Do not miss out on the most updated Cyber Security Summit!
With evolving cyber-attacks and continuous development of new malware variants each day, businesses should make sure that their endpoints are secure by employing the right security controls as defined by Centre for Internet Security. The Cyber Security Summit is an one day event emphasizing on the key factors required to drive a full proof security for your mobile and computer networks deployed by various organizations.
Whether you’re interested in protecting your company or providing better security for others, the Cyber Security event is your mecca of information and innovation. This event will include sessions developed to help achieve cooperative solutions and industry teaming to defend against the ever-growing cyber threat.
Who should attend:
• CIO/CISOs/Senior IT Executives Corporate IT teams
• Systems Administrators
• Network Administrators
• IT/IS Managers
• ISMS Professionals
• Information Security Professionals.
• Penetration Testers
• Heads of Information Security
• Heads of Risk and Compliance
• Data Analytics
• Chief Privacy Officers
• Chief Risk Officers
Topics to be covered:
• Industrial Control Systems
• Digital Forensics & Incident Response
• Security Operations
• Cyber Threat Intelligence
• Security Awareness
• Cloud Security
• Data Breach
• Secure DevOps
• SIEM & Tactical Analytics
• Enumeration, Target Selection verification.
• Windows Exploitation
• Metasploit Toolkit
• Botnet, DDOS Attacks.
• Social Engineering
• Buffer Overflow
• Direct and Indirect Targeted attacks.
• Customized network interception and decryption.
• Advanced snooping and Backdoors.
• SQL Injection
• Penetration Testing
• An opportunity to position yourself at the centre of influence, cultivate mutually beneficial relationships & at the end of the day
• Get up-to-date with intelligence about global security threats and other topics from leading security experts.
• Learn evolving methods to detect and attack various cyber threats and malware.
• Get insights on various industry approaches and technology used along with the key factors governing it’s development.
• Gain insights to help you develop a comprehensive approach to ICS/OT Cyber Security
• Learn about new policies & regulations
• Get insights on Government initiatives
Mansi Thapar, Head - Information Security, Jaquar Group
Cybercrime is the greatest threat to every company in the world. - “Cyber-attacks are the number one problem with mankind, even worse than nuclear weapons.” Having said that, we as security professionals work endless to identify, protect, detect, respond and recover from security incidents. We deploy world class perimeter, network, port and end point security to protect our corporates from incidents and protect our crown jewels from being breached. But somewhere in this constant endeavour, we miss to cater to the the main reason for cyber incidents. – THE HUMAN FACTOR.
Various reports indicate Human error to be the most dominant reason for cyber-attacks in an organisation. Top 5 human errors being falling for email phishing, letting unauthorised users accessing corporate devices, poor user managed passwords, poorly managed privileged accounts and mis-delivery. All these points, have one underlying solution – USER AWARENESS. I know most of you must have automated measures in place for privileged accounts, auto password policy etc, but breaches still happen.
Below are some of the tips/topics on creating a security training programme to close the gap between the weakest link (Human Factor) and security
Training module should cover at least the following mentioned awareness trainings
Avinash Iyer, Associate Director- Cyber Security, PwC
We live in a world of connected devices. Do these devices only increase the ease of our lifestyle or are they increasing any risks to us as well? What’s the best ways of incorporating IOT into our lives.
Dr. Aditya Mukherjee, Security Leader, Accenture
The the information security industry is a fast-paced ever-transforming field, which in the past couple of years with the influx of off-the-shelf malware, advance exploit kits and paid DDoS services has seen an increase in the importance of timely, proactive response. To enable the organization to successfully mount an impregnable defense, the need of the hour is to capture, analyze and provide actionable information that can be used to safeguard the organization. Enter ‘Cyber Threat intelligence’.
Cyber Threat Intelligence is a new yet massively evolving domain in information security today. Since the beginning of time, Information (Knowledge) has always been regarded as a critical form of an advantage in any strategy-making process. CTI over the years has rolled from a previously perceived set of skills and techniques to a well-defined framework with the new infused market requirements spawning from the recent threat activities in the ever-changing IT landscape which has bought sophisticated attacks such as State-sponsored cyber-attacks, Ransomware, APT’s, Zero-days and Hacktivism that is now at the very doorstep of government, big & small corporations alike.
Vishal Saraswat, Information Security Expert, Bosch Engineering and Business Solutions
Sitesh Behera, Sr Manager - Infrastructure Platform, BankBazaar
Today SOC has been bombarded with huge amount of data we collect from deployed infra across office / prod landscapes. The major threat which is ignored today is present internally. The project discusses how to analyse such data and pinpoint anomalies using machine learning. This helps in focusing SOC team to focus on anomalies and quick response to them.
Subho Halder, Co-Founder and CTO, Appknox
Mobile adoption is strategic in every industry today. Although it can be a great catalyst for growth, the security risks that come with it cannot be overlooked. Even though this fact is established, many companies are still not following some of the mobile application security best practices. The goal of this is to raise awareness about application security by identifying some of the most critical risks facing organizations during development.
We will be covering from basic OWASP top 10 security issues to live demos on different use-case scenarios on how a hacker can hack your application, and how to prevent them.
Ranjeet Thakur, Senior Engineering Manager -CyberSecurity, PayPal
Why IAM is needed for Corps? some common patterns of implementation
Anand Tapikar, Product security Leader, GE healthcare
What will be covered in the presentation
How this topic is relevant
Lavakumar Kuppan, Founder, Ironwasp Security
British Airways is looking at the possibility of being fined ~230 million USD for not stopping the compromise the financial information of about 500,000 customers.
This information was stolen using a new attack that went undetected long enough to affect a significant number of users. BA was not the only casualty here, there were several major firms that were affected and in every case the attacks went undetected for unreasonably long durations. Just this month it was found that over 17,000 sites were affected by this attack. Security teams are unprepared to detect this attack and protect their assets against it.
This talk will explain this attack, list out the various techniques used to carry out this attack and then introduce several approaches that security teams can take to handle this attack.
Hyatt Centric MG Road Bangalore
1/1, Swamy Vivekananda Rd, Someshwarpura, Halasuru, Bengaluru, Karnataka 560008
Phone: 080 4936 1234
Rs 6,999 + GST
Rs 7,999 + GST
Rs 8,999 + GST
Rs 30,000 + GST
We are truly committed to these events and have seen a great return from the events we have been involved with this year. The real value for us here is having the opportunity to present and talk to the delegates during the networking breaks.
Was an excellent event!
Well done – an excellent event! We were very happy with the number and quality of delegates
Standard Price : Rs 30,000 + GST
You can choose to strategically brand your organisation as per the below offer
1.Speaking Slot - 30-45 minutes
2.One additional pass apart from Speaker
3.Space to keep standees/roll-ups
4.Website Branding and cross-linking to your website
5.Logo on Agenda
6.Name Tag Branding
7.Brochure Inserts - You can bring along offerings of your services/products. We will add them as part of the conference kit
8.Social Media Promotions about your company sponsoring the event
Confirm your CANCELLATION in writing up to 15 working days before the event and receive a refund less a 10% service charge. Regrettably, no refunds can be made for cancellations received less than 15 working days prior to the event.
However, SUBSTITUTIONS are welcome at any time and is done at no extra cost. The organisers reserve the right to amend the programme if necessary.
Important Disclaimer:The organizers reserve the right to make substitutions or alterations and/or cancel a speaker(s) if deemed necessary by circumstances beyond its control.
INDEMNITY: Should for any reason outside the control of UNICOM Training & Seminars (P) ltd (hereafter called UNICOM), the venue or the speakers change, or the event be cancelled due to industrial action, adverse weather conditions, or an act of terrorism, UNICOM will endeavour to reschedule, but the client hereby indemnifies and holds UNICOM harmless from and against any and all costs, damages and expenses, including attorneys fees, which are incurred by the client. The construction validity and performance of this Agreement shall be governed by all aspects by the laws of India to the exclusive jurisdiction of whose court the Parties hereby agree to submit.