{"id":2865,"date":"2024-04-20T13:37:41","date_gmt":"2024-04-20T08:07:41","guid":{"rendered":"https:\/\/et-edge.com\/conferences\/doctors-day\/demo\/?page_id=2865"},"modified":"2025-10-15T10:55:08","modified_gmt":"2025-10-15T05:25:08","slug":"agenda","status":"publish","type":"page","link":"https:\/\/et-edge.com\/conferences\/securitytech\/agenda\/","title":{"rendered":"Agenda"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"2865\" class=\"elementor elementor-2865\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-73cd04a elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"73cd04a\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-881635b\" data-id=\"881635b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b994468 elementor-widget elementor-widget-heading\" data-id=\"b994468\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Agenda<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3055181 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"3055181\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-03a5665\" data-id=\"03a5665\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-56f75ba\" data-id=\"56f75ba\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fc924cf agendas elementor-widget elementor-widget-ganesh-agenda-accordion\" data-id=\"fc924cf\" data-element_type=\"widget\" data-widget_type=\"ganesh-agenda-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ganesh-accordion-wrapper\" id=\"ganesh-accordion-fc924cf\"><div class=\"ganesh-item\" style=\"margin-bottom:2px; border:1px solid #666; overflow:hidden;\"><div class=\"ganesh-header\" style=\"padding:10px; display:flex; align-items:center; justify-content:space-between;\"><div class=\"ganesh-left\" style=\"display:flex; align-items:center;\"><div class=\"icon-col\" style=\"display:flex; align-items:center; margin-right:15px;\"><i aria-hidden=\"true\" class=\"ganesh-icon fas fa-calendar-check\"><\/i><\/div><div class=\"text-col\" style=\"display:flex; flex-direction:column; justify-content:center; white-space: normal; overflow: hidden; text-overflow: ellipsis;\"><span class=\"ganesh-time\">09:00 - 10:00<\/span><span class=\"ganesh-title\" style=\"margin-top:4px;\">Registration and Networking<\/span><\/div><\/div><\/div><\/div><div class=\"ganesh-item\" style=\"margin-bottom:2px; border:1px solid #666; overflow:hidden;\"><div class=\"ganesh-header\" style=\"padding:10px; display:flex; align-items:center; justify-content:space-between;\"><div class=\"ganesh-left\" style=\"display:flex; align-items:center;\"><div class=\"icon-col\" style=\"display:flex; align-items:center; margin-right:15px;\"><i aria-hidden=\"true\" class=\"ganesh-icon fas fa-clock\"><\/i><\/div><div class=\"text-col\" style=\"display:flex; flex-direction:column; justify-content:center; white-space: normal; overflow: hidden; text-overflow: ellipsis;\"><span class=\"ganesh-time\">10:00 - 10:10<\/span><span class=\"ganesh-title\" style=\"margin-top:4px;\">Context Setting - ET Edge<\/span><\/div><\/div><\/div><\/div><div class=\"ganesh-item\" style=\"margin-bottom:2px; border:1px solid #666; overflow:hidden;\"><div class=\"ganesh-header\" style=\"padding:10px; display:flex; align-items:center; justify-content:space-between;\"><div class=\"ganesh-left\" style=\"display:flex; align-items:center;\"><div class=\"icon-col\" style=\"display:flex; align-items:center; margin-right:15px;\"><i aria-hidden=\"true\" class=\"ganesh-icon fas fa-microphone-alt\"><\/i><\/div><div class=\"text-col\" style=\"display:flex; flex-direction:column; justify-content:center; white-space: normal; overflow: hidden; text-overflow: ellipsis;\"><span class=\"ganesh-time\">10:10 - 10:30<\/span><span class=\"ganesh-title\" style=\"margin-top:4px;\">Inaugural Keynote - The Cyber Imperative: Risk, Resilience, and the Road Ahead<\/span><\/div><\/div><span class=\"ganesh-toggle-icon\"><i class=\"fas fa-plus\"><\/i><\/span><\/div><div class=\"ganesh-content\" style=\"display:none; padding:10px 20px;\"><p>In today\u2019s hyperconnected world, cybersecurity is no longer a technical concern \u2014 it is a strategic business imperative that impacts growth, reputation, and shareholder value. From AI-driven operations to cloud-native ecosystems, enterprises face unprecedented risks that can disrupt business continuity overnight. This inaugural session sets the stage for the summit by exploring how organizations can anticipate threats, embed resilience, and convert risk into opportunity. Thought leaders will share insights on aligning cybersecurity with corporate strategy, creating board-level accountability, and leveraging risk management as a driver of trust and competitive advantage.<\/p><\/div><\/div><div class=\"ganesh-item\" style=\"margin-bottom:2px; border:1px solid #666; overflow:hidden;\"><div class=\"ganesh-header\" style=\"padding:10px; display:flex; align-items:center; justify-content:space-between;\"><div class=\"ganesh-left\" style=\"display:flex; align-items:center;\"><div class=\"icon-col\" style=\"display:flex; align-items:center; margin-right:15px;\"><i aria-hidden=\"true\" class=\"ganesh-icon fas fa-user-circle\"><\/i><\/div><div class=\"text-col\" style=\"display:flex; flex-direction:column; justify-content:center; white-space: normal; overflow: hidden; text-overflow: ellipsis;\"><span class=\"ganesh-time\">10:30 - 10:45<\/span><span class=\"ganesh-title\" style=\"margin-top:4px;\">Customer Success Story - Reserved for Title Partner<\/span><\/div><\/div><\/div><\/div><div class=\"ganesh-item\" style=\"margin-bottom:2px; border:1px solid #666; overflow:hidden;\"><div class=\"ganesh-header\" style=\"padding:10px; display:flex; align-items:center; justify-content:space-between;\"><div class=\"ganesh-left\" style=\"display:flex; align-items:center;\"><div class=\"icon-col\" style=\"display:flex; align-items:center; margin-right:15px;\"><i aria-hidden=\"true\" class=\"ganesh-icon fas fa-microphone-alt\"><\/i><\/div><div class=\"text-col\" style=\"display:flex; flex-direction:column; justify-content:center; white-space: normal; overflow: hidden; text-overflow: ellipsis;\"><span class=\"ganesh-time\">10:45 - 11:15<\/span><span class=\"ganesh-title\" style=\"margin-top:4px;\">Boardroom Breach: When Cyber Risk Becomes a Business Crisis (CEOs\/MDs\/Founders)<\/span><\/div><\/div><span class=\"ganesh-toggle-icon\"><i class=\"fas fa-plus\"><\/i><\/span><\/div><div class=\"ganesh-content\" style=\"display:none; padding:10px 20px;\"><p>Cybersecurity is no longer just an IT concern \u2014 it\u2019s a strategic business issue that can impact growth, reputation, and shareholder value. In today\u2019s digital economy, breaches and data disruptions can halt operations, erode trust, and trigger financial loss overnight. This panel explores insights in to cyber risk as a core element of corporate strategy, integrate resilience into decision-making, and convert security investments into long-term business value. Leaders will explore frameworks for board-level accountability, risk quantification, and aligning cybersecurity with overall organizational objectives.<\/p><p><strong>Key Discussion Areas:<\/strong><\/p><ul><li>Reframing cyber as a strategic business risk, not a technical issue<\/li><li>Elevating executive literacy: Making informed, board-level decisions on security<\/li><li>Metrics and models to quantify cyber risk in financial and operational terms<\/li><li>Turning cybersecurity initiatives into tangible business value and competitive advantage<\/li><\/ul><\/div><\/div><div class=\"ganesh-item\" style=\"margin-bottom:2px; border:1px solid #666; overflow:hidden;\"><div class=\"ganesh-header\" style=\"padding:10px; display:flex; align-items:center; justify-content:space-between;\"><div class=\"ganesh-left\" style=\"display:flex; align-items:center;\"><div class=\"icon-col\" style=\"display:flex; align-items:center; margin-right:15px;\"><i aria-hidden=\"true\" class=\"ganesh-icon fas fa-comments\"><\/i><\/div><div class=\"text-col\" style=\"display:flex; flex-direction:column; justify-content:center; white-space: normal; overflow: hidden; text-overflow: ellipsis;\"><span class=\"ganesh-time\">11:15 \u2013 11:40<\/span><span class=\"ganesh-title\" style=\"margin-top:4px;\">Networking over Coffee and Refreshments at the CyberTech Experience Zone<\/span><\/div><\/div><\/div><\/div><div class=\"ganesh-item\" style=\"margin-bottom:2px; border:1px solid #666; overflow:hidden;\"><div class=\"ganesh-header\" style=\"padding:10px; display:flex; align-items:center; justify-content:space-between;\"><div class=\"ganesh-left\" style=\"display:flex; align-items:center;\"><div class=\"icon-col\" style=\"display:flex; align-items:center; margin-right:15px;\"><i aria-hidden=\"true\" class=\"ganesh-icon fas fa-microphone-alt\"><\/i><\/div><div class=\"text-col\" style=\"display:flex; flex-direction:column; justify-content:center; white-space: normal; overflow: hidden; text-overflow: ellipsis;\"><span class=\"ganesh-time\">11:40 \u2013 12:00<\/span><span class=\"ganesh-title\" style=\"margin-top:4px;\">Trilogue - Strategic Sentinels: The Rise of CISO 2.0<\/span><\/div><\/div><span class=\"ganesh-toggle-icon\"><i class=\"fas fa-plus\"><\/i><\/span><\/div><div class=\"ganesh-content\" style=\"display:none; padding:10px 20px;\"><p>The role of the CISO is evolving from defender to strategic architect of resilience. Beyond firewalls and endpoint protection, today\u2019s CISO must align cybersecurity with business goals, manage cross-functional risk, and anticipate emerging threats in AI, cloud, and critical infrastructure. This panel explores how CISOs can balance tactical defence with strategic foresight, shaping security as a core driver of competitive advantage.<\/p><p><strong>Key Discussion Areas:<\/strong><\/p><ul><li>Reimagining the CISO as a business leader<\/li><li>Integrating cyber strategy into corporate strategy<\/li><li>Metrics and KPIs that drive board-level impact<\/li><li>Leading cybersecurity innovation across enterprise ecosystems<\/li><\/ul><\/div><\/div><div class=\"ganesh-item\" style=\"margin-bottom:2px; border:1px solid #666; overflow:hidden;\"><div class=\"ganesh-header\" style=\"padding:10px; display:flex; align-items:center; justify-content:space-between;\"><div class=\"ganesh-left\" style=\"display:flex; align-items:center;\"><div class=\"icon-col\" style=\"display:flex; align-items:center; margin-right:15px;\"><i aria-hidden=\"true\" class=\"ganesh-icon fas fa-user-circle\"><\/i><\/div><div class=\"text-col\" style=\"display:flex; flex-direction:column; justify-content:center; white-space: normal; overflow: hidden; text-overflow: ellipsis;\"><span class=\"ganesh-time\">12:10 \u2013 12:25<\/span><span class=\"ganesh-title\" style=\"margin-top:4px;\">Customer Success Story - Reserved for Co-Powered by Partner<\/span><\/div><\/div><\/div><\/div><div class=\"ganesh-item\" style=\"margin-bottom:2px; border:1px solid #666; overflow:hidden;\"><div class=\"ganesh-header\" style=\"padding:10px; display:flex; align-items:center; justify-content:space-between;\"><div class=\"ganesh-left\" style=\"display:flex; align-items:center;\"><div class=\"icon-col\" style=\"display:flex; align-items:center; margin-right:15px;\"><i aria-hidden=\"true\" class=\"ganesh-icon fas fa-comment\"><\/i><\/div><div class=\"text-col\" style=\"display:flex; flex-direction:column; justify-content:center; white-space: normal; overflow: hidden; text-overflow: ellipsis;\"><span class=\"ganesh-time\">12:25 - 12:55<\/span><span class=\"ganesh-title\" style=\"margin-top:4px;\">Power Panel - Fractured Trust: The Fragility of Digital Identities<\/span><\/div><\/div><span class=\"ganesh-toggle-icon\"><i class=\"fas fa-plus\"><\/i><\/span><\/div><div class=\"ganesh-content\" style=\"display:none; padding:10px 20px;\"><p>In the digital economy, identity is the new perimeter \u2014 and it\u2019s under siege. From deepfake impersonations to credential theft at scale, traditional IAM systems are cracking under pressure. This conversation decodes the new era of identity warfare, the economics of trust, and what it takes to protect people and machines in a borderless, connected ecosystem.<\/p><p><strong>Key Areas:<\/strong><\/p><ul><li>Identity fraud and AI-powered impersonation<\/li><li>Zero Trust evolution: Beyond the buzzword<\/li><li>Privacy vs usability: finding balance<\/li><li>Securing digital twins and machine identities<\/li><\/ul><\/div><\/div><div class=\"ganesh-item\" style=\"margin-bottom:2px; border:1px solid #666; overflow:hidden;\"><div class=\"ganesh-header\" style=\"padding:10px; display:flex; align-items:center; justify-content:space-between;\"><div class=\"ganesh-left\" style=\"display:flex; align-items:center;\"><div class=\"icon-col\" style=\"display:flex; align-items:center; margin-right:15px;\"><i aria-hidden=\"true\" class=\"ganesh-icon fas fa-users\"><\/i><\/div><div class=\"text-col\" style=\"display:flex; flex-direction:column; justify-content:center; white-space: normal; overflow: hidden; text-overflow: ellipsis;\"><span class=\"ganesh-time\">12:55 \u2013 13:10<\/span><span class=\"ganesh-title\" style=\"margin-top:4px;\">Customer Success Story - Reserved for Co-Powered by\/Platinum Partner<\/span><\/div><\/div><\/div><\/div><div class=\"ganesh-item\" style=\"margin-bottom:2px; border:1px solid #666; overflow:hidden;\"><div class=\"ganesh-header\" style=\"padding:10px; display:flex; align-items:center; justify-content:space-between;\"><div class=\"ganesh-left\" style=\"display:flex; align-items:center;\"><div class=\"icon-col\" style=\"display:flex; align-items:center; margin-right:15px;\"><i aria-hidden=\"true\" class=\"ganesh-icon fas fa-comments\"><\/i><\/div><div class=\"text-col\" style=\"display:flex; flex-direction:column; justify-content:center; white-space: normal; overflow: hidden; text-overflow: ellipsis;\"><span class=\"ganesh-time\">13:10 \u2013 14:00<\/span><span class=\"ganesh-title\" style=\"margin-top:4px;\">Networking Luncheon at the CyberTech Experience Zone<\/span><\/div><\/div><\/div><\/div><div class=\"ganesh-item\" style=\"margin-bottom:2px; border:1px solid #666; overflow:hidden;\"><div class=\"ganesh-header\" style=\"padding:10px; display:flex; align-items:center; justify-content:space-between;\"><div class=\"ganesh-left\" style=\"display:flex; align-items:center;\"><div class=\"icon-col\" style=\"display:flex; align-items:center; margin-right:15px;\"><i aria-hidden=\"true\" class=\"ganesh-icon fas fa-microphone-alt\"><\/i><\/div><div class=\"text-col\" style=\"display:flex; flex-direction:column; justify-content:center; white-space: normal; overflow: hidden; text-overflow: ellipsis;\"><span class=\"ganesh-time\">14:00 \u2013 14:30<\/span><span class=\"ganesh-title\" style=\"margin-top:4px;\">The Grand Cyber Heist: Race for the Bounty<\/span><\/div><\/div><span class=\"ganesh-toggle-icon\"><i class=\"fas fa-plus\"><\/i><\/span><\/div><div class=\"ganesh-content\" style=\"display:none; padding:10px 20px;\"><p>Step into the mind of a hacker and the shoes of a cyber defender in this high-octane, interactive challenge. Participants will be divided into teams and tasked with unlocking a secure briefcase containing a \u201cbounty\u201d reward. Using tablets provided, teams will solve codebreakers, encryption puzzles, and cybersecurity challenges, testing their logic, teamwork, and digital intuition. This session not only immerses participants in real-world cyber problem-solving but also highlights the importance of strategic thinking, rapid decision-making, and collaborative defence in a fun, competitive format.<\/p><\/div><\/div><div class=\"ganesh-item\" style=\"margin-bottom:2px; border:1px solid #666; overflow:hidden;\"><div class=\"ganesh-header\" style=\"padding:10px; display:flex; align-items:center; justify-content:space-between;\"><div class=\"ganesh-left\" style=\"display:flex; align-items:center;\"><div class=\"icon-col\" style=\"display:flex; align-items:center; margin-right:15px;\"><i aria-hidden=\"true\" class=\"ganesh-icon fas fa-user-circle\"><\/i><\/div><div class=\"text-col\" style=\"display:flex; flex-direction:column; justify-content:center; white-space: normal; overflow: hidden; text-overflow: ellipsis;\"><span class=\"ganesh-time\">14:30 - 14:45<\/span><span class=\"ganesh-title\" style=\"margin-top:4px;\">Customer Success Story - Reserved for Platinum Partner<\/span><\/div><\/div><\/div><\/div><div class=\"ganesh-item\" style=\"margin-bottom:2px; border:1px solid #666; overflow:hidden;\"><div class=\"ganesh-header\" style=\"padding:10px; display:flex; align-items:center; justify-content:space-between;\"><div class=\"ganesh-left\" style=\"display:flex; align-items:center;\"><div class=\"icon-col\" style=\"display:flex; align-items:center; margin-right:15px;\"><i aria-hidden=\"true\" class=\"ganesh-icon fas fa-comments\"><\/i><\/div><div class=\"text-col\" style=\"display:flex; flex-direction:column; justify-content:center; white-space: normal; overflow: hidden; text-overflow: ellipsis;\"><span class=\"ganesh-time\">14:45 \u2013 15:00<\/span><span class=\"ganesh-title\" style=\"margin-top:4px;\">Fire Side Chat - Quantum Quandary: When Today\u2019s Encryption Meets Tomorrow\u2019s Computing<\/span><\/div><\/div><span class=\"ganesh-toggle-icon\"><i class=\"fas fa-plus\"><\/i><\/span><\/div><div class=\"ganesh-content\" style=\"display:none; padding:10px 20px;\"><p>Quantum computing promises a revolution \u2014 but also a reckoning. The encryption protecting our financial systems, healthcare records, and national secrets may become obsolete overnight. This discussion decodes the quantum threat landscape and outlines how organizations can start futureproofing their data now for a post-quantum world.<\/p><p><strong>Key Areas:<\/strong><\/p><ul><li>Understanding the \u201cQ-Day\u201d scenario<\/li><li>Quantum-safe cryptography and readiness roadmaps<\/li><li>Regulatory and compliance blind spots<\/li><li>Timing the transition: too early or too late?<\/li><\/ul><\/div><\/div><div class=\"ganesh-item\" style=\"margin-bottom:2px; border:1px solid #666; overflow:hidden;\"><div class=\"ganesh-header\" style=\"padding:10px; display:flex; align-items:center; justify-content:space-between;\"><div class=\"ganesh-left\" style=\"display:flex; align-items:center;\"><div class=\"icon-col\" style=\"display:flex; align-items:center; margin-right:15px;\"><i aria-hidden=\"true\" class=\"ganesh-icon fas fa-user-circle\"><\/i><\/div><div class=\"text-col\" style=\"display:flex; flex-direction:column; justify-content:center; white-space: normal; overflow: hidden; text-overflow: ellipsis;\"><span class=\"ganesh-time\">15:00 \u2013 15:15<\/span><span class=\"ganesh-title\" style=\"margin-top:4px;\">Customer Success Story - Reserved for Gold Partner<\/span><\/div><\/div><\/div><\/div><div class=\"ganesh-item\" style=\"margin-bottom:2px; border:1px solid #666; overflow:hidden;\"><div class=\"ganesh-header\" style=\"padding:10px; display:flex; align-items:center; justify-content:space-between;\"><div class=\"ganesh-left\" style=\"display:flex; align-items:center;\"><div class=\"icon-col\" style=\"display:flex; align-items:center; margin-right:15px;\"><i aria-hidden=\"true\" class=\"ganesh-icon fas fa-microphone-alt\"><\/i><\/div><div class=\"text-col\" style=\"display:flex; flex-direction:column; justify-content:center; white-space: normal; overflow: hidden; text-overflow: ellipsis;\"><span class=\"ganesh-time\">15:15 \u2013 15:45<\/span><span class=\"ganesh-title\" style=\"margin-top:4px;\">The Privacy Panel: India\u2019s DPDPA and the New Data Doctrine<\/span><\/div><\/div><span class=\"ganesh-toggle-icon\"><i class=\"fas fa-plus\"><\/i><\/span><\/div><div class=\"ganesh-content\" style=\"display:none; padding:10px 20px;\"><p>India\u2019s Digital Personal Data Protection Act (DPDPA) signals a tectonic shift in how businesses collect, process, and protect personal information \u2014 transforming privacy from a compliance checklist to a cornerstone of corporate trust. As enterprises recalibrate their governance, consent, and accountability frameworks, this panel explores the strategic and cultural dimensions of data protection. Beyond legal adherence, the discussion focuses on how DPDPA can become an engine for innovation, ethical AI, and digital inclusion in the world\u2019s fastest-growing data economy.<\/p><p><strong>Key Areas:<\/strong><\/p><ul><li>Privacy as a growth enabler: From compliance to competitiveness<\/li><li>Reimagining governance and accountability under DPDPA<\/li><li>Cross-border data, localization, and digital trade implications<br \/>Building data ethics and user trust in an AI-driven economy<\/li><\/ul><\/div><\/div><div class=\"ganesh-item\" style=\"margin-bottom:2px; border:1px solid #666; overflow:hidden;\"><div class=\"ganesh-header\" style=\"padding:10px; display:flex; align-items:center; justify-content:space-between;\"><div class=\"ganesh-left\" style=\"display:flex; align-items:center;\"><div class=\"icon-col\" style=\"display:flex; align-items:center; margin-right:15px;\"><i aria-hidden=\"true\" class=\"ganesh-icon fas fa-comments\"><\/i><\/div><div class=\"text-col\" style=\"display:flex; flex-direction:column; justify-content:center; white-space: normal; overflow: hidden; text-overflow: ellipsis;\"><span class=\"ganesh-time\">15:45 \u2013 16:00<\/span><span class=\"ganesh-title\" style=\"margin-top:4px;\">Networking Coffee and Refreshments at the CyberTech Experience Zone<\/span><\/div><\/div><\/div><\/div><div class=\"ganesh-item\" style=\"margin-bottom:2px; border:1px solid #666; overflow:hidden;\"><div class=\"ganesh-header\" style=\"padding:10px; display:flex; align-items:center; justify-content:space-between;\"><div class=\"ganesh-left\" style=\"display:flex; align-items:center;\"><div class=\"icon-col\" style=\"display:flex; align-items:center; margin-right:15px;\"><i aria-hidden=\"true\" class=\"ganesh-icon fas fa-microphone-alt\"><\/i><\/div><div class=\"text-col\" style=\"display:flex; flex-direction:column; justify-content:center; white-space: normal; overflow: hidden; text-overflow: ellipsis;\"><span class=\"ganesh-time\">16:00 - 16:15<\/span><span class=\"ganesh-title\" style=\"margin-top:4px;\">Guest of Honour - Cybersecurity as National and Corporate Imperative: Leading in a Connected Era<\/span><\/div><\/div><span class=\"ganesh-toggle-icon\"><i class=\"fas fa-plus\"><\/i><\/span><\/div><div class=\"ganesh-content\" style=\"display:none; padding:10px 20px;\"><p>Cyber threats today transcend borders, industries, and technologies. This keynote will address how governments, regulators, and enterprises must collaborate to secure digital economies, protect citizens, and enable innovation. The speech can touch upon policy, regulatory foresight, global cyber trends, and the role of leadership in creating resilient and trusted digital ecosystems<\/p><\/div><\/div><div class=\"ganesh-item\" style=\"margin-bottom:2px; border:1px solid #666; overflow:hidden;\"><div class=\"ganesh-header\" style=\"padding:10px; display:flex; align-items:center; justify-content:space-between;\"><div class=\"ganesh-left\" style=\"display:flex; align-items:center;\"><div class=\"icon-col\" style=\"display:flex; align-items:center; margin-right:15px;\"><i aria-hidden=\"true\" class=\"ganesh-icon fas fa-microphone-alt\"><\/i><\/div><div class=\"text-col\" style=\"display:flex; flex-direction:column; justify-content:center; white-space: normal; overflow: hidden; text-overflow: ellipsis;\"><span class=\"ganesh-time\">16:15 - 16:40<\/span><span class=\"ganesh-title\" style=\"margin-top:4px;\">Chief Guest Address - Securing a Digital Nation: The Strategic Imperative of Cyber Resilience<\/span><\/div><\/div><span class=\"ganesh-toggle-icon\"><i class=\"fas fa-plus\"><\/i><\/span><\/div><div class=\"ganesh-content\" style=\"display:none; padding:10px 20px;\"><p>In an era where every sector \u2014 government, business, and society \u2014 depends on digital infrastructure, cybersecurity is no longer optional; it is a national and societal imperative. This keynote explores the strategic, regulatory, and collaborative measures needed to protect critical infrastructure, safeguard citizens\u2019 data, and foster trust in the digital economy. This session will highlight how governments, enterprises, and civil society can work together to build a resilient, secure, and innovative digital ecosystem, ensuring that progress and protection advance hand in hand.<\/p><\/div><\/div><div class=\"ganesh-item\" style=\"margin-bottom:2px; border:1px solid #666; overflow:hidden;\"><div class=\"ganesh-header\" style=\"padding:10px; display:flex; align-items:center; justify-content:space-between;\"><div class=\"ganesh-left\" style=\"display:flex; align-items:center;\"><div class=\"icon-col\" style=\"display:flex; align-items:center; margin-right:15px;\"><i aria-hidden=\"true\" class=\"ganesh-icon fas fa-award\"><\/i><\/div><div class=\"text-col\" style=\"display:flex; flex-direction:column; justify-content:center; white-space: normal; overflow: hidden; text-overflow: ellipsis;\"><span class=\"ganesh-time\">16:40 - 17:00<\/span><span class=\"ganesh-title\" style=\"margin-top:4px;\">Awards<\/span><\/div><\/div><span class=\"ganesh-toggle-icon\"><i class=\"fas fa-plus\"><\/i><\/span><\/div><div class=\"ganesh-content\" style=\"display:none; padding:10px 20px;\"><p>In an era where every sector \u2014 government, business, and society \u2014 depends on digital infrastructure, cybersecurity is no longer optional; it is a national and societal imperative. This keynote explores the strategic, regulatory, and collaborative measures needed to protect critical infrastructure, safeguard citizens\u2019 data, and foster trust in the digital economy. This session will highlight how governments, enterprises, and civil society can work together to build a resilient, secure, and innovative digital ecosystem, ensuring that progress and protection advance hand in hand.<\/p><\/div><\/div><div class=\"ganesh-item\" style=\"margin-bottom:2px; border:1px solid #666; overflow:hidden;\"><div class=\"ganesh-header\" style=\"padding:10px; display:flex; align-items:center; justify-content:space-between;\"><div class=\"ganesh-left\" style=\"display:flex; align-items:center;\"><div class=\"icon-col\" style=\"display:flex; align-items:center; margin-right:15px;\"><i aria-hidden=\"true\" class=\"ganesh-icon fas fa-user-circle\"><\/i><\/div><div class=\"text-col\" style=\"display:flex; flex-direction:column; justify-content:center; white-space: normal; overflow: hidden; text-overflow: ellipsis;\"><span class=\"ganesh-time\">17:00<\/span><span class=\"ganesh-title\" style=\"margin-top:4px;\">Summit Ends<\/span><\/div><\/div><\/div><\/div><\/div>            <script>\r\n            jQuery(document).ready(function($){\r\n    var $accordion = $(\"#ganesh-accordion-fc924cf\");\r\n\r\n    $accordion.find(\".ganesh-header\").on(\"click\", function(){\r\n        var $content = $(this).next(\".ganesh-content\");\r\n        if (!$content.length) return; \/\/ no toggle if no description\r\n        var $toggleIcon = $(this).find(\".ganesh-toggle-icon i\");\r\n\r\n        \/\/ If about to open, close any open item first\r\n        if (!$content.hasClass(\"open\")) {\r\n            $accordion.find(\".ganesh-content.open\").each(function(){\r\n                var $openContent = $(this);\r\n                $openContent.slideUp(300, function(){\r\n                    $openContent.removeClass(\"open\");\r\n                });\r\n                $openContent.prev(\".ganesh-header\").removeClass(\"open\").find(\".ganesh-toggle-icon i\")\r\n                    .fadeOut(150, function(){\r\n                        $(this).removeClass(\"fa-minus\").addClass(\"fa-plus\").fadeIn(150); \/\/ Switch to plus when closing\r\n                    });\r\n            });\r\n        }\r\n\r\n        \/\/ Toggle this item\r\n        if ($content.hasClass(\"open\")) {\r\n            $content.slideUp(300, function(){\r\n                $content.removeClass(\"open\");\r\n            });\r\n            $(this).removeClass(\"open\");\r\n            $toggleIcon.fadeOut(150, function(){\r\n                $(this).removeClass(\"fa-minus\").addClass(\"fa-plus\").fadeIn(150); \/\/ Switch to plus when closing\r\n            });\r\n        } else {\r\n            $content.css({ opacity: 0 }).slideDown(300, function(){\r\n                $content.addClass(\"open\").animate({ opacity: 1 }, 150);\r\n            });\r\n            $(this).addClass(\"open\");\r\n            $toggleIcon.fadeOut(150, function(){\r\n                $(this).removeClass(\"fa-plus\").addClass(\"fa-minus\").fadeIn(150); \/\/ Switch to minus when opening\r\n            });\r\n        }\r\n    });\r\n});\r\n            <\/script>\r\n\r\n            <style>\r\n            .ganesh-content { display: none; }\r\n            .ganesh-content.open { display: block; }\r\n            @media (max-width: 600px) {\r\n                .ganesh-left { flex-wrap: nowrap !important; }\r\n            }\r\n            <\/style>\r\n            \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9becb9a elementor-widget elementor-widget-text-editor\" data-id=\"9becb9a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><em>This is a tentative agenda &amp; subject to change*<\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-44808a4\" data-id=\"44808a4\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ef4689a elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"ef4689a\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9659f1f\" data-id=\"9659f1f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-883fef8 agenda elementor-widget elementor-widget-html\" data-id=\"883fef8\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<style>\n.agendas ul li {\n    list-style: disc;\n    margin-left: 20px;\n}\n<\/style>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Agenda 09:00 &#8211; 10:00Registration and Networking10:00 &#8211; 10:10Context Setting &#8211; ET Edge10:10 &#8211; 10:30Inaugural Keynote &#8211; The Cyber Imperative: Risk, Resilience, and the Road Ahead In today\u2019s hyperconnected world, cybersecurity is no longer a technical concern \u2014 it is a strategic business imperative that impacts growth, reputation, and shareholder value. From AI-driven operations to cloud-native ecosystems, enterprises face unprecedented risks that can disrupt business continuity overnight. This inaugural session sets the stage for the summit by exploring how organizations can anticipate threats, embed resilience, and convert risk into opportunity. Thought leaders will share insights on aligning cybersecurity with corporate strategy, creating board-level accountability, and leveraging risk management as a driver of trust and competitive advantage. 10:30 &#8211; 10:45Customer Success Story &#8211; Reserved for Title Partner10:45 &#8211; 11:15Boardroom Breach: When Cyber Risk Becomes a Business Crisis (CEOs\/MDs\/Founders) Cybersecurity is no longer just an IT concern \u2014 it\u2019s a strategic business issue that can impact growth, reputation, and shareholder value. In today\u2019s digital economy, breaches and data disruptions can halt operations, erode trust, and trigger financial loss overnight. This panel explores insights in to cyber risk as a core element of corporate strategy, integrate resilience into decision-making, and convert security investments into long-term business value. Leaders will explore frameworks for board-level accountability, risk quantification, and aligning cybersecurity with overall organizational objectives. Key Discussion Areas: Reframing cyber as a strategic business risk, not a technical issue Elevating executive literacy: Making informed, board-level decisions on security Metrics and models to quantify cyber risk in financial and operational terms Turning cybersecurity initiatives into tangible business value and competitive advantage 11:15 \u2013 11:40Networking over Coffee and Refreshments at the CyberTech Experience Zone11:40 \u2013 12:00Trilogue &#8211; Strategic Sentinels: The Rise of CISO 2.0 The role of the CISO is evolving from defender to strategic architect of resilience. Beyond firewalls and endpoint protection, today\u2019s CISO must align cybersecurity with business goals, manage cross-functional risk, and anticipate emerging threats in AI, cloud, and critical infrastructure. This panel explores how CISOs can balance tactical defence with strategic foresight, shaping security as a core driver of competitive advantage. Key Discussion Areas: Reimagining the CISO as a business leader Integrating cyber strategy into corporate strategy Metrics and KPIs that drive board-level impact Leading cybersecurity innovation across enterprise ecosystems 12:10 \u2013 12:25Customer Success Story &#8211; Reserved for Co-Powered by Partner12:25 &#8211; 12:55Power Panel &#8211; Fractured Trust: The Fragility of Digital Identities In the digital economy, identity is the new perimeter \u2014 and it\u2019s under siege. From deepfake impersonations to credential theft at scale, traditional IAM systems are cracking under pressure. This conversation decodes the new era of identity warfare, the economics of trust, and what it takes to protect people and machines in a borderless, connected ecosystem. Key Areas: Identity fraud and AI-powered impersonation Zero Trust evolution: Beyond the buzzword Privacy vs usability: finding balance Securing digital twins and machine identities 12:55 \u2013 13:10Customer Success Story &#8211; Reserved for Co-Powered by\/Platinum Partner13:10 \u2013 14:00Networking Luncheon at the CyberTech Experience Zone14:00 \u2013 14:30The Grand Cyber Heist: Race for the Bounty Step into the mind of a hacker and the shoes of a cyber defender in this high-octane, interactive challenge. Participants will be divided into teams and tasked with unlocking a secure briefcase containing a \u201cbounty\u201d reward. Using tablets provided, teams will solve codebreakers, encryption puzzles, and cybersecurity challenges, testing their logic, teamwork, and digital intuition. This session not only immerses participants in real-world cyber problem-solving but also highlights the importance of strategic thinking, rapid decision-making, and collaborative defence in a fun, competitive format. 14:30 &#8211; 14:45Customer Success Story &#8211; Reserved for Platinum Partner14:45 \u2013 15:00Fire Side Chat &#8211; Quantum Quandary: When Today\u2019s Encryption Meets Tomorrow\u2019s Computing Quantum computing promises a revolution \u2014 but also a reckoning. The encryption protecting our financial systems, healthcare records, and national secrets may become obsolete overnight. This discussion decodes the quantum threat landscape and outlines how organizations can start futureproofing their data now for a post-quantum world. Key Areas: Understanding the \u201cQ-Day\u201d scenario Quantum-safe cryptography and readiness roadmaps Regulatory and compliance blind spots Timing the transition: too early or too late? 15:00 \u2013 15:15Customer Success Story &#8211; Reserved for Gold Partner15:15 \u2013 15:45The Privacy Panel: India\u2019s DPDPA and the New Data Doctrine India\u2019s Digital Personal Data Protection Act (DPDPA) signals a tectonic shift in how businesses collect, process, and protect personal information \u2014 transforming privacy from a compliance checklist to a cornerstone of corporate trust. As enterprises recalibrate their governance, consent, and accountability frameworks, this panel explores the strategic and cultural dimensions of data protection. Beyond legal adherence, the discussion focuses on how DPDPA can become an engine for innovation, ethical AI, and digital inclusion in the world\u2019s fastest-growing data economy. Key Areas: Privacy as a growth enabler: From compliance to competitiveness Reimagining governance and accountability under DPDPA Cross-border data, localization, and digital trade implicationsBuilding data ethics and user trust in an AI-driven economy 15:45 \u2013 16:00Networking Coffee and Refreshments at the CyberTech Experience Zone16:00 &#8211; 16:15Guest of Honour &#8211; Cybersecurity as National and Corporate Imperative: Leading in a Connected Era Cyber threats today transcend borders, industries, and technologies. This keynote will address how governments, regulators, and enterprises must collaborate to secure digital economies, protect citizens, and enable innovation. The speech can touch upon policy, regulatory foresight, global cyber trends, and the role of leadership in creating resilient and trusted digital ecosystems 16:15 &#8211; 16:40Chief Guest Address &#8211; Securing a Digital Nation: The Strategic Imperative of Cyber Resilience In an era where every sector \u2014 government, business, and society \u2014 depends on digital infrastructure, cybersecurity is no longer optional; it is a national and societal imperative. This keynote explores the strategic, regulatory, and collaborative measures needed to protect critical infrastructure, safeguard citizens\u2019 data, and foster trust in the digital economy. This session will highlight how governments, enterprises, and civil society can work together to build a resilient, secure, and innovative digital ecosystem, ensuring that progress and protection advance hand in hand. 16:40 &#8211; 17:00Awards In an era where<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/other_page.php","meta":{"footnotes":""},"class_list":["post-2865","page","type-page","status-publish","hentry"],"aioseo_notices":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Agenda - ET Edge Security Tech Summit 2025<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/et-edge.com\/conferences\/securitytech\/agenda\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Agenda - ET Edge Security Tech Summit 2025\" \/>\n<meta property=\"og:description\" content=\"Agenda 09:00 &#8211; 10:00Registration and Networking10:00 &#8211; 10:10Context Setting &#8211; ET Edge10:10 &#8211; 10:30Inaugural Keynote &#8211; The Cyber Imperative: Risk, Resilience, and the Road Ahead In today\u2019s hyperconnected world, cybersecurity is no longer a technical concern \u2014 it is a strategic business imperative that impacts growth, reputation, and shareholder value. From AI-driven operations to cloud-native ecosystems, enterprises face unprecedented risks that can disrupt business continuity overnight. This inaugural session sets the stage for the summit by exploring how organizations can anticipate threats, embed resilience, and convert risk into opportunity. Thought leaders will share insights on aligning cybersecurity with corporate strategy, creating board-level accountability, and leveraging risk management as a driver of trust and competitive advantage. 10:30 &#8211; 10:45Customer Success Story &#8211; Reserved for Title Partner10:45 &#8211; 11:15Boardroom Breach: When Cyber Risk Becomes a Business Crisis (CEOs\/MDs\/Founders) Cybersecurity is no longer just an IT concern \u2014 it\u2019s a strategic business issue that can impact growth, reputation, and shareholder value. In today\u2019s digital economy, breaches and data disruptions can halt operations, erode trust, and trigger financial loss overnight. This panel explores insights in to cyber risk as a core element of corporate strategy, integrate resilience into decision-making, and convert security investments into long-term business value. Leaders will explore frameworks for board-level accountability, risk quantification, and aligning cybersecurity with overall organizational objectives. Key Discussion Areas: Reframing cyber as a strategic business risk, not a technical issue Elevating executive literacy: Making informed, board-level decisions on security Metrics and models to quantify cyber risk in financial and operational terms Turning cybersecurity initiatives into tangible business value and competitive advantage 11:15 \u2013 11:40Networking over Coffee and Refreshments at the CyberTech Experience Zone11:40 \u2013 12:00Trilogue &#8211; Strategic Sentinels: The Rise of CISO 2.0 The role of the CISO is evolving from defender to strategic architect of resilience. Beyond firewalls and endpoint protection, today\u2019s CISO must align cybersecurity with business goals, manage cross-functional risk, and anticipate emerging threats in AI, cloud, and critical infrastructure. This panel explores how CISOs can balance tactical defence with strategic foresight, shaping security as a core driver of competitive advantage. Key Discussion Areas: Reimagining the CISO as a business leader Integrating cyber strategy into corporate strategy Metrics and KPIs that drive board-level impact Leading cybersecurity innovation across enterprise ecosystems 12:10 \u2013 12:25Customer Success Story &#8211; Reserved for Co-Powered by Partner12:25 &#8211; 12:55Power Panel &#8211; Fractured Trust: The Fragility of Digital Identities In the digital economy, identity is the new perimeter \u2014 and it\u2019s under siege. From deepfake impersonations to credential theft at scale, traditional IAM systems are cracking under pressure. This conversation decodes the new era of identity warfare, the economics of trust, and what it takes to protect people and machines in a borderless, connected ecosystem. Key Areas: Identity fraud and AI-powered impersonation Zero Trust evolution: Beyond the buzzword Privacy vs usability: finding balance Securing digital twins and machine identities 12:55 \u2013 13:10Customer Success Story &#8211; Reserved for Co-Powered by\/Platinum Partner13:10 \u2013 14:00Networking Luncheon at the CyberTech Experience Zone14:00 \u2013 14:30The Grand Cyber Heist: Race for the Bounty Step into the mind of a hacker and the shoes of a cyber defender in this high-octane, interactive challenge. Participants will be divided into teams and tasked with unlocking a secure briefcase containing a \u201cbounty\u201d reward. Using tablets provided, teams will solve codebreakers, encryption puzzles, and cybersecurity challenges, testing their logic, teamwork, and digital intuition. This session not only immerses participants in real-world cyber problem-solving but also highlights the importance of strategic thinking, rapid decision-making, and collaborative defence in a fun, competitive format. 14:30 &#8211; 14:45Customer Success Story &#8211; Reserved for Platinum Partner14:45 \u2013 15:00Fire Side Chat &#8211; Quantum Quandary: When Today\u2019s Encryption Meets Tomorrow\u2019s Computing Quantum computing promises a revolution \u2014 but also a reckoning. The encryption protecting our financial systems, healthcare records, and national secrets may become obsolete overnight. This discussion decodes the quantum threat landscape and outlines how organizations can start futureproofing their data now for a post-quantum world. Key Areas: Understanding the \u201cQ-Day\u201d scenario Quantum-safe cryptography and readiness roadmaps Regulatory and compliance blind spots Timing the transition: too early or too late? 15:00 \u2013 15:15Customer Success Story &#8211; Reserved for Gold Partner15:15 \u2013 15:45The Privacy Panel: India\u2019s DPDPA and the New Data Doctrine India\u2019s Digital Personal Data Protection Act (DPDPA) signals a tectonic shift in how businesses collect, process, and protect personal information \u2014 transforming privacy from a compliance checklist to a cornerstone of corporate trust. As enterprises recalibrate their governance, consent, and accountability frameworks, this panel explores the strategic and cultural dimensions of data protection. Beyond legal adherence, the discussion focuses on how DPDPA can become an engine for innovation, ethical AI, and digital inclusion in the world\u2019s fastest-growing data economy. Key Areas: Privacy as a growth enabler: From compliance to competitiveness Reimagining governance and accountability under DPDPA Cross-border data, localization, and digital trade implicationsBuilding data ethics and user trust in an AI-driven economy 15:45 \u2013 16:00Networking Coffee and Refreshments at the CyberTech Experience Zone16:00 &#8211; 16:15Guest of Honour &#8211; Cybersecurity as National and Corporate Imperative: Leading in a Connected Era Cyber threats today transcend borders, industries, and technologies. This keynote will address how governments, regulators, and enterprises must collaborate to secure digital economies, protect citizens, and enable innovation. The speech can touch upon policy, regulatory foresight, global cyber trends, and the role of leadership in creating resilient and trusted digital ecosystems 16:15 &#8211; 16:40Chief Guest Address &#8211; Securing a Digital Nation: The Strategic Imperative of Cyber Resilience In an era where every sector \u2014 government, business, and society \u2014 depends on digital infrastructure, cybersecurity is no longer optional; it is a national and societal imperative. This keynote explores the strategic, regulatory, and collaborative measures needed to protect critical infrastructure, safeguard citizens\u2019 data, and foster trust in the digital economy. This session will highlight how governments, enterprises, and civil society can work together to build a resilient, secure, and innovative digital ecosystem, ensuring that progress and protection advance hand in hand. 16:40 &#8211; 17:00Awards In an era where\" \/>\n<meta property=\"og:url\" content=\"https:\/\/et-edge.com\/conferences\/securitytech\/agenda\/\" \/>\n<meta property=\"og:site_name\" content=\"ET Edge Security Tech Summit 2025\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-15T05:25:08+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/et-edge.com\/conferences\/securitytech\/agenda\/\",\"url\":\"https:\/\/et-edge.com\/conferences\/securitytech\/agenda\/\",\"name\":\"Agenda - ET Edge Security Tech Summit 2025\",\"isPartOf\":{\"@id\":\"https:\/\/et-edge.com\/conferences\/securitytech\/#website\"},\"datePublished\":\"2024-04-20T08:07:41+00:00\",\"dateModified\":\"2025-10-15T05:25:08+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/et-edge.com\/conferences\/securitytech\/agenda\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/et-edge.com\/conferences\/securitytech\/agenda\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/et-edge.com\/conferences\/securitytech\/agenda\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/et-edge.com\/conferences\/securitytech\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Agenda\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/et-edge.com\/conferences\/securitytech\/#website\",\"url\":\"https:\/\/et-edge.com\/conferences\/securitytech\/\",\"name\":\"ET Edge Security Tech Summit 2025\",\"description\":\"Digital Defenders: The Cyber Imperative for a Resilient Future\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/et-edge.com\/conferences\/securitytech\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Agenda - ET Edge Security Tech Summit 2025","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/et-edge.com\/conferences\/securitytech\/agenda\/","og_locale":"en_US","og_type":"article","og_title":"Agenda - ET Edge Security Tech Summit 2025","og_description":"Agenda 09:00 &#8211; 10:00Registration and Networking10:00 &#8211; 10:10Context Setting &#8211; ET Edge10:10 &#8211; 10:30Inaugural Keynote &#8211; The Cyber Imperative: Risk, Resilience, and the Road Ahead In today\u2019s hyperconnected world, cybersecurity is no longer a technical concern \u2014 it is a strategic business imperative that impacts growth, reputation, and shareholder value. From AI-driven operations to cloud-native ecosystems, enterprises face unprecedented risks that can disrupt business continuity overnight. This inaugural session sets the stage for the summit by exploring how organizations can anticipate threats, embed resilience, and convert risk into opportunity. Thought leaders will share insights on aligning cybersecurity with corporate strategy, creating board-level accountability, and leveraging risk management as a driver of trust and competitive advantage. 10:30 &#8211; 10:45Customer Success Story &#8211; Reserved for Title Partner10:45 &#8211; 11:15Boardroom Breach: When Cyber Risk Becomes a Business Crisis (CEOs\/MDs\/Founders) Cybersecurity is no longer just an IT concern \u2014 it\u2019s a strategic business issue that can impact growth, reputation, and shareholder value. In today\u2019s digital economy, breaches and data disruptions can halt operations, erode trust, and trigger financial loss overnight. This panel explores insights in to cyber risk as a core element of corporate strategy, integrate resilience into decision-making, and convert security investments into long-term business value. Leaders will explore frameworks for board-level accountability, risk quantification, and aligning cybersecurity with overall organizational objectives. Key Discussion Areas: Reframing cyber as a strategic business risk, not a technical issue Elevating executive literacy: Making informed, board-level decisions on security Metrics and models to quantify cyber risk in financial and operational terms Turning cybersecurity initiatives into tangible business value and competitive advantage 11:15 \u2013 11:40Networking over Coffee and Refreshments at the CyberTech Experience Zone11:40 \u2013 12:00Trilogue &#8211; Strategic Sentinels: The Rise of CISO 2.0 The role of the CISO is evolving from defender to strategic architect of resilience. Beyond firewalls and endpoint protection, today\u2019s CISO must align cybersecurity with business goals, manage cross-functional risk, and anticipate emerging threats in AI, cloud, and critical infrastructure. This panel explores how CISOs can balance tactical defence with strategic foresight, shaping security as a core driver of competitive advantage. Key Discussion Areas: Reimagining the CISO as a business leader Integrating cyber strategy into corporate strategy Metrics and KPIs that drive board-level impact Leading cybersecurity innovation across enterprise ecosystems 12:10 \u2013 12:25Customer Success Story &#8211; Reserved for Co-Powered by Partner12:25 &#8211; 12:55Power Panel &#8211; Fractured Trust: The Fragility of Digital Identities In the digital economy, identity is the new perimeter \u2014 and it\u2019s under siege. From deepfake impersonations to credential theft at scale, traditional IAM systems are cracking under pressure. This conversation decodes the new era of identity warfare, the economics of trust, and what it takes to protect people and machines in a borderless, connected ecosystem. Key Areas: Identity fraud and AI-powered impersonation Zero Trust evolution: Beyond the buzzword Privacy vs usability: finding balance Securing digital twins and machine identities 12:55 \u2013 13:10Customer Success Story &#8211; Reserved for Co-Powered by\/Platinum Partner13:10 \u2013 14:00Networking Luncheon at the CyberTech Experience Zone14:00 \u2013 14:30The Grand Cyber Heist: Race for the Bounty Step into the mind of a hacker and the shoes of a cyber defender in this high-octane, interactive challenge. Participants will be divided into teams and tasked with unlocking a secure briefcase containing a \u201cbounty\u201d reward. Using tablets provided, teams will solve codebreakers, encryption puzzles, and cybersecurity challenges, testing their logic, teamwork, and digital intuition. This session not only immerses participants in real-world cyber problem-solving but also highlights the importance of strategic thinking, rapid decision-making, and collaborative defence in a fun, competitive format. 14:30 &#8211; 14:45Customer Success Story &#8211; Reserved for Platinum Partner14:45 \u2013 15:00Fire Side Chat &#8211; Quantum Quandary: When Today\u2019s Encryption Meets Tomorrow\u2019s Computing Quantum computing promises a revolution \u2014 but also a reckoning. The encryption protecting our financial systems, healthcare records, and national secrets may become obsolete overnight. This discussion decodes the quantum threat landscape and outlines how organizations can start futureproofing their data now for a post-quantum world. Key Areas: Understanding the \u201cQ-Day\u201d scenario Quantum-safe cryptography and readiness roadmaps Regulatory and compliance blind spots Timing the transition: too early or too late? 15:00 \u2013 15:15Customer Success Story &#8211; Reserved for Gold Partner15:15 \u2013 15:45The Privacy Panel: India\u2019s DPDPA and the New Data Doctrine India\u2019s Digital Personal Data Protection Act (DPDPA) signals a tectonic shift in how businesses collect, process, and protect personal information \u2014 transforming privacy from a compliance checklist to a cornerstone of corporate trust. As enterprises recalibrate their governance, consent, and accountability frameworks, this panel explores the strategic and cultural dimensions of data protection. Beyond legal adherence, the discussion focuses on how DPDPA can become an engine for innovation, ethical AI, and digital inclusion in the world\u2019s fastest-growing data economy. Key Areas: Privacy as a growth enabler: From compliance to competitiveness Reimagining governance and accountability under DPDPA Cross-border data, localization, and digital trade implicationsBuilding data ethics and user trust in an AI-driven economy 15:45 \u2013 16:00Networking Coffee and Refreshments at the CyberTech Experience Zone16:00 &#8211; 16:15Guest of Honour &#8211; Cybersecurity as National and Corporate Imperative: Leading in a Connected Era Cyber threats today transcend borders, industries, and technologies. This keynote will address how governments, regulators, and enterprises must collaborate to secure digital economies, protect citizens, and enable innovation. The speech can touch upon policy, regulatory foresight, global cyber trends, and the role of leadership in creating resilient and trusted digital ecosystems 16:15 &#8211; 16:40Chief Guest Address &#8211; Securing a Digital Nation: The Strategic Imperative of Cyber Resilience In an era where every sector \u2014 government, business, and society \u2014 depends on digital infrastructure, cybersecurity is no longer optional; it is a national and societal imperative. This keynote explores the strategic, regulatory, and collaborative measures needed to protect critical infrastructure, safeguard citizens\u2019 data, and foster trust in the digital economy. This session will highlight how governments, enterprises, and civil society can work together to build a resilient, secure, and innovative digital ecosystem, ensuring that progress and protection advance hand in hand. 16:40 &#8211; 17:00Awards In an era where","og_url":"https:\/\/et-edge.com\/conferences\/securitytech\/agenda\/","og_site_name":"ET Edge Security Tech Summit 2025","article_modified_time":"2025-10-15T05:25:08+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/et-edge.com\/conferences\/securitytech\/agenda\/","url":"https:\/\/et-edge.com\/conferences\/securitytech\/agenda\/","name":"Agenda - ET Edge Security Tech Summit 2025","isPartOf":{"@id":"https:\/\/et-edge.com\/conferences\/securitytech\/#website"},"datePublished":"2024-04-20T08:07:41+00:00","dateModified":"2025-10-15T05:25:08+00:00","breadcrumb":{"@id":"https:\/\/et-edge.com\/conferences\/securitytech\/agenda\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/et-edge.com\/conferences\/securitytech\/agenda\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/et-edge.com\/conferences\/securitytech\/agenda\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/et-edge.com\/conferences\/securitytech\/"},{"@type":"ListItem","position":2,"name":"Agenda"}]},{"@type":"WebSite","@id":"https:\/\/et-edge.com\/conferences\/securitytech\/#website","url":"https:\/\/et-edge.com\/conferences\/securitytech\/","name":"ET Edge Security Tech Summit 2025","description":"Digital Defenders: The Cyber Imperative for a Resilient Future","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/et-edge.com\/conferences\/securitytech\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/et-edge.com\/conferences\/securitytech\/wp-json\/wp\/v2\/pages\/2865","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/et-edge.com\/conferences\/securitytech\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/et-edge.com\/conferences\/securitytech\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/et-edge.com\/conferences\/securitytech\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/et-edge.com\/conferences\/securitytech\/wp-json\/wp\/v2\/comments?post=2865"}],"version-history":[{"count":151,"href":"https:\/\/et-edge.com\/conferences\/securitytech\/wp-json\/wp\/v2\/pages\/2865\/revisions"}],"predecessor-version":[{"id":6380,"href":"https:\/\/et-edge.com\/conferences\/securitytech\/wp-json\/wp\/v2\/pages\/2865\/revisions\/6380"}],"wp:attachment":[{"href":"https:\/\/et-edge.com\/conferences\/securitytech\/wp-json\/wp\/v2\/media?parent=2865"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}