About Programme

Schedule Plan

 
Image
1030– 1130 hrs

Inaugural Session: How Secure is the new Digital India?

While industry has progressed phenomenally through digital transformation in the past 2 years, cybersecurity remains in a precarious ituation in 2022, therefore an industry huddle to plan an effective strategy to face the challenges successfully, is in order. The scale and complexity of historical security defences have been stretched to their limits and need to be upgraded. CISOs need to work towards security transformation, and as they do, every process and layer of the security technology stack is in play.
2020 -2021 have seen a massive rise in cyber-attacks in India and the cyber threat numbers in India have been quite alarming over the past 18 months. According to India's Computer Emergency Response Team (CERT-In), the country was subjected to over 600,000 cyber-attacks in the second half of 2021 alone. India's large attack surface has presented an attractive target to malicious actors, and they have attacked in huge numbers. It is a daunting situation which needs to be addressed at the earliest. According to a recent report by the International Institute for Strategic Studies (IISS), India has made only modest progress in developing cybersecurity policies despite some high-profile attacks. From Legislation and policy planning, building a skilled workforce, to driving awareness - much work needs to be done.
The 3rd Edition of DX Secure will throw light on how our future strategies can be shaped to deal with this emerging crisis. It will also witness the Launch of Cyber Raksha Kavach - An initiative by CII Tata Communications Centre for Digital Transformation and Microsoft, which offers training programs covering multiple modules of Cyber Security for individuals and Digital Risk Assessment for organisations to enable Industry to learn and strengthen their Cyber Security practices.
Image
1130 - 1200 hrs

Networking Tea

Image
1200 – 1300 hrs

Session I : What does a Hybrid workforce mean for Cloud Security?

The pandemic has forced many enterprises to leapfrog years in their use of the cloud during the lockdown period. But it has not been a smooth transition, and security has suffered in some cases. In 2022, every organization is expected to endure at least one cloud breach. Companies that are in the early stages of their cloud migration are at a greater risk than those that are optimizing their existing infrastructure. Cybersecurity professionals need to focus on building security controls for identities, access and configurations into their cloud migration roadmap at every stage. As more organizations improve security on the human front, cybercriminals will look to open new fronts by targeting machine and service identities. Organizations need to leverage tools that can serve as a force multiplier for security staff. Automation can help with cybersecurity by identifying and prioritizing the risks connected to machine identities and their entitlements, as well as automating the remediation of those risks. The year 2022 needs to be the year for getting cloud security basics right.
Image
1300 - 1400 hrs

Networking over Lunch

Image
1400 – 1500 hrs

Session on Building the Zero Trust Enterprise for a Hybrid Workforce

Zero Trust is a strategic approach to cybersecurity that secures an organization by eliminating implicit trust and continuously validating every stage of a digital interaction. Rooted in the principle of “never trust, always verify,” Zero Trust is designed to protect modern environments and enable digital transformation by using strong authentication methods, leveraging network segmentation, preventing lateral movement, providing Layer 7 threat prevention, and simplifying granular, “least access” policies. With digital transformation accelerating in the form of a growing hybrid workforce, continued migration to the cloud, and the transformation of security operations, taking a Zero Trust approach has never been more critical. If done correctly, a Zero Trust architecture results in higher overall levels of security, but also in reduced security complexity and operational overhead.
Image
1500 – 1600 hrs

Session on SOC Transformation for Security efficacy and Operational efficiency

Security Operations Centre (SOC) are where the proverbial rubber meets the road in cybersecurity. SOC analysts are tasked with detecting threats in a timely manner, investigating these threats to determine their scope and blast radius, disrupting cyberattacks to prevent or minimize damages, work with IT operations to fully restore business/IT operations, and then use these teachable moments to further reinforce their defences. Unfortunately, these processes have become cumbersome over the years. SOC personnel face a constant tsunami of alerts, forcing them to react using disconnected point tools and manual processes. Globally there is a shortage of Cybersecurity skills. According to ESG research, The Life and Times of Cybersecurity Professionals 2021, 57% of organizations are impacted by the cybersecurity skills shortage, leading to increased staff workloads, high burnout rates, and an inability for security professionals to learn and use cybersecurity technologies to their full potential. This calls for a need to build a robust strategy for SOC modernization which takes care of:
  • • Seamless integration of interoperable technology architecture
  • • Scalability and performance
  • • Detection engineering and risk-based context
  • • Continuous testing and process automation