NASSCOM-Data Security Council of India Announces Annual Information Security Summit 2012
NASSCOM-Data Security Council of India (DSCI) announced that the Annual Information Security Summit 2012 will be held on 11-12 December at Taj Lands End, Mumbai. The NASSCOM-DSCI Annual Information Security Summit this year will focus on the national cyber security elements- Framework, Machinery, Responsibility & Operations for all the critical information sectors like power, energy and finance where deliberation will take place on operating technologies like smart grid and industrial control system; the security and privacy imperatives of eCommerce, mCommerce and eGovernance application and platforms. The Summit will provide an opportunity to have focused discussions with government leaders along with global experts who will talk about the security ramifications at the global level. Special features such as celebrating the success of women leaders in the field of security, Workshop on IT Act and release of DSCI assessment frameworks will also be part of the annual summit. The addition of DSCIExcellence Awards 2012 to Corporate and LEAs this year along with Annual summit will truly make this as a platform where India Meets for Security.
Who Should Attend:-
Organizations:
- User Organization – Banks, Finance, Telecom, Manufacturing, Energy
- Government & PSUs
- Technology & Service Providers
- Security Product/ Services Companies
- Academia
Individuals:
- Business Leaders
- IT Leadership
- Security & Privacy Leadership
- Security Professionals
- Security Implementer | Administrator | Officer
Participation benefits:
- Learn about new challenges, threats and vulnerabilities
- Gain Strategic direction & practical guidance
- Explore new approaches, practices, technologies and services
- Discover market developments and get a feel of technology products
- Discuss on public policies for cyber security and privacy
- Interact with national, government and global leadership
Agenda:-
Tentative Agenda Topics for Annual Information Security Summit’12 : Day 1
| ||
Time
|
Session
| |
0930 to 1015
|
Inaugural + Key Note
| |
1015 to 1115
|
National Imperatives of Securing Operational Technologies … Smart Grids, Oil & Gas, & Public Utilities
| |
1115 to 1140
|
Tea Break
| |
1140 to 1200
|
Platinum Session 1 by Verizon
| |
1200 to 1250
|
Protecting Key Economic Assets, Securing Financial Backbone
…. Stock Exchange, Payment Infrastructures & Financial Switches | |
1250 to 1310
|
Platinum Session 2 by TCG
| |
1310 to 1415
|
Lunch Break
| |
1415 to 1430
|
Special feature
| |
1430 to 1520
|
Architecting Security for New Age Banking
… Business Models, Technology Transformations & Channel Revolutions in the midst of Organized, Focused, Advanced & Persistent Cyber Threats | |
1520 to 1540
|
Special feature by HP
| |
1540 to 1640
|
Revolution named Clobile, Nightmare for Security? … Enterprise Mobility, Mobile Apps and Cloud Enablement Data driven Businesses
| |
1640 to 1700
|
Tea Break
| |
1700 to 1800
|
Data driven Businesses – Data reason for Empowerment and Concern
… Big Data, Context Computing & Social Media Computing | |
1800 to 1900
|
Networking and Exhibition
| |
1900 to 2030
|
DSCI Excellence Awards 2012
| |
2030 Onwards
|
Cocktail Dinner
| |
Day 2
| ||
Time
|
Session
| |
0930 to 1030
|
Cyber Security, from National Responsibility to Global Accountability
… Cyber diplomacy, converging national and international interests | |
1030 to 1100
|
Special Feature by CISCO
| |
1100 to 1130
|
Tea Break
| |
1130 to 1230
|
Securing Technology Transformation of Governance … eGovernance projects, Security Challenges & Solutions
| |
1230 to 1315
|
Rendezvous with Women Security Leaders: Special Interaction …. Security, Challenges and Opportunities for Women
| |
1315 to 1415
|
Lunch Break
| |
1415 to 1515
|
Security Enablement of Growing Electronic & Mobile Commerce
… Rising Volume & Growth of Commerce, Security as Enabler | |
1515 to 1600
|
Securing core, edge, access & connect: reappearance of network on agenda of security
… Finding the role of network security: Infrastructure Core, Hyer-extensive organizations, Access complexities, Mobility & External exposures | |
1600 to 1630
|
Tea Break
| |
1630 to 1730
|
Consumer Behaviors and Business Responsibilities In the Information Age … Responsible Behaviors, Fair Business Practices & Enabling Technologies
|
To Get Yourself Registrar For the Event Click Here
LINK TO OUR HOME PAGE :
Voice Of GREYHAT is a non-profit Organization propagating news specifically related with Cyber security threats, Hacking threads and issues from all over the spectrum. The news provided by us on this site is gathered from various Re-Sources. if any person have some FAQ's in their mind they can Contact Us. Also you can read our Privacy Policy for more info.
Thank You !
-Team VOGH
If you enjoyed VOGH News, Articles Then Do Make sure you to Subscribe Our RSS feed. Stay Tuned with VOGH and get Updated about Cyber Security News, Hacking Threads and Lots More. All our Articles and Updates will directly be sent to Your Inbox. Thank You!
-Team VOGH
Categories:
Cyber Security
,
DSCI
,
NASSCOM
,
Security Summit
,
security-news