The eighteenth edition of the Annual Information Security Summit (AISS) is slated for December 19, 20 & 21, 2023. The journey charted by the Summit over the past seventeen years has been marked by increasingly compelling, relevant and futuristic content that gets shaped by multiple factors and contexts and has endeavoured to cover the entire spectrum of Cyber Security & Data Protection.
Amidst the rapidly changing digitization landscape and the highly volatile cyberspace, it becomes important to stay current on the present context and anticipate the challenges in the offing. AISS agenda is typically characterized by presence of a diverse set of themes, sub themes, topics and sub-topics, multiple tracks, varied session formats and plethora of activities and experiences that make up for a rich three-day engagement and learning for the delegates. This edition shall entail deliberations organized around the broad areas of Security Technology Leadership, Privacy at the Core, Security Engineering and Innovation, Quantum Safe Transition, Secure DPI, digital crimes spectrum, devsecops, Future of Security, resiliency of digital enterprises, mobile threat defence.
Transaction Security
Security in High-speed transfer
Quantum-safe transition / Quantum resiliency
ESG and conscious consumerism
Security Engineering & Innovation
OT Response & Recovery
Privacy at the core
Security of Digital Public Infrastructure
Extended Reality Converging technologies
Research Productization & Commercialization
Security Technology Leadership
Digital Crimes Spectrum
Overview:
The general consensus amongst systems programmers (and by extension embedded systems developers) has been that you can either have fine-grained system control or performance or safety (or some combination of 2 of these 3) but you can't have all three.
Rust is the first mainstream (i.e. popular) programming language to provide programmers the ability to write code without this compromise via its novel ownership and borrowing concept. Rust's ownership and borrowing model coupled with the fact that we do not require a garbage collector for memory management has pushed Rust's adoption into domains that were exclusively dominated by languages such as C/C++.
This talk will focus on what Rust has to offer to an embedded systems security software engineer - safety by construction, zero-cost abstractions, no hidden states, powerful compile-time checks. These features have allowed us to build demonstrators with sizeable benefits such as better performance/watt, smaller code-sizes and lower code complexity with a significantly higher bar on safety and security. As an example, we have an open-source project called rustBoot - a prototype standalone bootloader, written entirely in Rust, designed to run on anything from a microcontroller to a system on chip.
Installing the tools
In this file you'll find instructions on how to install the tools we'll use during the course. All of these tools are available for Linux, macOS and Windows users. We'll need the tools to write and compile our Rust code, and allow for remote mentoring. Important: these instructions are to be followed at home, before the start of the first tutorial. If you have any problems with installation, contact the trainers! We won't be addressing installation problems during the first tutorial.
Rust and Cargo
First we'll need rustc, the standard Rust compiler. rustc is generally not invoked directly, but through cargo, the Rust package manager. rustup takes care of installing rustc and cargo. This part is easy: go to https://rustup.rs and follow the instructions. Please make sure you're installing the latest default toolchain. Once done, run
rustc -V && cargo -V
The output should be something like this:
rustc 1.67.1 (d5a82bbd2 2023-02-07)
cargo 1.67.1 (8ecd4f20a 2023-01-10)
Using Rustup, you can install Rust toolchains and components. More info:
Rustfmt and Clippy
To avoid discussions, Rust provides its own formatting tool, Rustfmt. We'll also be using Clippy, a collection of lints to analyze your code, that catches common mistakes for you. You'll notice that Rusts Clippy can be a very helpful companion. Both Rustfmt and Clippy are installed by Rustup by default.
To run Rustfmt on your project, execute:
cargo fmt
To run clippy:
cargo clippy
More info:
Visual Studio Code
During the course, we will use Visual Studio Code (vscode) to write code in. Of course, you're free to use your favorite editor, but if you encounter problems, you can't rely on support from us.
You can find the installation instructions here: https://code.visualstudio.com/.
We will install some plugins as well. The first one is Rust-Analyzer. Installation instructions can be found here https://marketplace.visualstudio.com/items?itemName=rust-lang.rust-analyzer
Rust-Analyzer provides a lot of help during development and in indispensable when getting started with Rust.
The last plugin we'll use is CodeLLDB. This plugin enables debugging Rust code from within vscode. You can find instructions here: https://marketplace.visualstudio.com/items?itemName=vadimcn.vscode-lldb.
More info:
Git
We will use Git as version control tool. If you haven't installed Git already, you can find instructions here: https://git-scm.com/book/en/v2/Getting-Started-Installing-Git.
If you're new to Git, you'll also appreciate GitHubs intro to Git https://docs.github.com/en/get-started/using-git/about-git and the Git intro with vscode, which you can find here: https://www.youtube.com/watch?v=i_23KUAEtUM.
More info: https://www.youtube.com/playlist?list=PLg7s6cbtAD15G8lNyoaYDuKZSKyJrgwB
Introduction (30 minutes)
Understanding Memory Safety Vulnerabilities (60 minutes)
Rust for Memory-Safe Embedded Systems Programming (60 minutes)
Building a Secure Bootloader with Rust (using rustBoot as a real-world example) (60 minutes)
Hands-on Demonstration and Q&A (30 minutes)
Conclusion
Lead Cyber Security Architect, BGSW
Nihal is a systems security architect with Bosch. He specializes in automotive, industrial and enterprise systems security. He has been a part of the connected-devices industry for over 14+ years, researched and integrated security solutions for Fortune's top 50 in APJ and India and provides technical leadership in the following areas - IoT (sensor/edge/gateway) security, Connected Systems Security, DDoS mitigation, Embedded high assurance computing.
Security Engineer, Embedded systems, BGSW
Yashwanth is a systems security engineer at Bosch, focused on safeguarding the integrity and reliability of embedded systems. With over 4 years of professional experience in the embedded field, he is an expert Rust and C programmer, demonstrating a special interest in low-level programming. His expertise spans across a wide range of platforms, security standards and best practices - Post Quantum, Embedded Systems Security, Operating Systems and WebAssembly (WASM).
Solutions Engineer, Cybersecurity, BGSW
Lavanya Ravi is a technical business development associate at Bosch with a focus on Open Source activities and manages an advocacy program for the adoption of safe-systems programming languages in Rust.
Moving beyond DevSecOps and best practices in the new regulated world. A hands-on approach to setting strategic security and privacy objectives, delivering, and measuring performance.
Overview:
Cybersecurity and privacy governance and practices must adopt regulatory requirements such as EU GDPR, India's DPDP Bill, EU NIS2 Directive and California Consumer Privacy Act.
Incorporating regulatory frameworks like EU GDPR, India's DPDP Bill, EU NIS2 Directive, and California Consumer Privacy Act is crucial for effective cybersecurity and privacy governance. In this learning session, participants, including Cybersecurity executives, Privacy Officers, Product Owners, Managers, Scrum Masters, and Engineers, will explore the nuanced responsibilities and skills of different stakeholders in security. The focus extends beyond traditional methods to embrace Privacy by Design (PbD), navigate regulatory compliance, and integrate technology-driven DevOps processes for efficient data collection.
Achieving a successful DevSecPrivOps practice requires collaborative efforts from diverse stakeholders. Through agile methodologies, backlog management, and agile ceremonies, participants will set strategic organizational security objectives, handle control execution, and measure performance. Practical approaches will be applied to capture security and privacy requirements, emphasizing Security by Design, Privacy by Design, Secure Development, Audit executions, and compliance evidence. The session will also address the translation of strategic security and privacy objectives into actionable items for leaders and managers, empowering engineers and product teams to manage and demonstrate corporate and regulatory compliance, including Privacy by Design (PbD). The holistic approach involves managing security and privacy backlogs both as a single product and as an organization-wide portfolio.
Agile Methodology
Tools
Head of Cloud Security, Vaisala
Karthik is the Head of Cloud Security at Vaisala. Vaisala a global leader in weather, environmental, and industrial measurements headquartered in Vantaa, Finland. The Curiosity Rover on Mars has Vaisala pressure and humidity sensor on board.
Karthik is a security executive with extensive experience advising and managing risk for global corporations. He has held cybersecurity leadership roles in global companies in charge of cybersecurity governance, strategy, and effective execution.
Workshop by
Workshop by
Workshop by
Workshop by
Workshop by
Workshop by
Workshop by
Workshop by
Workshop by
Workshop by
Workshop by
Special Address by
... Career Path Beyond and With Security
... Key Considerations and Imperatives
Special Session by
Plenary Session 1
... Realtime, Managed, Systematized, and Governed
Keynote by
Keynote by
Fireside Chat by
Keynote by
Keynote by
Report Launch
... GCC empowered global cyber and digital risk management
Sub-Summit
Partner
02:00 pm - 02:30 pm
Inaugural Function
Digital Forensics Paata Shaala Third Edition
Short Lecture Sessions by Experts on practical issues related to procedures, technology and legal aspects of Digital Forensics
02:30 pm - 02:45 pm
Enhancing Cyber Crime Co-operation between India and UK
02:45 pm - 03:00 pm
The Impact of Digital Transformation on Forensic Investigation
03:00 pm - 03:15 pm
Digital Forensics From Car Multimedia Systems
03:15 pm - 03:30 pm
Challenges in IoT Forensic Investigation... Foreseeing the Future
03:30 pm - 03:45 pm
Policing in the Age of Tech Innovations
03:45 pm - 04:00 pm
Anti-Forensics Detection Techniques... Scenario based
04:00 pm - 05:30 pm
Moot Court Session on Handling of Digital Evidence in Crime Investigation
This exclusive session would be simulation of the court proceedings aimed to sensitize the participants about the legal and technical aspects of digital evidence and its role in prosecuting cybercrime cases.
For this exercise, A sample cybercrime case scenario would be selected and different stages of trail proceedings will be simulated.
Track Session 1
... Learning and Responding Collectively
Track Session 2
... Digitization through Cloud while Addressing Security, Privacy, & Policy Constraints
Track Session 3
... Why Professional Management of Security is Important
Track Session 4
... HSM, KYOK, Confidential Compute, Anonymization, HE, ZKP
*** Invite only session ***
Track Session 5
... Robust Authentication, Access, & Authorization for Banking, IT and Physical Environments
Track Session 6
... Architectural Consolidation [SASE] and Platformization of Security
Track Session 7
... Emerging Tech, Digitization & Innovation, Research Priorities, & Entrepreneurship Possibilities
Track Session 8
... Interdependency, Interplay, Preparedness, Arrangements, and Responses
Track Session 9
... Imperatives for it, What it means, Vehicles to Achieve it, & What it Brings
Track Session 10
... Mobile Threat Defense
Track Session 11
... Leveraging Generative AI for Security Defense
Track Session 12
... Augmenting Threat Capabilities and Building Operational Competence
Fireside Chat by
Keynote by
Special Address by
Plenary Session 2
... overhauling architecture, design, compliance monitoring and governance
Special address by
Innovation Box Partner
Breakfast Session
Track Session 13
... When Technology is Critical to Solve Security Challenges
Track Session 14
... Tendering/ Procurement for Managed, OPEX Centric, & Performance Driven Security
Track Session 15
... Creative Governance to Manage Security and Privacy Effectively while Ensuring Effective & Continuous Compliance
Track Session 16
... Foundational, Reactive, & Proactive Capabilities, Processes, Operations & Governance
Track Session 17
... Seeing Beyond the Immediate Professional Needs
Track Session 18
... Practical Approaches, Tool Kit, Professional Skills, & Capabilities
Track Session 19
... Examining role of PKI and other Adaptive authentication models
Track Session 20
... Changing roles and intensity of threat intel in preparedness and response
*** By invite only ***
*** By invite only ***
Plenary Session 3
... Security Imperatives of Aggregate, Planetary Level, & Intelligence Efforts versus Local Constraints
Keynote by
Keynote by
Fireside Chat by
Keynote by
Keynote by
02:00 pm - 02:15 pm
Inaugural of the OT security Sub-Summit
... Unveiling of the theme
02:15 pm - 02:30 pm
Keynote
02:30 pm - 03:10 pm | Panel Discussion
OT security : Core Considerations
...Current state of OT security,emerging Threat Landscape in OT Security in INDIA
03:10 pm - 03:25 pm | Tech talk by
Insights and Solutions for a Resilient OT secure Future
03:25 pm - 03:40 pm | Tech talk by
Innovations in OT security Threat Defense
03:40 pm - 03:55 pm | Tech talk by
Unifying OT Security for Resilience and Vigilance
03:55 pm - 04:10 pm | Tech talk by
The Imperative Role of Security operations center in Critical Infrastructure Protection
04:10 pm - 04:50 pm | Panel Discussion
Navigating the Convergence: Developing the Expertise and Governance for Secure OT-IT Integration
04:50 pm - 05:00 pm
OT security Sub summit takeaways and vote of Thanks
Track Session 21
... Cloud Native App Sec, Mobile Appsec, DevSecOp Automation, SBOM with Run Time Intelligence
Track Session 22
Track Session 23
... Prework, Type, Destination, Apps, Service, Data, Verification, & Integration
Track Session 24
... Privacy leadership and how is it different from other tech leadership role.
*** By invite only ***
Track Session 25
... SIEM, SOAR, XDR, MSS, MDR, and XMDR
Track Session 26
Track Session 27
... Examining future models of authentication and authorization
Track Session 28
... Beyond Validation and Readiness Assessment
Track Session 29
... Encryption, Backup, Storage, Resiliency, and Recovery
Track Session 30
... Building on Security Open-Source and Manage associated Pitfalls
Track Session 31
... Security of Autonomous & Intelligent Airborne Objects & Platforms
Track Session 32
... Products and Enterprise Systems
Keynote by
Keynote by
Special Session by
Keynote by
Keynote by
DSCI Report Launch
Terms & Conditions:
DSCI Member's discount:
Cancellations Policy: