Our topic-focused agenda delivers insights covering the challenges most critical to Indian CISOs and Security & Risk Management executives.

Agenda / By Topic

Thursday, 30 August, 2018 01:30 PM|Thursday, 30 August, 2018 02:15 PM
How to Hunt for Security Threats
Mark Nicolett, Managing Vice President, Gartner

Threat hunting (TH) is very hot, but very few organizations actually do it. Attend this session to learn the basics of practical hunting and how to start your TH effort. Key issues covered in this session: • What is TH? • How do you incorporate TH into your SOC processes? • How do you develop a basic TH capability? • Where do you get ideas on what to hunt for? • How do you measure TH successes?


Thursday, 30 August, 2018 01:30 PM|Thursday, 30 August, 2018 02:15 PM
Services Are the Future for Threat Detection and Response
Sid Deshpande, Research Director, Gartner

As the external threat landscape becomes more hostile, compliance and regulatory requirements become more common and information security resources become increasingly scarce, organizations will be forced to rely more on service providers to deliver threat detection and incident response capabilities. This session will address issues such as what should you look to outsource and what opportunities are available on the market?


Thursday, 30 August, 2018 02:30 PM|Thursday, 30 August, 2018 03:00 PM
Bringing Order to Chaos in Cyber Security
Gaurav Agarwal, Managing Director, Symantec Software Solutions Pvt Ltd

It takes more than a few products speaking to each other to drive a comprehensive enterprise security strategy. In a world driven by unprecedented growth, the risks are greater than ever. In this session understand how Symantec is bringing openness to chaotic cyber security environment and redefining cyber security through its Integrated Cyber Defense platform.


Thursday, 30 August, 2018 02:30 PM|Thursday, 30 August, 2018 03:00 PM
Helping you manage Digital Risk
Leonard Kleinman, Chief Cyber Security Advisor, RSA

Today’s combination of advanced threat landscape and dynamically changing business/IT environments requires a prioritization of security based on business impact. This session will highlight how RSA delivers a unique portfolio of products/services that span the domains of Risk Management, Security Exclusion/Inclusion and Fraud Prevention that enable a true Business-Driven Security approach


Thursday, 30 August, 2018 04:00 PM|Thursday, 30 August, 2018 04:45 PM
Where's the Fire?
Gaurav Agarwal, Managing Director, Symantec Software Solutions Pvt Ltd
Manuj Kumar, Director, Mid-Market Enterprises (India , Symantec Software Solutions Pvt Ltd
Vamsi Ponnekanti, Head, Technical Sales, symantec
Krishnan V V, Director - Enterprise Sales, India, Symantec

The session will be an open house discussion wherein the participants will share specific thoughts on what bothers them about the enterprise security, their preparedness and response mechanisms, the effect of the rapid absorption of digital technologies on their environment and what could be done to transform their organizations.

Please Note: based on availability and eligibility you may sign-up for this session via Events Navigator after you register for this event.

Thursday, 30 August, 2018 04:45 PM|Thursday, 30 August, 2018 05:30 PM
Why You Still Must Detect Advanced Threats on Your Network
Lawrence Orans, Research VP, Gartner

Massive use of SaaS and mobile technologies and a growing share of encrypted traffic revive the rumors of the death of the perimeter and network security altogether. Building a strong business case to prioritize network security investments is more difficult, due to increasing competition for budget from cloud and endpoint security solutions. This session will review the latest trends in network-based advanced threat defense, including the latest techniques used for anomaly detection, and a high-level framework to decide if TLS decryption is right for your organization.


Thursday, 30 August, 2018 04:45 PM|Thursday, 30 August, 2018 05:30 PM
Alexa, Investigate This Incident
Mark Nicolett, Managing Vice President, Gartner

Security orchestration, automation and response (SOAR) tools have been growing in popularity as organizations try to introduce automation in their security operations practices. This session defines this emerging technology and presents emerging deployment and operations practices. Questions covered: • What is SOAR • Do I need it? Who does? • How are organizations using SOAR tools? • What are the best practices in deployment and use of SOAR tools?


Thursday, 30 August, 2018 10:05 AM|Thursday, 30 August, 2018 10:25 AM
Application Security Emerging Trends: What you need to know!
Kabir Mulchandani, Managing Director, Mr.

Whether organizations develop new technology in-house or leverage 3rd-party solutions, software vulnerabilities provide another vector for cyber-attacks. They react by developing a software security initiative to manage these. The session reviews emerging industry practices in managing software security risks, including security testing, static code analysis, architecture risks reviews, training & how to establish/mature a software security group


Thursday, 30 August, 2018 11:30 AM|Thursday, 30 August, 2018 12:15 PM
State of Application Security 2018
Dale Gardner, Research Director, Gartner

Application security continues to be a significant challenge for many organizations. This session covers the current state of application vulnerabilities and application security programs, as well as the newest developments in application security practices and technologies.


Thursday, 30 August, 2018 11:30 AM|Thursday, 30 August, 2018 12:15 PM
Windows 10 Security and Implementation Advice
Eric Ouellet, VP, Analyst, Gartner

Windows 10 is getting unprecedented rapid implementation in the enterprise. This session will: •Look at the most significant security improvements in Windows 10. •Compare and contrast optional Windows 10 security features to third-party solutions. •Provide implementation guidance to ensure that the security improvements are getting deployed. •Look a the future of Windows security in the enterprise.


Thursday, 30 August, 2018 01:00 PM|Thursday, 30 August, 2018 01:20 PM
Cyber-Security Pushed to the Limit – 2018 ERT Report
David Hobbs, Security Evangelist, Radware

Mainstream headlines highlighted cyber-attacks and security threats that included possible interference in the U.S. presidential election, worldwide malware outbreaks and the Equifax data breach. This session will help you understand these complex and challenging dynamics, will show real attack data and customer stories to paint a picture of where we are and what security professionals can do. Join the session to learn more about them.


Thursday, 30 August, 2018 03:15 PM|Thursday, 30 August, 2018 03:45 PM
How to Adapt Application Security Practices for DevOps
Dale Gardner, Research Director, Gartner

Organizations are regularly adopting agile development methodologies and DevOps initiatives. Application security process and technology best practices are abundant, but not all of them fit in the world of rapid application development and delivery. This session will highlight some of the areas of opportunity for security automation as well as pitfalls that may inhibit application releases.


Thursday, 30 August, 2018 05:35 PM|Thursday, 30 August, 2018 05:55 PM
Magic Quadrant for Application Security Testing
Dale Gardner, Research Director, Gartner

Security and risk management leaders should select AST tools and services and embed them in the SDLC as a critical component of an application security program. In this session, we will illustrate the market and main vendors in the application security testing space.


Friday, 31 August, 2018 01:20 PM|Friday, 31 August, 2018 01:40 PM
Rethinking Security for multi-cloud Era

Learn to protect your Network with Context-Aware Micro-Segmentation? & how to deliver consistent, automatable network security to workloads no matter where they live -- from the data center, to the cloud, to the edge. About: VMware NSX Data Center is the network virtualization platform for the Software-Defined Data Center (SDDC), delivering networking & security entirely in software, abstracted from the underlying physical infrastructure.


Friday, 31 August, 2018 03:30 PM|Friday, 31 August, 2018 04:15 PM
Navigating the Technology Landscape of Web Application Protection
Dale Gardner, Research Director, Gartner

Protecting modern web applications requires an appropriate mix of technologies for client-side and server-side components. Microservice design patterns, web API adoption, mobilization and cloud integration increase the complexity further. This session will cover the various protective technologies that are available to organizations and provide recommendations on how to leverage them effectively.


Thursday, 30 August, 2018 12:15 PM|Thursday, 30 August, 2018 01:15 PM
CISO Circle Lunch: Five Questions on AI That CISOs Should Answer
Nader Henein, Sr Director Analyst, Gartner

No one can escape the wave of artificial intelligence marketing. The promise of increased security and better automation is appealing to CISOs, but sets the wrong expectations. Being too optimistic about artificial intelligence's impact could hurt the security organization. This session will highlight how artificial intelligence might impact security and risk management, what to expect and how to adapt to the changes.

Please Note: based on availability and eligibility you may sign-up for this session via Events Navigator after you register for this event.

Thursday, 30 August, 2018 03:15 PM|Thursday, 30 August, 2018 03:45 PM
Tips for Selecting the Right Security Analytics Tools for Your SOC
Kelly Kavanagh, Principal Research Analyst, Gartner

When building a security operation center, or trying to improve the visibility over threats, an abundance of new technologies overwhelms security leaders with too many options. This session will highlight the benefits and compare the use cases for the most useful security analytics tools. Technologies covered in this session include SIEM, network traffic analysis, user behavior analytics, endpoint detection and response, intrusion detection, full packet capture and SOAR.


Friday, 31 August, 2018 11:00 AM|Friday, 31 August, 2018 11:30 AM
The Future of Cognitive Security Is Now
Ananda Kumar V, Global Integrated Delivery Leader, IBM India Pvt Ltd

Many security conversations today are likely to touch upon security intelligence, behavioral anomaly detection and the value of augmented intelligence (AI) in security. But is cognitive security all hype, or are there real applications in use today? Join us to hear more about the 3 phases of AI in Security, how can you address these phases and listen to the experiences with Cognitive Security deployment by one of your peers from the industry.


Friday, 31 August, 2018 02:30 PM|Friday, 31 August, 2018 03:15 PM
Meetup: Experiences In Using AI/ML To Better Detect & Respond To Threats

Please Note: based on availability and eligibility you may sign-up for this session via Events Navigator after you register for this event.

Thursday, 30 August, 2018 04:45 PM|Thursday, 30 August, 2018 05:30 PM
Meetup: Security Considerations For Blockchain Technology

Please Note: based on availability and eligibility you may sign-up for this session via Events Navigator after you register for this event.

Friday, 31 August, 2018 03:30 PM|Friday, 31 August, 2018 04:15 PM
What Security & Risk Leaders Need to Know About Blockchain
Jonathan Care, Sr Director Analyst, Gartner

Organizations are allocating funds for blockchain without defining use cases, putting security and risk management leaders in a bind. You need to support the adoption of blockchain, but manage the risks that result from relatively unproven tools. Come learn: ● How to trust distributed identity. ● How to trust unknown cryptographic service providers on blockchain and distributed ledgers. ● Recognize the can't-happen-don't-care state is more important than we think.


Thursday, 30 August, 2018 01:30 PM|Thursday, 30 August, 2018 03:00 PM
Workshop: Crisis Communications After a Security Incident
Jie Zhang, Sr Director Analyst, Gartner

From the likes of WannaCry, Petya and others, cyberattacks are more frequently and more significantly disrupting business operations. This workshop presents crisis communication and coordination best practices so that attendees will gain valuable experience in ensuring a strong crisis communications position.

Please Note: based on availability and eligibility you may sign-up for this session via Events Navigator after you register for this event.

Friday, 31 August, 2018 10:15 AM|Friday, 31 August, 2018 11:45 AM
Workshop: Improve Your Incident Response to an International Data Breach
Nader Henein, Sr Director Analyst, Gartner

Security and risk management leaders must develop strong incident response (IR) capabilities where personally identifiable information (PII) is compromised. This workshop will use a scenario that highlights the impact of cross-border data flows and privacy management to help validate IR capabilities.

Please Note: based on availability and eligibility you may sign-up for this session via Events Navigator after you register for this event.

Thursday, 30 August, 2018 10:00 AM|Thursday, 30 August, 2018 10:20 AM
Secure IoT device on-boarding using Google Cloud IoT Core
Arun Ananthampalayam, Product Marketing Manager, Cloud IoT, Google Cloud, Google Inc

Abstract | Today’s connected technologies can increase cyber security risks, so it’s more important than ever for manufacturers and enterprises to stay secure, vigilant, and resilient. Cloud IOT Provisioning provides an easier, safer way for manufacturers to provision and deploy devices in bulk to Google Cloud IoT Core service. Learn about the details of this process from an OEM’s perspective - from claiming of Secure


Thursday, 30 August, 2018 10:10 AM|Thursday, 30 August, 2018 10:30 AM
Best Practices on SD-WAN Strategy

SD-WAN Simplified ! Learn how to address complex WAN problems, increase agility and cost effectiveness, while assuring application performance across the WAN About VMware NSX® SD-WAN by VeloCloud™: VMware NSX® SD-WAN by VeloCloud™ enables enterprises to support application growth, network agility and simplified branch implementations while delivering optimized access to cloud services, private data centers and enterprise applications.


Thursday, 30 August, 2018 11:30 AM|Thursday, 30 August, 2018 12:15 PM
Windows 10 Security and Implementation Advice
Eric Ouellet, VP, Analyst, Gartner

Windows 10 is getting unprecedented rapid implementation in the enterprise. This session will: •Look at the most significant security improvements in Windows 10. •Compare and contrast optional Windows 10 security features to third-party solutions. •Provide implementation guidance to ensure that the security improvements are getting deployed. •Look a the future of Windows security in the enterprise.


Thursday, 30 August, 2018 02:30 PM|Thursday, 30 August, 2018 03:00 PM
Bringing Order to Chaos in Cyber Security
Gaurav Agarwal, Managing Director, Symantec Software Solutions Pvt Ltd

It takes more than a few products speaking to each other to drive a comprehensive enterprise security strategy. In a world driven by unprecedented growth, the risks are greater than ever. In this session understand how Symantec is bringing openness to chaotic cyber security environment and redefining cyber security through its Integrated Cyber Defense platform.


Thursday, 30 August, 2018 02:30 PM|Thursday, 30 August, 2018 03:15 PM
Security First. Everything Follows.
Hardik Bavishi, Customer Engineer, Google Cloud

In this session we will discuss about Google’s cloud security architecture, its hybrid solutions, and how it secures employees In this session we will highlight how some of these technologies can fix some of today’s security challenges.

Please Note: based on availability and eligibility you may sign-up for this session via Events Navigator after you register for this event.

Thursday, 30 August, 2018 03:15 PM|Thursday, 30 August, 2018 04:00 PM
Meetup: Selection Criteria and Baseline Controls For Cloud Enabled Services

Please Note: based on availability and eligibility you may sign-up for this session via Events Navigator after you register for this event.

Thursday, 30 August, 2018 04:45 PM|Thursday, 30 August, 2018 05:30 PM
The State of Cloud Security 2018
Sid Deshpande, Research Director, Gartner

This presentation tells the current story of cloud security, providing an overview of the unique risks of the various forms of public cloud computing, so that the security professional can help the rest of their organization fully understand and address cloud risks. The unique security challenges of IaaS and SaaS are discussed and viewers are provided with a summary of current- and near-term products and practices that can be used to monitor and control the use of public cloud computing.


Friday, 31 August, 2018 09:50 AM|Friday, 31 August, 2018 10:10 AM
A look into how Google Cloud protects your data
Hardik Bavishi, Customer Engineer, Google Cloud
Vivek Agarwal, Android & Chrome Platform Specialist, Google Cloud

Google Cloud Security Demos - A look into how Google Cloud protects your data from devices to data center. In this lab we will showcase how we secure your data end to end.


Friday, 31 August, 2018 11:00 AM|Friday, 31 August, 2018 11:30 AM
The Future of Cognitive Security Is Now
Ananda Kumar V, Global Integrated Delivery Leader, IBM India Pvt Ltd

Many security conversations today are likely to touch upon security intelligence, behavioral anomaly detection and the value of augmented intelligence (AI) in security. But is cognitive security all hype, or are there real applications in use today? Join us to hear more about the 3 phases of AI in Security, how can you address these phases and listen to the experiences with Cognitive Security deployment by one of your peers from the industry.


Friday, 31 August, 2018 11:00 AM|Friday, 31 August, 2018 11:30 AM
Solving the Primary Hurdle to IoT Deployments
Arun Ananthampalayam, Product Marketing Manager, Cloud IoT, Google Cloud, Google Inc

Security is a primary hurdle to IoT deployment. Find out how you can protect your IoT devices from overlooked cloud and on-premises security threats. In this session you will learn how Google Cloud and Microchip have partnered to offer a seamless and highly-secure solution for IoT devices connecting to Google Cloud IoT.


Friday, 31 August, 2018 11:00 AM|Friday, 31 August, 2018 11:45 AM
The Future Of Cyber Security
Bhaskar Bakthavatsalu, Managing Director, India & SAARC, checkpoint
Harshdeep Marwah, Country Manager, India, Check Point

Today we are in the midst of the 5th generation of cyber attacks, battling the most advanced and impact large scale, multi-vector mega attacks. Previous generations of cyber security are simply not enough. Time to step up to Gen V of cyber security with Check Point Infinity Architecture.

Please Note: based on availability and eligibility you may sign-up for this session via Events Navigator after you register for this event.

Friday, 31 August, 2018 11:45 AM|Friday, 31 August, 2018 12:30 PM
The State of Network Security in the Cloud Era
Lawrence Orans, Research VP, Gartner

Now that we are in the "cloud era," network security professionals need to adapt. Enterprises are rearchitecting their networks and will be purchasing more cloud-based security services and fewer network security appliances. In this session, we will highlight best practices that enable a smooth transition to the adoption of cloud-based security services.


Friday, 31 August, 2018 01:20 PM|Friday, 31 August, 2018 01:40 PM
Rethinking Security for multi-cloud Era

Learn to protect your Network with Context-Aware Micro-Segmentation? & how to deliver consistent, automatable network security to workloads no matter where they live -- from the data center, to the cloud, to the edge. About: VMware NSX Data Center is the network virtualization platform for the Software-Defined Data Center (SDDC), delivering networking & security entirely in software, abstracted from the underlying physical infrastructure.


Friday, 31 August, 2018 01:25 PM|Friday, 31 August, 2018 01:45 PM
Google Cloud - Customer-Centric Perspective
Anuja Shulka, Cloud Technology partners lead, Google Cloud
Sujit Nair, Public Cloud Consulting Engineer – APAC, Palo Alto Networks

Customer-Centric Perspective: Protecting Cloud-Native Applications with Google Cloud and Palo Alto Networks.


Friday, 31 August, 2018 03:30 PM|Friday, 31 August, 2018 04:15 PM
How to Evaluate and Operate a CASB
Sid Deshpande, Research Director, Gartner

Cloud access security brokers (CASB) are now being deployed by organizations large and small. This session will dig into the features, the leading use cases we see clients successfully using and the requirements needed to make your CASB deployment a successful one.


Thursday, 30 August, 2018 01:30 PM|Thursday, 30 August, 2018 03:00 PM
Workshop: Crisis Communications After a Security Incident
Jie Zhang, Sr Director Analyst, Gartner

From the likes of WannaCry, Petya and others, cyberattacks are more frequently and more significantly disrupting business operations. This workshop presents crisis communication and coordination best practices so that attendees will gain valuable experience in ensuring a strong crisis communications position.

Please Note: based on availability and eligibility you may sign-up for this session via Events Navigator after you register for this event.

Friday, 31 August, 2018 10:15 AM|Friday, 31 August, 2018 11:45 AM
Workshop: Improve Your Incident Response to an International Data Breach
Nader Henein, Sr Director Analyst, Gartner

Security and risk management leaders must develop strong incident response (IR) capabilities where personally identifiable information (PII) is compromised. This workshop will use a scenario that highlights the impact of cross-border data flows and privacy management to help validate IR capabilities.

Please Note: based on availability and eligibility you may sign-up for this session via Events Navigator after you register for this event.

Friday, 31 August, 2018 03:30 PM|Friday, 31 August, 2018 04:15 PM
GDPR the Day After: 3 Myths and 6 Key Capabilities Discussed
Nader Henein, Sr Director Analyst, Gartner

After ample preparation time in anticipation of the GDPR, Gartner has observed a few misconceptions on privacy as well as a number of key functions for a mature privacy management program. We will address the lessons learned and the necessary capabilities to protect privacy, including the role of security, program ownership, and what the market is and should be doing.


Thursday, 30 August, 2018 10:30 AM|Thursday, 30 August, 2018 11:15 AM
Wait! What? Someone Spoofed Our Email and We Lost $1M?
Jonathan Care, Sr Director Analyst, Gartner

Emails get spoofed. Sometimes it's a prank but increasingly it's the vector for fraudulent criminal gangs. Impact can be loss of confidential data, actual financial losses through fraud or blackmail and extortion. Email has remained the dominant B2B communication channel for years and is likely to be so for the foreseeable future. Let's look at how we can fix it — not just for ourselves but for our customers, supply partners and employees.


Thursday, 30 August, 2018 02:30 PM|Thursday, 30 August, 2018 03:00 PM
Bringing Order to Chaos in Cyber Security
Gaurav Agarwal, Managing Director, Symantec Software Solutions Pvt Ltd

It takes more than a few products speaking to each other to drive a comprehensive enterprise security strategy. In a world driven by unprecedented growth, the risks are greater than ever. In this session understand how Symantec is bringing openness to chaotic cyber security environment and redefining cyber security through its Integrated Cyber Defense platform.


Thursday, 30 August, 2018 04:00 PM|Thursday, 30 August, 2018 04:45 PM
Where's the Fire?
Gaurav Agarwal, Managing Director, Symantec Software Solutions Pvt Ltd
Manuj Kumar, Director, Mid-Market Enterprises (India , Symantec Software Solutions Pvt Ltd
Vamsi Ponnekanti, Head, Technical Sales, symantec
Krishnan V V, Director - Enterprise Sales, India, Symantec

The session will be an open house discussion wherein the participants will share specific thoughts on what bothers them about the enterprise security, their preparedness and response mechanisms, the effect of the rapid absorption of digital technologies on their environment and what could be done to transform their organizations.

Please Note: based on availability and eligibility you may sign-up for this session via Events Navigator after you register for this event.

Thursday, 30 August, 2018 04:45 PM|Thursday, 30 August, 2018 05:30 PM
Meetup: Privacy Laws & GDPR Compliance Best Practices

Please Note: based on availability and eligibility you may sign-up for this session via Events Navigator after you register for this event.

Thursday, 30 August, 2018 04:45 PM|Thursday, 30 August, 2018 05:45 PM
Roundtable: Practical Data Security Options for Midsize Enterprises
Deborah Kish, Sr Principal Analyst, Gartner

Midsize enterprises are defined as organizations between $50 million and $1 billion in annual revenue and fewer than 1,000 employees. This roundtable discussion focuses on practical data security options for the midmarket. Preregistration is required. Seats are limited. This session is a good fit for you if your organization has between five and 50 people in IT and an IT budget between $5 million and $30 million. We prequalify attendees for midsize enterprise sessions based on annual revenue between $50 million and $1 billion.

Please Note: based on availability and eligibility you may sign-up for this session via Events Navigator after you register for this event.

Thursday, 30 August, 2018 05:40 PM|Thursday, 30 August, 2018 06:00 PM
How Was That Breach Detected? - And What Can You Do?

In this talk, we will use breach examples that FireEye investigated to take a closer look at how the breach was discovered and what security lessons can be learned from the alerts. For example, how leads found from one compromised endpoint would led to discovery of credential harvesting and other compromised assets. The take away from this talk will be actionable in many environments.


Friday, 31 August, 2018 10:15 AM|Friday, 31 August, 2018 10:45 AM
Monitor User Activity With Data or Prepare for a Breach
Deborah Kish, Sr Principal Analyst, Gartner

Enterprises have had a wake-up call over the last few years as their data assets have been increasingly plundered, with increasing financial liabilities. Users need access to data to do their jobs, but not all data. Data-centric audit and protection tools must be applied to detect potential malicious activity before it results in a breach.


Friday, 31 August, 2018 10:15 AM|Friday, 31 August, 2018 11:45 AM
Workshop: Improve Your Incident Response to an International Data Breach
Nader Henein, Sr Director Analyst, Gartner

Security and risk management leaders must develop strong incident response (IR) capabilities where personally identifiable information (PII) is compromised. This workshop will use a scenario that highlights the impact of cross-border data flows and privacy management to help validate IR capabilities.

Please Note: based on availability and eligibility you may sign-up for this session via Events Navigator after you register for this event.

Friday, 31 August, 2018 11:45 AM|Friday, 31 August, 2018 12:30 PM
State of Data Security, 2018
Deborah Kish, Sr Principal Analyst, Gartner

Security and risk management leaders need to develop security strategies that treat data as a pervasive asset (and liability). New data privacy laws and the continued growth of data breaches are increasing business risks. Data security governance is an emerging risk-based framework that will help plan and orchestrate policies across data security products that are siloed and do not integrate.


Friday, 31 August, 2018 01:45 PM|Friday, 31 August, 2018 02:15 PM
Data Classification 101
Deborah Kish, Sr Principal Analyst, Gartner

Increasing regulatory and security threats are pushing a lot of security and risk management leaders to start a data classification initiative or revisit a previously unsuccessful one. This session provides a practical approach to implement data classification: 1) What policies and standards do you need? 2) How do you implement data classification successfully? 3) What role do tools play?


Friday, 31 August, 2018 03:30 PM|Friday, 31 August, 2018 04:15 PM
GDPR the Day After: 3 Myths and 6 Key Capabilities Discussed
Nader Henein, Sr Director Analyst, Gartner

After ample preparation time in anticipation of the GDPR, Gartner has observed a few misconceptions on privacy as well as a number of key functions for a mature privacy management program. We will address the lessons learned and the necessary capabilities to protect privacy, including the role of security, program ownership, and what the market is and should be doing.


Thursday, 30 August, 2018 01:30 PM|Thursday, 30 August, 2018 02:15 PM
Managing the Insider Threat: Why Employee Monitoring Is No Longer a Dirty Word
Jonathan Care, Sr Director Analyst, Gartner

Employee monitoring is one of those topics that most IT leaders don’t like to talk about. Blandishments like “We trust our people,” “We have a culture of openness,” are common. Yet, as Mark Twain said “The difference between a man and a dog is that if you feed a dog and take care of it, it will not bite you”. We examine how employee monitoring contributes not only to prevention and detection of internal malfeasance, but can also be used to safeguard employees and ensure safe working.


Thursday, 30 August, 2018 08:00 AM|Thursday, 30 August, 2018 08:30 AM
Tutorial: Do the Simple Things Well in Information Security
Prateek Bhajanka, Principal Analyst, Gartner

Good information security hygiene is a must, but many organizations lose focus on getting the basics right, leading to an unjustified level of confidence in risk posture. Join us and learn: • What are the key activities, capabilities and practices for organizations? • What are the activities that you can delay or even skip entirely? • Why doing the basics is more important than ever.


Thursday, 30 August, 2018 10:30 AM|Thursday, 30 August, 2018 12:00 PM
Workshop: Go Beyond Compliance — Anti-Money Laundering Programs That Changes the World
Danny Luong, Research Director, Gartner

Workshop to discuss the anti-money laundering market focusing on: Security and risk management leaders' understanding the need for efficiency but how to gain effectiveness in detecting suspicious activity without high operational overhead is still eluding the market, developing a new breed of AML experts/operators that are driven by a social mission and ideas for an AML black ops (best practices of the elite AML programs and teams).

Please Note: based on availability and eligibility you may sign-up for this session via Events Navigator after you register for this event.

Thursday, 30 August, 2018 11:30 AM|Thursday, 30 August, 2018 12:15 PM
Effectively Establish and Operate a Third-Party and Vendor Risk Management Program
Jie Zhang, Sr Director Analyst, Gartner

Vendors and third parties can create significant risks to business operations and performance. This session will provide an overview of the methods to efficiently reduce residual vendor risks. What are the current best practices for assessing, monitoring, remediating or mitigating vendor risks? What emerging practices are improving the value of vendor risk management programs?


Thursday, 30 August, 2018 03:15 PM|Thursday, 30 August, 2018 04:00 PM
Meetup: GRC Tools and Program Best Practices

Please Note: based on availability and eligibility you may sign-up for this session via Events Navigator after you register for this event.

Thursday, 30 August, 2018 04:00 PM|Thursday, 30 August, 2018 04:30 PM
Automating Cyber Security and Risk Management
Gaurav Mahendru, Security Solution Architect- Security , Service Now

ServiceNow is changing the way organizations deal with Business and Cyber Risks and adopt Security Orchestration and Automation in responding to threats. The session will cover 2 key areas of immediate concern to organizations: Managing Business Risks real time using an integrated approach to Risk Management Respond to and Resolve Security threats, fast using orchestration and automation and leveraging existing investments in cybersecurity.


Thursday, 30 August, 2018 04:45 PM|Thursday, 30 August, 2018 05:30 PM
Meetup: Third Party & Vendor Risk Management Best Practices

Please Note: based on availability and eligibility you may sign-up for this session via Events Navigator after you register for this event.

Friday, 31 August, 2018 11:00 AM|Friday, 31 August, 2018 11:30 AM
The Future of Cognitive Security Is Now
Ananda Kumar V, Global Integrated Delivery Leader, IBM India Pvt Ltd

Many security conversations today are likely to touch upon security intelligence, behavioral anomaly detection and the value of augmented intelligence (AI) in security. But is cognitive security all hype, or are there real applications in use today? Join us to hear more about the 3 phases of AI in Security, how can you address these phases and listen to the experiences with Cognitive Security deployment by one of your peers from the industry.


Friday, 31 August, 2018 11:00 AM|Friday, 31 August, 2018 11:30 AM
Embedding Security Maturity into Enterprise Risk.
Robert Le Busque, Managing Director Australia/NZ & India, Verizon
Mandeshpal Singh, Product Manager, Verizon

A transition path for the cyber dependent enterprise. Cyber Security has moved out of IT and has become an Enterprise wide concern. Regulatory pressure, a complex vendor- and technology landscape, skill shortage and other factors demand a cyber-integrated approach to Enterprise risk. Doing so will require a shift of focus from technology to outcomes, which in return requires effective means of quantification.


Friday, 31 August, 2018 11:45 AM|Friday, 31 August, 2018 12:30 PM
State of Risk Management 2018
Jie Zhang, Sr Director Analyst, Gartner

Risk management continues to be an area of growing maturity and investment for most organizations, as the risk landscape becomes increasingly complex and interconnected. As a result, new technology solutions are emerging to increase the collaborative nature of risk management to support data-driven decision making, both within and external to an organization. This session explores how integrated risk management (IRM) will help improve risk management practices.


Friday, 31 August, 2018 01:45 PM|Friday, 31 August, 2018 02:15 PM
Data Classification 101
Deborah Kish, Sr Principal Analyst, Gartner

Increasing regulatory and security threats are pushing a lot of security and risk management leaders to start a data classification initiative or revisit a previously unsuccessful one. This session provides a practical approach to implement data classification: 1) What policies and standards do you need? 2) How do you implement data classification successfully? 3) What role do tools play?


Friday, 31 August, 2018 01:45 PM|Friday, 31 August, 2018 02:30 PM
Tracking your Risk Posture in a Dynamic Business Environment

In today’s ever-changing technological landscape, managing your organizations' risk posture has become a major challenge. The dynamic nature and fluidity of the business have made current methods of data collection for Risk Management archaic. Keeping track of the risk indicators, and ensuring they are up to date, compounds this even further. Join us to see how ServiceNow is using an integrated approach to Risk Management.

Please Note: based on availability and eligibility you may sign-up for this session via Events Navigator after you register for this event.

Friday, 31 August, 2018 01:45 PM|Friday, 31 August, 2018 02:30 PM
Ask the Analyst: State of Fraud Prevention and Payment Security
Danny Luong, Research Director, Gartner

Fraud prevention leaders have mastered the art of detecting and preventing fraudulent account activity and payment events in many verticals and use cases, but as customers change the way they interact with each other and their expectations of their service providers, banks, retailers, healthcare teams and governments, the old ways have failed to evolve. Please note: Preregistration required. Reserved for end user organizations.

Please Note: based on availability and eligibility you may sign-up for this session via Events Navigator after you register for this event.

Thursday, 30 August, 2018 10:30 AM|Thursday, 30 August, 2018 11:15 AM
State of Security Operations, Monitoring and Analytics, 2018
Kelly Kavanagh, Principal Research Analyst, Gartner

Analytics today spreads to more security technologies, affecting not just threat detection and monitoring, but other operational areas. We are approaching an era where most security tools are security analytics tools that utilize machine learning for many functions. Modern security operations also heavily rely on foundational technologies such as SIEM to accomplish their mission. They struggle with more automation — of both thinking and acting — that promises to relieve humans from the routine tasks, but sometimes adding more work to overworked security teams. This session will address these key issues: (1) What is the role of analytics in security today? (2) What defines best-in-class security operations of 2018? (3) Will AI save us from all the threats?


Thursday, 30 August, 2018 01:00 PM|Thursday, 30 August, 2018 01:20 PM
Elevate Trust; Reduce Risk: Too Much to Ask?
Matt Moynahan, CEO, Forcepoint

Join us for a Fireside Chat session where Matt Moynahan, CEO of Forcepoint and Vijay Ramachandran, Storyteller & Knowledge Navigator will discuss "How can security & technology executives" elevate the internal conversation around info security, and thus change the way Indian organizations approach business risk.


Thursday, 30 August, 2018 04:00 PM|Thursday, 30 August, 2018 04:30 PM
Understanding Global Risk Exposure To Define SecOps Practice
Corey Thomas, President & CEO, Rapid7

Corey will present the latest findings of the 2018 Rapid7 National Exposure Index research. Find out where India ranks in the world in terms of risk exposure in comparison to other countries in APAC; and key actionable steps security teams should take. He will also address how organizations can build their own SecOps practice by enabling shared visibility, analytics and automation within their security operations and architecture plan.


Thursday, 30 August, 2018 04:45 PM|Thursday, 30 August, 2018 05:30 PM
Alexa, Investigate This Incident
Mark Nicolett, Managing Vice President, Gartner

Security orchestration, automation and response (SOAR) tools have been growing in popularity as organizations try to introduce automation in their security operations practices. This session defines this emerging technology and presents emerging deployment and operations practices. Questions covered: • What is SOAR • Do I need it? Who does? • How are organizations using SOAR tools? • What are the best practices in deployment and use of SOAR tools?


Thursday, 30 August, 2018 05:40 PM|Thursday, 30 August, 2018 06:00 PM
How Was That Breach Detected? - And What Can You Do?

In this talk, we will use breach examples that FireEye investigated to take a closer look at how the breach was discovered and what security lessons can be learned from the alerts. For example, how leads found from one compromised endpoint would led to discovery of credential harvesting and other compromised assets. The take away from this talk will be actionable in many environments.


Friday, 31 August, 2018 09:55 AM|Friday, 31 August, 2018 10:15 AM
Transforming your legacy Security Operations Center

In this session, we begin by touring a typical Security Operations Center (SOC) and study the day to day activities of the various functions inside. We then explore the various challenges faced by these functions and introduce the idea of taking a platform approach. an outlook at the future of Security Operations using this approach to consolidate, facilitate and automate workflows of the entire Security Operations Center (SOC).


Friday, 31 August, 2018 10:15 AM|Friday, 31 August, 2018 11:00 AM
Ask the Analyst: How to Build and Operate a Modern SOC
Pete Shoard, Sr Director Analyst, Gartner

Security operations are a critical component of an effective cybersecurity organization. Organizations pursuing a more mature security practice may decide to centralize all or part of those activities into a security operations center (SOC). This session will discuss the following: • A structured approach to create requirements for, plan, establish and efficiently operate a modern SOC. • Key differences between a modern SOC and a traditional model. • What tools are key to the success of a SOC • What SOC functions can successfully be outsourced

Please Note: based on availability and eligibility you may sign-up for this session via Events Navigator after you register for this event.

Friday, 31 August, 2018 11:00 AM|Friday, 31 August, 2018 11:30 AM
The Future of Cognitive Security Is Now
Ananda Kumar V, Global Integrated Delivery Leader, IBM India Pvt Ltd

Many security conversations today are likely to touch upon security intelligence, behavioral anomaly detection and the value of augmented intelligence (AI) in security. But is cognitive security all hype, or are there real applications in use today? Join us to hear more about the 3 phases of AI in Security, how can you address these phases and listen to the experiences with Cognitive Security deployment by one of your peers from the industry.


Thursday, 30 August, 2018 09:00 AM|Thursday, 30 August, 2018 10:00 AM
Gartner Keynote: Scaling Trust and Resilience — Cut the Noise and Enable Action
Lawrence Orans, Research VP, Gartner
Rajpreet Kaur, Principal Analyst, Gartner
Sid Deshpande, Research Director, Gartner

Constant change in the threat landscape and compliance requirements present daily challenges that can feel overwhelming. Scaling security when facing a fast-paced IT innovation landscape involves choices, often at the expense of building trust and resilience. Three key questions drive strong decision making: What's important, what's dangerous and what's real? This session presents scenarios to demonstrate that ruthless prioritization in the answers helps us cut through the noise and enables action that changes our outlook from overwhelmed to empowered.


Thursday, 30 August, 2018 10:30 AM|Thursday, 30 August, 2018 11:15 AM
Pragmatic Steps for a Successful Security Strategy
Jeffrey Wheatman, Research VP, Gartner
Wam Voster, Sr Director Analyst, Gartner

CISOs are called on to fill the twin roles of operational expert and strategic planner. Many CISOs struggle when developing a strategy because they have not been exposed to this process. A few pragmatic steps can help ensure that your strategy is useful. This session will address the following: • What are the elements that you must consider? • What pragmatic steps can you take during its development to ensure success? • What safeguards do you need to support successful execution?


Thursday, 30 August, 2018 04:45 PM|Thursday, 30 August, 2018 05:30 PM
CISO Circle : Lessons Learned in the Equifax Breach and Other Incidents
Eric Ouellet, VP, Analyst, Gartner

Come join us for a discussion of four recent high-profile breaches. How did they happen? What was the company response? What worked and what didn't? What should we have learned from the breach?

Please Note: based on availability and eligibility you may sign-up for this session via Events Navigator after you register for this event.

Friday, 31 August, 2018 01:45 PM|Friday, 31 August, 2018 02:15 PM
When the Going Gets Tough, the Business Blames the CISO
Wam Voster, Sr Director Analyst, Gartner

As long as business is doing well business leaders are applauded and rewarded, but the moment something bad happens the CISO is blamed for not properly protecting business information. How can security and risk management leaders ensure roles and responsibilities are clear? What can be done to ensure ownership of risk is well-defined. How much risk should the CISO actually own?


Friday, 31 August, 2018 02:30 PM|Friday, 31 August, 2018 03:15 PM
What Your Board Wants to Know
Jeffrey Wheatman, Research VP, Gartner
Eric Ouellet, VP, Analyst, Gartner

It is now common practice for a board of directors to require periodic reporting and event-based updates on the state of IT risk and information security. Risk and security leaders must provide board-relevant and business-aligned content. This presentation discusses what you need to present. Key Issues: • What is the role of the board and what do they care about? • What content do you need to cover? • How should you present this content?


Thursday, 30 August, 2018 10:05 AM|Thursday, 30 August, 2018 10:25 AM
Application Security Emerging Trends: What you need to know!
Kabir Mulchandani, Managing Director, Mr.

Whether organizations develop new technology in-house or leverage 3rd-party solutions, software vulnerabilities provide another vector for cyber-attacks. They react by developing a software security initiative to manage these. The session reviews emerging industry practices in managing software security risks, including security testing, static code analysis, architecture risks reviews, training & how to establish/mature a software security group


Friday, 31 August, 2018 11:00 AM|Friday, 31 August, 2018 11:30 AM
Embedding Security Maturity into Enterprise Risk.
Robert Le Busque, Managing Director Australia/NZ & India, Verizon
Mandeshpal Singh, Product Manager, Verizon

A transition path for the cyber dependent enterprise. Cyber Security has moved out of IT and has become an Enterprise wide concern. Regulatory pressure, a complex vendor- and technology landscape, skill shortage and other factors demand a cyber-integrated approach to Enterprise risk. Doing so will require a shift of focus from technology to outcomes, which in return requires effective means of quantification.


Friday, 31 August, 2018 01:00 PM|Friday, 31 August, 2018 01:20 PM
Magic Quadrant for Managed Security Services
Rajpreet Kaur, Principal Analyst, Gartner

This session will review the latest Gartner Magic Quadrant for Managed Security Services (MSS). Attendees will learn about the current market, provider landscape, and adjacent services for this well-established network security services market.


Friday, 31 August, 2018 02:30 PM|Friday, 31 August, 2018 03:15 PM
How to Select an MSSP
Pete Shoard, Sr Director Analyst, Gartner

Identifying the core features to call out to a potential MSSP when scoping the need for an outsourced service is critical for a successful engagement. This session will provide practical examples of how to establish effective requirements and use cases before engaging providers. • What are the key service performance metrics to insist on from an MSSP? • How can you define service customization requirements to ensure additional services charges are managed? • How can you align internal processes with the providers' outputs?


Thursday, 30 August, 2018 08:00 AM|Thursday, 30 August, 2018 08:30 AM
Tutorial: State of Endpoint and Mobile Security, 2018
John Girard, Distinguished VP Analyst, Gartner

Endpoint and mobility use cases continuously transform business processes and challenge established security best practices. Integrity comes down to personal discretion. We provide IT leaders with a path to introduce agility and tolerance into critical infrastructure. Concerns include technology trends, emerging exploits and the sheer enormity of data protection in an interconnected workplace.


Thursday, 30 August, 2018 12:30 PM|Thursday, 30 August, 2018 12:50 PM
The 2018 Magic Quadrant for Endpoint Protection Platforms
Prateek Bhajanka, Principal Analyst, Gartner

The EPP MQ is one of the most popular documents on Gartner.com, and clients want to understand what the relative placement really means. This session will take you through the analysis process, the assessment criteria and of course the products themselves. Attendees will get updated information and guidance on how best to use this document when evaluating vendors.


Thursday, 30 August, 2018 03:15 PM|Thursday, 30 August, 2018 03:45 PM
Impact Appraisal: Technologies Converge to Aid Transparency in Mobile Authentication
John Girard, Distinguished VP Analyst, Gartner

If you are still struggling with getting beyond passwords, better times are coming. The conjunction of increasing online use cases and competition for embedded biometrics in next-generation hardware is propelling opportunities for advanced authentication techniques. This presentation will chart a course for clever, subtle and transparent identity management.


Thursday, 30 August, 2018 04:00 PM|Thursday, 30 August, 2018 04:30 PM
So You Don’t Want To Be Hacked - Latest Exploit Techniques
Sunil Sharma, Managing Director - Sales, India & SAARC, Sophos, sophos

Exploit protection is a crucial endpoint security technique, and one of the features customers are most interested in implementing. However exploits are also one of the most misunderstood endpoint threats.  In this session you will learn why attackers rely on exploits, review some of the most common exploit techniques, and understand how to stay protected


Friday, 31 August, 2018 02:30 PM|Friday, 31 August, 2018 03:15 PM
How to Evolve Your Mobile Security Strategy in 2018
John Girard, Distinguished VP Analyst, Gartner

Mobile attacks continue to surface. Do you have all the right mobile security solutions in place? Come learn how to build a defense in-depth strategy for your ever growing mobile workforce. We will also discuss how UEM, MTD and mobile OS/HW security solutions continue to improve.


Thursday, 30 August, 2018 04:45 PM|Thursday, 30 August, 2018 05:30 PM
Meetup: Privacy Laws & GDPR Compliance Best Practices

Please Note: based on availability and eligibility you may sign-up for this session via Events Navigator after you register for this event.

Friday, 31 August, 2018 03:30 PM|Friday, 31 August, 2018 04:15 PM
GDPR the Day After: 3 Myths and 6 Key Capabilities Discussed
Nader Henein, Sr Director Analyst, Gartner

After ample preparation time in anticipation of the GDPR, Gartner has observed a few misconceptions on privacy as well as a number of key functions for a mature privacy management program. We will address the lessons learned and the necessary capabilities to protect privacy, including the role of security, program ownership, and what the market is and should be doing.


Thursday, 30 August, 2018 10:30 AM|Thursday, 30 August, 2018 11:15 AM
State of Security Operations, Monitoring and Analytics, 2018
Kelly Kavanagh, Principal Research Analyst, Gartner

Analytics today spreads to more security technologies, affecting not just threat detection and monitoring, but other operational areas. We are approaching an era where most security tools are security analytics tools that utilize machine learning for many functions. Modern security operations also heavily rely on foundational technologies such as SIEM to accomplish their mission. They struggle with more automation — of both thinking and acting — that promises to relieve humans from the routine tasks, but sometimes adding more work to overworked security teams. This session will address these key issues: (1) What is the role of analytics in security today? (2) What defines best-in-class security operations of 2018? (3) Will AI save us from all the threats?


Thursday, 30 August, 2018 03:15 PM|Thursday, 30 August, 2018 03:45 PM
Tips for Selecting the Right Security Analytics Tools for Your SOC
Kelly Kavanagh, Principal Research Analyst, Gartner

When building a security operation center, or trying to improve the visibility over threats, an abundance of new technologies overwhelms security leaders with too many options. This session will highlight the benefits and compare the use cases for the most useful security analytics tools. Technologies covered in this session include SIEM, network traffic analysis, user behavior analytics, endpoint detection and response, intrusion detection, full packet capture and SOAR.


Thursday, 30 August, 2018 04:00 PM|Thursday, 30 August, 2018 04:30 PM
Understanding Global Risk Exposure To Define SecOps Practice
Corey Thomas, President & CEO, Rapid7

Corey will present the latest findings of the 2018 Rapid7 National Exposure Index research. Find out where India ranks in the world in terms of risk exposure in comparison to other countries in APAC; and key actionable steps security teams should take. He will also address how organizations can build their own SecOps practice by enabling shared visibility, analytics and automation within their security operations and architecture plan.


Thursday, 30 August, 2018 04:45 PM|Thursday, 30 August, 2018 05:30 PM
Alexa, Investigate This Incident
Mark Nicolett, Managing Vice President, Gartner

Security orchestration, automation and response (SOAR) tools have been growing in popularity as organizations try to introduce automation in their security operations practices. This session defines this emerging technology and presents emerging deployment and operations practices. Questions covered: • What is SOAR • Do I need it? Who does? • How are organizations using SOAR tools? • What are the best practices in deployment and use of SOAR tools?


Friday, 31 August, 2018 10:15 AM|Friday, 31 August, 2018 10:45 AM
The Evolution of SIEM Technology
Pete Shoard, Sr Director Analyst, Gartner
Mark Nicolett, Managing Vice President, Gartner
Kelly Kavanagh, Principal Research Analyst, Gartner

Security information and event management (SIEM) technologies have been around for almost two decades, and have evolved and adapted as use cases and the external landscape have changed over time. SIEM tools are far from dead, but change is happening. This session will cover how SIEM technologies are evolving and what the future of SIEM solutions will look like.


Friday, 31 August, 2018 02:30 PM|Friday, 31 August, 2018 03:15 PM
Meetup: Experiences In Using AI/ML To Better Detect & Respond To Threats

Please Note: based on availability and eligibility you may sign-up for this session via Events Navigator after you register for this event.

Thursday, 30 August, 2018 09:00 AM|Thursday, 30 August, 2018 10:00 AM
Gartner Keynote: Scaling Trust and Resilience — Cut the Noise and Enable Action
Lawrence Orans, Research VP, Gartner
Rajpreet Kaur, Principal Analyst, Gartner
Sid Deshpande, Research Director, Gartner

Constant change in the threat landscape and compliance requirements present daily challenges that can feel overwhelming. Scaling security when facing a fast-paced IT innovation landscape involves choices, often at the expense of building trust and resilience. Three key questions drive strong decision making: What's important, what's dangerous and what's real? This session presents scenarios to demonstrate that ruthless prioritization in the answers helps us cut through the noise and enables action that changes our outlook from overwhelmed to empowered.


Thursday, 30 August, 2018 10:10 AM|Thursday, 30 August, 2018 10:30 AM
Best Practices on SD-WAN Strategy

SD-WAN Simplified ! Learn how to address complex WAN problems, increase agility and cost effectiveness, while assuring application performance across the WAN About VMware NSX® SD-WAN by VeloCloud™: VMware NSX® SD-WAN by VeloCloud™ enables enterprises to support application growth, network agility and simplified branch implementations while delivering optimized access to cloud services, private data centers and enterprise applications.


Thursday, 30 August, 2018 10:30 AM|Thursday, 30 August, 2018 11:15 AM
Pragmatic Steps for a Successful Security Strategy
Jeffrey Wheatman, Research VP, Gartner
Wam Voster, Sr Director Analyst, Gartner

CISOs are called on to fill the twin roles of operational expert and strategic planner. Many CISOs struggle when developing a strategy because they have not been exposed to this process. A few pragmatic steps can help ensure that your strategy is useful. This session will address the following: • What are the elements that you must consider? • What pragmatic steps can you take during its development to ensure success? • What safeguards do you need to support successful execution?


Thursday, 30 August, 2018 01:00 PM|Thursday, 30 August, 2018 01:20 PM
Elevate Trust; Reduce Risk: Too Much to Ask?
Matt Moynahan, CEO, Forcepoint

Join us for a Fireside Chat session where Matt Moynahan, CEO of Forcepoint and Vijay Ramachandran, Storyteller & Knowledge Navigator will discuss "How can security & technology executives" elevate the internal conversation around info security, and thus change the way Indian organizations approach business risk.


Thursday, 30 August, 2018 02:30 PM|Thursday, 30 August, 2018 03:00 PM
Stepping up to 5th Generation of Cyber Security
Gad Naveh, Advanced Threat Prevention Evangelist , Check Point

2017 has been a game changer in the world of cyber-crime, Mega-attacks have spread fast to almost every country and every industry possible – from banking, transportation to healthcare to production lines. Moreover, regardless of all our current investments in cyber security, according to a recent survey conducted by Check Point, 98% of IT professional respondents have experienced a significant cyber security threat in past 3 years.


Thursday, 30 August, 2018 02:30 PM|Thursday, 30 August, 2018 03:00 PM
Helping you manage Digital Risk
Leonard Kleinman, Chief Cyber Security Advisor, RSA

Today’s combination of advanced threat landscape and dynamically changing business/IT environments requires a prioritization of security based on business impact. This session will highlight how RSA delivers a unique portfolio of products/services that span the domains of Risk Management, Security Exclusion/Inclusion and Fraud Prevention that enable a true Business-Driven Security approach


Thursday, 30 August, 2018 02:30 PM|Thursday, 30 August, 2018 03:00 PM
Cyber Exposure – Discover, Measure & Reduce Your Cyber Risk
Diwakar Dayal, Managing Director, India & SAARC, Tenable

Today’s CISO is under pressure to keep the organisation secure but is the only measure of ‘success’ the avoidance of a data breach & bad press? How can we measure the effectiveness of our Cyber Security programs & know if our security posture is getting better/worse over time? Join Tenable & CISO of Idea Cellular to learn how to reduce your Cyber Risk while benchmarking the effectiveness of your cyber security posture against your industry peers.


Thursday, 30 August, 2018 04:00 PM|Thursday, 30 August, 2018 04:30 PM
Understanding Global Risk Exposure To Define SecOps Practice
Corey Thomas, President & CEO, Rapid7

Corey will present the latest findings of the 2018 Rapid7 National Exposure Index research. Find out where India ranks in the world in terms of risk exposure in comparison to other countries in APAC; and key actionable steps security teams should take. He will also address how organizations can build their own SecOps practice by enabling shared visibility, analytics and automation within their security operations and architecture plan.


Thursday, 30 August, 2018 04:00 PM|Thursday, 30 August, 2018 04:30 PM
So You Don’t Want To Be Hacked - Latest Exploit Techniques
Sunil Sharma, Managing Director - Sales, India & SAARC, Sophos, sophos

Exploit protection is a crucial endpoint security technique, and one of the features customers are most interested in implementing. However exploits are also one of the most misunderstood endpoint threats.  In this session you will learn why attackers rely on exploits, review some of the most common exploit techniques, and understand how to stay protected


Friday, 31 August, 2018 11:00 AM|Friday, 31 August, 2018 11:30 AM
The Future of Cognitive Security Is Now
Ananda Kumar V, Global Integrated Delivery Leader, IBM India Pvt Ltd

Many security conversations today are likely to touch upon security intelligence, behavioral anomaly detection and the value of augmented intelligence (AI) in security. But is cognitive security all hype, or are there real applications in use today? Join us to hear more about the 3 phases of AI in Security, how can you address these phases and listen to the experiences with Cognitive Security deployment by one of your peers from the industry.


Friday, 31 August, 2018 11:00 AM|Friday, 31 August, 2018 11:30 AM
Solving the Primary Hurdle to IoT Deployments
Arun Ananthampalayam, Product Marketing Manager, Cloud IoT, Google Cloud, Google Inc

Security is a primary hurdle to IoT deployment. Find out how you can protect your IoT devices from overlooked cloud and on-premises security threats. In this session you will learn how Google Cloud and Microchip have partnered to offer a seamless and highly-secure solution for IoT devices connecting to Google Cloud IoT.


Friday, 31 August, 2018 11:00 AM|Friday, 31 August, 2018 11:45 AM
The Future Of Cyber Security
Bhaskar Bakthavatsalu, Managing Director, India & SAARC, checkpoint
Harshdeep Marwah, Country Manager, India, Check Point

Today we are in the midst of the 5th generation of cyber attacks, battling the most advanced and impact large scale, multi-vector mega attacks. Previous generations of cyber security are simply not enough. Time to step up to Gen V of cyber security with Check Point Infinity Architecture.

Please Note: based on availability and eligibility you may sign-up for this session via Events Navigator after you register for this event.

Friday, 31 August, 2018 01:20 PM|Friday, 31 August, 2018 01:40 PM
Rethinking Security for multi-cloud Era

Learn to protect your Network with Context-Aware Micro-Segmentation? & how to deliver consistent, automatable network security to workloads no matter where they live -- from the data center, to the cloud, to the edge. About: VMware NSX Data Center is the network virtualization platform for the Software-Defined Data Center (SDDC), delivering networking & security entirely in software, abstracted from the underlying physical infrastructure.


Friday, 31 August, 2018 02:30 PM|Friday, 31 August, 2018 03:15 PM
What Your Board Wants to Know
Jeffrey Wheatman, Research VP, Gartner
Eric Ouellet, VP, Analyst, Gartner

It is now common practice for a board of directors to require periodic reporting and event-based updates on the state of IT risk and information security. Risk and security leaders must provide board-relevant and business-aligned content. This presentation discusses what you need to present. Key Issues: • What is the role of the board and what do they care about? • What content do you need to cover? • How should you present this content?


Friday, 31 August, 2018 02:30 PM|Friday, 31 August, 2018 03:15 PM
How to Evolve Your Mobile Security Strategy in 2018
John Girard, Distinguished VP Analyst, Gartner

Mobile attacks continue to surface. Do you have all the right mobile security solutions in place? Come learn how to build a defense in-depth strategy for your ever growing mobile workforce. We will also discuss how UEM, MTD and mobile OS/HW security solutions continue to improve.


Friday, 31 August, 2018 02:30 PM|Friday, 31 August, 2018 03:15 PM
Meetup: Security Program Strategy For Small & Medium Sized Organizations

Please Note: based on availability and eligibility you may sign-up for this session via Events Navigator after you register for this event.

Friday, 31 August, 2018 04:45 PM|Friday, 31 August, 2018 05:30 PM
Gartner Keynote: Digital Business and Culture Clash — Surviving the Revolution
Jeffrey Wheatman, Research VP, Gartner
Eric Ouellet, VP, Analyst, Gartner
Sid Deshpande, Research Director, Gartner

Gartner research shows that success in the digital business revolution requires material culture changes inside and outside of IT. Organizations are limiting themselves through fear of technology, while the line between technology and business outcomes is disappearing. Non-IT executives treat security like a cost center and do not understand how to accept technology risks. A risk-aware culture must be developed and mature. Come hear about this groundbreaking research that links digital business success to culture and risk.


Thursday, 30 August, 2018 11:30 AM|Thursday, 30 August, 2018 12:15 PM
State of the Threat Landscape, 2018
Pete Shoard, Sr Director Analyst, Gartner

When it comes to the threat landscape, it can be challenging to understand how you should act to protect your business. Gartner presents a methodology to help organisations understand what really matters when looking at the latest threats. This session will cover the importance of understanding risk, patch and vulnerability management as well as applying some key issues of the 2018 threat landscape to a core methodology.


Thursday, 30 August, 2018 01:30 PM|Thursday, 30 August, 2018 02:15 PM
How to Hunt for Security Threats
Mark Nicolett, Managing Vice President, Gartner

Threat hunting (TH) is very hot, but very few organizations actually do it. Attend this session to learn the basics of practical hunting and how to start your TH effort. Key issues covered in this session: • What is TH? • How do you incorporate TH into your SOC processes? • How do you develop a basic TH capability? • Where do you get ideas on what to hunt for? • How do you measure TH successes?


Friday, 31 August, 2018 11:00 AM|Friday, 31 August, 2018 11:30 AM
The Future of Cognitive Security Is Now
Ananda Kumar V, Global Integrated Delivery Leader, IBM India Pvt Ltd

Many security conversations today are likely to touch upon security intelligence, behavioral anomaly detection and the value of augmented intelligence (AI) in security. But is cognitive security all hype, or are there real applications in use today? Join us to hear more about the 3 phases of AI in Security, how can you address these phases and listen to the experiences with Cognitive Security deployment by one of your peers from the industry.


Thursday, 30 August, 2018 01:30 PM|Thursday, 30 August, 2018 02:15 PM
How to Hunt for Security Threats
Mark Nicolett, Managing Vice President, Gartner

Threat hunting (TH) is very hot, but very few organizations actually do it. Attend this session to learn the basics of practical hunting and how to start your TH effort. Key issues covered in this session: • What is TH? • How do you incorporate TH into your SOC processes? • How do you develop a basic TH capability? • Where do you get ideas on what to hunt for? • How do you measure TH successes?


Thursday, 30 August, 2018 01:30 PM|Thursday, 30 August, 2018 02:15 PM
Services Are the Future for Threat Detection and Response
Sid Deshpande, Research Director, Gartner

As the external threat landscape becomes more hostile, compliance and regulatory requirements become more common and information security resources become increasingly scarce, organizations will be forced to rely more on service providers to deliver threat detection and incident response capabilities. This session will address issues such as what should you look to outsource and what opportunities are available on the market?


Thursday, 30 August, 2018 02:30 PM|Thursday, 30 August, 2018 03:00 PM
Cyber Exposure – Discover, Measure & Reduce Your Cyber Risk
Diwakar Dayal, Managing Director, India & SAARC, Tenable

Today’s CISO is under pressure to keep the organisation secure but is the only measure of ‘success’ the avoidance of a data breach & bad press? How can we measure the effectiveness of our Cyber Security programs & know if our security posture is getting better/worse over time? Join Tenable & CISO of Idea Cellular to learn how to reduce your Cyber Risk while benchmarking the effectiveness of your cyber security posture against your industry peers.


Thursday, 30 August, 2018 04:00 PM|Thursday, 30 August, 2018 04:30 PM
Understanding Global Risk Exposure To Define SecOps Practice
Corey Thomas, President & CEO, Rapid7

Corey will present the latest findings of the 2018 Rapid7 National Exposure Index research. Find out where India ranks in the world in terms of risk exposure in comparison to other countries in APAC; and key actionable steps security teams should take. He will also address how organizations can build their own SecOps practice by enabling shared visibility, analytics and automation within their security operations and architecture plan.


Thursday, 30 August, 2018 04:45 PM|Thursday, 30 August, 2018 05:30 PM
Why You Still Must Detect Advanced Threats on Your Network
Lawrence Orans, Research VP, Gartner

Massive use of SaaS and mobile technologies and a growing share of encrypted traffic revive the rumors of the death of the perimeter and network security altogether. Building a strong business case to prioritize network security investments is more difficult, due to increasing competition for budget from cloud and endpoint security solutions. This session will review the latest trends in network-based advanced threat defense, including the latest techniques used for anomaly detection, and a high-level framework to decide if TLS decryption is right for your organization.


Thursday, 30 August, 2018 04:45 PM|Thursday, 30 August, 2018 05:30 PM
Alexa, Investigate This Incident
Mark Nicolett, Managing Vice President, Gartner

Security orchestration, automation and response (SOAR) tools have been growing in popularity as organizations try to introduce automation in their security operations practices. This session defines this emerging technology and presents emerging deployment and operations practices. Questions covered: • What is SOAR • Do I need it? Who does? • How are organizations using SOAR tools? • What are the best practices in deployment and use of SOAR tools?


Friday, 31 August, 2018 01:45 PM|Friday, 31 August, 2018 02:30 PM
Tracking your Risk Posture in a Dynamic Business Environment

In today’s ever-changing technological landscape, managing your organizations' risk posture has become a major challenge. The dynamic nature and fluidity of the business have made current methods of data collection for Risk Management archaic. Keeping track of the risk indicators, and ensuring they are up to date, compounds this even further. Join us to see how ServiceNow is using an integrated approach to Risk Management.

Please Note: based on availability and eligibility you may sign-up for this session via Events Navigator after you register for this event.

Start planning your agenda now.