Do not miss out on the most updated Cyber Security Summit!
With evolving cyber-attacks and continuous development of new malware variants each day, businesses should make sure that their endpoints are secure by employing the right security controls as defined by Centre for Internet Security. The Cyber Security Summit is an one day event emphasizing on the key factors required to drive a full proof security for your mobile and computer networks deployed by various organizations.
Whether you’re interested in protecting your company or providing better security for others, the Cyber Security event is your mecca of information and innovation. This event will include sessions developed to help achieve cooperative solutions and industry teaming to defend against the ever-growing cyber threat.
Who should attend:
• CIO/CISOs/Senior IT Executives Corporate IT teams
• Systems Administrators
• Network Administrators
• IT/IS Managers
• ISMS Professionals
• Information Security Professionals.
• Penetration Testers
• Heads of Information Security
• Heads of Risk and Compliance
• Data Analytics
• Chief Privacy Officers
• Chief Risk Officers
Topics to be covered:
• Industrial Control Systems
• Digital Forensics & Incident Response
• Security Operations
• Cyber Threat Intelligence
• Security Awareness
• Cloud Security
• Data Breach
• Secure DevOps
• SIEM & Tactical Analytics
• Enumeration, Target Selection verification.
• Windows Exploitation
• Metasploit Toolkit
• Botnet, DDOS Attacks.
• Social Engineering
• Buffer Overflow
• Direct and Indirect Targeted attacks.
• Customized network interception and decryption.
• Advanced snooping and Backdoors.
• SQL Injection
• Penetration Testing
Why Attend:
• An opportunity to position yourself at the centre of influence, cultivate mutually beneficial
relationships & at the end of the day
• Get up-to-date with intelligence about global security threats and other topics from leading
security experts.
• Learn evolving methods to detect and attack various cyber threats and malware.
• Get insights on various industry approaches and technology used along with the key factors
governing it’s development.
• Gain insights to help you develop a comprehensive approach to ICS/OT Cyber Security
• Learn about new policies & regulations
• Get insights on Government initiatives
08.45AM
Subho Halder, Co-Founder and CTO, Appknox
Mobile adoption is strategic in every industry today. Although it can be a great catalyst for growth, the security risks that come with it cannot be overlooked. Even though this fact is established, many companies are still not following some of the mobile application security best practices. The goal of this is to raise awareness about application security by identifying some of the most critical risks facing organizations during development.
We will be covering from basic OWASP top 10 security issues to live demos on different use-case scenarios on how a hacker can hack your application, and how to prevent them.
10.00AM
Avinash Iyer, Associate Director- Cyber Security, PwC
We live in a world of connected devices. Do these devices only increase the ease of our lifestyle or are they increasing any risks to us as well? What’s the best ways of incorporating IOT into our lives.
Dr. Aditya Mukherjee, Security Leader, Accenture
The the information security industry is a fast-paced ever-transforming field, which in the past couple of years with the influx of off-the-shelf malware, advance exploit kits and paid DDoS services has seen an increase in the importance of timely, proactive response. To enable the organization to successfully mount an impregnable defense, the need of the hour is to capture, analyze and provide actionable information that can be used to safeguard the organization. Enter ‘Cyber Threat intelligence’.
Cyber Threat Intelligence is a new yet massively evolving domain in information security today. Since the beginning of time, Information (Knowledge) has always been regarded as a critical form of an advantage in any strategy-making process. CTI over the years has rolled from a previously perceived set of skills and techniques to a well-defined framework with the new infused market requirements spawning from the recent threat activities in the ever-changing IT landscape which has bought sophisticated attacks such as State-sponsored cyber-attacks, Ransomware, APT’s, Zero-days and Hacktivism that is now at the very doorstep of government, big & small corporations alike.
Vishal Saraswat, Information Security Expert, Bosch Engineering and Business Solutions
Although quantum computers of an appropriate size still do not exist, given the recent developments in the field of quantum computer construction and the present rate at which the dependency of the developing societies on secure information technology is growing, there is an immediate need of alternative public key cryptosystems which can be implemented on today’s computers and would be secure enough in a post quantum era. We present a brief overview of the current developments.
Sitesh Behera, Sr Manager - Infrastructure Platform, BankBazaar
Today SOC has been bombarded with huge amount of data we collect from deployed infra across office / prod landscapes. The major threat which is ignored today is present internally. The project discusses how to analyse such data and pinpoint anomalies using machine learning. This helps in focusing SOC team to focus on anomalies and quick response to them.
Mansi Thapar, Head - Information Security, Jaquar Group
Cybercrime is the greatest threat to every company in the world. - “Cyber-attacks are the number one problem with mankind, even worse than nuclear weapons.” Having said that, we as security professionals work endless to identify, protect, detect, respond and recover from security incidents. We deploy world class perimeter, network, port and end point security to protect our corporates from incidents and protect our crown jewels from being breached. But somewhere in this constant endeavour, we miss to cater to the the main reason for cyber incidents. – THE HUMAN FACTOR.
Various reports indicate Human error to be the most dominant reason for cyber-attacks in an organisation. Top 5 human errors being falling for email phishing, letting unauthorised users accessing corporate devices, poor user managed passwords, poorly managed privileged accounts and mis-delivery. All these points, have one underlying solution – USER AWARENESS. I know most of you must have automated measures in place for privileged accounts, auto password policy etc, but breaches still happen.
Below are some of the tips/topics on creating a security training programme to close the gap between the weakest link (Human Factor) and security
Training module should cover at least the following mentioned awareness trainings
01.00PM
02.00PM
Before you are overwhelmed by questions as you course through the excellent learning sessions with our speakers, get answers and better insights to your doubts through 'Ask me Anything'. Here is an opportunity to undertake a balb session where you get to ask any question relative to the event and gain professional guidelines and cognisance form individuals with in depth knowledge on the subject matter. With this effective Q/A session we allow you to address the most burning questions by asking our team of influential and expert speakers.
Ranjeet Thakur, Senior Engineering Manager -CyberSecurity, PayPal
Why IAM is needed for Corps? some common patterns of implementation
03.15PM
Anand Tapikar, Product security Leader, GE healthcare
What will be covered in the presentation
How this topic is relevant
Manjul Verma, Master Security Architect, HP
Due to the ever-changing threat landscape of adversaries, and government regulations to protect the public interest and user data, there has been a greater focus on the security of end-point computing systems.
To ensure, endpoint computing system remains secure when used in both personal and business, there is a significant attention from manufacturers and vendors to deliver security built on defense-in-depth principles to protect data - resides on rest, in use or in transit.
This session should help one become self-aware of potential threats of end-point systems and layered security controls applied for protection that help in the further learning.
The Chancery Pavilion
135, Residency Rd, Shanthala Nagar, Ashok Nagar, Bengaluru, Karnataka 560025
Phone: 080 4141 4141
1
Power-Packed Day!
7+
50
Attendees
Bangalore
Rs 6,999 + GST
Rs 7,999 + GST
Rs 8,999 + GST
Rs 30,000 + GST
We are truly committed to these events and have seen a great return from the events we have been involved with this year. The real value for us here is having the opportunity to present and talk to the delegates during the networking breaks.
IBM
Was an excellent event!
Hewlett-Packard
Well done – an excellent event! We were very happy with the number and quality of delegates
Oracle Corporation
Standard Price : Rs 30,000 + GST
You can choose to strategically brand your organisation as per the below offer
Package includes:
1.Speaking Slot - 30-45 minutes
2.One additional pass apart from Speaker
3.Space to keep standees/roll-ups
4.Website Branding and cross-linking to your website
5.Logo on Agenda
6.Name Tag Branding
7.Brochure Inserts - You can bring along offerings of your services/products. We will add them as part of the conference kit
8.Social Media Promotions about your company sponsoring the event
Confirm your CANCELLATION in writing up to 15 working days before the event and receive a refund less a 10% service charge. Regrettably, no refunds can be made for cancellations received less than 15 working days prior to the event.
However, SUBSTITUTIONS are welcome at any time and is done at no extra cost. The organisers reserve the right to amend the programme if necessary.
Important Disclaimer:The organizers reserve the right to make substitutions or alterations and/or cancel a speaker(s) if deemed necessary by circumstances beyond its control.
INDEMNITY: Should for any reason outside the control of UNICOM Training & Seminars (P) ltd (hereafter called UNICOM), the venue or the speakers change, or the event be cancelled due to industrial action, adverse weather conditions, or an act of terrorism, UNICOM will endeavour to reschedule, but the client hereby indemnifies and holds UNICOM harmless from and against any and all costs, damages and expenses, including attorneys fees, which are incurred by the client. The construction validity and performance of this Agreement shall be governed by all aspects by the laws of India to the exclusive jurisdiction of whose court the Parties hereby agree to submit.