Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
Colin Bell of HCLSoftware explores AI-driven cybersecurity challenges including privacy concerns, data misuse and regulatory compliance, focusing on practical privacy-by-design implementation in AI systems.
Vinai Kumar Kanaujia of NSCS discusses integrating AI with cybersecurity policy frameworks that balance innovation, compliance and data privacy, while ensuring global collaboration against evolving threats.
Lt. General (Dr.) Rajesh Pant examines how CISOs can redefine leadership by embedding security into organizational DNA, addressing skill gaps, and changing top management perception of security.
Tanin Chakraborty, Anand Pande, Kanishk Gaur, Rakesh Maheshwari, Saakshar Duggal and Tejveer Bhogal explore DPDP Rules implementation challenges, focusing on data governance, cross-border transfers and compliance automation.
Amit Dhawan of Network Intelligence examines integrating agentic AI and LLMs into cybersecurity operations, focusing on threat classification, data protection controls and privacy-by-design implementation in AI systems.
Mayank Sharma and Manish Sharma explore modern threat visibility through data lakes, real-time analytics and machine learning to accelerate anomaly detection and improve response accuracy.
Hitesh Pathak shares Cloudflare's vision for defending against emerging threats through unified zero trust architecture, real-time threat intelligence and edge-based enforcement for proactive defense.
Abhishek Bansal and Rashi Haldiya explore financial impacts of breaches beyond direct costs, focusing on developing data-driven quantification models to optimize security budgets and justify investments.
Vikas Gaur, Dr. Jagannath Sahoo and Sarita Padmini explore how agentic AI transforms cybersecurity through autonomous decision-making while addressing ethical challenges and human oversight needs.
Dr. G.K. Goswami, Col. Arvind Singh, Harkamal Singh Sidhu and Ashok Kumar discuss law enforcement challenges in combating evolving cybercrime, focusing on jurisdictional issues and public-private partnerships.
Sachin Burman and Shikha Srivastava discuss securing critical infrastructure through risk-based approaches, regulatory compliance, and bridging IT-OT divides while leveraging AI for threat response.
Nity Singh, Umakant Tripathi, Lt Col Nishant Singh and Alok Shankar Pandey discuss how CISOs are evolving beyond risk reduction to become business enablers and catalysts for organizational change.
Bhagyashree Thorat introduces the concept of a risk operations center (ROC) as a strategic counterpart to SOC, focusing on prioritizing high-impact actions and quantifying value at risk.
Mini Sharma and Dr. Yusuf Hashmi discuss implementing zero trust for OT environments through continuous authentication, microsegmentation and real-time monitoring while ensuring operational continuity.