We no longer support Internet Explorer

Please download one of these browsers:

Chrome Firefox Safari Microsoft Edge

Keep your browser version up-to-date for a fast, secure, web experience.

Skip to content
  • Solutions
    • CyberEd Essentials
    • CyberEd Pro
    • CyberEd Pro +
    • Enterprise
  • Insights
  • Pricing
  • Catalog
  • Contact Us
  • Solutions
    • CyberEd Essentials
    • CyberEd Pro
    • CyberEd Pro +
    • Enterprise
  • Insights
  • Pricing
  • Catalog
  • Contact Us
Back

Cybersecurity Summit: Mumbai 2023

Search

Clear Expand Collapse

A Deep Dive Into AIOps & Its Impact on IT Operations

Sachin Seth of BSE Ebix examines how AI is revolutionizing IT operations and enhancing system monitoring capabilities.

Price
Course duration Duration: 20 minutes

An Identity-First Approach to Your Zero Trust Journey

Ganesh Narasimhadevara of Okta discusses implementing identity-first approaches in zero trust architectures.

Price
Course duration Duration: 25 minutes

API Security: The New Security Battleground for CISOs

Dr. N Rajendran of MCX, Kiran Belsekar of Aegon, Rajat Sen of FS-ISAC and Apurva Dalal of Adani discuss API security challenges and risk management strategies.

Price
Course duration Duration: 20 minutes

Balancing Protection & Productivity: The UEM Approach

Join Romanus Prabhu Raymond in a conversation about expanding attack surfaces and cybersecurity strategies to protect endpoints.

Price
Course duration Duration: 27 minutes

Building Next-Gen SIEM

Dr. Durga Prasad Dube of Reliance Industries explores behavior-based threat detection approaches and SIEM modernization strategies.

Price
Course duration Duration: 25 minutes

Cyber Insurance and Risk: What to Expect

Amol Deshpande of RPG Group and Bharat Panchal of Discover Financial Services analyze cyber insurance trends, coverage scenarios and future landscape.

Price
Course duration Duration: 25 minutes

Cyber Risk Quantification

Sreeji Gopinathan and Sammit Potdar of Lupin explore approaches to quantifying cyber risk beyond technology and automation.

Price
Course duration Duration: 20 minutes

Data Localization vs. Cross-Border Data Movement

Shiju Rawther, Kalpesh Doshi, Puneet Bhasin and Anil Lole debate data localization versus cross-border data movement under DPDP Act.

Price
Course duration Duration: 40 minutes

Decoding the Future of Software Supply Chain

The transition from DevOps and CI/CD to cloud-native technologies, microservices architecture, security, and governance, and ultimately automation and artificial intelligence, necessitates a modern approach to software supply chain management.

Price
Course duration Duration: 30 Min.

Digital India: A Cybersecurity Perspective

Dr. Yoginder Talwar of NICSI explores cybersecurity challenges and opportunities in Digital India's evolving landscape.

Price
Course duration Duration: 25 minutes

Establishing Secure & Frictionless Banking

Prof. D Janakiram of IDRBT explores how technological innovations are reshaping banking security and the path to frictionless operations.

Price
Course duration Duration: 25 minutes

Incident Reporting & Threat Information Sharing

Dr. Debabrata Nayak of Ericsson, Dilip Panjwani of LTIMindtree and Sambasivan G of Tata Play explore cyberthreat information sharing and incident reporting requirements.

Price
Course duration Duration: 30 minutes

Is Your IAM Policy Adequate? Perils of Overprovisioning

Girish Dixit of Kotak Securities and S V Sunder Krishnan of Reliance Life Insurance discuss comprehensive IAM strategies and the risks of overprovisioning.

Price
Course duration Duration: 20 minutes

Predictive Security

Satheesh Kalyanasundaram of CrowdStrike explores building predictive security frameworks and leveraging threat intelligence for enhanced threat detection.

Price
Course duration Duration: 25 minutes

Redefining Cybersecurity Leadership: CISOs at Their Best

Sameer Ratolikar of HDFC Bank explores the evolving role of CISOs as strategic leaders and their impact on organizational security and innovation.

Price
Course duration Duration: 20 minutes

Shifting to Proactive Cybersecurity

Kunal Dixit and Shitanshu Kumar of ETEK discuss transitioning from reactive to proactive security approaches in the era of digital transformation.

Price
Course duration Duration: 20 minutes

The C-Suite Debate on Tackling Cyber Extortion

Shailendra Kothavale, Steve D'Souza, Vijay Verma and Pradipta Patro debate the complexities of ransomware response and payment decisions.

Price
Course duration Duration: 25 minutes

The New-Age Boardrooms

Dr. Bhimaraya Metri of IIM Nagpur shares strategies for effective cybersecurity communication with boards and establishing resilient security cultures.

Price
Course duration Duration: 25 minutes

The Rising Complexities of Software Supply Chain

Venkatesh Vanjaku of CloudSEK discusses proactive measures for identifying and mitigating software supply chain risks in the modern digital ecosystem.

Price
Course duration Duration: 15 minutes

Top Technologies That Will Shape Your Enterprise in 2024

Brijesh Singh, Deven Parulekar, Atul Singh, Kavita Viswanath and Mathan Babu Kasilingam explore technologies shaping enterprise security in 2024.

Price
Course duration Duration: 30 minutes

Ways to Simplify Your Cybersecurity

Vishal Salvi of Quick Heal Technologies shares practical strategies for simplifying cybersecurity operations while maintaining robust protection.

Price
Course duration Duration: 25 minutes

Windows Threat Hunting

Rohit Shrivastava of Barclays shares expertise on conducting threat hunting in Windows environments and building proactive defense strategies.

Price
Course duration Duration: 20 minutes

Zero Trust Security

Satyavrat Mishra of Godrej, Rohit Rane of HDFC, Urvish Acharya of Aditya Birla Group and Prashant Deshpande of ISACA discuss implementing zero trust across industries and microsegmentation challenges.

Price
Course duration Duration: 20 minutes

Search

Clear

  
Contact Us

+1-609-356-1499 | info@cybered.io | Sign Up for Our Newsletter

©2024 Information Security Media Group | About ISMG | Privacy & GDPR Statement