ismg.events Open in urlscan Pro
151.101.2.159  Public Scan

Submitted URL: https://links.ismgcorp.com/MDUxLVpYSS0yMzcAAAGS6zYvUl0EDPpdsFu-T0OImxNhVoGyaQ2iPctl_BWpLd_HIasEJ7jsmghULNYm030Fy9dE_98=
Effective URL: https://ismg.events/summit/cybersecurity-summit-new-delhi-2024/?rf=2024-05-06_ENEWS_ACQ_IR_Summit&mkt_tok=MDUxLVpYSS...
Submission: On May 06 via api from IN — Scanned from DE

Form analysis 1 forms found in the DOM

Name: Subscribe-FooterPOST

<form class="elementor-form" method="post" name="Subscribe-Footer">
  <input type="hidden" name="post_id" value="5731">
  <input type="hidden" name="form_id" value="21b9e35">
  <input type="hidden" name="referer_title" value="Delhi Summit 2024">
  <input type="hidden" name="queried_id" value="25103">
  <div class="elementor-form-fields-wrapper elementor-labels-above">
    <div class="elementor-field-type-email elementor-field-group elementor-column elementor-field-group-email elementor-col-75 elementor-field-required">
      <input size="1" type="email" name="form_fields[email]" id="form-field-email" class="elementor-field elementor-size-xs  elementor-field-textual" placeholder="Email" required="required" aria-required="true">
    </div>
    <div class="elementor-field-type-recaptcha_v3 elementor-field-group elementor-column elementor-field-group-field_4cf4815 elementor-col-100 recaptcha_v3-bottomright">
      <div class="elementor-field" id="form-field-field_4cf4815">
        <div class="elementor-g-recaptcha" data-sitekey="6LcLx5UlAAAAAKlm6tTcgwUwCUReiqXqnA9VF0BA" data-type="v3" data-action="Form" data-badge="bottomright" data-size="invisible">
          <div class="grecaptcha-badge" data-style="bottomright"
            style="width: 256px; height: 60px; display: block; transition: right 0.3s ease 0s; position: fixed; bottom: 14px; right: -186px; box-shadow: gray 0px 0px 5px; border-radius: 2px; overflow: hidden;">
            <div class="grecaptcha-logo"><iframe title="reCAPTCHA" width="256" height="60" role="presentation" name="a-gwfiqsf6mkte" frameborder="0" scrolling="no"
                sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox allow-storage-access-by-user-activation"
                src="https://www.google.com/recaptcha/api2/anchor?ar=1&amp;k=6LcLx5UlAAAAAKlm6tTcgwUwCUReiqXqnA9VF0BA&amp;co=aHR0cHM6Ly9pc21nLmV2ZW50czo0NDM.&amp;hl=de&amp;type=v3&amp;v=V6_85qpc2Xf2sbe3xTnRte7m&amp;size=invisible&amp;badge=bottomright&amp;sa=Form&amp;cb=low175qqhd20"></iframe>
            </div>
            <div class="grecaptcha-error"></div><textarea id="g-recaptcha-response" name="g-recaptcha-response" class="g-recaptcha-response"
              style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
          </div><iframe style="display: none;"></iframe>
        </div>
      </div>
    </div>
    <div class="elementor-field-group elementor-column elementor-field-type-submit elementor-col-40 e-form__buttons">
      <button type="submit" class="elementor-button elementor-size-sm">
        <span>
          <span class=" elementor-button-icon">
          </span>
          <span class="elementor-button-text">Send</span>
        </span>
      </button>
    </div>
  </div>
</form>

Text Content

Skip to content
 * Events
   * Summits
   * Roundtables
   * Custom Events
   * Sponsorship
 * Faculty
 * Contact Us
 * About

Menu
 * Events
   * Summits
   * Roundtables
   * Custom Events
   * Sponsorship
 * Faculty
 * Contact Us
 * About


AUGUST 8, 2024


CYBERSECURITY SUMMIT: NEW DELHI


8:00 AM - 5:00 PM IST

Agenda

Overview
Topics
Agenda
Speakers
Advisors
CPE Credits
Register

Overview
Topics
Agenda
Speakers
ADVISORS
CPE Credits
Register



EVENT OVERVIEW

As the world’s fifth-largest economy, India is spearheading rapid digital
development that will shape the cybersecurity trajectory in 2024. Against
evolving cyberthreats, economic shifts, and regulatory frameworks, security
leaders have a three-pronged agenda to enhance their threat detection
capabilities: innovation, investments and intelligence. 

ISMG’s Cybersecurity Summit: New Delhi will offer insights on topics ranging
from managing risk and preparing for the generative AI era, the impact of APIs
on the future of business governance, building custom-built IT architectures,
developing risk mitigation strategies, OT/IT – infrastructure security vis-à-vis
automotive cybersecurity, and endpoint security. 

Join us to learn how leaders drive technology implementations, craft user
experiences, and foster business growth. 

You can also earn your CPE credits by attending the summit. 





PAPARAJU BUDDHAVARAPU

Executive Director & CISO, ONGC Ltd


KAUSTAV NEOGI

Chief Risk Officer and National Finance Controller(Senior Vice President), Indus
Towers Limited


TANIN CHAKRABORTY

Senior Director - Global Data Privacy Officer, Biocon Biologics


KARAN KALRA

Deputy CISO & DPO, National Housing Bank


MOHIT GUPTA

Group CISO, Motherson Group


ABHISHEK BANSAL

Head Non Financial Risk & Chief Information Security Officer, Max Life Insurance
Co. Ltd


VISAGAN SUBBURAYALU

Vice President - Infrastructure and Cybersecurity, Target


ADVISORS


THOUGHT LEADERS ON STAGE AND LEADING DEEP DIVE DISCUSSIONS

ISMG Summits bring the foremost thought leaders and educators in the security
space to the stage, interactive workshops and networking events. Learn from the
“who’s who” in Cybersecurity passionate about the latest tools and technology to
defend against threats 




SPEAKERS


THOUGHT LEADERS ON STAGE AND LEADING DEEP DIVE DISCUSSIONS

ISMG Summits bring the foremost thought leaders and educators in the security
space to the stage, interactive workshops and networking events. Learn from the
“who’s who” in Cybersecurity passionate about the latest tools and technology to
defend against threats 

View Faculty





AGENDA HIGHLIGHTS

 * Enhancing Your Security Posture
 * Third Party Risk Management
 * Cyber Governance
 * 5G Network Security and Business Opportunities
 * Zero Trust

Register


PAST SPEAKERS


KAUSTABH DABRAL

Global CIO, Dabur India Ltd.


CDR ADITYA VARMA (RETD)

Former Director Networks and Cybersecurity, Indian Navy, Government of India


VINIT SINHA

Director - Cybersecurity SME, Mastercard


VINOD SIVARAMA KRISHNAN

Chief Information Officer, Indus Towers Ltd.


ABHINAV SINHA

Co-founder, Eko India Financial Services Pvt. Ltd.


UMESH KUMAR

Head - Cyber Security, Godfrey Phillips India Ltd.


RAKESH MAHESHWARI

Former Sr. Director and Gp Coordinator, Cyber Laws and Data Governance, Ministry
of Electronics & Information Technology (MeitY)


PAPARAJU BUDDHAVARAPU

Executive Director & CISO, ONGC Ltd



AGENDA





REGISTRATION & BREAKFAST

9:00 am - 10:00 am IST

10:00 am – 10:30 AM IST


SPEAKER NAME

Title, Company


OT AND IT CONVERGENCE: MEASURING THE SECURITY RISKS

Most OT systems are designed with little consideration for security. With
increased cyber risk in this new digital transformation era, any approach to
bridge the IT and OT divide is mission-critical for enterprise security. 

As a CISO, can you reduce risk, security and risk management function silos to
bridge the security gaps?  Can you deploy suitable asset inventory methods and
map the IT/OT risks? 

This session will cover:  

 * Building complete visibility and monitoring your IT and OT assets with the
   right access control 
 * Integrating OT threat monitoring into SoC for threat detection
 * Implementing essential steps to establish OT security

Watch brief video on this topic

10:30 am – 11:00 aM IST


SPEAKER NAME

Title, Company


ROLE OF ZERO TRUST IN ESTABLISHING CYBER RESILIENCE: A CISO’S PRAGMATIC APPROACH

Where does the journey to “zero trust” begin and what are the common entry
points for accessing data? Experts agree that “zero trust” is based on the
“assume breach” premise that treats every asset as breached and all traffic as
hostile.

The question that arises is: Are CISOs using the “zero trust” concept to
establish cyber resiliency to improve their defenses in fighting threats?

The session will cover:  

 * How has the approach toward security changed as security perimeters
   disappear?
 * How to assess the maturity of the “zero trust” state with a realistic look at
   security and its dependencies on other functions in securing the future work
   environment?

Watch brief video on this topic



NETWORKING & EXHIBITION BREAK

11:00 AM - 11:15 AM IST


11:15 AM - 11:45 AM IST


SPEAKER NAME

Title, Company


SPEAKER NAME

Title, Company


SPEAKER NAME

Title, Company


PANEL DISCUSSION: PROTECTING YOUR LEGACY APPLICATIONS IN CLOUD AND BUILDING A
RISK MANAGEMENT PROGRAM

Cloud computing brings a whole new level of autonomy and functionality to an
organization, besides enhancing performance, agility, productivity and
scalability.

The pandemic has created the urgency for enterprises to move to cloud, and
enterprises are in a race to adopt the “cloud-first” strategy to optimize the IT
spend and secure their hybrid work environment. However, the major challenge is
to tackle the risk associated with moving legacy applications to the cloud and
find ways to build a risk management program to protect these applications. 

The session will cover:  

 * Risks of moving legacy applications to the cloud 
 * Building an effective risk management program 
 * A holistic approach to protect cloud applications

Watch brief video on this topic



LUNCH & EXHIBITION BREAK

12:00 pm – 1:00 pM IST


1:00 PM - 1:30 PM IST


SPEAKER NAME

Title, Company


CULTURE CHANGE: HOW TO INSTILL A MINDSET OF RESPONSIBLE DEFENSE

How do you inspire an enterprise to change its entire cybersecurity mindset? How
do help people evolve from being afraid to report a cybersecurity incident to
being eager and proactive?...

It’s called “Responsible Defense,” and Katie Jenkins, EVP and CISO of Liberty
Mutual Insurance, addresses it in this exclusive keynote. Beyond this cultural
shift, she discusses:

 * Partnering with her new CIO to support a tech strategy of “Safeguarding
   Business Operations”
 * Dealing with the shifting threat landscape and expanded attack surface
 * Addressing the talent gap by championing women, military veterans and other
   under-represented groups

Watch brief video on this topic

1:30 PM - 2:00 PM IST


SPEAKER NAME

Title, Company


CLOUD ACCOUNT TAKEOVER: HOW DO YOU PREVENT CYBER PERPETRATORS?

The adoption of cloud technology due to digital transformation in Southeast
Asian organizations has led to an upsurge in breaches, affecting several
industries such as government, healthcare and financial services in the ASEAN
region.

In a cloud account compromise, attackers gain control over the legitimate user’s
cloud-based email or collaboration service account that gives access to the data
and contacts. They can persuade users and business partners to wire money or
damage an organization’s reputation. As more business assets move to cloud,
attackers follow close behind.  

The session will cover: 

 * The anatomy of cloud account takeover; 

 * The extent of harm cybercriminals can inflict with a compromised cloud
   account; 

 * How to protect your organization from cloud account compromise and takeover. 

Toggle Title
Toggle Content
Watch brief video on this topic

2:00 PM - 2:30 PM IST


SPEAKER NAME

Title, Company


SPEAKER NAME

Title, Company


CIO AND CISO: COLLABORATE TO DEFEND

The increase in the volume of threats caused the elevation of the CISO with new
roles and responsibilities being assigned to them.

As organizations undergo more digital transformation, there is a greater focus
on digitalizing processes and improving customer experiences. Consequently, the
roles of CIOs and CISOs are evolving to new archetypes such as business enabler,
digital enabler and value enabler. 

Partnerships with the CIO and other business heads are imperative to drive
business goals. The CIO and CISO are now partners in a mission to drive business
enablement and to defend the organization from threats. 

In this fireside chat, the participants will discuss: 

 * Evolving roles and business-facing responsibilities; 
 * Supporting other business heads; 
 * Cybersecurity – from a cost center to business enabler. 


2:30 - 3:00 PM IST


SPEAKER NAME

Title, Company


SPEAKER NAME

Title, Company


SPEAKER NAME

Title, Company


ZERO TRUST SECURITY: IS IT A DEEP DIVE OR JUST TIPPING YOUR TOES?

Nearly 77% organizations plan to boost their spending related to zero trust over
the next year, states a recent survey from the Cloud Security Alliance.

Different industries are struggling to implement the various technologies under
zero trust. Microsegmentation and access management are not easy to deploy. What
works for one industry might not work for another as zero trust is not a
monolithic approach. For many, zero trust architecture has become complex. Given
this, are CISOs just tipping their toes? How must they get more granular in
their approach?

This session will cover: 

 * Business imperatives driving the implementation of zero trust;

 * How to decide on the low-hanging fruits;

 * How to handle microsegmentation and zero trust in the cloud.

Watch brief video on this topic

3:00 - 3:30 PM IST


SPEAKER FULL NAME

Job Title, Company Name


SPEAKER FULL NAME

Job Title, Company Name


SPEAKER FULL NAME

Job Title, Company Name


SPEAKER FULL NAME

Job Title, Company Name


RESETTING CYBERSECURITY PLANS IN 2023: CISOS’ REBALANCING PRACTICES

It is evident that the cybersecurity industry faces severe resource and skill
crunch across the spectrum, including cloud security, OT security, information
security and attack simulation - and the hunt for talent continues.

Besides, CISOs are compelled to force relationships with business functions and
become evangelists for cybersecurity within the organization to gain the board’s
attention. CISOs must adorn multiple hats of a leader, defender and offender
during a cyber war to be resilient enough to stay on top of emerging threats and
rebalance their skills to meet the changing demand. 

The panel will discuss: 

 * Maintaining the pace by harnessing new concepts and automation; 
 * Building an offensive strategy to make the enterprise resilient; 
 * Establishing accountability across all functions by weaving a cybersecurity
   story in all functions. 

 




CLOSING COMMENTS

3:30 PM - 4:00 PM IST




VENUE


DELHI

Delhi




DON’T MISS YOUR CHANCE TO ATTEND THIS DYNAMIC IMPACTFUL EVENT

Register

#ISMGSummit



@ISMG_News





THE SUMMIT EXPERIENCE

Previous
Next
Previous
Next


CPE CREDITS

Engage offers Continuing Education Credits. Learn informative and engaging
content created specifically for security professionals.


Claim Credits


REGISTER

RSVP here to attend our events. You can select for multiple or individual
tickets. 




DELHI CONFERENCE

Aug 23 - 24, 2023


OUR SPONSORS


PRESENTING PARTNER





GOLD SPONSORS





ASSOCIATION










SPEAKER NAME

Title, company name


SPEAKER NAME

Title, company name


SPEAKER NAME

Title, company name


SPEAKER NAME

Title, company name


SPEAKER NAME

Title, company name


SPEAKER NAME

Title, company name


SPEAKER NAME

Title, company name


SPEAKER NAME

Title, company name


SPEAKER NAME

Title, company name


SPEAKER NAME

Title, company name


SPEAKER NAME

Title, company name


SPEAKER NAME

Title, company name


SPEAKERS


THOUGHT LEADERS ON STAGE AND LEADING DEEP DIVE DISCUSSIONS

ISMG Summits bring the foremost thought leaders and educators in the security
space to the stage, interactive workshops and networking events. Learn from the
“who’s who” in Cybersecurity passionate about the latest tools and technology to
defend against threats 

View Faculty



Upcoming ISMG Events


MAY 15, 2024

Prevent, Contain, Minimise the Impact of Cyberattacks to Ensure your
Organization's Resilience
See Event


APRIL 16, 2024

Cybersecurity Implications of AI Summit: North America West Summit
See Event


APRIL 24, 2024

Securing OT/IoT in the Age of Automation and Cloud Integration
See Event


JUNE 13, 2024

Cybersecurity & Business Transformation Summit: Bengaluru
See Event


APRIL 10, 2024

Strategies and Mandates for Phishing-Resistant MFA in Financial Services and
Healthcare
See Event

Upcoming ISMG Events


MAY 15, 2024

Prevent, Contain, Minimise the Impact of Cyberattacks to Ensure your
Organization's Resilience
See Event


APRIL 16, 2024

Cybersecurity Implications of AI Summit: North America West Summit
See Event


APRIL 24, 2024

Securing OT/IoT in the Age of Automation and Cloud Integration
See Event


EVENT

 * Summits
 * Engage
 * Roundtables
 * Custom Events

 * Summits
 * Engage
 * Roundtables
 * Custom Events


ABOUT

 * Sponsorship
 * Leadership
 * Company
 * Privacy Policy

 * Sponsorship
 * Leadership
 * Company
 * Privacy Policy



@ISMG_News #ISMGEngage




SUBSCRIBE TO STAY UPDATED WITH OUR EVENTS

Send