Business Enablers
Be a Beacon
An immersive residential program for cybersecurity leaders, where they engage, collaborate and unleash their potential in tackling critical challenges while exploring the diverse roles of CISOs and enhancing their leadership skills.
Arrival of Delegates – Welcome and Registration:
Upon arrival, delegates will be greeted by the event team, where they can complete their registration and collect their badges. Refreshments will be served, offering a chance for casual networking and initial introductions.
Delegates will enjoy a curated selection of tea, coffee, and light refreshments, providing an ideal setting for informal networking. This break offers an opportunity to engage in meaningful conversations with fellow attendees, share insights, and build connections in a relaxed environment before the next session.
The event will officially kick off with a welcome note from ISMG leadership. This session will highlight the core objectives of the summit, provide an overview of key themes, and set the tone for the discussions and activities ahead. Attendees will gain insights into ISMG’s vision for the event and how it aims to drive collaboration and innovation within the industry.
Regulatory requirements have compelled CISOs to shape the perception of security within their organizations. While CISOs have been evolving themselves as leaders, the changing threat landscape now demands them to redefine their leadership roles by embedding security into their DNA and making it an integral part of corporate culture.
This session will help CISOs unlock their true potential to drive innovation in security, emphasizing that their responsibilities extend far beyond data protection.
By becoming key enablers of growth, CISOs can serve as catalysts for change and seamlessly align security with their organization’s culture and structure.
The session will cover:
How CISOs are demonstrating inclusive leadership.
How to become a beacon of change.
How to change the top management’s perception of information security.
Avneesh Pandey
CGM,
Securities & Exchange Board of India (SEBI)
In today’s increasingly complex cybersecurity landscape, organizations need robust, integrated solutions to safeguard their operations. This session will explore how Airtel Business is transforming from a traditional telecom provider to a technology partner, empowering CISOs with cutting-edge tools to enhance cyber defense. From AI-driven threat intelligence to secure cloud services, discover how Airtel Business is helping organizations tackle the evolving challenges of cybersecurity and build resilient digital infrastructures in these demanding times.
The session will cover:
Generational shift in cybersecurity in last two decades.
Cybersecurity as a decisive factor in business growth.
Safeguarding AI and creating AI-based security approach.
Advantages of working with a full-stack managed security service provider has context menu.
Sharat Sinha
Director & CEO,
Airtel Business
As the day concludes, delegates will gather for an unforgettable evening under the stars with a gala dinner in a stunning location overlooking the historic Jaisalmer Fort. This elegant dinner offers a perfect blend of fine dining, cultural experiences, and scenic views. It provides a relaxed atmosphere for delegates to deepen connections, exchange ideas, and enjoy the breathtaking ambiance of the desert surroundings.
Start the day with a casual breakfast, offering a relaxed atmosphere for delegates to connect and converse over a variety of morning treats. This session encourages early networking, allowing attendees to exchange ideas and build relationships before the day's sessions begin. It's the perfect way to kick off a day of learning and collaboration in a comfortable setting.
As digitalization increases, the challenges for CISOs continue to grow, making the fight against cyberthreats even more challenging. Winning this cyberwar requires a proactive defense approach.
Cyber warfare has changed how contemporary battles are fought, affecting both national and enterprise security. In a cyberwar, adversaries aim to cripple critical infrastructure, disseminate disinformation and damage economies - threats that are as destructive as physical warfare. With attackers targeting critical systems, stealing sensitive data and destroying the very structures that support the most modern economic enterprise ecosystem, CISOs must develop tailored strategies to successfully defend against these cyberattacks.
The session will cover:
How to defend against cyberattacks with conventional military tactics in building defenses.
Redefining security leadership for establishing a proactive defense approach.
The importance of using the right defense architecture to protect critical assets.
Dr. Charru Malhotra
Professor (e-Governance and ICT),
Indian Institute of Public Administration
In today's hyper-connected environment, the rapid adoption of APIs exposes organizations to new security risks. As more enterprises use APIs to automate decisions, these systems also introduce potential vulnerabilities. CISOs need to understand the intersection of API security and AI to ensure the protection of sensitive data, user authentication and mission-critical services from breaches. AI-powered security solutions offer dynamic protection and allow organizations to preemptively detect threats. But CISOs must take both AI and API security into consideration to make informed decisions about risk management and compliance.
The session will cover:
How companies can navigate the API governance and risk management landscape.
How security practitioners must use AI-driven solutions for proactive API threat intelligence and response.
Rohit Andani
SE Lead - North & South India,
F5
In today's cybersecurity landscape, enterprises need to focus on offensive security as reliance on security controls alone does not guarantee protection. Regular validation of these controls is necessary to identify vulnerabilities and reduce risk. Sahasrabudhe will discuss the offensive security journey, covering control validation, exposure validation and the future of exposure analytics. CISOs will gain insights on how proactive testing can help strengthen their defenses.
The session will cover:
How to test and assess existing security measures regularly to ensure effectiveness.
The importance of identifying and prioritizing vulnerabilities by simulating real-world attack scenarios.
How enterprises can use data analytics to predict and address emerging threats proactively.
Shailendra Sahasrabudhe
Country Manager – India & UAE,
Cymulate
The rapidly evolving digital landscape has put increased pressure on security leaders to modernize their cybersecurity ecosystem and establish new processes to ensure adaptability, efficiency and enhanced protection.
A major challenge for infosec professionals is identifying key cybersecurity functions that require proactive overhauling. This may encompass various tasks, including simplifying the entire architecture, rewriting proactive defense playbooks, establishing new standards for selecting the right tools, and adopting a centralized, platform-centric approach.
The session will cover:
Effective integration of tools and technologies with a simplified approach.
Continuous innovation and threat management.
How to build a single pane of glass for improved visibility.
Samuel Sathyajith
Senior Vice President - Worldwide Enterprise Sales,
SEQRITE
This break provides delegates with an opportunity to stretch, refresh, and engage in informal conversations. Attendees can use this time to exchange ideas, discuss key takeaways from earlier sessions, and build valuable connections in a relaxed setting before the event continues. Light refreshments will be available to enhance the networking experience.
Operation Code Red - an effective response plan to a cyber incident - is an exercise designed to help organizations build an effective contingency plan. But are CISOs prepared to engage the senior management in implementing a plan that provides emergency response, crisis communication and operational recovery?
The session will explore how an organization can apply the principles of Operation Code Red to ensure preparedness and the ability to restore critical business functions in the event of a cyber incident. The session will also give a walkthrough of how an organization can build a rapid response team to set priorities.
Lt. Gen. Rajesh Pant (retd.)
Former National Cyber Security Coordinator,
National Security Council Secretariat
AVM (Dr) Devesh Vatsa
Advisor Cyber Security and Critical Technologies,
DATA SECURITY COUNCIL OF INDIA (DSCI)
Enterprise security leaders, particularly CISOs, face the challenge of defending against disruptions caused by new-age technologies while assessing their organizations’ risk appetite in responding to cyberattacks. To address the challenge, organizations must establish a strong governance structure by establishing three lines of defenses - disrupt, decode and defend - for managing risks. This involves developing and expanding a common cybersecurity language that clarifies how adversaries should operate.
During the workshop, CISOs will collaborate to create a security framework that defines the roles and responsibilities of various functions in addressing cybersecurity challenges. They will also work together to develop effective strategies across the three lines of defenses - for governance, information security, risk, compliance and audit - and create specific threat models and methodologies to strengthen their defense against attacks.
Shobha Jagathpal
Managing Director and India CISO,
Morgan Stanley
Kavitha Kadambi
CISO,
Infosys Ltd
Sailaja Vadlamudi
Vice President Security & Privacy, ERP Digital Supply Chain,
SAP Labs India
Rajiv Nandwani
Global Information Security Director,
BCG
Sanjeev Singh
Chief Information Security & Data Protection Officer,
Birlasoft
Dr. Yusuf Hashmi
Group CISO,
Jubilant Bhartia Group
Deep Dive - Develop and Deploy:
These sessions will offer a deep dive into various topics focused on the development and deployment of cybersecurity solutions.
Resilient Cybersecurity Strategies in Challenging Times
Identity Onboarding: Overcoming Complexity with Automation
Secure Your Future with AI and APIs: The Way Forward
Future-Proofing Data Privacy: Challenges and Solutions
Enabling IT/OT and IoT Security: Building a Defense Architecture
Embark on an exclusive tour to experience the rich cultural heritage and breathtaking landscapes of Jaisalmer. This guided excursion offers a perfect blend of history, local culture, and relaxation, providing an ideal opportunity to unwind and immerse yourself in the charm of this exotic destination.
Amit Chaudhary from Airtel Business will talk about today’s unpredictable digital landscape, organizations are under immense pressure to build resilient cybersecurity frameworks. With threats like cyber warfare and shifting regulations, businesses must adopt advanced defenses such as zero trust, strong data protection and strategic partnerships to adapt to these new realities.
Read moreJonathan K P from ManageEngine will talk about user onboarding is a critical phase in customer experience, but inefficiencies can impact customer retention and satisfaction. This session will explore the complexities of user onboarding and how the C-suite can leverage automation to streamline processes, enhance user engagement and foster long-term relationships.
Read moreBhavya Upadhyay from F5 will talk about why applications are pivotal in shaping digital interactions, and their full potential can be realized only when they are secure. But, as applications have become essential for online navigation, protecting them has become progressively more complex.
Read moreVishal Salvi from Quick Heal will talk about how data privacy is emerging as a critical concern for businesses, with chief information security officers at the forefront of this challenge. As regulatory frameworks continue to develop and cyberthreats grow increasingly sophisticated, organizations must adopt proactive and forward-thinking strategies to protect sensitive data. This discussion will explore key challenges CISOs face in future-proofing data privacy and innovative solutions to safeguard organizations.
Read moreThreat actors target not only internet-connected devices and applications but also industrial control systems and associated OT infrastructure, which are essential components of critical infrastructure sectors.
Read moreEnjoy a majestic dinner under the stars with the historic Jaisalmer Fort as a backdrop, symbolizing CISO resilience. Display your brand prominently, creating a strong visual association, and engage directly with CISOs in this serene, unforgettable setting to foster deeper relationships and business opportunities.
Demonstrate your brand’s versatility and agility, engaging with CISOs in an exciting and memorable setting.
Start your day with a tranquil sound healing session in the dunes, promoting relaxation and mental clarity, vital for managing cybersecurity challenges. Align your brand with wellness and mental clarity, directly interacting with CISOs in this serene experience.
Engage in an adrenaline-pumping dune bashing experience, reflecting the dynamic and unpredictable landscape of cybersecurity. Highlight your brand during this thrilling activity, aligning with excitement and resilience, and fostering strong connections with CISOs.
Join us at our exclusive engagement for senior thought leaders, where the best minds in the industry discuss pertinent issues that demonstrate their prowess as cybersecurity warriors. Set in an exotic location, this gathering offers a unique experience, where innovation thrives and the future of cybersecurity takes shape.
Exclusive Access
Networking and Collaboration
Innovation and Problem-Solving
Leadership Development
Experiential Learning
Perspective Shift
Inspiring Role Models
Countermeasure Building
For more information on the CISO Engage Offsite event and registration, please contact
apac.contact@ismg-events.com