ismg.events
Open in
urlscan Pro
151.101.2.159
Public Scan
Submitted URL: https://links.ismgcorp.com/MDUxLVpYSS0yMzcAAAGS6zYvUl0EDPpdsFu-T0OImxNhVoGyaQ2iPctl_BWpLd_HIasEJ7jsmghULNYm030Fy9dE_98=
Effective URL: https://ismg.events/summit/cybersecurity-summit-new-delhi-2024/?rf=2024-05-06_ENEWS_ACQ_IR_Summit&mkt_tok=MDUxLVpYSS...
Submission: On May 06 via api from IN — Scanned from DE
Effective URL: https://ismg.events/summit/cybersecurity-summit-new-delhi-2024/?rf=2024-05-06_ENEWS_ACQ_IR_Summit&mkt_tok=MDUxLVpYSS...
Submission: On May 06 via api from IN — Scanned from DE
Form analysis
1 forms found in the DOMName: Subscribe-Footer — POST
<form class="elementor-form" method="post" name="Subscribe-Footer">
<input type="hidden" name="post_id" value="5731">
<input type="hidden" name="form_id" value="21b9e35">
<input type="hidden" name="referer_title" value="Delhi Summit 2024">
<input type="hidden" name="queried_id" value="25103">
<div class="elementor-form-fields-wrapper elementor-labels-above">
<div class="elementor-field-type-email elementor-field-group elementor-column elementor-field-group-email elementor-col-75 elementor-field-required">
<input size="1" type="email" name="form_fields[email]" id="form-field-email" class="elementor-field elementor-size-xs elementor-field-textual" placeholder="Email" required="required" aria-required="true">
</div>
<div class="elementor-field-type-recaptcha_v3 elementor-field-group elementor-column elementor-field-group-field_4cf4815 elementor-col-100 recaptcha_v3-bottomright">
<div class="elementor-field" id="form-field-field_4cf4815">
<div class="elementor-g-recaptcha" data-sitekey="6LcLx5UlAAAAAKlm6tTcgwUwCUReiqXqnA9VF0BA" data-type="v3" data-action="Form" data-badge="bottomright" data-size="invisible">
<div class="grecaptcha-badge" data-style="bottomright"
style="width: 256px; height: 60px; display: block; transition: right 0.3s ease 0s; position: fixed; bottom: 14px; right: -186px; box-shadow: gray 0px 0px 5px; border-radius: 2px; overflow: hidden;">
<div class="grecaptcha-logo"><iframe title="reCAPTCHA" width="256" height="60" role="presentation" name="a-gwfiqsf6mkte" frameborder="0" scrolling="no"
sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox allow-storage-access-by-user-activation"
src="https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LcLx5UlAAAAAKlm6tTcgwUwCUReiqXqnA9VF0BA&co=aHR0cHM6Ly9pc21nLmV2ZW50czo0NDM.&hl=de&type=v3&v=V6_85qpc2Xf2sbe3xTnRte7m&size=invisible&badge=bottomright&sa=Form&cb=low175qqhd20"></iframe>
</div>
<div class="grecaptcha-error"></div><textarea id="g-recaptcha-response" name="g-recaptcha-response" class="g-recaptcha-response"
style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
</div><iframe style="display: none;"></iframe>
</div>
</div>
</div>
<div class="elementor-field-group elementor-column elementor-field-type-submit elementor-col-40 e-form__buttons">
<button type="submit" class="elementor-button elementor-size-sm">
<span>
<span class=" elementor-button-icon">
</span>
<span class="elementor-button-text">Send</span>
</span>
</button>
</div>
</div>
</form>
Text Content
Skip to content * Events * Summits * Roundtables * Custom Events * Sponsorship * Faculty * Contact Us * About Menu * Events * Summits * Roundtables * Custom Events * Sponsorship * Faculty * Contact Us * About AUGUST 8, 2024 CYBERSECURITY SUMMIT: NEW DELHI 8:00 AM - 5:00 PM IST Agenda Overview Topics Agenda Speakers Advisors CPE Credits Register Overview Topics Agenda Speakers ADVISORS CPE Credits Register EVENT OVERVIEW As the world’s fifth-largest economy, India is spearheading rapid digital development that will shape the cybersecurity trajectory in 2024. Against evolving cyberthreats, economic shifts, and regulatory frameworks, security leaders have a three-pronged agenda to enhance their threat detection capabilities: innovation, investments and intelligence. ISMG’s Cybersecurity Summit: New Delhi will offer insights on topics ranging from managing risk and preparing for the generative AI era, the impact of APIs on the future of business governance, building custom-built IT architectures, developing risk mitigation strategies, OT/IT – infrastructure security vis-à-vis automotive cybersecurity, and endpoint security. Join us to learn how leaders drive technology implementations, craft user experiences, and foster business growth. You can also earn your CPE credits by attending the summit. PAPARAJU BUDDHAVARAPU Executive Director & CISO, ONGC Ltd KAUSTAV NEOGI Chief Risk Officer and National Finance Controller(Senior Vice President), Indus Towers Limited TANIN CHAKRABORTY Senior Director - Global Data Privacy Officer, Biocon Biologics KARAN KALRA Deputy CISO & DPO, National Housing Bank MOHIT GUPTA Group CISO, Motherson Group ABHISHEK BANSAL Head Non Financial Risk & Chief Information Security Officer, Max Life Insurance Co. Ltd VISAGAN SUBBURAYALU Vice President - Infrastructure and Cybersecurity, Target ADVISORS THOUGHT LEADERS ON STAGE AND LEADING DEEP DIVE DISCUSSIONS ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats SPEAKERS THOUGHT LEADERS ON STAGE AND LEADING DEEP DIVE DISCUSSIONS ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats View Faculty AGENDA HIGHLIGHTS * Enhancing Your Security Posture * Third Party Risk Management * Cyber Governance * 5G Network Security and Business Opportunities * Zero Trust Register PAST SPEAKERS KAUSTABH DABRAL Global CIO, Dabur India Ltd. CDR ADITYA VARMA (RETD) Former Director Networks and Cybersecurity, Indian Navy, Government of India VINIT SINHA Director - Cybersecurity SME, Mastercard VINOD SIVARAMA KRISHNAN Chief Information Officer, Indus Towers Ltd. ABHINAV SINHA Co-founder, Eko India Financial Services Pvt. Ltd. UMESH KUMAR Head - Cyber Security, Godfrey Phillips India Ltd. RAKESH MAHESHWARI Former Sr. Director and Gp Coordinator, Cyber Laws and Data Governance, Ministry of Electronics & Information Technology (MeitY) PAPARAJU BUDDHAVARAPU Executive Director & CISO, ONGC Ltd AGENDA REGISTRATION & BREAKFAST 9:00 am - 10:00 am IST 10:00 am – 10:30 AM IST SPEAKER NAME Title, Company OT AND IT CONVERGENCE: MEASURING THE SECURITY RISKS Most OT systems are designed with little consideration for security. With increased cyber risk in this new digital transformation era, any approach to bridge the IT and OT divide is mission-critical for enterprise security. As a CISO, can you reduce risk, security and risk management function silos to bridge the security gaps? Can you deploy suitable asset inventory methods and map the IT/OT risks? This session will cover: * Building complete visibility and monitoring your IT and OT assets with the right access control * Integrating OT threat monitoring into SoC for threat detection * Implementing essential steps to establish OT security Watch brief video on this topic 10:30 am – 11:00 aM IST SPEAKER NAME Title, Company ROLE OF ZERO TRUST IN ESTABLISHING CYBER RESILIENCE: A CISO’S PRAGMATIC APPROACH Where does the journey to “zero trust” begin and what are the common entry points for accessing data? Experts agree that “zero trust” is based on the “assume breach” premise that treats every asset as breached and all traffic as hostile. The question that arises is: Are CISOs using the “zero trust” concept to establish cyber resiliency to improve their defenses in fighting threats? The session will cover: * How has the approach toward security changed as security perimeters disappear? * How to assess the maturity of the “zero trust” state with a realistic look at security and its dependencies on other functions in securing the future work environment? Watch brief video on this topic NETWORKING & EXHIBITION BREAK 11:00 AM - 11:15 AM IST 11:15 AM - 11:45 AM IST SPEAKER NAME Title, Company SPEAKER NAME Title, Company SPEAKER NAME Title, Company PANEL DISCUSSION: PROTECTING YOUR LEGACY APPLICATIONS IN CLOUD AND BUILDING A RISK MANAGEMENT PROGRAM Cloud computing brings a whole new level of autonomy and functionality to an organization, besides enhancing performance, agility, productivity and scalability. The pandemic has created the urgency for enterprises to move to cloud, and enterprises are in a race to adopt the “cloud-first” strategy to optimize the IT spend and secure their hybrid work environment. However, the major challenge is to tackle the risk associated with moving legacy applications to the cloud and find ways to build a risk management program to protect these applications. The session will cover: * Risks of moving legacy applications to the cloud * Building an effective risk management program * A holistic approach to protect cloud applications Watch brief video on this topic LUNCH & EXHIBITION BREAK 12:00 pm – 1:00 pM IST 1:00 PM - 1:30 PM IST SPEAKER NAME Title, Company CULTURE CHANGE: HOW TO INSTILL A MINDSET OF RESPONSIBLE DEFENSE How do you inspire an enterprise to change its entire cybersecurity mindset? How do help people evolve from being afraid to report a cybersecurity incident to being eager and proactive?... It’s called “Responsible Defense,” and Katie Jenkins, EVP and CISO of Liberty Mutual Insurance, addresses it in this exclusive keynote. Beyond this cultural shift, she discusses: * Partnering with her new CIO to support a tech strategy of “Safeguarding Business Operations” * Dealing with the shifting threat landscape and expanded attack surface * Addressing the talent gap by championing women, military veterans and other under-represented groups Watch brief video on this topic 1:30 PM - 2:00 PM IST SPEAKER NAME Title, Company CLOUD ACCOUNT TAKEOVER: HOW DO YOU PREVENT CYBER PERPETRATORS? The adoption of cloud technology due to digital transformation in Southeast Asian organizations has led to an upsurge in breaches, affecting several industries such as government, healthcare and financial services in the ASEAN region. In a cloud account compromise, attackers gain control over the legitimate user’s cloud-based email or collaboration service account that gives access to the data and contacts. They can persuade users and business partners to wire money or damage an organization’s reputation. As more business assets move to cloud, attackers follow close behind. The session will cover: * The anatomy of cloud account takeover; * The extent of harm cybercriminals can inflict with a compromised cloud account; * How to protect your organization from cloud account compromise and takeover. Toggle Title Toggle Content Watch brief video on this topic 2:00 PM - 2:30 PM IST SPEAKER NAME Title, Company SPEAKER NAME Title, Company CIO AND CISO: COLLABORATE TO DEFEND The increase in the volume of threats caused the elevation of the CISO with new roles and responsibilities being assigned to them. As organizations undergo more digital transformation, there is a greater focus on digitalizing processes and improving customer experiences. Consequently, the roles of CIOs and CISOs are evolving to new archetypes such as business enabler, digital enabler and value enabler. Partnerships with the CIO and other business heads are imperative to drive business goals. The CIO and CISO are now partners in a mission to drive business enablement and to defend the organization from threats. In this fireside chat, the participants will discuss: * Evolving roles and business-facing responsibilities; * Supporting other business heads; * Cybersecurity – from a cost center to business enabler. 2:30 - 3:00 PM IST SPEAKER NAME Title, Company SPEAKER NAME Title, Company SPEAKER NAME Title, Company ZERO TRUST SECURITY: IS IT A DEEP DIVE OR JUST TIPPING YOUR TOES? Nearly 77% organizations plan to boost their spending related to zero trust over the next year, states a recent survey from the Cloud Security Alliance. Different industries are struggling to implement the various technologies under zero trust. Microsegmentation and access management are not easy to deploy. What works for one industry might not work for another as zero trust is not a monolithic approach. For many, zero trust architecture has become complex. Given this, are CISOs just tipping their toes? How must they get more granular in their approach? This session will cover: * Business imperatives driving the implementation of zero trust; * How to decide on the low-hanging fruits; * How to handle microsegmentation and zero trust in the cloud. Watch brief video on this topic 3:00 - 3:30 PM IST SPEAKER FULL NAME Job Title, Company Name SPEAKER FULL NAME Job Title, Company Name SPEAKER FULL NAME Job Title, Company Name SPEAKER FULL NAME Job Title, Company Name RESETTING CYBERSECURITY PLANS IN 2023: CISOS’ REBALANCING PRACTICES It is evident that the cybersecurity industry faces severe resource and skill crunch across the spectrum, including cloud security, OT security, information security and attack simulation - and the hunt for talent continues. Besides, CISOs are compelled to force relationships with business functions and become evangelists for cybersecurity within the organization to gain the board’s attention. CISOs must adorn multiple hats of a leader, defender and offender during a cyber war to be resilient enough to stay on top of emerging threats and rebalance their skills to meet the changing demand. The panel will discuss: * Maintaining the pace by harnessing new concepts and automation; * Building an offensive strategy to make the enterprise resilient; * Establishing accountability across all functions by weaving a cybersecurity story in all functions. CLOSING COMMENTS 3:30 PM - 4:00 PM IST VENUE DELHI Delhi DON’T MISS YOUR CHANCE TO ATTEND THIS DYNAMIC IMPACTFUL EVENT Register #ISMGSummit @ISMG_News THE SUMMIT EXPERIENCE Previous Next Previous Next CPE CREDITS Engage offers Continuing Education Credits. Learn informative and engaging content created specifically for security professionals. Claim Credits REGISTER RSVP here to attend our events. You can select for multiple or individual tickets. DELHI CONFERENCE Aug 23 - 24, 2023 OUR SPONSORS PRESENTING PARTNER GOLD SPONSORS ASSOCIATION SPEAKER NAME Title, company name SPEAKER NAME Title, company name SPEAKER NAME Title, company name SPEAKER NAME Title, company name SPEAKER NAME Title, company name SPEAKER NAME Title, company name SPEAKER NAME Title, company name SPEAKER NAME Title, company name SPEAKER NAME Title, company name SPEAKER NAME Title, company name SPEAKER NAME Title, company name SPEAKER NAME Title, company name SPEAKERS THOUGHT LEADERS ON STAGE AND LEADING DEEP DIVE DISCUSSIONS ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats View Faculty Upcoming ISMG Events MAY 15, 2024 Prevent, Contain, Minimise the Impact of Cyberattacks to Ensure your Organization's Resilience See Event APRIL 16, 2024 Cybersecurity Implications of AI Summit: North America West Summit See Event APRIL 24, 2024 Securing OT/IoT in the Age of Automation and Cloud Integration See Event JUNE 13, 2024 Cybersecurity & Business Transformation Summit: Bengaluru See Event APRIL 10, 2024 Strategies and Mandates for Phishing-Resistant MFA in Financial Services and Healthcare See Event Upcoming ISMG Events MAY 15, 2024 Prevent, Contain, Minimise the Impact of Cyberattacks to Ensure your Organization's Resilience See Event APRIL 16, 2024 Cybersecurity Implications of AI Summit: North America West Summit See Event APRIL 24, 2024 Securing OT/IoT in the Age of Automation and Cloud Integration See Event EVENT * Summits * Engage * Roundtables * Custom Events * Summits * Engage * Roundtables * Custom Events ABOUT * Sponsorship * Leadership * Company * Privacy Policy * Sponsorship * Leadership * Company * Privacy Policy @ISMG_News #ISMGEngage SUBSCRIBE TO STAY UPDATED WITH OUR EVENTS Send