Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
Quest Software's Dilip George shares insights on treating AD as a critical application, risk assessment strategies, and best practices for maintaining compliance.
Cisco's Samir Mishra explains strategies to reduce security complexity, enhance security posture, and implement AI-enabled solutions with zero trust.
Capt. Felix Mohan of CISO Cybersecurity addresses vulnerabilities in LLMs, focusing on security controls, ethical guidelines, and risk assessments.
Alex Wilson of Yubico and Pranav Bhayani of iValue Group explore modern authentication methods and defense-in-depth strategies against phishing.
Justice BN Srikrishna, former Supreme Court Judge and Data Protection Committee Chairman, explains the implications of India's Digital Personal Data Protection Act for security leaders.
OPSWAT's Manish Gautam explains implementing multiscanning techniques for enhanced threat detection and endpoint security in perimeterless environments.
Panelists Pramod Kumar Dubey, Pradipta Patro and Lalit Trivedi discuss C-suite priorities, tool integration, and automation in DevSecOps implementation.
Industry experts Ramesh Gurram, Sanjeev Kaushik and Mitish Chitnavis discuss API security standards, authentication mechanisms, and access control configurations.
Snyk's Lawrence Crowther discusses security vulnerabilities in AI development, cloud security best practices, and AI's role in future cybersecurity developments.
Panel featuring leaders Dhananjay Rokde, Jasbir Singh Solanki and Sujit Christy explore tactics and techniques for IoT/OT device security and risk remediation.
Industry leaders Jayant Gupta, Mihirr P Thaker and Saloni Vijay discuss data resilience, third-party SLAs, and AI-powered threat detection for ransomware defense.