About the event

Registrations

Changing The Cyber Security Game

The cyber criminals had a field day last year. There were breaches the world over, whether it was the ATMs of Indian banks or the Yahoo breach or the Linked In information heist of 6.5 million accounts. Today cyber crime is a flourishing industry that targets enterprises across the spectrum. Malware attacks, phishing and cyber espionage attacks are becoming more frequent than ever. Experts say that the threat landscape in 2017 is going to get murkier as threats will become more sophisticated. Securing your networks and end points will only get more complex moving forward.

So far, the cyber criminals and unethical hackers have been one step ahead of the custodians of information in enterprises. In the months to come, organizations will have to be proactive while protecting their information assets.

BW CIO World CISO Strategy Summit, 2017 is a platform designed to bring together CIOs, CSOs and technology providers together and facilitate constructive knowledge-sharing that will help them identify vulnerabilities, discuss effective solutions and chalk out strategies that will help them combat both external and internal threats. The summit will help CIOs and CSOs to share best practices while helping technology providers to understand the information security challenges faced by enterprises in India.

Events Schedule

Registration

Inauguration Session

Editor's Note

Keynote Address: Securing India's cyber space

Panel Discussion

Cyber security strategies for 2017-18

Breaks

Networking Tea & Coffee Break

Networking Lunch Break

All Session

10:25am- 11:00am Session 1 Protecting Endpoints, the weakest links in your chain

The Internet of Things (IoT) is at a tipping point in enterprises. According to estimates, by 2020, 50 billion devices will get connected to the Internet, thereby opening up a whole new world of analytics. However, IoT can be a double-edged sword. While this new trend promises data exchange like never before, it also opens up an enterprise to vulnerabilities. This ever-topical discussion will address the issues surrounding IoT, and how security leaders can skirt them to create new business models, enhance productivity, and generate new revenue stream for their companies.

Session 2 11:10am- 11:45am Network Security: Emerging Challenges

The banking and financial industry is continuously visualizing global terrorism, regional instability, transcontinental criminal networks, physical risks, modern threats originating from opaque sources, cyber sabotage and espionage that are destabilizing the critical infrastructure. Besides, the demand for security compliance management in accordance with federal and state regulations to implement solutions that protect the framework is growing in the BFSI sector. This session takes a look at how CISOs in the banking vertical stay ahead of hackers and breaches.

Session 3 11:45am- 12:20pm Application Security

Almost all enterprises have cloud and mobility high up on their agendas. The benefits of enhanced productivity and competitive differentiation are far too compelling to ignore them. But this also leaves their organizations vulnerable to advanced threats and risks that conventional security solutions find tough to counter. This top-of- the-mind and very relevant sessions throws light on what are the new approaches that CISOs are contemplating to securely adopt mobility and cloud.

Session 4 12:20pm- 01:00pm Threat prevention strategies

There are several variables that a CISO has to asses before zeroing on the right security solution provider. The vendor evaluation process is a huge ask given that a CISO has to address issues such as regulatory compliance, risk appetite, budget restraints and existing technology compatibility. This interesting session will discuss the various facets involved in security vendor vetting and selection process.

Session 5 02:00pm- 02:35pm Dealing with Internal threats

The year 2014 saw the notorious credit card thefts as The Home Depot, Target and Michael’s got breached. Last year, it was the healthcare industry that bore the brunt of cyber-attacks with more than 100 million people getting impacted. As we are halfway through the calendar year 2016, we ask the big question of what is the next big trend or target of IT security over the next 12 months, and how can CISOs pre-empt it.

Session 6 02:35pm- 03:10pm Next Generation Firewalls

The 21st Century offers new challenges for CISOs in the government domain. With hundreds of millions of people online, they expect to reach out to the government and public sector companies in a seamless, reliable and secure environment. Meanwhile, public sector employees also need to connect and collaborate across multiple geographies and agencies in real time. A public sector CISO, therefore, has his task cut out. This session will deliberate on challenge, opportunities and the way ahead for CISOs in the public sector.

Session 7 03:10pm- 03:45pm Information security analytics

The 21st Century offers new challenges for CISOs in the government domain. With hundreds of millions of people online, they expect to reach out to the government and public sector companies in a seamless, reliable and secure environment. Meanwhile, public sector employees also need to connect and collaborate across multiple geographies and agencies in real time. A public sector CISO, therefore, has his task cut out. This session will deliberate on challenge, opportunities and the way ahead for CISOs in the public sector.

Session 8 03:45pm- 04:20pm Securing the Cloud

The 21st Century offers new challenges for CISOs in the government domain. With hundreds of millions of people online, they expect to reach out to the government and public sector companies in a seamless, reliable and secure environment. Meanwhile, public sector employees also need to connect and collaborate across multiple geographies and agencies in real time. A public sector CISO, therefore, has his task cut out. This session will deliberate on challenge, opportunities and the way ahead for CISOs in the public sector.

Our Speakers

  • #

    Manan Godil

    Associate Director and CISO at Edelweiss Financial Services

    Manan Godil is an Information Security and Business Continuity Professional with 16+ years of work experience. He is a firm believer of thought leadership,having experience of working in BFSI, BPO, KPO & ITES Business Domains.

    He specializes in Information Risk Governance, Cyber Security, ISMS & BCP Strategy & Framework, InfoSec Compliance Assurance, Forensics, Operational Excellence, People & Soft Skills, Business Continuity & Disaster Recovery Planning, Entitlement Management.

  • #

    Sivarama Krishnan

    Executive Director, PwC India

    Sivarama Krishnan is an advisory partner in the Consulting practice of one of the big 4 in India and has taken a responsibility to set up a greenfield Cyber Security practice for the firm.

    Sivarama Krishnan has immense experience across sectors including Government, Telecommunications, Media & Entertainment and Financial Services companies to manage their compliance and Risk management. He has extensively worked with organisations in devising strategies to manage their business risks, set up systems and processes to improve effectiveness of risk management practices across business operations.

For any queries: