Blockchain, ID and access management, OT security and boards' roles in cybersecurity were among the hottest topics topics discussed at Information Security Media Group's Security Summit in Mumbai on Nov. 29.
Threat landscape is rapidly changing. New technologies are being adopted quickly. Organizations are facing challenges on how to get threat visibility into this complex environment and at the same time ensure that business continuity is taken care of. This session will focus on these key security and technology trends...
In an environment in which cybersecurity threats are steadily increasing and business dependence on technology and the attendant risks are higher than ever before, cybersecurity risks are now commanding board-level attention. But board members don't necessarily understand how to tackle the cybersecurity issue. After...
Cybersecurity is the central challenge of our digital age. Without it, everything from our personal email accounts and privacy to the way we do business, and all types of critical infrastructure, are under threat. As attackers evolve, staying ahead of these threats is getting harder.
Against such growing challenges,...
Digital automation of all business processes globally is compelling enterprise fraud risk and vigilance teams to leverage cybersecurity tools to predict business fraud. It's critical to know how human behavioral analytics, machine learning and orchestration can play important roles.
The session addresses:
How...
Organizations are increasingly looking at advanced IAM policies and controls to reduce insider data breach risks. CISOs are working toward establishing processes to grant appropriate access to data by creating and managing user accounts and prevent unauthorized access to information. Organizations have started...
According to a recent Gartner report, Blockchain distributed ledger technology has reached the peak of its hype cycle and remains at the peak of inflated expectations. It offers enormous promise, but enterprises are unsure how to extract business value from it. The questions raised: What are the applications of a...
Payments technology changes rapidly, but cybercriminal techniques are having no trouble staying one step ahead. As the use of stolen data and fraudulent cards becomes more difficult, criminals are now shifting their focus to customer payment transaction data. The risk of data theft is very real. To stay ahead,...
India recently witnessed a broad international attack on the banking system. Cosmos Cooperative Bank in Pune, Union Bank, Punjab National Bank and others were the victims of cyber fraudsters as hackers infiltrated bank system and siphoned money.
Most breaches are caused by the failure of some processes in the...
CISOs are under pressure to keep their organizations secure, but is the measure of success, only the avoidance of a data breach and bad press? Is there a mechanism to measure the effectiveness of cybersecurity programs and determine if your security posture is getting better or worse over time?
This session...
Security practitioners have been working hard to find ways to operationalize threat intelligence for IT environments. But with many security teams now being put in charge of OT security as well, understanding and mitigating OT threats is a whole different ball game. From uptime to visibility and asset discovery, CISOs...
As the volume and speed of network data increases, security tools are unable to keep up, resulting in security tool sprawl, performance degradation, inefficiencies and unnecessary expenditures. Because your network is critical to operations, it's a juicy target for cyberthreats, including ransomware and data...
India's newly proposed data protection framework, prepared by the expert committee chaired by Justice B. N. Srikrishna, and its upcoming mandatory breach notification requirements, raise some compelling questions.
This panel shares its insights on:
What would constitute a personal data breach under the new...
ISMG's Security Summit in Mumbai on Nov. 29 will offer insights from CISOs and other experts on hot topics, including setting the boardroom security agenda, using cyber threat intelligence, preventing fraud through the use of blockchain, securing digital payments and preparing for a breach notification law.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.in, you agree to our use of cookies.