We no longer support Internet Explorer

Please download one of these browsers:

Chrome Firefox Safari Microsoft Edge

Keep your browser version up-to-date for a fast, secure, web experience.

Skip to content
  • Solutions
    • CyberEd Essentials
    • CyberEd Pro
    • CyberEd Pro +
    • Enterprise
  • Insights
  • Pricing
  • Catalog
  • Contact Us
  • Solutions
    • CyberEd Essentials
    • CyberEd Pro
    • CyberEd Pro +
    • Enterprise
  • Insights
  • Pricing
  • Catalog
  • Contact Us
Back

Cybersecurity Week: Bengaluru

Search

Clear Expand Collapse

AppSec Trends 2025

Colin Bell of HCLSoftware examines evolving application security trends, focusing on AI's role in vulnerability detection, API security's growing importance, and how these technologies are reshaping DevOps practices.

Price
Course duration Duration: 25 minutes

Challenges for the Law Enforcement & InfoSec

ADGP Pronab Mohanty discusses obstacles facing law enforcement in cybercrime investigations, digital forensics innovations, encrypted criminal communications and machine learning for predicting attack patterns.

Price
Course duration Duration: 25 minutes

CRO and CISO Debate: Who Is Accountable for a Breach?

Devender Kumar and Dr. Ram Kumar G debate breach and fraud accountability, discussing anomaly detection systems, proactive crisis response strategies and defense against AI weaponization.

Price
Course duration Duration: 25 minutes

DPDP Rules 2025 Demystified: What Are the Stakes for CXOs?

Jagannath PV, Rajiv Bahl and Manoj Kuruvanthody explore India's DPDP Rules implications, compliance challenges and governance amid AI innovations, and critical breach response clauses for CISOs and security leaders.

Price
Course duration Duration: 35 minutes

How AI Continues to Change Cybersecurity

Soumya Datta, Bastin Robin and Sathyan Murugesan explore AI's cybersecurity transformation, discussing the unique security risks of AI applications, making AI ubiquitous for cyber resiliency, and redefining security practices.

Price
Course duration Duration: 25 minutes

Identity-Based Zero Trust: A Use Case Perspective

Amruta Gawde, Bala Ramanan and Dr. Ram Kumar G share perspectives on contextual security, AI integration for authentication, and implementing zero trust access across hybrid environments.

Price
Course duration Duration: 35 minutes

IoT Cyberattack Response Strategies

Pragatheesh B and Utkarsh Sawant discuss strategies for addressing IoT vulnerabilities, leveraging AI and automation in threat response, and building resilience against future IoT attacks.

Price
Course duration Duration: 25 minutes

Pause Words & Shift to Passkeys

Niharika Arora and Manish Khedawat discuss the transition from password-based authentication to passkeys, implementation steps, enterprise vs. consumer adoption challenges, and best practices.

Price
Course duration Duration: 25 minutes

Redefining Identity: Verification & Passwordless

Siddharth Gandhi of 1Kosmos breaks down what identity means today, exploring how security models rely on strong identity checks and how verification, biometrics and passwordless logins are making access safer and easier.

Price
Course duration Duration: 20 minutes

Security Meets Convenience: Rise of Adaptive Access Controls

Ganesh Chellappa of ManageEngine explores how adaptive access controls use AI to balance security and user experience, discussing solutions beyond traditional measures and integrating AI into zero trust strategies.

Price
Course duration Duration: 20 minutes

The Evolving Role of CISOs as Catalysts for Change

Parag Deodhar, Visagan Subburayalu, Arvind Sivaramakrishnan and Malini Rao explore how CISOs are becoming business enablers, redefining leadership and embedding security into organizational DNA.

Price
Course duration Duration: 45 minutes

The Journey to Risk Management & Beyond

D Parthasarathy shares insights on transitioning from vulnerability management to comprehensive risk management, with a focus on building risk operations centers and implementing proactive security approaches.

Price
Course duration Duration: 20 minutes

Search

Clear

  
Contact Us

+1-609-356-1499 | info@cybered.io | Sign Up for Our Newsletter

©2024 Information Security Media Group | About ISMG | Privacy & GDPR Statement