The seventh edition of the DSCI FINSEC Conclave is all set to be the perfect congregation of policy, finance, and security spheres. This year's conclave will bring together the expertise, experience, and foresight of leaders, practitioners, policymakers, researchers, developers, and innovators to address the evolving challenges and opportunities in financial security and privacy. As cyber risks continue to evolve, organizations are enhancing their defence strategies with cutting-edge security measures.
Finsec 2025 will delve into pressing themes such as includes Transaction Security, Payment Innovation, LLM Ops, Quantum Blueprint, Resilient Financial Infrastructure, PrivacyOps, Next-Gen Digital Crime, Supervisory Technology and Compliance, ESG Integration, and Multi-Cloud Security Architecture.
Cumulative Data of FINSEC Over the Last 6 Years
PARTICIPANTS FROM
BFSI & FINTECH
SPONSORS/PARTNERS
COMPANIES
SPEAKERS
DELEGATES
8:00 AM - 9:00 AM |
Registrations Open |
|||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
9:00 AM - 10:15 AM |
![]() Breakfast Session - Hosted by DSCI Beyond the Qubit: Building a Trillion-Dollar Quantum Economy |
|||||||||||
10:15 AM - 10:30 AM |
![]() Energizer |
|||||||||||
10:30 AM - 11:00 AM |
![]() Inaugural Keynote Address: Maverick Approach towards Collaborative Cybersecurity |
11:00 AM - 11:15 AM |
![]() Special Launches & AnnouncementPortal Launch: Techsagar 2.0 – Advancing India’s Emerging Tech Discovery (AI-enabled search) Paper Launch: AI Security, Privacy & Governance Policy Template |
|||||||||
11:15 AM - 11:30 AM |
![]() Keynote Address By ![]() Cybersecurity in the Age of AI |
|||||||||||
11:45 AM - 12:00 PM |
![]() Keynote Address By ![]() Data Security: The Missing Context |
|||||||||||
12:00 PM - 12:15 PM |
![]() Keynote Address By ![]() When AI Acts Alone in Cybersecurity |
|||||||||||
12:15 PM - 1:00 PM |
![]() Panel Discussion Cyber Resilience in the Intelligent Age...Strategies for Enterprise Security |
|||||||||||
1:00 PM - 2:00 PM |
Networking Lunch |
|||||||||||
2:00 PM - 2:15 PM |
![]() Energizer |
|||||||||||
2:15 PM - 3:30 PM |
![]() Workshop by ![]() Secure Browsing to Autonomous SOCThe Next Era Of Cybersecurity |
![]() Workshop by ![]() From Detection to DecisionBuilding Agentic Security |
![]() Workshop by ![]() From Breach to Blueprint:Real-World Cyber Crisis Lessons for the AI Age |
|||||||||
3:30 PM - 4:15 PM |
![]() Track 1 Agentic AI & Financial Products…Discovering Regulatory Issues |
![]() Track 2 PrivacyOps…Every Transaction Must Be Legitimate & Satisfying Obligations |
![]() Track 3 Attacks in Financial Sector…Key learning lessons |
|||||||||
4:15 PM - 4:45 PM |
Networking Tea |
|||||||||||
4:45 PM - 5:05 PM |
![]() Human Capital...The Real Infrastructure of Digital Resilience |
|||||||||||
5:05 PM - 5:20 PM |
![]() Keynote Address By ![]() Protecting Files in Zero Trust Architectures
|
|||||||||||
5:20 PM - 5:40 PM |
![]() Fireside Chat by![]() Securing Critical Corporate Infrastructure Against Cyber Warfare |
|||||||||||
5:40 PM - 6:00 PM |
![]() Strategic Dialogue By ![]() Securing AI Adoption in Financial ServicesBuilding Trust Through Resilient, Human-Centric AI |
|||||||||||
6:00 PM - 6:15 PM |
![]() The FAIR Way to Third-Party Risk: Practical CRQ for TPRM Leaders |
|||||||||||
6:15 PM - 7:00 PM |
![]() CXO Panel - Decade of Financial Innovation...Examining dimension of trust, ethics and Privacy. |
|||||||||||
7:00 PM Onwards |
Networking Cocktail & Dinner |
2:00 PM - 4:30 PM |
![]() Talent of Tomorrow
View Detailed Agenda
|
---|
2:00 PM - 3:15 PM |
![]() ESG Meets CybersecurityA Collaborative Path to Resilience *Invite Only* |
---|
4:00 PM - 4:45 PM |
![]() WorkshopPrivacy ShowcasePersonal Data Governance in Banking Sector |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
4:45 PM - 7:00 PM |
![]()
View Detailed Agenda
|
||||||||||||||||||||||||||||||||||||||||||||||||||
5:00 PM - 7:00 PM |
![]() Secure In The Age of AI![]() |
9:00 AM - 5:00 PM |
Day 1Register Now
View Detailed Agenda
|
---|
8:00 AM - 8:30 AM |
Registrations Open |
|||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
9:00 AM - 10:00 AM |
![]() Breakfast Session - Hosted by DSCI Beyond the Qubit: Building a Trillion-Dollar Quantum Economy |
|||||||||||
10:45 AM - 11:00 AM |
![]() Inaugural Keynote Address: Maverick Approach towards Collaborative Cybersecurity |
11:00 AM - 11:15 AM |
![]() Special Launches & AnnouncementPortal Launch: Techsagar 2.0 – Advancing India’s Emerging Tech Discovery (AI-enabled search) Paper Launch: AI Security, Privacy & Governance Policy Template |
|||||||||
11:15 AM - 11:30 AM |
![]() Keynote Address By ![]() Cybersecurity in the Age of AI |
|||||||||||
11:45 AM - 12:00 PM |
![]() Keynote Address By ![]() Data Security: The Missing Context |
|||||||||||
12:00 PM - 12:15 PM |
![]() Keynote Address By ![]() When AI Acts Alone in Cybersecurity |
|||||||||||
12:15 PM - 1:00 PM |
![]() Panel Discussion Cyber Resilience in the Intelligent Age...Strategies for Enterprise Security |
|||||||||||
1:00 PM - 2:00 PM |
Networking Lunch |
|||||||||||
2:00 PM - 2:15 PM |
![]() Energizer |
|||||||||||
2:15 PM - 3:30 PM |
![]() Workshop by ![]() Secure Browsing to Autonomous SOCThe Next Era Of Cybersecurity |
![]() Workshop by ![]() From Detection to DecisionBuilding Agentic Security |
![]() Workshop by ![]() From Breach to Blueprint:Real-World Cyber Crisis Lessons for the AI Age |
|||||||||
3:30 PM - 4:15 PM |
![]() Track 1 Agentic AI & Financial Products…Discovering Regulatory Issues |
![]() Track 2 PrivacyOps…Every Transaction Must Be Legitimate & Satisfying Obligations |
![]() Track 3 Attacks in Financial Sector…Key learning lessons |
|||||||||
4:15 PM - 4:45 PM |
Networking Tea |
|||||||||||
4:45 PM - 5:05 PM |
![]() Human Capital...The Real Infrastructure of Digital Resilience |
|||||||||||
5:05 PM - 5:20 PM |
![]() Keynote Address By ![]() Protecting Files in Zero Trust Architectures
|
|||||||||||
5:20 PM - 5:40 PM |
![]() Fireside Chat by![]() |
|||||||||||
5:40 PM - 6:00 PM |
![]() Strategic Dialogue By ![]() Securing AI Adoption in Financial ServicesBuilding Trust Through Resilient, Human-Centric AI |
|||||||||||
6:00 PM - 6:15 PM |
![]() The FAIR Way to Third-Party Risk: Practical CRQ for TPRM Leaders |
|||||||||||
6:15 PM - 7:00 PM |
![]() CEO Panel - Decade of Fintech Innovation...Examaning dimensions of Trust, Ethics, Security and Privacy |
|||||||||||
7:00 PM Onwards |
Networking Cocktail & Dinner |
8:00 AM - 8:30 AM |
Registrations Open |
|||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
8:45 AM - 9:30 AM |
![]() Breakfast Session Hosted by - DSCI Deliberation on DSCI Template for AI Security, Privacy and Governance Policy |
|||||||||||
9:30 AM - 9:40 AM |
![]() Report LaunchIndian Digital Forensic Market Report |
|||||||||||
9:40 AM - 10:00 AM |
![]() Energizer |
|||||||||||
10:00 AM - 10:30 AM |
![]() Fireside ChatThe Future of Cyber Defense: CXO Perspectives |
|||||||||||
10:30 AM - 10:45 AM |
![]() Keynote Address By - ![]() Decoding the Financial Cyber Threat LandscapeLeveraging Unified Threat Intelligence for Strategic Defense |
|||||||||||
10:50 AM - 11:05 AM |
![]() Keynote Address By - ![]() Man-In-Front Attack – An Uncontrollable Lethal Threat |
|||||||||||
11:10 AM - 11:25 AM |
![]() Keynote Address By - ![]() Banking on Cryptography |
|||||||||||
11:30 AM - 11:40 AM |
![]() Keynote Address By - ![]() Minimum 50% Cost Reduction to Run Your SOC |
|||||||||||
11:40 AM - 12:30 PM |
Networking & Expo Visit |
|||||||||||
12:30 PM - 1:30 PM |
Networking Lunch |
|||||||||||
1:30 PM - 2:15 PM |
![]() Track 4 CBOM in BFSI…Engineering, Diversity, Dependencies, & Scale |
![]() Track 5 New Frontiers in Cybercrime…Debunking Myths and Tackling Fraud |
![]() Track 6 Zero Trust in Zero Friction…Engineering Next-Generation Authentication |
|||||||||
2:15 PM - 3:00 PM |
![]() Track 7 SupTech…Future of Financial Supervision |
![]() Track 8 Securing Digital Transactions and Fraud Prevention in Mobile First World |
![]() Track 9 Resilient Backbone…Engineering Fail Safe Cloud Infrastructure for Financial Operations |
|||||||||
3:00 PM - 3:30 PM |
Networking Tea Break |
|||||||||||
3:30 PM - 4:15 PM |
![]() GCC CXO PanelSecuring the Digital Nerve Center |
|||||||||||
4:15 PM - 4:35 PM |
![]() Fireside Chat on Sustaining Financial Infra in the Emerging Geopolitical Scenarios |
|||||||||||
4:35 PM - 6:00 PM |
![]() ![]() |
|||||||||||
6:00 PM Onwards |
Networking Dinner
|
8:00 AM - 8:30 AM |
Registrations Open |
|||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
8:45 AM - 9:30 AM |
![]() Breakfast Session Hosted by - DSCI Deliberation on DSCI Template for AI Security, Privacy and Governance Policy |
|||||||||||
9:30 AM - 9:40 AM |
![]() Report LaunchIndian Digital Forensic Market Report |
|||||||||||
9:40 AM - 10:00 AM |
![]() Energizer |
|||||||||||
10:00 AM - 10:30 AM |
![]() Fireside chatThe Future of Cyber Defense: CXO Perspectives |
|||||||||||
10:30 AM - 10:45 AM |
![]() Keynote Address By - ![]() Decoding the Financial Cyber Threat LandscapeLeveraging Unified Threat Intelligence for Strategic Defense |
|||||||||||
10:50 AM - 11:05 AM |
![]() Keynote Address By - ![]() Man-In-Front Attack – An Uncontrollable Lethal Threat |
|||||||||||
11:10 AM - 11:25 AM |
![]() Keynote Address By - ![]() Banking on Cryptography |
|||||||||||
11:30 AM - 11:40 AM |
![]() Keynote Address By - ![]() Minimum 50% Cost Reduction to Run Your SOC |
|||||||||||
11:40 AM - 12:30 PM |
Networking & Expo Visit |
|||||||||||
12:30 PM - 1:30 PM |
Networking Lunch |
|||||||||||
1:30 PM - 2:15 PM |
![]() Track 4 CBOM in BFSI…Engineering, Diversity, Dependencies, & Scale |
![]() Track 5 New Frontiers in Cybercrime…Debunking Myths and Tackling Fraud |
![]() Track 6 Zero Trust in Zero Friction…Engineering Next-Generation Authentication |
|||||||||
2:15 PM - 3:00 PM |
![]() Track 7 SupTech…Future of Financial Supervision |
![]() Track 8 Securing Digital Transactions and Fraud Prevention in Mobile First World |
![]() Track 9 Resilient Backbone…Engineering Fail Safe Cloud Infrastructure for Financial Operations |
|||||||||
3:00 PM - 3:30 PM |
Networking Tea Break |
|||||||||||
3:30 PM - 4:15 PM |
![]() GCC CXO PanelSecuring the Digital Nerve Center |
|||||||||||
4:15 PM - 4:35 PM |
![]() Fireside Chat on Sustaining Financial Infra in the Emerging Geopolitical Scenarios |
|||||||||||
4:35 PM - 6:00 PM |
![]() ![]() |
|||||||||||
6:00 PM Onwards |
Networking Dinner
|
9:00 AM - 5:00 PM |
Day 2: Hands-on Technical Drill based on Ransomware Attack ScenarioRegister Now
View Detailed Agenda
|
---|
10:30 AM - 12:30 PM |
![]() Tech Bets 2025–2030Next-Gen Cyber Capabilities Beyond Compliance Mandate *Invite Only* |
|||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
10:30 AM - 12:30 PM |
![]() A DSCI - NABARD WorkshopLeadership perspectives on Cyber Security strategy for the banking sector *Invite Only* |
|||||||||||
2:00 PM - 4:00 PM |
![]() The Leadership ImperativeExecutive Discourse on Frontier Technologies *Invite Only* |
2:00 PM - 4:30 PM |
![]() Quantum Edge Sub-Summit
View Detailed Agenda
|
---|
Incl of taxes
Sold Out
Incl of taxes
Sold Out
Incl of taxes
For Women Delegates only
Sold Out
Incl of taxes
Sold Out
Incl of taxes
Special Offer: Enroll in DCRRR and refer a colleague to attend FINSEC 2025 with a complimentary pass. Write to certification@dsci.in to claim.
Sold Out
Incl of taxes
2 Complimentary Passes
Write to membership@dsci.in for more details
Sold Out
Step 1: Click on the type of pass to register with.
Step 2: Choose the number of delegate(s).
Step 3: Fill in all details of the delegate(s).
Step 4: Submit the payment to confirm participation.
After filling the details, once you reach at the last step for submitting the payment, you will have the following 2 options:
Online mode - In this mode, you can submit the payment via debit/credit/net banking/UPI. Using the online option, once you make the payment, you will get a confirmation mail on your email id for the event.
Offline mode - In this mode, you will have the option to submit the payment routed via bank transfer.
Once you choose this option and submit the details, you will be registered as not paid delegate. Once you do the bank transfer, you will need to share the UTR number with us. Once received, you will get a confirmation email of the registration.
*Note: Registration under offline mode will not be considered as confirmed until the payment is received by DSCI.
If you need an invoice for registration, make sure you add - (company name, address and GSTIN) on STEP 2 in the Buyer section. The billing details need to be furnished to get the invoice. In case you choose to skip providing the invoicing details, the same would be considered under unregistered and sharing of the tax invoice would not be possible post that.
Your registration pass gives you access to all sessions and workshops for the event and meals during the event. *Note: The access of the pass is excluded from any exclusive or special session defined as Invite Only.
To obtain your pass on the event day, you would need to visit the registration counter and mention your registration number and identity card to get your delegate badge at the venue.
Unfortunately no, the accommodation and travel will have to be taken care by the delegates on their own. DSCI will not be responsible for the same. However, if you wish to stay at the event venue, you can book your accommodation at the special DSCI-negotiated rates crafted for the delegates only. You may have a look at it by going to the venue section of the event website.
Unfortunately, no pick/drop facility is available for the event. It is advisable that delegates should plan their commute on their behalf only.