~Geetha Nandikotkur, Managing Editor – Asia and Middle East, ISMG~
~Dr. A.S. Ramasastri, Director, IDRBT~
Early Detection and rapid response are amongst the most critical capabilities for targeted attack remediation. Media reports indicate that well resources adversaries consistently bypass sophisticated organisational defenses. The issue is less about being able to keep the bad guys out – It’s more about detecting them as soon as they are in. The key to targeted attack defense is early detection and rapid response, which be achieved by enhancing existing capabilities with additional countermeasures. RSA recommends consolidating these efforts under a holistic program for Advanced security operations which can hunt down these adversaries quickly and completely. ~Sudeep Das, Principal Consultant, RSA~
The goal is to be able to survive attacks and thrive in the face of them. The goal is to be able to work in a world where these threats aren't going away. Resilience is about doing what you need to do to keep operating, in spite of threats. Is Resilience the Key? ~Preet Paramjit Singh, Delivery Lead – Special Projects & Cyber Resilience at ESRM, Tata Consultancy Services~
Mobile technology has introduced significant risks, and the threats reach far beyond lost and stolen devices. While bring-your-own-device (BYOD) programs are increasingly popular for their promise of employee productivity, organizations must also secure the mobile interactions of contract or temporary workers and business partners. In this session we’ll discuss best practices you can use to implement a layered approach using the cloud to protect corporate data and enable opportunity, while adapting to this new model. ~Biju Tilak, Mobile Security Strategist - IBM Security~
The year started with reports of the cyberattack on the Ukrainian power grid, confirming some of the security community’s worst fears about the vulnerability of critical infrastructure. This was followed by the Israeli ministry of power reporting a malware campaign against its network. The spectre of such infrastructure attacks is increasingly rising, and CISOs protecting these assets are challenged with identifying the risks to their organizations and preparing the appropriate response. What are India’s unique challenges and where does critical infrastructure defense stand against the current threats? Attend this session to learn:
In 2015, more breaches than ever before became public knowledge. Suffice it to say that the security industry is changing because of new pressures being applied to the victim organizations. Victims now have to respond to the court of public opinion, as well as all other statutes, regulations, and lawsuits that come with a breach. Some attackers were motivated by money, some claimed to be retaliating for political purposes, and others simply wanted to cause embarrassment. Mandiant, a FireEye company has tracked the most sophisticated threat actors over a span of more than 10 years, and this experience has provided a unique insight into the evolution of threat actors’ tools, tactics, and procedures. In this new era breaches are inevitable. A View From the Front Lines will throw light on “Am I Prepared”; beyond the traditional approach “Am I Secure”. ~Vivek Chudgar, Senior Director - Consulting, APAC, FireEye~
One of the popular technologies in security circles last year has been Threat intelligence feeds. But even as Indian organizations have begun enthusiastically subscribing to this rich telemetry, very few lay claim to being able to successfully operationalizing it in context of their organization’s specific business risks. Despite these subscriptions, cyberattacks still remain undetected and the potential advantage being forewarned never materializes. Organizations are struggling with processing and digesting this vast font of information, in addition to struggling with deduplicating intel from multiple feeds. How can Indian organizations make the best use of threat intelligence in the context of their business norms? How can technologies like analytics help in making threat intel actionable, while it is still relevant? How do organizations need to work threat intelligence into their processes and strategies to start making a difference? Takeaways from this session include:
Identity-Powered Security Solutions work by integrating identity information with security monitoring, giving the security intelligence needed to detect and respond to abnormal activity that signals a data breach or compliance gap. Today’s Identity and Security Management solutions should provide visibility and control of user activities, security events and critical systems across an organization to help quickly address evolving threats. We believe the future is an integrated approach to Identity, Access and Security built around a core of analytics. We call our approach “Identity-Powered Security” and an attempt to discuss more during the session. ~Dr. Naveen Gurusiddaiah, Head – Technical Services, Micro Focus, India~
Even though India lacks a formal breach response mechanism, public and private sector players have nonetheless initiated ad hoc and unofficial efforts to share information and collaborate in the face of increasingly sophisticated and coordinated attacks. While government is increasingly dependent upon private and public sector participation in tackling cyberattacks, a modus operandi to develop a true public/private partnership framework is missing. What are the proven, effective ways of bringing together government, business and academic partners to focus on improving the nation’s cybersecurity posture and response? This panel of experts will discuss:
Learn why ‘immune system technologies’ represent a fundamental innovation that deliver an intelligence-based approach to cyber defense. Can application of probabilistic mathematics and unsupervised machine learning augment an enterprise’s fight against the insider threat? This session will look at:
To this point, the strongest drivers of security have been government regulation and compliance. But with global security incidents increasingly resulting in tangible business risks (loss of customers, reputations, even business leaders’ jobs), is executive management prepared to take a risk-based approach to information security? Do boards of directors adequately understand the criticality of cybersecurity and accept that sustainable security practices must be risk-driven? Why is it important to take a risk-based approach to respond to breaches in a country such as India? The session will detail on:
While the conference facilitates attendees to hear from the thought leaders, InfoSec Conversations makes it possible for them to take a step ahead and voice their concerns and opinions amongst peers. Moreover, the platform proves to be a good networking opportunity for delegates.
~Shivakumar Sriraman, Chief Risk Officer-India & South Asia, VISA~
*Indicative agenda and timings. Subject to change
Join Asia’s prominent summit on cybersecurity and engage your brand amongst InfoSec leaders.
Data Breach Summit Asia, Mumbai edition that was organised in 2015 witnessed the who’s who of the industry including leaders such as Dr.Gulshan Rai, Head, National Cyber Security Co-ordination Centre, Government of India; Raghu Raman, President Risk, Security & New Ventures, Reliance Industries; Rudra Murthy, CISO, Digital IndiaRead More
Information Security Media Group publishes BankInfoSecurity, CUInfoSecurity, GovInfoSecurity, HealthcareInfoSecurity, InfoRiskToday, DataBreachToday and CareersInfoSecurity. These digital media sites offer news, views, research and education on the top industry, security, regulatory and technology challenges facing information security leaders worldwide. Each site is guided by an advisory board of thought-leaders.
ISMG’s suite of educational webinars offers hands-on training by knowledgeable practitioners and is available to individual and corporate subscribers.
ISMG’s custom research, including the Healthcare Information Security Today, Faces of Fraud and Cloud Computing Security surveys, is featured at leading industry events, such as RSA Conference and BAI Payments Connect.
ISMG’s global security summits cover a wide range of topics that change as the threat landscape changes: from breach prevention and response, to combating fraud, and even industry-specific themes. These summits consistently attract, and specifically target, ISMG’s key demographic of senior-level information security and risk management professionals from enterprise organizations. Our events are must-attend forums where 100-200 innovators and visionaries meet to exchange insights, discuss top security threats, and review technology solutions designed to stop them.
Based on decades of experience, content for ISMG’s Summits are crafted by the foremost experts in information security and risk management. In addition to the security industry’s largest dedicated editorial staff, ISMG employs a world-renowned advisory board of subject-matter-experts, analysts and practitioners who help guide content direction for our summits. This panel and speaker consortium consists of industry agency representatives, industry analysts, and hands-on practitioners.
For more information visit www.ismgcorp.com
C-704 Marathon Innova, G.K Marg, Lower Parel (W), Mumbai – 400013
(022) 7101 1500
Event begins at 09:00am
The Taj West End
25, Race Course Road, Bengaluru,