Agenda
8:30AM to 09:00AM:
Registration, Conversations & Connections

09:00AM to 09:40AM: Session 1
Insider Threat: Identifying Your Insider
• The Insider Problem – An Inconvenient Truth
• Insider Threat Landscape
• Insider Threat Impact & Challenges
• The Probable Causes / Vulnerabilities
• Mitigation Strategies

Speaker
Devadula Naaga Raju , President, ISACA-New Delhi Chapter

09:40AM to 10:20AM: Session 2
SCADA Attacks and Advanced Persistent Threats
With more and more critical infrastructure being controlled over networks, and most of them over the internet, attacking industrial control systems and crippling critical infrastructure is becoming a serious threat, especially with the emergence of Advanced Persistent Threats. This talk examines the nature, severity and prevalence of SCADA attacks, and ways to minimize the threat.
Speaker
Arif Shouqi, Solutions Architect-Asia and Pacific Region, Cisco

10:20AM to 10:50AM: Morning Break
Some time out for you to grab a cup of coffee and network with other Security enthusiasts

10:50AM to 11:30PM: Session 3
Security Virtual Infrastructure - Cloud
Server virtualization in cloud is one of the hottest topics in IT today. Initially driven by the need to consolidate servers to achieve higher hardware utilization rates, boost operational efficiency, and cut costs, enterprises more recently have implemented virtualization to get on-demand access to additional compute resources. The privacy and security issues that concern enterprises and organizations wanting to take advantage of cloud computing is addressed here.
Speaker
Ramkumar Mohan , Head - IT & CISO, Orbis Financial Corporation

11:30AM to 12:10PM: Session 4
Scrutinizing Security In Cloud Infrastructure: Vanquishing the Art of Perpetrators
Cloud computing is clearly one of today’s most enticing technology areas. However, there are significant, persistent concerns about cloud computing that are impeding momentum and will eventually compromise the vision of cloud computing as a new IT procurement model. We will speak of varied critical areas of concerns, when securing cloud infrastructure services and managed enterprise applications, thus providing the acumen towards mitigating the risk of being vulnerable against the perpetrating alarming attacks. Also we will discuss about multiple cascading ‘levels of failure’ associated with relying on cloud based infrastructure including exposing 'flawed assumptions' and 'untested theories' as it relates to security, privacy and confidentiality in the Cloud with some unique attack vectors.
Speaker
K.S.Abhiraj , Chief Security Researcher and Strategist, whitehat'People'

12:10AM to 12:50PM: Session 5
Intelligent Workload Management: Addressing Security & Identity Concern
Speaker
Shree Parthasarathy , Senior Director - Enterprise Risk Services, Deloitte

12:50PM to 01:50PM:Lunch
Break for lunch and a chance to catch up with each other!

01:50PM to 02:30PM: Session 6
New-age Mobile Networks: Threats and Solutions
In this talk, the presenter will highlight the evolving threats in the new age mobile ecosystem and solutions to counter these threats. As the uptake of smart consumer devices and new-age apps increases, the consumer behavior is shifting from voice-centric to data-centric usage. To cater to this shift in consumer behavior, mobile networks are also evolving to support new technologies like LTE and 4G. While this evolving landscape brings in an exciting new era of global connectivity and reach, it also poses new security threats that mobile networks have traditionally been immune to. Are the consumer devices and Service provider networks prepared to handle these threats? How do they need to evolve to address this threat landscape? Find out in this talk.
Speaker
Nitin Vig, Sr. Systems Engineer, Juniper Networks

02:30PM to 03:10PM: Session 7
The Changing Face of Endpoint Security
The change is visible. Data used to remain in a computer and its protection was provided by strong perimeter security. The wisdom of the past, which was to harden the perimeter by layering multiple technologies to detect the breach and protect the data, has not been very effective. The computers that used to remain within the enterprise boundary have themselves become networks and internet. The consumerization of IT is yet another evolution of technology that has taken the data far away from the enterprise boundary and control. There is a growing desire to allow employees to use their own devices for everyday work to reduce total cost of ownership. The employees now need flexibility to operate from places other than the office boundary using different kinds of computing devices.With the help of the real life examples, this session will highlight the changing face of end-point, the challenges in protection of enterprise data and evolve strategies to secure end-points.
Speaker
Kaushal K Chaudhary, Senior VP-IT & Group CISO, Lanco Infratech

03:10PM to 03:40PM: Afternoon Break
Some time out for you to grab another coffee and a well earned rest.

03:40PM to 04:20PM: Session 8
Cyber Security
Recent news items highlighting cyber attacks against organizations like IMF, Citigroup, Lockheed, CIA, CBI, raise concerns on the security of the critical infrastructure. Several public and private sector organizations in India and abroad have lost valuable data in such attacks. The spectre of cyber espionage, and cyberwar by nation-states is very real, and is already here. Security in the online world has thus become critical to ensure protection of key information assets. Nations have to take proactive steps to secure systems. Cyber security is thus clearly linked to national security. While the government is taking proactive steps such as the formulation of cyber security policy, industry has a major role to play, since more and more of critical infrastructure is in the private domain. This session will discuss the issues & challenges in cyber security including policy related matters, nations’ responses to cyber security, role of public-private partnerships, and imperatives for India among other critical elements related to cyber security.
Speaker
Rahul Jain, Senior Consultant - Security Practices, DSCI

04:20PM:
Conclusion