CybersecuritySummit 2019 Nov. 21, 2019 to Nov. 21, 2019, Mumbai, India
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Securing Digital India's Assets: Key Steps | J A Chowdary | Creating effective strategies for securing digital India's assets is challenging. For example, the growth of ... | |
Securing Your Journey To The Cloud | Terence Gomes | Cloud adoption has created challenges for enterprises, including third-party risks, breaches caused by cloud misconfigurations, ... | |
The Role of Academia in Cybersecurity | R.k. Shyamasundar , Jc Professor , Iit Bombay | To meet India's ambitious goal of growing the cybersecurity market as much as $35 billion ... | |
The Cloud Security Challenge: Managing the Third-Party Risks | Sridhar Govardhan | Digital transformation to the cloud has resulted in increased dependency on third-party vendors to manage ... | |
Rising Cybersecurity Risks and Breaches: Assessing Cyber Insurance | S.v. Sunder Krishnan | About 50 banks in India have cyber insurance policies to cover breach response costs, risk ... | |
Balancing Data Security and Digital Transformation: The Enterprise Challenge | Claire Hatcher | According to the 2019 Cyberthreat Defense Report, nearly eight out of 10 organizations were victims ... | |
Enabling Trust in the Digital World and Managing Risks | Ganesh Prasad | The modern digital economy is built on a foundation of trust, which is becoming increasingly ... | |
Zero Trust and IT, IoT and OT - How to Start and How to be Sure | Steven Hunter | The Zero Trust model of information security has become a fixture in both the strategies ... | |
Racing Against the Adversary: How to Win in the Era of the 18-Minute Breach | Ankur Patial | Security operations centers must scale up to better detect cyberthreats early. New research on "breakout ... | |
Fireside Chat: Nation-State Attacks: Are You the Next Target? | Amit Singh | Nation-state attacks often have close links to the military intelligence or state control apparatus with ... | |
Fireside Chat: Harnessing AI and Machine Learning for Banking Innovation: The Security Challenge | Sameer Goswami | How can banks leverage artificial intelligence and machine learning to drive innovation while ensuring that ... | |
Digital Banking & Payments Security - Data Localization Hurdles | Ashutosh Jain , Gaurav Batra , Arvind Kumar , Bharat Panchal | India's regulatory bodies are insisting that transactional data be stored domestically to help prevent breaches ... | |
Cybersecurity Audits - Effectiveness in Building a Resilient Security Posture | Vicky Shah , Agnelo D'souza , Anish Ravindranathan , Nitin Bhatnagar | Organizations that are relatively well-resourced and committed to cybersecurity stand to benefit from cybersecurity audits.Cybersecurity ... | |
Data Protection Bill: Meeting Security and Privacy Goals | Justice B.n. Srikrishna | The long-awaited Personal Data Protection Bill is ready to be tabled in Parliament during this ... | |
Building Effective Data Protection Strategies | Ved Prakash | Complying with regulations and standards, including GDPR, PCI DSS, the RBI Gopala Krishna Committee report ... | |
Tech Spotlight: 'Black Swan' of Data Security - Quantum Key Distribution | Sunil Kumar Gupta | As quantum computers come into the forefront, they pose immense risks. So the time to ... | |
Making Enterprise Security 'Future-Proof' - Raising the Bar on Cyber Defenses | Loknath Behera | Digitization across sectors has led to data proliferation, and organizations are struggling to handle the ... | |
CISOs' 2020 Cybersecurity Agenda | Bhishma Maheshwari , Devender Kumar , Patrick Pitchappa , Uday Deshpande | Many high-profile breaches have grabbed headlines this year, including those at Wipro, Toyota and Capital ... | |
Three-Way Street Cybersecurity: Addressing the Cross-Functional Challenges | Brijesh Datta , Sandip Chakraborty , Sridhar Sidhu | This session features a dialogue among a CISO, a CIO and a CTO on the ... |