The cyber criminals had a field day last year. There were breaches the world over, whether it was the ATMs of Indian banks or the Yahoo breach or the Linked In information heist of 6.5 million accounts. Today cyber crime is a flourishing industry that targets enterprises across the spectrum. Malware attacks, phishing and cyber espionage attacks are becoming more frequent than ever. Experts say that the threat landscape in 2017 is going to get murkier as threats will become more sophisticated. Securing your networks and end points will only get more complex moving forward.
So far, the cyber criminals and unethical hackers have been one step ahead of the custodians of information in enterprises. In the months to come, organizations will have to be proactive while protecting their information assets.
BW CIO World CISO Strategy Summit, 2017 is a platform designed to bring together CIOs, CSOs and technology providers together and facilitate constructive knowledge-sharing that will help them identify vulnerabilities, discuss effective solutions and chalk out strategies that will help them combat both external and internal threats. The summit will help CIOs and CSOs to share best practices while helping technology providers to understand the information security challenges faced by enterprises in India.
Editor's Note
Keynote Address: Securing India's cyber space
Cyber security strategies for 2017-18
Networking Tea & Coffee Break
Networking Lunch Break
The Internet of Things (IoT) is at a tipping point in enterprises. According to estimates, by 2020, 50 billion devices will get connected to the Internet, thereby opening up a whole new world of analytics. However, IoT can be a double-edged sword. While this new trend promises data exchange like never before, it also opens up an enterprise to vulnerabilities. This ever-topical discussion will address the issues surrounding IoT, and how security leaders can skirt them to create new business models, enhance productivity, and generate new revenue stream for their companies.
The banking and financial industry is continuously visualizing global terrorism, regional instability, transcontinental criminal networks, physical risks, modern threats originating from opaque sources, cyber sabotage and espionage that are destabilizing the critical infrastructure. Besides, the demand for security compliance management in accordance with federal and state regulations to implement solutions that protect the framework is growing in the BFSI sector. This session takes a look at how CISOs in the banking vertical stay ahead of hackers and breaches.
Almost all enterprises have cloud and mobility high up on their agendas. The benefits of enhanced productivity and competitive differentiation are far too compelling to ignore them. But this also leaves their organizations vulnerable to advanced threats and risks that conventional security solutions find tough to counter. This top-of- the-mind and very relevant sessions throws light on what are the new approaches that CISOs are contemplating to securely adopt mobility and cloud.
There are several variables that a CISO has to asses before zeroing on the right security solution provider. The vendor evaluation process is a huge ask given that a CISO has to address issues such as regulatory compliance, risk appetite, budget restraints and existing technology compatibility. This interesting session will discuss the various facets involved in security vendor vetting and selection process.
The year 2014 saw the notorious credit card thefts as The Home Depot, Target and Michael’s got breached. Last year, it was the healthcare industry that bore the brunt of cyber-attacks with more than 100 million people getting impacted. As we are halfway through the calendar year 2016, we ask the big question of what is the next big trend or target of IT security over the next 12 months, and how can CISOs pre-empt it.
The 21st Century offers new challenges for CISOs in the government domain. With hundreds of millions of people online, they expect to reach out to the government and public sector companies in a seamless, reliable and secure environment. Meanwhile, public sector employees also need to connect and collaborate across multiple geographies and agencies in real time. A public sector CISO, therefore, has his task cut out. This session will deliberate on challenge, opportunities and the way ahead for CISOs in the public sector.
The 21st Century offers new challenges for CISOs in the government domain. With hundreds of millions of people online, they expect to reach out to the government and public sector companies in a seamless, reliable and secure environment. Meanwhile, public sector employees also need to connect and collaborate across multiple geographies and agencies in real time. A public sector CISO, therefore, has his task cut out. This session will deliberate on challenge, opportunities and the way ahead for CISOs in the public sector.
The 21st Century offers new challenges for CISOs in the government domain. With hundreds of millions of people online, they expect to reach out to the government and public sector companies in a seamless, reliable and secure environment. Meanwhile, public sector employees also need to connect and collaborate across multiple geographies and agencies in real time. A public sector CISO, therefore, has his task cut out. This session will deliberate on challenge, opportunities and the way ahead for CISOs in the public sector.