HOME CONFERENCE AGENDA PARTNER CONTACT EDITION 1
19 Dec 2017
BANGALORE
20 Dec 2017
DELHI
21 Dec 2017
DELHI

THE ECONOMIC TIMES CYBER SECURITY SUMMIT

The Microsoft and ET Cyber Security Insights Workshop is an effort to bring together CISOs and Security heads of organisations, to understand the business cost of the threats, their implications for the IT infrastructure, business objectives, and the pace of digital transformation of their organisation. This will be a two city event- in Bangalore on December 18th, and in Delhi on Dec 20th.

The insights herein will drive solutions, as a group, and highlight the ways to create infrastructure, implement solutions and strategies to best counter these threats.

Industry Background

A recent report by McAfee says what cyber security experts consider to be an understatement- ‘the ransom ware outbreaks of 2017 offer just a taste of what's to come as hackers develop new strategies and "business models." 2018 is slated to bring back new attacks and some vicious innovations to attack transformative technologies.

With data increasingly becoming the new ‘Oil’, there are newer risks in the offing for IoT, analytics and newer technologies. The implementation of the European Union's General Data Protection Regulation, that places limits how data is used and sold, but it would hold good only for companies with operations in the EU. Globally, industry expects leakage and risk to granular metadata stolen from breaches this year, and this will put to bigger risk the demographic and psychographic Big Data algorithms powered by machine-learning and artificial intelligence as well.

The only real strategy that will arm CIOs and CISOs to fight off these threats in any measure will tend to be a structured, concerted policy and its strict implementation.


Forum Structure

The workshop will consist of:
AGENDA

PROGRAMME SCHEDULE

The Economic Times Cyber Security Summit


10.00 - 10.30
Registration
10.30 - 10.35
Opening remarks by ET Edge
10.35 - 10.50
Expert Presentation: Countering Cyber threats to Transformation Plans
10.50 - 11.05
Tea/coffee/networking break
11.05 - 12.45
Reverse Use Cases Workshop: Cyber Security Strategies for Disruptive Growth
Groups of participants will be created, and each group will create a presentation in 3 slides on:
  • Elaborate on your line of business and the plans for business growth/ transformation
  • Discuss the new technologies needed to meet the business objective
  • What cyber security risks have you identified with this tech-leverage
  • What could be the business cost of these risks
  • Identifying solutions for mitigation.
30 minutes for discussing and creating the presentation. an expert will be mentoring the teams, in case of requirement. Each team will get 5 minutes time for presentation. After all the presentations are over, participants will be asked to vote. You can vote for any team other than your own. The team that gets the maximum votes is the winner. Each member of the winning team will win a Kindle eReader
12.45 - 13.00
Keynote + Q&A: Microsoft
13.00 onwards
Lunch

10.00 - 10.30
Registration
10.30 - 10.35
Opening remarks by ET Edge
10.35 - 11.00
Expert Presentation: Countering Cyber threats to Transformation Plans
11.00 - 11.10
Tea/coffee/networking break
11.10 - 12.45
Reverse Use Cases Workshop: Cyber Security Strategies for Disruptive Growth
Groups of participants will be created, and each group will create a presentation in 3 slides on:
  • Elaborate on your line of business and the plans for business growth/ transformation
  • Discuss the new technologies needed to meet the business objective
  • What cyber security risks have you identified with this tech-leverage
  • What could be the business cost of these risks
  • Identifying solutions for mitigation.
30 minutes for discussing and creating the presentation. an expert will be mentoring the teams, in case of requirement. Each team will get 5 minutes time for presentation. After all the presentations are over, participants will be asked to vote. You can vote for any team other than your own. The team that gets the maximum votes is the winner. Each member of the winning team will win a Kindle eReader
12.45 - 13.00
Keynote + Q&A: Microsoft
13.00 onwards
Lunch

10.00 - 10.30
Registration
10.30 - 10.35
Opening remarks by ET Edge
10.35 - 10.50
Expert Presentation
10.50 - 11.05
Tea/coffee/networking break
11.05 - 12.45
Inclusive Session Workshop: Balancing growth with Security
the participants will be divided into groups of 5 each. here is the exercise to include each group. Your organization has voted to adopt a new technology to meet growing business needs as well as optimizing process costs. The new implementations come with a predictable as well a perceived security risk that could jeopardize your plans. The secret is to balance the risk with the growth and expansion plans.

Once you identify the risks, you need to work with the team to propose a solution framework to secure your organization against the latest and predictable/ perceived cyber threats, to ensure a secure future workplace. You need to suggest a roadmap to achieve the objectives outlines. Use about 5 slides to create the solution presentation in this flow:
  • Names of team members and the representative who will present it to the board
  • Your articulation of the issues/challenges
  • A slogan/mission statement for your solution
  • The Solution
  • Business advantage/ resolution that this concept offers
Each group will get 30 minutes for discussing the issues, identifying the solution then and creating the presentation. An expert (MS) will be mentoring the teams, in case of requirement. Each team will get 5 minutes’ time for presentation on the stage
12.45 - 13.00
Keynote + Q&A: Microsoft
13.00 onwards
Lunch
PARTNER

TITLE PARTNER


CONTACT


1st floor, Vakratunda Corporate Park, Vishweshwar Nagar, Off Aarey Road, Next to Udipi Vihar, Goregaon East - 400063

Phone: +91 8286 087 855

Email: info@et-cybersecurity.com