VirtualCybersecuritySummit 2020 Nov. 26, 2020 to Nov. 26, 2020, Virtual, Virtual

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Are Enterprises Keeping Pace With Global Cyber Threats? Lt. Pant This session provides a review of the threat landscape and the state of cybersecurity solutions ...
Security Operations and Network Automation: Reducing Time to Detect & Respond to Threats Vishak Raman With cyber threats getting more sophisticated, a key challenge for every security professional is reducing ...
Shutting the Dark Web Is Impossible: Inside an Investigator's Notebook Brijesh Bahadur Singh There have been reports of India losing $18.5 billion due to business done on the ...
End Point Detection and Response For Enhanced Security - A Practitioner's Prerequisites A. K. Elavarasu End point detection and response (EDR) implementation can be a time-consuming process that requires specialized ...
Securing Your Digital Transformation with Little Disruption Shakeel Khan Digital transformation is the catalyst behind one of the largest technology shifts in our history. ...
Managing Risk in a Digital World Pradeep Sharma Many organizations are launching ambitious digital initiatives. But they must identify, assess and mitigate the ...
Discover, Quantify & Remediate Your Cyber Risk From Back Office to Boardroom View Diwakar Dayal With digitization in full bloom, organizations' IT infrastructures have mushroomed to another level. As a ...
Transform Digital: Focus on People Harshil Doshi Even with over $1 trillion spent on cybersecurity in the last decade, adversaries have continued ...
Connected Security - Bridging the Gap Between Threat Detection and Enforcement Kiran Mohandas Many enterprises are adopting multi-cloud and other new technologies, including the internet of things and ...
Changing Threat Landscape: Training 'Cyber Pilots' to Fight Threats Rakesh Kharwal Enterprises are increasing their security budgets, but they still are struggling with attracting and training ...
India's Data Protection Law for the Enterprise: From Policy to Practice - A Fireside Chat Justice B.n. Srikrishna , Rahul Matthan In an exclusive interview, Justice Srikrishna will sit for a 'fire side' chat interview in ...
Digital Payments and Fraud in an Evolving Landscape: A Fireside Chat with the CISO Mahesh Rajaraman , Vipin Surelia In this exclusive interview, Surelia will sit for a "fireside chat" interview in which he ...
GDPR Compliance: Building a Strong Security and Governance Framework Subhajit Deb Since May 25, 2018, when GDPR went into full effect, security practitioners have been waiting ...
Security Automation & Orchestration: The CISO's New Lingo in Tackling Threats Sudarshan Rajgopal As cyberattacks become more frequent, security operations teams and CISOs are struggling to keep up ...
Enabling & Empowering Modern Security Operations - Moving From Incident-Driven to Intelligence-Driven Security Operations Sidharth Mutreja As cyber threats continue to evolve, organizations need to be able to rapidly detect and ...
Accelerating Data Protection Through Effective Data Identification Jaspreet Singh , Maheswaran S The cascading effect of growing regulatory requirements and customer demand to protect their data is ...
Detecting Breaches in Real Time: A Single Transparency Tool Debasish Mukherjee Speeding up the detection of breaches requires a new approach, including a security platform that ...
Building a Cyber-Resilient Program for Email Security: A Holistic Approach Anoop Das Email remains a key vector for attacks because of the pervasiveness of phishing. Despite significant ...
Panel: Data Localization: Impact on Security and Compliance Dharmaraj Ramakrishnan , Geetha Nandikotkur , K S Narayanan , Sethu S Raman , Srinivas Rao , Vijay Bharti India's regulatory bodies are insisting that transactional data be stored domestically to help prevent breaches ...
Panel: Data Breaches and Fraud Detection: How to Engage With Law Enforcement, Regulators and Policy Makers Sridhar Sidhu , Minatee Mishra , Naavi Vijayashankar , Ravikiran Avvaru , Satyavathi Divadari , Subhro Dey Too many organizations continue to address breach response from a reactive mode - having a ...
Two-Way Street: A Dialogue Between a CISO and a Managing Director Ajay Kanwal , Bithal Bhardwaj , Sanjay Sahay Security Leaders Creating Value for Business: Meeting the Expectations. Where is the Disconnect?