Join the Summit

Do not miss out on the most updated Cyber Security Summit!

ABOUT THE SUMMIT

With evolving cyber-attacks and continuous development of new malware variants each day, businesses should make sure that their endpoints are secure by employing the right security controls as defined by Centre for Internet Security. The Cyber Security Summit is an one day event emphasizing on the key factors required to drive a full proof security for your mobile and computer networks deployed by various organizations.

Whether you’re interested in protecting your company or providing better security for others, the Cyber Security event is your mecca of information and innovation. This event will include sessions developed to help achieve cooperative solutions and industry teaming to defend against the ever-growing cyber threat.

Who should attend:
• CIO/CISOs/Senior IT Executives Corporate IT teams
• Systems Administrators
• Network Administrators
• IT/IS Managers
• ISMS Professionals
• Information Security Professionals.
• Penetration Testers
• Heads of Information Security
• Heads of Risk and Compliance
• Data Analytics
• Chief Privacy Officers
• Chief Risk Officers

Topics to be covered:
• Industrial Control Systems
• Digital Forensics & Incident Response
• Security Operations
• Cyber Threat Intelligence
• Security Awareness
• Cloud Security
• Data Breach
• Secure DevOps
• SIEM & Tactical Analytics
• Enumeration, Target Selection verification.
• Windows Exploitation
• Metasploit Toolkit
• Botnet, DDOS Attacks.
• Social Engineering
• Buffer Overflow
• Direct and Indirect Targeted attacks.
• Customized network interception and decryption.
• Advanced snooping and Backdoors.
• SQL Injection
• Penetration Testing

Why Attend:
• An opportunity to position yourself at the centre of influence, cultivate mutually beneficial relationships & at the end of the day
• Get up-to-date with intelligence about global security threats and other topics from leading security experts.
• Learn evolving methods to detect and attack various cyber threats and malware.
• Get insights on various industry approaches and technology used along with the key factors governing it’s development.
• Gain insights to help you develop a comprehensive approach to ICS/OT Cyber Security
• Learn about new policies & regulations
• Get insights on Government initiatives

7+ Professional Speakers

50+ Delegates

Networking Session


Register

Chairperson

  • DR. SHANKAR RAMAMOORTHY

    CMRIT

Our speakers

  • Avinash Iyer

    PwC

  • Dr. Aditya Mukherjee

    Accenture

  • DR. SHANKAR RAMAMOORTHY

    CMRIT

  • Sitesh Behera

    BankBazaar

  • Mansi Thapar

    Jaquar Group

  • Subho Halder

    Appknox

  • Anand Tapikar

    GE healthcare

  • Lavakumar Kuppan

    Ironwasp Security

  • Ranjeet Thakur

    PayPal

  • Vishal Saraswat

    Bosch Engineering and Business Solutions

PROGRAM

Dr. Shankar Ramamoorthy, Professor- Information Science Engineering, Head - Industry- Interface, CMRIT

Topic Abstract

Cybercriminals are going to create 3.5 million new, unfilled cybersecurity jobs by 2021. Compare that with one million openings in 2016. That’s an increase of 350 percent in just five years.And with that increase comes some serious cybersecurity revenue dedication. Everywhere, businesses are investing a remarkable amount of money into hiring security professionals, maintaining customer privacy and avoiding ransomware attacks.In 2017 alone, all of those protection efforts cost businesses $86.4 billion

The author will be discussing 5 Trends namely how Ransomware Evolution, AI Expansion, IOT Threats , Block chain revolution and Serverless Apps Vulnerability will pose challenges to Cyber Security frameworks of organization. The paper will also be discussing what are the solutions to address the above challenges.

Mansi Thapar, Head - Information Security, Jaquar Group

Topic Abstract

Cybercrime is the greatest threat to every company in the world. - “Cyber-attacks are the number one problem with mankind, even worse than nuclear weapons.” Having said that, we as security professionals work endless to identify, protect, detect, respond and recover from security incidents. We deploy world class perimeter, network, port and end point security to protect our corporates from incidents and protect our crown jewels from being breached. But somewhere in this constant endeavour, we miss to cater to the the main reason for cyber incidents. – THE HUMAN FACTOR.

Various reports indicate Human error to be the most dominant reason for cyber-attacks in an organisation. Top 5 human errors being falling for email phishing, letting unauthorised users accessing corporate devices, poor user managed passwords, poorly managed privileged accounts and mis-delivery. All these points, have one underlying solution – USER AWARENESS. I know most of you must have automated measures in place for privileged accounts, auto password policy etc, but breaches still happen.

Below are some of the tips/topics on creating a security training programme to close the gap between the weakest link (Human Factor) and security

Training module should cover at least the following mentioned awareness trainings

  • Email security
  • Mind of a hacker
  • Use of Freeware
  • Passwords
  • Clear Desk
  • Privacy
  • Security of mobile devices
  • Social engineering
  • Identity theft
  • Insider threats
  • Securing supplier relationships
  • Access control
  • Backup Importance
  • Cloud security
  • Importance of Cybersecurity
  • Viruses
  • Protecting intellectual property

Avinash Iyer, Associate Director- Cyber Security, PwC

Topic Abstract

We live in a world of connected devices. Do these devices only increase the ease of our lifestyle or are they increasing any risks to us as well? What’s the best ways of incorporating IOT into our lives.

Dr. Aditya Mukherjee, Security Leader, Accenture

Topic Abstract

The the information security industry is a fast-paced ever-transforming field, which in the past couple of years with the influx of off-the-shelf malware, advance exploit kits and paid DDoS services has seen an increase in the importance of timely, proactive response. To enable the organization to successfully mount an impregnable defense, the need of the hour is to capture, analyze and provide actionable information that can be used to safeguard the organization. Enter ‘Cyber Threat intelligence’.

Cyber Threat Intelligence is a new yet massively evolving domain in information security today. Since the beginning of time, Information (Knowledge) has always been regarded as a critical form of an advantage in any strategy-making process. CTI over the years has rolled from a previously perceived set of skills and techniques to a well-defined framework with the new infused market requirements spawning from the recent threat activities in the ever-changing IT landscape which has bought sophisticated attacks such as State-sponsored cyber-attacks, Ransomware, APT’s, Zero-days and Hacktivism that is now at the very doorstep of government, big & small corporations alike.

Vishal Saraswat, Information Security Expert, Bosch Engineering and Business Solutions

Topic Abstract

Sitesh Behera, Sr Manager - Infrastructure Platform, BankBazaar

Topic Abstract

Today SOC has been bombarded with huge amount of data we collect from deployed infra across office / prod landscapes. The major threat which is ignored today is present internally. The project discusses how to analyse such data and pinpoint anomalies using machine learning. This helps in focusing SOC team to focus on anomalies and quick response to them.

Subho Halder, Co-Founder and CTO, Appknox

Topic Abstract

Mobile adoption is strategic in every industry today. Although it can be a great catalyst for growth, the security risks that come with it cannot be overlooked. Even though this fact is established, many companies are still not following some of the mobile application security best practices. The goal of this is to raise awareness about application security by identifying some of the most critical risks facing organizations during development.

We will be covering from basic OWASP top 10 security issues to live demos on different use-case scenarios on how a hacker can hack your application, and how to prevent them.

Ranjeet Thakur, Senior Engineering Manager -CyberSecurity, PayPal

Topic Abstract

Why IAM is needed for Corps? some common patterns of implementation

Anand Tapikar, Product security Leader, GE healthcare

Topic Abstract

What will be covered in the presentation

  • Common attacks on Container infra – Like cross container attacks, data snooping, rogue containers
  • 10 Strategies to build good K8s and container infrastructure
  • Pentation testing K8s infra
  • Data encryption, authentication and RBAC within K8s
  • Secure Secrets storage and protection from data snooping
  • Overview of open source/commercial tools that can be leveraged
  • K8s and container Benchmarks

How this topic is relevant

  • 1 out of 5 organization going for container installation
  • Container security attack vectors are rising
  • Recently major vulnerability discovered in containers and got good media attention

Lavakumar Kuppan, Founder, Ironwasp Security

Topic Abstract

British Airways is looking at the possibility of being fined ~230 million USD for not stopping the compromise the financial information of about 500,000 customers.

This information was stolen using a new attack that went undetected long enough to affect a significant number of users. BA was not the only casualty here, there were several major firms that were affected and in every case the attacks went undetected for unreasonably long durations. Just this month it was found that over 17,000 sites were affected by this attack. Security teams are unprepared to detect this attack and protect their assets against it.

This talk will explain this attack, list out the various techniques used to carry out this attack and then introduce several approaches that security teams can take to handle this attack.

Venue

Hyatt Centric MG Road Bangalore

Address

1/1, Swamy Vivekananda Rd, Someshwarpura, Halasuru, Bengaluru, Karnataka 560008

Phone: 080 4936 1234

Register

Register

BRAND YOUR ORGANISATION (for startups)

Standard Price : Rs 30,000 + GST

You can choose to strategically brand your organisation as per the below offer

Package includes:

1.Speaking Slot - 30-45 minutes

2.One additional pass apart from Speaker

3.Space to keep standees/roll-ups

4.Website Branding and cross-linking to your website

5.Logo on Agenda

6.Name Tag Branding

7.Brochure Inserts - You can bring along offerings of your services/products. We will add them as part of the conference kit

8.Social Media Promotions about your company sponsoring the event

Register

Knowledge Partner

SPEAKER RESPONSE FORM



DOWNLOAD BROCHURE

DISCLAIMER AND INDEMNITY

Confirm your CANCELLATION in writing up to 15 working days before the event and receive a refund less a 10% service charge. Regrettably, no refunds can be made for cancellations received less than 15 working days prior to the event.

However, SUBSTITUTIONS are welcome at any time and is done at no extra cost. The organisers reserve the right to amend the programme if necessary.

Important Disclaimer:The organizers reserve the right to make substitutions or alterations and/or cancel a speaker(s) if deemed necessary by circumstances beyond its control.

INDEMNITY: Should for any reason outside the control of UNICOM Training & Seminars (P) ltd (hereafter called UNICOM), the venue or the speakers change, or the event be cancelled due to industrial action, adverse weather conditions, or an act of terrorism, UNICOM will endeavour to reschedule, but the client hereby indemnifies and holds UNICOM harmless from and against any and all costs, damages and expenses, including attorneys fees, which are incurred by the client. The construction validity and performance of this Agreement shall be governed by all aspects by the laws of India to the exclusive jurisdiction of whose court the Parties hereby agree to submit.