{"version":"1.0","provider_name":"ET Edge Security Tech Summit 2025","provider_url":"https:\/\/et-edge.com\/conferences\/securitytech","author_name":"sts20cp25","author_url":"https:\/\/et-edge.com\/conferences\/securitytech\/author\/sts20cp25\/","title":"Overview - ET Edge Security Tech Summit 2025","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"UvGeQfuGJT\"><a href=\"https:\/\/et-edge.com\/conferences\/securitytech\/overview\/\">Overview<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/et-edge.com\/conferences\/securitytech\/overview\/embed\/#?secret=UvGeQfuGJT\" width=\"600\" height=\"338\" title=\"&#8220;Overview&#8221; &#8212; ET Edge Security Tech Summit 2025\" data-secret=\"UvGeQfuGJT\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/et-edge.com\/conferences\/securitytech\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"Overview The global digital ecosystem stands at an inflection point. As nations, enterprises, and citizens integrate deeper into the digital fabric, cyberattacks have evolved from isolated incidents into weapons of disruption, espionage, and economic warfare. India &#8211; home to one of the world\u2019s fastest-growing digital economies \u2014 is at the centre of this transformation. According to the Indian Computer Emergency Response Team (CERT-In), India recorded over 1.1 million cybersecurity incidents in 2024, ranging from data breaches to ransomware and phishing. Cyberattacks targeting Indian enterprises grew more than 70% year-on-year, driven by increasingly sophisticated adversaries exploiting vulnerabilities in cloud, endpoints, and supply chains. At the same time, India\u2019s cybersecurity spending is projected to cross USD 3.4 billion in 2025 (Source: Gartner Forecast, March 2025 &#8211; https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2025-03-11-gartner-forecasts-spending-on-informa\u2026), reflecting a strong focus on digital trust and risk management across sectorsThe need for collaboration, capability, and cyber confidence has never been greater."}