds of Southeast Asia
Digital Forensics Paata Shaala
Vehicle & Embedded Forensics
Digital Forensics Paata Shaala
Code, Coins, and Criminals: Inside Cryptocurrency Forensics
Special feature
DFIR Certification Preparation Workshop
Table Top Exercise and Court Room Simulation
Step inside a realistic crime scene packed with digital devices and their potential sources of evidence. Guided by a narrator, the audience follows the unfolding case background, investigation, and the critical search-and-seizure phase. As the Investigating Officer, IO Assistant, and Forensic Expert enact the operation, they intentionally make common mistakes, revealing how errors can compromise evidence. The scene progresses through the discovery, collection, and initial analysis of digital artefacts. This illustrates the frequent pitfalls and best practices required for successful modern cybercrime investigations.
OT Security Summit 2025
Inaugural & Keynote Session
Protecting the Energy Backbone - Generation to Downstream
Making manufacturing resilient using Zero Trust Architecture and robust Vulnerability management
Networking Lunch
From Assembly Lines to Secure Lines, Building Cyber Defense for Industry 4.0
Self-Reliance in India through Integrated Security Ecosystem
Building OT Cyber Resilience for the Converged Enterprise: Visibility, Prioritization & Response Across IT, IoT & OT
Governing the shadow OT risk: bringing the invisible factory into the boardroom
Supply Chain & Operational Trust in Consumer-Centric Sectors
Networking Tea Break
Engineering Defensible OT Systems for the Real World
Reflections by DSCI & Industry Thought Leaders
Privacy & Policy
Advancing Responsible AI in India: Where Innovation meets cybersecurity and governance
Break / Networking
Digital Sovereignty - Paving the Way for India's Strategic Autonomy
Break / Networking
DPR 2025
Dinner
Payments Security Sub-Summit
Welcome Note & Meeting Overview and Objectives
Regulator Keynote Address
Industry Keynote
Industry Keynote
Regional Market Update and PCI SSC Focus in India for 2025/2026
An Open Roundtable Discussion with Stakeholders—We want to hear from you!
Registration
Breakfast Session
Quantum, AI & Philosophy
Threat Exposure, Continuous Management
... Knowing, prioritizing, validating, & remediating continuously and at a speed
Fortifying Trust
... Building India's Cybersecurity Resilience in the Generative AI Age
Next Gen CSR & Cyber
... Technology Driving Social Impact
Hit by Ransomware?
... Operate While Blind: What you would do for business resiliency
Strengthening Global ties in Cyber
... Building bridges between India and allies
Agents, Autonomy, & Swarms
... Machine generates 90% of traffic: what is means to threat topologies, kill-switches, & guardrails
Future of Cyber Security in an AI-driven world
Tea Break
Plenary 3: From Burden to Balance
... Optimizing National Security and Compliance Requirements
Keynote by 
Digital Resilience in the Age of AI
Keynote by 
From Endpoint to Everything: Integrated Security for a Borderless Enterprise
Keynote by 
Achieving Cyber Resilience using Pervasive, Simplified Microsegmentation
Keynote by 
Cognitive and Autonomous Risk Management
Keynote by 
The Three Megatrends Reshaping Cybersecurity in 2025… and Beyond
Lunch
Network Going Dark
... Challenges for detection and response due to encrypted traffic & protocols
Advances in Mobile App Security
... Edge AI, Runtime Security and Compliance Automation
Unifying Signals, Speeding up Response
... Multi-vector attacks at machine speed challenges detection, enrichment, correlation, and response
Resiliency Engineering & Cloud
... Resilience by math, scaled simulation, high fidelity emulation, dependency graph, competence envelop, and so on
Supply Chain Security: Tools & Instruments
... BOMs, Provenance, Signing, VEX Attestations, Watermarking, etc.
Beyond Compliance
... Building Adaptive Data Security for Financial Services
Digital Trust & Identity Governance
... From identities and entitlements to enforceable policy, provable evidence, and measurable risk reduction
Dark Web to Actionable Defense
... Intel to action, seeing before boom, faster containment, & defense operations
DevSecOps 2.0: Securing the Future of Autonomous Development
Plenary 4: Large scale Digitization of Public Services: state of Security & Privacy
... assessing preparedness, institutional capabilities and developmental policies
Keynote by 
Fighting Fraud - A Retailer Perspective
Keynote by 
Closing the Visibility Gap: Moving from Reactive Data Protection to Proactive DSPM
Keynote by 
Into The Storm- Identity As New Attack Surface
Fireside Chat by 
AI vs AI: How Attackers and Defenders are using Artificial Intelligence
Cyber Awareness Design Challenge - Awards Ceremony
MPs Panel
Securing Digital Governance: Readiness, Resilience, and Policy Pathways
EXCELLENCE AWARDS
Networking Dinner & Cocktails
RTC by
| 
Bridging Gaps in SAP Security and Compliance
Technology Forecasting & Strategic Resilience - A Leadership Roundtable
Register InterestThis strategic dialogue will convene select CIOs, CTOs, CDOs, and CISOs to explore how leadership can stay ahead of the accelerating wave of technological transformation and position security as a proactive driver of innovation and enterprise resilience.
RTC by 
Thriving in the AI Era: How Innovation Powers Cyber Resilience
RTC by 
Fighting Frauds Together
RTC by 
The Autonomous SOC: Is India Ready for AI-Driven Security Operations?
OT Security Summit 2025
Inaugural & Keynote Session
National Security at the Intersection of Operational Technology & Cyber
Challenges and roadmap for OT Security Environment
Securing Telecom Networks, Smart Grids & Smart Cities
Building an OT - capable security operations center(SOC): Key considerations for People, Process and Technology
Achieving Cyber Resilience for Industrial and Critical Infrastructure
Networking Lunch
Cyber-Physical Resilience in India's Maritime Ecosystem
Securing the New Energy Transition - Renewables & Distributed Assets
Rewriting the Playbook to Modernize OT Governance & Compliance
Strengthening Cyber-Physical Resilience for India's Critical Enterprises
Closing Address
PULSE 2025 - Preparing & Upskilling Leaders in Security Education
Welcome Address
Building India's Next-Generation Cybersecurity Capabilities: Advancing Niche Technology Skills for a Secure Digital Future
Keynote Address
AI augmented skills driving talent capability in India's digital future
Keynote Address
Shaping National Cyber Workforce Readiness in the Age of Generative AI
Plenary Talk
Leadership in Action: How Tech Leaders Inspire, Influence, and Deliver
Fireside Chat
From Classrooms to Cyber Excellence: Strengthening Academia-Industry Collaboration with Global Insights and Policy Convergence
Panel Discussion
National Workforce Readiness: Building a Cyber-Skilled India by 2030
Lunch
Panel Discussion
Cyber Skilling for the Quantum Transition: Advancing India's Technical and Industry Readiness
MoA Signing
Round Table Conference
Building a unified, industry-aligned cybersecurity curriculum framework for India that standardises education, strengthens faculty and hands-on learning, and ensures a future-ready talent pipeline.
Women In Security
CXO Panel - Nurturing Future Women Tech Leaders in Cyber
Passkeys Under the Microscope: Breaking the Illusion of Perfect Authentication
Lunch
Career Pathways in Cyber & Privacy
Flash Mentoring
Insurance Sub-Summit
A Cybersecurity & Data Protection Sub-Summit with a three-hour agenda regulatory leadership and CXOs of insurance sector.
























