We no longer support Internet Explorer

Please download one of these browsers:

Chrome Firefox Safari Microsoft Edge

Keep your browser version up-to-date for a fast, secure, web experience.

Skip to content
  • Solutions
    • CyberEd Essentials
    • CyberEd Pro
    • CyberEd Pro +
    • Enterprise
  • Insights
  • Pricing
  • Catalog
  • Contact Us
  • Solutions
    • CyberEd Essentials
    • CyberEd Pro
    • CyberEd Pro +
    • Enterprise
  • Insights
  • Pricing
  • Catalog
  • Contact Us
Back

Cybersecurity Summit: Bengaluru 2024

Search

Clear Expand Collapse

A Modern Approach to Supply Chain Complexities

Snyk's Shilpa Raghunathan explores effective ways to identify malicious code and secure first-party code in supply chains using security-by-design principles.

Price
Course duration Duration: 20 minutes

Addressing Risks in the Age of AI: A CISO/CRO Debate

Dr. Ram Kumar, Sreeni Venugopal and Sridhar Sidhu debate AI's role in cybersecurity leadership and risk management, exploring accountability and innovation balance.

Price
Course duration Duration: 20 minutes

AI's Influence on Cyber Deception and Deepfakes

Prof. D Janakiram from IIT Madras explores AI-powered defense mechanisms against deepfakes, covering threat patterns, detection techniques, and multi-layered security approaches.

Price
Course duration Duration: 15 minutes

Balancing Privacy & Data Security in the Digital Age

Forcepoint's Thejo Murthy discusses AI-driven data discovery, borderless architecture, and implementing risk-adaptive data protection strategies.

Price
Course duration Duration: 20 minutes

Demystification of the DPDP Act & Is Privacy a CISO's Problem?

Industry leaders Amit Sharma, Jagannath PV, Lakshminarayanan RS and Ramakant Mohapatra debate the intersection of security and privacy, exploring CISO accountability in data protection.

Price
Course duration Duration: 20 minutes

Enterprise Application Security

Synopsys's Girish Nanappa explores application security posture management for securing enterprise applications at scale in AI-fueled environments.

Price
Course duration Duration: 20 minutes

Fighting Ransomware in the Trenches

OPSWAT's Nandakumar Seshadri demonstrates ransomware attack scenarios and protection strategies using content disarm and reconstruction technology.

Price
Course duration Duration: 15 minutes

Fortinet Security Fabric

Join Prem Nithin R in an exploration of Fortinet and mesh architecture.

Price
Course duration Duration: 20 minutes

Harnessing AI in Enterprise Security Leadership

Panel featuring leaders Akshay Sivananda, Ankush Sabharwal, Firdosh Sheikh, Kavitha Kadambi and Sailaja Vadlamudi explore AI integration in security operations and building cyber resilience.

Price
Course duration Duration: 40 minutes

Harnessing the Power of Connectivity Cloud

Cloudflare's Ben Munroe discusses managing cloud security architecture, reducing vendor sprawl, and establishing secure user access in cloud environments.

Price
Course duration Duration: 15 minutes

Navigating Through the Cybercrime Surge

IPS Officer Pronab Mohanty examines the impact of AI and cryptocurrencies on cybercrime, discussing geopolitical factors and strategies for cyber resilience.

Price
Course duration Duration: 20 minutes

Quantum Threat to Security

Standard Chartered's Anish Koshy discusses quantum computing threats to classical cryptography and strategies for quantum-safe security migration.

Price
Course duration Duration: 20 minutes

Reducing Attack Surface, Controlling AD & Fighting Fatigue

Quest Software's Sivaramakrishnan Krishnamurthy covers Active Directory monitoring, identity management, and authentication tools for risk mitigation.

Price
Course duration Duration: 20 minutes

Strategies to Reduce Risk and Improve Readiness & Recovery

Aneesh Dhawan of Commvault explores strategies combining data security and protection, focusing on reducing risk and ensuring rapid recovery in the age of AI-driven attacks.

Price
Course duration Duration: 20 minutes

Supply Chain Attacks

JFrog's Prasanna Raghavendra discusses DevOps security intersection, AI/ML's role in detecting malicious code, and implementing security-by-design approaches for supply chain protection.

Price
Course duration Duration: 30 minutes

Understanding Cloud Deployment Vulnerabilities

Expert panel including leaders Prasanna Raghavendra, Ramesh Kumar, Ratan Jyoti and Sapna Singh discuss cloud security controls, compliance, and incident response planning.

Price
Course duration Duration: 20 minutes

Search

Clear

  
Contact Us

+1-609-356-1499 | info@cybered.io | Sign Up for Our Newsletter

©2024 Information Security Media Group | About ISMG | Privacy & GDPR Statement