We no longer support Internet Explorer

Please download one of these browsers:

Chrome Firefox Safari Microsoft Edge

Keep your browser version up-to-date for a fast, secure, web experience.

Skip to content
  • Solutions
    • CyberEd Essentials
    • CyberEd Pro
    • CyberEd Pro +
    • Enterprise
  • Insights
  • Pricing
  • Catalog
  • Contact Us
  • Solutions
    • CyberEd Essentials
    • CyberEd Pro
    • CyberEd Pro +
    • Enterprise
  • Insights
  • Pricing
  • Catalog
  • Contact Us
Back

Cybersecurity Week: New Delhi

Search

Clear Expand Collapse

Application Security Trends 2025

Colin Bell of HCLSoftware explores AI-driven cybersecurity challenges including privacy concerns, data misuse and regulatory compliance, focusing on practical privacy-by-design implementation in AI systems.

Course duration Duration: 20 minutes

Convergence of AI & Cybersecurity

Vinai Kumar Kanaujia of NSCS discusses integrating AI with cybersecurity policy frameworks that balance innovation, compliance and data privacy, while ensuring global collaboration against evolving threats.

Course duration Duration: 20 minutes

Cybersecurity Leadership Redefined

Lt. General (Dr.) Rajesh Pant examines how CISOs can redefine leadership by embedding security into organizational DNA, addressing skill gaps, and changing top management perception of security.

Course duration Duration: 20 minutes

Demystifying DPDP: Enterprise Security Hurdles

Tanin Chakraborty, Anand Pande, Kanishk Gaur, Rakesh Maheshwari, Saakshar Duggal and Tejveer Bhogal explore DPDP Rules implementation challenges, focusing on data governance, cross-border transfers and compliance automation.

Course duration Duration: 45 minutes

Enhancing Cybersecurity & Privacy with Agentic AI

Amit Dhawan of Network Intelligence examines integrating agentic AI and LLMs into cybersecurity operations, focusing on threat classification, data protection controls and privacy-by-design implementation in AI systems.

Course duration Duration: 20 minutes

From Data to Decisions: Rethinking Threat Visibility

Mayank Sharma and Manish Sharma explore modern threat visibility through data lakes, real-time analytics and machine learning to accelerate anomaly detection and improve response accuracy.

Course duration Duration: 20 minutes

Future Threats, Now: Cloudflare's 2025 Perspective

Hitesh Pathak shares Cloudflare's vision for defending against emerging threats through unified zero trust architecture, real-time threat intelligence and edge-based enforcement for proactive defense.

Course duration Duration: 25 minutes

Quantifying the Cost of a Breach: A CISO's Perspective

Abhishek Bansal and Rashi Haldiya explore financial impacts of breaches beyond direct costs, focusing on developing data-driven quantification models to optimize security budgets and justify investments.

Course duration Duration: 25 minutes

Reshaping Cybersecurity with Agentic AI

Vikas Gaur, Dr. Jagannath Sahoo and Sarita Padmini explore how agentic AI transforms cybersecurity through autonomous decision-making while addressing ethical challenges and human oversight needs.

Course duration Duration: 25 minutes

Rising Cybercrime Incidents: Challenges for Law Enforcement

Dr. G.K. Goswami, Col. Arvind Singh, Harkamal Singh Sidhu and Ashok Kumar discuss law enforcement challenges in combating evolving cybercrime, focusing on jurisdictional issues and public-private partnerships.

Course duration Duration: 30 minutes

Securing Critical Infrastructure in a Connected World

Sachin Burman and Shikha Srivastava discuss securing critical infrastructure through risk-based approaches, regulatory compliance, and bridging IT-OT divides while leveraging AI for threat response.

Course duration Duration: 25 minutes

The Evolving Role of CISOs

Nity Singh, Umakant Tripathi, Lt Col Nishant Singh and Alok Shankar Pandey discuss how CISOs are evolving beyond risk reduction to become business enablers and catalysts for organizational change.

Course duration Duration: 30 minutes

Unveiling a New Approach to Cyber Risk Management

Bhagyashree Thorat introduces the concept of a risk operations center (ROC) as a strategic counterpart to SOC, focusing on prioritizing high-impact actions and quantifying value at risk.

Course duration Duration: 25 minutes

Zero Trust for OT Security: A Practical Use Case

Mini Sharma and Dr. Yusuf Hashmi discuss implementing zero trust for OT environments through continuous authentication, microsegmentation and real-time monitoring while ensuring operational continuity.

Course duration Duration: 30 minutes

Search

Clear

  
Contact Us

+1-609-356-1499 | info@cybered.io | Sign Up for Our Newsletter

©2024 Information Security Media Group | About ISMG | Privacy & GDPR Statement