ISMG Events
  • Summits
  • Roundtables
  • Faculty
  • About ISMG Events
  • Contact us

Virtual Cybersecurity Summit: India & SAARC

March 23-24, 2021

Register Now

WELCOME / Summit Overview

Geetha Nandikotkur

Managing Editor, Asia & the Middle East, ISMG

ISMG’s Global Summit Series will take place across multiple continents, focusing on global security topics such as fraud and breach prevention, zero trust security, connected devices and on many key industry verticals such as finance, government, retail, energy and healthcare.

All content will be driven by our global editorial team from publications such as DataBreachtoday, BankInfoSecurity, GovInfoSecurity and HealthcareInfoSecurity, as well as our newest sites dedicated to Payments Security, Device Security and Fraud. These events will provide the opportunity to learn from industry influencers, earn CPE credits, meet with leading technology providers and be a part of the ISMG community of over 900,000 subscribers.

Details

Free Registration

23 and 24 March 2021 at 8:30 am IST

Register Now
For queries, contact:
email at priti.dutta@ismg-summits.com / mahesh.verma@ismg-summits.com

Speakers Associated with ISMG

  • Event Gallery

Justice BN Srikrishna

Former Judge, Supreme Court of India

Brijesh Singh

Inspector General of Police-Training, Govt. of Maharashtra

Loknath Behera

State Police Chief and Director General of Police, Kerala State

Sameer Ratolikar

CISO, HDFC Bank

Ashutosh Jain

CISO, Axis Bank

Bharat Panchal

Chief Risk Officer - India, Middle East and Africa, FIS

Amit Sharma

Director & Advisor (Cyber), Ministry of Defence, GoI

Sridhar Sidhu

EVP-Enterprise Information Security, Wells Fargo

PAST FEATURED SPEAKERS

Tamim Ahmed

Risk Analyst National CERT & BGD e-GOV CIRT Bangladesh

Ravindra Baviskar

Director - Sales Engineering (India & SAARC), Sophos

Rajender Bedi

Technical Solution Specialist, Enterprise Endpoint and Security Products, Intel Corporation

Kiran Belsekar

Vice President- Information Security, Aegon Life

Matthew Burns

Director, BigFix, Asia Pacific and Japan, HCL Software

Ninad Chavan

CISO, Edelweiss GIC

Vernon Co

Senior PreSales Consultant APAC, EfficientIP

Lee Delson

Zscaler, Chief Architect, Asia Pacific & Japan

Nick Itta

VP APAC, Efficient IP

Apurva Jain

Commercial Team Lead, Darktrace

Ashutosh Jain

CISO, Axis Bank

Brijesh Miglani

Team Lead Sales Engineering, Forcepoint

Lt. Gen (Retd) Rajesh Pant

National Cybersecurity Coordinator-PMO, GoI

Rajan Pant

Founder, IT-SERT of Nepal and CIO, CG Corp Global

Jayesh Ranjan IAS

Principal Secretary, Information Technology, Electronics and Communications Department, Government of Telangana

Alain Sanchez

Office of the CISO, Senior Evangelist, Fortinet

Nick Savvides

Senior Director of Strategic Business, APAC, Forcepoint

Ravinder Pal Singh

Chief Information & Innovation Officer, Tata Singapore Airlines (Air Vistara)

Justice B.N. Srikrishna

Former Judge, Supreme Court of India, and Chairman of the Data Protection Committee

Nirupam Srivastava

VP Strategy, M&A, AI/Digital Transformation, Hero Corporate Service

Vipin Surelia

Head of Risk Services, India and South Asia, Visa

Rajesh Thapar

Group CISO, OakNorth

Randy Trzeciak

Director, CERT Insider Threat Center, CMU

Draft Agenda / Session Date & Time



  • Tuesday, March 23rd

  • Wednesday, March 24th

  • Hall A
  • Hall B
  • Hall C
  • Hall D
8:30 am -
9:00 am
8:30 am - 9:00 am

Registration & Exhibit Browsing

9:00 am -
9:15 am
9:00 am - 9:15 am

Opening Remarks

9:15 am -
9:45 am
9:15 am - 9:45 am

Changing Threat Landscape: New Security Strategies

Speaker:
Lt. Gen (Retd) Rajesh Pant, National Cybersecurity Coordinator-PMO

COVID-19 has resulted in increased digitization across sectors, with the enterprise cybersecurity leaders suddenly finding themselves tasked with securing a new hybrid workforce and defending their largest-ever attack surface. The trend has led to data proliferation, and organizations struggle to handle the sheer volume of data in this new regime. What are the threats to watch and technologies to embrace during the pandemic and beyond, particularly when the abundance of valuable information has captured subversive elements' attention? At the same time, cybercriminals have breached networks and compromised millions of records, not only causing revenue losses but impacting brand reputation?

Enterprises consider 2020 to be the decade of digital trust as the country's top leadership emphasizes cybersecurity to have a tremendous impact on the nation's society and economics.

This exclusive keynote session describes:

  • Changing threat landscape and lessons from the pandemic;
  • Key priorities for 2021
9:45 am -
10:30 am
9:45 am - 10:30 am

Plenary Session: Insider Threat: How to Mitigate the Heightened Risk

Speaker:
Randy Trzeciak, Director, CERT Insider Threat Center, CMU

A remote workforce. Economic stress. Pandemic fatigue. These ingredients create a "perfect storm" for insider risk, whether through malicious acts or accident. What can you do to improve monitoring and mitigation of insider risk in these unique conditions?

The exclusive session details:

  • The latest research on insider incidents
  • Unique risks created within today's remote workforce
  • How to mitigate the risks posed by malicious and unintentional insider threats
10:30 am -
10:45 am
10:30 am - 10:45 am

Data Protection and Privacy Regulations: Where are we in this Journey?

Speaker:
Justice B.N. Srikrishna, Former Judge, Supreme Court of India, and Chairman of the Data Protection Committee

COVID-19 poses various data protection and privacy challenges in the region, for instance, regarding cost-related issues of ensuring personal data security and the hiring privacy professionals during the economic crisis. It's time to discuss how enterprises are impacted by the proposed personal data protection and privacy regulations in the current distributed era.

There is a need for enterprises to understand the country's specific operating requirements, with the enactment of data protection law in the region, whether there are established data protection laws and what standards of data protection should be applied.

The session discusses:

  • Different aspects of data protection laws that impact businesses;
  • Accountability for enterprises in hiring data protection officers;
  • Data breach notification - challenges and implications.
10:45 am -
11:15 am
10:45 am - 11:15 am Track A

Effective Zero Trust: Enhancing App Access Control Using DNS

Speakers:
Nick Itta, VP APAC, Efficient IP
Vernon Co, Senior PreSales Consultant APAC, EfficientIP

For 'zero trust' to be effective, controlling which devices can access which apps and domains is vital. However, applying an authentication mechanism or blacklisting domains for all devices leaves the door open to malware.

Intelligent control requires filtering at the client level (microsegmentation), which is complex to set up and manage using firewalls but can be simpler using DNS services.

This session will discuss:

  • How DNS offers real-time analytics on client behavior due to it having near 100% application traffic visibility;
  • Why allowing specific users to access to selected apps adds granularity to policies applied;
  • Uses of client grouping, blacklisting, and whitelisting for improving access control and defeating insider threats.
10:45 am - 11:15 am Track B

Securing the Future of Work with Cyber AI

Speaker:
Apurva Jain, Commercial Team Lead, Darktrace

The future of work remains unpredictable. More than ever before, business leaders need to stay confident that their operations can continue securely in the face of regional or even global crises. While sections of the economy remain more uncertain and fragile than ever, cyber-attackers are ramping up their campaigns. Organizations must rethink their security approach and rely on new technologies like AI to achieve much-needed adaptability and resilience.

The session discusses:

  • How AI has adapted to new patterns of work;
  • Use of Cyber AI to protect the dynamic workforce;
  • Defensive Autonomous Response capabilities
10:45 am - 11:15 am Track C

Using Data Science & Human Behavior To Predict Security Shortcomings

Speakers:
Brijesh Miglani, Team Lead Sales Engineering, Forcepoint
Nick Savvides, Senior Director of Strategic Business, APAC, Forcepoint

In a fireside chat, Nick Savvides, Senior Director of Strategic Business, APAC and Brijesh Miglani, Team Lead Sales Engineering, Forcepoint will discuss how enterprises are using data science to move from a reactive to predictive security approach.

  • How machine learning is contributing to the use of data science in the era of digital transformation
  • How to re-define cybersecurity with human behaviour and psychology as part of predictive security?
  • How to prioritize observed risk in real-time to move left of breach ?
11:15 am -
11:30 am
11:15 am - 11:30 am

Expo Hall & Networking Break

11:30 am -
12:00 pm
11:30 am - 12:00 pm Track A

Rising Third-Party Supply Chain Risks During COVID: Risk Mitigation Plan

Speaker:
Sujit Christy, Group CISO, John Keells Holdings

COVID 19 has thrown up multiple challenges for security practitioners. With most employees working at home during the COVID-19 pandemic, it's more important than ever for businesses to ensure that their third-party providers have adequate business continuity plans to provide uninterrupted service.

It's critical to ask and revalidate if our suppliers' business continuity plan is adequate to sustain our operations and understand our stated objectives.

We typically think of supply chain attacks as stealthy attacks on hardware components, such as malware on laptops and network devices. Still, the supply chain attack was an attack on a service provider cannot be ruled out.

This session will discuss:

  • How should the risk framework of supply chain vendors evolve;
  • The risks posed by different kinds of vendors;
  • How to redesign SLAs with third parties
11:30 am - 12:00 pm Track B

Spike In Cashless Payments: Evolution in Payments Security in the Post-COVID Era

Speaker:
Vipin Surelia, Head of Risk Services, India and South Asia, Visa

Organizations in India need to ramp up their authentication efforts in light of a 60% increase in cashless transactions since the start of the COVID-19 pandemic, which has led to increases in attempted fraud.

The big challenge or threat in the current work-from-home environment is that hackers use phishing and other social engineering methods to trick users into providing confidential data, such as credit card numbers, social security numbers, account numbers, or passwords.

The session discusses:

  • Key security steps in light of the movement to digital transactions;
  • Using AI & ML to reduce risk using new algorithms to detect threats;
  • New forms of authentication methods to detect real-time risks.
11:30 am - 12:00 pm Track C

Risk Management Challenges for Critical Information Infrastructure in the Post COVID Era

Speaker:
Tamim Ahmed, Risk Analyst National CERT & BGD e-GOV CIRT Bangladesh

The region's critical infrastructure sector has been the target for several high-pressure APT attacks, credential-stealing malware attacks, social engineering attacks, cyber espionage, and other cyber-attacks. These attacks mostly target the government, energy, oil sector and aviation primarily aimed at data filtration.

Since the COVID-19 has thrown up enormous challenges at enterprises to move beyond the traditional castle and moat security model, they need to find new ways to build a defense-in-depth model with a multi-layered process.

The session discusses:

  • Major Changes in Threat Landscape;
  • Harnessing new process and technologies to protect critical infrastructure;
  • Assessing the security posture with predictive threat actions.
12:00 pm -
12:30 pm
12:00 pm - 12:30 pm Track A

Security Driven SDWAN: The Next Logical Evolution in Network Security

Speaker:
Alain Sanchez, Office of the CISO, Senior Evangelist, Fortinet

As enterprises are 100% supporting the remote workplace and going through the digital transformation journey, the need to maintain the entire network's visibility and recognize the patterns of the flow of information seems a mus. They seem to be opting for Sofware Defined Wide Areas Network to address their needs. CISOs are leveraging this to fully integrate SD-WAN features with legacy infrastructure to ensure remote access security. Incidentally, unlike the traditional router-centric WAN architecture, they find the SD-WAN model to fully support applications hosted in on-premise data centers, public or private clouds, and SaaS services during this cloud-centric approach.

The session discusses:

  • How SD-WAN helps to resolve security issues;
  • Use cases for integrating SD-WAN with other frameworks to ensure secure access;
  • How to deploy identity and authentication methods using SD-WAN.
12:00 pm - 12:30 pm Track B

Modernizing client PCs to cope with today's security challenges

Speaker:
Rajender Bedi, Technical Solution Specialist, Enterprise Endpoint and Security Products, Intel Corporation

Many businesses are implementing software security solutions. But as hackers get more sophisticated, threats are attacking the hardware layer. Hardware-based security features built-in to the hardware provide an important layer of protection for business devices, applications, and data. The Intel vPro® platform includes groundbreaking technologies that accelerate and scale security beyond software or human based approaches alone. It delivers hardware-enhanced security features designed to help protect the other layers of the computing stack. Intel® Hardware Shield available on the Intel vPro® platform provides enhanced protection features to help protect against below-the-OS attacks and safeguard apps and data. Intel® Hardware Shield also includes advanced threat detection that offloads routine security functions for lower user impact and continued productivity. Select the built for business platform that is right for you.

12:00 pm - 12:30 pm Track C

Reducing Risks from Unforeseen Threats

Speaker:
Lee Delson, Zscaler, Chief Architect, Asia Pacific & Japan

COVID-19 has increased threat landscape for enterprises. Ransomware, zero day attacks, phishing have become common, but enterprises are struggling to find a solution to deal effectively with these problems. Moreover, with cloud becoming an integral part of one's digital transformation journey, traditional security models followed by CISOs for years now do not necessarily work. Hence, CISOs have to rethink their security strategy. But, securing cloud is different from securing the traditional network. How can CISOs gear up for this change?.

The session discusses:

  • Challenges of stopping ransomware;
  • How CISOs can maintain consistent security on and off network;
  • How best to leverage machine learning for cloud security.
12:30 pm -
12:45 pm
12:30 pm - 12:45 pm

Networking break

12:45 pm -
1:15 pm
12:45 pm - 1:15 pm Track A

Fireside Chat: Nation-State Attacks: Are you the Next Target?

Moderator: Brijesh Singh, Inspector General of Police, Govt. of Maharashtra
Speaker: Jayesh Ranjan, Principal Secretary, Information Technology, Electronics and Communications Department, Government of Telangana

Nation-state attacks often have close links to the military intelligence or state control apparatus with a high degree of technical expertise. The region is fighting off an array of disruptive attacks that include advanced malware, sophisticated distributed denial-of-service attacks and nation-state actors targeting DNS protocols as part of ongoing espionage campaigns.

The region could be vulnerable to cyber espionage because its critical infrastructure is becoming increasingly dependent on automated data processing and vast computer networks, making it vulnerable to such information warfare techniques. Are enterprises well-equipped to mitigate the risk of nation-state actors that have a 'license to hack"?

The session discusses:

  • New techniques used by the nation-state actors to steal critical data information;
  • New cyber defense techniques/strategies the country has to adopt in tackling the nation-state threats;
  • Law enforcement challenges in tackling such attacks.
12:45 pm - 1:15 pm Track B

IAM for a Hybrid Cloud Environment: Building an Integrated Platform

Speaker:
Rajesh Thapar, Group CISO, OakNorth

Some experts say an identity and access management strategy for a hybrid cloud environment should include single sign-on and multifactor authentication.

With the widespread of COVID-19, enterprises are leveraging the edge computing model, recommended by Garter, to build an integrated platform for applying IAM for the hybrid cloud.

As the task of managing today's hybrid work environment gets challenging, enterprises need to connect its users to the right technology at the right time, in a secure way.

The session discusses:

  • Evolving an identity management solution;
  • Taking a risk-based authentication approach for a secure remote workforce;
  • Using a 'zero trust' model as part of the IAM strategy.
12:45 pm - 1:15 pm Track C

Two Way Street: A Dialogue Between a CISO and a CTO

Speakers:
Ashutosh Jain, CISO, Axis Bank
Ravinder Pal Singh, Chief Information & Innovation Officer, Tata Singapore Airlines (Air Vistara)

Are security leaders creating value for business and part of technology innovation?: Is the CTO function aligned with security in driving innovation? Meeting the Expectations. Where is the Disconnect?

1:15 pm -
1:30 pm
1:15 pm - 1:30 pm Track A

Tech Spotlight: Tackling Ransomware: Rising to the Challenge

Speaker:
Ravindra Baviskar, Director - Sales Engineering (India & SAARC), Sophos

Ransomware is the fastest-growing cybersecurity threat, and it is becoming increasingly difficult for enterprises to rebound from such attacks. We have witnessed high profile organizations becoming the victim of these attacks and hitting the headlines. Security teams must be the hacker if you have to beat the hacker and understand the risks posed by these attacks.

The challenge CISOs face is to understand the trade-offs of different AppSec tools and which tools are best suited for DeveSecOps and which are not.

The session discusses:

  • Understanding the ransomware attack kill chain;
  • How synchronized security will help thwart attacks on your endpoints and firewall;
  • Building an automated incident response mechanism to fight advanced threats.
1:15 pm - 1:30 pm Track B

Tech Spotlight: Making Threat Intelligence a Key Defense Strategy

Speaker:
Rajan Pant, Founder, IT-SERT of Nepal and CIO, CG Corp Global

While organizations invest a lot on getting data, more often than not they are not able to utilize the data intelligently. With enterprises, including large ones, facing increasing attacks, threat intelligence can go a long way in utilizing evidence-based knowledge to find out the risk of the system.

The session discusses:

  • How to set the right process for threat intelligence;
  • Understanding the early warning signals for threat detection;
  • Evolving a comprehensive digital risk monitoring strategy
1:15 pm - 1:30 pm Track C

Tech Spotlight: Supporting Work From Home During Unprecedented Times

Speaker:
Matthew Burns, Director, BigFix, Asia Pacific and Japan, HCL Software

In today's unprecedented work-from-home environment, IT organizations are challenged with supporting corporate and BYOD devices.

The security teams have a considerable task of simplifying device enrollment and set up, deploying business and security applications, providing remote support, enforcing patching of at-home machines, and enforcing corporate IT policies.

The session discusses:

  • Technologies that help you enroll, deploy, secure and support remote endpoints;
  • Need for continuous monitoring;
  • Ways to secure business operations.
1:30 pm -
2:00 pm
1:30 pm - 2:00 pm

Panel Discussion Outlook 2021: Building a Cyber Resilient Enterprise For the Post COVID-19 Era

Moderator: Geetha Nandikotkur, Managing Editor-Asia & Middle East, Information Security Media Group
Speakers:
Nirupam Srivastava, VP Strategy, M&A, AI/Digital Transformation, Hero Corporate Service
Kiran Belsekar, Vice President- Information Security, Aegon Life
Ninad Chavan, CISO, Edelweiss GIC

These cybersecurity threats are amplified by the ongoing pandemic in the region--increasing phishing attacks, targeted attacks, disruption, distortion, and deterioration. The emergence of technologies such as IoT, skill shortage, insider threats, and cloud movement has posed the most significant risks.

A panel of experts discuss:

  • Risks posed by increased digitization and cloud disruption;
  • Use of the right technologies and tools for enhanced security posture;
  • Use of predictive analytics and active defense in detecting threats;
  • Cybersecurity investments in 2021
2:00 pm -
2:30 pm
2:00 pm - 2:30 pm

Expo Hall and Networking

View Schedule
  • Hall A
  • Hall B
  • Hall C
  • Hall D
8:30 am -
9:00 am
8:30 am - 9:00 am

Registration & Exhibit Browsing

9:00 am -
9:15 am
9:00 am - 9:15 am

Opening Remarks

9:15 am -
9:45 am
9:15 am - 9:45 am

Changing Threat Landscape: New Security Strategies

Speaker:
Lt. Gen (Retd) Rajesh Pant, National Cybersecurity Coordinator-PMO

COVID-19 has resulted in increased digitization across sectors, with the enterprise cybersecurity leaders suddenly finding themselves tasked with securing a new hybrid workforce and defending their largest-ever attack surface. The trend has led to data proliferation, and organizations struggle to handle the sheer volume of data in this new regime. What are the threats to watch and technologies to embrace during the pandemic and beyond, particularly when the abundance of valuable information has captured subversive elements' attention? At the same time, cybercriminals have breached networks and compromised millions of records, not only causing revenue losses but impacting brand reputation?

Enterprises consider 2020 to be the decade of digital trust as the country's top leadership emphasizes cybersecurity to have a tremendous impact on the nation's society and economics.

This exclusive keynote session describes:

  • Changing threat landscape and lessons from the pandemic;
  • Key priorities for 2021
9:45 am -
10:30 am
9:45 am - 10:30 am

Plenary Session: Insider Threat: How to Mitigate the Heightened Risk

Speaker:
Randy Trzeciak, Director, CERT Insider Threat Center, CMU

A remote workforce. Economic stress. Pandemic fatigue. These ingredients create a "perfect storm" for insider risk, whether through malicious acts or accident. What can you do to improve monitoring and mitigation of insider risk in these unique conditions?

The exclusive session details:

  • The latest research on insider incidents
  • Unique risks created within today's remote workforce
  • How to mitigate the risks posed by malicious and unintentional insider threats
10:30 am -
10:45 am
10:30 am - 10:45 am

Data Protection and Privacy Regulations: Where are we in this Journey?

Speaker:
Justice B.N. Srikrishna, Former Judge, Supreme Court of India, and Chairman of the Data Protection Committee

COVID-19 poses various data protection and privacy challenges in the region, for instance, regarding cost-related issues of ensuring personal data security and the hiring privacy professionals during the economic crisis. It's time to discuss how enterprises are impacted by the proposed personal data protection and privacy regulations in the current distributed era.

There is a need for enterprises to understand the country's specific operating requirements, with the enactment of data protection law in the region, whether there are established data protection laws and what standards of data protection should be applied.

The session discusses:

  • Different aspects of data protection laws that impact businesses;
  • Accountability for enterprises in hiring data protection officers;
  • Data breach notification - challenges and implications.
10:45 am -
11:15 am
10:45 am - 11:15 am Track A

Effective Zero Trust: Enhancing App Access Control Using DNS

Speakers:
Nick Itta, VP APAC, Efficient IP
Vernon Co, Senior PreSales Consultant APAC, EfficientIP

For 'zero trust' to be effective, controlling which devices can access which apps and domains is vital. However, applying an authentication mechanism or blacklisting domains for all devices leaves the door open to malware.

Intelligent control requires filtering at the client level (microsegmentation), which is complex to set up and manage using firewalls but can be simpler using DNS services.

This session will discuss:

  • How DNS offers real-time analytics on client behavior due to it having near 100% application traffic visibility;
  • Why allowing specific users to access to selected apps adds granularity to policies applied;
  • Uses of client grouping, blacklisting, and whitelisting for improving access control and defeating insider threats.
10:45 am - 11:15 am Track B

Securing the Future of Work with Cyber AI

Speaker:
Apurva Jain, Commercial Team Lead, Darktrace

The future of work remains unpredictable. More than ever before, business leaders need to stay confident that their operations can continue securely in the face of regional or even global crises. While sections of the economy remain more uncertain and fragile than ever, cyber-attackers are ramping up their campaigns. Organizations must rethink their security approach and rely on new technologies like AI to achieve much-needed adaptability and resilience.

The session discusses:

  • How AI has adapted to new patterns of work;
  • Use of Cyber AI to protect the dynamic workforce;
  • Defensive Autonomous Response capabilities
10:45 am - 11:15 am Track C

Using Data Science & Human Behavior To Predict Security Shortcomings

Speakers:
Brijesh Miglani, Team Lead Sales Engineering, Forcepoint
Nick Savvides, Senior Director of Strategic Business, APAC, Forcepoint

In a fireside chat, Nick Savvides, Senior Director of Strategic Business, APAC and Brijesh Miglani, Team Lead Sales Engineering, Forcepoint will discuss how enterprises are using data science to move from a reactive to predictive security approach.

  • How machine learning is contributing to the use of data science in the era of digital transformation
  • How to re-define cybersecurity with human behaviour and psychology as part of predictive security?
  • How to prioritize observed risk in real-time to move left of breach ?
11:15 am -
11:30 am
11:15 am - 11:30 am

Expo Hall & Networking Break

11:30 am -
12:00 pm
11:30 am - 12:00 pm Track A

Rising Third-Party Supply Chain Risks During COVID: Risk Mitigation Plan

Speaker:
Sujit Christy, Group CISO, John Keells Holdings

COVID 19 has thrown up multiple challenges for security practitioners. With most employees working at home during the COVID-19 pandemic, it's more important than ever for businesses to ensure that their third-party providers have adequate business continuity plans to provide uninterrupted service.

It's critical to ask and revalidate if our suppliers' business continuity plan is adequate to sustain our operations and understand our stated objectives.

We typically think of supply chain attacks as stealthy attacks on hardware components, such as malware on laptops and network devices. Still, the supply chain attack was an attack on a service provider cannot be ruled out.

This session will discuss:

  • How should the risk framework of supply chain vendors evolve;
  • The risks posed by different kinds of vendors;
  • How to redesign SLAs with third parties
11:30 am - 12:00 pm Track B

Spike In Cashless Payments: Evolution in Payments Security in the Post-COVID Era

Speaker:
Vipin Surelia, Head of Risk Services, India and South Asia, Visa

Organizations in India need to ramp up their authentication efforts in light of a 60% increase in cashless transactions since the start of the COVID-19 pandemic, which has led to increases in attempted fraud.

The big challenge or threat in the current work-from-home environment is that hackers use phishing and other social engineering methods to trick users into providing confidential data, such as credit card numbers, social security numbers, account numbers, or passwords.

The session discusses:

  • Key security steps in light of the movement to digital transactions;
  • Using AI & ML to reduce risk using new algorithms to detect threats;
  • New forms of authentication methods to detect real-time risks.
11:30 am - 12:00 pm Track C

Risk Management Challenges for Critical Information Infrastructure in the Post COVID Era

Speaker:
Tamim Ahmed, Risk Analyst National CERT & BGD e-GOV CIRT Bangladesh

The region's critical infrastructure sector has been the target for several high-pressure APT attacks, credential-stealing malware attacks, social engineering attacks, cyber espionage, and other cyber-attacks. These attacks mostly target the government, energy, oil sector and aviation primarily aimed at data filtration.

Since the COVID-19 has thrown up enormous challenges at enterprises to move beyond the traditional castle and moat security model, they need to find new ways to build a defense-in-depth model with a multi-layered process.

The session discusses:

  • Major Changes in Threat Landscape;
  • Harnessing new process and technologies to protect critical infrastructure;
  • Assessing the security posture with predictive threat actions.
12:00 pm -
12:30 pm
12:00 pm - 12:30 pm Track A

Security Driven SDWAN: The Next Logical Evolution in Network Security

Speaker:
Alain Sanchez, Office of the CISO, Senior Evangelist, Fortinet

As enterprises are 100% supporting the remote workplace and going through the digital transformation journey, the need to maintain the entire network's visibility and recognize the patterns of the flow of information seems a mus. They seem to be opting for Sofware Defined Wide Areas Network to address their needs. CISOs are leveraging this to fully integrate SD-WAN features with legacy infrastructure to ensure remote access security. Incidentally, unlike the traditional router-centric WAN architecture, they find the SD-WAN model to fully support applications hosted in on-premise data centers, public or private clouds, and SaaS services during this cloud-centric approach.

The session discusses:

  • How SD-WAN helps to resolve security issues;
  • Use cases for integrating SD-WAN with other frameworks to ensure secure access;
  • How to deploy identity and authentication methods using SD-WAN.
12:00 pm - 12:30 pm Track B

Modernizing client PCs to cope with today's security challenges

Speaker:
Rajender Bedi, Technical Solution Specialist, Enterprise Endpoint and Security Products, Intel Corporation

Many businesses are implementing software security solutions. But as hackers get more sophisticated, threats are attacking the hardware layer. Hardware-based security features built-in to the hardware provide an important layer of protection for business devices, applications, and data. The Intel vPro® platform includes groundbreaking technologies that accelerate and scale security beyond software or human based approaches alone. It delivers hardware-enhanced security features designed to help protect the other layers of the computing stack. Intel® Hardware Shield available on the Intel vPro® platform provides enhanced protection features to help protect against below-the-OS attacks and safeguard apps and data. Intel® Hardware Shield also includes advanced threat detection that offloads routine security functions for lower user impact and continued productivity. Select the built for business platform that is right for you.

12:00 pm - 12:30 pm Track C

Reducing Risks from Unforeseen Threats

Speaker:
Lee Delson, Zscaler, Chief Architect, Asia Pacific & Japan

COVID-19 has increased threat landscape for enterprises. Ransomware, zero day attacks, phishing have become common, but enterprises are struggling to find a solution to deal effectively with these problems. Moreover, with cloud becoming an integral part of one's digital transformation journey, traditional security models followed by CISOs for years now do not necessarily work. Hence, CISOs have to rethink their security strategy. But, securing cloud is different from securing the traditional network. How can CISOs gear up for this change?.

The session discusses:

  • Challenges of stopping ransomware;
  • How CISOs can maintain consistent security on and off network;
  • How best to leverage machine learning for cloud security.
12:30 pm -
12:45 pm
12:30 pm - 12:45 pm

Networking break

12:45 pm -
1:15 pm
12:45 pm - 1:15 pm Track A

Fireside Chat: Nation-State Attacks: Are you the Next Target?

Moderator: Brijesh Singh, Inspector General of Police, Govt. of Maharashtra
Speaker: Jayesh Ranjan, Principal Secretary, Information Technology, Electronics and Communications Department, Government of Telangana

Nation-state attacks often have close links to the military intelligence or state control apparatus with a high degree of technical expertise. The region is fighting off an array of disruptive attacks that include advanced malware, sophisticated distributed denial-of-service attacks and nation-state actors targeting DNS protocols as part of ongoing espionage campaigns.

The region could be vulnerable to cyber espionage because its critical infrastructure is becoming increasingly dependent on automated data processing and vast computer networks, making it vulnerable to such information warfare techniques. Are enterprises well-equipped to mitigate the risk of nation-state actors that have a 'license to hack"?

The session discusses:

  • New techniques used by the nation-state actors to steal critical data information;
  • New cyber defense techniques/strategies the country has to adopt in tackling the nation-state threats;
  • Law enforcement challenges in tackling such attacks.
12:45 pm - 1:15 pm Track B

IAM for a Hybrid Cloud Environment: Building an Integrated Platform

Speaker:
Rajesh Thapar, Group CISO, OakNorth

Some experts say an identity and access management strategy for a hybrid cloud environment should include single sign-on and multifactor authentication.

With the widespread of COVID-19, enterprises are leveraging the edge computing model, recommended by Garter, to build an integrated platform for applying IAM for the hybrid cloud.

As the task of managing today's hybrid work environment gets challenging, enterprises need to connect its users to the right technology at the right time, in a secure way.

The session discusses:

  • Evolving an identity management solution;
  • Taking a risk-based authentication approach for a secure remote workforce;
  • Using a 'zero trust' model as part of the IAM strategy.
12:45 pm - 1:15 pm Track C

Two Way Street: A Dialogue Between a CISO and a CTO

Speakers:
Ashutosh Jain, CISO, Axis Bank
Ravinder Pal Singh, Chief Information & Innovation Officer, Tata Singapore Airlines (Air Vistara)

Are security leaders creating value for business and part of technology innovation?: Is the CTO function aligned with security in driving innovation? Meeting the Expectations. Where is the Disconnect?

1:15 pm -
1:30 pm
1:15 pm - 1:30 pm Track A

Tech Spotlight: Tackling Ransomware: Rising to the Challenge

Speaker:
Ravindra Baviskar, Director - Sales Engineering (India & SAARC), Sophos

Ransomware is the fastest-growing cybersecurity threat, and it is becoming increasingly difficult for enterprises to rebound from such attacks. We have witnessed high profile organizations becoming the victim of these attacks and hitting the headlines. Security teams must be the hacker if you have to beat the hacker and understand the risks posed by these attacks.

The challenge CISOs face is to understand the trade-offs of different AppSec tools and which tools are best suited for DeveSecOps and which are not.

The session discusses:

  • Understanding the ransomware attack kill chain;
  • How synchronized security will help thwart attacks on your endpoints and firewall;
  • Building an automated incident response mechanism to fight advanced threats.
1:15 pm - 1:30 pm Track B

Tech Spotlight: Making Threat Intelligence a Key Defense Strategy

Speaker:
Rajan Pant, Founder, IT-SERT of Nepal and CIO, CG Corp Global

While organizations invest a lot on getting data, more often than not they are not able to utilize the data intelligently. With enterprises, including large ones, facing increasing attacks, threat intelligence can go a long way in utilizing evidence-based knowledge to find out the risk of the system.

The session discusses:

  • How to set the right process for threat intelligence;
  • Understanding the early warning signals for threat detection;
  • Evolving a comprehensive digital risk monitoring strategy
1:15 pm - 1:30 pm Track C

Tech Spotlight: Supporting Work From Home During Unprecedented Times

Speaker:
Matthew Burns, Director, BigFix, Asia Pacific and Japan, HCL Software

In today's unprecedented work-from-home environment, IT organizations are challenged with supporting corporate and BYOD devices.

The security teams have a considerable task of simplifying device enrollment and set up, deploying business and security applications, providing remote support, enforcing patching of at-home machines, and enforcing corporate IT policies.

The session discusses:

  • Technologies that help you enroll, deploy, secure and support remote endpoints;
  • Need for continuous monitoring;
  • Ways to secure business operations.
1:30 pm -
2:00 pm
1:30 pm - 2:00 pm

Panel Discussion Outlook 2021: Building a Cyber Resilient Enterprise For the Post COVID-19 Era

Moderator: Geetha Nandikotkur, Managing Editor-Asia & Middle East, Information Security Media Group
Speakers:
Nirupam Srivastava, VP Strategy, M&A, AI/Digital Transformation, Hero Corporate Service
Kiran Belsekar, Vice President- Information Security, Aegon Life
Ninad Chavan, CISO, Edelweiss GIC

These cybersecurity threats are amplified by the ongoing pandemic in the region--increasing phishing attacks, targeted attacks, disruption, distortion, and deterioration. The emergence of technologies such as IoT, skill shortage, insider threats, and cloud movement has posed the most significant risks.

A panel of experts discuss:

  • Risks posed by increased digitization and cloud disruption;
  • Use of the right technologies and tools for enhanced security posture;
  • Use of predictive analytics and active defense in detecting threats;
  • Cybersecurity investments in 2021
2:00 pm -
2:30 pm
2:00 pm - 2:30 pm

Expo Hall and Networking

View Schedule

PAST SPONSORS / Past Summit's Sponsors

Efficient IP
Forcepoint
HCL
Intel new
Sophos
CyberEd Board
Darktrace
Fortinet
Zscaler

VIRTUAL SUMMIT DETAILS / what to expect at our virtual event

View sessions, chat with speakers and technology experts in our Interactive Exhibit & Networking Experience, and browse our Resource Center to download educational assets to review post-summit.

If you miss any live sessions, feel free to log in and view on demand at your own pace. Session recordings will be available in our virtual environment after the agenda has ended.

ISMG Virtual Summit Attendee Guide
For more information please download our ISMG Virtual Summit Attendee Guide.

Meet Our Speakers

ISMG Global Events: 2020 and Beyond

ISMG's SVP of Editorial, VP of Global Events, and Group Director of Custom Events discuss the state of events.

The Critical Importance of Data Integrity

Microsoft's Diana Kelley on How to Keep Data Untampered

Steve Katz on Cybersecurity’s State of the Union

World's First CISO Weighs in on the Technologies and Trends Shaping 2019

The Challenge of Fighting Identity Fraud

IBM's Shaked Vax on Emerging Technologies to Assure Digital IDs

A Common Sense Guide to Mitigating Insider Threats

Randy Trzeciak of CERT Reviews the Latest Research

Register Today

To earn CPE credits, hear from industry influencers, join ISMG’s global community and meet with leaders of technology register today.

Register Now
For queries, contact:
email at priti.dutta@ismg-summits.com / mahesh.verma@ismg-summits.com

Contact Us

Reach us: Reserve your attendance today to ensure you don’t miss the opportunity to meet, network and learn from the foremost experts in information security and risk management in this interactive environment.

+1 (609) 356-1499
events@ismg.io

Join the Community

Subscribe to get the latest happenings on our Roundtables, Summits, and other Events!

    • BankInfoSecurity
    • CUInfoSecurity
    • GovInfoSecurity
    • HealthcareInfoSecurity
    • InfoRiskToday
    • CareersInfoSecurity
    • DataBreachToday
    • CyberEd
    Home | Summits | Press Releases | Sponsorship
    © 2021 Information Security Media Group, Corp. |
    Privacy & GDPR Statement | CCPA: Do Not Sell My Personal Data