IT Security Technologies, Policies and Compliance

Watch CLOUDSEC 2017 Highlights
Mumbai
JW Marriott Mumbai Sahar
13th September
Wednesday
20+ Speakers
Best experience speakers
600 Seats
Available Only

Hurry up, secure your seat

About Event

In the face of next-tier threats,
businesses must step up their game and LEVEL UP

Enterprises and organizations are facing next-tier, multifaceted threats that are both familiar and uncharted. As the cloud and the Internet of Things (IoT) ecosystem become more interconnected, it is essential for organizations to reevaluate and redefine their understanding of threats, risks, and solutions in an ever-changing landscape.
With that, organizations and enterprises must ask: what threats should they prepare for? What risks are involved? What processes and procedures should be implemented? In the face of next-tier threats, businesses must step up their game and LEVEL UP.

Event Schedule


8:00 - 9:00

Registration
Arrival Coffee & Tea


9:00 - 9:30

Trend Micro Address: Welcome to CLOUDSEC 2017 - Inspiring Your Digital Transformation Download Presentation Slides
Dhanya Thakkar, Managing Director – APAC | Trend Micro

The CIO role is changing. Sure, it’s still important to keep the lights on but increasingly the CIO is being tasked with driving change. No longer relegated to a peripheral role, the CIO is being called on to inspire change from the centre.
- We have the technology. But who cares? How will you create the necessary energy and inspiration for change?
- How will you help balance innovation with business as usual?
- What will you need to lead necessary change and transformation?

It has never been a better time or a more challenging time to be a CIO. So many of the rising technology opportunities, like digital transformation, machine learning, artificial intelligence, IOT, and cloud offer the chance for CIOs to be in the middle of the discussion around topics of significant value to the enterprise. At the same time risks associated with security are also at the top of the agendas of many boards. Again, the CIO is one of the key drivers of risk mitigation, playing both offense and Defense. In this session Dhanya will discuss how finding faster paths to seizing opportunity and mitigating risks requires a better ecosystem. With that, organisations and enterprises must ask: what threats should they prepare for? What risks are involved? What processes and procedures should be implemented?



9:30 - 10:00

LEVEL UP: Play to Win Download Presentation Slides
Bill McGee, SVP, Hybrid Cloud Security | Trend Micro

For organizations, having a competitive advantage and providing customer delight is, like an online game, a quest that's already being played in the cloud. As devices become smarter and more connected, and as user habits now dictate that faster is better, enterprises must go through their respective hero's journey to harness and master the "super powers" cloud computing can provide them. It is important, therefore, for these organizations to LEVEL UP and "win" in order to reap the rewards. This thematic keynote presentation will provide insights on the latest and upcoming trends in cloud computing, which may challenge current information security mindset and practices. It will also provide recommendations on how businesses can leverage the aforementioned cloud computing trends without compromising the security of their networks and infrastructure.



10:00 - 10:30

Cyber Security and Cooperation with Industry
Dr. Gulshan Rai, Head of Cyber Security


10:30 - 11:00

Keynote 4: Ransomware
Vishal Salvi, Chief Information Security Officer | Infosys

After becoming one of the main cyber security threats in 2016 and recently causing an international turmoil in May 2017, ransomware is keeping everyone on their toes regarding the protection of their critical data and computer systems. As infection approaches diversify and traditional antivirus protection is surpassed, companies need to treat data protection proactively, getting the right solutions and processes in place to prepare for the inevitable attack.
- Discover the benefits of extending Availability to the cloud
- How to efficiently recover from an attack.



11:00 - 11:30

Break & Exhibition Stage


11:30 - 12:00

Keynote 5: Creating Holistic Cyber Security Strategies Download Presentation Slides
Simon Piff, Vice President of Security Practice | IDC

The world of IT security is moving rapidly as a wealth of new technologies such as artificial intelligence, machine learning and deep analytics, to name a few, enter the markets and help to improve defenses of organizations. But even as these innovations vastly improve the technology, there still exist organizational challenges that remain as hurdles to the successful delivery of a robust IT security strategy. In this session IDC will touch on the future of IT security technologies and focus on the structural changes organizations need to make to ensure that this depth of innovation can be best leveraged to create a holistic and robust enterprise security strategy to better equip the frontlines of this cyber war that all organizations are now faced with.



12:00 - 12:30

Keynote Panel Discussion: Turning security into competitive advantage in the era of Fast-IT
Panelists:
Bill McGee, SVP, Hybrid Cloud Security | Trend Micro
Simon Piff, Vice President of Security Practice | IDC
Jayantha Prabhu, Chief Information Officer | Essar Group
Sunil Varkey, Vice President & CISO | Wipro Technologies
Christophe Durand, Police Senior Superintendent | Interpol Global Complex for innovation (IGCI)
Moderated by Vijay Ramachandran


12:30 - 13:30

Lunch & Exhibition Stage

13:30 - 14:00

Keeping a Billion Cloud Users Secure
Rohit Gupta, Solutions Engineer | Google Cloud Platform

Google secures and protects the data and information for over a billion users across a number of its business units and offerings. With some of the largest global networks and systems, protecting our customers data (both business and consumer) requires leading-edge and scalable approaches to security that are both efficient and effective.

Security is embedded in everything that Google does with significant investments made to drive execution as well as through programs such as Project Zero for security research, Project Shield for DDoS mitigation, while taking a new approach to Enterprise Security with BeyondCorp.

Google continues to invest in testing systems for security weaknesses such as finding the first SHA-1 collision and the SSL 3.0 POODLE vulnerability, and openly promotes a Vulnerability Reward Program (paying $3 million in 2016 alone to individuals who have contributed to protect global systems).

Join this session to gain an insight into Google's approach to security, best practice in design and take the opportunity to understand how you can engage with Google to drive security in your organization.



14:00 - 14:30

Living on the Edge Download Presentation Slides
Myla Pilao, Director of TrendLabs Research | Trend Micro

The continuing evolution of technology has changed the way people live their lives. Home automation has become a norm the past couple of years with the ever-rising market of connected devices such as smartphones, TVs, and even smart fridges. You can now automate many of the functions in your house and control them from your smart device from almost anywhere. And as more workplaces and communities become more automated as well, the world appears to become smarter, better and more convenient for everyone.

Smart devices, smart transports systems, smart environments. However, it’s still very far from being a paradise.

Like any other device connected to the internet, smart environments can be vulnerable to cyberattacks that can risk people’s privacy, and even their safety. How many people you know have actually installed anti-virus software into their fridge or TV?

While much has been discussed about the security of systems and networks, talks regarding the security of smart environments seems like it’s just an afterthought.



14:30 - 15:00

Trust & Assurance, in the digital world Download Presentation Slides
Sunil Varkey, Vice President & CISO | Wipro Technologies


15:00 - 15:30

Break & Exhibition Stage


15:30 - 16:00

Visibility into SSL Traffic Is Key to Securing Your Data Download Presentation Slides
Yaron Azerual, Product Marketing Manager, ADC products and services | Radware

Rising amounts of encrypted traffic are hampering the ability of IT security teams to protect customer data and intellectual property. Traditional security gateways, network firewalls, and intrusion prevention systems are increasingly running blind to SSL/TLS traffic. The growth in SSL encryption presents a challenge for enterprises, because without security tools to inspect SSL traffic, encrypted attacks go undetected and expose your data to breaches. With Elliptic Curve Cryptography (ECC) becoming the leading standard in SSL communication, your datacentre needs to take immediate action to the new SSL standards and detect encrypted cyber-attacks that try to hide under the new ECC encryption protocol.

In this session we will review the latest trends and SSL technology evolution, how they affect your datacentre and ways to handle the challenges it presents.



16:00 - 16:30

Next-generation Security Download Presentation Slides
Mayur Danait, CIO | Lupin Ltd.


16:30 - 17:00

Closing Keynote: Evolving Era of Cloud
Panelists:
Nilesh Jain, Country Manager - (India and SAARC) | Trend Micro
Mohit Pande, Country Manager - India | Google Cloud
Arun Kumar Parameswaran, Managing Director | VMware India
Moderated by Vijay Ramachandran


17:00

Awards & Lucky Draw

13:30 - 14:00

Securing Applications Across Clouds Download Presentation Slides
Vinod Sivaramakrishnan, Business Manager – Network Virtualization and Security | VMWare

With Public Cloud and Managed Hosting Services playing a key part in IT Transformation projects we end up creating silos of Clouds which need to be managed individually from security and access perspective. VMware is leading the way in providing a unified experience in managing security and access across private, public and hosted clouds.

In this session you will get a preview of how:
- Network and Security policies can be extended across Private and public clouds
- Application integrity can be maintained and threat response can be automated across Private and Public Clouds
- Gain visibility into network traffic, security policy and compliance across Private and Public Clouds
- Monitor Application performance and Underlying Infrastructure in real time across Clouds
- Analyze workload usage and utilization across Clouds
- Get cost visibility for delivering IT across Clouds



14:00 - 14:30

Who did it? How an enhanced attribution process could help in mitigating the cyber risk
Christophe Durand, Police Senior Superintendent | Interpol Global Complex for innovation (IGCI)

As the world’s largest law enforcement organization, the International Criminal Police Organization, aka INTERPOL, is assisting its 190 member countries to enhance their cyber capabilities. Knowing that law enforcement agencies only hold part of the solution to tackle cybercrime, a comprehensive strategy is required to find synergies. From operation coordination, to training, passing by research, it is therefore crucial to build a strong relationship between actors from diverse horizons. A mutual understanding and a fair comprehension of each other limits are required to collectively mitigating the digital risk.



14:30 - 15:00

Dynamic environments require dynamic security Download Presentation Slides
Sharda Tickoo, Head - Technical | Trend Micro

As you take advantage of the operational and economic benefits of virtualization and the cloud, it’s critical to secure your virtualized data centers, cloud deployments, and hybrid environments effectively. If you neglect any aspect of security, you leave gaps that open the door to web threats and serious data breaches. To meet data privacy and compliance regulations, you will need to demonstrate that you have the appropriate security, regardless of your computing environment. In this session, Shraddha will talk about challenges that enterprises face while trying to secure modern day dynamic datacenters and will highlight the optimized security framework that is needed to keep hybrid cloud environments safe without compromising on performance, speed and agility.



15:00 - 15:30

Break & Exhibition Stage


15:30 - 16:00

The Cloud Re-writes the Rules Download Presentation Slides
Vishal Gupta, System Engineer | Veeam India and SAARC

Veeam recognises the new challenge companies across the globe face in enabling the Always-On Enterprise™, a business that must operate 24/7/365. Veeam defines DRaaS, by offering it as part of it’s comprehensive availability strategy, providing a consistent user experience and reducing overall cost to protect your data (backup + replication + cloud). Disaster Recovery-as-a-Service is opportunity to sell cloud services to new and existing customers. Veeam Cloud Connect Replication for Service Providers makes DRaaS easy, profitable and practical for any customer environment. Veeam has pioneered a new market of Availability for the Always-On Enterprise by helping organisations meet recovery time and point objectives (RTPO) of less than 15 minutes for all applications and data, through a fundamentally new kind of solution that delivers high-speed recovery, data loss avoidance, verified recoverability, leveraged data and complete visibility.



16:00 - 16:30

Securing the Enterprise from Unknown – The behavior Way Download Presentation Slides
Mr. Rajiv Chandra, Chief General Manager-Information Systems (Technical – Infrastructure & Security) | Hindustan Petroleum Corporation Ltd. (HPCL)


16:30 - 17:00

Closing Keynote: Evolving Era of Cloud
Panelists:
Nilesh Jain, Country Manager - (India and SAARC) | Trend Micro
Mohit Pande, Country Manager - India | Google Cloud
Arun Kumar Parameswaran, Managing Director | VMware India
Moderated by Vijay Ramachandran


17:00

Awards & Lucky Draw

13:00 - 14:00

Session 1


14:00 - 15:00

Session 2


15:00 - 16:00

Session 3


16:00 - 17:00

Session 4

IT Security Technologies, Policies and Compliance


REGISTER NOW

Event Speakers

Simon Piff

Vice President of Security Practice | IDC

Simon Piff is the Vice President of IDC Asia/Pacific's IT Security Practice Business. He focuses on the needs of the chief security officer in an environment that encompasses cloud computing, the Internet of Things, and a continued and persistent attack from cybercriminals. Much has changed in this area since 1994, when Simon installed his first firewall, and the collision of Big Data with security, the move to a defense in-depth strategy, and the issues of insufficient numbers of well-trained staff make this a challenging area for businesses today.

Simon started his Asia/Pacific regional experience in 1989; since then, he has served in various sales, marketing management, and consulting roles for IT hardware, software, services, and online businesses. Having previously covered the storage system and then datacenter markets for IDC Asia/Pacific, Simon's career background and IDC experience put him in the ideal position to deliver valuable insights to both technology buyers and providers. Prior to joining IDC, Simon worked at Microsoft Asia/Pacific, defining the company's business intelligence, data warehousing, and data management go-to-market strategies for the region. He also worked at Digital Equipment Corporation to develop its IT security, Internet, ecommerce, and service provider business as well as with a medical dot-com in various business development and management roles.

Simon Piff
Vice President of Security Practice | IDC
Myla Pilao
Director of TrendLabs Research | Trend Micro
Dhanya Thakkar
Vice President, APAC | Trend Micro
Bill McGee
SVP, Hybrid Cloud Security | Trend Micro
Vijay Ramachandran
Moderator
Vishal Salvi
Chief Information Security Officer | Infosys
Jayantha Prabhu
Chief Information Officer | Essar Group
Sunil Varkey
Vice President & CISO | Wipro Technologies
Arun Kumar Parameswaran
Managing Director | VMware India
Mohit Pande
Country Manager-India | Google Cloud
Nilesh Jain
Country Manager - (India and SAARC) | Trend Micro
Christophe Durand
Police Senior Superintendent | Interpol Global Complex for innovation (IGCI)
Dr. Gulshan Rai
National Cyber Security Coordinator (Ex-Officio Secretary) | Government of India
Mayur Danait
CIO | Lupin

What our attendees say

Sponsors

Hosted by:
Platinum sponsors:
Gold sponsors:
Exhibitors:
Supporting Organisations:
Media Partners:


Mumbai
JW Marriott Mumbai Sahar


Contact us


13th September
Wednesday