{"id":2102,"date":"2024-04-09T03:51:45","date_gmt":"2024-04-09T03:51:45","guid":{"rendered":"https:\/\/et-edge.com\/conferences\/supplychain\/demo\/?page_id=2102"},"modified":"2025-11-07T15:19:01","modified_gmt":"2025-11-07T09:49:01","slug":"speakers-2025","status":"publish","type":"page","link":"https:\/\/et-edge.com\/conferences\/securitytech\/speakers-2025\/","title":{"rendered":"Speakers"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"2102\" class=\"elementor elementor-2102\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-fe1ae1b elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"fe1ae1b\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b52fa54\" data-id=\"b52fa54\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-219e00d elementor-widget elementor-widget-heading\" data-id=\"219e00d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Speakers<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cdfc7d6 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"cdfc7d6\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6964be9\" data-id=\"6964be9\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-62e8efd elementor-widget elementor-widget-shortcode\" data-id=\"62e8efd\" data-element_type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\"><div class='rt-container-fluid rt-team-container rt-pos-r rt-team-container-4300 first-speakers rt-grayscale' id='rt-team-container-2040319968'  data-layout='layout1' data-desktop-col='4'  data-tab-col='2'  data-mobile-col='1' data-sc-id='4300' data-popup-bg=''><div data-title='Loading ...' class='rt-row rt-content-loader layout1 ttp-even ttp-pre-loader'><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12  even-grid-item rt-grid-item\" data-id=\"5751\"><div class=\"single-team-area\"><div class=\"single-team\"><figure><a class=\"\" data-id=\"5751\" target=\"_self\" href=\"https:\/\/et-edge.com\/conferences\/securitytech\/team\/abhijit-chakravarty\/\"><img fetchpriority=\"high\" decoding=\"async\" width=\"400\" height=\"400\" src=\"https:\/\/et-edge.com\/conferences\/securitytech\/wp-content\/uploads\/2025\/03\/Abhijit-removebg-preview.png\" class=\"img-responsive rt-team-img\" alt=\"Abhijit Chakravarty\" \/><\/a><\/figure><\/div><div class=\"tlp-content\"><h3><span class=\"team-name\"><a class=\"\" data-id=\"5751\" target=\"_self\" title=\"Abhijit Chakravarty\" href=\"https:\/\/et-edge.com\/conferences\/securitytech\/team\/abhijit-chakravarty\/\">Abhijit Chakravarty<\/a><\/span><\/h3><\/div><div class=\"short-bio\"><p>Executive Vice President - Networks &amp; Cyber Security, Kotak Mahindra Bank<\/p>\n<\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12  even-grid-item rt-grid-item\" data-id=\"5742\"><div class=\"single-team-area\"><div class=\"single-team\"><figure><a class=\"\" data-id=\"5742\" target=\"_self\" href=\"https:\/\/et-edge.com\/conferences\/securitytech\/team\/advocate-puneet-bhasin\/\"><img decoding=\"async\" width=\"400\" height=\"400\" src=\"https:\/\/et-edge.com\/conferences\/securitytech\/wp-content\/uploads\/2025\/03\/Advocate-Puneet-Bhasin.png\" class=\"img-responsive rt-team-img\" alt=\"Advocate Puneet Bhasin\" \/><\/a><\/figure><\/div><div class=\"tlp-content\"><h3><span class=\"team-name\"><a class=\"\" data-id=\"5742\" target=\"_self\" title=\"Advocate Puneet Bhasin\" href=\"https:\/\/et-edge.com\/conferences\/securitytech\/team\/advocate-puneet-bhasin\/\">Advocate Puneet Bhasin<\/a><\/span><\/h3><\/div><div class=\"short-bio\"><p>Cyber Law Expert, Founder of Cyberjure Legal Consulting and Honorary Advisor to United Nations Digital Public Goods Privacy Standard<\/p>\n<\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12  even-grid-item rt-grid-item\" data-id=\"5661\"><div class=\"single-team-area\"><div class=\"single-team\"><figure><a class=\"\" data-id=\"5661\" target=\"_self\" href=\"https:\/\/et-edge.com\/conferences\/securitytech\/team\/col-francel-margareth-padilla\/\"><img decoding=\"async\" width=\"400\" height=\"400\" src=\"https:\/\/et-edge.com\/conferences\/securitytech\/wp-content\/uploads\/2025\/03\/Francel-Margareth-Padilla-removebg-preview.png\" class=\"img-responsive rt-team-img\" alt=\"Col. Francel Margareth Padilla\" \/><\/a><\/figure><\/div><div class=\"tlp-content\"><h3><span class=\"team-name\"><a class=\"\" data-id=\"5661\" target=\"_self\" title=\"Col. Francel Margareth Padilla\" href=\"https:\/\/et-edge.com\/conferences\/securitytech\/team\/col-francel-margareth-padilla\/\">Col. Francel Margareth Padilla<\/a><\/span><\/h3><\/div><div class=\"short-bio\"><p>Top 30 Women in Security ASEAN, Top 10 Women in Cybersecurity Philippines, Spokesperson, Armed Forces of the Philippines<\/p>\n<\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12  even-grid-item rt-grid-item\" data-id=\"5745\"><div class=\"single-team-area\"><div class=\"single-team\"><figure><a class=\"\" data-id=\"5745\" target=\"_self\" href=\"https:\/\/et-edge.com\/conferences\/securitytech\/team\/dinesh-kamble\/\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"400\" src=\"https:\/\/et-edge.com\/conferences\/securitytech\/wp-content\/uploads\/2025\/03\/Dinesh-Kamble-RBL-Bank-_1_-removebg-preview.png\" class=\"img-responsive rt-team-img\" alt=\"Dinesh Kamble\" \/><\/a><\/figure><\/div><div class=\"tlp-content\"><h3><span class=\"team-name\"><a class=\"\" data-id=\"5745\" target=\"_self\" title=\"Dinesh Kamble\" href=\"https:\/\/et-edge.com\/conferences\/securitytech\/team\/dinesh-kamble\/\">Dinesh Kamble<\/a><\/span><\/h3><\/div><div class=\"short-bio\"><p>Chief Information Security Officer (CISO), RBL Bank<\/p>\n<\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12  even-grid-item rt-grid-item\" data-id=\"5696\"><div class=\"single-team-area\"><div class=\"single-team\"><figure><a class=\"\" data-id=\"5696\" target=\"_self\" href=\"https:\/\/et-edge.com\/conferences\/securitytech\/team\/divan-raimagia\/\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"400\" src=\"https:\/\/et-edge.com\/conferences\/securitytech\/wp-content\/uploads\/2025\/03\/Divan-Raimagia-removebg-preview.png\" class=\"img-responsive rt-team-img\" alt=\"Divan Raimagia\" \/><\/a><\/figure><\/div><div class=\"tlp-content\"><h3><span class=\"team-name\"><a class=\"\" data-id=\"5696\" target=\"_self\" title=\"Divan Raimagia\" href=\"https:\/\/et-edge.com\/conferences\/securitytech\/team\/divan-raimagia\/\">Divan Raimagia<\/a><\/span><\/h3><\/div><div class=\"short-bio\"><p>CISO - Head of Cyber Security, Adani Green Energy Ltd<\/p>\n<\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12  even-grid-item rt-grid-item\" data-id=\"5781\"><div class=\"single-team-area\"><div class=\"single-team\"><figure><a class=\"\" data-id=\"5781\" target=\"_self\" href=\"https:\/\/et-edge.com\/conferences\/securitytech\/team\/dr-bijender-mishra\/\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"400\" src=\"https:\/\/et-edge.com\/conferences\/securitytech\/wp-content\/uploads\/2025\/03\/DrBijender-Mishra-removebg-preview.png\" class=\"img-responsive rt-team-img\" alt=\"Dr. Bijender Mishra\" \/><\/a><\/figure><\/div><div class=\"tlp-content\"><h3><span class=\"team-name\"><a class=\"\" data-id=\"5781\" target=\"_self\" title=\"Dr. Bijender Mishra\" href=\"https:\/\/et-edge.com\/conferences\/securitytech\/team\/dr-bijender-mishra\/\">Dr. Bijender Mishra<\/a><\/span><\/h3><\/div><div class=\"short-bio\"><p>Chief Information Security Officer (CISO), Alkem Laboratories Ltd.<\/p>\n<\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12  even-grid-item rt-grid-item\" data-id=\"5747\"><div class=\"single-team-area\"><div class=\"single-team\"><figure><a class=\"\" data-id=\"5747\" target=\"_self\" href=\"https:\/\/et-edge.com\/conferences\/securitytech\/team\/dr-pawan-chawla\/\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"400\" src=\"https:\/\/et-edge.com\/conferences\/securitytech\/wp-content\/uploads\/2025\/03\/Dr.-Pawan-Chawla-removebg-preview.png\" class=\"img-responsive rt-team-img\" alt=\"Dr. Pawan Chawla\" \/><\/a><\/figure><\/div><div class=\"tlp-content\"><h3><span class=\"team-name\"><a class=\"\" data-id=\"5747\" target=\"_self\" title=\"Dr. Pawan Chawla\" href=\"https:\/\/et-edge.com\/conferences\/securitytech\/team\/dr-pawan-chawla\/\">Dr. Pawan Chawla<\/a><\/span><\/h3><\/div><div class=\"short-bio\"><p>Senior Vice President, Chief Information Security Officer and Data Privacy and Protection Officer, Tata AIA Life Insurance Company Ltd.<\/p>\n<\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12  even-grid-item rt-grid-item\" data-id=\"5755\"><div class=\"single-team-area\"><div class=\"single-team\"><figure><a class=\"\" data-id=\"5755\" target=\"_self\" href=\"https:\/\/et-edge.com\/conferences\/securitytech\/team\/dr-rakshit-tandon\/\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"400\" src=\"https:\/\/et-edge.com\/conferences\/securitytech\/wp-content\/uploads\/2025\/03\/Dr.-Rakshit-Tandon-removebg-preview.png\" class=\"img-responsive rt-team-img\" alt=\"Dr. Rakshit Tandon\" \/><\/a><\/figure><\/div><div class=\"tlp-content\"><h3><span class=\"team-name\"><a class=\"\" data-id=\"5755\" target=\"_self\" title=\"Dr. Rakshit Tandon\" href=\"https:\/\/et-edge.com\/conferences\/securitytech\/team\/dr-rakshit-tandon\/\">Dr. Rakshit Tandon<\/a><\/span><\/h3><\/div><div class=\"short-bio\"><p>Cyber Security Evangelist &amp; National Cyber Security Expert<\/p>\n<\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12  even-grid-item rt-grid-item\" data-id=\"6583\"><div class=\"single-team-area\"><div class=\"single-team\"><figure><a class=\"\" data-id=\"6583\" target=\"_self\" href=\"https:\/\/et-edge.com\/conferences\/securitytech\/team\/durga-prasad-dube\/\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"400\" src=\"https:\/\/et-edge.com\/conferences\/securitytech\/wp-content\/uploads\/2025\/11\/Durga-Prasad-Dube-Picture-_1_-removebg-preview.png\" class=\"img-responsive rt-team-img\" alt=\"Durga Prasad Dube\" \/><\/a><\/figure><\/div><div class=\"tlp-content\"><h3><span class=\"team-name\"><a class=\"\" data-id=\"6583\" target=\"_self\" title=\"Durga Prasad Dube\" href=\"https:\/\/et-edge.com\/conferences\/securitytech\/team\/durga-prasad-dube\/\">Durga Prasad Dube<\/a><\/span><\/h3><\/div><div class=\"short-bio\"><p> Global Chief Information Security Officer (CISO), Reliance Industries Limited<\/p>\n<\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12  even-grid-item rt-grid-item\" data-id=\"5655\"><div class=\"single-team-area\"><div class=\"single-team\"><figure><a class=\"\" data-id=\"5655\" target=\"_self\" href=\"https:\/\/et-edge.com\/conferences\/securitytech\/team\/jagannath-pv\/\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"400\" src=\"https:\/\/et-edge.com\/conferences\/securitytech\/wp-content\/uploads\/2025\/03\/Jagannath-PV-removebg-preview.png\" class=\"img-responsive rt-team-img\" alt=\"Jagannath PV\" \/><\/a><\/figure><\/div><div class=\"tlp-content\"><h3><span class=\"team-name\"><a class=\"\" data-id=\"5655\" target=\"_self\" title=\"Jagannath PV\" href=\"https:\/\/et-edge.com\/conferences\/securitytech\/team\/jagannath-pv\/\">Jagannath PV<\/a><\/span><\/h3><\/div><div class=\"short-bio\"><p>Global Data Privacy Officer, LTI Mindtree<\/p>\n<\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12  even-grid-item rt-grid-item\" data-id=\"5759\"><div class=\"single-team-area\"><div class=\"single-team\"><figure><a class=\"\" data-id=\"5759\" target=\"_self\" href=\"https:\/\/et-edge.com\/conferences\/securitytech\/team\/kiran-belsekar\/\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"400\" src=\"https:\/\/et-edge.com\/conferences\/securitytech\/wp-content\/uploads\/2025\/03\/Kiran-Belsekar-removebg-preview.png\" class=\"img-responsive rt-team-img\" alt=\"Kiran Belsekar\" \/><\/a><\/figure><\/div><div class=\"tlp-content\"><h3><span class=\"team-name\"><a class=\"\" data-id=\"5759\" target=\"_self\" title=\"Kiran Belsekar\" href=\"https:\/\/et-edge.com\/conferences\/securitytech\/team\/kiran-belsekar\/\">Kiran Belsekar<\/a><\/span><\/h3><\/div><div class=\"short-bio\"><p>Executive Vice President - CISO, DPO &amp; IT Governance, Bandhan Life<\/p>\n<\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12  even-grid-item rt-grid-item\" data-id=\"5663\"><div class=\"single-team-area\"><div class=\"single-team\"><figure><a class=\"\" data-id=\"5663\" target=\"_self\" href=\"https:\/\/et-edge.com\/conferences\/securitytech\/team\/linson-paul\/\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"400\" src=\"https:\/\/et-edge.com\/conferences\/securitytech\/wp-content\/uploads\/2025\/03\/Linson-Paul-removebg-preview.png\" class=\"img-responsive rt-team-img\" alt=\"Linson Paul\" \/><\/a><\/figure><\/div><div class=\"tlp-content\"><h3><span class=\"team-name\"><a class=\"\" data-id=\"5663\" target=\"_self\" title=\"Linson Paul\" href=\"https:\/\/et-edge.com\/conferences\/securitytech\/team\/linson-paul\/\">Linson Paul<\/a><\/span><\/h3><\/div><div class=\"short-bio\"><p>Chief Technology Officer,  Muthoot Microfin Limited<\/p>\n<\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12  even-grid-item rt-grid-item\" data-id=\"5651\"><div class=\"single-team-area\"><div class=\"single-team\"><figure><a class=\"\" data-id=\"5651\" target=\"_self\" href=\"https:\/\/et-edge.com\/conferences\/securitytech\/team\/mayank-sharma\/\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"400\" src=\"https:\/\/et-edge.com\/conferences\/securitytech\/wp-content\/uploads\/2025\/03\/Mayank-Sharma-removebg-preview.png\" class=\"img-responsive rt-team-img\" alt=\"Mayank Sharma\" \/><\/a><\/figure><\/div><div class=\"tlp-content\"><h3><span class=\"team-name\"><a class=\"\" data-id=\"5651\" target=\"_self\" title=\"Mayank Sharma\" href=\"https:\/\/et-edge.com\/conferences\/securitytech\/team\/mayank-sharma\/\">Mayank Sharma<\/a><\/span><\/h3><\/div><div class=\"short-bio\"><p>Data Protection Officer (DPO), CRISIL Limited<\/p>\n<\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12  even-grid-item rt-grid-item\" data-id=\"5753\"><div class=\"single-team-area\"><div class=\"single-team\"><figure><a class=\"\" data-id=\"5753\" target=\"_self\" href=\"https:\/\/et-edge.com\/conferences\/securitytech\/team\/mihir-joshi\/\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"400\" src=\"https:\/\/et-edge.com\/conferences\/securitytech\/wp-content\/uploads\/2025\/03\/Mihir-Joshi-removebg-preview.png\" class=\"img-responsive rt-team-img\" alt=\"Mihir Joshi\" \/><\/a><\/figure><\/div><div class=\"tlp-content\"><h3><span class=\"team-name\"><a class=\"\" data-id=\"5753\" target=\"_self\" title=\"Mihir Joshi\" href=\"https:\/\/et-edge.com\/conferences\/securitytech\/team\/mihir-joshi\/\">Mihir Joshi<\/a><\/span><\/h3><\/div><div class=\"short-bio\"><p>Chief Information Security Officer (CISO), Tata Power Company Limited<\/p>\n<\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12  even-grid-item rt-grid-item\" data-id=\"5764\"><div class=\"single-team-area\"><div class=\"single-team\"><figure><a class=\"\" data-id=\"5764\" target=\"_self\" href=\"https:\/\/et-edge.com\/conferences\/securitytech\/team\/mukul-kulshrestha\/\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"400\" src=\"https:\/\/et-edge.com\/conferences\/securitytech\/wp-content\/uploads\/2025\/03\/Mukul-Kulshrestha-removebg-preview.png\" class=\"img-responsive rt-team-img\" alt=\"Mukul Kulshrestha\" \/><\/a><\/figure><\/div><div class=\"tlp-content\"><h3><span class=\"team-name\"><a class=\"\" data-id=\"5764\" target=\"_self\" title=\"Mukul Kulshrestha\" href=\"https:\/\/et-edge.com\/conferences\/securitytech\/team\/mukul-kulshrestha\/\">Mukul Kulshrestha<\/a><\/span><\/h3><\/div><div class=\"short-bio\"><p>Chief Information Security Officer (CISO), Adani Ports &amp; Special Economic Zone (SEZ) Limited<\/p>\n<\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12  even-grid-item rt-grid-item\" data-id=\"5749\"><div class=\"single-team-area\"><div class=\"single-team\"><figure><a class=\"\" data-id=\"5749\" target=\"_self\" href=\"https:\/\/et-edge.com\/conferences\/securitytech\/team\/pravin-kumar\/\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"400\" src=\"https:\/\/et-edge.com\/conferences\/securitytech\/wp-content\/uploads\/2025\/03\/Pravin-Kumar-NPCI-_1_-removebg-preview.png\" class=\"img-responsive rt-team-img\" alt=\"Pravin Kumar\" \/><\/a><\/figure><\/div><div class=\"tlp-content\"><h3><span class=\"team-name\"><a class=\"\" data-id=\"5749\" target=\"_self\" title=\"Pravin Kumar\" href=\"https:\/\/et-edge.com\/conferences\/securitytech\/team\/pravin-kumar\/\">Pravin Kumar<\/a><\/span><\/h3><\/div><div class=\"short-bio\"><p>Chief Market Information Security Officer and Data Protection Officer, National Payments Corporation of India (NPCI)<\/p>\n<\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12  even-grid-item rt-grid-item\" data-id=\"5660\"><div class=\"single-team-area\"><div class=\"single-team\"><figure><a class=\"\" data-id=\"5660\" target=\"_self\" href=\"https:\/\/et-edge.com\/conferences\/securitytech\/team\/ranjan-revandkar\/\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"400\" src=\"https:\/\/et-edge.com\/conferences\/securitytech\/wp-content\/uploads\/2025\/03\/Ranjan-Revandkar-removebg-preview.png\" class=\"img-responsive rt-team-img\" alt=\"Ranjan Revandkar\" \/><\/a><\/figure><\/div><div class=\"tlp-content\"><h3><span class=\"team-name\"><a class=\"\" data-id=\"5660\" target=\"_self\" title=\"Ranjan Revandkar\" href=\"https:\/\/et-edge.com\/conferences\/securitytech\/team\/ranjan-revandkar\/\">Ranjan Revandkar<\/a><\/span><\/h3><\/div><div class=\"short-bio\"><p>Chief Information Security Officer (CISO), PI Industries<\/p>\n<\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12  even-grid-item rt-grid-item\" data-id=\"5761\"><div class=\"single-team-area\"><div class=\"single-team\"><figure><a class=\"\" data-id=\"5761\" target=\"_self\" href=\"https:\/\/et-edge.com\/conferences\/securitytech\/team\/shrikanth-iyer\/\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"400\" src=\"https:\/\/et-edge.com\/conferences\/securitytech\/wp-content\/uploads\/2025\/03\/Shrikanth-Iyer-removebg-preview.png\" class=\"img-responsive rt-team-img\" alt=\"Shrikanth Iyer\" \/><\/a><\/figure><\/div><div class=\"tlp-content\"><h3><span class=\"team-name\"><a class=\"\" data-id=\"5761\" target=\"_self\" title=\"Shrikanth Iyer\" href=\"https:\/\/et-edge.com\/conferences\/securitytech\/team\/shrikanth-iyer\/\">Shrikanth Iyer<\/a><\/span><\/h3><\/div><div class=\"short-bio\"><p>Chief Information Security Officer (CISO), Aditya Birla Health Insurance Company Limited<\/p>\n<\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12  even-grid-item rt-grid-item\" data-id=\"5701\"><div class=\"single-team-area\"><div class=\"single-team\"><figure><a class=\"\" data-id=\"5701\" target=\"_self\" href=\"https:\/\/et-edge.com\/conferences\/securitytech\/team\/steve-dsouza\/\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"400\" src=\"https:\/\/et-edge.com\/conferences\/securitytech\/wp-content\/uploads\/2025\/03\/Steve-Dsouza-removebg-preview.png\" class=\"img-responsive rt-team-img\" alt=\"Steve Dsouza\" \/><\/a><\/figure><\/div><div class=\"tlp-content\"><h3><span class=\"team-name\"><a class=\"\" data-id=\"5701\" target=\"_self\" title=\"Steve Dsouza\" href=\"https:\/\/et-edge.com\/conferences\/securitytech\/team\/steve-dsouza\/\">Steve Dsouza<\/a><\/span><\/h3><\/div><div class=\"short-bio\"><p>Chief Risk Officer, ICICI Lombard General Insurance Company Limited<\/p>\n<\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12  even-grid-item rt-grid-item\" data-id=\"5757\"><div class=\"single-team-area\"><div class=\"single-team\"><figure><a class=\"\" data-id=\"5757\" target=\"_self\" href=\"https:\/\/et-edge.com\/conferences\/securitytech\/team\/venugopal-parameswara\/\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"400\" src=\"https:\/\/et-edge.com\/conferences\/securitytech\/wp-content\/uploads\/2025\/03\/Venugopal-Parameswara-removebg-preview.png\" class=\"img-responsive rt-team-img\" alt=\"Venugopal Parameswara\" \/><\/a><\/figure><\/div><div class=\"tlp-content\"><h3><span class=\"team-name\"><a class=\"\" data-id=\"5757\" target=\"_self\" title=\"Venugopal Parameswara\" href=\"https:\/\/et-edge.com\/conferences\/securitytech\/team\/venugopal-parameswara\/\">Venugopal Parameswara<\/a><\/span><\/h3><\/div><div class=\"short-bio\"><p>CSB Bank<\/p>\n<\/div><\/div><\/div><div class=\"rt-loading-overlay\"><\/div><div class=\"rt-loading rt-ball-clip-rotate\"><div><\/div><\/div><\/div><\/div><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Speakers<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/other_page.php","meta":{"footnotes":""},"class_list":["post-2102","page","type-page","status-publish","hentry"],"aioseo_notices":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Speakers - ET Edge Security Tech Summit 2025<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/et-edge.com\/conferences\/securitytech\/speakers-2025\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Speakers - ET Edge Security Tech Summit 2025\" \/>\n<meta property=\"og:description\" content=\"Speakers\" \/>\n<meta property=\"og:url\" content=\"https:\/\/et-edge.com\/conferences\/securitytech\/speakers-2025\/\" \/>\n<meta property=\"og:site_name\" content=\"ET Edge Security Tech Summit 2025\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-07T09:49:01+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/et-edge.com\/conferences\/securitytech\/speakers-2025\/\",\"url\":\"https:\/\/et-edge.com\/conferences\/securitytech\/speakers-2025\/\",\"name\":\"Speakers - ET Edge Security Tech Summit 2025\",\"isPartOf\":{\"@id\":\"https:\/\/et-edge.com\/conferences\/securitytech\/#website\"},\"datePublished\":\"2024-04-09T03:51:45+00:00\",\"dateModified\":\"2025-11-07T09:49:01+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/et-edge.com\/conferences\/securitytech\/speakers-2025\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/et-edge.com\/conferences\/securitytech\/speakers-2025\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/et-edge.com\/conferences\/securitytech\/speakers-2025\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/et-edge.com\/conferences\/securitytech\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Speakers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/et-edge.com\/conferences\/securitytech\/#website\",\"url\":\"https:\/\/et-edge.com\/conferences\/securitytech\/\",\"name\":\"ET Edge Security Tech Summit 2025\",\"description\":\"Digital Defenders: The Cyber Imperative for a Resilient Future\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/et-edge.com\/conferences\/securitytech\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Speakers - ET Edge Security Tech Summit 2025","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/et-edge.com\/conferences\/securitytech\/speakers-2025\/","og_locale":"en_US","og_type":"article","og_title":"Speakers - ET Edge Security Tech Summit 2025","og_description":"Speakers","og_url":"https:\/\/et-edge.com\/conferences\/securitytech\/speakers-2025\/","og_site_name":"ET Edge Security Tech Summit 2025","article_modified_time":"2025-11-07T09:49:01+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/et-edge.com\/conferences\/securitytech\/speakers-2025\/","url":"https:\/\/et-edge.com\/conferences\/securitytech\/speakers-2025\/","name":"Speakers - ET Edge Security Tech Summit 2025","isPartOf":{"@id":"https:\/\/et-edge.com\/conferences\/securitytech\/#website"},"datePublished":"2024-04-09T03:51:45+00:00","dateModified":"2025-11-07T09:49:01+00:00","breadcrumb":{"@id":"https:\/\/et-edge.com\/conferences\/securitytech\/speakers-2025\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/et-edge.com\/conferences\/securitytech\/speakers-2025\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/et-edge.com\/conferences\/securitytech\/speakers-2025\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/et-edge.com\/conferences\/securitytech\/"},{"@type":"ListItem","position":2,"name":"Speakers"}]},{"@type":"WebSite","@id":"https:\/\/et-edge.com\/conferences\/securitytech\/#website","url":"https:\/\/et-edge.com\/conferences\/securitytech\/","name":"ET Edge Security Tech Summit 2025","description":"Digital Defenders: The Cyber Imperative for a Resilient Future","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/et-edge.com\/conferences\/securitytech\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/et-edge.com\/conferences\/securitytech\/wp-json\/wp\/v2\/pages\/2102","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/et-edge.com\/conferences\/securitytech\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/et-edge.com\/conferences\/securitytech\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/et-edge.com\/conferences\/securitytech\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/et-edge.com\/conferences\/securitytech\/wp-json\/wp\/v2\/comments?post=2102"}],"version-history":[{"count":58,"href":"https:\/\/et-edge.com\/conferences\/securitytech\/wp-json\/wp\/v2\/pages\/2102\/revisions"}],"predecessor-version":[{"id":6579,"href":"https:\/\/et-edge.com\/conferences\/securitytech\/wp-json\/wp\/v2\/pages\/2102\/revisions\/6579"}],"wp:attachment":[{"href":"https:\/\/et-edge.com\/conferences\/securitytech\/wp-json\/wp\/v2\/media?parent=2102"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}