DATE: Wednesday, October 15, 2020

TIME: 04:00 p.m. - 05:00 p.m. IST

Sponsers

Agenda: A Unified approach to Threat Management

As businesses are expanding their digital footprint, traditional cyber-security programs need a disruptive change. Your cybersecurity strategies should sync with your efforts towards delivering the continuity of services in an environment of trust, privacy, resiliency & compliance. However, adding more point solutions that are often disconnected and are trapping data in silos is not enough for a robust risk management planning.

Digital transformation goes hand in hand with the adoption of a new IT environment, which comprises a mix of on-premises and open, multi-cloud environments. This has undoubtedly resulted in better data management and visualization across silos. However, the hybrid multi-cloud structure comes with its own sets of challenges, such as increased vulnerability to business-critical risks, and the unavoidable cost of integrating tools and migrating the data.

Modern security requires a unified approach to uncover hidden threats across any cloud or on-premises location. This will help businesses in making more informed risk-based decisions.

Please join us during the upcoming webinar to learn how security threat management solutions can unite and strengthen your defenses. The emphasis will be on the four pillars of Threat Management – Visibility, Detection, Investigation and Response. It’s time to discover their importance in analyzing 100’s of billions of events and turn them into 10’s of high-fidelity alert.

Remember that with more than 90 percent alert priority and efficient investigations, any organization can resolve security incidents 8x faster!

  • How Threat Management strategy has evolved over the decade
  • Four pillars of Threat Management – Visibility, Detection, Investigation and Response
  • The new challenges to the cyber-security ecosystem Enterprises are seeing
  • The importance for CISOs to start looking forward and evaluate keeping future in scope.
  • How adoption of new/ further evolved solutions which can be introduced to the processes.

TOPICS AND PANELIST

Dr. Lopah Mudraa Basu, Global CIO, CISO, CRISC, CISM - Nissan Motor Corporation

Dr. Lopa Mudraa Basu, a leading Security Evangelist with 18+ years of rich, versatile experience in Information Security, Data Privacy, Risk Management & Governance with a proven performance record of delivering value as business enabler by transforming Security & Privacy to business USP thereby boosting the business confidence by providing secure platform to operate & explore new avenues of revenue generation to achieve intended business goal safely. She also authors articles and is a regular speaker & panelist in the professional public domain on the same.

Information Security Approach For HR Tech Industry:

Saurabh Gugnani, Head IT & Security at PeopleStrong technologies pvt. Ltd

Saurabh is a result-oriented IT leader offering 14+ years of experience in IT Service Management/Infrastructure Services/Service Delivery & Leadership with proficiency at grasping new technical concepts quickly and utilizing the same in a productive manner. He is deft in analysing information system needs, evaluating end-user requirements, custom designing solutions and undertaking troubleshooting activities for complex information system management.

How To Secure Digital Platforms:

Tusnin Das, GM- Security, Times Internet Limited

Tusnin Das is a seasoned Information Security professional with a wide variety of information security skill-sets. An expert in setting up enterprise wide information security competency centers with extensive experience in setting up and running application security program and managing information security teams.

Anuj Singh,Head of IT(Sr. GM IT) at Fena Private Limited

Result oriented IT professional with more than 22 years of experience in Manufacturing IT domain. Accomplished track record of diverse responsibilities including Information technology long term and short term Strategic Roadmap, Information Security Risk Management, Services Management involving SAP/IT Infrastructure/ System/Application/Mobility/Database in Enterprise environment, Project Management, Process Automation & Industry 4.0. Worked with leading Indian and MNC organizations like Subros, MAHYCO, Metenere ltd, Roulunds Braking and Kajaria Ceramics. Working with Fena (P) Ltd, a leading FMCG as Head of IT (Sr. General Manager) and primary role to provide leadership vision, strategic alignment of IT Technology Roadmap with Business Demand & Strategy, deployment of InfoSec policy and IT systems.

Vipul Anand,Practice Leader - HiTech IT, and Tech practice at Praxis Global Alliance

With a Total IT Experience of +28 years CIO experience +15 years global and multicultural team management experience, Vipul Anand actively handles technology augmentation connects People , Process and Technology with his proven skill sets of erecting a strong tech enabled organization taking stake holders along , handling change management issues , handling products and technologies and providing thought leadership at the helm of the organization and works as a business partner across the businesses.

Addressing the Threat Management Challenge with a Unified Approach:

Gagan Sugandh, IBM Global Markets-Cognitive Solutions, IBM

Gagan Sugandh has vast experience in designing, implementing and leading Security Operations for multiple organizations. He has also worked with many customers for designing & implementing Nex-Gen Security Technologies and Threat Management Strategy.

End-To-End Implementation Of UTM To Minimize Cyber Risk Exposure:

Asheet Makhija,Head - Global Delivery & Service Excellence, SISL Infotech

With more than 27 years of experience in the IT industry, he has worked in leadership roles for organizations like SISL, IBM, Esri India, Microsoft, Veritas and CMC. He is passionate about partnering with customers to deliver value and improve their systems and operations.

Who Should Attend?

  • CIOs facing the challenge of ensuring end-to-end security of IT infrastructure
  • Senior level executives who influence business decisions for enterprise security
  • IT heads who are seeking enhanced security in multi-cloud environment
  • Chief Digital Officers who are apprehensive of the security of digital platforms
  • Network Security Heads who are responsible for securing their networking infrastructure

What you will learn:

  • How to improve Security Visibility
  • How to Detect the security vulnerabilities and mitigate the threat vectors
  • How to Investigate into potential threats
  • What should be the ideal response in the event of a security threat