<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>ET Edge Security Tech Summit 2025</provider_name><provider_url>https://et-edge.com/conferences/securitytech</provider_url><author_name>sts20cp25</author_name><author_url>https://et-edge.com/conferences/securitytech/author/sts20cp25/</author_url><title>Agenda - ET Edge Security Tech Summit 2025</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="H8GlJ2gjbX"&gt;&lt;a href="https://et-edge.com/conferences/securitytech/agenda/"&gt;Agenda&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://et-edge.com/conferences/securitytech/agenda/embed/#?secret=H8GlJ2gjbX" width="600" height="338" title="&#x201C;Agenda&#x201D; &#x2014; ET Edge Security Tech Summit 2025" data-secret="H8GlJ2gjbX" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://et-edge.com/conferences/securitytech/wp-includes/js/wp-embed.min.js
/* ]]&gt; */
&lt;/script&gt;
</html><description>Agenda 09:00 &#x2013; 10:00Registration and Networking10:00 &#x2013; 10:10Context Setting &#x2013; ET Edge10:10 &#x2013; 10:30Inaugural Keynote &#x2013; The Cyber Imperative: Risk, Resilience, and the Road Ahead In today&#x2019;s hyperconnected world, cybersecurity is no longer a technical concern &#x2014; it is a strategic business imperative that impacts growth, reputation, and shareholder value. From AI-driven operations to cloud-native ecosystems, enterprises face unprecedented risks that can disrupt business continuity overnight. This inaugural session sets the stage for the summit by exploring how organizations can anticipate threats, embed resilience, and convert risk into opportunity. Thought leaders will share insights on aligning cybersecurity with corporate strategy, creating board-level accountability, and leveraging risk management as a driver of trust and competitive advantage. 10:30 &#x2013; 10:45Customer Success Story &#x2013; Reserved for Title Partner10:45 &#x2013; 11:15Boardroom Breach: When Cyber Risk Becomes a Business Crisis (CEOs/MDs/Founders) Cybersecurity is no longer just an IT concern &#x2014; it&#x2019;s a strategic business issue that can impact growth, reputation, and shareholder value. In today&#x2019;s digital economy, breaches and data disruptions can halt operations, erode trust, and trigger financial loss overnight. This panel explores insights in to cyber risk as a core element of corporate strategy, integrate resilience into decision-making, and convert security investments into long-term business value. Leaders will explore frameworks for board-level accountability, risk quantification, and aligning cybersecurity with overall organizational objectives. Key Discussion Areas: Reframing cyber as a strategic business risk, not a technical issue Elevating executive literacy: Making informed, board-level decisions on security Metrics and models to quantify cyber risk in financial and operational terms Turning cybersecurity initiatives into tangible business value and competitive advantage 11:15 &#x2013; 11:40Networking over Coffee and Refreshments at the CyberTech Experience Zone11:40 &#x2013; 12:00Trilogue &#x2013; Strategic Sentinels: The Rise of CISO 2.0 The role of the CISO is evolving from defender to strategic architect of resilience. Beyond firewalls and endpoint protection, today&#x2019;s CISO must align cybersecurity with business goals, manage cross-functional risk, and anticipate emerging threats in AI, cloud, and critical infrastructure. This panel explores how CISOs can balance tactical defence with strategic foresight, shaping security as a core driver of competitive advantage. Key Discussion Areas: Reimagining the CISO as a business leader Integrating cyber strategy into corporate strategy Metrics and KPIs that drive board-level impact Leading cybersecurity innovation across enterprise ecosystems 12:10 &#x2013; 12:25Customer Success Story &#x2013; Reserved for Co-Powered by Partner12:25 &#x2013; 12:55Power Panel &#x2013; Fractured Trust: The Fragility of Digital Identities In the digital economy, identity is the new perimeter &#x2014; and it&#x2019;s under siege. From deepfake impersonations to credential theft at scale, traditional IAM systems are cracking under pressure. This conversation decodes the new era of identity warfare, the economics of trust, and what it takes to protect people and machines in a borderless, connected ecosystem. Key Areas: Identity fraud and AI-powered impersonation Zero Trust evolution: Beyond the buzzword Privacy vs usability: finding balance Securing digital twins and machine identities 12:55 &#x2013; 13:10Customer Success Story &#x2013; Reserved for Co-Powered by/Platinum Partner13:10 &#x2013; 14:00Networking Luncheon at the CyberTech Experience Zone14:00 &#x2013; 14:30The Grand Cyber Heist: Race for the Bounty Step into the mind of a hacker and the shoes of a cyber defender in this high-octane, interactive challenge. Participants will be divided into teams and tasked with unlocking a secure briefcase containing a &#x201C;bounty&#x201D; reward. Using tablets provided, teams will solve codebreakers, encryption puzzles, and cybersecurity challenges, testing their logic, teamwork, and digital intuition. This session not only immerses participants in real-world cyber problem-solving but also highlights the importance of strategic thinking, rapid decision-making, and collaborative defence in a fun, competitive format. 14:30 &#x2013; 14:45Customer Success Story &#x2013; Reserved for Platinum Partner14:45 &#x2013; 15:00Fire Side Chat &#x2013; Quantum Quandary: When Today&#x2019;s Encryption Meets Tomorrow&#x2019;s Computing Quantum computing promises a revolution &#x2014; but also a reckoning. The encryption protecting our financial systems, healthcare records, and national secrets may become obsolete overnight. This discussion decodes the quantum threat landscape and outlines how organizations can start futureproofing their data now for a post-quantum world. Key Areas: Understanding the &#x201C;Q-Day&#x201D; scenario Quantum-safe cryptography and readiness roadmaps Regulatory and compliance blind spots Timing the transition: too early or too late? 15:00 &#x2013; 15:15Customer Success Story &#x2013; Reserved for Gold Partner15:15 &#x2013; 15:45The Privacy Panel: India&#x2019;s DPDPA and the New Data Doctrine India&#x2019;s Digital Personal Data Protection Act (DPDPA) signals a tectonic shift in how businesses collect, process, and protect personal information &#x2014; transforming privacy from a compliance checklist to a cornerstone of corporate trust. As enterprises recalibrate their governance, consent, and accountability frameworks, this panel explores the strategic and cultural dimensions of data protection. Beyond legal adherence, the discussion focuses on how DPDPA can become an engine for innovation, ethical AI, and digital inclusion in the world&#x2019;s fastest-growing data economy. Key Areas: Privacy as a growth enabler: From compliance to competitiveness Reimagining governance and accountability under DPDPA Cross-border data, localization, and digital trade implicationsBuilding data ethics and user trust in an AI-driven economy 15:45 &#x2013; 16:00Networking Coffee and Refreshments at the CyberTech Experience Zone16:00 &#x2013; 16:15Guest of Honour &#x2013; Cybersecurity as National and Corporate Imperative: Leading in a Connected Era Cyber threats today transcend borders, industries, and technologies. This keynote will address how governments, regulators, and enterprises must collaborate to secure digital economies, protect citizens, and enable innovation. The speech can touch upon policy, regulatory foresight, global cyber trends, and the role of leadership in creating resilient and trusted digital ecosystems 16:15 &#x2013; 16:40Chief Guest Address &#x2013; Securing a Digital Nation: The Strategic Imperative of Cyber Resilience In an era where every sector &#x2014; government, business, and society &#x2014; depends on digital infrastructure, cybersecurity is no longer optional; it is a national and societal imperative. This keynote explores the strategic, regulatory, and collaborative measures needed to protect critical infrastructure, safeguard citizens&#x2019; data, and foster trust in the digital economy. This session will highlight how governments, enterprises, and civil society can work together to build a resilient, secure, and innovative digital ecosystem, ensuring that progress and protection advance hand in hand. 16:40 &#x2013; 17:00Awards In an era where</description></oembed>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/


Served from: et-edge.com @ 2026-04-25 23:52:32 by W3 Total Cache
-->