{"id":6636,"date":"2025-11-26T16:56:58","date_gmt":"2025-11-26T11:26:58","guid":{"rendered":"https:\/\/et-edge.com\/conferences\/securitytech\/?page_id=6636"},"modified":"2025-11-26T16:58:38","modified_gmt":"2025-11-26T11:28:38","slug":"advisory","status":"publish","type":"page","link":"https:\/\/et-edge.com\/conferences\/securitytech\/advisory\/","title":{"rendered":"Advisory"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"6636\" class=\"elementor elementor-6636\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-fe1ae1b elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"fe1ae1b\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b52fa54\" data-id=\"b52fa54\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-219e00d elementor-widget elementor-widget-heading\" data-id=\"219e00d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Advisory<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cdfc7d6 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"cdfc7d6\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0367b9c\" data-id=\"0367b9c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-89ac789 elementor-widget elementor-widget-shortcode\" data-id=\"89ac789\" data-element_type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\"><div class='rt-container-fluid rt-team-container rt-pos-r rt-team-container-6641 first-speakers rt-grayscale' id='rt-team-container-2382351275'  data-layout='layout1' data-desktop-col='4'  data-tab-col='2'  data-mobile-col='1' data-sc-id='6641' data-popup-bg=''><div data-title='Loading ...' class='rt-row rt-content-loader layout1 ttp-even ttp-pre-loader'><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12  even-grid-item rt-grid-item\" data-id=\"5742\"><div class=\"single-team-area\"><div class=\"single-team\"><figure><a class=\"\" data-id=\"5742\" target=\"_self\" href=\"https:\/\/et-edge.com\/conferences\/securitytech\/team\/advocate-puneet-bhasin\/\"><img fetchpriority=\"high\" decoding=\"async\" width=\"400\" height=\"400\" src=\"https:\/\/et-edge.com\/conferences\/securitytech\/wp-content\/uploads\/2025\/03\/Advocate-Puneet-Bhasin.png\" class=\"img-responsive rt-team-img\" alt=\"Advocate Puneet Bhasin\" \/><\/a><\/figure><\/div><div class=\"tlp-content\"><h3><span class=\"team-name\"><a class=\"\" data-id=\"5742\" target=\"_self\" title=\"Advocate Puneet Bhasin\" href=\"https:\/\/et-edge.com\/conferences\/securitytech\/team\/advocate-puneet-bhasin\/\">Advocate Puneet Bhasin<\/a><\/span><\/h3><\/div><div class=\"short-bio\"><p>Cyber Law Expert, Founder of Cyberjure Legal Consulting and Honorary Advisor to United Nations Digital Public Goods Privacy Standard<\/p>\n<\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12  even-grid-item rt-grid-item\" data-id=\"6645\"><div class=\"single-team-area\"><div class=\"single-team\"><figure><a class=\"\" data-id=\"6645\" target=\"_self\" href=\"https:\/\/et-edge.com\/conferences\/securitytech\/team\/ashutosh-jain\/\"><img decoding=\"async\" width=\"400\" height=\"400\" src=\"https:\/\/et-edge.com\/conferences\/securitytech\/wp-content\/uploads\/2025\/11\/Ashutosh-Jain-1-_1_-removebg-preview.png\" class=\"img-responsive rt-team-img\" alt=\"Ashutosh Jain\" \/><\/a><\/figure><\/div><div class=\"tlp-content\"><h3><span class=\"team-name\"><a class=\"\" data-id=\"6645\" target=\"_self\" title=\"Ashutosh Jain\" href=\"https:\/\/et-edge.com\/conferences\/securitytech\/team\/ashutosh-jain\/\">Ashutosh Jain<\/a><\/span><\/h3><\/div><div class=\"short-bio\"><p>Cyber Security and Risk Management Leader, Former CISO, IndusInd Bank<\/p>\n<\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12  even-grid-item rt-grid-item\" data-id=\"6649\"><div class=\"single-team-area\"><div class=\"single-team\"><figure><a class=\"\" data-id=\"6649\" target=\"_self\" href=\"https:\/\/et-edge.com\/conferences\/securitytech\/team\/dr-yusuf-hashmi\/\"><img decoding=\"async\" width=\"400\" height=\"400\" src=\"https:\/\/et-edge.com\/conferences\/securitytech\/wp-content\/uploads\/2025\/11\/Dr.-Yusuf-Hashmi-Jubilant.jpg\" class=\"img-responsive rt-team-img\" alt=\"Dr. Yusuf Hashmi\" \/><\/a><\/figure><\/div><div class=\"tlp-content\"><h3><span class=\"team-name\"><a class=\"\" data-id=\"6649\" target=\"_self\" title=\"Dr. Yusuf Hashmi\" href=\"https:\/\/et-edge.com\/conferences\/securitytech\/team\/dr-yusuf-hashmi\/\">Dr. Yusuf Hashmi<\/a><\/span><\/h3><\/div><div class=\"short-bio\"><p> Group CISO, Jubilant Bhartia Group<\/p>\n<\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12  even-grid-item rt-grid-item\" data-id=\"6647\"><div class=\"single-team-area\"><div class=\"single-team\"><figure><a class=\"\" data-id=\"6647\" target=\"_self\" href=\"https:\/\/et-edge.com\/conferences\/securitytech\/team\/milind-mungale\/\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"400\" src=\"https:\/\/et-edge.com\/conferences\/securitytech\/wp-content\/uploads\/2025\/11\/Milind-Mungale-_1_-removebg-preview.png\" class=\"img-responsive rt-team-img\" alt=\"Milind Mungale\" \/><\/a><\/figure><\/div><div class=\"tlp-content\"><h3><span class=\"team-name\"><a class=\"\" data-id=\"6647\" target=\"_self\" title=\"Milind Mungale\" href=\"https:\/\/et-edge.com\/conferences\/securitytech\/team\/milind-mungale\/\">Milind Mungale<\/a><\/span><\/h3><\/div><div class=\"short-bio\"><p>Former Executive Vice President &amp; CISO, NSDL e-Governance Infrastructure<\/p>\n<\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12  even-grid-item rt-grid-item\" data-id=\"6651\"><div class=\"single-team-area\"><div class=\"single-team\"><figure><a class=\"\" data-id=\"6651\" target=\"_self\" href=\"https:\/\/et-edge.com\/conferences\/securitytech\/team\/yask-sharma\/\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"400\" src=\"https:\/\/et-edge.com\/conferences\/securitytech\/wp-content\/uploads\/2025\/11\/Yask-Sharma-removebg-preview.png\" class=\"img-responsive rt-team-img\" alt=\"Yask Sharma\" \/><\/a><\/figure><\/div><div class=\"tlp-content\"><h3><span class=\"team-name\"><a class=\"\" data-id=\"6651\" target=\"_self\" title=\"Yask Sharma\" href=\"https:\/\/et-edge.com\/conferences\/securitytech\/team\/yask-sharma\/\">Yask Sharma<\/a><\/span><\/h3><\/div><div class=\"short-bio\"><p>CISO, Indian Oil Corporation<\/p>\n<\/div><\/div><\/div><div class=\"rt-loading-overlay\"><\/div><div class=\"rt-loading rt-ball-clip-rotate\"><div><\/div><\/div><\/div><\/div><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Advisory<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/other_page.php","meta":{"footnotes":""},"class_list":["post-6636","page","type-page","status-publish","hentry"],"aioseo_notices":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Advisory - ET Edge Security Tech Summit 2025<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/et-edge.com\/conferences\/securitytech\/advisory\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Advisory - ET Edge Security Tech Summit 2025\" \/>\n<meta property=\"og:description\" content=\"Advisory\" \/>\n<meta property=\"og:url\" content=\"https:\/\/et-edge.com\/conferences\/securitytech\/advisory\/\" \/>\n<meta property=\"og:site_name\" content=\"ET Edge Security Tech Summit 2025\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-26T11:28:38+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/et-edge.com\/conferences\/securitytech\/advisory\/\",\"url\":\"https:\/\/et-edge.com\/conferences\/securitytech\/advisory\/\",\"name\":\"Advisory - ET Edge Security Tech Summit 2025\",\"isPartOf\":{\"@id\":\"https:\/\/et-edge.com\/conferences\/securitytech\/#website\"},\"datePublished\":\"2025-11-26T11:26:58+00:00\",\"dateModified\":\"2025-11-26T11:28:38+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/et-edge.com\/conferences\/securitytech\/advisory\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/et-edge.com\/conferences\/securitytech\/advisory\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/et-edge.com\/conferences\/securitytech\/advisory\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/et-edge.com\/conferences\/securitytech\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Advisory\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/et-edge.com\/conferences\/securitytech\/#website\",\"url\":\"https:\/\/et-edge.com\/conferences\/securitytech\/\",\"name\":\"ET Edge Security Tech Summit 2025\",\"description\":\"Digital Defenders: The Cyber Imperative for a Resilient Future\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/et-edge.com\/conferences\/securitytech\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Advisory - ET Edge Security Tech Summit 2025","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/et-edge.com\/conferences\/securitytech\/advisory\/","og_locale":"en_US","og_type":"article","og_title":"Advisory - ET Edge Security Tech Summit 2025","og_description":"Advisory","og_url":"https:\/\/et-edge.com\/conferences\/securitytech\/advisory\/","og_site_name":"ET Edge Security Tech Summit 2025","article_modified_time":"2025-11-26T11:28:38+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/et-edge.com\/conferences\/securitytech\/advisory\/","url":"https:\/\/et-edge.com\/conferences\/securitytech\/advisory\/","name":"Advisory - ET Edge Security Tech Summit 2025","isPartOf":{"@id":"https:\/\/et-edge.com\/conferences\/securitytech\/#website"},"datePublished":"2025-11-26T11:26:58+00:00","dateModified":"2025-11-26T11:28:38+00:00","breadcrumb":{"@id":"https:\/\/et-edge.com\/conferences\/securitytech\/advisory\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/et-edge.com\/conferences\/securitytech\/advisory\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/et-edge.com\/conferences\/securitytech\/advisory\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/et-edge.com\/conferences\/securitytech\/"},{"@type":"ListItem","position":2,"name":"Advisory"}]},{"@type":"WebSite","@id":"https:\/\/et-edge.com\/conferences\/securitytech\/#website","url":"https:\/\/et-edge.com\/conferences\/securitytech\/","name":"ET Edge Security Tech Summit 2025","description":"Digital Defenders: The Cyber Imperative for a Resilient Future","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/et-edge.com\/conferences\/securitytech\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/et-edge.com\/conferences\/securitytech\/wp-json\/wp\/v2\/pages\/6636","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/et-edge.com\/conferences\/securitytech\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/et-edge.com\/conferences\/securitytech\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/et-edge.com\/conferences\/securitytech\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/et-edge.com\/conferences\/securitytech\/wp-json\/wp\/v2\/comments?post=6636"}],"version-history":[{"count":7,"href":"https:\/\/et-edge.com\/conferences\/securitytech\/wp-json\/wp\/v2\/pages\/6636\/revisions"}],"predecessor-version":[{"id":6644,"href":"https:\/\/et-edge.com\/conferences\/securitytech\/wp-json\/wp\/v2\/pages\/6636\/revisions\/6644"}],"wp:attachment":[{"href":"https:\/\/et-edge.com\/conferences\/securitytech\/wp-json\/wp\/v2\/media?parent=6636"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}