Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
Colin Bell of HCLSoftware examines evolving application security trends, focusing on AI's role in vulnerability detection, API security's growing importance, and how these technologies are reshaping DevOps practices.
Devender Kumar and Dr. Ram Kumar G debate breach and fraud accountability, discussing anomaly detection systems, proactive crisis response strategies and defense against AI weaponization.
Jagannath PV, Rajiv Bahl and Manoj Kuruvanthody explore India's DPDP Rules implications, compliance challenges and governance amid AI innovations, and critical breach response clauses for CISOs and security leaders.
Soumya Datta, Bastin Robin and Sathyan Murugesan explore AI's cybersecurity transformation, discussing the unique security risks of AI applications, making AI ubiquitous for cyber resiliency, and redefining security practices.
Amruta Gawde, Bala Ramanan and Dr. Ram Kumar G share perspectives on contextual security, AI integration for authentication, and implementing zero trust access across hybrid environments.
Pragatheesh B and Utkarsh Sawant discuss strategies for addressing IoT vulnerabilities, leveraging AI and automation in threat response, and building resilience against future IoT attacks.
Niharika Arora and Manish Khedawat discuss the transition from password-based authentication to passkeys, implementation steps, enterprise vs. consumer adoption challenges, and best practices.
Siddharth Gandhi of 1Kosmos breaks down what identity means today, exploring how security models rely on strong identity checks and how verification, biometrics and passwordless logins are making access safer and easier.
ADGP Pronab Mohanty discusses obstacles facing law enforcement in cybercrime investigations, digital forensics innovations, encrypted criminal communications and machine learning for predicting attack patterns.
Ganesh Chellappa of ManageEngine explores how adaptive access controls use AI to balance security and user experience, discussing solutions beyond traditional measures and integrating AI into zero trust strategies.
Parag Deodhar, Visagan Subburayalu, Arvind Sivaramakrishnan and Malini Rao explore how CISOs are becoming business enablers, redefining leadership and embedding security into organizational DNA.
D Parthasarathy shares insights on transitioning from vulnerability management to comprehensive risk management, with a focus on building risk operations centers and implementing proactive security approaches.