Registration
Hackathon CTF
Masterclass 1
Masterclass 2
Masterclass 3
Masterclass 4
Masterclass 5
Masterclass 6
Lunch
Masterclass 7
Masterclass 8
Masterclass 9
Tea Break & Networking
Pulse 2025
Networking Dinner
Registration
CRQ
What's in AISS 2025?
Plenary 1: Resiliency, at a Nation Scale
... When the economy digitizes at speed, threats span domains, & geopolitics is contested
Mobile Attack Vectors and MTD
... Banking trojan, device malware, data exfiltration, advanced phishing, reverse engineering app, etc.
Physical World becoming Intelligent
... AI in Physical world: security & privacy in models, architectures & compute
Secure Compute & Edge Hardware
... Confidentiality & Integrity in Hardware path: what it means for security & privacy
Passwordless now: Technology, Culture, & Liability
... Technology & data, lower administrative burden, and fair liability equation
Agentic AI: Can it Meet Security's Aspiration
... Cutting toil, delivering coverage, maintaining provenance, & ensuring compliance by default
Zero Trust: A Progress Report
... Ways & methods, Tech progress, adoption, integrations, impact, & challenges
Minimal Ops, Maximum Protection
... Next generation SOC: AI powered, automated, extended, orchestrated
Shift Left on Privacy
... embedding Data Protection in Early DevSecOps Stages
Cloud is Control Plane, Not a Place
... Bring attack focused shift, make security programmable, ensure technology provenance, and make security portable
Plenary 2
Registration
Breakfast Session
Threat Exposure, Continuous Management
... Knowing, prioritizing, validating, & remediating continuously and at a speed
Hit by Ransomware?
... Operate While Blind: What you would do for business resiliency
Non-von-Neumann compute & Security
... What Photons, Memristors & Spikes mean for cyber security
Agents, Autonomy, & Swarms
... Machine generates 90% of traffic: what is means to threat topologies, kill-switches, & guardrails
Plenary 3
Network Going Dark
... Challenges for detection and response due to encrypted traffic & protocols
Advances in Mobile App Security
... Edge AI, Adaptive Measures, CI/CD Integration, RASP, Risk Quantification, & Compliance Automation
Unifying Signals, Speeding up Response
... Multi-vector attacks at machine speed challenges detection, enrichment, correlation, and response
Resiliency Engineering & Cloud
... Resilience by math, scaled simulation, high fidelity emulation, dependency graph, competence envelop, and so on
Supply Chain Security: Tools & Instruments
... BOMs, Provenance, Signing, VEX Attestations, Watermarking, etc.
Pager Attack: Threat Modeling of Phygital World
... Possibilities, Hype, & Realities of threats to physical world and human life
Digital Trust & Identity Governance
... From identities and entitlements to enforceable policy, provable evidence, and measurable risk reduction
Dark Web to Actionable Defense
... Intel to action, seeing before boom, faster containment, & defense operations
Buying for Use Cases, not for Technology
... Getting under the skin of security technologies—through use cases