09.30 – 10.00

Networking & Registration

10.05 – 10.20

Guest of Honor: Cybersecurity outlook of India: Policies and Vision

As a country, we continue to engage in combat to defend our sovereignty, legal authority, and right to privacy against invasive and anonymous dangers that rule the digital space. Cyber-attacks in India, like in other countries, endanger national security by gaining access to sensitive government infrastructure. During this session, we will learn and perceive about the current state of cybersecurity in India, as well as the Indian government’s future vision.


  • Vinit Goenka, Spokesperson -BJP Delhi Pradesh, Member of Programme Committee of Gandhi Smriti and Darshan Samiti, Ministry of Culture, GOI Governing Council Member – Centre for Railway Information System (CRIS), Ministry of Railways, GOI, Chair – Data Sovereignty Committee @ FEAI – Federation of eSports Association of India

10.20 – 10.40

Keynote Address: Threat and Vulnerability – A Secure Framework for Cloud Computing

The expanding number of platforms and technologies that compete with one another and overlap in the cloud native market makes it simple to feel overwhelmed. The distinguished speaker in this session will talk about important trends in cloud adoption and risk. Decisions made strategically and tactically amid sudden cloud expansions that succeeded [or failed].

Indicative Talking Points:
• Security landscape of a cloud native system
• Cloud native storage
• Security and compliance


  • Dr. Padmaja Patwardhan Joshi, Senior Director at Centre for Development of Advanced Computing (C-DAC)

10.45 – 11.20

CXO Leaders Panel: Revamp the enterprise: Cybersecurity & Data Breach Prevention

In the digital age, businesses must remain dynamic and responsive to changes in their environment. To that end, companies are continuously revamping their strategies to respond to new trends and remain competitive.
A company’s enterprise is its foundation; it determines how the business operates internally and externally. An enterprise can be established through formal documents such as bylaws or unincorporated operating agreement, or by informal means such as culture and habits.
An enterprise is not just a set of principles or values that guide business decisions but also a structure of processes, tasks, roles and activities used by an organization to achieve its goals.

Discussion points: –

  • Secure your enterprise with cybersecurity
  • Revamp by integrating AI and ML
  • Update your data infrastructure
  • smart and innovative approach to secure the data



  • Manoj Sarangi, SVP & CISO, NSDL
  • Dilip Panjwani, Principal Director – Chief Information Security Officer (CISO) & IT Controller, Larsen & Toubro Infotech
  • Ashton D’Cruz, Director – Chief-of-Staff, CAO, CGO, CISO & Head – CC&S Governance, NetWest Markets
  • Manoj Nayak, Vice President & Chief Information Security Officer, SBI Life Insurance Company
  • Anurag Nalawade, Director –India, Blancco Technology Group
  • Moderator: Joyce Rodriguez, Partner, Risk Advisory, Deloitte India

11.25 – 12.00

Networking Coffee Break

12.05 – 12.20

Architecting  a  Zero  Loss  Data  strategy  for comprehensive  protection  from cyber threats


  • Arvinderjit Singh Dadhwal, Director – Sales Engineering, India and SAARC, Commvault India

12.25 – 13.00

Tech Leaders Panel: Breakthroughs Technology – Is Artificial Intelligence a Smarter Way to protect the Enterprise Security and Cybersecurity?

Companies today are facing a plethora of cybersecurity concerns, from malware that may instantly bring down a company’s network to data breaches and the subsequent loss of critical data. By helping cybersecurity experts in identifying, preventing, and eliminating threats to data and networks, an increasing number of security-related products are combining AI to support conventional security operations.

Enterprise Security and cybersecurity will keep developing to fend off threats that are getting more sophisticated and could damage a firm even more. By assisting the efforts of cybersecurity experts and filling in the gaps in current IT security policies, AI can help enterprises strengthen their security initiatives.

Discussion points: – 

  • Role of AI (Artificial Intelligence) in Enterprise Security and Cybersecurity
  • Can AI-based proactive system detect the loopholes and areas which may be vulnerable?
  • Is AI capable of differentiating between a regular and malware infected system?
  • Can AI detect phishing sources with its pattern recognition capabilities?
  • Is the introduction of AI in facial and iris recognition systems convenient and pretty robust?


  • Vivek Zakarde, Leader- Data Services, IKS Health
  • Narendra Singh, Vice President – Product & Digital Transformation, HDFC Credila Financial Services Ltd.
  • Najm Bilgrami, Senior Vice President & National Head – Financial Lines, Tata AIG General Insurance Company Limited
  • Bhagwatiprasad Dubey, AVP-Chief Information Security Officer (CISO), Axis Asset Management
  • Moderator: Prasad Godbole, Director, Risk Advisory, Deloitte India

13.05 – 13.20

Securing the Evolving Business Paradigm


  • Rajarshi Bhattacharya, Chairman and Managing Director, Process IT Global

13.25 – 13.40

How to Mitigate Risks of Improper Data sanitization?

Digital data which drives businesses today can also be a liability for organizations. Data becomes a liability when it needs to be protected so that it does not cause harm by being in the wrong hands. Data remanence in case of outdated hardware, infrastructure transitions, and Cloud migrations can pose a serious risk of data leakage. In such situations the fundamental way for data to be protected is by destroying it securely. Your secure erasure process should also have a certified audit trail as an output for compliance management.

In this session, Anurag Nalawade, Director from Blancco India, will share:

  • Why risk of data remanence is very relevant today? and
  • How can today’s technology mitigate this Risk?

Anurag Nalawade, Director –India, Blancco Technology Group

13.45 – 14.35

Networking Lunch

14.35 – 14.55

Building a Foundation for Zero Trust Network Security


  • Manish Gupta, Head Enterprise- India & SAARC & managing Network Applications & Security group, Keysight Technologies India
  • Rahul Loharkar, Sr. Service Engineer, Keysight Technologies India

15.00 – 15.35

Security Leader Panel: The New Epoch of IoT: Cybersecurity becoming front and center

Cybercrime opportunities are increased by the growing Internet of Things (IoT). The term “Internet of Things” refers to actual objects that connect to the internet and exchange data but are not computers, phones, or servers. Traditionally, defense-in-depth strategies have been used to secure IoT. Defense-in-depth is a method for establishing barriers to prevent intrusion across an organisation, employing tools and policies to ensure strong and redundant security across people, technologies, and processes that crosscuts.

Discussion points: –

  • Trends in IoT cybersecurity
  • Protecting the Internet of Things
  • Cybersecurity for IoT
  • Common challenges in IoT security


  • Pawan Chawla, CISO & Data Protection Officer, Future Generali India Life Insurance
  • Khushbu Jain, Advocate Supreme Court and Partner at Ark Legal
  • Nikhil Kajrolkar, Cloud Sales Manager, Acronis
  • Suhas Desai, Senior Vice President (MDR) & Cyber Technology Head (India & APAC), Aujas Cybersecurity
  • Moderator:  Gaurav Khera, Director, Risk Advisory, Deloitte India

15.40 – 15.55

Humble packet has powerful contents

  • Sameer Chaukar, Senior Sales Engineer, Netscout

16.00 – 16.20

Fireside Chat: Cyber Crime in Business: Data Privacy and legal protection


  • Hon. Justice B.N. Srikrishna, Former Judge Supreme Court of India & Chairman of Data Protection Committee
  • Moderator: Sachin Yadav, Partner – Financial Advisory, Deloitte India

16.25 – 16.40

Closing Keynote Address: The need of the hour – Data Security and Protection


  • Brijesh Singh, IPS, Additional Director of Maharashtra Police

16.45 – 17.00

Closing Remarks by ET

*Agenda is work in progress and subject to changes