
8:30 am - 9:00 am

Registration & Exhibit Browsing

Managing Editor, Asia & the Middle East, ISMG
ISMG’s Global Summit Series will take place across multiple continents, focusing on global security topics such as fraud and breach prevention, zero trust security, connected devices and on many key industry verticals such as finance, government, retail, energy and healthcare.
All content will be driven by our global editorial team from publications such as DataBreachtoday, BankInfoSecurity, GovInfoSecurity and HealthcareInfoSecurity, as well as our newest sites dedicated to Payments Security, Device Security and Fraud. These events will provide the opportunity to learn from industry influencers, earn CPE credits, meet with leading technology providers and be a part of the ISMG community of over 900,000 subscribers.
23 and 24 March 2021 at 8:30 am IST
Speaker:
Lt. Gen (Retd) Rajesh Pant, National Cybersecurity Coordinator-PMO
COVID-19 has resulted in increased digitization across sectors, with the enterprise cybersecurity leaders suddenly finding themselves tasked with securing a new hybrid workforce and defending their largest-ever attack surface. The trend has led to data proliferation, and organizations struggle to handle the sheer volume of data in this new regime. What are the threats to watch and technologies to embrace during the pandemic and beyond, particularly when the abundance of valuable information has captured subversive elements' attention? At the same time, cybercriminals have breached networks and compromised millions of records, not only causing revenue losses but impacting brand reputation?
Enterprises consider 2020 to be the decade of digital trust as the country's top leadership emphasizes cybersecurity to have a tremendous impact on the nation's society and economics.
This exclusive keynote session describes:
Speaker:
Randy Trzeciak, Director, CERT Insider Threat Center, CMU
A remote workforce. Economic stress. Pandemic fatigue. These ingredients create a "perfect storm" for insider risk, whether through malicious acts or accident. What can you do to improve monitoring and mitigation of insider risk in these unique conditions?
The exclusive session details:
Speaker:
Justice B.N. Srikrishna, Former Judge, Supreme Court of India, and Chairman of the Data Protection Committee
COVID-19 poses various data protection and privacy challenges in the region, for instance, regarding cost-related issues of ensuring personal data security and the hiring privacy professionals during the economic crisis. It's time to discuss how enterprises are impacted by the proposed personal data protection and privacy regulations in the current distributed era.
There is a need for enterprises to understand the country's specific operating requirements, with the enactment of data protection law in the region, whether there are established data protection laws and what standards of data protection should be applied.
The session discusses:
Speakers:
Nick Itta, VP APAC, Efficient IPVernon Co, Senior PreSales Consultant APAC, EfficientIP
For 'zero trust' to be effective, controlling which devices can access which apps and domains is vital. However, applying an authentication mechanism or blacklisting domains for all devices leaves the door open to malware.
Intelligent control requires filtering at the client level (microsegmentation), which is complex to set up and manage using firewalls but can be simpler using DNS services.
This session will discuss:
Speaker:
Apurva Jain, Commercial Team Lead, Darktrace
The future of work remains unpredictable. More than ever before, business leaders need to stay confident that their operations can continue securely in the face of regional or even global crises. While sections of the economy remain more uncertain and fragile than ever, cyber-attackers are ramping up their campaigns. Organizations must rethink their security approach and rely on new technologies like AI to achieve much-needed adaptability and resilience.
The session discusses:
Speakers:
Brijesh Miglani, Team Lead Sales Engineering, ForcepointNick Savvides, Senior Director of Strategic Business, APAC, Forcepoint
In a fireside chat, Nick Savvides, Senior Director of Strategic Business, APAC and Brijesh Miglani, Team Lead Sales Engineering, Forcepoint will discuss how enterprises are using data science to move from a reactive to predictive security approach.
Speaker:
Sujit Christy, Group CISO, John Keells Holdings
COVID 19 has thrown up multiple challenges for security practitioners. With most employees working at home during the COVID-19 pandemic, it's more important than ever for businesses to ensure that their third-party providers have adequate business continuity plans to provide uninterrupted service.
It's critical to ask and revalidate if our suppliers' business continuity plan is adequate to sustain our operations and understand our stated objectives.
We typically think of supply chain attacks as stealthy attacks on hardware components, such as malware on laptops and network devices. Still, the supply chain attack was an attack on a service provider cannot be ruled out.
This session will discuss:
Speaker:
Vipin Surelia, Head of Risk Services, India and South Asia, Visa
Organizations in India need to ramp up their authentication efforts in light of a 60% increase in cashless transactions since the start of the COVID-19 pandemic, which has led to increases in attempted fraud.
The big challenge or threat in the current work-from-home environment is that hackers use phishing and other social engineering methods to trick users into providing confidential data, such as credit card numbers, social security numbers, account numbers, or passwords.
The session discusses:
Speaker:
Tamim Ahmed, Risk Analyst National CERT & BGD e-GOV CIRT Bangladesh
The region's critical infrastructure sector has been the target for several high-pressure APT attacks, credential-stealing malware attacks, social engineering attacks, cyber espionage, and other cyber-attacks. These attacks mostly target the government, energy, oil sector and aviation primarily aimed at data filtration.
Since the COVID-19 has thrown up enormous challenges at enterprises to move beyond the traditional castle and moat security model, they need to find new ways to build a defense-in-depth model with a multi-layered process.
The session discusses:
Speaker:
Alain Sanchez, Office of the CISO, Senior Evangelist, Fortinet
As enterprises are 100% supporting the remote workplace and going through the digital transformation journey, the need to maintain the entire network's visibility and recognize the patterns of the flow of information seems a mus. They seem to be opting for Sofware Defined Wide Areas Network to address their needs. CISOs are leveraging this to fully integrate SD-WAN features with legacy infrastructure to ensure remote access security. Incidentally, unlike the traditional router-centric WAN architecture, they find the SD-WAN model to fully support applications hosted in on-premise data centers, public or private clouds, and SaaS services during this cloud-centric approach.
The session discusses:
Speaker:
Rajender Bedi, Technical Solution Specialist, Enterprise Endpoint and Security Products, Intel Corporation
Many businesses are implementing software security solutions. But as hackers get more sophisticated, threats are attacking the hardware layer. Hardware-based security features built-in to the hardware provide an important layer of protection for business devices, applications, and data. The Intel vPro® platform includes groundbreaking technologies that accelerate and scale security beyond software or human based approaches alone. It delivers hardware-enhanced security features designed to help protect the other layers of the computing stack. Intel® Hardware Shield available on the Intel vPro® platform provides enhanced protection features to help protect against below-the-OS attacks and safeguard apps and data. Intel® Hardware Shield also includes advanced threat detection that offloads routine security functions for lower user impact and continued productivity. Select the built for business platform that is right for you.
Speaker:
Lee Delson, Zscaler, Chief Architect, Asia Pacific & Japan
COVID-19 has increased threat landscape for enterprises. Ransomware, zero day attacks, phishing have become common, but enterprises are struggling to find a solution to deal effectively with these problems. Moreover, with cloud becoming an integral part of one's digital transformation journey, traditional security models followed by CISOs for years now do not necessarily work. Hence, CISOs have to rethink their security strategy. But, securing cloud is different from securing the traditional network. How can CISOs gear up for this change?.
The session discusses:
Nation-state attacks often have close links to the military intelligence or state control apparatus with a high degree of technical expertise. The region is fighting off an array of disruptive attacks that include advanced malware, sophisticated distributed denial-of-service attacks and nation-state actors targeting DNS protocols as part of ongoing espionage campaigns.
The region could be vulnerable to cyber espionage because its critical infrastructure is becoming increasingly dependent on automated data processing and vast computer networks, making it vulnerable to such information warfare techniques. Are enterprises well-equipped to mitigate the risk of nation-state actors that have a 'license to hack"?
The session discusses:
Speaker:
Rajesh Thapar, Group CISO, OakNorth
Some experts say an identity and access management strategy for a hybrid cloud environment should include single sign-on and multifactor authentication.
With the widespread of COVID-19, enterprises are leveraging the edge computing model, recommended by Garter, to build an integrated platform for applying IAM for the hybrid cloud.
As the task of managing today's hybrid work environment gets challenging, enterprises need to connect its users to the right technology at the right time, in a secure way.
The session discusses:
Speakers:
Ashutosh Jain, CISO, Axis BankRavinder Pal Singh, Chief Information & Innovation Officer, Tata Singapore Airlines (Air Vistara)
Are security leaders creating value for business and part of technology innovation?: Is the CTO function aligned with security in driving innovation? Meeting the Expectations. Where is the Disconnect?
Speaker:
Ravindra Baviskar, Director - Sales Engineering (India & SAARC), Sophos
Ransomware is the fastest-growing cybersecurity threat, and it is becoming increasingly difficult for enterprises to rebound from such attacks. We have witnessed high profile organizations becoming the victim of these attacks and hitting the headlines. Security teams must be the hacker if you have to beat the hacker and understand the risks posed by these attacks.
The challenge CISOs face is to understand the trade-offs of different AppSec tools and which tools are best suited for DeveSecOps and which are not.
The session discusses:
Speaker:
Rajan Pant, Founder, IT-SERT of Nepal and CIO, CG Corp Global
While organizations invest a lot on getting data, more often than not they are not able to utilize the data intelligently. With enterprises, including large ones, facing increasing attacks, threat intelligence can go a long way in utilizing evidence-based knowledge to find out the risk of the system.
The session discusses:
Speaker:
Matthew Burns, Director, BigFix, Asia Pacific and Japan, HCL Software
In today's unprecedented work-from-home environment, IT organizations are challenged with supporting corporate and BYOD devices.
The security teams have a considerable task of simplifying device enrollment and set up, deploying business and security applications, providing remote support, enforcing patching of at-home machines, and enforcing corporate IT policies.
The session discusses:
These cybersecurity threats are amplified by the ongoing pandemic in the region--increasing phishing attacks, targeted attacks, disruption, distortion, and deterioration. The emergence of technologies such as IoT, skill shortage, insider threats, and cloud movement has posed the most significant risks.
A panel of experts discuss:
Speaker:
Lt. Gen (Retd) Rajesh Pant, National Cybersecurity Coordinator-PMO
COVID-19 has resulted in increased digitization across sectors, with the enterprise cybersecurity leaders suddenly finding themselves tasked with securing a new hybrid workforce and defending their largest-ever attack surface. The trend has led to data proliferation, and organizations struggle to handle the sheer volume of data in this new regime. What are the threats to watch and technologies to embrace during the pandemic and beyond, particularly when the abundance of valuable information has captured subversive elements' attention? At the same time, cybercriminals have breached networks and compromised millions of records, not only causing revenue losses but impacting brand reputation?
Enterprises consider 2020 to be the decade of digital trust as the country's top leadership emphasizes cybersecurity to have a tremendous impact on the nation's society and economics.
This exclusive keynote session describes:
Speaker:
Randy Trzeciak, Director, CERT Insider Threat Center, CMU
A remote workforce. Economic stress. Pandemic fatigue. These ingredients create a "perfect storm" for insider risk, whether through malicious acts or accident. What can you do to improve monitoring and mitigation of insider risk in these unique conditions?
The exclusive session details:
Speaker:
Justice B.N. Srikrishna, Former Judge, Supreme Court of India, and Chairman of the Data Protection Committee
COVID-19 poses various data protection and privacy challenges in the region, for instance, regarding cost-related issues of ensuring personal data security and the hiring privacy professionals during the economic crisis. It's time to discuss how enterprises are impacted by the proposed personal data protection and privacy regulations in the current distributed era.
There is a need for enterprises to understand the country's specific operating requirements, with the enactment of data protection law in the region, whether there are established data protection laws and what standards of data protection should be applied.
The session discusses:
Speakers:
Nick Itta, VP APAC, Efficient IPVernon Co, Senior PreSales Consultant APAC, EfficientIP
For 'zero trust' to be effective, controlling which devices can access which apps and domains is vital. However, applying an authentication mechanism or blacklisting domains for all devices leaves the door open to malware.
Intelligent control requires filtering at the client level (microsegmentation), which is complex to set up and manage using firewalls but can be simpler using DNS services.
This session will discuss:
Speaker:
Apurva Jain, Commercial Team Lead, Darktrace
The future of work remains unpredictable. More than ever before, business leaders need to stay confident that their operations can continue securely in the face of regional or even global crises. While sections of the economy remain more uncertain and fragile than ever, cyber-attackers are ramping up their campaigns. Organizations must rethink their security approach and rely on new technologies like AI to achieve much-needed adaptability and resilience.
The session discusses:
Speakers:
Brijesh Miglani, Team Lead Sales Engineering, ForcepointNick Savvides, Senior Director of Strategic Business, APAC, Forcepoint
In a fireside chat, Nick Savvides, Senior Director of Strategic Business, APAC and Brijesh Miglani, Team Lead Sales Engineering, Forcepoint will discuss how enterprises are using data science to move from a reactive to predictive security approach.
Speaker:
Sujit Christy, Group CISO, John Keells Holdings
COVID 19 has thrown up multiple challenges for security practitioners. With most employees working at home during the COVID-19 pandemic, it's more important than ever for businesses to ensure that their third-party providers have adequate business continuity plans to provide uninterrupted service.
It's critical to ask and revalidate if our suppliers' business continuity plan is adequate to sustain our operations and understand our stated objectives.
We typically think of supply chain attacks as stealthy attacks on hardware components, such as malware on laptops and network devices. Still, the supply chain attack was an attack on a service provider cannot be ruled out.
This session will discuss:
Speaker:
Vipin Surelia, Head of Risk Services, India and South Asia, Visa
Organizations in India need to ramp up their authentication efforts in light of a 60% increase in cashless transactions since the start of the COVID-19 pandemic, which has led to increases in attempted fraud.
The big challenge or threat in the current work-from-home environment is that hackers use phishing and other social engineering methods to trick users into providing confidential data, such as credit card numbers, social security numbers, account numbers, or passwords.
The session discusses:
Speaker:
Tamim Ahmed, Risk Analyst National CERT & BGD e-GOV CIRT Bangladesh
The region's critical infrastructure sector has been the target for several high-pressure APT attacks, credential-stealing malware attacks, social engineering attacks, cyber espionage, and other cyber-attacks. These attacks mostly target the government, energy, oil sector and aviation primarily aimed at data filtration.
Since the COVID-19 has thrown up enormous challenges at enterprises to move beyond the traditional castle and moat security model, they need to find new ways to build a defense-in-depth model with a multi-layered process.
The session discusses:
Speaker:
Alain Sanchez, Office of the CISO, Senior Evangelist, Fortinet
As enterprises are 100% supporting the remote workplace and going through the digital transformation journey, the need to maintain the entire network's visibility and recognize the patterns of the flow of information seems a mus. They seem to be opting for Sofware Defined Wide Areas Network to address their needs. CISOs are leveraging this to fully integrate SD-WAN features with legacy infrastructure to ensure remote access security. Incidentally, unlike the traditional router-centric WAN architecture, they find the SD-WAN model to fully support applications hosted in on-premise data centers, public or private clouds, and SaaS services during this cloud-centric approach.
The session discusses:
Speaker:
Rajender Bedi, Technical Solution Specialist, Enterprise Endpoint and Security Products, Intel Corporation
Many businesses are implementing software security solutions. But as hackers get more sophisticated, threats are attacking the hardware layer. Hardware-based security features built-in to the hardware provide an important layer of protection for business devices, applications, and data. The Intel vPro® platform includes groundbreaking technologies that accelerate and scale security beyond software or human based approaches alone. It delivers hardware-enhanced security features designed to help protect the other layers of the computing stack. Intel® Hardware Shield available on the Intel vPro® platform provides enhanced protection features to help protect against below-the-OS attacks and safeguard apps and data. Intel® Hardware Shield also includes advanced threat detection that offloads routine security functions for lower user impact and continued productivity. Select the built for business platform that is right for you.
Speaker:
Lee Delson, Zscaler, Chief Architect, Asia Pacific & Japan
COVID-19 has increased threat landscape for enterprises. Ransomware, zero day attacks, phishing have become common, but enterprises are struggling to find a solution to deal effectively with these problems. Moreover, with cloud becoming an integral part of one's digital transformation journey, traditional security models followed by CISOs for years now do not necessarily work. Hence, CISOs have to rethink their security strategy. But, securing cloud is different from securing the traditional network. How can CISOs gear up for this change?.
The session discusses:
Nation-state attacks often have close links to the military intelligence or state control apparatus with a high degree of technical expertise. The region is fighting off an array of disruptive attacks that include advanced malware, sophisticated distributed denial-of-service attacks and nation-state actors targeting DNS protocols as part of ongoing espionage campaigns.
The region could be vulnerable to cyber espionage because its critical infrastructure is becoming increasingly dependent on automated data processing and vast computer networks, making it vulnerable to such information warfare techniques. Are enterprises well-equipped to mitigate the risk of nation-state actors that have a 'license to hack"?
The session discusses:
Speaker:
Rajesh Thapar, Group CISO, OakNorth
Some experts say an identity and access management strategy for a hybrid cloud environment should include single sign-on and multifactor authentication.
With the widespread of COVID-19, enterprises are leveraging the edge computing model, recommended by Garter, to build an integrated platform for applying IAM for the hybrid cloud.
As the task of managing today's hybrid work environment gets challenging, enterprises need to connect its users to the right technology at the right time, in a secure way.
The session discusses:
Speakers:
Ashutosh Jain, CISO, Axis BankRavinder Pal Singh, Chief Information & Innovation Officer, Tata Singapore Airlines (Air Vistara)
Are security leaders creating value for business and part of technology innovation?: Is the CTO function aligned with security in driving innovation? Meeting the Expectations. Where is the Disconnect?
Speaker:
Ravindra Baviskar, Director - Sales Engineering (India & SAARC), Sophos
Ransomware is the fastest-growing cybersecurity threat, and it is becoming increasingly difficult for enterprises to rebound from such attacks. We have witnessed high profile organizations becoming the victim of these attacks and hitting the headlines. Security teams must be the hacker if you have to beat the hacker and understand the risks posed by these attacks.
The challenge CISOs face is to understand the trade-offs of different AppSec tools and which tools are best suited for DeveSecOps and which are not.
The session discusses:
Speaker:
Rajan Pant, Founder, IT-SERT of Nepal and CIO, CG Corp Global
While organizations invest a lot on getting data, more often than not they are not able to utilize the data intelligently. With enterprises, including large ones, facing increasing attacks, threat intelligence can go a long way in utilizing evidence-based knowledge to find out the risk of the system.
The session discusses:
Speaker:
Matthew Burns, Director, BigFix, Asia Pacific and Japan, HCL Software
In today's unprecedented work-from-home environment, IT organizations are challenged with supporting corporate and BYOD devices.
The security teams have a considerable task of simplifying device enrollment and set up, deploying business and security applications, providing remote support, enforcing patching of at-home machines, and enforcing corporate IT policies.
The session discusses:
These cybersecurity threats are amplified by the ongoing pandemic in the region--increasing phishing attacks, targeted attacks, disruption, distortion, and deterioration. The emergence of technologies such as IoT, skill shortage, insider threats, and cloud movement has posed the most significant risks.
A panel of experts discuss:
View sessions, chat with speakers and technology experts in our Interactive Exhibit & Networking Experience, and browse our Resource Center to download educational assets to review post-summit.
If you miss any live sessions, feel free to log in and view on demand at your own pace. Session recordings will be available in our virtual environment after the agenda has ended.
ISMG Virtual Summit Attendee Guide
For more information please download our ISMG Virtual Summit Attendee Guide.
To earn CPE credits, hear from industry influencers, join ISMG’s global community and meet with leaders of technology register today.