ISMG Events
  • Summits
  • Roundtables
  • Faculty
  • About ISMG Events
  • Contact us

Fraud & Breach Prevention Summit: Bengaluru

June 12-13, 2018 - Vivanta by Taj

View Sessions

SUMMARY / Fraud & Breach Prevention

Geetha Nandikotkur

Managing Editor, Asia & the Middle East, ISMG

Join us in Bengaluru at our Fraud and Breach Prevention Summit and hear from industry leaders who are experts in specialties ranging from IoT, Aadhaar Security, and the emerging use of deception technology to the ever-persistent and ongoing mobile frauds, eCommerce frauds, tackling unknown threats and ransomware attacks. 2018 promises to have more than enough for all of us to talk about and learn from each other, as data breaches and frauds increase in scale and frequency and with businesses today preparing to ensure an effective, swift, and well-orchestrated response.

We have consciously designed our two-day dual-track sessions to address the needs of CISOs, fraud and risk teams, security and IT professionals, and others by providing hands-on tools and real-world problems and solutions that attendees can take back with them and apply them long after the summit ends.

Details

Vivanta by Taj
MG Road
Bengaluru

June 12th & 13th, 2018

₹12000 + Tax

View Sessions
  • Event Gallery

Ravikiran Avvuru

CISO, Toyota Kirloskar

Sunil Varkey

CISO, Wipro Limited

Sethu Raman

CRO, Mphasis

Geetha Nandikotkur

Managing Editor, Asia & the Middle East, ISMG

Naavi Vijayashankar

Advocate, Cyber Dispute and Risk Management Practitioner

Sundar Ramaswamy

Partner, KPMG

Shivakumar Sriraman

Chief Risk Officer - India & South Asia, Visa

Jagdeep Singh

CISO, Rauketan

SPEAKERS / Featured Speakers

Sunil Varkey

CISO, Wipro Limited

Ravikiran Avvaru

Head-IT & Security, APAC, ME & Africa, Apollo Tyres

Jagdeep Singh

CISO, Rakuten India

Dharmaraj Ramakrishnan

Senior Director - IT and Head of Service Delivery - Banking and Payments, Fidelity National Information Services

Srinivas Poosarla

Head - Global Privacy & Data Protection, Infosys Technologies

Sethu S Raman

CRO, MphasiS

Sridhar Sidhu

Senior Vice President and Head of Information Security Services Group, Wells Fargo

Varun Haran

Managing Director, Asia & Middle East, ISMG

Geetha Nandikotkur

Managing Editor, Asia & the Middle East, ISMG

Suparna Goswami

Associate Editor, ISMG

Naavi Vijayashankar

Cyber Law Expert

Ravi Krishnan MuthuKrishnan

Product Security Architect, Visa

Darshan Appayanna

CISO and Chief Knowledge Officer, Happiest Minds

Tamaghna Basu

CTO, neoEYED

Greg Singh

Technical Director - APAC, Skybox Security

Latha Reddy

Distinguished Fellow, East West Institute, New York & Former Dy. National Security and Cybersecurity Adviser of India

Prakash Padariya

Head - Information Security, GE India Technology Center

Sanjay Sahay

Additional Director General of Police - Cyber, Karnataka Police

Subhajit Deb

CISO, Dr. Reddy's Laboratories

Vishal Jaitak

Cybersecurity Leader, GE Digital

Jayesh Ranjan IAS

Principal Secretary, Information Technology, Electronics and Communications Department, Government of Telangana

Ratan Jyoti

CISO, Ujjivan Small Finance Bank

Vishal Salvi

Senior Vice President and CISO, Infosys

Prasanna Lohar

Head-IT, DCB Bank

Anubhav Wahie

Business Manager- Cybersecurity, Cisco India

Vinit Goenka

Member Governing Council, CRIS - Center for Railway Information System, Organisation Under Ministry of Railways

Agnidipta Sarkar

Global Information Risk & Continuity Officer, DXC Technology

Vikrant Raj

Vice President, eMudhra Ltd

Ganesh Prasad

Pre-Sales Manager, India , RSA

Philippe Alcoy

Cyber Security Technologist, APAC, Arbor Networks, the security division of NETSCOUT

Yogesh Kulkarni

Professional Services Lead - APAC, Rapid7

Santhosh Varkey

Manager, Sales Engineering, Sophos

Shrenik Bhayani

General Manager, South Asia, Kaspersky Lab

Gyana Bardhan Pattnaik

Global Head-Embedded Horizontal & Application Software & IoT, L&T Technology Services

Lopa Mudraa Basuu

Global Director IT Risk Operations, Ocwen Financial Solutions

Minatee Mishra

Director, Product Security, Philips

Meet Our Speakers

ISMG Global Events: 2020 and Beyond

ISMG's SVP of Editorial, VP of Global Events, and Group Director of Custom Events discuss the state of events.

The Critical Importance of Data Integrity

Microsoft's Diana Kelley on How to Keep Data Untampered

Steve Katz on Cybersecurity’s State of the Union

World's First CISO Weighs in on the Technologies and Trends Shaping 2019

The Challenge of Fighting Identity Fraud

IBM's Shaked Vax on Emerging Technologies to Assure Digital IDs

A Common Sense Guide to Mitigating Insider Threats

Randy Trzeciak of CERT Reviews the Latest Research

Schedule / Session Date & Times



  • Tuesday, June 12th

  • Wednesday, June 13th

  • Hall A
  • Hall B
  • Hall C
  • Hall D
8:30 am -
9:15 am
8:30 am - 9:15 am

Registration, Breakfast & Networking

9:15 am -
9:30 am
9:15 am - 9:30 am

Opening Remarks

9:35 am -
10:15 am
9:35 am - 10:15 am

Changing Threat Landscape and New Attack Trends: A Proactive Approach to Cybersecurity

Speaker:
Vishal Salvi, Senior Vice President and CISO, Infosys

The keynote kicks off the summit with a review of the threat landscape, highlighting the state of cybersecurity solutions and services, as well as the contemporary technologies that could impact the industry. The industry is likely to witness new attack trends, including newer forms of mobile attacks, wipers deployed for counter incidence response, IoT security challenges and fileless malware. The world is moving from a "Cold War" to a "Code War"' where information has become vulnerable to misuse.
10:20 am -
10:50 am
10:20 am - 10:50 am

Bigger, Broader & Badder: How DDoS Attacks are Getting out of Control

Speaker:
Philippe Alcoy, Cyber Security Technologist, APAC, Arbor Networks, the security division of NETSCOUT

From 50 Gbps in 2013 to 1.7 tbps today, DDoS attacks have, in just five years, exponentially grown in size, frequency and complexity. We need to take a closer look at how the cyber-threat landscape has changed, and understand the reasons behind our challenge in defending against advanced attacks. This session showcases industry best practices for mitigating DDoS attacks and looks at how advanced edge analytics will help you retain control over the security of your IT environment.

The session will cover:

  • DDoS threat landscape and growing complexity
  • Industry best practices for mitigation
  • Using advance edge analytics for fighting the DDoS threat
10:50 am -
11:10 am
10:50 am - 11:10 am

Exhibit & Networking Break

11:15 am -
11:45 am
11:15 am - 11:45 am Track A

Handling Threat Intelligence and Hunting Operations with AI

Speaker:
Sridhar Sidhu, Senior Vice President and Head of Information Security Services Group, Wells Fargo

Resources and security controls deployed for early detection are turning out to be futile when it comes to dealing with today's emerging threats. This session details an effective approach to threat hunting, which includes response to advanced attacks. Threat hunting is emerging as a new line of defense and is the latest innovation for security operations centers when it comes to combating advanced security threats. In addition to describing effective threat-hunting approaches, this session also reviews:

  • Marrying threat hunting and incident response;
  • Actionable takeaways about how human intelligence can be used to proactively identify and mitigate threats more readily and reliably;
  • How AI helps gather intelligence from billions of transactions.
11:15 am - 11:45 am Track B

Detecting and Fighting Fraud With Cognitive and Behavioral Biometrics

Speaker:
Tamaghna Basu, CTO, neoEYED

As fraudsters continually refine their techniques to steal customers' credentials, organizations have found new ways to fight back with new tools that use behavioral biometrics and cognitive fraud detection.

It is critical to know how cognitive abilities would help in managing risks, compliance and governance as well as help in maximizing detection, reducing false positives and optimizing strong authentication.

The session will describe various models used for behavior pattern analysis and demonstrate how this may be integrated into a real-world SOC to achieve a proactive posture. It will address:

  • Developing a risk framework with cognitive security;
  • The technological expertise available to detect these anomalies and patterns.
11:50 am -
12:20 pm
11:50 am - 12:20 pm Track A

Endpoint Detection and Response - Will EDR Go Mainstream?

Speaker:
Sethu S Raman, CRO, MphasiS

While some security experts see endpoint detection and response suites, or EDRs, as the successor to endpoint protection platforms, or EPPs, both have a role to play in securing the enterprise.

Implementing EDRs is time-consuming and requires specialized skills. EDRs generate so much finely detailed technical data about every aspect of an endpoint that they require skilled technicians to be effective, which means they could prove impractical for organizations that have small IT teams.

EDRs have capabilities to address some fundamental issues that signature-based anti-virus programs cannot handle. And EPP vendors increasingly bringing EDR-type capabilities to their platforms.

The session will feature a discussion of:

  • The resource requirements for migrating to EDR;
  • A plan for going down the EDR path;
  • A strategy for getting the most from an EDR deployment.
11:50 am - 12:20 pm Track B

Blockchain: Enhancing Authentication for Enterprise Security and Fraud Prevention

Speaker:
Prasanna Lohar, Head-IT, DCB Bank

According to a recent Gartner report, Blockchain distributed ledger technology has reached the peak of its hype cycle and remains at the peak of inflated expectations. It offers enormous promise, but enterprises are unsure how to extract business value from it. The question all security and fraud practitioners across all industry verticals want an answer to is: What are the applications of a public or private blockchain in their respective domains? Will blockchain tech help cybersecurity or be a hindrance?

Some experts argue that blockchain technology can help enterprises address age-old cyber risk challenges, such as digital identities and maintaining data integrity, by securing and preventing fraudulent/malicious activity through its consensus mechanism. Several proof-of-concept projects are underway in India, and banking is leading the way.

What can enterprises learn about blockchain application in security and fraud, and what do they need to know about the security of the blockchain data itself? What will 2018 look like for blockchain-based initiatives, and what real-world operational benefits can be expected from such public/private distributed ledgers?

This session offers insights about:

  • Blockchain's applicability to the enterprise security and fraud-prevention framework;
  • How DLT has helped in enhancing authentication and secure applications without the need for any centralized authority or identity management;
  • The value drivers for the blockchain initiatives underway;
  • Establishing identity and preventing fraud using blockchain technology.
12:25 pm -
12:55 pm
12:25 pm - 12:55 pm

Stay Safe with Cyber Hygiene; Focus on Threats that Matter Most

Speaker:
Ganesh Prasad, Pre-Sales Manager, India , RSA

Understanding the early signs of breach to respond accurately and in time is important to secure the most critical assets. Maintaining basic cyber hygiene goes a long way in helping organizations with breach preparedness is to unite business risks and IT risks with a common language and framework to help identify and focus on threats which carry real business risk.

Session will discuss:

  • Identifying risk from a business-driven perspective
  • Establishing and maintaining cyber hygiene
  • Identifying early warning signs and responding proactively
1:00 pm -
1:30 pm
1:00 pm - 1:30 pm

Executive Forums

These forums are invitation-only small group discussions led by distinguished thought leaders and are targeted toward the interest/specialties of their participants.

1:30 pm -
2:15 pm
1:30 pm - 2:15 pm

Lunch

2:15 pm -
3:00 pm
2:15 pm - 3:00 pm

Panel: Aadhaar's Security Conundrum: Building an Effective Data Protection Framework

Speakers:
Agnidipta Sarkar, Global Information Risk & Continuity Officer, DXC Technology
Naavi Vijayashankar, Cyber Law Expert
Ratan Jyoti, CISO, Ujjivan Small Finance Bank
Subhajit Deb, CISO, Dr. Reddy's Laboratories

Aadhaar - the largest biometric-based unique identification system in the world - holds the sensitive personal data of over 1.2 billion Indian citizens. With repositories of personal data held by both private companies and government, Aadhar has come under the lens for frequent data security lapses, and critics have started questioning whether the system really is "hack-proof."

Some believe that critics of Aadhaar are concerned only about citizens' fundamental right to privacy, or the loss of statutory benefits such as rations and direct benefit transfers due to a faulty Aadhaar system. However, recent breach incidents suggest the high likelihood of security lapses, which could lead to identity theft and the possibility of attacks against individuals from criminals leveraging compromised information from the huge data repository. This session explores UDAI's security posture, data protection capabilities and security control implementation methods.

The session will discuss:

  • Building a resilient data protection framework in the context of Aadhar;
  • Securing against fraud, hacks and new threats with appropriate tools and technologies;
  • Lessons/best practices from other national social security/unique ID initiatives around the world.
3:05 pm -
3:35 pm
3:05 pm - 3:35 pm

Securing the Payments Business in a Cashless Economy

Payments technology changes rapidly, and cybercriminal techniques are having no trouble keeping pace. As the use of stolen data and fraudulent cards become more difficult, criminals are shifting their focus and innovating to access customer payment transaction data. The risk of data theft is very real. To stay ahead, merchants and institutions need tools that are specifically designed to address evolving challenges. There is a need for a new set of security standards that can work in parallel without hindering development. The payment card industry has defined standards for protecting cardholder account data, but what about other data types? And what lessons can be learned from the data security practices that the payment card industry has introduced over the years?

The session reviews:

  • Innovations in security and compliance standards in securing payments transactions;
  • Data-centric strategies for payment data protection in applications;
  • How end-to-end encryption and tokenization can mitigate data breach risks.
3:35 pm -
3:55 pm
3:35 pm - 3:55 pm

Exhibit & Networking Break

3:55 pm -
4:25 pm
3:55 pm - 4:25 pm Track A

Threat Centric Vulnerability Management

Speaker:
Greg Singh, Technical Director - APAC, Skybox Security

The exploitation of vulnerabilities is the root cause of most data breaches today and as such, the remediation or mitigating vulnerabilities can be one of the single most effective means of protecting your organization from attack.

Addressing the sheer volume of vulnerabilities that are present in most organizations poses a daunting proposition for security operations and the traditional method of addressing vulnerabilities with a high CVSS score simply doesn't cut it today. How can you leverage threat intelligence combine with valuable information trapped inside your infrastructure to reveal what vulnerabilities pose an imminent threat to your specific environment.

Session will address:

  • Contextual discovery of vulnerabilities in your environment
  • Leveraging threat intelligence to manage vulnerabilities better
  • Identifying and mitigating vulnerabilities that matter most to your organization
3:55 pm - 4:25 pm Track B

Global Threat Landscape: What's Coming?

Speaker:
Shrenik Bhayani, General Manager, South Asia, Kaspersky Lab

The cybersecurity landscape is morphing at a rapid pace today - faster than ever before. Hundreds of sophisticated hacking campaigns and reckless proliferation of sophisticate malware threats over the last few years has left security teams struggling to contain these threats and protect the organization in a technology landscape that is changing at the same time. So what are the most important aspects of the global threat landscape today and what can e expect going forward?

The session will address:

  • Facts and figures from Kaspersky Lab research
  • The critical changes in the threat landscape
  • Problem areas organizations need to monitor
4:30 pm -
5:20 pm
4:30 pm - 5:20 pm

Panel: CASB: A Critical Technology for Cloud Security - What Are India's Stakes?

Speakers:
Darshan Appayanna, CISO and Chief Knowledge Officer, Happiest Minds
Dharmaraj Ramakrishnan, Senior Director - IT and Head of Service Delivery - Banking and Payments, Fidelity National Information Services
Jagdeep Singh, CISO, Rakuten India
Lopa Mudraa Basuu, Global Director IT Risk Operations, Ocwen Financial Solutions

While encryption, data loss prevention and web filtering technologies will continue to be important, Cloud Access Security Brokers will play a critical role in improving cloud security.

CASB, which is a next-generation firewall, helps CISOs gain the necessary visibility, map risks and detect external and internal threats.

With many organizations ready to take to the cloud, citing security, lack of visibility and governance as challenges, CASBs sit in the sweet spot as far as cloud security is concerned.

The panel will discuss:

  • How CASB can ensure that security policies are effectively protected and compiled;
  • How CASB becomes a critical layer of security that enables encryption or federation with a variety of cloud providers;
  • Challenges for organizations leveraging CASB.
5:20 pm -
5:30 pm
5:20 pm - 5:30 pm

Closing Remarks

5:30 pm -
6:30 pm
5:30 pm - 6:30 pm

Cocktails and Networking

View Schedule
  • Hall A
  • Hall B
  • Hall C
  • Hall D
8:30 am -
9:15 am
8:30 am - 9:15 am

Registration, Breakfast & Exhibit Browsing

9:15 am -
9:30 am
9:15 am - 9:30 am

Opening Remarks

9:30 am -
10:10 am
9:30 am - 10:10 am

Protecting and Defending Your Critical Infrastructure Against the Unknown Cyberthreats: The New Metrics

Speaker:
Jayesh Ranjan IAS, Principal Secretary, Information Technology, Electronics and Communications Department, Government of Telangana

Critical infrastructure - energy, defense and transportation among the components - forms the backbone of a nation's economy, security and health. Hence, it is imperative to secure critical infrastructure elements, such as power grids, communication and finance.

State-sponsored attacks are gaining momentum and sophistication, and a persistent cyberattack on critical infrastructure could play havoc. The challenge, then, is to find new ways to mitigate risks emerging from rising threats to critical infrastructure. The most critical challenge for every region or nation is defining what critical infrastructure is, which needs to be protected at any cost. In addition, while in many ways organizations have created a glass house believing it to be secure, in most cases it is not resilient enough to protect against threats.

This session will discuss:

  • What's needed to protect and defend this critical infrastructure;
  • What global security guidelines to adopt while protecting the networks;
  • Why some classes of technologies could be implemented right away without having to go through some of the legacy challenges.
10:15 am -
10:45 am
10:15 am - 10:45 am

Breach Readiness & Response-Intelligence, Integration & Automation

Speaker:
Anubhav Wahie, Business Manager- Cybersecurity, Cisco India

The Cyber threat landscape has evolved leaps and bounds over the last few years. The discussion on breaches, now at the board room level, is focused on preparedness, predictive intelligence and effective incident response. Leveraging a credible source of threat intelligence is foundational-in addition to its contribution to proactive threat hunting, it provides "relevant" insights to the cyber security operations center.

There is a continuous traction on building incremental capabilities. However, balancing best of breed capabilities with building a strong platform is extremely essential in operationalizing this setup. The platform approach helps with information exchange across vectors, which is critical to effective security operations. Lastly, time to detect and remediate can reduce the extent of impact and its containment. This can be achieved through automation.

This session would discuss:

  • Building the first and last line of defense with endpoints
  • Using network as a platform to address insider threat detection capabilities
  • Leveraging integration capabilities across solution to build a platform
  • Elevating SoC effectiveness with "meaningful" and "contextual" threat feeds.
10:45 am -
11:15 am
10:45 am - 11:15 am

Exhibit & Networking Break

11:15 am -
11:45 am
11:15 am - 11:45 am Track A

Targeted Attacks: Proactive Prevention Using Deception Technologies

Speaker:
Prakash Padariya, Head - Information Security, GE India Technology Center

Visibility has been a big challenge for every security practitioner. The exponential increase in the volume of incidents as well as the amount of threat intelligence and advisories that a typical security team needs to sift through on a daily basis, along with the increasing sophistication and stealth employed by advanced attackers, makes detecting an intrusion like finding a needle in a haystack. Traditional approaches are failing to effectively scale to address contemporary challenges, and a fresh look at visibility is necessary for active threat hunting, which active defense and cyber hunting can provide. By bringing broad military deception strategies to cybersecurity, deception technology puts the narrative squarely back in the hands of the defender in the event of an intrusion.

This session addresses:

  • Making incident response and remediation an active, near real-time process;
  • Creating an early warning system that gives practitioners the chance to determine motives;
  • Devising a strategy for effectively incorporating deception tech into a security strategy.
11:15 am - 11:45 am Track B

DevSecOps - Distributing Security Decisions at Speed & Scale

Speaker:
Ravi Krishnan MuthuKrishnan, Product Security Architect, Visa

As businesses surge ahead with agile development processes, cloud and DevOps, traditional security can no longer be the show stopper. Security needs to integrate with the DevOps process to ensure responsibility is shared and security is built in.

DevSecOps enables application security testing by the developer and by the tester all the way into pre-production - whether it is static, dynamic or software composition analysis - in a more automated fashion.

This session will review:

  • How can security teams work on aligning their incentives with operations and with developers?
  • What is the benefit of doing so and what are the challenges?
  • What are the regulatory mandates and compliance issues around secure coding?
11:50 am -
12:20 pm
11:50 am - 12:20 pm Track A

Is it Cheaper to Get Hacked than invest in IT Security?

Speaker:
Yogesh Kulkarni, Professional Services Lead - APAC, Rapid7

Security has always been a price sensitive market, and there are many vendors who meet some of the parameters of managed security services providers' and customers' requirements. But in some cases organizations choose solutions by compromising the features over price. What is the correct balance between the two and what are the basic foundational parameters for choosing the right solution? This session will explore the 'Basic Categorization" on how to choose the right solution to reduce risk, and increase the security posture.

Session will address:

  • Common shortcomings of the procurement process
  • Basic categorization for choosing the right product
  • Finding the balance between cost and functionality
11:50 am - 12:20 pm Track B

Intercepting Modern Threats

Speaker:
Santhosh Varkey, Manager, Sales Engineering, Sophos

Sophisticated attacks comprise of a combination of delivery of exploit techniques, cryptojacking and exploiting user ignorance, enough to run the wrong program. Next generation threats routinely exploit legacy technologies which fail to identify and response to these threats. Way forward is Next Gen technologies, including deep Machine Learning and coordinated defense .This session will also include a live demonstration of exploit technique and blocking credential theft with machine learning.

Session will address:

  • Next generation threat vectors and MO
  • Gaps in legacy framework and why they are failing
  • How machine learning and coordinated defene are relevant
12:25 pm -
12:55 pm
12:25 pm - 12:55 pm

Intelligence-First: Role of Cyber Threat Intelligence in Security Programs

Speaker:
Sunil Varkey, CISO, Wipro Limited

Cyber threat intelligence is a key cyber risk management enabler, providing the context necessary to inform decisions and action across the business. Whether related to incident response, monitoring and detection, or governance and policy making, well-structured cyber threat intelligence functions serve stakeholders across the business. They ensure that knowledge of current and anticipated relevant threats is provided in relevant formats.

This presentation discusses the role intelligence programs play and steps organizations can take to transform security operations to be intelligence-led. It reviews:

  • How cyberthreat intelligence can provide the necessary context to inform security decisions across an enterprise;
  • How businesses can transform their security operations to be intelligence-led;
  • What needs to be done to infuse threat intelligence capabilities across the organization?
1:00 pm -
1:30 pm
1:00 pm - 1:30 pm

Privacy Lessons From Cambridge Analytica - Why India Needs a Strong Regulatory Framework

Speaker:
Vinit Goenka, Member Governing Council, CRIS - Center for Railway Information System, Organisation Under Ministry of Railways

The Cambridge Analytica debate throws up tough questions around the need for a strong data protection and privacy regime in India. In an age where privacy regime around the world are being strengthened and becoming more mature, the Indian approach to privacy and data protection remains a non-starter, with a data protection legislation still on the drawing board for the last half a decade. Democracies around the world are suffering from the misuse of personal information being harvested and analyzed, from social media and other sources, political parties to direct their political campaigns and influence the public opinion and the voting process.

The speaker will share deeper insight on the mechanics of how this process works, if it is illegal and why; and more importantly, the implications for the world's biggest democracy if we are not able to understand and address this issue, and put in the correct checks and balances. What does the government need to do to prevent and mitigate this kind of abuse? What are the regulatory requirements to introduce and enforce world class privacy and data protection standards in India?

Session will address:

  • How the Cambridge Analytica saga illustrates the power of personal information;
  • Why the lack of a robust data protection and privacy law is a grave concern in the Indian knowledge/ Information economy;
  • What are the implications for the democratic process;
  • What are the regulatory requirements to bring about robust privacy and data protection?
  • What is the possible remediation / checks & balances? How can the government prevent breaches of private and sensitive personal information?
1:30 pm -
2:15 pm
1:30 pm - 2:15 pm

Lunch

2:15 pm -
3:05 pm
2:15 pm - 3:05 pm

Panel: GDPR: The Impact on India' Changing Data Privacy Landscape

Speakers:
Latha Reddy, Distinguished Fellow, East West Institute, New York & Former Dy. National Security and Cybersecurity Adviser of India
Rudra Murthy, CISO, Digital India, Ministry of Home Affairs
Sanjay Sahay, Additional Director General of Police - Cyber, Karnataka Police
Srinivas Poosarla, Head - Global Privacy & Data Protection, Infosys Technologies
Subhajit Deb, CISO, Dr. Reddy's Laboratories

The privacy movement is gathering steam in India, with the Supreme Court recently ruling privacy is a fundamental right of citizens. However, a more immediate scramble is underway is to understand how Indian enterprises have started adapting to GDPR regime.

How has the GDPR mandate impacted Indian organizations, specifically those conducting business with EU nations and handling EU citizens' data? What are some challenges related to compliance with GDPR, and what is expected of organizations in the case of a data breach? What can practitioners expect the implications and impact to be, and how will it change the business imperatives, in the view of the hefty fines GDPR could impose? And what do Indian practitioners stand to learn from the changes taking place in the privacy landscape worldwide?

In this session, a panel of information security, cyber law and privacy experts, moderated by Sanjay Sahay, Additional Director General of Police-Cyber for Karnataka Police, will address:

  • How GDPR will impact Indian organizations;
  • Which control frameworks and standards for managing data privacy are relevant in India;
  • What lessons GDPR can provide for creating a practical privacy framework for India.
3:10 pm -
4:00 pm
3:10 pm - 4:00 pm

Panel: Securing IoT Devices: A Security-By-Design Approach

Speakers:
Gyana Bardhan Pattnaik, Global Head-Embedded Horizontal & Application Software & IoT, L&T Technology Services
Minatee Mishra, Director, Product Security
Ravikiran Avvaru, Head-IT & Security, APAC, ME & Africa, Apollo Tyres
Vishal Jaitak, Cybersecurity Leader, GE Digital

The government of India is hopeful that the nation can build a $15 billion Internet of Things industry by 2020. MeitY has been developing standards for operating IoT across technologies and using data security as an enabler for adopting IoT. According to a recent study, India now has 41 IoT use cases, including smart manufacturing supply chain, service operations, transportation/logistics, healthcare, smart governance and smart utilities.

The growing number of IoT devices can potentially provide a direct conduit to some very private and valuable information in your company. In our rush to connect everything, security and privacy are often afterthoughts.

For IoT to become a business enabler in India, security considerations must be adequately addressed. It's essential to take a structured approach to implement security by design, with secure coding and end-to-end encryption of data. Because IoT devices generate huge amounts of data - and protecting data privacy is critical - it's crucial to secure the originating source of the data.

This panel will discuss:

  • Creating a security blueprint for IoT projects and devising an architecture;
  • How to secure codes at the design stage;
  • A collaborative approach with effective team integration;
  • The role of blockchain technology in improving security.
4:00 pm -
4:15 pm
4:00 pm - 4:15 pm

Closing Remarks

View Schedule

SPONSORS / Supporting Organizations

Arbor Networks
Cisco Systems
RSA
Kaspersky
Rapid7 RAH
Skybox
Sophos
CyberFrat
(ISC)² Delhi Chapter

LOCATION / Venue & Address

Vivanta by Taj
41/3, MG Road, Yellappa Garden,
Bengaluru, Karnataka 560001, India

WATCH SESSIONS ONLINE

For our premium members, we offer online webinars from all of our past events. Become a member now to get access to keynotes and important sessions from previous events.

Become a Member

Contact Us

Reach us: Reserve your attendance today to ensure you don’t miss the opportunity to meet, network and learn from the foremost experts in information security and risk management in this interactive environment.

+1 (609) 356-1499
events@ismg.io

Join the Community

Subscribe to get the latest happenings on our Roundtables, Summits, and other Events!

    • BankInfoSecurity
    • CUInfoSecurity
    • GovInfoSecurity
    • HealthcareInfoSecurity
    • InfoRiskToday
    • CareersInfoSecurity
    • DataBreachToday
    • CyberEd
    Home | Summits | Press Releases | Sponsorship
    © 2021 Information Security Media Group, Corp. |
    Privacy & GDPR Statement | CCPA: Do Not Sell My Personal Data