The sixteenth edition of the Annual Information Security Summit(AISS) is slated to happen in virtual mode on December 15, 16 & 17, 2021. The journey charted by the Summit over the past fifteen years has been marked by increasingly compelling, relevant and futuristic content that gets shaped by multiple factors and contexts and has endeavoured to cover the entire spectrum of Cyber Security & Data Protection.
Keynote Address by EY
Target-DSCI-EWF Workshop
(Closed Door- By Invite Only)
For any query, reach out to us at events@dsci.in
Masterclass by Microsoft
Masterclass by Tata Communications
Masterclass by Palo Alto Networks
Plenary Session
... Basics Steps and Advanced Approaches
Keynote Address by Microsoft
Track Session
... Drivers, Capabilities, References, Principles, Areas, & Coverage
Track Session
... Roles, Responsibilities, & Organization Culture
Track Session
... Preparedness, Interventions, and Accountability
Track Session
... Refining Recovery & Continuity in the age of Extreme Digitization
Track Session
... Capabilities, Technologies, and Integration
Track Session
... Function, Automation, & Process Revitalization
Track Session
... Turning on the hardware chips to secure hybrid world
Track Session
... Consolidating, Converging, Integrating, Automating, and Simplifying
Track Session
... Trust, Security, Privacy & Innovation
Keynote Address by Ramognee
Keynote Address by BlackBerry
Keynote Address by Trend Micro
Track Session
... How to Mitigate Risk while Accelerating Innovation
Track Session
... Criticality of Identity & Access Management
Track Session
... Roadmap for the Convergence
Track Session
... Individual Effort, Collective Actions, & National Preparedness
Fireside Chat by Indusface
Keynote Address by SISA
Masterclass by Synopsys
Masterclass by McAfee Enterprise
Masterclass by Tenable
Plenary Session
... Program and its Benefits
Keynote Address by Palo Alto Networks
Keynote Address by Tata Communication
Keynote Address by Dell
Special Interaction
Track Session
... Key Challenge in Realizing Digitization Possibilities of the OT Environment
Track Session
... Program and its Benefits
Track Session
... What is the Best for Security Buyers?
Track Session
... Delivering Security in Fast-paced Digitization
Track Session
Track Session
... Securing Pipeline of the Development of Modern Apps
Track Session
... Data Collection, Reconciliation, Prioritization, & Triggering Response
Track Session
... Making use of approaches and capabilities to address nuances, complexities, and scale
Track Session
Track Session
... Policy actions & proposals
Track Session
... Industry Actions and Regulatory Interventions to improve the Baseline
Track Session
... Conflict between Delivery & Innovation
Track Session
... Visibility, Coverage, Accuracy, Intelligence, Tools, and Expertise
Track Session
... Tools, Technologies, Solutions, and Frameworks
Keynote Address by McAfee Enterprise
Keynote Address by Target
Track Session
... Blood diamond in the Security Trade
Track Session
... Plan, Processes, Technologies, Expertise, & Services
Track Session
... Role of Threat Intelligence
Track Session
... Constrained Resources Research/Innovation Possibilities
Keynote Address by FireEye
Masterclass by Cisco
Plenary Session
... Rising digital footprints and fraud possibilities
Keynote Address by Crowdstrike
Keynote Address by Vehere
Keynote Address by DigiCert
01:15 pm - 01:20 pm
01:20 pm - 01:25 pm
01:25 pm - 01:30 pm
01:35 pm - 01:50 pm
01:50 pm - 02:05 pm
02:05 pm - 02:20 pm
02:20 pm - 02:35 pm
02:35 pm - 02:50 pm
02:50 pm - 03:05 pm
03:05 pm - 03:20 pm
Track Session
... Targeted, Polymorphic, Malware Associated, & Double/Triple Encryption
Track Session
... VA/PT, VM, and CTD in ICS environment
Track Session
... Role of ID and ID Verification in the Volume & Velocity of Transaction Processing
Track Session
... Risk Scenarios, Realities, and Mitigation
Track Session
... Privacy Engineering to Enabled Digital Innovation
Track Session
... Managed Security Services in the Paradigm of Cloud
Track Session
... Thinking through Security
Track Session
... Data Sharing, Privacy & security considerations
Keynote Address by Synopsys
Keynote Address by Lookout
Plenary Session
Cloud Native
Exploit Trade
Hybrid Work
ICS Vulnerabilities
Fraud Frontiers
Digital Resiliency
Ransomware Pandemic
Security Governance
Cyber Law
Security Kinetic Impact
5G Security
Digital Security
Data Governance
Security Engineering
Security Consolidation
Cyber Geopolitics
Cyberspace Weaponization
Security Entrepreneurship
Crypto Possibilities
Privacy Compliance