About Event

Annual Information Security Summit 2012

Annual Information Security Summit 2012

The dependence of consumers and businesses on the online system and interconnected networks continues to increase. Lifeline Industries such as electric, water, oil and natural gas, transportation, automotive, and aerospace are increasingly relying on an industrial control system which include SCADA and DCS. These industrial control systems are vital to the operation of the nation’s critical infrastructures that are often highly interconnected and mutually dependent systems. Initially, running on proprietary control these have evolved with the availability of low-cost Internet Protocol (IP) devices, thus increasing the possibility of cyber security vulnerabilities and incidents. As Industrial Control Systems are adopting IT solutions to promote corporate business systems connectivity and remote access capabilities, and are being designed and implemented using industry standard computers, operating systems (OS) and network protocols, they are starting to resemble IT systems.

The security implication of such a system is challenging and cannot be merely addressed by security solutions.Considering that most of the nation’s critical infrastructures are privately owned and operated, hence government policies need to be backed up with the involvement of the private sector. The department of electronics and information technology (DeitY) has released a draft National Cyber Security Policy for industry consultation. The policy intends to define a critical infrastructure for the country depending on the impact it might have on national ecosystem. Along with Energy, Defense, Transportation and Telecommunication, the Financial sector which includes banks and stock exchanges has been identified as the Critical infrastructure by the draft National Cyber Security Policy. More than 80% of banking transactions today takes place online, while the majority of the investor trade through online systems, making the financial sector the most critical sector.

The advent of technology and increased availability of broadband connectivity coupled with smart phones have eased the manner in which consumer interacts and transacts online. Moreover, with the multitude of eGovernance applications under the MMP where citizen services are being provided online, a new term called Digital Citizen has emerged. Businesses are trying to satisfy this digital citizen by providing a multitude of applications operating at various platforms through various channels. The security of these platforms, channels and applications are utmost important for the government and industry to ensure trust in the customer.

The NASSCOM-DSCI Annual Information Security Summit this year will focus on the national cyber security elements- Framework, Machinery, Responsibility & Operations for all the critical information sectors like power, energy and finance where deliberation will take place on operating technologies like smart grid and industrial control system; the security and privacy imperatives of eCommerce, mCommerce and eGovernance application and platforms. The Summit will provide an opportunity to have focused discussions with government leaders along with global experts who will talk about the security ramifications at the global level. Special features such as celebrating the success of women leaders in the field of security, Workshop on IT Act and release of DSCI assessment frameworks will also be part of the annual summit. The addition of DSCI Excellence Awards 2012 to Corporate and LEAs this year along with Annual summit will truly make this as a platform where India Meets for Security. DSCI welcomes all the participants on its 7th Annual Summit at Taj Land Ends, Bandra(W), Mumbai on 11-12 December 2012.

  • Sponsors
  • Who should attend?

Speakers

No Speakers Present.

Sponsors

http://www.trustedcomputinggroup.org/ http://www22.verizon.com/home/verizonglobalhome/ghp_landing.aspx
http://www.cisco.com/ http://www.deloitte.com/view/en_IN/in/index.htm
http://www.intel.in/content/www/in/en/homepage.html http://www.juniper.net/in/en/
http://www.websense.com/content/home.aspx http://www.microsoft.com/en-in/default.aspx
http://www.ebay.in/ http://www8.hp.com/in/en/home.html
http://www.emc.com/domains/rsa/index.htm https://www.isc2.org/
http://www.intigrow.com/Home http://www.informatica.com/in/
http://www.ibm.com/in/en/ http://www.safenet-inc.com/
http://www.quickheal.com/ http://www.globalscape.com/
http://www.wave.com/ http://www.sans.org/
http://www.forensicsguru.com/ http://pyramidcyber.com/pyramid/
http://www.htepl.com http://www.arconnet.com
http://www.fireeye.com/ http://www.ctrls.in/
https://nationalskillsregistry.com/ http://www.modulo.com/
http://www.cxotoday.com/ http://biztech2.in.com/
http://www.informationweek.in/Home.aspx http://www.infosecurity-magazine.com/
http://www.techtarget.com/ http://www.24framesdigital.com/

Who should attend?

Organizations:

  • User Organization – Banks, Finance, Telecom, Manufacturing, Energy
  • Government & PSUs
  • Technology & Service Providers
  • Security Product/ Services Companies
  • Academia

Individuals:

  • Business Leaders
  • IT Leadership
  • Security & Privacy Leadership