Almost 7 lakh cyber attacks were faced by commercial and legal entities and the citizens in India in 2020 as per The Ministry of Electronics and Information Technology (MeITY).
Enterprises in many countries like India, Bangladesh, Sri-Lanka are being subjugated to complex cyber-attacks which speaks for the vulnerabilities of the cyber landscape in South Asia. This can be easily attributed to lack of necessary cyber intelligence and the political and regulatory processes.
This cyber threat landscape across South Asia poses significant challenges due to rapid technological developments such as Cloud Computing, Artificial Intelligence, lnternet of Things, 5G.
The Government of India is working on a draft of the National Cyber Security Strategy 2020 that envisages creating a secure cyberspace in India. Similarly, a Cyber Security Act is being proposed under the National Cyber Security Strategy of Sri Lanka.
With the support of the various Government initiatives, enterprises are now looking at creating a comprehensive framework to prevent, manage cybersecurity threats and incidents effectively, and protect critical information infrastructure.
Join us for the Enterprise Cyber Security in South Asia webinar as we bring the top 200 IT Security professionals to hear from industry leaders on risk mitigation mechanisms and cybersecurity.
Agenda - 11th February 2021
|1400||[Showtime] Chairman Welcome Address
|1405||Thought Leadership Session: Cyber threat landscape in South Asia
This session will broadly discuss the cyber threat landscape evolving in South Asia. What are the regional challenges enterprises are facing to ensure cyber security?
|1415||Panel Session: Safeguarding your enterprise from complex and ever-evolving cyber attacks
As technology advances, the cyber threat landscape too evolves and it gets difficult to manage the different types of network infiltrations. Number of phishing and malware attacks tend to overwhelm a single antivirus solution especially with increasing data traffic moving through the different components of the IT infrastructure. According to Absolute, 70 percent of all breaches still originate at the endpoint. This session will focus on why endpoint security becomes absolutely essential for your enterprise. What are the advanced endpoint security tools that can enable enterprises prevent and manage security threats?
|1440||Panel Session: Securing your cloud environment – Why traditional approaches to cyber security will fall short?
With cloud computing becoming a necessary business strategy for enterprises today, cloud security has become indispensable. However, having the same approach that we have towards cybersecurity for an on-prem facility cannot be lifted and shifted to a cloud environment. So what are the different approaches to ensuring cyber security in the cloud environment.
|1515||Chairman Closing Address
Registration for qualified participants is free in support of COVID-19 Work From Home.
These events are open to any strategic or business person whose function interacts with the enterprise or service provider and that comprise the increasingly complex technology purchaser/decision-maker chain, to include:
- C-level management: CSO, CISO, C-Level professionals
- Senior Executives: Heads of Security, Head Network Security, Data center and cloud security practitioners, Enterprise IT and data center security professionals, security architects and planners
Get in Touch
If you are a Technology Service Provider and will like to explore opportunities to get infront of our audience, do reach out to us at firstname.lastname@example.org