SlideShare a Scribd company logo
About EC-Council Global CISO Summit
 EC-Council’s CISO events bring CISOs from all over the world
togetherto focus on the real information security threats to
nations, companies, and networks.
 EC-Council’s CISO Programhas over 1,400 participants from
across industries and around the world.
 At this invite-only, closed-door event, we’ll hear from leaders
who have implementednext generation technologies,
paradigms, and strategies to solve ever more complicated
security challenges.
 EC-Council CISOs come from around the world, including
Hong Kong, Egypt, the Netherlands, Bangladesh, Canada, the
Philippines, Ghana, Sri Lanka, China, Zambia, Nigeria, the UAE,
Switzerland, Mexico, the United Kingdom, Iceland, and all
across the United States.
Theme
 “Agile Security in a Dynamic Threat Landscape”
 With the theme of “Agile Security in a Dynamic Threat Landscape” EC-Council’s first executive event
locatedoutside of the US is shaping up to be the must-attend conferenceof the year in India
EC-Council
Global CISO Summit 2015
Organizing Committee
Shri. B.J. Srinath
Director General
Indian Computer Emergency
Response Team (ICERT)
Mr. Burgess Cooper
Partner-Information
& Cyber Security
Ernst & Young Global Limited
Mr. Vishal Salvi
Partner, Advisory, CyberSecurity
PricewaterhouseCoopers Pvt.Ltd. (PwC)
Mr. Manish Tiwari
National (Information) Security Officer
Microsoft India
Organizing Committee
Mr. Felix Mohan
Founder and CEO
CISO Academy
Mr. Sameer Ratolikar
SVP & CISO - Chief InformationSecurity Officer
HDFC Bank Ltd.
Mr. Balaji Venkateshwar
Chief Executive Officer
Secure Matrix Global Pvt. Ltd.
Mr. Vinayak Muzumdar
Chief Information Officer
InformationTechnology Services
Deloitte Shared Services India Pvt. Ltd.
Dr. A.K. Mohapatra
Guru Gobind Singh Indraprastha
University (GGSIPU)
GLOBAL CISO SUMMIT INDIA 2015 - AGENDA
Time Session Speaker
Thank you

More Related Content

What's hot

Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to Success
Sirius
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centers
Brencil Kaimba
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations center
CMR WORLD TECH
 
Cybersecurity Risk Management Framework Strategy Workshop
Cybersecurity Risk Management Framework Strategy WorkshopCybersecurity Risk Management Framework Strategy Workshop
Cybersecurity Risk Management Framework Strategy Workshop
Life Cycle Engineering
 
NIST Cybersecurity Framework Intro for ISACA Richmond Chapter
NIST Cybersecurity Framework Intro for ISACA Richmond ChapterNIST Cybersecurity Framework Intro for ISACA Richmond Chapter
NIST Cybersecurity Framework Intro for ISACA Richmond Chapter
Tuan Phan
 
Threat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - SubmittedThreat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - SubmittedSteve Lodin
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
OoXair
 
What is iso 27001 isms
What is iso 27001 ismsWhat is iso 27001 isms
What is iso 27001 isms
Craig Willetts ISO Expert
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
Ahmad Haghighi
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentation
Shariyaz Abdeen
 
The Board and Cyber Security
The Board and Cyber SecurityThe Board and Cyber Security
The Board and Cyber Security
FireEye, Inc.
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Stephen Cobb
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza Adineh
ReZa AdineH
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
Krist Davood - Principal - CIO
 
Isms awareness presentation
Isms awareness presentationIsms awareness presentation
Isms awareness presentation
Pranay Kumar
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)
Sqrrl
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation Center
S.E. CTS CERT-GOV-MD
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident Response
PECB
 
Effective Cyber Defense Using CIS Critical Security Controls
Effective Cyber Defense Using CIS Critical Security ControlsEffective Cyber Defense Using CIS Critical Security Controls
Effective Cyber Defense Using CIS Critical Security Controls
BSides Delhi
 
Iso 27001 awareness
Iso 27001 awarenessIso 27001 awareness
Iso 27001 awareness
Ãsħâr Ãâlâm
 

What's hot (20)

Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to Success
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centers
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations center
 
Cybersecurity Risk Management Framework Strategy Workshop
Cybersecurity Risk Management Framework Strategy WorkshopCybersecurity Risk Management Framework Strategy Workshop
Cybersecurity Risk Management Framework Strategy Workshop
 
NIST Cybersecurity Framework Intro for ISACA Richmond Chapter
NIST Cybersecurity Framework Intro for ISACA Richmond ChapterNIST Cybersecurity Framework Intro for ISACA Richmond Chapter
NIST Cybersecurity Framework Intro for ISACA Richmond Chapter
 
Threat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - SubmittedThreat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - Submitted
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
What is iso 27001 isms
What is iso 27001 ismsWhat is iso 27001 isms
What is iso 27001 isms
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentation
 
The Board and Cyber Security
The Board and Cyber SecurityThe Board and Cyber Security
The Board and Cyber Security
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza Adineh
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Isms awareness presentation
Isms awareness presentationIsms awareness presentation
Isms awareness presentation
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation Center
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident Response
 
Effective Cyber Defense Using CIS Critical Security Controls
Effective Cyber Defense Using CIS Critical Security ControlsEffective Cyber Defense Using CIS Critical Security Controls
Effective Cyber Defense Using CIS Critical Security Controls
 
Iso 27001 awareness
Iso 27001 awarenessIso 27001 awareness
Iso 27001 awareness
 

Similar to CISO PPT

CTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francisCTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francissegughana
 
3rd Annual CISO Round Table
3rd Annual CISO Round Table3rd Annual CISO Round Table
3rd Annual CISO Round Table
Vinoth Sivasubramanan
 
Global CISO Summit India 2015
Global CISO Summit India 2015Global CISO Summit India 2015
Global CISO Summit India 2015Bhumika Kaushal
 
ICS Cyber Security Europe 2015
ICS Cyber Security Europe 2015ICS Cyber Security Europe 2015
ICS Cyber Security Europe 2015
G. Jane Louise Cook
 
7th Annual DynamicCISO Summit & Excellence Awards 2020 Report
7th Annual DynamicCISO Summit & Excellence Awards 2020 Report7th Annual DynamicCISO Summit & Excellence Awards 2020 Report
7th Annual DynamicCISO Summit & Excellence Awards 2020 Report
Rahul Neel Mani
 
CISO Summit 2020 Post Event Report
CISO Summit 2020 Post Event ReportCISO Summit 2020 Post Event Report
CISO Summit 2020 Post Event Report
Sarthak Nanda
 
Effectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdfEffectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdf
Chinatu Uzuegbu
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
vngundi
 
Cyber-Handbook-Enterprise.pdf
Cyber-Handbook-Enterprise.pdfCyber-Handbook-Enterprise.pdf
Cyber-Handbook-Enterprise.pdf
IgorSamuel12
 
Cyber handbook enterprise v1.6
Cyber handbook enterprise v1.6Cyber handbook enterprise v1.6
Cyber handbook enterprise v1.6
hymasakhamuri
 
Need for a Nodal Authority for Cyber Security By Dr.S.Jagadeesh Kumar
Need for a Nodal Authority for Cyber Security By Dr.S.Jagadeesh KumarNeed for a Nodal Authority for Cyber Security By Dr.S.Jagadeesh Kumar
Need for a Nodal Authority for Cyber Security By Dr.S.Jagadeesh Kumar
Dr.S.Jagadeesh Kumar
 
NGN integrated information security v3 DetikNas
NGN integrated information security v3 DetikNasNGN integrated information security v3 DetikNas
NGN integrated information security v3 DetikNas
Emyana Ruth
 
Cyber Security India & Cyber Crime
Cyber Security India & Cyber CrimeCyber Security India & Cyber Crime
Cyber Security India & Cyber Crime
Deepak Kumar (D3)
 
3 Ira Winkler
3  Ira Winkler3  Ira Winkler
3 Ira Winklermloginov
 
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Hamisi Kibonde
 
SBIC Enterprise Information Security Strategic Technologies
SBIC Enterprise Information Security Strategic TechnologiesSBIC Enterprise Information Security Strategic Technologies
SBIC Enterprise Information Security Strategic Technologies
EMC
 

Similar to CISO PPT (20)

CTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francisCTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francis
 
3rd Annual CISO Round Table
3rd Annual CISO Round Table3rd Annual CISO Round Table
3rd Annual CISO Round Table
 
Global CISO Summit India 2015
Global CISO Summit India 2015Global CISO Summit India 2015
Global CISO Summit India 2015
 
ICS Cyber Security Europe 2015
ICS Cyber Security Europe 2015ICS Cyber Security Europe 2015
ICS Cyber Security Europe 2015
 
7th Annual DynamicCISO Summit & Excellence Awards 2020 Report
7th Annual DynamicCISO Summit & Excellence Awards 2020 Report7th Annual DynamicCISO Summit & Excellence Awards 2020 Report
7th Annual DynamicCISO Summit & Excellence Awards 2020 Report
 
CISO Summit 2020 Post Event Report
CISO Summit 2020 Post Event ReportCISO Summit 2020 Post Event Report
CISO Summit 2020 Post Event Report
 
Effectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdfEffectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdf
 
CRI-Exec-Cyber-Briefings (1)
CRI-Exec-Cyber-Briefings (1)CRI-Exec-Cyber-Briefings (1)
CRI-Exec-Cyber-Briefings (1)
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 
CDS_2015_PER(1)
CDS_2015_PER(1)CDS_2015_PER(1)
CDS_2015_PER(1)
 
OS17 Brochure
OS17 BrochureOS17 Brochure
OS17 Brochure
 
Cyber-Handbook-Enterprise.pdf
Cyber-Handbook-Enterprise.pdfCyber-Handbook-Enterprise.pdf
Cyber-Handbook-Enterprise.pdf
 
Cyber handbook enterprise v1.6
Cyber handbook enterprise v1.6Cyber handbook enterprise v1.6
Cyber handbook enterprise v1.6
 
Need for a Nodal Authority for Cyber Security By Dr.S.Jagadeesh Kumar
Need for a Nodal Authority for Cyber Security By Dr.S.Jagadeesh KumarNeed for a Nodal Authority for Cyber Security By Dr.S.Jagadeesh Kumar
Need for a Nodal Authority for Cyber Security By Dr.S.Jagadeesh Kumar
 
NGN integrated information security v3 DetikNas
NGN integrated information security v3 DetikNasNGN integrated information security v3 DetikNas
NGN integrated information security v3 DetikNas
 
Cyber Security India & Cyber Crime
Cyber Security India & Cyber CrimeCyber Security India & Cyber Crime
Cyber Security India & Cyber Crime
 
3 Ira Winkler
3  Ira Winkler3  Ira Winkler
3 Ira Winkler
 
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)
 
MECSCE 2015 - Brochure
MECSCE 2015 - BrochureMECSCE 2015 - Brochure
MECSCE 2015 - Brochure
 
SBIC Enterprise Information Security Strategic Technologies
SBIC Enterprise Information Security Strategic TechnologiesSBIC Enterprise Information Security Strategic Technologies
SBIC Enterprise Information Security Strategic Technologies
 

CISO PPT

  • 1.
  • 2. About EC-Council Global CISO Summit  EC-Council’s CISO events bring CISOs from all over the world togetherto focus on the real information security threats to nations, companies, and networks.  EC-Council’s CISO Programhas over 1,400 participants from across industries and around the world.  At this invite-only, closed-door event, we’ll hear from leaders who have implementednext generation technologies, paradigms, and strategies to solve ever more complicated security challenges.  EC-Council CISOs come from around the world, including Hong Kong, Egypt, the Netherlands, Bangladesh, Canada, the Philippines, Ghana, Sri Lanka, China, Zambia, Nigeria, the UAE, Switzerland, Mexico, the United Kingdom, Iceland, and all across the United States.
  • 3. Theme  “Agile Security in a Dynamic Threat Landscape”  With the theme of “Agile Security in a Dynamic Threat Landscape” EC-Council’s first executive event locatedoutside of the US is shaping up to be the must-attend conferenceof the year in India EC-Council Global CISO Summit 2015
  • 4. Organizing Committee Shri. B.J. Srinath Director General Indian Computer Emergency Response Team (ICERT) Mr. Burgess Cooper Partner-Information & Cyber Security Ernst & Young Global Limited Mr. Vishal Salvi Partner, Advisory, CyberSecurity PricewaterhouseCoopers Pvt.Ltd. (PwC) Mr. Manish Tiwari National (Information) Security Officer Microsoft India
  • 5. Organizing Committee Mr. Felix Mohan Founder and CEO CISO Academy Mr. Sameer Ratolikar SVP & CISO - Chief InformationSecurity Officer HDFC Bank Ltd. Mr. Balaji Venkateshwar Chief Executive Officer Secure Matrix Global Pvt. Ltd. Mr. Vinayak Muzumdar Chief Information Officer InformationTechnology Services Deloitte Shared Services India Pvt. Ltd. Dr. A.K. Mohapatra Guru Gobind Singh Indraprastha University (GGSIPU)
  • 6. GLOBAL CISO SUMMIT INDIA 2015 - AGENDA Time Session Speaker