Agenda

Grab the latest insights on risk management, cybersecurity, cloud security and more at Gartner Security & Risk Management Summit 2023 in Mumbai, India.

Agenda / Topic

View By:

Agenda / Topic

Monday, 13 February, 2023 / 11:00 AM - 11:30 AM IST

Outlook for Identity and Access Management

Abhyuday Data, Director Analyst, Gartner

Identity-first security has emerged as a theme in many major security initiatives and policies. Supporting these initiatives as well as delivering on business requirements for smooth, simple and secure access, and authentication decisions requires disparate IAM elements to work in concert. This session will provide an update on the major themes in IAM to ensure that your IAM decisions in 2023 will support the strategy of the future.

Monday, 13 February, 2023 / 02:30 PM - 02:50 PM IST

Insights From the Magic Quadrant and Critical Capabilities for Privileged Access Management

Abhyuday Data, Director Analyst, Gartner

Through a selection of relevant Gartner insights and complementary methodologies, we will provide insight into the latest updates in the privileged access management market.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, 13 February, 2023 / 04:00 PM - 04:30 PM IST

Developing a Strategy for SASE Adoption to Securely Enable the Anywhere Workforce

Thomas Lintemuth, VP Analyst, Gartner

Enterprises are shifting to hybrid work environments to enable anywhere, anytime access to resources that are located everywhere -- in SaaS, in public cloud IaaS with some workloads in the traditional data center. A SASE strategy enables users, devices and branches zero trust access to resources, regardless of location. This session will lay out a strategic timeframe and roadmap for SASE adoption.

Tuesday, 14 February, 2023 / 11:15 AM - 11:45 AM IST

ARCON: Converged Identity- The Future & How We Will Reach There!

Anil Bhandari, Chief Mentor, ARCON

An increase in the types of digital identities, coupled with multi-cloud adoption, has added complexity to managing identities and privileges. How does one get future-ready, to address these new-age challenges? An Identity-centric security strategy centers on effective governance with zero trust, that simplifies and unifies critical aspects of Access Management (AM), Identity Governance Administration (IGA) and Privileged Access Management (PAM). Join us to explore the benefits of a Converged Identity security approach that is outcome-driven, and looks to ditch the silos of key IAM components.

Tuesday, 14 February, 2023 / 02:45 PM - 03:15 PM IST

CyberArk Software: Identity Security – A Must Have Strategy to Solve Cloud Complexity

Organizations are expected to adopt services from 3 or more public cloud providers & expect 2x growth in number of all identities managed annually. 63% of 1500 organizations in multi-cloud environments have been a victim of a successful identity-related cybersecurity attack. With cloud attack as a foremost concern, it is imperative to constantly and ruthlessly secure access for all identities & monitor them throughout their lifecycle. Find out how a holistic and robust Identity Security strategy based on privilege controls can secure access for any identity – human & machine – anywhere.

Monday, 13 February, 2023 / 11:00 AM - 11:30 AM IST

AppSec 101: The Application Security you need now!

Manjunath Bhat, VP Analyst, Gartner

The number an complexity of tools and techniques that make up good application security practices can be overwhelming. There are various application security testing tools, threat modeling processes, security requirements, as well as runtime security controls that need to be considered. This session will review the tools and practices that are essential to any application security program.

Tuesday, 14 February, 2023 / 10:30 AM - 11:15 AM IST

Ask the Expert: How to Mitigate Software Supply Chain Security Risks

Manjunath Bhat, VP Analyst, Gartner

Attackers are targeting software development systems, open-source artifacts and DevOps pipelines to compromise software supply chains. In this Ask the Expert session, we will answer questions on emerging trends such as software bill of materials, hermetic pipelines and binary authorization to mitigate risks both for internally developed applications and externally procured software.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, 14 February, 2023 / 02:00 PM - 02:30 PM IST

Technical Insights: Microsoft 365: Office, EMS and Windows 10 — Top Security Features to Implement

Dennis Xu, Sr Director Analyst, Gartner

This session will discuss the evolution of Office 365 into Microsoft 365 and the security, identity and compliance features that all organizations must implement. We will discuss third-party options as well as the built in native Microsoft features along with strengths and weaknesses of each.

Tuesday, 14 February, 2023 / 02:45 PM - 03:15 PM IST

CyberArk Software: Identity Security – A Must Have Strategy to Solve Cloud Complexity

Organizations are expected to adopt services from 3 or more public cloud providers & expect 2x growth in number of all identities managed annually. 63% of 1500 organizations in multi-cloud environments have been a victim of a successful identity-related cybersecurity attack. With cloud attack as a foremost concern, it is imperative to constantly and ruthlessly secure access for all identities & monitor them throughout their lifecycle. Find out how a holistic and robust Identity Security strategy based on privilege controls can secure access for any identity – human & machine – anywhere.

Tuesday, 14 February, 2023 / 04:30 PM - 05:00 PM IST

Managing Open Source Software Risks in DevSecOps Environments

Manjunath Bhat, VP Analyst, Gartner

There are millions of open-source software projects in the world. Which ones are in your software? And what security, operational, and legal risks do they pose? Getting control and managing a myriad of risks requires information, process changed, and automated tools to spot and help remediate problems. In this session, we'll examine the various changes you should consider, along with the tools that can help in getting control.

Monday, 13 February, 2023 / 11:00 AM - 11:30 AM IST

Outlook for Cloud Security

Charlie Winckless, Sr Director Analyst, Gartner

Cloud security remains a top priority. This presentation summarizes the problems, recommended processes and new product types to address three key issues: What are the unique risks associated with public cloud service providers, and how can they be controlled? What are the unique security challenges of IaaS and how can they be mitigated? What are the unique control challenges of SaaS and how can they be addressed?

Monday, 13 February, 2023 / 11:45 AM - 12:15 PM IST

SentinelOne: Ransomware vs XDR - Modern Cybersecurity Warfare Has Changed the Game

As cyber threats evolve, so should your cybersecurity. Keeping a predominantly human-powered solution at the helm of your enterprise's security is leaving you at risk of costly cyber threats. In the current economic landscape, organizations can't afford to be subject to such risks. Attend this fireside chat with Security Leaders who have embraced autonomous cybersecurity that’s purpose-built to protect their organization from current and future threats.

Monday, 13 February, 2023 / 02:30 PM - 03:00 PM IST

Practical Guide to Architecting Cloud Security

Richard Bartley, VP Analyst, Gartner

How do you decide on which cloud security controls to deploy? The bewildering array of cloud security patterns can make common approaches to cloud security daunting. This session presents practical steps toward designing the right set of native and vendor layered cloud security components for your organization.

Monday, 13 February, 2023 / 03:15 PM - 03:45 PM IST

Zscaler: C-level Strategies for Driving Digital Transformation at Your Organization

Organizations across all sectors are recognizing the value of technology innovation to drive gains and stay ahead. Accelerating your organization’s digital transformation and technology initiatives can however look like a monumental challenge in today’s climate, where change is the only constant. Join this fireside chat, in partnership with Sudip Banerjee, Field CTO to learn how IT leaders can break down roadblocks, to drive a digital first mindset across the organization.

Monday, 13 February, 2023 / 04:00 PM - 04:30 PM IST

Developing a Strategy for SASE Adoption to Securely Enable the Anywhere Workforce

Thomas Lintemuth, VP Analyst, Gartner

Enterprises are shifting to hybrid work environments to enable anywhere, anytime access to resources that are located everywhere -- in SaaS, in public cloud IaaS with some workloads in the traditional data center. A SASE strategy enables users, devices and branches zero trust access to resources, regardless of location. This session will lay out a strategic timeframe and roadmap for SASE adoption.

Monday, 13 February, 2023 / 04:00 PM - 04:45 PM IST

Roundtable: Cloud Security Lessons Learned: The Good, the Bad, and the Ugly

Dennis Xu, Sr Director Analyst, Gartner

Come join your peers for a round table discussion on cloud security. Someone might have fixed the issue that you are struggling with, or they might have a better way to automate that security check. You might be evaluating the same CNAPP tool at the moment. Come share with your peers your unique cloud security journey.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, 14 February, 2023 / 11:15 AM - 11:45 AM IST

Versa Networks: Demystifying ZTA, ZTNA and the Criteria to Evaluate ZTNA Technologies

Kumar Mehta, Founder and Chief Development Officer, Versa Networks Inc

The term Zero Trust in today’s security paradigm is used to define a plethora of security products and technologies. Two of the most popular terms used in relation to this are Zero Trust Architecture and Zero Trust Network Access. Normally, security architects are not aware of the differences between the two and the fact that ZTNA is only a component of the overall Zero Trust Architecture. This session will strive to explain ZTA,ZTNA and their relationship with each other.We will also discuss the evaluation criteria and the criticality of selecting the right ZTNA solution for your requirements

Tuesday, 14 February, 2023 / 02:00 PM - 02:30 PM IST

Technical Insights: Microsoft 365: Office, EMS and Windows 10 — Top Security Features to Implement

Dennis Xu, Sr Director Analyst, Gartner

This session will discuss the evolution of Office 365 into Microsoft 365 and the security, identity and compliance features that all organizations must implement. We will discuss third-party options as well as the built in native Microsoft features along with strengths and weaknesses of each.

Tuesday, 14 February, 2023 / 02:45 PM - 03:15 PM IST

Dell Technologies: Cyber Recovery - Building a recovery strategy to increase Business Resiliency from ransomware attacks.

Cyber Resilience provides a high-level holistic strategy that includes cyber security standards, guidelines, people, business processes and technology solutions. This session provides a context around where Cyber Recovery solution fits into your overall Security and Cyber Resilience strategy using the NIST CyberSecurity Framework. Cyber Recovery provides additional layers of physical and logical security at both the solution, system and data/file level to ensure critical data can be preserved with integrity, confidentiality and to ensure it is available when needed for recovery. The session focusses upon Protecting critical data from cyber threats and away from the attack surface with the ability to recover data with ease, speed and accuracy.

Tuesday, 14 February, 2023 / 02:45 PM - 03:15 PM IST

CyberArk Software: Identity Security – A Must Have Strategy to Solve Cloud Complexity

Organizations are expected to adopt services from 3 or more public cloud providers & expect 2x growth in number of all identities managed annually. 63% of 1500 organizations in multi-cloud environments have been a victim of a successful identity-related cybersecurity attack. With cloud attack as a foremost concern, it is imperative to constantly and ruthlessly secure access for all identities & monitor them throughout their lifecycle. Find out how a holistic and robust Identity Security strategy based on privilege controls can secure access for any identity – human & machine – anywhere.

Tuesday, 14 February, 2023 / 03:45 PM - 04:15 PM IST

Technical Insights: Cloud Security 201

Charlie Winckless, Sr Director Analyst, Gartner

Cloud security remains a challenge; we have to protect data when it is out of our control. This session will address the emerging trends in cloud security, what they bring to your organization and how to use them most effectively. Security is seen as an obstruction to cloud adoption; this will show you how to enable without losing protection.

Tuesday, 14 February, 2023 / 04:30 PM - 05:00 PM IST

Emerging Technologies in Security and Risk Management

Abhyuday Data, Director Analyst, Gartner

Emerging risks and top security trends are driving innovation in security and risk management. Among many new areas in security that are emerging, which ones should you focus on? This session will explore high-impact emerging technologies in security and risk management.

Monday, 13 February, 2023 / 09:30 AM - 10:15 AM IST

Opening Keynote: The Top Cybersecurity Predictions for 2022-2023

Deepti Gopal, Director Analyst, Gartner

Christopher Mixter, VP, Research, Gartner

Every year, Gartner produces impactful predictions across all practices. This presentation will compile the top predictions prepared by our cybersecurity experts for the year 2022-2023. Security and risk management leaders should monitor these trends to be successful in the digital era especially as most recognize that global change could potentially be one crisis away.

Monday, 13 February, 2023 / 11:45 AM - 12:15 PM IST

Delinea: Risks of Identity Based Cyber Attacks–Real-World Ransomware Live Walkthrough

Joseph Carson, CHIEF SECURITY SCIENTIST & ADVISORY CISO, Delinea

Following the digital footprints of a malicious hacker and uncovering their attack path. This is a journey inside the mind of an ethical hacker's response to a ransomware incident that brought a business to a full stop, discovering the evidence left behind to uncover the attack path and the techniques used. I will cover a real-world ransomware incident response showing the techniques used and why, and the evidence left behind. Joseph Carson, CSS & Advisory CISO at Delinea, will take you through the mind of a hacker and follow the footsteps that led to a damaging Crylock ransomware attack.

Monday, 13 February, 2023 / 12:30 PM - 01:15 PM IST

Roundtable: Security and Risk Best Practices for Mid-size Enterprises

Paul Furtado, VP Analyst, Gartner

Join this discussion on security and risk best practices for mid-size enterprises. Midsize enterprises are defined as organizations between $50 million and $1 billion in annual revenue and fewer than 1,000 employees. This session is a good fit for you if your organization has between five and 50 people in IT and an IT budget between $5 million and $30 million.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, 13 February, 2023 / 02:30 PM - 03:15 PM IST

Ask the Expert: Risk-Based Vulnerability Management

Steve Santos, Sr Director Analyst, Gartner

Join this ask the experts session to get answers to key questions around risk-based vulnerability management. This session will offer answers to questions such as:
- how to do RBVM with process
- how to do RBVM with tools
- Best practices for RBVM

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, 13 February, 2023 / 02:30 PM - 04:00 PM IST

CISO Circle Workshop: Building Risk, Value, and Cost Charts for Cybersecurity

William Candrick, Director Analyst, Gartner

Your executives only care about risk, value, and cost. Why would you speak to them about anything else? This workshop will walk through the steps of identifying business processes and outcomes, aligning supporting technology stacks, and creating outcome-driven metrics to put cybersecurity in a business context.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, 13 February, 2023 / 03:15 PM - 03:45 PM IST

Zscaler: C-level Strategies for Driving Digital Transformation at Your Organization

Organizations across all sectors are recognizing the value of technology innovation to drive gains and stay ahead. Accelerating your organization’s digital transformation and technology initiatives can however look like a monumental challenge in today’s climate, where change is the only constant. Join this fireside chat, in partnership with Sudip Banerjee, Field CTO to learn how IT leaders can break down roadblocks, to drive a digital first mindset across the organization.

Monday, 13 February, 2023 / 04:00 PM - 04:30 PM IST

A New Look at Insider Risk

Paul Furtado, VP Analyst, Gartner

Gartner has observed a new approach to detecting and mitigating Insider Risk. Early detection and nudge-based intervention prove more cost effective than the traditional "detect, deter, destroy" model beloved by legacy security leaders. In this presentation, we outline how the new approach is not only better for the revenue line, it is also better for organizational culture and employee effectiveness.

Monday, 13 February, 2023 / 05:00 PM - 05:45 PM IST

Keynote: Stop Treating Security Like Magic and Security People Like Wizards

Roberta Witty, VP Analyst, Gartner

Refocus corporate security initiatives and efforts — from a futile effort to prevent breaches and to accepting the inevitability of breaches. We will define how to learn from normal accident theory to build a culture of resilience that is capable of reducing or eliminating business impacts from security breaches. This culture is built on characteristics and disciplines, which we will define in actionable terms.

Tuesday, 14 February, 2023 / 10:30 AM - 11:00 AM IST

What’s Top of Mind for CIOs and CEOs — Impact for SRM Leaders

Deepti Gopal, Director Analyst, Gartner

Gartner’s annual surveys collect data from thousands of CIOs on what matters most to them.
Join this session to learn:
• What’s most important to them
• How they are adapting to the fast-changing environment around them
• Implications for security and risk leaders

Tuesday, 14 February, 2023 / 10:30 AM - 11:00 AM IST

The Cybersecurity Value Metrics Every Organization Should Use

William Candrick, Director Analyst, Gartner

No one can tell you what your metrics should be … until now. Gartner has developed and vetted a prioritized list of metrics to describe the value of your cybersecurity program to satisfy the most challenging audiences including your board, CFO, COO, customers, partners and regulators. And we are working on benchmarks for each.
- What cybersecurity metrics should I measure?
- How can I use metrics to drive governance?

Tuesday, 14 February, 2023 / 10:30 AM - 12:30 PM IST

CISO Circle: Research Discussion: The CISO’s Guide to Cyber Risk Quantification

Christopher Mixter, VP, Research, Gartner

Rahul Balakrishnan, Director, Research, Gartner

CISOs report frustration that the time and effort their teams invest in quantifying cyber risk rarely drives risk owners to take action. In this interactive Research Discussion, exclusively for CISO Circle participants, you’ll network with peers on their cyber risk quantification efforts and discover how to use CRQ to effectively influence business decision making. This session will feature a deep-dive into Verizon’s CRQ practice, which delivers trustworthy, timely, and empowering guidance to risk owners without major investment in new data and skills…and without the need to conduct scenario likelihood calculations.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, 14 February, 2023 / 11:15 AM - 11:45 AM IST

Recorded Future: Secure With Intelligence- The Missing Piece of Your Architecture

Craig Adams, Chief of Product and Engineering, RECORDED FUTURE-MA

Threat Landscapes are constantly changing and keeping up with emerging security risks can feel like a daunting task. How do you know if you are covered when new threats are emerging? Join us to learn how organisations can tap on security intelligence to help understand the cyber threat landscape better and also increase organisations’ operational efficiency in threat prevention and risk mitigation- the important missing piece of your architecture if you are without it.

Tuesday, 14 February, 2023 / 12:00 PM - 12:30 PM IST

Trends in Midsize Enterprise Security and Risk Management

Paul Furtado, VP Analyst, Gartner

Midsize enterprise (MSE) IT leaders face significant security challenges when trying to deliver IT services with small IT teams (usually fewer than 30 people) and limited IT budgets (usually less than $20 million). Join us for a discussion of the top trends that MSE IT leaders responsible for security and risk management should prioritize to stay current and proactive in protecting the organization and managing risk effectively.

Monday, 13 February, 2023 / 02:30 PM - 03:00 PM IST

Cyber-Physical Systems Security — Top 10 Must-Dos

Wam Voster, VP Analyst, Gartner

2021 showed that attacks are moving closer to operational or mission-critical environments where cyber-physical systems (CPS) live. Whether they are born of OT/IT convergence or from IoT, IIoT, or Smart "X" efforts, CPS are everywhere and mandate different approaches to security than IT systems.
What are the top 10 must-dos to protect them?

Tuesday, 14 February, 2023 / 04:30 PM - 05:00 PM IST

Emerging Technologies in Security and Risk Management

Abhyuday Data, Director Analyst, Gartner

Emerging risks and top security trends are driving innovation in security and risk management. Among many new areas in security that are emerging, which ones should you focus on? This session will explore high-impact emerging technologies in security and risk management.

Monday, 13 February, 2023 / 03:15 PM - 03:45 PM IST

Cisco: Security Debt, Running with Scissors

Dave Lewis, GLOBAL ADVISORY CISO, Cisco Systems

Security debt, is “the accumulation of the patches missed, the risks accepted, and the configurations misapplied,” is a serious and common problem for many organizations. Organisations should look to strategies like the zero-trust model, trust but verify, sanitation of inputs and outputs, and of course, make sure to execute patches instead of pushing it onto the next person. The longer organizations wait to address risks, the harder it is to address them to eliminate debt, organizations should create defined and repeatable processes with plans for action.
At this session, the attendees will get more in-depth information on :
1 The best practices to reduce security risk.
2 Zero trust model for the enterprise to manage user authentication.
3 Managing deprecated systems to reduce the risk to the enterprise thereby building security resilience.

Tuesday, 14 February, 2023 / 02:00 PM - 02:30 PM IST

Technical Insights — Cybersecurity Mesh Architecture: The Next Generation of Security Architecture

Richard Bartley, VP Analyst, Gartner

This session will discuss the reference architecture and dive deep into how to build the cybersecurity mesh architecture (CSMA). We will discuss the evolution of best-of-breed to the new CSMA along with pros and cons of each approach. Finally, we will discuss the vendor landscape from larger security vendors with full stacks to open source/distributed CSM solutions.

Tuesday, 14 February, 2023 / 02:00 PM - 02:30 PM IST

Expert Guide to Network Security, Now and Into the Future

Charlie Winckless, Sr Director Analyst, Gartner

Check in to make sure you are current on network security offerings and how they complement each other, but stay to see how they are evolving and what new technologies will transform your current processes over the next few years.

Tuesday, 14 February, 2023 / 02:45 PM - 03:15 PM IST

Fortinet: A Mesh Platform Approach for Securing Your Digital Journey

Today’s enterprises aren’t just looking for a unifying architecture that can bring their fragmented infrastructure and deployments under control. They need a system that makes deploying new technologies and services secure and straightforward. This requires more than workarounds connecting disparate security technologies. Join this session to learn how a broad, integrated, and automated cybersecurity mesh platform can provide centralized management and visibility, supports and interoperates across a vast ecosystem of solutions, and automatically adapts to dynamic changes in the network.

Monday, 13 February, 2023 / 11:45 AM - 12:15 PM IST

Trellix: Optimize your Endpoint Security With XDR to Prioritize & Improve Response Efficiency.

Hitesh Menghnani, SENIOR PRODUCT MANAGER, Trellix

The endpoint attack surface is constantly expanding through the move to the cloud, the increase of remote workers, and a disappearing network perimeter. More and more endpoints are under attack by more sophisticated threats such as ransomware, supply chain attacks and advanced persistent threats that go undetected with siloed security tools.

Join this session to learn more about how the integration of a complete Endpoint Security stack with XDR can help prioritize threat alerts by breaking the security silos and correlating Endpoint Security, Data Security, Network Security & Email Security

Monday, 13 February, 2023 / 02:30 PM - 03:00 PM IST

Outlook for Data Security

Ravisha Chugh, Principal Analyst, Gartner

Data security is a top priority. This session covers current trends and emerging topics specific to data security. How organizations handle and consume data continues to rapidly evolve. Databases and cloud applications introduce rapidly evolving threats with with countermeasures following slowly. Planning to use data as the focus of security governance and security architecture roadmaps is critical for any security and risk management program.

Tuesday, 14 February, 2023 / 12:00 PM - 12:30 PM IST

Minimize Risk by Better Knowing and Managing Your Data

Ravisha Chugh, Principal Analyst, Gartner

Data breach is now more of a reality than a threat which can expose personal and corporate intellectual property. CIOs, CISOs and general counsel are teaming together to improve readiness for this reality. This session will provide insights to actionable and proactive steps to reduce exposure by establishing knowledge of your data to align with access expectations and life cycle management.

Tuesday, 14 February, 2023 / 02:00 PM - 02:45 PM IST

Ask the Expert: How to Build a Successful DLP Program?

Ravisha Chugh, Principal Analyst, Gartner

Ask any questions you have regarding DLP - including vendors in the market, market trends, how to choose the right solution or any best practices for implementing it.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, 14 February, 2023 / 02:45 PM - 03:15 PM IST

Fortra: How to Build a Framework for Data Protection in a Global Economy

Prianshu Khandwala, LEAD- INFORMATION SECURITY, UPL Ltd

With data regulations becoming more complex and localised, and companies managing data centres and cloud services on a global scale, how do organisations ensure their strategies for data protection safeguard them from today’s data security threats?

Drawing on their experience, Prianshu Khandwala, Information Security Lead at UPL and Raghunandan Koushik, Regional Director at Fortra, discuss the data protection challenges faced by global organisations, sharing ways to identify threats to data security and highlighting best practices for building a robust data protection framework.

Tuesday, 14 February, 2023 / 02:45 PM - 03:15 PM IST

Dell Technologies: Cyber Recovery - Building a recovery strategy to increase Business Resiliency from ransomware attacks.

Cyber Resilience provides a high-level holistic strategy that includes cyber security standards, guidelines, people, business processes and technology solutions. This session provides a context around where Cyber Recovery solution fits into your overall Security and Cyber Resilience strategy using the NIST CyberSecurity Framework. Cyber Recovery provides additional layers of physical and logical security at both the solution, system and data/file level to ensure critical data can be preserved with integrity, confidentiality and to ensure it is available when needed for recovery. The session focusses upon Protecting critical data from cyber threats and away from the attack surface with the ability to recover data with ease, speed and accuracy.

Monday, 13 February, 2023 / 11:45 AM - 12:15 PM IST

Trellix: Optimize your Endpoint Security With XDR to Prioritize & Improve Response Efficiency.

Hitesh Menghnani, SENIOR PRODUCT MANAGER, Trellix

The endpoint attack surface is constantly expanding through the move to the cloud, the increase of remote workers, and a disappearing network perimeter. More and more endpoints are under attack by more sophisticated threats such as ransomware, supply chain attacks and advanced persistent threats that go undetected with siloed security tools.

Join this session to learn more about how the integration of a complete Endpoint Security stack with XDR can help prioritize threat alerts by breaking the security silos and correlating Endpoint Security, Data Security, Network Security & Email Security

Monday, 13 February, 2023 / 11:45 AM - 12:15 PM IST

SentinelOne: Ransomware vs XDR - Modern Cybersecurity Warfare Has Changed the Game

As cyber threats evolve, so should your cybersecurity. Keeping a predominantly human-powered solution at the helm of your enterprise's security is leaving you at risk of costly cyber threats. In the current economic landscape, organizations can't afford to be subject to such risks. Attend this fireside chat with Security Leaders who have embraced autonomous cybersecurity that’s purpose-built to protect their organization from current and future threats.

Monday, 13 February, 2023 / 12:30 PM - 01:00 PM IST

Outlook for Endpoint Security 2023

Franz Hinner, Sr Director Analyst, Gartner

Endpoint now covers a wide variety of devices, and organisations invest heavily in trying to secure them. So why is it that malware attacks such as ransomware are still so prevalent. We discuss how securing the endpoint needs to go beyond protecting the individual endpoint, to protect the diverse range of endpoints that make up an organisation.

Tuesday, 14 February, 2023 / 10:30 AM - 11:00 AM IST

What’s Top of Mind for CIOs and CEOs — Impact for SRM Leaders

Deepti Gopal, Director Analyst, Gartner

Gartner’s annual surveys collect data from thousands of CIOs on what matters most to them.
Join this session to learn:
• What’s most important to them
• How they are adapting to the fast-changing environment around them
• Implications for security and risk leaders

Monday, 13 February, 2023 / 11:00 AM - 11:30 AM IST

Outlook for Identity and Access Management

Abhyuday Data, Director Analyst, Gartner

Identity-first security has emerged as a theme in many major security initiatives and policies. Supporting these initiatives as well as delivering on business requirements for smooth, simple and secure access, and authentication decisions requires disparate IAM elements to work in concert. This session will provide an update on the major themes in IAM to ensure that your IAM decisions in 2023 will support the strategy of the future.

Monday, 13 February, 2023 / 11:45 AM - 12:15 PM IST

IBM: Security that moves with your business - Making cybersecurity accurate and faster.

Chris Hockings, EXECUTIVE SECURITY SPECIALIST, IBM

In a rapidly-evolving security landscape with new challenges every day, you need a trusted partner that moves with you.
IBM Security is designed for enterprises like yours. An open platform that moves in step with your ever-changing footprint, backed by AI and automation to always keep you one step ahead. From predicting threats to protecting data, working across vendors, or across the world. No matter where your business is headed, we’ll keep you moving forward, every move you make.

Tuesday, 14 February, 2023 / 11:15 AM - 11:45 AM IST

ARCON: Converged Identity- The Future & How We Will Reach There!

Anil Bhandari, Chief Mentor, ARCON

An increase in the types of digital identities, coupled with multi-cloud adoption, has added complexity to managing identities and privileges. How does one get future-ready, to address these new-age challenges? An Identity-centric security strategy centers on effective governance with zero trust, that simplifies and unifies critical aspects of Access Management (AM), Identity Governance Administration (IGA) and Privileged Access Management (PAM). Join us to explore the benefits of a Converged Identity security approach that is outcome-driven, and looks to ditch the silos of key IAM components.

Tuesday, 14 February, 2023 / 04:30 PM - 05:00 PM IST

Emerging Technologies in Security and Risk Management

Abhyuday Data, Director Analyst, Gartner

Emerging risks and top security trends are driving innovation in security and risk management. Among many new areas in security that are emerging, which ones should you focus on? This session will explore high-impact emerging technologies in security and risk management.

Monday, 13 February, 2023 / 04:00 PM - 04:30 PM IST

Developing a Strategy for SASE Adoption to Securely Enable the Anywhere Workforce

Thomas Lintemuth, VP Analyst, Gartner

Enterprises are shifting to hybrid work environments to enable anywhere, anytime access to resources that are located everywhere -- in SaaS, in public cloud IaaS with some workloads in the traditional data center. A SASE strategy enables users, devices and branches zero trust access to resources, regardless of location. This session will lay out a strategic timeframe and roadmap for SASE adoption.

Tuesday, 14 February, 2023 / 11:15 AM - 11:45 AM IST

ManageEngine: Zoho Corp's Journey to Zero Trust - Realities, Challenges and Solutions

Zero Trust Architecture has emerged as an important topic within the field of cybersecurity. However, implementation of Zero Trust has been challenging for many organisations. The quick fix mentality of considering Zero Trust as a one-stop technology that can be purchased and plugged into an existing environment being the primary reason. In our session, learn about Zoho Corp's journey to Zero Trust and our practical approaches to implement the Zero Trust maturity model. We will also discuss the culture change that is required and how to provide a simplified, secure experience to the end users.

Tuesday, 14 February, 2023 / 02:00 PM - 02:30 PM IST

Expert Guide to Network Security, Now and Into the Future

Charlie Winckless, Sr Director Analyst, Gartner

Check in to make sure you are current on network security offerings and how they complement each other, but stay to see how they are evolving and what new technologies will transform your current processes over the next few years.

Tuesday, 14 February, 2023 / 02:45 PM - 03:15 PM IST

Fortra: How to Build a Framework for Data Protection in a Global Economy

Prianshu Khandwala, LEAD- INFORMATION SECURITY, UPL Ltd

With data regulations becoming more complex and localised, and companies managing data centres and cloud services on a global scale, how do organisations ensure their strategies for data protection safeguard them from today’s data security threats?

Drawing on their experience, Prianshu Khandwala, Information Security Lead at UPL and Raghunandan Koushik, Regional Director at Fortra, discuss the data protection challenges faced by global organisations, sharing ways to identify threats to data security and highlighting best practices for building a robust data protection framework.

Tuesday, 14 February, 2023 / 02:45 PM - 03:15 PM IST

Dell Technologies: Cyber Recovery - Building a recovery strategy to increase Business Resiliency from ransomware attacks.

Cyber Resilience provides a high-level holistic strategy that includes cyber security standards, guidelines, people, business processes and technology solutions. This session provides a context around where Cyber Recovery solution fits into your overall Security and Cyber Resilience strategy using the NIST CyberSecurity Framework. Cyber Recovery provides additional layers of physical and logical security at both the solution, system and data/file level to ensure critical data can be preserved with integrity, confidentiality and to ensure it is available when needed for recovery. The session focusses upon Protecting critical data from cyber threats and away from the attack surface with the ability to recover data with ease, speed and accuracy.

Monday, 13 February, 2023 / 11:00 AM - 11:30 AM IST

Outlook for Network Security 2023

Thomas Lintemuth, VP Analyst, Gartner

Zero-trust strategies for network security have gained notable popularity in recent years. However, organizations need to avoid "silver bullet" thinking and build strategies based on their desired business outcome. This session will highlight the forces that shape network security, threats that need to be addressed, and how to think about zero trust and SASE as part of an overall network security strategy.

Monday, 13 February, 2023 / 11:45 AM - 12:15 PM IST

Trellix: Optimize your Endpoint Security With XDR to Prioritize & Improve Response Efficiency.

Hitesh Menghnani, SENIOR PRODUCT MANAGER, Trellix

The endpoint attack surface is constantly expanding through the move to the cloud, the increase of remote workers, and a disappearing network perimeter. More and more endpoints are under attack by more sophisticated threats such as ransomware, supply chain attacks and advanced persistent threats that go undetected with siloed security tools.

Join this session to learn more about how the integration of a complete Endpoint Security stack with XDR can help prioritize threat alerts by breaking the security silos and correlating Endpoint Security, Data Security, Network Security & Email Security

Monday, 13 February, 2023 / 04:00 PM - 04:30 PM IST

Developing a Strategy for SASE Adoption to Securely Enable the Anywhere Workforce

Thomas Lintemuth, VP Analyst, Gartner

Enterprises are shifting to hybrid work environments to enable anywhere, anytime access to resources that are located everywhere -- in SaaS, in public cloud IaaS with some workloads in the traditional data center. A SASE strategy enables users, devices and branches zero trust access to resources, regardless of location. This session will lay out a strategic timeframe and roadmap for SASE adoption.

Tuesday, 14 February, 2023 / 11:15 AM - 11:45 AM IST

ManageEngine: Zoho Corp's Journey to Zero Trust - Realities, Challenges and Solutions

Zero Trust Architecture has emerged as an important topic within the field of cybersecurity. However, implementation of Zero Trust has been challenging for many organisations. The quick fix mentality of considering Zero Trust as a one-stop technology that can be purchased and plugged into an existing environment being the primary reason. In our session, learn about Zoho Corp's journey to Zero Trust and our practical approaches to implement the Zero Trust maturity model. We will also discuss the culture change that is required and how to provide a simplified, secure experience to the end users.

Tuesday, 14 February, 2023 / 11:15 AM - 11:45 AM IST

Versa Networks: Demystifying ZTA, ZTNA and the Criteria to Evaluate ZTNA Technologies

Kumar Mehta, Founder and Chief Development Officer, Versa Networks Inc

The term Zero Trust in today’s security paradigm is used to define a plethora of security products and technologies. Two of the most popular terms used in relation to this are Zero Trust Architecture and Zero Trust Network Access. Normally, security architects are not aware of the differences between the two and the fact that ZTNA is only a component of the overall Zero Trust Architecture. This session will strive to explain ZTA,ZTNA and their relationship with each other.We will also discuss the evaluation criteria and the criticality of selecting the right ZTNA solution for your requirements

Tuesday, 14 February, 2023 / 02:00 PM - 02:30 PM IST

Expert Guide to Network Security, Now and Into the Future

Charlie Winckless, Sr Director Analyst, Gartner

Check in to make sure you are current on network security offerings and how they complement each other, but stay to see how they are evolving and what new technologies will transform your current processes over the next few years.

Tuesday, 14 February, 2023 / 02:45 PM - 03:15 PM IST

Fortinet: A Mesh Platform Approach for Securing Your Digital Journey

Today’s enterprises aren’t just looking for a unifying architecture that can bring their fragmented infrastructure and deployments under control. They need a system that makes deploying new technologies and services secure and straightforward. This requires more than workarounds connecting disparate security technologies. Join this session to learn how a broad, integrated, and automated cybersecurity mesh platform can provide centralized management and visibility, supports and interoperates across a vast ecosystem of solutions, and automatically adapts to dynamic changes in the network.

Tuesday, 14 February, 2023 / 04:30 PM - 05:00 PM IST

Emerging Technologies in Security and Risk Management

Abhyuday Data, Director Analyst, Gartner

Emerging risks and top security trends are driving innovation in security and risk management. Among many new areas in security that are emerging, which ones should you focus on? This session will explore high-impact emerging technologies in security and risk management.

Tuesday, 14 February, 2023 / 12:00 PM - 12:30 PM IST

Minimize Risk by Better Knowing and Managing Your Data

Ravisha Chugh, Principal Analyst, Gartner

Data breach is now more of a reality than a threat which can expose personal and corporate intellectual property. CIOs, CISOs and general counsel are teaming together to improve readiness for this reality. This session will provide insights to actionable and proactive steps to reduce exposure by establishing knowledge of your data to align with access expectations and life cycle management.

Monday, 13 February, 2023 / 09:30 AM - 10:15 AM IST

Opening Keynote: The Top Cybersecurity Predictions for 2022-2023

Deepti Gopal, Director Analyst, Gartner

Christopher Mixter, VP, Research, Gartner

Every year, Gartner produces impactful predictions across all practices. This presentation will compile the top predictions prepared by our cybersecurity experts for the year 2022-2023. Security and risk management leaders should monitor these trends to be successful in the digital era especially as most recognize that global change could potentially be one crisis away.

Monday, 13 February, 2023 / 11:00 AM - 11:45 AM IST

Ask the Expert: Best Practices Building Business Aligned Security Architectures

Steve Santos, Sr Director Analyst, Gartner

This session intends to help clients who want to design security architecture to directly address business needs, addressing all stakeholder needs. The session will cover establishing a strategic architecture upon which logical requirements and specifications can be developed to facilitate security component selection.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, 13 February, 2023 / 02:30 PM - 03:00 PM IST

Security Strategy Planning Best Practices

Deepti Gopal, Director Analyst, Gartner

Consistent, practical strategic planning is a prerequisite for security and risk management leaders establishing and supporting the credibility of their security programs. This presentation:
- Introduces a generic security strategy planning process
- Shares the unique best practices associated with security strategy planning
- Provides practical advice on communicating the strategy to stakeholders.

Tuesday, 14 February, 2023 / 10:30 AM - 11:00 AM IST

What’s Top of Mind for CIOs and CEOs — Impact for SRM Leaders

Deepti Gopal, Director Analyst, Gartner

Gartner’s annual surveys collect data from thousands of CIOs on what matters most to them.
Join this session to learn:
• What’s most important to them
• How they are adapting to the fast-changing environment around them
• Implications for security and risk leaders

Tuesday, 14 February, 2023 / 12:00 PM - 12:30 PM IST

Trends in Midsize Enterprise Security and Risk Management

Paul Furtado, VP Analyst, Gartner

Midsize enterprise (MSE) IT leaders face significant security challenges when trying to deliver IT services with small IT teams (usually fewer than 30 people) and limited IT budgets (usually less than $20 million). Join us for a discussion of the top trends that MSE IT leaders responsible for security and risk management should prioritize to stay current and proactive in protecting the organization and managing risk effectively.

Tuesday, 14 February, 2023 / 02:00 PM - 02:30 PM IST

The Key Drivers for CISO Effectiveness

Christopher Mixter, VP, Research, Gartner

Security and risk management leaders are often treated as scapegoats in cases of breach. By the same token, digital business has propelled security and risk to become a boardroom issue, business units have increased their expectations (and demand) of their leadership, and regulatory demands are often challenging. This session will shed light on the leadership traits that aide in a successful and balanced approach between the demands of the business and the effectiveness of the leader.

Monday, 13 February, 2023 / 11:45 AM - 12:15 PM IST

Delinea: Risks of Identity Based Cyber Attacks–Real-World Ransomware Live Walkthrough

Joseph Carson, CHIEF SECURITY SCIENTIST & ADVISORY CISO, Delinea

Following the digital footprints of a malicious hacker and uncovering their attack path. This is a journey inside the mind of an ethical hacker's response to a ransomware incident that brought a business to a full stop, discovering the evidence left behind to uncover the attack path and the techniques used. I will cover a real-world ransomware incident response showing the techniques used and why, and the evidence left behind. Joseph Carson, CSS & Advisory CISO at Delinea, will take you through the mind of a hacker and follow the footsteps that led to a damaging Crylock ransomware attack.

Monday, 13 February, 2023 / 11:45 AM - 12:15 PM IST

SentinelOne: Ransomware vs XDR - Modern Cybersecurity Warfare Has Changed the Game

As cyber threats evolve, so should your cybersecurity. Keeping a predominantly human-powered solution at the helm of your enterprise's security is leaving you at risk of costly cyber threats. In the current economic landscape, organizations can't afford to be subject to such risks. Attend this fireside chat with Security Leaders who have embraced autonomous cybersecurity that’s purpose-built to protect their organization from current and future threats.

Monday, 13 February, 2023 / 04:00 PM - 04:30 PM IST

Technical Insights: Plotting Your Course to Ransomware Defense

Angel Berrios, Sr Director Analyst, Gartner

Ransomware is a threat that requires a whole-business approach to defend against and the diversity of tools, techniques, and processes that enterprise security professionals can bring to bear to protect against ransomware can be intimidating. In this session, attendees will learn how to assess their program of ransomware defense and quickly close the gaps that attackers will use to make your organization the next name on their list of victims.

Tuesday, 14 February, 2023 / 10:30 AM - 12:00 PM IST

Workshop: Learning The Craft of the Ransomware Dungeon Master

Franz Hinner, Sr Director Analyst, Gartner

Ransomware is a unique threat, and demands a unique incident response plan. Tabletop exercises, or "role playing games for security professionals," are one of the best ways of creating those plans. In this workshop, we will work through a series of live ransomware-specific tabletop exercises, and help you be the dungeon master your organization needs!

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, 13 February, 2023 / 11:45 AM - 12:15 PM IST

Delinea: Risks of Identity Based Cyber Attacks–Real-World Ransomware Live Walkthrough

Joseph Carson, CHIEF SECURITY SCIENTIST & ADVISORY CISO, Delinea

Following the digital footprints of a malicious hacker and uncovering their attack path. This is a journey inside the mind of an ethical hacker's response to a ransomware incident that brought a business to a full stop, discovering the evidence left behind to uncover the attack path and the techniques used. I will cover a real-world ransomware incident response showing the techniques used and why, and the evidence left behind. Joseph Carson, CSS & Advisory CISO at Delinea, will take you through the mind of a hacker and follow the footsteps that led to a damaging Crylock ransomware attack.

Tuesday, 14 February, 2023 / 10:30 AM - 11:00 AM IST

The Cybersecurity Value Metrics Every Organization Should Use

William Candrick, Director Analyst, Gartner

No one can tell you what your metrics should be … until now. Gartner has developed and vetted a prioritized list of metrics to describe the value of your cybersecurity program to satisfy the most challenging audiences including your board, CFO, COO, customers, partners and regulators. And we are working on benchmarks for each.
- What cybersecurity metrics should I measure?
- How can I use metrics to drive governance?

Tuesday, 14 February, 2023 / 11:15 AM - 11:45 AM IST

Recorded Future: Secure With Intelligence- The Missing Piece of Your Architecture

Craig Adams, Chief of Product and Engineering, RECORDED FUTURE-MA

Threat Landscapes are constantly changing and keeping up with emerging security risks can feel like a daunting task. How do you know if you are covered when new threats are emerging? Join us to learn how organisations can tap on security intelligence to help understand the cyber threat landscape better and also increase organisations’ operational efficiency in threat prevention and risk mitigation- the important missing piece of your architecture if you are without it.

Tuesday, 14 February, 2023 / 12:00 PM - 12:30 PM IST

Minimize Risk by Better Knowing and Managing Your Data

Ravisha Chugh, Principal Analyst, Gartner

Data breach is now more of a reality than a threat which can expose personal and corporate intellectual property. CIOs, CISOs and general counsel are teaming together to improve readiness for this reality. This session will provide insights to actionable and proactive steps to reduce exposure by establishing knowledge of your data to align with access expectations and life cycle management.

Tuesday, 14 February, 2023 / 02:45 PM - 03:15 PM IST

Fortra: How to Build a Framework for Data Protection in a Global Economy

Prianshu Khandwala, LEAD- INFORMATION SECURITY, UPL Ltd

With data regulations becoming more complex and localised, and companies managing data centres and cloud services on a global scale, how do organisations ensure their strategies for data protection safeguard them from today’s data security threats?

Drawing on their experience, Prianshu Khandwala, Information Security Lead at UPL and Raghunandan Koushik, Regional Director at Fortra, discuss the data protection challenges faced by global organisations, sharing ways to identify threats to data security and highlighting best practices for building a robust data protection framework.

Tuesday, 14 February, 2023 / 03:45 PM - 04:15 PM IST

Technology Supply Chain Risk Management — Where Do I Start?

Wam Voster, VP Analyst, Gartner

From SolarWinds to Kaseya to government bans on specific providers, supply chain security is an area of increased concerns. This session provides an overview of the technology supply chain risk management landscape, and suggested first steps for each category.

Monday, 13 February, 2023 / 12:30 PM - 01:00 PM IST

Automating Security: Exploring Options for Maximum Fun and Profit

Eric Ahlm, Sr Director Analyst, Gartner

Security automation isn't a new concept, however, the application of automation to security operations can be a tricky path to decipher. This presentation talks about the practical side of security automation, what sort of uses can lead to big wins, and what sort of uses can lead to massive disappointment.

Tuesday, 14 February, 2023 / 10:30 AM - 11:00 AM IST

The Future of MDR, Where Next?

Angel Berrios, Sr Director Analyst, Gartner

The MDR market is beginning to get to an initial stage of maturity, but there is still a high level of flux in the types of providers and the coverage of their solutions. During this session, we will offer participants a view into the direction of the market, the alignment with modern ways of working and core questions to ask providers offering these services, about their future.

Tuesday, 14 February, 2023 / 10:30 AM - 11:00 AM IST

How to Build a Modern SOC

Eric Ahlm, Sr Director Analyst, Gartner

Moving from threat prevention to detection and response requires careful planning. Building a modern security operations center (SOC) requires balancing business risk with cost and complexity. This session discusses how to plan, build and operate a modern SOC, including how to best use a service provider, automation and technology platforms such as SIEM.

Tuesday, 14 February, 2023 / 03:45 PM - 04:15 PM IST

What Is "XDR" and Why Should I Care

Franz Hinner, Sr Director Analyst, Gartner

Extended detection and response, or "XDR," is on every security vendor’s marketing these days. But what is XDR and why do you need it? Is it an architecture or a product, and will it replace stuff you already have? This presentation explains what you need to know about XDR and what you should do about it.

Monday, 13 February, 2023 / 11:45 AM - 12:15 PM IST

IBM: Security that moves with your business - Making cybersecurity accurate and faster.

Chris Hockings, EXECUTIVE SECURITY SPECIALIST, IBM

In a rapidly-evolving security landscape with new challenges every day, you need a trusted partner that moves with you.
IBM Security is designed for enterprises like yours. An open platform that moves in step with your ever-changing footprint, backed by AI and automation to always keep you one step ahead. From predicting threats to protecting data, working across vendors, or across the world. No matter where your business is headed, we’ll keep you moving forward, every move you make.

Monday, 13 February, 2023 / 03:15 PM - 03:45 PM IST

Cisco: Security Debt, Running with Scissors

Dave Lewis, GLOBAL ADVISORY CISO, Cisco Systems

Security debt, is “the accumulation of the patches missed, the risks accepted, and the configurations misapplied,” is a serious and common problem for many organizations. Organisations should look to strategies like the zero-trust model, trust but verify, sanitation of inputs and outputs, and of course, make sure to execute patches instead of pushing it onto the next person. The longer organizations wait to address risks, the harder it is to address them to eliminate debt, organizations should create defined and repeatable processes with plans for action.
At this session, the attendees will get more in-depth information on :
1 The best practices to reduce security risk.
2 Zero trust model for the enterprise to manage user authentication.
3 Managing deprecated systems to reduce the risk to the enterprise thereby building security resilience.

Monday, 13 February, 2023 / 03:15 PM - 03:45 PM IST

Zscaler: C-level Strategies for Driving Digital Transformation at Your Organization

Organizations across all sectors are recognizing the value of technology innovation to drive gains and stay ahead. Accelerating your organization’s digital transformation and technology initiatives can however look like a monumental challenge in today’s climate, where change is the only constant. Join this fireside chat, in partnership with Sudip Banerjee, Field CTO to learn how IT leaders can break down roadblocks, to drive a digital first mindset across the organization.

Tuesday, 14 February, 2023 / 11:15 AM - 11:45 AM IST

ARCON: Converged Identity- The Future & How We Will Reach There!

Anil Bhandari, Chief Mentor, ARCON

An increase in the types of digital identities, coupled with multi-cloud adoption, has added complexity to managing identities and privileges. How does one get future-ready, to address these new-age challenges? An Identity-centric security strategy centers on effective governance with zero trust, that simplifies and unifies critical aspects of Access Management (AM), Identity Governance Administration (IGA) and Privileged Access Management (PAM). Join us to explore the benefits of a Converged Identity security approach that is outcome-driven, and looks to ditch the silos of key IAM components.

Tuesday, 14 February, 2023 / 11:15 AM - 11:45 AM IST

ManageEngine: Zoho Corp's Journey to Zero Trust - Realities, Challenges and Solutions

Zero Trust Architecture has emerged as an important topic within the field of cybersecurity. However, implementation of Zero Trust has been challenging for many organisations. The quick fix mentality of considering Zero Trust as a one-stop technology that can be purchased and plugged into an existing environment being the primary reason. In our session, learn about Zoho Corp's journey to Zero Trust and our practical approaches to implement the Zero Trust maturity model. We will also discuss the culture change that is required and how to provide a simplified, secure experience to the end users.

Tuesday, 14 February, 2023 / 11:15 AM - 11:45 AM IST

Versa Networks: Demystifying ZTA, ZTNA and the Criteria to Evaluate ZTNA Technologies

Kumar Mehta, Founder and Chief Development Officer, Versa Networks Inc

The term Zero Trust in today’s security paradigm is used to define a plethora of security products and technologies. Two of the most popular terms used in relation to this are Zero Trust Architecture and Zero Trust Network Access. Normally, security architects are not aware of the differences between the two and the fact that ZTNA is only a component of the overall Zero Trust Architecture. This session will strive to explain ZTA,ZTNA and their relationship with each other.We will also discuss the evaluation criteria and the criticality of selecting the right ZTNA solution for your requirements

Tuesday, 14 February, 2023 / 02:45 PM - 03:15 PM IST

Fortra: How to Build a Framework for Data Protection in a Global Economy

Prianshu Khandwala, LEAD- INFORMATION SECURITY, UPL Ltd

With data regulations becoming more complex and localised, and companies managing data centres and cloud services on a global scale, how do organisations ensure their strategies for data protection safeguard them from today’s data security threats?

Drawing on their experience, Prianshu Khandwala, Information Security Lead at UPL and Raghunandan Koushik, Regional Director at Fortra, discuss the data protection challenges faced by global organisations, sharing ways to identify threats to data security and highlighting best practices for building a robust data protection framework.

Tuesday, 14 February, 2023 / 02:45 PM - 03:15 PM IST

Fortinet: A Mesh Platform Approach for Securing Your Digital Journey

Today’s enterprises aren’t just looking for a unifying architecture that can bring their fragmented infrastructure and deployments under control. They need a system that makes deploying new technologies and services secure and straightforward. This requires more than workarounds connecting disparate security technologies. Join this session to learn how a broad, integrated, and automated cybersecurity mesh platform can provide centralized management and visibility, supports and interoperates across a vast ecosystem of solutions, and automatically adapts to dynamic changes in the network.

Tuesday, 14 February, 2023 / 04:30 PM - 05:00 PM IST

Technical Insights: 5 Steps to Start the Zero Trust Journey

Thomas Lintemuth, VP Analyst, Gartner

Zero Trust is more than a marketing term once you see through all the marketing. Organizations are building application access with Zero Trust principles. We will discuss five key items you need to know for zero trust to work for your organization.

Tuesday, 14 February, 2023 / 04:30 PM - 05:00 PM IST

Emerging Technologies in Security and Risk Management

Abhyuday Data, Director Analyst, Gartner

Emerging risks and top security trends are driving innovation in security and risk management. Among many new areas in security that are emerging, which ones should you focus on? This session will explore high-impact emerging technologies in security and risk management.

Want to stay informed?

Get conference email updates.
Contact Information

All fields are required.

  • Step 2 of 2