NASSCOM–DSCI Annual Information Security Summit [AISS 2017]

"India Meets for Security"

The 12th edition of NASSCOM – DSCI Annual Information Security Summit [AISS] is scheduled on 13th, 14th, and 15th December 2017. With digital advancements all over the world, cyber security is the need of the hour and AISS serves as the perfect platform for the amalgamation of ideas and convergence of leaders where India Meets for Security. AISS provides a unique platform to engage, deliberate and extend the cyber security paradigm to greater heights. It’s a confluence of security thought leaders and rich content insights to emancipate the possibilities and opportunities of this cyber world. This year the agenda leaps beyond technology know-hows to inspire actions and change the way people approach security.

AISS 2017 will focus on Innovation & Entrepreneurship, Cognitive Security, Digital Payments, Capacity Building, Malware/APTs, Product Security & DevSecOps, Resilience & Breach Response, Data Protection/GDPR and more. A glimpse of the few interesting sessions include Machine Learning for Cyber Security, Crypto Debate, Scope & Future of Digital Forensics, Security Design Thinking, Potent & Wider cyber attacks, Cyber Security framework for Smart Cities, SMBs embracing digital evolution, Demystifying Cybercrime strategy for Corporates and more would underscore the discussions at AISS 2017.

AISS witnesses participation from professionals from diverse industry sectors, decision makers, leaders and influencers, policy makers, government, law enforcement officers and think tanks. Three days at AISS would be full of opportunities, experience, and possibilities. The summit will provide you an opportunity of gaining the mind share of the security community professionals, network with security decision-makers and influencers, engage people from various sectors, demonstrate your capabilities and develop business opportunity and relationship.

AISS will closely track industry and business trends, strategies, approaches, best practices and deliberate on the changing nature of threats and their impact on various industry sectors. It will focus on in-depth ramifications of these developments for India’s preparedness to address its internal and global challenges in Cyber Security. AISS 2017 will investigate into key technical, engineering, architectural, procedural and policy issues shaping the security ecosystem. Industry experts will share insights on how these trends are shaping various verticals.

With 70+ sessions, 150+ speakers and 1000+ participants, AISS 2017 will host plenaries, debates, keynotes, visionary talks, in-depth workshops, parallel tracks, focus group meetings and round tables showcasing rich security driven deliberations and call for action.

Other highlights include ‘SEGAMATHON- Security Gamification Hackathon’, Simulations, Demo Theater, Roast Sessions, Student Zone. Witnessing the rising acceptance and popularity of DSCI Excellence Awards, it will be hosted as always but with greater pomp and show, to recognize best practices adopted by the industry, exemplary work carried out in the field of security and privacy, and reward visionary leaders.  It will also host DSCI ‘Innovation Box’ for identifying the ‘Most Innovative Security Product of the Year’.

Let’s come together and approach Security through Stimulating Discourse & Compelling Actions!


















10:30 - 13:00

Boosting Your SOC with Automation, Orchestration and Cyber-Simulation

 Sponsored  By Cyber bit


Venue :- Royal 2


The complex, scaled, advanced and targeted threat landscape demands overhauling of Incident Response capabilities. One decision required to address an incident has to deal with increasing number of contexts. The actions required to manage an incident are multi-dimensional, interdependent, sequential and parallel. Automation tasks, enriched by desired contextual data, would help in speeding up decisions and reducing response time. Action is often an outcome of visibility and context available.... Read More

10:30 - 13:00

Secure Clouds are Happy Clouds

Sponsored By PaloAlto Networks

Venue:- Maple 1 

While embracing the cloud, Public or Private, certainly has its benefits, it also has its share of challenges – most notably around the security of your apps and data. Wherever your apps and data live – on-premise or in the cloud – attackers will find a way in and protecting them in the cloud introduces the... Read More

14:00 - 16:00

Evolution in mobile payment standards leading to enhanced customer experience

Sponsored By Master Card

Venue :-  Royal 1

With the changes in consumer’s preferences to use their mobile phones as the primary device for commerce, the upcoming changes in EMV 3DS 2.0 payment protocols is expected to significantly improve the payment experience. It will not only be an end to end native mobile experience but will also be more secure owing to the... Read More

14:00 - 16:00

Essence of cryptology  

Workshop By DSCI 

Venue :-  Royal 2

Critical Information Infrastructure (CII) Organizations are experiencing the transition from closed networks to enterprise networks to public internet to deliver its business leveraging industrial internet of devices (IIoT). The ability of collecting data from wide variety of sensors, integration and connectivity leveraging... Read More

16:30 - 18:00

Innovation Box

… ‘Most innovative Security Product  of the Year’


Venue: Royal 1

16:30 - 18:00


Security Games Hackathon 

08:00 - 09:00

Project Immortality: Ethical Enquiry

                  … Ethical and moral consequences of intervention of tech research in biology

Breakfast Session II

Venue:- Maple 2

If there is one universal fear across humanity, irrespective of their colour, creed or country, then that is Death. Attaining immortality has always been the ultimate goal of human life... Read More

08:00 - 09:00

Bio Hacks

… When attacks transcend the limits to explore unchartered territories

Biohacking is anything that involves manipulating your body in some way outside of a formal space, like a hospital or research setting. It can be gene modification, implanting devices of various kinds within the human body, etc. What is unique about biohacking is, because it’s outside of a formal... Read More

10:00 - 11:00

Right to Privacy while the Country is becoming Data Rich

… What it means for a nation and businesses?

Plenary Session I

Venue:- Pearl

Rapid emergence of disruptive technologies and digitization of services and transactions are exercising great influence on the functioning of society. The Digital India mission has been instrumental in leveraging these technological advancements as it facilitates citizens to get connected... Read More

14:00 - 15:00

Endpoints Regaining Attention of Security:  Focus on Detection and Response

… Evolution of Endpoint Protection Platforms (EPP), their imperatives in security architectures

Track II  (Enterprise Security)

Venue- Pearl 1

The traditional way of implementing endpoint security was to deploy an anti-malware software on endpoints. As the endpoint security products evolved, the software installed on endpoints gained more capabilities such as firewall, host intrusion detection system, USB monitoring, etc. This provided a certain level of comfort to information security managers but it didn’t last long. With time, as threats and... Read More

14:00 - 15:00

Critical capabilities for securing IoT paradigm

… At level of hardware, chipset, protocol, connectivity, asset, authentication, network & application

Track III (Innovation)

The power of Internet to connect, communicate and remotely manage millions of networked devices is becoming pervasive. Market and nations are gung-ho about IoT phenomena globally and so does India. As per pundits, the IoT devices count would reach 20 to 30 billion by 2020. IoT uses cases underlying IoT architectural components such as protocols, networks, sensors, associated IT systems and gateways warrant robust cyber security architecture... Read More

14:00 - 15:30

Machine Learning for the Practical CISO

Are you a CISO thinking of buying machine learning solutions? Tired of the vendor hype about AI? This must-attend session with 3 experts cuts through the marketing jargon. 

They'll clarify how machine learning works (and more importantly, where it doesn't), show you how to evaluate solutions, and also explore how attackers will use AI against you.

By Smokescreen , Netmonstery, Security Brigade 

Venue:- MapIe 1

Each and every day techniques in artificial intelligence (AI) and machine learning are changing our view of the world. They are... Read More

15:00 - 16:00

Protecting the workload moving on Cloud

… How to secure dynamic distribution of workload on on-prim & cloud?

Track II  (Enterprise Security)

Venue- Pearl 2

The vast majority of businesses running on-premises infrastructure have either already moved to cloud or planning to move at least a part of their infrastructure onto the cloud. On one hand, moving to cloud enhances organization’s agility for workload management but on the other, it demands concerted efforts for managing security posture which requires a separate strategy for its protection than the traditional... Read More

15:00 - 16:00

Blockchain for Cyber Security

Demonstrating Use Cases … How security problems are solved using Blockchain “

Track III (Innovation)

Venue- Pearl 1

One may not have experienced the emergence of computers or the Internet, but for sure everyone today is inundated with blockchain ‘up and down’ streams. It is a wildfire which is spreading everywhere and trying to emerge as a solution to every problem of this planet. ‘Bitcoin’ is believed to be the birth of blockchain when it comes to large and complex application of it. It is a peer-to-peer ledger which is distributed... Read More

16:00 - 16:45

Nuances of Mobile Technologies: How can Digital Payments leverage them?

… Changing role of Mobility- from personal & social transactions to financial transaction processing

Track I (Technology)

Venue- Royal 1

Mobile phones/systems with Internet connectivity are becoming one stop shop for most of our needs in daily life. The growth of smart phones witnessed over the years, made almost all electronic companies to venture in this field and benefit from its evolvement. Certain financial initiatives at the national level such as licensing payments banks, demonetization, evolution of digital currencies, exploded the no. of digital... Read More

16:00 - 16:45

Scope and Future of Digital Forensics

...Investigative opportunities & challenges while drowning in digital data !

Track III (Innovation)

Venue- Pearl 1

The growing espousal of the Digital forensics in nearly all types of investigations viz., Criminal, civil or administrative investigations, the scientific plausibility of the result of such investigations has been improving considerably. Digital forensics help the investigators to create a hypothetical event reconstruction that may assist in the probes. Digital forensics in India and worldwide has evolved and advanced around the technical revolutions... Read More

16:00 - 16:45

Strategic Thinking for Security

… Exercising your options to manage complexity, diversity, agility, quantum, and scalability of challenges


Venue : Pearl 2


Cyber security is no longer a non-strategic domain. It is indicated as we follow billion dollar organizations and every week we hear of a cyber security breach and its impact on nations and industry ecosystem. With stakes so high, the government and business leaders must start thinking about cyber security in a new way. The cyber threats and challenges are increasing at an unfathomable rate. Governments and organizations... Read More

08:00 - 09:00

Beyond Awareness

…Using Science of Habits For Secure User Behaviour

Breakfast Session II 

Venue:- Royal 2

Why do we eat french fries, despite knowing they are bad for our health? Because awareness alone is not sufficient to change user habits. In this session, you'll learn about the latest research on behavioral psychology and the "habit cycle." Humans execute more than 40% of... Read More

08:00 - 09:00

Security Design Thinking

… Exploring the concepts of design thinking to solve security problems

Breakfast Session IV

Venue:- Maple 2

While designing solutions, revitalizing structures and processes, setting up objectives and strategies, articulating goals, motivating teams, organizing efforts, driving change, bring shift in paradigms making transactions sensitive to security and privacy.... Read More

09:15 - 10:15

Potent & Wider attacks (Wannacry): Putting your Security at Test

… Vulnerabilities, patching, legacies, assets, backups, recovery, operations, response, sharing & collaboration

Track I [Threat Response]

Venue:- Royal 1

Session Brief

Earlier this year, it became evident that targeted attacks is just one of the threats that companies face. Massive global cyber-attacks, such as WannaCry and NotPetya/Petwrap ransomware,... Read More

09:15 - 10:15

Security Investigative Journalism

… How media investigates and reports security and privacy?

Track II [Policy & collaborations]

Venue:- Pearl 1

Media with its speedy and all-pervasiveness nature has been ushering and influencing minds since ages.  In the current age of digital media, information being used, presented and consumed has even greater power to impact the masses. As cyber security has emerged as one of the key discussions at global forums and in the public interest, it is imperative to discuss the role of media in cyber security... Read More

09:15 - 10:15

Cyber Security framework for smart cities

… taking the leap from ideation to implementation

Track III  [Governance & Preparedness]

Venue:- Pearl 2

Technology with its ever increasing pace has encroached into everyone’s life. Whether it’s a smartphone or smart accessory or smart wearable or smart anything, there would be hardly anyone who has never interacted with anything Smart. One can discuss at length the definition of smart in “smart-X” (X being the proxy), but can never define it without using the terms connectivity, mobility, intelligence and analytics. And... Read More

10:30 - 11:30

Cyber Warfare: Will it take place?

 … Assessing hype and reality of cyber warfare

Track II [Policy & collaborations]

Venue:- Pearl 1

Unlike physical space, cyberspace is a manmade landscape of interconnected devices and networks. Organizations must connect and remain connected, to this Internet in order to compete in today's markets. Government agencies, businesses, and educational organizations utilize computers to such an extent that their routine operations would significantly be held up if their computer systems or network impede. While using of computer and computer system... Read More

10:30 - 11:30

Security Innovation…

How the CISOs are responding ?

Track III  [Governance & Preparedness]

Venue:- Pearl 2

Innovation in the world of Security is driven by multitude of factors. Two noteworthy of them being- What will the Future Cybersecurity Landscape Look like & What Type of Solutions are needed to address the Most Critical Pain Points.  CISOs across the industry... Read More

12:00 - 13:00

Zero-days targeting Business Applications

… Malicious actors targeting renowned ERP applications, worry for critical sector

Track I [Threat Response]

Venue:- Royal 1

Today, zero-day vulnerabilities are one of the worst nightmares for every CISO. The threat of an undisclosed vulnerability in an organization’s ERP system, without a preventative patch available, is frightening.

ERP systems often... Read More

12:00 - 13:00

Security at the speed of Digitizing Businesses

… Imperatives of contextual, embedded, engineering focused, intelligence driven & automated approach

Track II [Policy & collaborations]

Venue:- Pearl 1


We live in a truly amazing time – a hyperconnected, digital world where people, processes, data, and things are connected in ways that stir the imagination. The effects of an increasingly digitized world are now reaching into every corner of our lives.  Digitization is transforming businesses through models like delivery control in form of personalized services, customer... Read More

12:00 - 13:00

Demystifying Cybercrime strategy for corporate boards

…Insider threats , Litigations and regulatory investigations

Track III  [Governance & Preparedness]

Cybersecurity breach incidents continue to increase in number and frequency that is compelling the board of directors to focus on the oversight and management of the cybersecurity incidents. The financial losses and irreparable reputational damage such incidents inflict cannot be overcome unless there is a clear strategy defined by the board to deal with it. Many corporations are making wise investments related to security that is aiding to create a... Read More

15:20 - 15:30


Venue:- Pearl

15:45 - 16:45

Future of Crime

… How the world of crime & crime investigation would be shaped in the digital age

Technological evolution has gifted our world with uncountable possibilities. Every new technology or innovation has its detrimental flip side but still we fail to imagine how they can be used against us. At the same time, criminals are canny enough to understand the emerging technology landscape... Read More


Abhijeet Nakahate,

Mr. Abhijeet Nakahate,

Solution Architect, Paloalto Networks

Krishna Sirohi

Mr. Krishna Sirohi

President, i2TB

Ram Awasthi

Mr. Ram Awasthi

CIO, Times Internet

Sachidananda Javli

Mr. Sachidananda Javli

Director - Cyber Security, PWC

(Dr.)Triveni Singh

Prof. (Dr.)Triveni Singh

Addl. SP, UP Police

Abhishek Rana

Mr. Abhishek Rana

Technology Head, Sofocle technologies

Aditya Bhatia

Mr. Aditya Bhatia

Senior Analyst, DSCI

Aditya Kakrania

Mr. Aditya Kakrania

Director, Security Innovation India

Ajay Bongirwar

Mr. Ajay Bongirwar

Region Head India & Middle East, Checkmarx.

Ajay Prakash Sawhney

Shri Ajay Prakash Sawhney

Secretary, Ministry of Electronics & Information Technology

Akshay Aggarwal

Mr. Akshay Aggarwal

Director, Solution Specialist, Oracle

Amajit Gupta

Mr. Amajit Gupta

Founder, MD and CEO,QED Sigma Innovations Private Limited

Aman Sethi

Mr. Aman Sethi

Associate Editor, Hindustan Times.

Amit Ramesh Sharma

Mr. Amit Ramesh Sharma

  Sales Engineer, Cyberbit

Anand Ramamoorthy

Mr. Anand Ramamoorthy

Managing Director, India and SAARC mcAfee

Ankur jain

Mr. Ankur jain

Co-Founder, CEO - ?The Achilles

Ankush Chowdhary

Mr. Ankush Chowdhary

Regional Head of Security (APJ) – Public Sector, AWS

Ankush Johar

Ankush Johar

Director, Lloyds Ventures

Arindam Roy

Mr. Arindam Roy

Director – India and South Asia, SANS Institute

Arvind Tilak

Dr. Arvind Tilak

CEO, Ascent Intellimation Pvt. Ltd.

Aseem Jakhar

Mr. Aseem Jakhar

Director - R&D at Payatu Software Labs

Ashish Tandon

Mr. Ashish Tandon

Founder & Chief Executive Officer, Indusface

Ashok Chandak

Mr. Ashok Chandak

Sr. Director Global Sales and Marketing,   NXP Semiconductors

Ashutosh Jain

Mr. Ashutosh Jain


Aastha Dahmija

Ms. Aastha Dahmija

Manager - BD, DSCI

Atul Gupta

Mr. Atul Gupta

Partner, KPMG

Ben Herzberg

Mr. Ben Herzberg

Research Group Manager Imperva Inc

Bhavin B. Bhansali

Mr. Bhavin B. Bhansali

Co-Founder, ProgIST Solutions

Bikash Barai

Mr. Bikash Barai

Co-founder, FireCompass

Bithal Bhardwaj

Mr. Bithal Bhardwaj

CISO, GE South Asia & Africa

Chandan Kumar

Mr. Chandan Kumar

Director- Marketing & Corporate Affairs, Huawei Telecommunications

Chandra Shekar Reddy

Mr. Chandra Shekar Reddy

Co - Founder, Cognore

Dan Lamorena

Mr. Dan Lamorena

CISSP, Vice President, Global Solutions, ForeScout Technologies

Debabrata Nayak

Dr. Debabrata Nayak

Chief Security Officer Huawei Telecommunications (India) Co., Pvt. Ltd.

Dhananjay Sharma

Dhananjay Sharma

Marketing and Outreach, TeamIndus

Clayton Jones

Mr. Clayton Jones

Regional Managing Director, Asia-Pacific, (ISC)²

Felix Mohan

Mr. Felix Mohan

CEO CISO Cybersecurity Pvt Ltd

Fredrik Forslund

Mr. Fredrik Forslund

Vice President, Enterprise & Cloud Erasure Solutions, Blancco

Gautam Pande

Mr. Gautam Pande

Director - Market Product Management, MasterCard

Gautam Pande

Mr. Gautam Pande

Director – Market Product management, MasterCard 

Gulshan Rai

Dr. Gulshan Rai

NCSC, Govt. of India

H. Scott Tucker

Mr. H. Scott Tucker

President, Aptegra Consulting, LLC

Hari Kishore Kusumakar IPS

Mr. Hari Kishore Kusumakar IPS

Addl.CP, Kolkata City Police

Hoda Al Khzaimi

Dr. Hoda Al Khzaimi

Research Assistant Professor, Engineering; Director, Center of Cyber Security, NYU , Abu Dhabi

Indrajeet Bhuyan

Mr. Indrajeet Bhuyan

Security researcher

Iftekhar Hussain

Mr. Iftekhar Hussain

Senior SR. Cyber threat Protection, Microsoft

J Kesavardhanan

Mr. J Kesavardhanan

Founder and CEO, K7 Computing Pvt. Ltd

Kapil Awasthi

Mr. Kapil Awasthi

Principal Consultant, Anti-APT APAC Core , Check Point

Kamlesh Bajaj

Dr. Kamlesh Bajaj

Former CEO, DSCI

Karan Bajwa

Mr. Karan Bajwa

Managing Director, IBM India

Kaushik Saha

Dr. Kaushik Saha

CTO, Samsung R & D Institute India - Delhi

Krishna Sastry Pendyala

Mr. Krishna Sastry Pendyala

Executive Director, PwC

Lt Gen R S Panwar (Retd)

Dr. Lt Gen R S Panwar (Retd)

A Distinguished Alumnus Awardee of IIT Bombay, with four decades of military experience in technology based warfare.

Lucius Lobo

Mr. Lucius Lobo

CISO, Tech Mahindra

M S Vijay Raghvan

Mr. M S Vijay Raghvan

Former Advisor &  Ex-official Secretary, Govt. of India

Madan Oberoi

Mr. Madan Oberoi

Joint Commissioner Special Cell, Delhi Police

 Madhvi Gupta,

Ms. Madhvi Gupta,

Consultant, DSCI

Mayank Joshi

Mayank Joshi

Head of Strategic Accounts, BlackBerry

Mayank Lau

Mr. Mayank Lau

Sr Consultant, DSCI

Minatee Mishra

Ms. Minatee Mishra

Lead Engineer, Security Center of Excellence at Philips

Monica Jasuja

Ms. Monica Jasuja

Head of Digital Payments, Mastercard

Muralidharan Ramachandran

Mr. Muralidharan Ramachandran

VP & Head - Cybersecurity CoE & Quality Assurance , Syntel

Narayan Neelakantan

Mr. Narayan Neelakantan

Co-founder & CEO, Block Armour

 Nikhil Pahwa

Mr. Nikhil Pahwa

Founder, Medianama.com

Philippe Courtot

Mr. Philippe Courtot

CEO & Chairman - Qualys Inc.

Pravesh Sharma

Mr. Pravesh Sharma

Responsible for Information Security and Technology Risk, India at Fidelity International

R Chandrashekhar

Mr. R Chandrashekhar

President, NASSCOM

Robert Gallagher

Mr. Robert Gallagher

Senior Consultant, Information Security, MasterCard

Raghav Bhaskar

Mr. Raghav Bhaskar

Founder and CEO, AppsPicket.com

Rahul Bhardwaj

Mr. Rahul Bhardwaj

Vice President - Information Security, FIS

 Rahul Gupta

Mr. Rahul Gupta

Director, KPMG

Rajesh Thapar

Mr. Rajesh Thapar

CISO, Yes Bank

Rakesh Kharwal

Mr. Rakesh Kharwal

Country Manager India & South Asia, IBM Security

Raman Roy

Mr. Raman Roy

Chairman, NASSCOM

Ramesh Krishnamoorthy,

Mr. Ramesh Krishnamoorthy,

Head - Financial Crime Security Services & CISO, DBS Bank - India

RaviKiran S Avvaru

Mr. RaviKiran S Avvaru

Head of IT Department, Toyota-Kirloskar

Ravindranath Hirolikar

Mr. Ravindranath Hirolikar

VP & Global Head Information & Cyber Security, EXL

Rishi Mehta

Mr. Rishi Mehta

Director- Information Security, Target

Rishi Rajpal

Mr. Rishi Rajpal

Director – IT Governance, Concentrix Corporation

Rohan Parakh

Mr. Rohan Parakh

Senior Security Consultant Imperva Inc

Rohit Singh

Mr. Rohit Singh

Country Manager-AsiaPac & India, Telesoft Technologies Ltd

S. Chandrasekar

Mr. S. Chandrasekar

Group Director Government Affairs, Microsoft India

S.S. Sarma

Mr. S.S. Sarma

Scientist F Director, Cert-In

Sahir Hidayatullah

Mr. Sahir Hidayatullah

CEO, Smokescreen Technologies Pvt. Ltd

Saikat Datta

Mr. Saikat Datta

Policy Director, CIS

Samir Saran,

Mr. Samir Saran,

Vice President, Observer Research Foundation

Sandhya Chintala

Dr. Sandhya Chintala

Vice President NASSCOM & Executive Director, SSC NASSCOM

Sanjay Bahl

Mr. Sanjay Bahl

Director General, CERT-In

Sapan Talwar

Mr. Sapan Talwar




Application & Integration ENGG head, L&T

Sharda Tickoo

Ms. Sharda Tickoo

Head Technology – Trend Micro India

Shomiron Das Gupta

Mr. Shomiron Das Gupta


Shrikant Shitole

Mr. Shrikant Shitole

Senior Director & Country Head, FireEye

Sidharth Mutreja

Mr. Sidharth Mutreja

Resgional Cyber Security Architect India, McAfee

Sidharth Pandey

Mr. Sidharth Pandey

Chief lead News & Investigations, Go-News 24x7

Shivangi Nadkarni

Ms. Shivangi Nadkarni

Co-founder & CEO at Arrka Consulting

Sivarama Krishnan

Mr. Sivarama Krishnan

Leader – Cyber Security Services, PWC India

Srinivas Poosarla

Mr. Srinivas Poosarla

Vice President and Head (Global), Privacy & Data Protection at Infosys

Subhash Subramaniam

Mr. Subhash Subramaniam


Sudarsan SD

Mr. Sudarsan SD

Group Leader, ABB

Sudeep Das

Mr. Sudeep Das

Technology Leader, IBM Security

Sumedh Thakar

Mr. Sumedh Thakar

Chief Product Officer, Qualys Inc

Sumit D Chowdhury

Mr. Sumit D Chowdhury

MD & CEO, Gaia Smart Cities

Sunder Krishnan

Mr. Sunder Krishnan

CRO, Reliance Insurance

Vakul Sharma

Mr. Vakul Sharma

Advocate, Supreme Court

Tarun Pant

Mr. Tarun Pant

CEO, Securely Share

Varun Seth

Mr. Varun Seth

Founder & CEO, Matisoft Labs

Venkata Swamy Karukuri

Mr. Venkata Swamy Karukuri

Sr. Principal Architect, CA Technologies

Venkatesh Krishnamoorthy

Mr. Venkatesh Krishnamoorthy

Country Manager, BSA India

Vidur Gupta

Mr. Vidur Gupta

Partner, EY

Vipin Goyal

Mr. Vipin Goyal

Director, Strategy & Operations, Veative

Vinayak Godse

Mr. Vinayak Godse

Sr. Director, DSCI

Vishal Salvi

Mr. Vishal Salvi

CISO & SVP , Infosys

Vishal Salvi

Mr. Vishal Salvi

CISO & SVP, Infosys

 Vivek Chudgar

Mr. Vivek Chudgar

Senior Director APAC, Mandiant Consulting

Yash Kadakia

Mr. Yash Kadakia

Founder & CTO, Security Brigade

Yash KS

Mr. Yash KS

Principal Software Architect, Qualys


Mr. Yogesh

Senior security consultant, Rapid7