{"id":1426,"date":"2024-04-04T11:55:18","date_gmt":"2024-04-04T11:55:18","guid":{"rendered":"https:\/\/et-edge.com\/conferences\/supplychain\/demo\/?page_id=1426"},"modified":"2025-10-28T13:17:39","modified_gmt":"2025-10-28T07:47:39","slug":"overview","status":"publish","type":"page","link":"https:\/\/et-edge.com\/conferences\/securitytech\/overview\/","title":{"rendered":"Overview"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"1426\" class=\"elementor elementor-1426\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-16daf02 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"16daf02\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-76739cc\" data-id=\"76739cc\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-df5a0d7 elementor-widget elementor-widget-heading\" data-id=\"df5a0d7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Overview<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-bd4ba06 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no\" data-id=\"bd4ba06\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-2e02075\" data-id=\"2e02075\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7c71133c elementor-widget elementor-widget-text-editor\" data-id=\"7c71133c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The global digital ecosystem stands at an inflection point. As nations, enterprises, and citizens integrate deeper into the digital fabric, cyberattacks have evolved from isolated incidents into weapons of disruption, espionage, and economic warfare.<\/p><p>India &#8211; home to one of the world\u2019s fastest-growing digital economies \u2014 is at the centre of this transformation.<\/p><p>According to the Indian Computer Emergency Response Team (CERT-In), India recorded over 1.1 million cybersecurity incidents in 2024, ranging from data breaches to ransomware and phishing.<\/p><p>Cyberattacks targeting Indian enterprises grew more than 70% year-on-year, driven by increasingly sophisticated adversaries exploiting vulnerabilities in cloud, endpoints, and supply chains.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-d95ef71\" data-id=\"d95ef71\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d98dd8f elementor-widget elementor-widget-spacer\" data-id=\"d98dd8f\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c617b73 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no\" data-id=\"c617b73\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5ba8c90\" data-id=\"5ba8c90\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b69f4e1 elementor-widget elementor-widget-text-editor\" data-id=\"b69f4e1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-teams=\"true\">At the same time, <strong>India\u2019s cybersecurity spending is projected to cross USD 3.4 billion in 2025<\/strong> (Source: Gartner Forecast, March 2025 &#8211; <a id=\"menur3hc\" class=\"fui-Link ___1q1shib f2hkw1w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1s184ao f1mk8lai fnbmjn9 f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn\" title=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2025-03-11-gartner-forecasts-spending-on-information-security-in-india-to-grow-16-percent-in-2025\" href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2025-03-11-gartner-forecasts-spending-on-information-security-in-india-to-grow-16-percent-in-2025\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Link https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2025-03-11-gartner-forecasts-spending-on-informa\u2026\">https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2025-03-11-gartner-forecasts-spending-on-informa\u2026<\/a>), reflecting a strong focus on digital trust and risk management across sectors<\/span><br \/>The need for collaboration, capability, and cyber confidence has never been greater.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Overview The global digital ecosystem stands at an inflection point. As nations, enterprises, and citizens integrate deeper into the digital fabric, cyberattacks have evolved from isolated incidents into weapons of disruption, espionage, and economic warfare. India &#8211; home to one of the world\u2019s fastest-growing digital economies \u2014 is at the centre of this transformation. According to the Indian Computer Emergency Response Team (CERT-In), India recorded over 1.1 million cybersecurity incidents in 2024, ranging from data breaches to ransomware and phishing. Cyberattacks targeting Indian enterprises grew more than 70% year-on-year, driven by increasingly sophisticated adversaries exploiting vulnerabilities in cloud, endpoints, and supply chains. At the same time, India\u2019s cybersecurity spending is projected to cross USD 3.4 billion in 2025 (Source: Gartner Forecast, March 2025 &#8211; https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2025-03-11-gartner-forecasts-spending-on-informa\u2026), reflecting a strong focus on digital trust and risk management across sectorsThe need for collaboration, capability, and cyber confidence has never been greater.<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/other_page.php","meta":{"footnotes":""},"class_list":["post-1426","page","type-page","status-publish","hentry"],"aioseo_notices":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Overview - ET Edge Security Tech Summit 2025<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/et-edge.com\/conferences\/securitytech\/overview\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Overview - ET Edge Security Tech Summit 2025\" \/>\n<meta property=\"og:description\" content=\"Overview The global digital ecosystem stands at an inflection point. As nations, enterprises, and citizens integrate deeper into the digital fabric, cyberattacks have evolved from isolated incidents into weapons of disruption, espionage, and economic warfare. India &#8211; home to one of the world\u2019s fastest-growing digital economies \u2014 is at the centre of this transformation. According to the Indian Computer Emergency Response Team (CERT-In), India recorded over 1.1 million cybersecurity incidents in 2024, ranging from data breaches to ransomware and phishing. Cyberattacks targeting Indian enterprises grew more than 70% year-on-year, driven by increasingly sophisticated adversaries exploiting vulnerabilities in cloud, endpoints, and supply chains. At the same time, India\u2019s cybersecurity spending is projected to cross USD 3.4 billion in 2025 (Source: Gartner Forecast, March 2025 &#8211; https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2025-03-11-gartner-forecasts-spending-on-informa\u2026), reflecting a strong focus on digital trust and risk management across sectorsThe need for collaboration, capability, and cyber confidence has never been greater.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/et-edge.com\/conferences\/securitytech\/overview\/\" \/>\n<meta property=\"og:site_name\" content=\"ET Edge Security Tech Summit 2025\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-28T07:47:39+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/et-edge.com\/conferences\/securitytech\/overview\/\",\"url\":\"https:\/\/et-edge.com\/conferences\/securitytech\/overview\/\",\"name\":\"Overview - ET Edge Security Tech Summit 2025\",\"isPartOf\":{\"@id\":\"https:\/\/et-edge.com\/conferences\/securitytech\/#website\"},\"datePublished\":\"2024-04-04T11:55:18+00:00\",\"dateModified\":\"2025-10-28T07:47:39+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/et-edge.com\/conferences\/securitytech\/overview\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/et-edge.com\/conferences\/securitytech\/overview\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/et-edge.com\/conferences\/securitytech\/overview\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/et-edge.com\/conferences\/securitytech\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Overview\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/et-edge.com\/conferences\/securitytech\/#website\",\"url\":\"https:\/\/et-edge.com\/conferences\/securitytech\/\",\"name\":\"ET Edge Security Tech Summit 2025\",\"description\":\"Digital Defenders: The Cyber Imperative for a Resilient Future\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/et-edge.com\/conferences\/securitytech\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Overview - ET Edge Security Tech Summit 2025","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/et-edge.com\/conferences\/securitytech\/overview\/","og_locale":"en_US","og_type":"article","og_title":"Overview - ET Edge Security Tech Summit 2025","og_description":"Overview The global digital ecosystem stands at an inflection point. As nations, enterprises, and citizens integrate deeper into the digital fabric, cyberattacks have evolved from isolated incidents into weapons of disruption, espionage, and economic warfare. India &#8211; home to one of the world\u2019s fastest-growing digital economies \u2014 is at the centre of this transformation. According to the Indian Computer Emergency Response Team (CERT-In), India recorded over 1.1 million cybersecurity incidents in 2024, ranging from data breaches to ransomware and phishing. Cyberattacks targeting Indian enterprises grew more than 70% year-on-year, driven by increasingly sophisticated adversaries exploiting vulnerabilities in cloud, endpoints, and supply chains. At the same time, India\u2019s cybersecurity spending is projected to cross USD 3.4 billion in 2025 (Source: Gartner Forecast, March 2025 &#8211; https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2025-03-11-gartner-forecasts-spending-on-informa\u2026), reflecting a strong focus on digital trust and risk management across sectorsThe need for collaboration, capability, and cyber confidence has never been greater.","og_url":"https:\/\/et-edge.com\/conferences\/securitytech\/overview\/","og_site_name":"ET Edge Security Tech Summit 2025","article_modified_time":"2025-10-28T07:47:39+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/et-edge.com\/conferences\/securitytech\/overview\/","url":"https:\/\/et-edge.com\/conferences\/securitytech\/overview\/","name":"Overview - ET Edge Security Tech Summit 2025","isPartOf":{"@id":"https:\/\/et-edge.com\/conferences\/securitytech\/#website"},"datePublished":"2024-04-04T11:55:18+00:00","dateModified":"2025-10-28T07:47:39+00:00","breadcrumb":{"@id":"https:\/\/et-edge.com\/conferences\/securitytech\/overview\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/et-edge.com\/conferences\/securitytech\/overview\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/et-edge.com\/conferences\/securitytech\/overview\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/et-edge.com\/conferences\/securitytech\/"},{"@type":"ListItem","position":2,"name":"Overview"}]},{"@type":"WebSite","@id":"https:\/\/et-edge.com\/conferences\/securitytech\/#website","url":"https:\/\/et-edge.com\/conferences\/securitytech\/","name":"ET Edge Security Tech Summit 2025","description":"Digital Defenders: The Cyber Imperative for a Resilient Future","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/et-edge.com\/conferences\/securitytech\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/et-edge.com\/conferences\/securitytech\/wp-json\/wp\/v2\/pages\/1426","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/et-edge.com\/conferences\/securitytech\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/et-edge.com\/conferences\/securitytech\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/et-edge.com\/conferences\/securitytech\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/et-edge.com\/conferences\/securitytech\/wp-json\/wp\/v2\/comments?post=1426"}],"version-history":[{"count":352,"href":"https:\/\/et-edge.com\/conferences\/securitytech\/wp-json\/wp\/v2\/pages\/1426\/revisions"}],"predecessor-version":[{"id":6478,"href":"https:\/\/et-edge.com\/conferences\/securitytech\/wp-json\/wp\/v2\/pages\/1426\/revisions\/6478"}],"wp:attachment":[{"href":"https:\/\/et-edge.com\/conferences\/securitytech\/wp-json\/wp\/v2\/media?parent=1426"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}