The seventeenth edition of the Annual Information Security Summit(AISS) is slated to happen in physical mode on December 20, 21 & 22, 2022. Over the past sixteen years, AISS has witnessed increasingly compelling, relevant and futuristic content that gets shaped by multiple factors and contexts and has endeavoured to cover the entire spectrum of Cyber Security & Data Protection. The contribution of the industry has been immense and continues to shape its journey.
Amidst the rapidly changing business and technology landscape and highly volatile cyberspace, it becomes important to stay current on the present context and anticipate the challenges in the offing. AISS agenda is typically characterized by presence of a diverse set of themes, sub themes, topics and sub-topics, multiple tracks, varied session formats and plethora of activities and experiences that make up for a rich three-day engagement and learning for the delegates.
Engineering Security
SecOps is CollabOps
Resiliency of digital enterprises
Cyber Physical System Security: Regulation and ground realities
Software supply chain security
Strategy: scenario and actuals
Critical technology and geopolitics
Consolidate or innovate
RegTech
Frauds: local operator; Global design
Ransomware: what we really need?
TVM: when the world is meshing up
Level 3 below: attacks on hardware & embedded
Identities: you and your machines
Cloud: Planes of Security Thinking
Privacy: Starting, progressing or ...waiting?
09:30 am - 01:00 pm | Firmware Reverse Engineering with Ghidhra » Read more
Ghidra is a software reverse engineering (SRE) suite of tools developed by the NSA. Among many other things it can do, Ghidhra helps in the firmware reverse engineering of embedded systems. With the widespread prevalence of embedded systems, the participants will be trained to get started with Ghidhra and evaluate one firmware image taken from a device in production.
Prerequisites: The target audience is beginners in reverse engineering, and no pre-requisite knowledge is required.
02:00 pm - 05:00 pm | Bluetooth Hacking » Read more
Participants will be trained in Bluetooth hacking using low-cost hardware tools and open-source software. By the end of the event, they will successfully perform a replay attack on a popular consumer-grade device.
Prerequisites: Although a beginner-friendly workshop, a high-level understanding of BLE will be nice-to-have. However, BLE basics shall be covered during the workshop.
Masterclass by
Masterclass by
Masterclass by
Masterclass by
Masterclass by
Masterclass by
Masterclass by
Masterclass by
Masterclass by
Fireside Chat by
Diversity Session
Breakfast Session
Plenary Session
... Bringing technology, architecture, policy, and law enforcement efforts together
Book Launch
Keynote by
Keynote by
Keynote by
Keynote by
Launch by
Keynote by
02:00 pm - 02:30 pm
Inauguration
02:30 pm - 02:45 pm
Evolving Ransomware Threats & Law Enforcement...What needs to be done?
02:45 pm - 03:00 pm
Evidence Recovery from Damaged & Non-responsive Digital Devices
03:00 pm - 03:15 pm
Automating Digital Forensics & Incident Response
03:15 pm - 03:30 pm
Role of Digital Evidence Expert Testimony - the US Experience
03:30 pm - 03:45 pm
Smart Cities & Digital Forensics... Future Challenges
03:45 pm - 04:00 pm
Paradigms for Attribution of Dark Web Forensics
04:00 pm - 05:00 pm
Design Thinking Workshop *** By invite only ***
Track Session
... Interventions, processes, story boards, recording, tools, and responsibilities
Track Session
... For your and national cyber security design and operations
Track Session
... What Russia Ukraine conflict teaches us?
Track Session
... Secure communication protocols for IoT security
Track Session
... What it really means? And, how they shape your cloud strategies
Track Session
... Architecture, capabilities, strategies for OT incident response
Track Session
... Technology and Process Design, Automation, and Demonstration
Track Session
... A real and imminent threat demanding fundamental changes
Track Session
... When is borderless, hybrid, cloud enabled, and extending
Track Session
... Inculcating trust via disciplined implementation
Track Session
... Security when increasing number of FinTechs participating in the transaction processing
Track Session
... Interoperability, coordination, integration, extension, flexibility, and scalability
Keynote by
Keynote by
Keynote by
Plenary Session
... What would be the role of the CISO in the Technology Decade
Innovation Box Partner
Keynote by
Breakfast Session
... how would it alter the world and what questions does it raise?
Plenary Session
... Customer, Media, Regulators, Security Agencies, and Citizens
Townhall with CERT-IN
... stepping up defences and plugging the gaps
Track Session
... Can you isolate your borders from the cyber fallout of the war
Track Session
... real world examples
Track Session
... Enabling digitization possibilities (offline, contactless, cyber-physical, M2M, etc.)
Track Session
... Security challenges, considerations, use cases
Track Session
... Ethics, Privacy, Competition, Innovation, and Openness
Track Session
... Building security operations in SCADA/OT environment
Track Session
... Challenges of imperfection and unverifiability
Track Session
... Connecting And Securing Everything
Keynote by
Keynote by
Keynote by
Keynote by
Keynote by
Special address by
02:00 pm - 02:15 pm | Welcome Address
02:15 pm - 02:30 pm | Privacy & Policy Highlights
02:30 pm - 03:15 pm | Deliberation with DPOs: Organizing Internal Privacy Function
03:15 pm - 03:35pm | Catering to the evolving Privacy expectations
03:35 pm - 04:00pm | Operationalizing Privacy by Design
04:00 pm - 05:30 pm | Privacy legisprudence in India - A look at the DPB and everything in between
Track Session
... Proactive detection and response
Track Session
... Ensuring threat awareness, data awareness, zero trust, and edge security & flexibility
Track Session
... Taking care of volume, velocity, diversity, heterogeneity, and agility
Track Session
... Security and privacy considerations in digitization ideas, innovation, and plans
Track Session
... Bringing technology, architectures, policy, and law enforcement efforts together
Track Session
... In responding to incidents [SIEM, SOAR, EDR, XDR]
Track Session
... Imperatives, Enablers, Technologies, & Possibilities
Track Session
... Strengthening security posture with data normalization
Track Session
... Ways, methods, technologies, and architectures
Track Session
... Software getting all attention of supply chain security
Track Session
... Embedding security and privacy in the strategic, tactical, and operational plans
Track Session
... demand-supply gap, scale of requirements, depth of the subject, lack of technical infrastructure and disaggregated efforts
Keynote by
Keynote by
Keynote by
Keynote by
Fireside chat with
Plenary Session
... assessing preparedness, institutional capabilities and developmental policies
Keynote by