At India Security conclave you’ll hear from peers who are leading the way and bringing charismatic changes to
revolutionize the Security domain.
Chief Security Officer & Security Managers Summit is a
Pan-India knowledge forum converging on security trends, best practices, Products and developments that
will help the heads of security and the ones in the making
succeed as the leading enterprise representatives in
security.
The Summit will also promote exchange of ideas and
establish a synergy between dierent stake holders in
electronic security and surveillance systems namely MANUFACTURERS (OEM’S /ODM’S),
CHANNEL PARTNERS
SYSTEM INTEGRATORS
NETWORK ENGINEERS
CORPORATE SECURIT Y END-USERS
Industrial Control Security USA Sacramento California Oct 6/7James Nesbitt
Industrial Control Cybersecurity USA October 6th and 7th
Sacramento California USA
Identify, protect, detect, respond and recover.
All stakeholders have a new responsibility in ensuring the safety, reliability and stability of our Critical National Infrastructure. Public and Private partnerships are paramount and information sharing on an international level a priority. We will be addressing key areas of vulnerability, threat detection, mitigation, and planning for the Energy and Water Sector.
Dwight Koop's Chicago ECFT talk "The Chicago School of Cybersecurity Thinking...Cohesive Networks
Slides from Cohesive Networks' COO Dwight Koop at the April 2015 meeting of the Chicago Electronic Crimes Task Force, sponsored by Cohesive Networks and the United States Secret Service.
On April 30, 2015 Dwight Koop presented “The Chicago School of Cybersecurity Thinking: A Pragmatic Mid-Western Look at Cybersecurity Risk and Regulation”
About the ECTF:
CECTF represents a diverse membership of over 600 public and private security professionals, academia representatives and law enforcement officials throughout Illinois, Wisconsin, and Northern Indiana. The United States Secret Service contributes to the CECTF by bringing together experts in an interactive environment. These professionals bring experience, knowledge, and resources to support electronic and financial crimes investigations, computer forensic examinations, and judicial testimony. Many members are investigators trained as responders to IT-related incidents, including network intrusion. The CECTF is dedicated to sharing knowledge of cutting-edge technologies, identifying cyber-based vulnerabilities, developing strategies to combat cyber and financial crimes, and the protection of our nation's critical financial infrastructure.
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...IT Network marcus evans
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Director, DotSec, a sponsor company at the upcoming marcus evans Australian CIO Summit 2013, on how organisations can ensure information security becomes a business enabler.
Industrial Control Security USA Sacramento California Oct 6/7James Nesbitt
Industrial Control Cybersecurity USA October 6th and 7th
Sacramento California USA
Identify, protect, detect, respond and recover.
All stakeholders have a new responsibility in ensuring the safety, reliability and stability of our Critical National Infrastructure. Public and Private partnerships are paramount and information sharing on an international level a priority. We will be addressing key areas of vulnerability, threat detection, mitigation, and planning for the Energy and Water Sector.
Dwight Koop's Chicago ECFT talk "The Chicago School of Cybersecurity Thinking...Cohesive Networks
Slides from Cohesive Networks' COO Dwight Koop at the April 2015 meeting of the Chicago Electronic Crimes Task Force, sponsored by Cohesive Networks and the United States Secret Service.
On April 30, 2015 Dwight Koop presented “The Chicago School of Cybersecurity Thinking: A Pragmatic Mid-Western Look at Cybersecurity Risk and Regulation”
About the ECTF:
CECTF represents a diverse membership of over 600 public and private security professionals, academia representatives and law enforcement officials throughout Illinois, Wisconsin, and Northern Indiana. The United States Secret Service contributes to the CECTF by bringing together experts in an interactive environment. These professionals bring experience, knowledge, and resources to support electronic and financial crimes investigations, computer forensic examinations, and judicial testimony. Many members are investigators trained as responders to IT-related incidents, including network intrusion. The CECTF is dedicated to sharing knowledge of cutting-edge technologies, identifying cyber-based vulnerabilities, developing strategies to combat cyber and financial crimes, and the protection of our nation's critical financial infrastructure.
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...IT Network marcus evans
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Director, DotSec, a sponsor company at the upcoming marcus evans Australian CIO Summit 2013, on how organisations can ensure information security becomes a business enabler.
A review of the "lessons learned" in establishing a CISO/CSO role in two different organizations. The things that security folks DON\'T tell you...
Summary: To have positive authority upon Information Security is one of the goals every organization should achieve. A CISO (Chief Information Security Officer) is the responsible person in the company who should protect the business from the IT infrastructure. CISO will lead a security professional team which will take care of all the security components within an IT infrastructure.
Presenter: This week’s presenter will be our partner Mr. Daniel Robles, President of Cyborg Consulting, a company involved with Information and Cyber Security consulting, training, auditing and coaching. He is an experienced trainer and consultant with more than 20 professional certificates gained from credible institutions.
RSA Security Brief : Taking Charge of Security in a Hyperconnected WorldEMC
The new RSA Security Brief highlights that basic security lapses still contribute to most security incidents. The report identifies top areas for improvement and provides practical guidance on measures that deliver the greatest impact on organizations' ability to respond to cyber attacks and data breaches.
About RSA Security Brief :
RSA Security Briefs provide security leaders and risk management executives with essential guidance on today's most pressing information security threats and opportunities. Each Brief is created by a select team of experts who connect experiences across organizations to share specialized knowledge on a critical security topic. Offering both big-picture insight and practical technology guidance, RSA Security Briefs are vital reading for today's forward-thinking security and risk management practitioners.
Read More via
The Next Great Challenge for CISOs
I am honored to be recognized! Cybersecurity is truly a team effort at a strategic level, either we all work together or the threats will tear us down piecemeal! Every person, no matter their role, can play an important part in making digital technology trustworthy and keeping the Internet secure, private, and safe.
Industrial Control Cyber Security Europe 2015 James Nesbitt
The Industrial Control Cybersecurity conference consists of presentations and debate from some of the energy industry’s leading end users from Operational and IT backgrounds, Government influencers, leading cybersecurity authorities and some of the world’s most influential solution providers.
Key topics of discussion will pivot on convergence of operational and information technology transformation, design, implementation, integration and risks associated with enterprise facing architecture.
Further review includes the development of policy, operational and cultural considerations, maturity models, public and private information sharing and the adoption of cybersecurity controls.
2015 will provide further insight into how industry can further develop organisational priorities, effective methodologies, benchmark return on investment for cybersecurity procurement, supplier relationships and how to effectively deploy defense in-depth strategies.
We will introduce discussion on the latest attacks and hear from those who are responsible for identifying them. The conference will further address penetration testing, the art of detection and threat monitoring, incident response and recovery.
What i learned at issa international summit 2019Ulf Mattsson
This session will discuss what attendees learned at The ISSA International Summit 2019, held on October 1-2 at in Irving/Dallas, TX.
Learn from one of the presenters at this conference and what cybersecurity professionals got to share and learn from the leaders in the industry.
Over the last 30 years ISSA international has grown into the global community of choice for international cybersecurity professionals. With over 100 domestic and international chapters, members have world wide support with daily cyber threats that are becoming increasingly intricate and difficult to prevent, detect, and re-mediate.
Navigating COVID's Impact on the Financial Services IndustryCitrin Cooperman
Citrin Cooperman professionals joined InfraGard for a webinar, “Navigating COVID's Impact on the Financial Services Industry and Lessons Learned/Actions Your Company Can Take From Their Experiences: Lessons Learned and Actions Your Company Can Take From Their Experiences."
A review of the "lessons learned" in establishing a CISO/CSO role in two different organizations. The things that security folks DON\'T tell you...
Summary: To have positive authority upon Information Security is one of the goals every organization should achieve. A CISO (Chief Information Security Officer) is the responsible person in the company who should protect the business from the IT infrastructure. CISO will lead a security professional team which will take care of all the security components within an IT infrastructure.
Presenter: This week’s presenter will be our partner Mr. Daniel Robles, President of Cyborg Consulting, a company involved with Information and Cyber Security consulting, training, auditing and coaching. He is an experienced trainer and consultant with more than 20 professional certificates gained from credible institutions.
RSA Security Brief : Taking Charge of Security in a Hyperconnected WorldEMC
The new RSA Security Brief highlights that basic security lapses still contribute to most security incidents. The report identifies top areas for improvement and provides practical guidance on measures that deliver the greatest impact on organizations' ability to respond to cyber attacks and data breaches.
About RSA Security Brief :
RSA Security Briefs provide security leaders and risk management executives with essential guidance on today's most pressing information security threats and opportunities. Each Brief is created by a select team of experts who connect experiences across organizations to share specialized knowledge on a critical security topic. Offering both big-picture insight and practical technology guidance, RSA Security Briefs are vital reading for today's forward-thinking security and risk management practitioners.
Read More via
The Next Great Challenge for CISOs
I am honored to be recognized! Cybersecurity is truly a team effort at a strategic level, either we all work together or the threats will tear us down piecemeal! Every person, no matter their role, can play an important part in making digital technology trustworthy and keeping the Internet secure, private, and safe.
Industrial Control Cyber Security Europe 2015 James Nesbitt
The Industrial Control Cybersecurity conference consists of presentations and debate from some of the energy industry’s leading end users from Operational and IT backgrounds, Government influencers, leading cybersecurity authorities and some of the world’s most influential solution providers.
Key topics of discussion will pivot on convergence of operational and information technology transformation, design, implementation, integration and risks associated with enterprise facing architecture.
Further review includes the development of policy, operational and cultural considerations, maturity models, public and private information sharing and the adoption of cybersecurity controls.
2015 will provide further insight into how industry can further develop organisational priorities, effective methodologies, benchmark return on investment for cybersecurity procurement, supplier relationships and how to effectively deploy defense in-depth strategies.
We will introduce discussion on the latest attacks and hear from those who are responsible for identifying them. The conference will further address penetration testing, the art of detection and threat monitoring, incident response and recovery.
What i learned at issa international summit 2019Ulf Mattsson
This session will discuss what attendees learned at The ISSA International Summit 2019, held on October 1-2 at in Irving/Dallas, TX.
Learn from one of the presenters at this conference and what cybersecurity professionals got to share and learn from the leaders in the industry.
Over the last 30 years ISSA international has grown into the global community of choice for international cybersecurity professionals. With over 100 domestic and international chapters, members have world wide support with daily cyber threats that are becoming increasingly intricate and difficult to prevent, detect, and re-mediate.
Navigating COVID's Impact on the Financial Services IndustryCitrin Cooperman
Citrin Cooperman professionals joined InfraGard for a webinar, “Navigating COVID's Impact on the Financial Services Industry and Lessons Learned/Actions Your Company Can Take From Their Experiences: Lessons Learned and Actions Your Company Can Take From Their Experiences."
Own Your Future!
“It is time for us all to stand and cheer for the doer, the achiever - the one who recognizes the challenges and does something about it.” Vince Lombardi
ONLY talents! NO ranking here!
With the global skills shortage, it is crucial to encourage talents who dedicate their life and career to cybersecurity.
This special edition spotlights remarkable cybersecurity and industry 4.0 professionals. Top Cyber News Magazine is pleased to unveil a constellation of young and devoted men and women: amabasadors, erudites, and influencers.
All, part and inspiring force behind the global Cybersecurity Awareness movement. These talented experts and brilliant people coming from nineteen countries and five continents.
I invite you to discover these wonderful people. Speak about them. See the light in others and you will be stunned how this light comes back to you! Enjoy reading! Share! Learn!
40 under 40! Move to the Front Lines!
Editorial by Steve KING
Managing Director at CyberTheory
As the gap expands between supply and demand in cybersecurity skills, we now see over 70 online eLearning courses available that focus across a wide range of upskilling opportunities from data privacy to compliance to risk and vulnerability assessment and audit. As we celebrate our newest class of 40 under 40, we are optimistic that this generation of cybersecurity enthusiasts are interested in the actual battle zones upon which our current war is being fought and not on preparation for the administrative roles which are also necessary in battle, yet not feeling the pressure from the current skills gap.
In our work with our own eLearning platform, CyberEd.io, we have discovered that the key employment opportunities lie along the front lines of deployment, where trained cyber-warriors are so necessary not just to defend our critical assets but to serve as a deterrent to the flood of cyber-criminals assaulting our fortresses. Every CISO we talk to confirms this requirement with both anecdotal and empirical evidence that is leading to almost daily breaches across all industrial sectors with specific threats to banking, education, healthcare, military and industrial control systems in automated factories (OT).
The cyber-warrior education career path starts with a solid grasp of network engineering fundamentals, followed by security architecture & engineering with an emphasis on Cloud/SysOps/*nix (*Unix/Linux Linux, FreeBSD, and Mac OS X), ICS/IoT, identity access management, security assessment & testing, current threat profiles and malware infrastructure and architecture, vector identification, incident detection, security operations with forensics and incident handling, pen testing, and exploitation.
Without properly trained resources in advanced cyber-warfare, we will never prevail in our constant challenge to protect and defend, let alone being able to take the threat to the enemy. As more and more entry candidates choose training to prepare them for ...
The dynamicCISO Summit 7th Annual CISO Summit & Excellence Awards 2020 were held in Mumbai during 27-28 Feb 2020 at Hotel Leela. The summit was attended by over 220 senior #CISOs and other #cybersecurity professionals from across the country. In total there were 20 sessions held across two days and there were over 55 eminent experts and speakers who delivered the sessions.
Similar to India security conclave brochure 2016 (20)
Car Accident Injury Do I Have a Case....Knowyourright
Every year, thousands of Minnesotans are injured in car accidents. These injuries can be severe – even life-changing. Under Minnesota law, you can pursue compensation through a personal injury lawsuit.
Lifting the Corporate Veil. Power Point Presentationseri bangash
"Lifting the Corporate Veil" is a legal concept that refers to the judicial act of disregarding the separate legal personality of a corporation or limited liability company (LLC). Normally, a corporation is considered a legal entity separate from its shareholders or members, meaning that the personal assets of shareholders or members are protected from the liabilities of the corporation. However, there are certain situations where courts may decide to "pierce" or "lift" the corporate veil, holding shareholders or members personally liable for the debts or actions of the corporation.
Here are some common scenarios in which courts might lift the corporate veil:
Fraud or Illegality: If shareholders or members use the corporate structure to perpetrate fraud, evade legal obligations, or engage in illegal activities, courts may disregard the corporate entity and hold those individuals personally liable.
Undercapitalization: If a corporation is formed with insufficient capital to conduct its intended business and meet its foreseeable liabilities, and this lack of capitalization results in harm to creditors or other parties, courts may lift the corporate veil to hold shareholders or members liable.
Failure to Observe Corporate Formalities: Corporations and LLCs are required to observe certain formalities, such as holding regular meetings, maintaining separate financial records, and avoiding commingling of personal and corporate assets. If these formalities are not observed and the corporate structure is used as a mere façade, courts may disregard the corporate entity.
Alter Ego: If there is such a unity of interest and ownership between the corporation and its shareholders or members that the separate personalities of the corporation and the individuals no longer exist, courts may treat the corporation as the alter ego of its owners and hold them personally liable.
Group Enterprises: In some cases, where multiple corporations are closely related or form part of a single economic unit, courts may pierce the corporate veil to achieve equity, particularly if one corporation's actions harm creditors or other stakeholders and the corporate structure is being used to shield culpable parties from liability.
Matthew Professional CV experienced Government LiaisonMattGardner52
As an experienced Government Liaison, I have demonstrated expertise in Corporate Governance. My skill set includes senior-level management in Contract Management, Legal Support, and Diplomatic Relations. I have also gained proficiency as a Corporate Liaison, utilizing my strong background in accounting, finance, and legal, with a Bachelor's degree (B.A.) from California State University. My Administrative Skills further strengthen my ability to contribute to the growth and success of any organization.
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence LawyersHarpreetSaini48
Discover how Mississauga criminal defence lawyers defend clients facing weapon offence charges with expert legal guidance and courtroom representation.
To know more visit: https://www.saini-law.com/
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Massimo Talia
This guide aims to provide information on how lawyers will be able to use the opportunities provided by AI tools and how such tools could help the business processes of small firms. Its objective is to provide lawyers with some background to understand what they can and cannot realistically expect from these products. This guide aims to give a reference point for small law practices in the EU
against which they can evaluate those classes of AI applications that are probably the most relevant for them.
1. INDIA
SECURITY
CONCLAVE
NOVEMBER 25, 2016
Le Meridien, New Delhi
Chief Security Officer
&
Security Managers Summit
Organized By
Co-Organized By
www.indiasecurityconclave.com
Corporate Security in the Era of Global Security
“ “
2. In the wake of 26/ 11 attack in year 2008, many companies
reviewed their security operations. The actions of that day
made clear that security was not merely a matter of
protecting employees and facilities from physical harm
but a terrorist attack as such on a major business district
could disrupt operations, inhibit travel, snarl supply
chains, and pose major strategic issues for the conduct
and even the survival of a multinational business.
Corporations and businesses have learned since the 26/11
attack, that robust security practices are particularly
important for their well-being.
INTRODUCTION
DESPITE RAISED EXPECTATIONS AND
HEIGHTENED VISIBILITY, CORPORATE INDIA
IS UNDERGOING AN EVOLUTION RATHER
THAN A REVOLUTION IN THE MANAGEMENT
OF SECURITY CONCERNS
HUMAN CONTINUITY IS THE CRITICAL
ELEMENT OF CORPORATE CONTINUITY
“ “ “ “
The recent devastating Paris attacks, California shootings,
Dhaka Café attack and constant terror threats have once
again placed security at the top of the agenda for many
companies. These particularly alarming situations
demonstrate the vulnerability of occupational settings to
attacks. Public transportation systems—themselves being
workplace for many—have been a target of international
terrorism. One can imagine the devastation by disruption
of systems that many rely on for commuting to and from
work. As attackers will continue to focus their efforts on
Though we may not see the future but we should be
prepared for it. Workplace preparedness for disaster and
terrorism is vital to protect and sustain our National
security, Defence and Public health in the 21st century.
Educating employees about terrorism and bioterrorism
and response behaviours help individuals prepare their
families, their communities and our nation. Regardless of
their locations, all employees are subject to threat
exposure or actual terrorist events through their own
travel, travel of family members, changes in workplace
environment, weapons of mass destruction or pandemic
outbreak, which would affect large areas of the country.To
counter the same, we require a resilient workplace and a
well versed and prepared workforce.
vulnerable targets with the greatest potential for impact,
the workplace is likely to continue to be the site of future
attacks.
The major goal of such attacks at a workplace is to disrupt
the nation’s economy, destroy the infrastructure, and
detriment the citizens and communities created by it. Thus
it is essential that interventions for preparedness, response
and recovery occur in occupational settings.
Introduction
Summit
Highlights
Delegate
Profile
Event Format
Benefits of
Sponsorship
Glimpse of
ISC 2015
Past Sponsors
Past Speakers
Attendees
Profile
Contact us
3. CSOs and Security managers these days are not only
responsible for their organization's physical security needs
for digital or electronic security requirements, but also for a
robust and equipped workplace and workforce. The new
Security heads should be able to foresee threats and
embrace appropriate security measures to contain such
situations. With security and risk concerns at an all-time
high, it seems there’s no stopping for the rise of those in
security’s highest office.
CSOs and Security Managers are in high demand, but the
ingredients that make a successful security leader must be
understood.
At this conclave you’ll hear from peers who are leading
the way and bringing charismatic changes to
revolutionize the Security domain.
Chief Security Officer & Security Managers Summit is a
Pan-India knowledge forum converging on security
UNDERSTANDING THE BARRIERS AND
OPPORTUNITIES FOR PREPARING THE
WORKFORCE AND IN THIS WAY THE
CITIZENS OF THE NATION— IS A CRITICAL
STEP IN PROTECTING OUR WORKFORCE
AND CORPORATE CONTINUITY.
“ “
trends, best practices, Products and developments that
will help the heads of security and the ones in the making
succeed as the leading enterprise representatives in
security.
The Summit will also promote exchange of ideas and
establish a synergy between different stake holders in
electronic security and surveillance systems namely
In line with the future trends of convergence and integration
of Electronic Security with Building Management Systems
(BMS), the event features application based case-studies on
efficient and cost-effective utilization of technology for
securing infrastructure, facilities, physical assets, data and
Human lives besides improving vigilance and administrative
efficiency for companies.
MANUFACTURERS (OEM’S /ODM’S),
CHANNEL PARTNERS
SYSTEM INTEGRATORS
NETWORK ENGINEERS
CORPORATE SECURITY END-USERS
Introduction
Summit
Highlights
Delegate
Profile
Event Format
Benefits of
Sponsorship
Glimpse of
ISC 2015
Past Sponsors
Past Speakers
Attendees
Profile
Contact us
4. We at Crux Creative Solutions Pvt Ltd will
bring you speakers from up to 15 organisations with
outstanding security prowess. During the conclave
distinguished executives and technologists will share
their experiences and insights not only in protecting
and securing their organisations, but in selling and
funding their programs to senior management and
demonstrating business value.
DONʼT MISS THE OPPORTUNITY
TO BE A PART OF THE SUMMIT
DONʼT MISS THE OPPORTUNITY
TO BE A PART OF THE SUMMIT
Introduction
Summit
Highlights
Delegate
Profile
Event Format
Benefits of
Sponsorship
Glimpse of
ISC 2015
Past Sponsors
Past Speakers
Attendees
Profile
Contact us
5. SUMMIT HIGHLIGHTS INCLUDE
200 + Attendees
20 + Speakers
10 + Exhibitors
Insights from top security
leaders of today
Information on the latest
security innovations
Recommendations to improve
security and reduce risk
Modern Approaches to
Security Awareness
Interactive sessions will boost
your security IQ across today’s
most important topics
Introduction
Summit
Highlights
Delegate
Profile
Event Format
Benefits of
Sponsorship
Glimpse of
ISC 2015
Past Sponsors
Past Speakers
Attendees
Profile
Contact us
6. DELEGATE PROFILE & DESIGNATIONS
Chief Security Officer Heads of Security Head of Corporate Security
Large scale end-users of electronic security and surveillance systems
DirectorEnd-to-end Security solutions Service providers
Business Development System Integrators Private SectorPublic Sector
Architects System Integrators IP Network EngineersElectrical Engineers
Marketing and Sales from Electronic Security Channel partners
Security Consultant Distributors Importers InstallersSecurity Architects
Head - IT CEOChief Technology OfficerLoss Prevention Manager
Head - Facility Management Chief of Physical SecurityHead - Administration
70%
Decision Makers
30%
Senior Influencers
Introduction
Summit
Highlights
Delegate
Profile
Event Format
Benefits of
Sponsorship
Glimpse of
ISC 2015
Past Sponsors
Past Speakers
Attendees
Profile
Contact us
7. EVENT FORMAT
UNDERSTANDING THE BARRIERS AND OPPORTUNITIES FOR PREPARING THE
WORKFORCE AND IN THIS WAY THE CITIZENS OF THE NATION— IS A CRITICAL
STEP IN PROTECTING OUR WORKFORCE AND CORPORATE CONTINUITY.
“ “
It’s a unique invitation-only event with thought provoking conference sessions, executive roundtables, and
innovative networking opportunities resulting in a day of focused, structured business development and information
exchange.
Introduction
Summit
Highlights
Delegate
Profile
Event Format
Benefits of
Sponsorship
Glimpse of
ISC 2015
Past Sponsors
Past Speakers
Attendees
Profile
Contact us
8. BENEFITS OF SPONSORSHIP
THROUGH VARIOUS
OPPORTUNITIES
Exclusive Presentation Slot
Sponsors will get 15minutes presentation slot in
a session of their choice, addressing the full audience.
Keynote Panel Moderator
Sponsor will engage the audience through thoughtful
questions and challenging opinions as the moderator of a
panel session. This positions the Sponsor to have the ear of
top practitioner leaders,voicing their concerns and ideas, as
well as present their organization as a thought leader on
stage in front of the full audience.
Exclusive Workshop
Sponsor will lead an interactive, 45minute session to a
select group of delegates (up to 15) from the Exchange in
a private conference room. Designed around a topic
selected by sponsor, which lends itself to the current
challenges our delegates are facing and the services that
sponsor offers.
One On One Business Meetings
When you register as a sponsor, you will be asked to
identify the clients that you would like to meet, so we can
match your company with the executives who will fit your
business goals. Prior to the exchange, you will be able to
assess the attendees and select the ones who match your
initiatives and priorities. These private 15 to 20minutes
one-on-one meetings give you the opportunity to offer
objective, flexible, and relevant strategies for continued
success.
Keynote Panel
Discussion
A 45 minute open and
engaging panel discussion
alongside other key industry
leaders addressing the full
audience of attendees. Panel
will be moderated by event
chairperson or requested
end-user attendee.
Introduction
Summit
Highlights
Delegate
Profile
Event Format
Benefits of
Sponsorship
Glimpse of
ISC 2015
Past Sponsors
Past Speakers
Attendees
Profile
Contact us
9. GLIMPSE OF ISC 2015
PAST SPONSORS CCSRE EVENTS
R
Introduction
Summit
Highlights
Delegate
Profile
Event Format
Benefits of
Sponsorship
Glimpse of
ISC 2015
Past Sponsors
Past Speakers
Attendees
Profile
Contact us
10. PAST SPEAKERS
Shri. Kiren Rijiju
Honourable Minister of State,
Ministry of Home Affairs,
Government of India
Shri. Gopal Pillai
IAS (Retd.),
Former Union Home and Commerce Secretary,
Government of India
Shri. T V S N Prasad
IAS, Joint Secretary
(Police Modernisation),
Ministry of Home Affairs, GOI
Shri Raghu Raman
President – Risk, Security & New Ventures,
Reliance Industries Ltd.
Shri CSR Reddy
IPS,
ADGP Provisioning and Modernization,
Punjab Police
Shri Haribhai Parathibhai Chaudhary
Honorable Minister of State,
Ministry of Home Affairs,
Government of India
Shri Arvind Ranjan
IPS(Retd.),
Former DG,
Central Industrial Security Force (CISF)
Col.(Retd.) IB Thomas
Mr. Hemant Jaggi
AGM- Safety,
Security & Crisis Management Lemon Tree Hotels Ltd.
Shri N. Ramachandran
IPS(Retd.),
Former DGP (A&M) and CEO,
Police Foundation & Institute
Smt. K.Bhavaneeswari
IPS,
Chief Security Officer,
Chennai Metro Rail Limited
Shri Anvesh Manglam
IPS, Director General
Central Industrial Security Force (CISF)
Shri Sailesh
IAS,
Addl. Secretary (Centre State),
Ministry of Home Affairs, GOI
Mr. Deepak Dadhwal
Business Partner – Security, Aircel
Capt. Ramesh Kumar
Head of Security,
Mumbai Metro One Pvt. Ltd
(MMOPL)
Col Sandeep Sudan
Head – Special Services Group,
Global Corporate Security,
Reliance Industries Ltd
Introduction
Summit
Highlights
Delegate
Profile
Event Format
Benefits of
Sponsorship
Glimpse of
ISC 2015
Past Sponsors
Past Speakers
Attendees
Profile
Contact us
11. Others
10%
ATTENDEE PROFILE
GOVERNMENT REPRESENTATIVES (MINISTRIES, POLICE AND PARAMILITARY
ORGANISATIONS AND OTHER GOVERNMENT AGENCIES) - 25%
SECURITY SOLUTION PROVIDERS - 20%
SECURITY HEADS OF PRIVATE ORGANISATIONS - 40%
OTHERS - 10%
CONSULTANTS - 5%
GovernmentRepresentatives
25%
Consultants
5%
SecuritySolutionProviders
20%
SecurityHeadsofprivateorganisations
40%
Introduction
Summit
Highlights
Delegate
Profile
Event Format
Benefits of
Sponsorship
Glimpse of
ISC 2015
Past Sponsors
Past Speakers
Attendees
Profile
Contact us
12. ATTENDEE CLASSIFICATION BY DESIGNATION
MINISTRIES
ADDITIONAL SECRETARY
JOINT SECRETARY
MISSION DIRECTOR
DIRECTOR GENERAL
DIRECTOR
ADDITIONAL DIRECTOR
DEPUTY DIRECTOR GENERAL
TECHNICAL DIRECTOR AND SENIOR SCIENTIST
INDUSTRY
CHIEF EXECUTIVE OFFICER
MANAGING DIRECTOR
CHIEF OPERATING OFFICER
VICE PRESIDENT
ASSISTANT VICE PRESIDENT
GENERAL MANAGER
ASSOCIATE DIRECTORS
CHIEF ADVISOR
CHIEF SECURITY OFFICER
SECURITY HEADS
COUNTRY MANAGERS
REGIONAL MANAGER
SENIOR MANAGER
SENIOR CONSULTANT
MANAGER
POLICE & PARAMILITARY
ADDITIONAL DIRECTOR GENERAL OF POLICE (ADGP)
INSPECTOR GENERAL OF POLICE (IGP)
JOINT COMMISSIONER OF POLICE (JCP)
DEPUTY INSPECTOR GENERAL OF POLICE (DIGP)
ADDITIONAL COMMISSIONER OF POLICE (ADDL. CP)
DEPUTY COMMISSIONER OF POLICE (DCP)
ADDITIONAL INSPECTOR GENERAL OF POLICE (AIGP)
ADDITIONAL DEPUTY COMMISSIONER OF POLICE (ADCP)
Introduction
Summit
Highlights
Delegate
Profile
Event Format
Benefits of
Sponsorship
Glimpse of
ISC 2015
Past Sponsors
Past Speakers
Attendees
Profile
Contact us