CISO Leadership Summit

The CISO Leadership Summit is a chance for CISOs and IT security executives across India to meet with their peers from various industries, including health care, finance, insurance, government, telecom, utilities, education and more. This exclusive event features engaging Presentations, Thought Leadership sessions, CIO Think Tanks, Analyst Q&As and other educational sessions on the latest information security topics and trends. Open discussions and networking time give attending CISOs and information security executives the opportunity to discuss common problems and discover new and innovative solutions. Attendees will leave the event with new business contacts and innovative ideas for moving their businesses forward.

slider

Efficiency & Effectiveness - Bolstering Organisational Resilience in Breach-Assumed World

25 July, 2018
Taj City Centre Gurugram
slider

An Exclusive Executive Forum Focused on Information Security Leadership & Strategy

25 July, 2018
Taj City Centre Gurugram
slider

Efficiency & Effectiveness - Bolstering Organisational Resilience in Breach-Assumed World

25 July, 2018
Taj City Centre Gurugram
slider

India's most prestigious gathering for information security professionals

25 July, 2018
Taj City Centre Gurugram

Top Challenges to Managing Security, 2018

Special Offer!
Save 10% until July 10th!
CONTACT US NOW

+91 982 102 2236 / 982 002 2236

An Exclusive Executive Forum Focused on Information Security Leadership and Strategy

  • INDUSTRY THOUGHT LEADERS
    We understand the importance in having the correct audience surrounding you and your team on site, that is why we only look to invite and select the absolute leaders within each of their respected fields to attend the Summit
  • STAR PANELISTS & PRESENTERS
    We invite only the leading international and local experts to provide sessions on site, this allows for attendees to be taught by front-line executives that compress years of meaningful experience into a systematic, well organised learning program
  • NETWORKING OPPORTUNITIES
    Keeping in line with the main goal of our events in achieving new relationships, we provide a huge amount of networking opportunities for attendees through breakfast, luncheons, cocktails, gala dinners and informal introductions
  • PERSONALISED PROGRAM
    Each summit is personalised for YOU, this means that what is important to your business is important to us. We create personalised itineraries around sessions you want to attend, allowing for your time to be spent wisely while out of the office.
  • TARGETED SESSIONS
    Being able to experience different sessions is what makes every event unique; whether you are looking to attend an interactive workshop, roundtable, 1-1 meeting or panel discussion
  • DEMAND DRIVEN MODEL
    We work alongside a demand driven model, meaning suppliers at our events are guaranteed that they will only be 1 of 2 competitive companies onsite, allowing their team more sales and opportunities to be generated
  • BUSINESS INTELLIGENCE
    We provide all attendees with detailed information on one another's key pain points, challenges, budges and areas of investment pre event allowing for mutual and relevant two way open discussions
  • 1-1 PRIVATE MEETINGS
    Allowing both buyers and sellers the opportunity to engage with one another onsite in a series of prearranged business meetings. These provide both parties a great opportunity to build new relationships by interacting face to face

Event Starts In

  • 00

    Days

  • :
  • 00

    Hours

  • :
  • 00

    Minutes

  • :
  • 00

    Seconds

Agenda - 2018

  • Time: 08:30 AM - 09:30 AM

    REGISTRATION

    Registration With Tea / Coffee
  • Time: 09:30 AM - 09:45 AM

    LAMP LIGHTING

    Lamp Lighting Ceremony & Welcome Note
  • Time: 09:45 AM - 10:45 AM

    PANEL DISCUSSION

    Theme: Evaluating the New Security, Data Protection & Cyber Challenges - Preparing for the Future and Keeping up to Date
    • Evaluating state-of-the-art security technology systems and tools to react to new threat scenarios in a hyper-connected cyber world
    • How new immune system technologies are imperative for the next generation of cyber-defence
    • Real-world examples of subtle threats that routinely bypass traditional controls
    • How are business imperatives such as mobility, cloud and IoT impacting information security in an enterprise
    • What best practices should CISOs adopt to balance business growth and security threats arising from new technology models
    • Preventing fraud from mobile apps: Protect the mobile enterprise with smarter security solutions
    • It is difficult for a single vendor to protect customers in a multi-vector threat landscape. What's the way ahead for a CISO in such a scenario
    • What should be the checklist of modern CISOs while securing their enterprises
    • How is a shift in the threat landscape forcing security vendors to make a shift in their solutions and strategies
  • Time: 10:45 AM - 11:00 AM

    Individual Presentation / Case study

    Theme: TBA
  • Time: 11:00 AM - 11:30 AM

    Tea / Coffee Break

    Tea / Coffee & Networking Break
  • Time: 11:30 AM - 12:45 PM

    PANEL DISCUSSION

    Theme: The Road to Digital Transformation: Getting There While Avoiding the Potholes

    Making the transition from legacy systems to next generation implementations is a major decision point for virtually any organization trying to take advantage of the new era in end user enablement through personal devices, connectivity and apps.

    • While Digital Transformation is one of those key buzzwords that many toss around, what does it really mean and how will it affect your business
    • With so many options on the horizon, what are some of the key components you need to be most aware of and in some cases, concerned by
    • How can you avoid many of the failures currently prevalent among companies trying to make digital transformation work for their business with limited success
    • Key strategies and implementation techniques that will ultimately make it far easier to migrate to next generation business solutions
    • Which workers are most likely to demand and/or require new systems and why
    • With all the talk of relying on the cloud, is it really the panacea that it's cracked up to be
    • Avoiding the pitfalls of inadequate security and the monumental costs associated with a lack thereof
    • How to align a strategy to best leverage partnerships and services when resources are limited and plans aren't complete
    • Best practices for CISOs to be the drivers of digital disruption for their company
  • Time: 12:45 PM - 01:00 PM

    Individual Presentation / Case study

    Theme: TBA
  • Time: 01:00 PM - 01:45 PM

    Lunch & Networking Break

    Lunch & Networking Break
  • Time: 01:45 PM - 03:00 PM

    PANEL DISCUSSION

    Theme: The Cyber Security Strategy Roadmap: How to Respond to Growing Threats
    • Cybersecurity - What's new and how is it evolving
    • Cloud computing cyber security: A silver bullet for hacking & ransomware
    • Emerging threats to big data & IoT. Defence strategy
    • Artificial intelligence in firefighting cyber threats
    • Are mobile apps the new battlefield for cyberattacks
    • Creating adaptable agile systems to take on attacks
    • Mitigating advanced threats like zero day exploits & ransomware
    • Understanding and preparing for new cybersecurity regulations: Are you ready
    • Transforming security data operations into enterprise business intelligence
    • Security intelligence, automation and machine learning: A panel perspective
  • Time: 03:00 PM - 04:15 PM

    PANEL DISCUSSION

    Theme: Secure, Simplify and Transform to a Cloud-Enabled Enterprise
    • Cloud security: Shifting time, techniques and tools
    • How you can affect digital transformation in your organization by taking a fresh look at cloud initiatives through positive programmatic choices
    • Issues with cloud architectures and discuss ways to achieve visibility, compliance and security
    • How organizations can monitor and enforce geolocation restrictions, ensuring that their workloads in the cloud are deployed on trusted hardware in known locations to meet security policy compliance
    • How are progressive companies leveraging the cloud, a powerful business enabler to transform their business and make it more competitive
    • The road to transform your hub & spoke network into a cloud-enabled network - lessons on the way
    • The journey to transform datacentre applications to a SaaS, AWS and Azure environment
    • New security paradigm for the new world of cloud - Changing role of IT execs and lessons learned
    • Deploying cloud intelligence and automation to detect and respond to suspicious activity
  • Time: 04:15 AM - 04:30 AM

    Individual Presentation / Case study

    Theme: TBA
  • Time: 04:30 PM - 05:00 PM

    Tea / Coffee Break

    Tea / Coffee & Networking Break
  • Time: 05:00 PM - 06:30 PM

    PANEL DISCUSSION

    Theme: The CISO of the Future - Innovator, Enabler, Board Member
    • Where the CISO should sit on the security organisation chart and why it matters most for the enterprise
    • Soft skills needed for CIO to CSO communication
    • Importance of incidence response: Plan, exercises, communication
    • Mobility, cloud, blockchain and IoT has raised the complexity of security to new heights. What next to outthink the bad guys
    • Risks and opportunities of emerging technologies: Smart machines, AI, IoT and OT
    • Failure of data security in year 2017 and how to avoid them
    • State of the art in cloud security
    • Why the blockchain is only as strong as its weakest link? what security & risk leaders should do with blockchain enthusiasm
    • Importance of behavioural analysis, risk scoring on social networks for the CISO of the future
  • Time: 07.00 PM Onwards

    CISO Leadership Awards

    CISO Leadership Awards

CISO Leadership Awards

Please select the category and fill the form below.
Cloud Security
Advanced Persistent Threat (APT) Protection
Behavior Analytics, Threat Detection
 
Unified Threat Management
Web Security
 
Email Security
Encryption
Fraud Prevention
 
Identity Management
Internet-of-Things (IoT) Security
Mobile Security
 
Network Access Control (NAC)
 
Policy Management & Regulatory Compliance
Risk Management
 
Vulnerability Management
Individual Categories
Crème-de-la-Crème
 

Awards Registration

**Once you submit the form you will get the detailed step-by-step procedure of the nomination process with cost of nomination via email. One of us would also get in touch with you soon on the same.

Media Partner

Register Now

Kamikaze B2B Media

Kshitij, 103 - 1st Floor, Veera Desai Road, Opp. Andheri Sports Complex, Andheri (W), Mumbai - 400 058.

+91 22 613 81800 | 26780476

Harish Bhatia | Project Managing Director
harish@kamikaze.co.in
(+91) 982 102 2236
(+91) 982 002 2236
Ashwin Pillai | Sr. Project Manager
ashwin@kamikaze.co.in
(+91) 998 719 7555