The eleventh edition of the DSCI Best Practices Meet has been conceptualised keeping in view the new paradigm of Security that has arrived and is transforming the way Security is being thought of and is being implemented across organizations. In the context of extreme digitization, rich content delivery, rapid innovation, device superiority, high speed exchanges and intent to have maximum utilization of infra, it becomes imperative to address the inevitable question- Can Security keep a pace?
Security must keep a pace with new paradigms including, but not limited to, context, data and granularity and has to process all of these and take a decision in minimal amount of time. Security Thinking as well as Security Operations will undergo a massive overhaul. Taking cue from some of the media streaming organizations and some of the other potent platforms, it would be fair to state that consumers of Security solution are now becoming developers of Security solution, thanks to the open source architecture.
The eleventh edition of the DSCI Best Practices Meet has been conceptualised keeping in view the new paradigm of Security that has arrived and is transforming the way Security is being thought of and is being implemented across organizations. In the context of extreme digitization, rich content delivery, rapid innovation, device superiority, high speed exchanges and intent to have maximum utilization of infra, it becomes imperative to address the inevitable question- Can Security keep a pace?
Security must keep a pace with new paradigms including, but not limited to, context, data and granularity and has to process all of these and take a decision in minimal amount of time. Security Thinking as well as Security Operations will undergo a massive overhaul. Taking cue from some of the media streaming organizations and some of the other potent platforms, it would be fair to state that consumers of Security solution are now becoming developers of Security solution, thanks to the open source architecture.
This new paradigm shall warrant enterprises to think through on the aspects of the leadership, operations, sourcing, automation and last but not the least, the skills required. In terms of capabilities, it would require hardware, programming power, large scale data handling and processing, architectural capabilities and a completely different level of monitoring and incident response
Best Practices Meet has been acting as one of the leading fully technology focussed conferences in Cyber Security and has been facilitating congregation of core technologists, practitioners and users of Security technologies. The two day conference shall entail engaging deep dive deliberations on some of the aforementioned facets of Security at Scale and shall also have adequate focus on building capacities in the area of security technologies, data protection on cloud, next gen network security, malware analysis and APT defence, digital investigation and advance forensics.
Microservice Architecture
Inclusive Security Thinking
Data Management & Processing
Performance of Security
Security Orchestration
Changing Security Paradigm
Open Source Architecture
Digitization & Innovation
Heads of Information Security
Chief Information Security Officers
Chief Technology Officers
Security & Intelligence Assessors
Privacy Architects
Forensics Experts
Data Scientists
Solution Architects
Public Policy Makers
Think Tanks
Regulators
Government Officers
Security Researchers
Academic Leaders
Institutional Heads
Scholars
BFSI
Financial Technology Providers
NBFCs
GICs
Prepaid Payment Instruments
Payment Card Providers
IT/ITeS
End User Organizations
Associate with Largest Industry Event on Security
Gain mindshare of Security Community & professionals
Make your Brand Visible & promote your Key Messages
Meet Security Leaders of various Industry Sectors
Engage with Policy Makers & Security Thinkers
Network with Decision Makers & Influencers
Demonstrate your capabilities & solutions
Join Engineering & Architectural Discussions
Develop Business Opportunity & Relationship
Industry Workshop I
Hosted by Akamai Technologies
Industry Workshop II
...From fundamental concepts to larger structures
Hosted by iValue InfoSolutions
Hands-on Workshop
Hosted by DSCI
Industry Workshop III
...How to Counter?
DSCI-Target closed door session
...People, Process & Technology
Keynote Address: Brenda Bjerke, Senior Director, Information Risk Management, Target
Breakfast Session
...Study of Life and Consciousness to Demystify the Universe
Inaugural Session
Plenary Session I
...can Security catch up?
Special Session
...Critical Sectors Going Digital
Track I
...Flexibility, innovative architectures and ultra-secure hardware defence
Track II
...Zero Trust of Hardware, Devices, people, workload, apps
Track III
...Ontology of Cyber Threats, IR Strategies and Intelligence Sharing
Track IV
...getting all possible dots to work for Security
Track V
...Security telemetry, Dynamic analysis, speedier response
Track VI
...Secure Container Daemon, Libraries, Orchestration Engine, Workload and Network Policies
Track VII
...Systematic identification, Intelligent automation, Ability to action and Use Cases
Track VIII
...Approaches, Architectures, Devices, UX
Track IX
...infiltrations, increased touchpoints, internationalization and the right defences
Plenary Session II
...Augmenting the payment experience & Assuaging the transaction risk
Special Meeting
Brenda Bjerke, is Senior Director, Information Risk Management at Target. In her role, she leads Information Security Management Office, Information Security Policy, Training & Awareness, Vendor Security, Business Information Security Office (BISO), Payments & Compliance (PCI, GLBA, SOX & HIPAA) teams for the enterprise. She joined Target in 2003. After Target’s data security incident in 2013, Brenda played an important role in transforming Target’s security culture.
Brenda serves on the Executive Leadership Team for the Diversity Action Committee for Target’s Technology Services, focused on building a team that values open dialogue, respect, inclusion and diversity. She is also the Executive Women’s Forum (EWF) Champion advancing women in security initiatives at Target and mentors several women in technology, both internally and through external partnerships.
Previously, Brenda worked at American Express Financial Advisors where she was responsible for a variety of business operations, leadership and project roles.
Brenda has earned a Bachelor of Applied Business and Masters of Business Administration. She is also a Certified Information Systems Security Professional (CISSP) and Certified Information Privacy Professional (CIPP).
Brenda spends her free time with her family which includes two teenagers and enjoys volunteering at charities close to her heart.
Deepak Talwar is the National Security Officer with Microsoft India. He has close to 20 years of experience as a business leader and core technologist from heart working in the field of cyber security and specifically focused on cloud security. Deepak has been instrumental in transforming multiple clients & the partner community to migrate to safer cloud and worked across sectors like BFSI, government, public sector, telco- media and others covering Indian and global markets.
Before Microsoft, Deepak led EY, for their business development initiatives on cyber, data privacy, security operations, incident management services. He was also instrumental in setting up Symantec cloud business for 7 years and engaged in advance technologies, processes and adoption relevant to data security, identity, risk mitigation and build security strategies with industry thought leaders, government and CXO's. His earlier stints have been into Trend Micro, Mcafee and cisco academies to work with various technologies and business roles and build mindshare to adopt security with confidence and trust.
He actively participates and contribute his time with education forums, cyber readiness and support regulatory and policy making bodies to share views and build enhanced security framework.
Deepak is also a distinguished trainer who had trained 100's of engineers in his career to be cyber experts and even today he firmly believe and actively participate in building next generation to attain best of cyber knowledge and "be cyber ready"
Ms Suganya Annadurai is working as Scientist at SETS and obtained her MTech in VLSI Design from SASTRA University, Thanjavur. In her 15 years of experience at SETS she has developed core competency in side channel analysis and secure and efficient realisation of cryptography modules. She played a major role in the establishment of Side channel analysis evaluation laboratory at SETS for the evaluation of crypto modules. Her research interests include side channel analysis attacks and countermeasures, analysis and design of efficient and secure crypto modules for communication systems, ubiquitous devices, and embedded devices.She has good number of publications in reputed International conferences to her credit.
Akamai secures and delivers digital experiences for the world's largest companies. Akamai's intelligent edge platform surrounds everything, from the enterprise to the cloud, so customers and their businesses can be fast, smart, and secure.
To learn more, visit www.akamai.com or blogs.akamai.com
Target is North America's second largest retailer that serves guests at 1850+ stores and Target.com. It's over 350,000 team member strong around the word and headquartered in the U.S and India. A Fortune 50 company, Target strives to fulfill the needs of millions of guests around the globe. Target in India was set up in 2005 and operates as a fully-integrated part of the global team. With over 3000 team members, Target India proudly engages in work that supports Target's strategy across business areas like technology, marketing, human resources, merchandising, finance, supply chain, information security and analytics & reporting.
BluSapphire is the only purpose built agentless multi-vector platform leveraging AI, ML, Algorithmic science and Predictive Data Analytics empowering organizations with Proactive Cybersecurity, defending against zero-day attacks, ransomware, APTs, Internal threats and unknown unknowns in real time.
A premium technology enabler, iValue InfoSolutions drives adoption of leading-edge technology solution & services in Data, Network & Application protection & management space in a consultative way. iValue's unique GTM aligns business development with offering's maturity in product life cycle evolution creating a scalable and sustainable business.
The SANS Institute was established in 1989 as a cooperative research and education organization. SANS is the most trusted, and by far the largest source for world-class information security training and security certification in the world offering over 50 training courses. GIAC, an affiliate of the SANS Institute, is a certification body featuring over 25 hands-on, technical certifications in information security. SANS offers a myriad of free resources to the InfoSec community including consensus projects, research reports, and newsletters; and it operates the Internet's early warning system - the Internet Storm Center. At the heart of SANS are the many security practitioners in varied global organizations from corporations to universities working together to help the entire information security community.
To learn more about SANS Cyber Security and Digital Forensics, and Secure Software Development training in India, please visit website
SpellSecurity is a next generation risk to response platform company. SpellHunt is a multi-vector EDR, log analytics and threat hunting platform. SpellPhish is a user and control risk evaluation platform. It also provides specialized services like breach investigation, Red Teaming and threat hunting.
Attivo Networks® provides accurate detection, analysis, and automated response to in-network threats. The ThreatDefend™ platform efficiently detects advanced, stolen credential, insider, and ransomware attacks within user networks, data centres, cloud, branch, and speciality environments by deceiving attackers into revealing themselves. ThreatOps™ playbooks and 3rd party integrations provide an accelerated incident response.
We, 3rd Eye Techno Solutions Pvt. Ltd., An ISO 9001:2015 Certified, technology driven and growing company. We provide wide range of Digital Forensics solutions, Services and Training to Law Enforcement Agencies and Private Sector which includes Cyber Forensics Solutions, Video Forensics, CDR Analysis Tool, customized Software & Services.
CloudSEK is an Artificial Intelligence-driven Unified Risk Management Enterprise. CloudSEK's flagship SAAS based product X Vigil with combined strength of the powerful AI and Machine Learning helps organisations monitor and manage their security posture in real-time.
QOS Technology is an award-Winning and one of the leading IT Security Companies in Asia, offering intelligence-driven security solutions to protect organizations against a wide range of security threats. Our solutions revolve around Network Security Deployments that include Check Point Security Gateways, Post-deployment Training, Preventive Maintenance, Remote & Onsite Support, DDoS Simulation & Purple Team Training supported by robust Security Products.