ABOUT
Best Practices Meet 2025
DSCI is hosting the 17th edition of its Best Practices Meet (BPM 2025) in Bengaluru on August 21, 2025.
Over the years, BPM has served as a fitting platform for Security & Privacy professionals and practitioners to come under one roof and deliberate on the best practices & concerns of the global as well as domestic Cyber Security industry. DSCI Best Practices Meet (BPM) focuses on the contemporary evolution of security by organising its content and deliberations under a dominant theme.
This time around, the BPM, with its renewed structure and spirt, shall entail a significant focus on the dimensions in involved in the Cyber Security of Aerospace & Defence sector of the country. Cybersecurity holds paramount importance for India's aerospace and defence sector, given the strategic sensitivity and national security implications of these domains. As India modernizes its defence infrastructure and integrates advanced digital technologies—such as AI, satellite communication, and network-centric warfare—the sector becomes increasingly vulnerable to cyber threats from both state and non-state actors. A single breach could compromise classified data, disrupt critical operations, or undermine defence readiness. The evolving geopolitical landscape, marked by strategic rivalries, territorial disputes, and shifting alliances, has placed defence modernization at the forefront of national security agendas worldwide.
Additionally, the Meet will also lay adequate focus on Emerging Technologies and the Security Challenges and Opportunities thereof. The emerging technologies like AI/ML, IoT, NLP, hardware and semiconductors, wireless networking, cloud computing, robotics, blockchain, AR/VR, and many others have been fuelling the technology transformation. The invention of new protocols, technology standards, interfaces, architectural frameworks, and cloud models is aiding in making better use of these emerging technologies. The rising quantum and complexity of data, increasing volume and velocity of development and deployment, heterogeneous devices connecting to the network, and higher dependencies on the cloud would pose significant challenges to security. Although emerging technologies would challenge the current security paradigm, they would also open up a plethora of new opportunities for cyber security.
Read More »