SlideShare a Scribd company logo
1 of 30
CHECKMATE!
7th DynamicCISO Summit & Excellence
Awards
27th – 28th Feb 2020
POST-EVENT REPORT
About CISO Summit
• The theme for this year’s 7th Annual dynamicCISO Summit 2020 was Checkmate!
• It’s entire focus on applying intelligence, strategy and technology for better cyber-
defense
• The conference deliberated on how CISOs and Cybersecurity professionals can create a
robust “Defense Mechanism” for a stronger, better, cybersecurity posture
• The event had 20+ sessions, 55+ speakers, and approximately 210 senior security pros
from across India.
Editor’s Welcome
7th edition of the summit got off to a flying start
with an incisive introduction from Rahul Neel
Mani, Editor, dynamicCISO.com. He emphasized
on the need for a deeper, and more
comprehensive understanding of the threat
landscape and called for an intense coordination
among key stakeholders to thwart the emerging
cyber threats.
DYNAMICCISO Mindmap: Applying Intelligence, Strategy
& Technology for Better Cyber Defense
Aligned with the theme of this year’s Summit, the inaugural
session was a Live on “Applying Intelligence, Strategy &
Technology for Better Cyber Defense.”
The crux of the discussion was that cybersecurity strategy,
threat intel, and technology are the key arsenals in a CISO’s
chest. Moderated by Burgess Cooper, Partner, EY India, the
other panelists were Durga Prasad Dube, Sr. VP, Reliance;
Na. Vijayashankar, Chairman, Foundation of Data Protection
Professionals in India; Uday Deshpande, Group CISO, L&T;
Hitesh Mulani, Group CISO & VP - IT Partner Collaboration &
Process Excellence, Mahindra Rise and Sunil Varkey,
Cybersecurity Expert.
Summit Keynote 1: The Elephant in the Room
In line with the theme of the Summit 2020, Capt.
Felix Mohan, CEO, CISO Cybersecurity delivered
the first keynote on the topic: The Elephant in the
Room. He spoke on how a CISO may sometime
ignore the big problems that are right in front of
their eyes, causing momentary inconvenience or
disruption. He argued that such ignored areas can
later develop into really troublesome areas. It's
time the elephant in the room is addressed as
soon as noticed. “You should know yourself and
your enemies well to win the war. Threat and
vulnerability assessments are the key to it,” he
said.
Title Partner Keynote: Intelligent Cybersecurity 2020 &
Beyond
Aligned with theme, the Title Partner Keynote was
spot on. Titled as Intelligent Cybersecurity: 2020 &
Beyond it threw light on how it is imperative for
organizations to deploy a structured approach to
security and risk management with a clear
roadmap for at least the next five years. The
speakers of this session were Balaji Subramaniam,
Head - Intelligent Security Business Unit, NTT Ltd.;
Rishikesh Kamat, Product Head - Managed
Security & IMS, NTT Ltd. and Sanjivan S Shirke,
Head - Information Security & SVP (IT), UTI Asset
Management Co. Ltd.
Presenting Partner Keynote: Combating Modern Threats
with Intrinsic Security
The Presenting Partner Keynote on “Combating
Modern Threats with Intrinsic Security” was
delivered by Ashish Chalke, Specialist Systems
Engineer, Dell Technologies. He spoke about
how cybersecurity is no longer a technology
problem, but a business-wide challenge. This
requires businesses to move up the security
maturity model - from being 'guarded', moving
through being 'informed' and 'integrated' to
finally becoming 'resilient' where security is
embedded within each business function.
CISO Face Off: Man Versus Machine - Follow the Basic
Instincts Or A Machine-Driven Approach
In this face off session on Man Vs. Machine: Follow the
Basic Instincts Or A Machine-Driven Approach an
interesting and intriguing discussion followed with active
participation of two senior cyber security experts namely
Sanjay Tiwari, CISO, IIFL and Amit Dhawan, CISO, Birlasoft.
The face off was moderated by Keyur Desai, CIO, Essar
Ports & Shipping. The speakers argued how the limitation in
human intelligence has paved the way for applying Artificial
Intelligence (AI) to strengthen cyber defense. While AI is
helping organizations take cybersecurity to the next level, it
cannot render the human aspect redundant. The argument
went on…
Power Session: Changing Cyber Landscape - The Battle
of Algorithms
Apurva Jain, Territory Sales Manager, Dark Trace
presented the session on an interesting topic “Changing
Cyber Landscape: The Battle of Algorithms.” She spoke
about how AI is doing the heavy lifting for the attackers,
making the attacks faster and more effective. Defending
against such advanced threats and attack vector requires
an immune system approach that focuses on understanding
the entire organization’s DNA using advanced AI algorithms.
CISO Brainstorm: Building Successful Cyber Defence
Programs: Checks & Balances
The topic of the first CISO Brainstorm “Building
Successful Cyber Defense Programs: Checks & Balances.”
The panelists felt that in a perimeterless world, there
has to be a judicious mix of people, process and
technology to create a robust security structure. Of all
these, the people component is particularly critical and
often remains neglected. The panelists included Vijay
Devnath, CISO, CRIS; Ravi Burlagadda, VP, Reliance Jio;
Manu Bhatia, Director Cyber Security, HCL Technologies;
Ajay Dubey, Country Head NetSec and Channels,
Forcepoint. The panel was moderated by Dinesh Bareja,
COO, Open Security Alliance
Summit Keynote 2: Cyber Immunity: Mimicking the
Human Immune System - A New Perspective
The second Keynote of the day was by eminent
cybersecurity specialist Durga Prasad Dubey who is
CISO & Sr. VP at Reliance Industries Ltd. He started
his session by an interesting case of about how the
human body reacts to infections. It creates a
coordinated response. Can cybersecurity also be
such that it has prevention and detection together
with self-help built into it? “Modern cybersecurity
strategies need to incorporate these elements and
learn from the natural world”, he argued.
Power Session: Cross Generation Detection & Response
This Power Session was presented by Vijendra
Katiyar, Director - Enterprise Non-named
Business, India & SAARC, Trend Micro on the topic
“Cross Generation Detection & Response.” Vijendra
explained how the definition of detection has
changed over a period of time and that today the
idea of detection is preempting the threat, and the
first thing that comes to mind is endpoint
detection response which is EDR. It will becomes
easier for the CISOs to take actions if EDR is in
place.
Hackers’ Live: Securing the Future
The first Hackers’ Live session was focused on the
topic: Securing the Future. It was presented by
Aseem Jakhar, Co-Founder & Director Research
and Development, Payatu. Aseem is a seasoned
professional who specializes in Internet of Things
(IoT) security; Embedded/Hardware security;
Mobile security; Security Software development;
and Security Training.
DynamicCISO Research: “Being of a CISO”
DynamicCISO, for the first time in seven years, has
commissioned a research "Being of a CISO." The
Research Report was unveiled by Dr. Kapil Dev Singh,
CEO, Coeus Age. The report was a joint effort between
dynamicCISO and Coeus Age. The findings of the
research report were highlighted at the CISO
Summit. The research is a result of qualitative
interviews with CISOs and CIOs and a quantitative
survey of 80+ CISOs and 60+ CIOs which was
administered during Dec 2019 - Jan 2020. The
session by Dr. Singh was intense and full of self-
discovery.
CISO Brainstorm: Digital Risk Management: Defence In
Depth with Agility in Mind
The CISO Brainstorm on Digital Risk Management:
Defense-in-Depth with Agility in Mind was attended
by seasoned panelists including Sreeshankar
Gurujalam, Director - Information Security, Ocwen
Financial Solutions; Ravindranath Hirolikar, CISO,
HighRadius, Kanishk Gaur, Director, EY, Aman
Chhikara, CISO, Aristi Ninja. The discussion was
moderated by Bharat Panchal, CRO, FIS Global. The
panelists were on the opinion that CISOs must evolve
and not be restricted to their silos. A multi-layered
approach is needed for a thorough digital risk
management strategy.
Fireside Chat with Lux Rao, NTT
Prior to the DynamicCISO Excellence Awards 2020 a
Fireside Chat was conducted between Lux Rao,
Solutions Director & Leader - Digital Transformation,
NTT Ltd. and Rahul Neel Mani, Editor,
dynamicCISO.com. The talked revolved around how
organizations should pursue a resilient security
posture such as the Zero Trust framework as part of
their overall digital transformation strategy. They also
felt that looking at Cybersecurity holistically is critical
to ensure that a business will stay in business and
does not become a victim to increasingly hostile
attack vectors and rampant rise of malafide actors.
7th Annual DynamicCISO Excellence Awards
Like every year for past 7 years, dynamicCISO
recognized and felicitated “Bold CISO” for their
exceptional work in the field of cybersecurity. The
jury for this year’s awards adjudication consisted of
Durga Dubey, Sr. VP, Reliance Industries Ltd.; Bharat
Panchal, CRO, FIS Global; Uday Deshpande, Group
CISO, L&T; Kapil Dev Singh, CEO, Coeus Age; Suhas
Mhaskar, CEO, Accent Technovation; and Shubhendu
Dutta, CISO, Aujas. The awards were given in the
presence of Rahul Neel Mani, Editor, dynamicCISO.
This year’s attraction was Women Cybersecurity
Leaders 2020 Awards to promote diversity and
inclusion.
DAY 2: CISO Face Off: Threat Hunting – The Only Saviour
in Defending Business
This CISO Face Off on the second day revolved around the
topic “Threat Hunting – The Only Savior in Defending
Business.” Threat hunting is one of the most critical
components in cybersecurity and is increasingly being used
for identifying net new threats faced by organizations. The
speakers in this session were Mathan Babu Kasilingam,
CISO, NPCI; Subhajit Deb, CISO, Dr. Reddy’s Laboratories;
and Amit Pradhan, EVP - Technology Security, CTSO & Chief
Privacy Officer, Vodafone Idea. The Face Off was moderated
by Rishi Rajpal, Director - Global Security, Concentrix. The
participants agreed that threat hunting needs to look
beyond conventional sources of gathering intel.
Cloud Security: Secure Cloud Transformation
The Cloud Security session was delivered by Mrinal
Pal, Head IT, Tata Steel. He made a case that cloud
transformation for enterprises must have clear
strategies including ease of provisioning,
availability, scale, disaster recovery, external sage
and ease of management.
CISO Brainstorm: Cloud-based Business - An
Inescapable Evil for CISOs
Cloud-based Business: An Inescapable Evil for
CISOs was the topic of this CISO Brainstorm. The
panelists included Akhil Verma, CISO, Airtel
Payments Bank; Satish Kumar Dwibhashi, VP &
CISO, Wibmo; Rajiv Nandwani, Physical and IT
Security Continuity Senior Manager, Boston
Consulting Group, Sapan Talwar, Sr. VP - Global
Information Security, Tower Research Capital, and
Vinit Sinha, Head - Information Security, Cyber
Security and Data Privacy, Pine Labs. The session
was moderated was Bhavuk Arora, Interim CISO,
Virtual CISO, Think Act Consulting.
Data Privacy Masterclass: Implementing Privacy:
Frameworks & Best Practices
For the first time we organized a Data Privacy
Masterclass on the second day of the summit. This
was delivered by Data Privacy expert Shivangi
Nadkarni, CEO, Arrka Consulting. The topic of this
masterclass was “Implementing Privacy : Frameworks
& Best Practices.” It focused on how data security and
privacy are often used interchangeably. Shivangi
explained that this is however not the case. Privacy is
not just security. Privacy has personal data at the
core. We should use that as a foundation, then overlay
the laws and compliance and then identify the gaps.
Legal Inputs: Cybersecurity Laws and What CISOs and
Organizations Should Know About Them
The Legal Inputs session was well received and was on
a very pertinent topic “Cybersecurity Laws and What
CISOs and Organizations Should Know About Them.”
The panelists were Brijesh Singh, Inspector General of
Police, Cyber, Government of Maharashtra; Himanshu
Gaur, Principal Consultant - Cyber Security, Tata
Communications; Kalpesh Doshi, CISO, FIS Global;
Anil Chiplunkar, Cyber Fraud Investigator; and Shruti
Bist, Advocate, Supreme Court of India. The panel was
moderated by Khushbu Jain, Advocate, Supreme Court
of India.
CISO Face Off: Outsourcing Vs. In-house: What's the Best
Model that Works?
The last CISO Faceoff of the 7th Annual Summit was on a
topic “Outsourcing Vs. In-house: What's the Best Model
that Works?” The speakers were A Shiju Rawther, EVP,
IIFL Sridhar Sidhu, Senior VP & Head of Information
Security Services Group, Wells Fargo; Rajesh Nadkarni,
CISO, CDSL and R Vijay, CISO, Cams Ltd. Moderated by Fal
Ghancha, CISO, DSP Mutual Fund, the house was divided
between those who believed in an in-house security
model versus those who were in favour of outsourcing a
majority, operational part of it.
Hackers’ Live 2
The second Hackers’ Live session was presented
by Sunny Vaghela, Founder & CEO, Techdefence
Labs. Vaghela spoke at length about the recent
data breaches and lessons learned and
demonstrated certain Zero Day vulnerabilities as
well as IOT /IIOT hacking using applications level
vulnerability exploitations.
Hackers’ Live 3
The 3rd Hackers’ Live session was delivered by
Nitesh Surana, Independent Security Researcher.
He elaborated on the State of OSINT in 2020.
Nitesh spoke about the various tools, techniques,
and procedures to carry out effective OSINT. He
made his point through the use of example
scenarios and also explained how to use OSINT
techniques to conduct security assessments
within an organization.
CyberSec Demo
This was the last but one of the most exciting
sessions of the 7th Annual DynamicCISO Summit.
The topic of this session was “Big Data &
Cybersecurity.” Rahul Sasi, Founder & CTO,
CloudSek showcased a live drone which was well
received by the audience. The session brought
down curtains on the the 7th Edition of the
Summit.
Twitter
#CISOSummit2020
Total Tweets: 1075+
Impressions: 2.2
Million
Contribution: 118
Original Tweets: 345+
LinkedIn
#CISOSummit2020
Total Posts: 214+
Videos: 16 (40000+
views)
Social Cards:118
Images: 135++
#CISOSummit2020 was one of the Trending hashtags on twitter on 27th
February 2020
CHECKMATE!
7th DynamicCISO Summit & Excellence
Awards
27th – 28th Feb 2020

More Related Content

What's hot

Computer science and engineering
Computer science and engineeringComputer science and engineering
Computer science and engineeringsreeLekha51
 
artificial intelligence
artificial intelligenceartificial intelligence
artificial intelligencevallibhargavi
 
Use of Artificial Intelligence in Cyber Security - Avantika University
Use of Artificial Intelligence in Cyber Security - Avantika UniversityUse of Artificial Intelligence in Cyber Security - Avantika University
Use of Artificial Intelligence in Cyber Security - Avantika UniversityAvantika University
 
Artificial Intelligence (AI)
Artificial Intelligence (AI)Artificial Intelligence (AI)
Artificial Intelligence (AI)mmdjjahid
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligenceIjajAhmedJaman
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial IntelligenceAbbas Hashmi
 
VIRTUAL REALITY & AUGMENTED REALITY
VIRTUAL REALITY & AUGMENTED REALITYVIRTUAL REALITY & AUGMENTED REALITY
VIRTUAL REALITY & AUGMENTED REALITYK.V. SAI MADHAV
 
Environmental Monitoring System using IoT, AI and ML
Environmental Monitoring System using IoT, AI and MLEnvironmental Monitoring System using IoT, AI and ML
Environmental Monitoring System using IoT, AI and MLRobert Smith
 
Impact of Artificial Intelligence in IT Industry
Impact of Artificial Intelligence in IT IndustryImpact of Artificial Intelligence in IT Industry
Impact of Artificial Intelligence in IT IndustryAnand SFJ
 
Artificial intelligence in cyber defense
Artificial intelligence in cyber defenseArtificial intelligence in cyber defense
Artificial intelligence in cyber defenseUjjwal Tripathi
 
Iris recognition system
Iris recognition systemIris recognition system
Iris recognition systemNilu Desai
 
A Review of Professional Practices for Computer Sciences Students in Academics
A Review of Professional Practices for Computer Sciences  Students in AcademicsA Review of Professional Practices for Computer Sciences  Students in Academics
A Review of Professional Practices for Computer Sciences Students in Academicssyedhamza71
 
AI IN DEFENCE.pptx
AI IN DEFENCE.pptxAI IN DEFENCE.pptx
AI IN DEFENCE.pptxGoluTiwari22
 
Artificial Intelligence
Artificial Intelligence Artificial Intelligence
Artificial Intelligence XashAxel
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceInderjeet Singh
 
Artificial intelligence .pptx
Artificial intelligence .pptxArtificial intelligence .pptx
Artificial intelligence .pptxGautamMishra79
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial IntelligenceAkshay Thakur
 
Iris scanner technology
Iris scanner technologyIris scanner technology
Iris scanner technologyshams tabrez
 
Internet of Things and Artificial Intelligence
Internet of Things and  Artificial IntelligenceInternet of Things and  Artificial Intelligence
Internet of Things and Artificial IntelligenceIrem Gokce Aydin
 

What's hot (20)

Computer science and engineering
Computer science and engineeringComputer science and engineering
Computer science and engineering
 
artificial intelligence
artificial intelligenceartificial intelligence
artificial intelligence
 
Use of Artificial Intelligence in Cyber Security - Avantika University
Use of Artificial Intelligence in Cyber Security - Avantika UniversityUse of Artificial Intelligence in Cyber Security - Avantika University
Use of Artificial Intelligence in Cyber Security - Avantika University
 
Artificial Intelligence (AI)
Artificial Intelligence (AI)Artificial Intelligence (AI)
Artificial Intelligence (AI)
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligence
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligence
 
VIRTUAL REALITY & AUGMENTED REALITY
VIRTUAL REALITY & AUGMENTED REALITYVIRTUAL REALITY & AUGMENTED REALITY
VIRTUAL REALITY & AUGMENTED REALITY
 
Environmental Monitoring System using IoT, AI and ML
Environmental Monitoring System using IoT, AI and MLEnvironmental Monitoring System using IoT, AI and ML
Environmental Monitoring System using IoT, AI and ML
 
Impact of Artificial Intelligence in IT Industry
Impact of Artificial Intelligence in IT IndustryImpact of Artificial Intelligence in IT Industry
Impact of Artificial Intelligence in IT Industry
 
Artificial intelligence in cyber defense
Artificial intelligence in cyber defenseArtificial intelligence in cyber defense
Artificial intelligence in cyber defense
 
Iris recognition system
Iris recognition systemIris recognition system
Iris recognition system
 
A Review of Professional Practices for Computer Sciences Students in Academics
A Review of Professional Practices for Computer Sciences  Students in AcademicsA Review of Professional Practices for Computer Sciences  Students in Academics
A Review of Professional Practices for Computer Sciences Students in Academics
 
AI IN DEFENCE.pptx
AI IN DEFENCE.pptxAI IN DEFENCE.pptx
AI IN DEFENCE.pptx
 
Artificial Intelligence
Artificial Intelligence Artificial Intelligence
Artificial Intelligence
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial Intelligence
 
Artificial intelligence .pptx
Artificial intelligence .pptxArtificial intelligence .pptx
Artificial intelligence .pptx
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligence
 
Iris scanner technology
Iris scanner technologyIris scanner technology
Iris scanner technology
 
Internet of Things and Artificial Intelligence
Internet of Things and  Artificial IntelligenceInternet of Things and  Artificial Intelligence
Internet of Things and Artificial Intelligence
 
Iris recognition
Iris recognition Iris recognition
Iris recognition
 

Similar to 7th Annual DynamicCISO Summit & Excellence Awards 2020 Report

Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022Matthew Rosenquist
 
Our Previous Edition Post event synopsis
Our Previous Edition Post event synopsisOur Previous Edition Post event synopsis
Our Previous Edition Post event synopsisVasuki Kashyap
 
The Most Trusted Cyber Threat Solution Providers in India 2023.pdf
The Most Trusted Cyber Threat Solution Providers in India  2023.pdfThe Most Trusted Cyber Threat Solution Providers in India  2023.pdf
The Most Trusted Cyber Threat Solution Providers in India 2023.pdfinsightssuccess2
 
Ms think-tank-coffee-table-book
Ms think-tank-coffee-table-bookMs think-tank-coffee-table-book
Ms think-tank-coffee-table-bookMicrosoft India
 
40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazineBradford Sims
 
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINETopCyberNewsMAGAZINE
 
Learnings from the IDC South Africa CIO Summit 2023 #IDSACIO (1).pptx
Learnings from the IDC South Africa CIO Summit 2023 #IDSACIO (1).pptxLearnings from the IDC South Africa CIO Summit 2023 #IDSACIO (1).pptx
Learnings from the IDC South Africa CIO Summit 2023 #IDSACIO (1).pptxCompanySeceon
 
Event report 2014 published
Event report 2014 publishedEvent report 2014 published
Event report 2014 publishedDSCI_Connect
 
Identity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdfIdentity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdfChinatu Uzuegbu
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019Ulf Mattsson
 
The 10 Most Influential People in Cyber Security, 2023.pdf
The 10 Most Influential People in Cyber Security, 2023.pdfThe 10 Most Influential People in Cyber Security, 2023.pdf
The 10 Most Influential People in Cyber Security, 2023.pdfCIO Look Magazine
 
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibm
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibmciso-platform-annual-summit-2013-ciso assessment exec summary _ibm
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibmPriyanka Aash
 
India's Leading Cyber Security Companies to Watch.pdf
India's Leading Cyber Security Companies to Watch.pdfIndia's Leading Cyber Security Companies to Watch.pdf
India's Leading Cyber Security Companies to Watch.pdfinsightssuccess2
 
NUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital ageNUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital ageNUS-ISS
 
Francis Kaitano Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015
Francis Kaitano Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015Francis Kaitano Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015
Francis Kaitano Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015CSO_Presentations
 

Similar to 7th Annual DynamicCISO Summit & Excellence Awards 2020 Report (20)

BCI Hyd Forum Newsletter Aug'17
BCI Hyd Forum Newsletter Aug'17BCI Hyd Forum Newsletter Aug'17
BCI Hyd Forum Newsletter Aug'17
 
Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022
 
Our Previous Edition Post event synopsis
Our Previous Edition Post event synopsisOur Previous Edition Post event synopsis
Our Previous Edition Post event synopsis
 
The Most Trusted Cyber Threat Solution Providers in India 2023.pdf
The Most Trusted Cyber Threat Solution Providers in India  2023.pdfThe Most Trusted Cyber Threat Solution Providers in India  2023.pdf
The Most Trusted Cyber Threat Solution Providers in India 2023.pdf
 
Ms think-tank-coffee-table-book
Ms think-tank-coffee-table-bookMs think-tank-coffee-table-book
Ms think-tank-coffee-table-book
 
40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine
 
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
 
csxnewsletter
csxnewslettercsxnewsletter
csxnewsletter
 
Learnings from the IDC South Africa CIO Summit 2023 #IDSACIO (1).pptx
Learnings from the IDC South Africa CIO Summit 2023 #IDSACIO (1).pptxLearnings from the IDC South Africa CIO Summit 2023 #IDSACIO (1).pptx
Learnings from the IDC South Africa CIO Summit 2023 #IDSACIO (1).pptx
 
Event report 2014 published
Event report 2014 publishedEvent report 2014 published
Event report 2014 published
 
CDS_2015_PER(1)
CDS_2015_PER(1)CDS_2015_PER(1)
CDS_2015_PER(1)
 
Challenging Insecurity: A Roadmap to Cyber Confidence
Challenging Insecurity: A Roadmap to Cyber ConfidenceChallenging Insecurity: A Roadmap to Cyber Confidence
Challenging Insecurity: A Roadmap to Cyber Confidence
 
Identity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdfIdentity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdf
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019
 
The 10 Most Influential People in Cyber Security, 2023.pdf
The 10 Most Influential People in Cyber Security, 2023.pdfThe 10 Most Influential People in Cyber Security, 2023.pdf
The 10 Most Influential People in Cyber Security, 2023.pdf
 
India's Leading Cyber Security Companies_compressed.pdf
India's Leading Cyber Security Companies_compressed.pdfIndia's Leading Cyber Security Companies_compressed.pdf
India's Leading Cyber Security Companies_compressed.pdf
 
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibm
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibmciso-platform-annual-summit-2013-ciso assessment exec summary _ibm
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibm
 
India's Leading Cyber Security Companies to Watch.pdf
India's Leading Cyber Security Companies to Watch.pdfIndia's Leading Cyber Security Companies to Watch.pdf
India's Leading Cyber Security Companies to Watch.pdf
 
NUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital ageNUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital age
 
Francis Kaitano Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015
Francis Kaitano Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015Francis Kaitano Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015
Francis Kaitano Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015
 

More from Rahul Neel Mani

TweetChat - A Grey Head Digital Initiative
TweetChat - A Grey Head Digital InitiativeTweetChat - A Grey Head Digital Initiative
TweetChat - A Grey Head Digital InitiativeRahul Neel Mani
 
Cybersecurity: Glimpses from the 2017
Cybersecurity: Glimpses from the 2017Cybersecurity: Glimpses from the 2017
Cybersecurity: Glimpses from the 2017Rahul Neel Mani
 
5th Annual DynamicCISO Summit 9-10 March 2018, Mumbai
5th Annual DynamicCISO Summit 9-10 March 2018, Mumbai5th Annual DynamicCISO Summit 9-10 March 2018, Mumbai
5th Annual DynamicCISO Summit 9-10 March 2018, MumbaiRahul Neel Mani
 
CIO Productivity Conclave 2017
CIO Productivity Conclave 2017 CIO Productivity Conclave 2017
CIO Productivity Conclave 2017 Rahul Neel Mani
 
Being a Digital Industrial By Anthony Thomas, Group Chief Information Officer...
Being a Digital Industrial By Anthony Thomas, Group Chief Information Officer...Being a Digital Industrial By Anthony Thomas, Group Chief Information Officer...
Being a Digital Industrial By Anthony Thomas, Group Chief Information Officer...Rahul Neel Mani
 
Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...
Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...
Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...Rahul Neel Mani
 
Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...
Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...
Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...Rahul Neel Mani
 
Security Incident Response Readiness Survey
Security Incident Response Readiness Survey  Security Incident Response Readiness Survey
Security Incident Response Readiness Survey Rahul Neel Mani
 
Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game   Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game Rahul Neel Mani
 
State of the Internet: Mirai, IOT and History of Botnets
State of the Internet: Mirai, IOT and History of BotnetsState of the Internet: Mirai, IOT and History of Botnets
State of the Internet: Mirai, IOT and History of BotnetsRahul Neel Mani
 
Detect Unknown Threats, Reduce Dwell Time, Accelerate Response
Detect Unknown Threats, Reduce Dwell Time, Accelerate ResponseDetect Unknown Threats, Reduce Dwell Time, Accelerate Response
Detect Unknown Threats, Reduce Dwell Time, Accelerate ResponseRahul Neel Mani
 
Upgrading Your Firewall? Its Time for an Inline Security Fabric
Upgrading Your Firewall? Its Time for an Inline Security FabricUpgrading Your Firewall? Its Time for an Inline Security Fabric
Upgrading Your Firewall? Its Time for an Inline Security FabricRahul Neel Mani
 
Is Cyber Security the Elephant in the Boardroom?
Is Cyber Security the Elephant in the Boardroom? Is Cyber Security the Elephant in the Boardroom?
Is Cyber Security the Elephant in the Boardroom? Rahul Neel Mani
 
CIO Productivity Conclave 2016
CIO Productivity Conclave 2016CIO Productivity Conclave 2016
CIO Productivity Conclave 2016Rahul Neel Mani
 
Take Control of Your Imaging and Printing: Siva Kumar
Take Control of Your Imaging and Printing: Siva KumarTake Control of Your Imaging and Printing: Siva Kumar
Take Control of Your Imaging and Printing: Siva KumarRahul Neel Mani
 
SMAC in Healthcare: Arvind Sivaramakrishnan, CIO Apollo Hospitals
SMAC in Healthcare:   Arvind Sivaramakrishnan, CIO Apollo HospitalsSMAC in Healthcare:   Arvind Sivaramakrishnan, CIO Apollo Hospitals
SMAC in Healthcare: Arvind Sivaramakrishnan, CIO Apollo HospitalsRahul Neel Mani
 

More from Rahul Neel Mani (20)

TweetChat - A Grey Head Digital Initiative
TweetChat - A Grey Head Digital InitiativeTweetChat - A Grey Head Digital Initiative
TweetChat - A Grey Head Digital Initiative
 
Cybersecurity: Glimpses from the 2017
Cybersecurity: Glimpses from the 2017Cybersecurity: Glimpses from the 2017
Cybersecurity: Glimpses from the 2017
 
5th Annual DynamicCISO Summit 9-10 March 2018, Mumbai
5th Annual DynamicCISO Summit 9-10 March 2018, Mumbai5th Annual DynamicCISO Summit 9-10 March 2018, Mumbai
5th Annual DynamicCISO Summit 9-10 March 2018, Mumbai
 
CIO Productivity Conclave 2017
CIO Productivity Conclave 2017 CIO Productivity Conclave 2017
CIO Productivity Conclave 2017
 
Being a Digital Industrial By Anthony Thomas, Group Chief Information Officer...
Being a Digital Industrial By Anthony Thomas, Group Chief Information Officer...Being a Digital Industrial By Anthony Thomas, Group Chief Information Officer...
Being a Digital Industrial By Anthony Thomas, Group Chief Information Officer...
 
Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...
Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...
Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...
 
Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...
Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...
Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...
 
Sumit dhar
Sumit dharSumit dhar
Sumit dhar
 
Security Incident Response Readiness Survey
Security Incident Response Readiness Survey  Security Incident Response Readiness Survey
Security Incident Response Readiness Survey
 
Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game   Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game
 
Cyber Crime Management
Cyber Crime ManagementCyber Crime Management
Cyber Crime Management
 
ABC of Infosec
ABC of InfosecABC of Infosec
ABC of Infosec
 
State of the Internet: Mirai, IOT and History of Botnets
State of the Internet: Mirai, IOT and History of BotnetsState of the Internet: Mirai, IOT and History of Botnets
State of the Internet: Mirai, IOT and History of Botnets
 
Detect Unknown Threats, Reduce Dwell Time, Accelerate Response
Detect Unknown Threats, Reduce Dwell Time, Accelerate ResponseDetect Unknown Threats, Reduce Dwell Time, Accelerate Response
Detect Unknown Threats, Reduce Dwell Time, Accelerate Response
 
Get the Basics Right
Get the Basics RightGet the Basics Right
Get the Basics Right
 
Upgrading Your Firewall? Its Time for an Inline Security Fabric
Upgrading Your Firewall? Its Time for an Inline Security FabricUpgrading Your Firewall? Its Time for an Inline Security Fabric
Upgrading Your Firewall? Its Time for an Inline Security Fabric
 
Is Cyber Security the Elephant in the Boardroom?
Is Cyber Security the Elephant in the Boardroom? Is Cyber Security the Elephant in the Boardroom?
Is Cyber Security the Elephant in the Boardroom?
 
CIO Productivity Conclave 2016
CIO Productivity Conclave 2016CIO Productivity Conclave 2016
CIO Productivity Conclave 2016
 
Take Control of Your Imaging and Printing: Siva Kumar
Take Control of Your Imaging and Printing: Siva KumarTake Control of Your Imaging and Printing: Siva Kumar
Take Control of Your Imaging and Printing: Siva Kumar
 
SMAC in Healthcare: Arvind Sivaramakrishnan, CIO Apollo Hospitals
SMAC in Healthcare:   Arvind Sivaramakrishnan, CIO Apollo HospitalsSMAC in Healthcare:   Arvind Sivaramakrishnan, CIO Apollo Hospitals
SMAC in Healthcare: Arvind Sivaramakrishnan, CIO Apollo Hospitals
 

Recently uploaded

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 

Recently uploaded (20)

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 

7th Annual DynamicCISO Summit & Excellence Awards 2020 Report

  • 1. CHECKMATE! 7th DynamicCISO Summit & Excellence Awards 27th – 28th Feb 2020 POST-EVENT REPORT
  • 2. About CISO Summit • The theme for this year’s 7th Annual dynamicCISO Summit 2020 was Checkmate! • It’s entire focus on applying intelligence, strategy and technology for better cyber- defense • The conference deliberated on how CISOs and Cybersecurity professionals can create a robust “Defense Mechanism” for a stronger, better, cybersecurity posture • The event had 20+ sessions, 55+ speakers, and approximately 210 senior security pros from across India.
  • 3. Editor’s Welcome 7th edition of the summit got off to a flying start with an incisive introduction from Rahul Neel Mani, Editor, dynamicCISO.com. He emphasized on the need for a deeper, and more comprehensive understanding of the threat landscape and called for an intense coordination among key stakeholders to thwart the emerging cyber threats.
  • 4. DYNAMICCISO Mindmap: Applying Intelligence, Strategy & Technology for Better Cyber Defense Aligned with the theme of this year’s Summit, the inaugural session was a Live on “Applying Intelligence, Strategy & Technology for Better Cyber Defense.” The crux of the discussion was that cybersecurity strategy, threat intel, and technology are the key arsenals in a CISO’s chest. Moderated by Burgess Cooper, Partner, EY India, the other panelists were Durga Prasad Dube, Sr. VP, Reliance; Na. Vijayashankar, Chairman, Foundation of Data Protection Professionals in India; Uday Deshpande, Group CISO, L&T; Hitesh Mulani, Group CISO & VP - IT Partner Collaboration & Process Excellence, Mahindra Rise and Sunil Varkey, Cybersecurity Expert.
  • 5. Summit Keynote 1: The Elephant in the Room In line with the theme of the Summit 2020, Capt. Felix Mohan, CEO, CISO Cybersecurity delivered the first keynote on the topic: The Elephant in the Room. He spoke on how a CISO may sometime ignore the big problems that are right in front of their eyes, causing momentary inconvenience or disruption. He argued that such ignored areas can later develop into really troublesome areas. It's time the elephant in the room is addressed as soon as noticed. “You should know yourself and your enemies well to win the war. Threat and vulnerability assessments are the key to it,” he said.
  • 6. Title Partner Keynote: Intelligent Cybersecurity 2020 & Beyond Aligned with theme, the Title Partner Keynote was spot on. Titled as Intelligent Cybersecurity: 2020 & Beyond it threw light on how it is imperative for organizations to deploy a structured approach to security and risk management with a clear roadmap for at least the next five years. The speakers of this session were Balaji Subramaniam, Head - Intelligent Security Business Unit, NTT Ltd.; Rishikesh Kamat, Product Head - Managed Security & IMS, NTT Ltd. and Sanjivan S Shirke, Head - Information Security & SVP (IT), UTI Asset Management Co. Ltd.
  • 7. Presenting Partner Keynote: Combating Modern Threats with Intrinsic Security The Presenting Partner Keynote on “Combating Modern Threats with Intrinsic Security” was delivered by Ashish Chalke, Specialist Systems Engineer, Dell Technologies. He spoke about how cybersecurity is no longer a technology problem, but a business-wide challenge. This requires businesses to move up the security maturity model - from being 'guarded', moving through being 'informed' and 'integrated' to finally becoming 'resilient' where security is embedded within each business function.
  • 8. CISO Face Off: Man Versus Machine - Follow the Basic Instincts Or A Machine-Driven Approach In this face off session on Man Vs. Machine: Follow the Basic Instincts Or A Machine-Driven Approach an interesting and intriguing discussion followed with active participation of two senior cyber security experts namely Sanjay Tiwari, CISO, IIFL and Amit Dhawan, CISO, Birlasoft. The face off was moderated by Keyur Desai, CIO, Essar Ports & Shipping. The speakers argued how the limitation in human intelligence has paved the way for applying Artificial Intelligence (AI) to strengthen cyber defense. While AI is helping organizations take cybersecurity to the next level, it cannot render the human aspect redundant. The argument went on…
  • 9. Power Session: Changing Cyber Landscape - The Battle of Algorithms Apurva Jain, Territory Sales Manager, Dark Trace presented the session on an interesting topic “Changing Cyber Landscape: The Battle of Algorithms.” She spoke about how AI is doing the heavy lifting for the attackers, making the attacks faster and more effective. Defending against such advanced threats and attack vector requires an immune system approach that focuses on understanding the entire organization’s DNA using advanced AI algorithms.
  • 10. CISO Brainstorm: Building Successful Cyber Defence Programs: Checks & Balances The topic of the first CISO Brainstorm “Building Successful Cyber Defense Programs: Checks & Balances.” The panelists felt that in a perimeterless world, there has to be a judicious mix of people, process and technology to create a robust security structure. Of all these, the people component is particularly critical and often remains neglected. The panelists included Vijay Devnath, CISO, CRIS; Ravi Burlagadda, VP, Reliance Jio; Manu Bhatia, Director Cyber Security, HCL Technologies; Ajay Dubey, Country Head NetSec and Channels, Forcepoint. The panel was moderated by Dinesh Bareja, COO, Open Security Alliance
  • 11. Summit Keynote 2: Cyber Immunity: Mimicking the Human Immune System - A New Perspective The second Keynote of the day was by eminent cybersecurity specialist Durga Prasad Dubey who is CISO & Sr. VP at Reliance Industries Ltd. He started his session by an interesting case of about how the human body reacts to infections. It creates a coordinated response. Can cybersecurity also be such that it has prevention and detection together with self-help built into it? “Modern cybersecurity strategies need to incorporate these elements and learn from the natural world”, he argued.
  • 12. Power Session: Cross Generation Detection & Response This Power Session was presented by Vijendra Katiyar, Director - Enterprise Non-named Business, India & SAARC, Trend Micro on the topic “Cross Generation Detection & Response.” Vijendra explained how the definition of detection has changed over a period of time and that today the idea of detection is preempting the threat, and the first thing that comes to mind is endpoint detection response which is EDR. It will becomes easier for the CISOs to take actions if EDR is in place.
  • 13. Hackers’ Live: Securing the Future The first Hackers’ Live session was focused on the topic: Securing the Future. It was presented by Aseem Jakhar, Co-Founder & Director Research and Development, Payatu. Aseem is a seasoned professional who specializes in Internet of Things (IoT) security; Embedded/Hardware security; Mobile security; Security Software development; and Security Training.
  • 14. DynamicCISO Research: “Being of a CISO” DynamicCISO, for the first time in seven years, has commissioned a research "Being of a CISO." The Research Report was unveiled by Dr. Kapil Dev Singh, CEO, Coeus Age. The report was a joint effort between dynamicCISO and Coeus Age. The findings of the research report were highlighted at the CISO Summit. The research is a result of qualitative interviews with CISOs and CIOs and a quantitative survey of 80+ CISOs and 60+ CIOs which was administered during Dec 2019 - Jan 2020. The session by Dr. Singh was intense and full of self- discovery.
  • 15. CISO Brainstorm: Digital Risk Management: Defence In Depth with Agility in Mind The CISO Brainstorm on Digital Risk Management: Defense-in-Depth with Agility in Mind was attended by seasoned panelists including Sreeshankar Gurujalam, Director - Information Security, Ocwen Financial Solutions; Ravindranath Hirolikar, CISO, HighRadius, Kanishk Gaur, Director, EY, Aman Chhikara, CISO, Aristi Ninja. The discussion was moderated by Bharat Panchal, CRO, FIS Global. The panelists were on the opinion that CISOs must evolve and not be restricted to their silos. A multi-layered approach is needed for a thorough digital risk management strategy.
  • 16. Fireside Chat with Lux Rao, NTT Prior to the DynamicCISO Excellence Awards 2020 a Fireside Chat was conducted between Lux Rao, Solutions Director & Leader - Digital Transformation, NTT Ltd. and Rahul Neel Mani, Editor, dynamicCISO.com. The talked revolved around how organizations should pursue a resilient security posture such as the Zero Trust framework as part of their overall digital transformation strategy. They also felt that looking at Cybersecurity holistically is critical to ensure that a business will stay in business and does not become a victim to increasingly hostile attack vectors and rampant rise of malafide actors.
  • 17. 7th Annual DynamicCISO Excellence Awards Like every year for past 7 years, dynamicCISO recognized and felicitated “Bold CISO” for their exceptional work in the field of cybersecurity. The jury for this year’s awards adjudication consisted of Durga Dubey, Sr. VP, Reliance Industries Ltd.; Bharat Panchal, CRO, FIS Global; Uday Deshpande, Group CISO, L&T; Kapil Dev Singh, CEO, Coeus Age; Suhas Mhaskar, CEO, Accent Technovation; and Shubhendu Dutta, CISO, Aujas. The awards were given in the presence of Rahul Neel Mani, Editor, dynamicCISO. This year’s attraction was Women Cybersecurity Leaders 2020 Awards to promote diversity and inclusion.
  • 18. DAY 2: CISO Face Off: Threat Hunting – The Only Saviour in Defending Business This CISO Face Off on the second day revolved around the topic “Threat Hunting – The Only Savior in Defending Business.” Threat hunting is one of the most critical components in cybersecurity and is increasingly being used for identifying net new threats faced by organizations. The speakers in this session were Mathan Babu Kasilingam, CISO, NPCI; Subhajit Deb, CISO, Dr. Reddy’s Laboratories; and Amit Pradhan, EVP - Technology Security, CTSO & Chief Privacy Officer, Vodafone Idea. The Face Off was moderated by Rishi Rajpal, Director - Global Security, Concentrix. The participants agreed that threat hunting needs to look beyond conventional sources of gathering intel.
  • 19. Cloud Security: Secure Cloud Transformation The Cloud Security session was delivered by Mrinal Pal, Head IT, Tata Steel. He made a case that cloud transformation for enterprises must have clear strategies including ease of provisioning, availability, scale, disaster recovery, external sage and ease of management.
  • 20. CISO Brainstorm: Cloud-based Business - An Inescapable Evil for CISOs Cloud-based Business: An Inescapable Evil for CISOs was the topic of this CISO Brainstorm. The panelists included Akhil Verma, CISO, Airtel Payments Bank; Satish Kumar Dwibhashi, VP & CISO, Wibmo; Rajiv Nandwani, Physical and IT Security Continuity Senior Manager, Boston Consulting Group, Sapan Talwar, Sr. VP - Global Information Security, Tower Research Capital, and Vinit Sinha, Head - Information Security, Cyber Security and Data Privacy, Pine Labs. The session was moderated was Bhavuk Arora, Interim CISO, Virtual CISO, Think Act Consulting.
  • 21. Data Privacy Masterclass: Implementing Privacy: Frameworks & Best Practices For the first time we organized a Data Privacy Masterclass on the second day of the summit. This was delivered by Data Privacy expert Shivangi Nadkarni, CEO, Arrka Consulting. The topic of this masterclass was “Implementing Privacy : Frameworks & Best Practices.” It focused on how data security and privacy are often used interchangeably. Shivangi explained that this is however not the case. Privacy is not just security. Privacy has personal data at the core. We should use that as a foundation, then overlay the laws and compliance and then identify the gaps.
  • 22. Legal Inputs: Cybersecurity Laws and What CISOs and Organizations Should Know About Them The Legal Inputs session was well received and was on a very pertinent topic “Cybersecurity Laws and What CISOs and Organizations Should Know About Them.” The panelists were Brijesh Singh, Inspector General of Police, Cyber, Government of Maharashtra; Himanshu Gaur, Principal Consultant - Cyber Security, Tata Communications; Kalpesh Doshi, CISO, FIS Global; Anil Chiplunkar, Cyber Fraud Investigator; and Shruti Bist, Advocate, Supreme Court of India. The panel was moderated by Khushbu Jain, Advocate, Supreme Court of India.
  • 23. CISO Face Off: Outsourcing Vs. In-house: What's the Best Model that Works? The last CISO Faceoff of the 7th Annual Summit was on a topic “Outsourcing Vs. In-house: What's the Best Model that Works?” The speakers were A Shiju Rawther, EVP, IIFL Sridhar Sidhu, Senior VP & Head of Information Security Services Group, Wells Fargo; Rajesh Nadkarni, CISO, CDSL and R Vijay, CISO, Cams Ltd. Moderated by Fal Ghancha, CISO, DSP Mutual Fund, the house was divided between those who believed in an in-house security model versus those who were in favour of outsourcing a majority, operational part of it.
  • 24. Hackers’ Live 2 The second Hackers’ Live session was presented by Sunny Vaghela, Founder & CEO, Techdefence Labs. Vaghela spoke at length about the recent data breaches and lessons learned and demonstrated certain Zero Day vulnerabilities as well as IOT /IIOT hacking using applications level vulnerability exploitations.
  • 25. Hackers’ Live 3 The 3rd Hackers’ Live session was delivered by Nitesh Surana, Independent Security Researcher. He elaborated on the State of OSINT in 2020. Nitesh spoke about the various tools, techniques, and procedures to carry out effective OSINT. He made his point through the use of example scenarios and also explained how to use OSINT techniques to conduct security assessments within an organization.
  • 26. CyberSec Demo This was the last but one of the most exciting sessions of the 7th Annual DynamicCISO Summit. The topic of this session was “Big Data & Cybersecurity.” Rahul Sasi, Founder & CTO, CloudSek showcased a live drone which was well received by the audience. The session brought down curtains on the the 7th Edition of the Summit.
  • 27.
  • 28. Twitter #CISOSummit2020 Total Tweets: 1075+ Impressions: 2.2 Million Contribution: 118 Original Tweets: 345+ LinkedIn #CISOSummit2020 Total Posts: 214+ Videos: 16 (40000+ views) Social Cards:118 Images: 135++ #CISOSummit2020 was one of the Trending hashtags on twitter on 27th February 2020
  • 29.
  • 30. CHECKMATE! 7th DynamicCISO Summit & Excellence Awards 27th – 28th Feb 2020