logo

X

Submit Your Talk


X

Register



slider slider slider
14 December, 2018, Bangalore

Cyber Security Summit

Venue : Courtyard by Marriott Bengaluru Outer Ring Road
14 December, 2018, Bangalore

Cyber Security Summit

Venue : Courtyard by Marriott Bengaluru Outer Ring Road
14 December, 2018, Bangalore

Cyber Security Summit

Venue : Courtyard by Marriott Bengaluru Outer Ring Road
Ways to convince Your Boss Ways to Save

Briefly Know About This Event

Cyber security systems and principles are designed to safeguard websites and web applications from attackers seeking to disrupt, delay, alter or redirect the flow of data. These attackers vary in target, motive, levels of organization, and technical capabilities, requiring public and private organizations to adopt ever-increasing measures to prevent cyber attacks.

Governments maintain cyber security measures to protect the integrity of critical infrastructure for financial systems, public health, science, and safety institutions, and defense, aerospace, and intelligence agencies.

Private enterprises use cyber security and online data protection help prevent lost revenues, harm to brand reputation, and potential fines or legal liabilities.

The Conference aims to help achieve cooperative solutions and industry teaming to defend against the ever-growing cyber threat.

Learning outcomes:

Protection , Mitigation, Understanding, Sharing, Gaining, Knowing and Optimizing.







about

  • 10+

    Global Speakers

  • 10+

    Topics

  • 50+

    Tickets

  • 01

    Day

Cyber Security Summit (14th December, 2018)

X Topic Abstract

Exploiting vulnerabilities in software has been one of the key attack techniques employed by hackers and application breaches account for a majority of reported security incidents. Along with traditional software and cloud based solutions, Mobile Apps and APIs are playing an important role in driving the business of every organization and with applications powering the iOT devices set to explode, Application Security has never been important than it is now. Application threats are also increasing in sophistication, adaptability and evasion. In this talk we will discuss the importance of Application Security, the latest threats affecting today's landscape and the way forward for organizations to tackle the complex and evolving challenges in the world of application security.

X Topic Abstract

Payment eco-system is growing beyond organizational and geographical boundaries. Regulators are becoming more stringent in their ask. This session will provide an insight into what it takes to make payment eco-system resilient against the growing Cyber risks and compliant to the applicable regulations and security standards.

X Topic Abstract

With Digital transformation creating new paradigms in every vertical and industry domain, Data is the new oil. Data security takes utmost critical importance in Digital age, with new age risks like Cyber Terrorism, Ransomware attacks and Data blockade. Protecting data is at the center of our focus – GDPR made it absolutely important and the upcoming India Data Protection Law will further obligate this. Data protection in this age of Digital disruption is key to our success and business continuity.

This presentation will explore global benchmarks and few real life examples of Data Protection methodologies.

Speaker Profile

Ravinder Pal Singh is a SeniorIndustry Consultant and Evangelist in Digital Transformation, IoT and Smart Connected economies. Ravinder has more than 21 years’ experience in the business &technology consulting, Enterprise Architecture and solutions mainly in the areas of Industry vertical solutions (IoT, Smart Cities, Real Estate, Healthcare, Education, Media, Manufacturing,etc.), Data center, Collaboration and network technology Solutions. Ravinder has managed several roles mainly in Enterprise Architecture, Solution Architecture & design, Project & Program management, Service delivery and services Management. A Certified project manager (PMP), IT Services Management (ITIL) & Enterprise Architect (TOGAF), he has extensive experience in Technology infrastructure for effective Workplace, IT service management based on ITIL framework, Information security processes (ISO27001/BS7799), quality process compliance (ISO9000), LEED certification and quality processes improvement areas based on six Sigma and DMAIC foundations. Ravinder is a an expert in IoT and IoT based solutions especially in the areas of IoT Platforms, Gateway, EDGE Analytics, IoT Lifecycle and IoT based Vertical solutions. He has consulted and managed projects with diverse streams of segments like govt, manufacturing, R&D, Media, IT & ITES, Telcos and Retail customers. He has been part of empaneled consultants for India Smart City Mission and Delhi Mumbai Infrastructure Corridor (DMIC) projects, he has consulted on Smart City projects in Malaysia, Philippines, Thailand, Korea and Singapore.He has 2 patent applications submitted in the areas of IoT for Data center and Security.

Ravinder is a known thought leader on Smart Cities, IoT and Digital Transformation, he is a regular speaker in national and international forums around Internet of Everything and Smart Communities. Some of his articles have been published in leading publications.

X Topic Abstract

Mobile application security: Malware threats and defences. Due to the rapid increase of Gadget/Cellphone leap in functionality, the rate of upgrading traditional mobile phones to smartphones is tremendous. One of the most attractive features of smartphones is the availability of a large number of apps for users to download and install. Most users are unaware of the security risks they bring with Android and IOS Application.

Speaker Profile

Team Member of CYBER SECURITY RESPONSE TEAM (CSRT), which is now globally recognized as GLOBAL CYBER SECURITY RESPONSE TEAM PVT LTD. Being a member of International Council of Hacker Association in United States of America, he is here for substantially improving the ability of cyber security in India and to defend its critical cyber crimes. He has iniated various free Penetration Testing and Hacking Conferences all over the world. He is a Penetration Tester and he had done Penetration Testing in many Computer System, Wireless Network, Web Application, Cloud infrastructure, VOIP based System and Mobile Phone System. He has introduced various Cryptographic method to secure Cyberspace.

X Topic Abstract

Intelligence has been persistently a hot cake for every nation, organization at every level and everywhere. Every e-mails, chats, cell-phone calls, transferred photos, videos and voice mails, online purchases and Internet games leaves digital trail that identifies not just the sender, receiver, length of message and location but also a variety of other data that perhaps we hoped to keep secret. The session will focus on intelligence gathering techniques in respect to counter hackers, organized criminals and terrorists’ threats on cyber space and how the Government is responding in pursuance to the above.

Speaker Profile

Swapnil Kishore, Counter Terrorism Expert (Islamic Jihad & Cyber Terrorism), Criminologist (Counter Transnational Organized Crime), Cyber Security Consultant (Ethical Hacker & Cyber Forensic Expert) & a Policy maker is well spotted as a thinker and a professional. He is leading Covert Overt Intelligence Solutions, COVINTS (OPC) Private Limited an Indian defense company that focuses on delivering customized turnkey solutions from risk - threat analysis, defense systems and equipment to training, tailored to design our customers' most challenging needs.

X Topic Abstract

Serverless computing is a new way of designing application but it is not going to solve all of our problems. For sure it is a way to tackle some of your problem. There are server in Serverless design. It run tons of tons of servers but these server are not your problem. Even if you would like to secure all your system, you cannot in Serverless design because you don’t control them, so security needs to be changed. We need to find a new approach, Traditional security won't work.

• What is Serverless?
• Misconceptions about Serverless.
• History of Serverless.
• Old school way Vs Serverless Way.
• Features & benefit of Serverless.
• Along the way challenges of leveraging Serverless.
• Examples of usages.
• Example of Serverless exploitation.
• Attack surface of Serverless.
• Areas of Serverless security.
• What future holds for Serverless?

Speaker Profile

A seasoned security leader, spent more than a decade in Cyber Security space, recently focused on cloud security. He has developed security products of Endpoint, Data Centre & Cloud segment. Additionally, Gaurav is certified Solution Architect from Amazon Web Services (AWS).

X Topic Abstract

I would like to cover in the above area the following sub topics:

1. Key emerging trends on cyber security
2. Impact on cyber security due to evolving business model
3. Digital revolutions and its impact on security paradigm
4. How organizations need to handle security concern of board and regulators.

X Topic Abstract

Cyber risk is a business risk, which is an agenda item in board meetings. If a business decision needs to be taken, then the data has to be presented accordingly. Executives would like to see the security posture of the company and what it means to their business. Businesses are expected to be compliant with multiple local and international regulatory requirements which translate into operational risk. Board, CISO and the operational team needs to be on the same page for better organisational communication to coordinate seamlessly. Best way is to get this information into one location and setup plans to mitigate them proactively.

Speaker Profile

Ramesh was CISO, GE South Asia till 2017 and is responsible for supporting and implementing IT Risk and Governance. At present he is engaged with startups in Cybersecurity and privacy areas.

Prior to that he has led multiple roles in GE’s various business as CIO, IM Leader and Program Manager (Engineering). He has been part of the initial team to setup the Engineering organization for C&I and later took over the role of IT Manager for the team. Lead initiatives for setting up High performance computing environment at JFWTC and optimization of Engineering tools, simplification of services.

Introduced IT security initiatives, like ISO 27001 certification, Data Leakage prevention, along with IT systems compliance management.

He has Bachelor's degree in Mechanical Engineering and Master in Aeronautics.

X Topic Abstract

The introduction of Agile ways of working into application development and infrastructure setup has revolutionized the way products and services are delivered today. While Agile provides good levels of flexibility, it also makes the process collaboration heavy. This has given birth to the concept of SecDevOps- which is nothing but the process of integrating secure development best practices and methodologies into development and deployment processes.

One of the tools that facilitates SecDevOps is Robotics Process Automation( RPA). My talk intends to cover the SecDevOps concepts in depth while examining the Ways of Working for RPA. The open question- Does RPA only help agile or can it be a security threat as well.

Speaker Profile

Avinash is a cyber security professional with over 10 years of consulting work experience. He has expertise in security solutions, controls and risk& compliance. He has diverse geographical experience in working in markets in Asia, Europe and Africa and has industry experience in BFSI, Government and Oil&Gas.

X Topic Abstract

We have come up with a new methodology for handling Incidents. At the core, the system consists of smart integration of Runbooks, Kanban boards and Chat applications configured rightly to handle distributed attacks. The system is based on our personal experiences,observations,literature study,surveys and talking to Responders. We will demonstrate on how we can solve a real time incident using the system. The emphasis will be on the collaboration and thinking that has been done during an incident response. Also key takeaway from the talk will be indicating how Incident Response capabilities get stronger with right content and structure during each incident.

Additional details below in case required only.
The focus is on the new processes, tools and information sharing:
1. Configured Runbooks for each case shown over a KANBAN board.
2. Applying NIST recommended phases of incidence handling.
3. Analysts having the flexibility to select different approaches with the runbooks.
4. Guidelines on creating,auditing,managing and versioning of the Runbooks.
5. Advanced tracing on the boards to get the transcript of what happened and how handlers went about resolving the incident.

X Topic Abstract

Blockchain - transaction of the future, no single data source and encrypted - How do you audit

X Topic Abstract

We are in the age of microservices, deployed and scaled seamlessly in the cloud. Organizations are leveraging the power of cloud platforms to move fast. This reduces time to develop and deliver online solutions.

Security is an important need in this fast paced delivery of online services. Solutions must be secure to maintain user trust and provide data security assurance.

Imagine the security problems that can be solved by writing infrastructure as code. An infrastructure with version control and verifiability through code testing. Visibility and insight into the infrastructure will be available from code and configuration. Updating infrastructure will then be about making a check-in to the code repository and leveraging CI/CD.

In this talk, we will look at the idea of Infrastructure as Code. The tooling required to codify complex infrastructure in the cloud will be discussed. Software testing and reliability principles can then be applied for infrastructure security. The talk will conclude by discussing opportunities that can be leveraged by adopting infrastructure as code.

Speaker Profile

Abhisek has over 10 years experience doing security research, security services delivery that includes penetration testing, source code review, training etc. He is currently working as the Head of Technology at Appsecco, where his core area of focus is building security automation platforms using cloud native solutions.

He is credited with multiple vulnerability discovery across enterprise products with CVEs to his name such as CVE-2015-0085, CVE-2015-1650, CVE-2015-1682, CVE-2015-2376, CVE-2015-2555, CVE-2014-4117, CVE2014-6113.

As an open source software contributor, he has developed or contributed to multiple projects including:

- Wireplay
- Penovox
- HiDump
- RbWinDBG

He can be reached through:

https://github.com/abhisek
https://twitter.com/abh1sek

X Topic Abstract

Five days is all a wise threat actor requires to strike substantial outrage on an organisation and put IT and IT Security in a riot. Dwell Time depicts a proactive security philosophy and culture that inspires combined difference across all security operations to achieve a general purpose. Unfortunately, most, as well as security service providers, are falling when it comes to by this philosophy. As a result, guesses suggest Dwell Times for many organisations to be upwards of 191 days.

Speaker Profile

Krishna Gupta is a Certified Ethical Hacker and has over a decade of industrial information security experience ranging from Offensive Security to Information Security Management Systems.

X Topic Abstract

With the latest wave of computing, we have technology floating everywhere from infrastructure to people and devices. Threats and attacks are at every stage, and with the golden age of AI and ML, more sophisticated than ever before. We'll review each stage of the product lifecycle with attacks it attracts and defence it deserves.

Speaker Profile

Shantanu is a Technology & Security Consultant with expertise on AI and Machine Learning. Coding since his early days, he has published papers on game theory and encryption. He has founded 2 start-ups based out of Bangalore and San Francisco, primarily in Product Engineering space where he was neck deep in designing tech for FinTech, Real Estate, Logistics, News & Entertainment, Fraud Detection, and Lifestyle. Upon his successful exits, Shantanu spends time with academia, community and designs security with machine learning.

schedule 08:45AM - 09:00AM Registration / Conference Overview
schedule 09:00AM - 09:30AM Importance of Application Security - Click Here for More Info
Santosh Kumar Jinugu, Director, Deloitte India
speaker 09:30AM - 10:00AM Protecting the Payment Eco-system - Click Here for More Info
Paras Arora, Director - Cyber Security, PwC India
schedule 10:00AM - 10:15AM Tea Break
speaker 10:15AM - 10:45AM Data Protection in the Age of Digital Disruption - Click Here for More Info
Ravinder P Singh, Director : Cybersecurity, Digital Healthcare & Digital Cities India Public Sector, Dell EMC
speaker 10:45AM - 11:15AM Mobile Application (In) Security, And How it Effects - Click Here for More Info
Harshad Shah, CISO(Chief Information Security Officer), Global Institute of Cyber Security Research)
speaker 11:15AM - 11:45AM Big Brother's Tradecraft : Cloak & Dagger - Click Here for More Info
Swapnil Kishore, Founder & CEO, Covert Overt Intelligence Solutions (COVINTS)
speaker 11:45AM - 12:15PM Serverless Security: Where Future Belong? - Click Here for More Info
Gaurav Gupta, Director Of Engineering, Incedo Inc.
speaker 12:15PM - 12:45PM Cyber Security Best Practices and Expectations of the Future - Click Here for More Info
Unnikrishnan P, Partner, Cyber Security Services, PWC
schedule 12:45PM - 01:45PM Lunch Break
speaker 01:45PM - 02:15PM De-Risking Business and Being Compliant - Click Here for More Info
Ramesh Kauta, Advisor & Mentor of Start-ups in Cyber Security/Privacy & Research Partner at DSCI (NASSCOM) | Chief Product Officer, SecurelyShare
speaker 02:15PM - 02:45PM Demystifying Robotics Process Automation - Agile Boon or Security Threat - Click Here for More Info
Avinash Iyer, Associate Director - Cyber Security, PwC India
speaker 02:45PM - 03:15PM Building Strong Cyber Incident Response capabilities - Click Here for More Info
Venkat Ramshet, Founder, FlexibleIR
speaker 03:15PM - 03:45PM Challenges and Opportunities for Auditing With Blockchain - Click Here for More Info
Amith G, Director, Cyber Security, Advisory Services, Ernst & Young
schedule 03:45PM - 04:15PM Tea Break
speaker 04:15PM - 04:45PM Towards Verifiable Infrastructure Security - Click Here for More Info
Abhisek Datta, Head of Technology, Appsecco
speaker 04:45PM - 05:15PM Phases of a Cyberattack - Click Here for More Info
Krishna Gupta, Founder, Chief Penetration Tester & Managing Director, OMVAPT Private Limited
speaker 05:15PM - 05:45PM Security of Everything: From Origin to End-Point - Click Here for More Info
Shantanu Pandey, CTO, Netlabs AI

Register Your Attendance At Conference 2018

Any Question? Call: +91 9513512101

Conference Ticket Price & Plan

Group of 3 or more

Rs 6000 + GST

Till 14th December, 2018

Conference ticket

Tea break

Early Bird

Rs 5000 + GST

Till 14th November, 2018

Conference ticket

Tea break

Standard

Rs 7000 + GST

Till 14th December, 2018

Conference ticket

Tea break

To Register Via Eventbrite