ISMG Events
  • Summits
  • Roundtables
  • Faculty
  • About ISMG Events
  • Contact us

Fraud & Breach Prevention Summit: Mumbai

December 06-07, 2017

Register Now

SUMMARY / Fraud & Breach Prevention

Geetha Nandikotkur

Managing Editor, Asia & the Middle East, ISMG

The multitude of high-profile breaches in Asia and India have dislodged the mindset that major breaches were purely a Western phenomenon. As data breaches increase in scale and frequency, businesses must prepare to ensure an effective, swift and well-orchestrated response.

This two-day, dual track event is designed for senior information security, risk, forensics, compliance, cyber law and law enforcement professionals. The summit will focus on the latest fraud and breach prevention techniques and technologies, as well as how to develop a holistic, strategic approach.

The Fraud & Breach Prevention Summit Mumbai will address contemporary challenges and topics of particular interest to the Indian and Asia practitioner community, including: breakthrough innovations and technologies; stronger incident response mechanisms; defenses against the ransomware epidemic; insider threat mitigation; security for the cashless payments infrastructure; threat intelligence; information sharing; governance and compliance challenges; security for Smart Cities; and IoT.

Details

Sahara Star

December 6th & 7th, 2017

₹12000 + Tax

Register Now

Registering For a Group?
Call + 1 (609)-356-1499

  • Event Gallery

Bithal Bhardwaj

Chief Information Security Officer and Principal Risk Advisor, GE Africa & GE South Asia

Geetha Nandikotkur

Managing Editor-Asia & Middle East, Information Security Media Group (ISMG)

Lt. Gen. Arun Kumar Sahni

Pres., Info. Security Council of IN, and Former Gen. Officer Commanding in Chief, Indian Army

Brijesh Singh

Special Inspector General of Police - Cyber, Maharashtra Police

Pavan Duggal

Advocate, Supreme Court of India and President, Cyberlaws.net

Ruud Grotens

Principal Consultant, Financial Crime Risk Management

Sundar Ramaswamy

Partner, KPMG

Shivakumar Sriraman

Chief Risk Officer - India & South Asia, Visa

SPEAKERS / Featured Speakers For Our Mumbai Summit

Sameer Ratolikar

CISO, HDFC Bank

Brijesh Singh

Inspector General of Police-Training, Govt. of Maharashtra

Ashutosh Jain

CISO, Axis Bank

Dr. N. Rajendran

CTO, National Payments Council of India

Anuj Tewari

CISO, HCL Technologies

Ravikiran Avvaru

Head-IT & Security, APAC, ME & Africa, Apollo Tyres

Geetha Nandikotkur

Managing Editor, Asia & the Middle East, ISMG

Shivkumar Pandey

CISO, Bombay Stock Exchange LTD

Japjit Singh Sandhu

General Manager, Security and Continuity, Bharti Airtel Ltd.

Venkatesh Subramaniam

Global CISO & Privacy Head, Olam International, Singapore

Vishal Salvi

Senior Vice President and CISO, Infosys

Varun Haran

Managing Director, Asia & Middle East, ISMG

Prashant Mali

President & Founder, Cyber Law Consulting (Attorneys & Advocates)

Amit Sharma

Advisor (Cyber) and Director at the Office of Secretary, Department of Defence, Ministry of Defence, Govt. of India

K. K. Mookhey

Founder & CEO, NII Consulting

Cdr. Mukesh Saini

Fmr National Information Security Coordinator, Government of India

Suparna Goswami

Associate Editor, ISMG

Balsing Rajput

Superintendent of Police, Cyber Division, Maharashtra Police

Apurva Jain

Commercial Team Lead, Darktrace

Shivangi Nadkarni

Co-Founder & CEO, Arrka Consulting

Mannan Godil

CISO, Edelweiss

Y.V. Ramana Murthy

GM & Group CISO, State Bank of India

S.V. Sunder Krishnan

Chief Risk Officer, Reliance Life Insurance

Vivek Chudgar

Senior Director, Mandiant Consulting, FireEye

Krishna Sastry Pendyala

Exec. Dir., Cyber Security Incident Response & Digital Forensic Service, PwC

Vicky Shah

Advocate, Data Privacy Professional

Shivakumar Sriraman

Chief Risk Officer-India & South Asia, VISA

Ashish Sud

Head, Western Region, Sophos

Rajnish Gupta

Regional Director - India & SAARC, RSA

Cameron Church

Director, Solutions Consulting, ThreatMetrix

Harshil Doshi

Security Strategist, Forcepoint

Ankur Kushalka

CISO, Worldline Merchant Services

Robert Levine

COO, Uniken

Meet Our Speakers

ISMG Global Events: 2020 and Beyond

ISMG's SVP of Editorial, VP of Global Events, and Group Director of Custom Events discuss the state of events.

The Critical Importance of Data Integrity

Microsoft's Diana Kelley on How to Keep Data Untampered

Steve Katz on Cybersecurity’s State of the Union

World's First CISO Weighs in on the Technologies and Trends Shaping 2019

The Challenge of Fighting Identity Fraud

IBM's Shaked Vax on Emerging Technologies to Assure Digital IDs

A Common Sense Guide to Mitigating Insider Threats

Randy Trzeciak of CERT Reviews the Latest Research

Schedule / Session Date & Times



  • Wednesday, December 6th

  • Thursday, December 7th

  • Hall A
  • Hall B
  • Hall C
  • Hall D
8:30 am -
9:15 am
8:30 am - 9:15 am

Registration, Breakfast & Exhibit Browsing

9:15 am -
9:30 am
9:15 am - 9:30 am

Opening Remarks

9:30 am -
10:10 am
9:30 am - 10:10 am

Evaluating India's Cybersecurity Posture in 2017: Lessons for the Industry

Speaker:
Vishal Salvi, Senior Vice President and CISO, Infosys

Vishal Salvi, CISO at Infosys, kicks off our summit with a review of the cybersecurity landscape in India, highlighting the state of the cybersecurity solutions and services, and the effectiveness of contemporary technologies. Have those technologies helped practitioners adequately counter threats to their organizations? The session details recommendations on effective countermeasures and the optimal approach to dealing with emerging attack patterns.

10:15 am -
10:45 am
10:15 am - 10:45 am

Planning for the Cybersecurity Chaos

Speaker:
Rajnish Gupta, Regional Director - India & SAARC, RSA

Cybersecurity is entering an age of chaos, where small intrusions have secondary and tertiary effects never before anticipated. Most organizations are shifting their focus from dealing with cybersecurity as a technology problem to a business problem. Organizations must now plan for chaos; and chaos could manifest in various ways, from an increase in unexpected expenses and budgetary constraints to a mere rise in cyberattacks.

This session reviews:

  • Fighting the battle at the right time, with the right approach;
  • Assessing risk management;
  • Prioritizing investments in line with business goals; and
  • Developing a collaborative approach to tackling multifunctional challenges.

10:50 am -
11:20 am
10:50 am - 11:20 am Data Breach Track

Understanding the Dark Web and Malware-as-a-Service

Speaker:
Krishna Sastry Pendyala, Exec. Dir., Cyber Security Incident Response & Digital Forensic Service, PwC

The dark web has become synonymous with cybercrime, with a burgeoning underground economy for data, attack tools and malware flourishing in the parts of the internet inaccessible to the World Wide Web. Sophisticated hierarchies and support mechanisms that mimic real-world organizations have transformed the launch of a cyberattack from an art - the preserve of highly skilled hackers - to a commodity service available to anyone with minimal technical skills, who can launch an attack for as low as $5.

Malware-as-a-service and its better known cousin, ransomware-as-a-service, have successfully evolved in this environment, driven by the potential of massive financial gain and low risk.

The session addresses:

  • Building a better understanding of malware-as-a-service;
  • Mapping the risks from the dark web and responding to the challenge; and
  • Building proactive defenses.

10:50 am - 11:20 am Fraud Track

Data Breach Outlook: From Nation-State Roots to the Next Massive Attack - What Is at Stake for India?

Speaker:
Amit Sharma, Advisor (Cyber) and Director at the Office of Secretary, Department of Defence

Born from nation-state espionage, hundreds of tools and services are now available for assembly into custom-built attack suites fit for almost any purpose at scale. As these attacks gain momentum and sophistication, with India as a target, we need to adapt our defenses accordingly. We must understand how attackers function, drawing parallels from fighting terrorism and emulating the model to apply to the nation's information security charter.

This session features a discussion around:

  • The current statistical scale and scope of targeted attacks;
  • The threat actors executing these attacks and their motivations for doing so, including making money, obtaining personal identity information and waging terror;
  • The types of valuable data and/or critical infrastructure attackers are targeting; and
  • Where resources should be focused to defend against these evolving threats.

11:25 am -
11:55 am
11:25 am - 11:55 am Data Breach Track

The Enterprise Immune System: Using Machine Learning for Next-Generation Cyberdefense

Speaker:
Apurva Jain, Commercial Team Lead, Darktrace

From insiders to sophisticated external attackers, the cybersecurity threat is already inside your network. A new approach to cyberdefense is needed. Based on unsupervised machine learning and probabilistic mathematics, new "immune system" technologies are capable of learning the "self" of an organization.

Rules and signatures are not keeping pace with today's rapidly evolving cyber-attacks, and the enterprise immune system represents a fundamental step-change in automated cyberdefense.

This session reviews:

  • How new machine learning and mathematics are automating advanced cyber defense;
  • Why 100 percent network visibility businesses to detect threats in real-time; and
  • How smart prioritization and visualization of threats allows for better resource allocation and lower risk.

11:25 am - 11:55 am Fraud Track

Synchronized Security for Effectively Combating Advanced Threats

Speaker:
Ashish Sud, Head, Western Region, Sophos

Point products can stop individual elements of an attack, but they can't protect your data, devices and network from sophisticated, coordinated cyber-attacks. Additionally, overstretched IT departments struggle to respond to attacks fast enough. This is where so-called "synchronized security" can enable defenses to be as coordinated as the attacks they protect against, by automating threat discovery, analysis and response.

This session reviews:

  • The need for eliminating silos;
  • How threat discovery, analysis and response can synchronize security; and
  • Where automation can help in the exchange of threat information.

11:55 am -
12:10 pm
11:55 am - 12:10 pm

Exhibit & Networking Break

12:10 pm -
12:50 pm
12:10 pm - 12:50 pm

Data Security Strategy in the Aftermath of WannaCry: Preventing the Next Big Ransomware Epidemic

Speakers:
Ankur Kushalka, CISO, Worldline Merchant Services
Ashutosh Jain, CISO, Axis Bank
Cdr. Mukesh Saini, Fmr National Information Security Coordinator, Government of India
Geetha Nandikotkur, Managing Editor, Asia & the Middle East, ISMG
Vishal Salvi, Senior Vice President and CISO, Infosys

In the wake of ransomware attacks such as WannaCry, what lessons must India learn? While WannaCry was not particularly sophisticated or stealthy, its impact was widespread. That's because of the techniques used to rapidly distribute the malware, as well as the failure of so many organizations to get security basics right.

Panelists discuss why CISOs must adopt a "wartime mindset" and lead the way to developing more effective security action plans. What are the best practices to adopt in the fight against ransomware? What kind of preventive measures are effective?

In this session, experts address:

  • How easy it is to become a victim, and what steps can be taken to mitigate this risk;
  • Engaging with law enforcement;
  • Proactively protecting systems against such attacks; and
  • Recovering from a ransomware strike.

12:50 pm -
1:35 pm
12:50 pm - 1:35 pm

InfoSec Conversations/Speed Networking

One of the most valuable ways to learn is through interaction with your peers. Our “Speed Networking” session will provide an opportunity to meet practitioners who have similar challenges in the areas of fraud and breach prevention, and discuss solutions to potential obstacles. Mingle, share and learn in this unique, rapid-fire and interactive environment.

1:35 pm -
2:30 pm
1:35 pm - 2:30 pm

Lunch

2:30 pm -
3:00 pm
2:30 pm - 3:00 pm

You've Been Breached: Legal Considerations in Building an Incidence Response Plan

Speaker:
Prashant Mali, President & Founder, Cyber Law Consulting (Attorneys & Advocates)

Too many organizations continue to address breach response from a reactive mode - having a crude disaster-recovery plan in place in case something "does" happen, rather than accepting that something "will" happen and proactively preparing for it. Once a security incident has occurred, the security incident response team is focused on identification, containment, eradication and recovery. In other words, they are trying to get operations back to normal. The preparation phase is the time to thoughtfully consider and research the legal decisions required during a security event. Legal considerations to include in the incidence response plan include the pertinent laws and regulations, what to do if prosecution is a possibility and maintaining advocate-client privilege.

It's critical to understand what well-prepared organizations are doing right when it comes to proactive interaction with law enforcement, information sharing and breach investigation and response.

The session will discuss:

  • Lessons learned from case law involving breached entities that have run afoul of the law;
  • Recommendations for a contextualized breach disclosure regime in India and the impact of GDPR;
  • Data breach prevention, readiness and response.

3:05 pm -
3:35 pm
3:05 pm - 3:35 pm

Evolving from Detective to Predictive Insider Threat Monitoring

Speaker:
Harshil Doshi, Security Strategist, Forcepoint

Human behavior is complex, and it's the weakest link in the cybersecurity chain. This session explores how using an amalgamation of technology based on behavioral analytics and risk modeling can help organizations change the ways they view, perceive and remediate insider risk before it becomes a threat or an attack. By using technology that understands the rhythm of the people and the flow of data, organizations can build baselines of behavior, detect outliers and sniff out indicators of risk based on artificial intelligence, machine learning and a host of other behavioral models.

This session reviews:

  • Understanding and adopting human behavior as a parameter for security controls;
  • Building a behavioral baseline using AI and machine learning; and
  • Applying risk-adaptive protections to insiders.

3:40 pm -
4:10 pm
3:40 pm - 4:10 pm Data Breach Track

NPCI's Proactive Approach to Securing Next-Generation UPI Cashless Infrastructure

Speaker:
Dr. N. Rajendran, CTO, National Payments Council of India

As many as 44 banks in India have migrated to the Unified Payments Interface to enable their customers to instantaneously transfer funds.

With the ease of funds transfers also comes increased security risk from the digital infrastructure and the associated integration challenges across core banking technologies of different banks.

This session looks at how proactive security and fraud management is built into UPI's architecture and the preventive controls it uses. It addresses:

  • The real story of how UPI is secured and how it can ensure seamless, secure transactions in the digital economy;
  • The use of multifactor authentication for a secure transaction at the back end; and
  • The concept of the virtual payment address as a unified identifying factor.
3:40 pm - 4:10 pm Fraud Track

Growing Cybercrime: Assessing Preparedness of Law Enforcement

Speaker:
Brijesh Singh, Inspector General of Police-Training, Govt. of Maharashtra

The Union Home Ministry acknowledges that India is increasingly susceptible to international cyberattacks, and the increasing move toward digitization means that security experts in law enforcement need to become adept at investigation, detecting and thwarting cybercriminal activities. While most countries have been successful in protecting the physical space by establishing credible deterrence to thwart crime, it's been a challenge to ensure cybercriminals are identified and prosecuted.

It's getting much more difficult to identify or locate criminal use of the internet because of its inherent anonymity and the use of sophisticated encryption techniques. Additionally, many crimes today have a digital evidence component, which means the integrity of the digital evidence must be protected. Against this backdrop, how do we ensure that all stakeholders collaborate and respond collectively to enable law enforcement to tackle cybercrime effectively?

This session addresses:

  • How law enforcement is empowered to tackle new-age crimes and cybercrimes;
  • The training and capacity-building of law enforcement; and
  • Learning the art of responding to cybercrime through innovation.

4:10 pm -
4:25 pm
4:10 pm - 4:25 pm

Exhibit & Networking Break

4:25 pm -
4:55 pm
4:25 pm - 4:55 pm

Security Challenges in a Cashless Economy: A Practitioner's View

Speaker:
Y.V. Ramana Murthy, GM & Group CISO, State Bank of India

The e-commerce and digital payments industry in India is evolving. The next generation focuses on futuristic solutions like hyper-local commerce, innovative mobile platforms and an omnichannel experience. Banks have been witnessing increasing customer interaction through the mobile channel, and the inclusion of UPI this year in Indian banking platforms has boosted this trend. Beyond the demonetization move by the government of India, there has been an increased impetus to move to digital transaction models and a cashless economy.

There is an imminent need, therefore, to look at the security robustness of the cashless payments infrastructure and the potential for fraud, even as adoption increases. New authentication strategies and robust frameworks for securing new digital payments innovation are proving necessary. From a CISO's point of view, it is critical to identify the weaknesses in the system and the potential risk for adopters.

This session outlines:

  • A practitioner's view on the security of the changing digital/cashless payments landscape
  • Understanding the emerging risks from new platforms and their liabilities
  • Future authentication and risk strategies

5:00 pm -
5:40 pm
5:00 pm - 5:40 pm

The Equifax Breach and What It Could Mean to India

Speakers:
K. K. Mookhey, Founder & CEO, NII Consulting
Krishna Sastry Pendyala, Exec. Dir., Cyber Security Incident Response & Digital Forensic Service, PwC
Ravikiran Avvaru, Head-IT & Security, APAC, ME & Africa, Apollo Tyres
Shivkumar Pandey, CISO, Bombay Stock Exchange LTD

Equifax, the credit reporting bureau, recently revealed that hackers had stolen the data of 145.5 million Americans, as well as millions in the U.K. and some in Canada.

Like many high-profile breaches, the Equifax breach was caused by a failure to update software components that were known to be vulnerable.

Protecting systems is one thing, but how can data be truly protected so we won't see another massive breach? What are the lessons Indian organizations need to learn from this breach?

The panel features discussions around such questions as:

  • What are the long-term implications of the Equifax breach in India?
  • Is complacency the enemy?
  • What are the key steps to complying with breach reporting?
  • Does one size fit all when it comes to breach prevention and response?

5:40 pm -
5:45 pm
5:40 pm - 5:45 pm

Closing Remarks

5:45 pm -
7:00 pm
5:45 pm - 7:00 pm

Refreshments and Networking

View Schedule
  • Hall A
  • Hall B
  • Hall C
  • Hall D
8:30 am -
9:15 am
8:30 am - 9:15 am

Registration, Breakfast, & Networking

9:15 am -
9:30 am
9:15 am - 9:30 am

Opening Remarks

9:30 am -
10:10 am
9:30 am - 10:10 am

Building India's Cybersecurity Skill Index: A Public-Private Partnership

Speaker:
Sobins Kuriakose, Head - State Governments & Citizen Engagement, National Skill Development Corporation

National Skill Development Corporation of India, under the aegis of Ministry of Skill Development and Entrepreneurship, has taken a multistakeholder, public-private partnership approach to building cybersecurity skills with a target of building capacity of 1.2 million cybersecurity professionals in the country. The shortage of skills across security functions is the biggest hurdle in responding to evolving threats, which makes Indian organizations in all sectors vulnerable.

To help meet this challenge, NSDC is creating national occupational standards certification. Some of the areas of focus include creating experts in IAM, application security, endpoint security, network and penetration testing, forensics, security infrastructure, SOC, compliance and audits.

This session discusses:

  • Various models for skill development with public and private collaboration;
  • Training methods and technology platforms to stay relevant; and
  • Building in-house cybersecurity skills to fight evolving threats.

10:15 am -
10:45 am
10:15 am - 10:45 am

Intelligence First: Role Of Cyberthreat Intelligence in Security Programs

Speaker:
Vivek Chudgar, Senior Director, Mandiant Consulting, FireEye

Cyberthreat intelligence is a key cyber-risk management enabler, providing context necessary to inform decisions and action across the business. Whether related to incident response, monitoring and detection, or governance and policy making, well-structured cyberthreat-intelligence functions serve stakeholders across the business. They ensure that knowledge of current and anticipated relevant threats is provided in relevant formats. This presentation discusses the role intelligence programs play and steps organizations can take to transform security operations to be intelligence-led.

This session reviews:

  • How cyberthreat intelligence can provide the necessary context to inform security decisions across an enterprise;
  • How businesses can transform their security operations to be intelligence-led; and
  • What needs to be done to infuse threat intelligence capabilities across the organization.

10:45 am -
11:00 am
10:45 am - 11:00 am

Exhibit and Networking Break

11:05 am -
11:35 am
11:05 am - 11:35 am Data Breach Track

A Practitioner's Approach to an Effective Patch Management Framework

Speaker:
Japjit Singh Sandhu, General Manager, Security and Continuity, Bharti Airtel Ltd.

The global WannaCry ransomware epidemic reveals the dangers of poor patching hygiene. Why are so many organizations so slow to patch? Security teams and CISOs may want to patch immediately, but many business owners demand patches be thoroughly tested to avoid any potential business downtime, leading to weeks of testing and compliance clearances. As a result, some patches are never made.

Another important issue is the use of unlicensed software, which means the users never receive security updates.

What are the patch management best practices that CISOs need to follow? This session provides insights on a robust patch management strategy including:

  • Rewriting the rules of patch management;
  • Addressing patch management concerns; and
  • Fixing bugs through patches.
11:05 am - 11:35 am Fraud Track

Inside the Investigator's Notebook: The Role of Digital Forensics in Cyber Investigations

Speaker:
Balsing Rajput, Superintendent of Police, Cyber Division, Maharashtra Police

Modern cybercrime investigations have become challenging and time-consuming for law enforcement officials - not just to attribute the crimes, but to understand how they were conducted and how the evidence may be presented in court. Without the right technology tools, it's difficult for an investigator to identify, acquire, collect or process digital evidence in a legally acceptable manner.

In this session, a Maharashtra Police official proposes an investigative approach using digital forensics and data analytics methodologies for effectively managing the latest cyber investigations and for helping in real-time/early detection of fraud.

This session addresses:

  • Challenges faced in collecting digital evidence;
  • Contemporary tools and techniques used in fraud investigations; and
  • Regional case studies drawn from actual police investigations.

11:40 am -
12:10 pm
11:40 am - 12:10 pm Data Breach Track

Effective Ways to Operate a Breach Response Unit

Speaker:
Venkatesh Subramaniam, Global CISO & Privacy Head, Olam International, Singapore

Most organizations in Asia continue to address breach response in a reactive mode - having a crude disaster-recovery plan in place in case something "does" happen, rather than accepting that something "will" happen and proactively preparing for it.

Once breached, the post-breach investigation and response is most critical, followed by building resilient defenses. Given the technological advancement and the technology sprawl, security practitioners are in a state of chaos. Against this backdrop, what do organizations need to know about incident response?

The session addresses:

  • Enhancing forensic capabilities in detecting breaches;
  • Sizing up why it's important to have a specialist response once an attack/breach is discovered;
  • Determining whether incident response should outsourced or led by the security team; and
  • Investigating security incidents and assessing compromise levels.

11:40 am - 12:10 pm Fraud Track

Is Detection a Myth? An Effective Approach to Threat Hunting

Speaker:
Anuj Tewari, CISO, HCL Technologies

A majority of security professionals believe that incident response is more difficult than it was a couple of years ago. The idea of early detection through threat feeds is becoming a myth. Resources and security controls deployed for early detection are turning out to be futile when it comes to dealing with today's emerging threats. This session details an effective approach to threat hunting, which includes response to advanced attacks. Threat hunting is emerging as a new line of defense, and is the latest innovation for security operation centers when it comes to combating advanced security threats.

In addition to detailing effective threat-hunting approaches, this session also reviews:

  • Marrying threat hunting and incident response; and
  • Actionable takeaways about how human intelligence can be used to proactively identify and mitigate threats more readily and reliably.
12:15 pm -
12:45 pm
12:15 pm - 12:45 pm

Preventing Fraud and Enabling Frictionless Authentication with Shared Intelligence

Speaker:
Cameron Church, Director, Solutions Consulting, ThreatMetrix

This session highlights how shared intelligence can help achieve frictionless authentication and trust by using global financial institutions, e-commerce players and other organizations as examples. Those businesses employ the power of digital-identity intelligence - equipped with intelligence from billions of transactions, embedded machine learning, and powerful decision platforms - to achieve frictionless authentication.

This session reviews:

  • The what and how of frictionless authentication;
  • The need and relevance of global intelligence sharing; and
  • How machine learning helps gather intelligence from billions of transactions.

12:45 pm -
1:45 pm
12:45 pm - 1:45 pm

Lunch

1:45 pm -
2:15 pm
1:45 pm - 2:15 pm

Panel: GDPR: The Impact on India's Changing Privacy Landscape

Speakers:
Anuj Tewari, CISO, HCL Technologies
Shivangi Nadkarni, Co-Founder & CEO, Arrka Consulting
Venkatesh Subramaniam, Global CISO & Privacy Head, Olam International, Singapore
Vicky Shah, Advocate, Data Privacy Professional

Moderator:
Geetha Nandikotkur, ISMG

How does the EU's General Data Protection Regulation impact Indian organizations? What are some challenges related to compliance with GDPR, and what is expected of organizations in the case of a data breach? How will GDPR influence business imperatives, given the hefty fines the EU could impose for violations? More importantly, what do Indian practitioners stand to learn from the changes taking place in the privacy landscape worldwide?

In this session, a panel of information security, cyber law and privacy experts addresses:

  • How GDPR will impact Indian organizations;
  • What practitioners need to keep in mind with respect to GDPR compliance;
  • Which control frameworks and standards for managing data privacy are relevant in India; and
  • What lessons GDPR can provide for creating a practical privacy framework for India.

2:20 pm -
2:50 pm
2:20 pm - 2:50 pm

Achieving Frictionless Security and Reduced Fraud through a Unified Defense-in-Depth Architecture

Speaker:
Robert Levine, COO, Uniken

In today's threat landscape, securing the business against an ever-expanding and evolving set of attack vectors across all your channels - mobile, web, call center, chat or kiosk - is a big challenge. To accomplish greater security, organizations need to move away from perimeter-centric, network- and IP-focused security models to models that are both comprehensive and dynamic, focused on securing the entire path, from the user to the app, device and/or network, all the way to the service.

This session reviews:

  • The specific attack vectors that drive all major fraud and breaches;
  • How unified defense-in-depth combines various protections in a single, seamless security solution; and
  • An effective strategy that allows businesses to increase security without hindering the customer experience.
  • 2:55 pm -
    3:35 pm
    2:55 pm - 3:35 pm

    Panel: Strategic Outlook for Indian Cybersecurity in 2018

    Speakers:
    Mannan Godil, CISO, Edelweiss
    S.V. Sunder Krishnan, Chief Risk Officer, Reliance Life Insurance
    Sameer Ratolikar, CISO, HDFC Bank
    Shivakumar Sriraman, Chief Risk Officer-India & South Asia, VISA

    Sameer Ratolikar, CISO, HDFC Bank, moderates this panel discussing how, as 2017 draws to a close, cyber risks are increasingly being acknowledged by the government as well as the private sector. It has come to be widely recognized that in future wars, countries could be crippled by cyberattacks against critical infrastructure.

    It's time enterprises devised a comprehensive cybersecurity policy and spell out practical new ways to address evolving cybersecurity challenges. This panel of Indian security leaders discusses how Indian practitioners need to approach cybersecurity strategy and investments in 2018 in the context of business, IT and regulatory trends. It also addresses security imperatives from a national/policy level as well as individual organizational approaches.

    Here, panelists discuss:

    • Where is the ecosystem heading and how can practitioners across the spectrum prepare themselves?
    • What were the major trends on the national and global landscape in 2017?
    • What are the new strategic directions for 2018 and the trends to watch out for?

    3:35 pm -
    3:45 pm
    3:35 pm - 3:45 pm

    Closing Remarks

    View Schedule

    SPONSORS / This Summit's Sponsorships

    CyberFrat
    Darktrace
    FireEye
    IBM
    ISACA Pune Chapter
    RSA
    Sophos
    Tata Communications
    ThreatMetrix
    Uniken
    (ISC)² Delhi Chapter

    LOCATION / Venue & Address

    Hotel Sahara Star

    Opp Domestic Airport
    Mumbai 400099

    Visit Venue Website

    Location TBA

    Register Now

    Register Today

    To earn CPE credits, hear from industry influencers, join ISMG’s global community and meet with leaders of technology register today.

    Register Now

    Registering For a Group?
    Call + 1 (609)-356-1499  or email at events@ismg.io

    Contact Us

    Reach us: Reserve your attendance today to ensure you don’t miss the opportunity to meet, network and learn from the foremost experts in information security and risk management in this interactive environment.

    +1 (609) 356-1499
    events@ismg.io

    Join the Community

    Subscribe to get the latest happenings on our Roundtables, Summits, and other Events!

      • BankInfoSecurity
      • CUInfoSecurity
      • GovInfoSecurity
      • HealthcareInfoSecurity
      • InfoRiskToday
      • CareersInfoSecurity
      • DataBreachToday
      • CyberEd
      Home | Summits | Press Releases | Sponsorship
      © 2021 Information Security Media Group, Corp. |
      Privacy & GDPR Statement | CCPA: Do Not Sell My Personal Data