­
CISO Platform Breach And Attack Summit 2022 - All Articles - CISO Platform

CISO Platform Breach And Attack Summit 2022

Learn About Top Breches, Attack Trends & Techniques And How To Defend Against Them. Our editorial team has handpicked the top sessions at Breach & Attack Summit held in Bangalore, Mumbai and Chennai. Here are the list of top sessions in Breach & Attack Summit 2022. 

350+ CISOs & Members joined us, 80+ Speakers shared their knowledge with the community and 47K+ engaged on social media. Attendees experienced keynotes, panel discussions and hands on workshops. 

 

Generic%20Banner%20for%20marketing%20mail.jpg?profile=RESIZE_710x

 

 

1 - (Keynote) Dissecting Verizon DBIR: What's Causing Most Breaches?

Speaker: Jitendra Chauhan

Analysis Of Verizon DBIR & Top Attack Vectors. The cyber security world has been very active last year - from very well-publicized critical infrastructure attacks to massive supply chain breaches. In this event, we will look deep into Verisign DIBR report and find out how attackers navigate to your valuable assets and what you can do about it.

 >> Go To Presentation 

Topic%201.jpg?profile=RESIZE_930x

 

 

2 - (Keynote) Shift Left Of Boom: The new "Shift-Left" Movement That CISOs Must Keep An Eye On

Speaker: Sachin Deodhar

At its core, “boom” is an unwanted, bad event for the defender — the initial contact from the offender. “Left of boom” is the set of events that occur in the timeline before the boom and “right of boom” is the set of events that follows. If we applied this to the cyber domain, Left of Boom would refer to those proactive initiatives and actions that are designed to prevent/preempt (or minimize risk associated with) an adverse cyber event. 

>> Go To Presentation

Topic%202.jpg?profile=RESIZE_710x

 

3 - (Keynote Panel) Building A Reference Architecture For Detect, Respond And Recover Capability

Moderator: Sanil Anad Nadkami     

Panel: Aditi Lath, Manikant R Singh, Dheemanth R, Rajesh Jain, Satya Maddela, Senthil N, Vikash Kumar Singh, Purna Reddy Bolla, Anshuman Singh
Topic%203.jpg?profile=RESIZE_710x

 

 

4 - (Workshop) Practical Approaches For Securing IoT Ecosystems 

Speaker: Maithri Nadig, Rahul U, Krishnaa Srinivasa
Topic%204.jpg?profile=RESIZE_710x

 

 

 5 - (Keynote Panel) Strategies To Manage The Unknown Unknowns In Your Attack Surface

Moderator: Navaneethan M, 

Panel: Yogesh M, Manoj Kuruvanthody, Samrat Bhatt, Satya NM, Shaik Javeed Ahmed, Srinivas Thimmaiah, Arnab Chattopadhayay
Topic%205.jpg?profile=RESIZE_710x

 

 

6 - (Workshop) Purple Teaming With Adversary Emulation

Speaker: Sachin Deodhar

Adversary emulation involves leveraging your Red Teams to use real world adversary tactics, techniques and procedures (TTPs), alongside attack frameworks such as MITRE ATT&CK to: Identify control gaps (and weaknesses); Validate your monitoring, detection and response capabilities; Prioritizing your security investments towards mitigating any shortcoming that may be observed using this approach.

>> Go To Presentation
Topic%206.jpg?profile=RESIZE_710x

 

 

7 - CISO Platform Task Force Initiative 2022

Speaker: Bikash Barai

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

1200650%20Breach&Attack%20Summit%20Blog%20.jpg?profile=RESIZE_710x 

 

8 - (Keynote Panel) Managing Security During Turbulent Times

Moderator: Roshan Williams

Panel: Prathap R, Raghavendra Bhat, Satish Kumar Dwibhashi, Shetty KV, Vishal Kalro, Murali Krishnaam, Aditya Kakrania
1200650%20Breach&Attack%20Summit%20Blog%20%20(1).jpg?profile=RESIZE_710x

 

 

9 - (Keynote Panel) Analysing Recent Gartner Hype Cycle And Emerging New Technologies

Moderator: Somshubhro Pal Choudhury

Panel: Asif Nalakath, Nantha Ram, Naseem Halder, Nitish Goyal, Philip Varughese, Sandeep Bansal, Anirudha Nayak, Harmeet Kalra

Topic%209.jpg?profile=RESIZE_710x

 

 

10 - (Workshop) Decoding CIS Risk Assesment Method V2.1 : How To Leverage

Speaker: Aditya Kakrania

Risk assessments are valuable tools for understanding the threats enterprises face, allowing them to organize a strategy and build better resiliency and business continuity, all before a disaster occurs. Preparation is key – after all, the worst time to plan for a disaster is during a disaster.

>> Go To Presentation

1200650%20Breach&Attack%20Summit%20Blog%20%20(2).jpg?profile=RESIZE_710x

 

 

11 - (Keynote Panel) Building A Reference Architecture For Detect, Respond And Recover Capability

Moderator: Bijender Kumar Mishra     

Panel: Urvish Acharya, Tejas Shah, Pradipta Patro, Suresh A Shan, Vasudevan Nair, Satyanandan Atyam, Anshuman Singh
11.jpg?profile=RESIZE_930x

 

 

12 - (Keynote Panel) Analysing Recent Gartner Hype Cycle And Emerging New Technologies

Moderator: Vijay Kumar Verma

Panel: Hiren Pandey, Shitij Bhatia, Sanjay Jaiswal, Rohit Yeshwant Rane, Satyavrat Mishra, Melwyn Rebeiro, Harmeet Kalra
12.jpg?profile=RESIZE_930x

 

 

13 - (Keynote Panel) Managing Security During Turbulent Times

Moderator: Ambarish Kumar Singh

Panel: Balram Choudhary, Dr. Naresh Kumar Harale, Shankar Jadhav, Shobhana Lele, Venkata Satish Guttula, Satyanandan Atyam, Aditya Kakrania
13.jpg?profile=RESIZE_930x

 

 

14 - (Keynote Panel) Managing Stress During Crisis

Moderator: Bikash Barai

Speaker: Ajay, Harshad Mengle, Mohd Imran

1200650%20Breach&Attack%20Summit%20Blog%20%20(3).jpg?profile=RESIZE_710x

 

 

15 - (Keynote Panel) Strategies To Manage The Unknown Unknowns In Your Attack Surface

Moderator: Dilip Panjwani

Speaker: Kedar Telavane, Sachin Kawalkar, Gopal Gupta, Kalpesh Doshi, Ananth MS
Topic%2015.jpg?profile=RESIZE_710x

 

 

16 - (Keynote Panel) Building A Reference Architecture For Detect, Respond And Recover Capability

Moderator: Gowdhaman Jothilingam     

Panel: Prabhakar Ramakrishnan, Venugopal Parameswaran, M Sivasubramanian, Srinivasulu Thayam, Maharajan S, Anshuman Singh

16.jpg?profile=RESIZE_930x  

 

17 - (Keynote Panel) Strategies To Manage The Unknown Unknowns In Your Attack Surface

Moderator: Vijaykumar Radhakrishnan

Panel: Vijayakumar KM, Lakshmi Narasimhan R, Venkatasubramanian Ramakrishnan, Palanikumar Arumugam, Vijay Anand, Gokulavan Jayaraman, Thamaraiselvan, Arnab Chattopadhayay
1200650%20Breach&Attack%20Summit%20Blog%20%20(4).jpg?profile=RESIZE_710x

 

 

18 - (Workshop) Purple Teaming With Adversary Emulation

Speaker: Jitendra Chauhan

Adversary emulation involves leveraging your Red Teams to use real world adversary tactics, techniques and procedures (TTPs), alongside attack frameworks such as MITRE ATT&CK to: Identify control gaps (and weaknesses); Validate your monitoring, detection and response capabilities; Prioritizing your security investments towards mitigating any shortcoming that may be observed using this approach.

>> Go To Presentation

1200650%20Breach&Attack%20Summit%20Blog%20%20(5).jpg?profile=RESIZE_710x

 

 

19 - (Keynote Panel) Chennai Chapter Presentation

Panel: Gokulavan Jayaraman, Prabhakar Ramakrishnan, Thamaraiselvan S, Suprakash Guha, Gowdhaman Jothilingam, Srinivasulu Thayam
Topic%2020.jpg?profile=RESIZE_710x

  

 

20 - (Keynote) Shift Left Of Boom: The New "Shift-Left" Movement That CISOs Must Keep An Eye On

Speaker: Arnab Chattopadhayay

At its core, “boom” is an unwanted, bad event for the defender — the initial contact from the offender. “Left of boom” is the set of events that occur in the timeline before the boom and “right of boom” is the set of events that follows. If we applied this to the cyber domain, Left of Boom would refer to those proactive initiatives and actions that are designed to prevent/preempt (or minimize risk associated with) an adverse cyber event. 

>> Go To Presentation
1200650%20Breach&Attack%20Summit%20Blog%20%20(6).jpg?profile=RESIZE_710x

 

 

21 - (Keynote Panel) Analysing Recent Gartner Hype Cycle And Emerging New Technologies

Moderator: AVS Prabhakar

Panel: Balakrishnan Kanniah, Gopi Krishna Togarcheti, Madhavan GG, Kavitha Srinivasulu, Suprakash Guha, Srinivasan
t22.jpg?profile=RESIZE_930x

 

Votes: 0
E-mail me when people leave their comments –

Community Head, CISO Platform

You need to be a member of CISO Platform to add comments!

Join CISO Platform

Comments

This reply was deleted.

Join The Community Discussion

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)
 

 

 

City Round Table Meetup - Mumbai, Bangalore, Delhi, Chennai, Pune, Kolkata

  • Description:
    CISO Playbook Round Table Overview : 
    Our round tables are designed to bring together top CISOs and IT leaders in intimate, focused sessions. These closed-door discussions will provide a platform to explore key security challenges and solutions. These sessions aim to create a focused, closed-door environment where 08-10 CISOs will dive deeply into the practicalities of implementing specific technologies.
    • Technology Implementation: From…
  • Created by: Biswajit Banerjee
  • Tags: ciso, playbook, round table

Round Table Dubai 2025 | GISEC

  • Description:
    CISO Playbook Round Table Overview : 

    Our round tables are designed to bring together top CISOs and IT leaders in intimate, focused sessions. These closed-door discussions will provide a platform to explore key security challenges and solutions. These sessions aim to create a focused, closed-door environment where 08-10 CISOs will dive deeply into the practicalities of implementing specific technologies.
    • Technology…
  • Created by: Biswajit Banerjee

Fireside Chat With Dan Bowden (Global Business CISO, Marsh McLennan (Marsh, Guy Carpenter, Mercer, Oliver Wyman))

  • Description:

    We’re excited to bring you an insightful fireside chat on "Navigating the Cyber Insurance Landscape: Key Considerations for CISOs" with Dan Bowden (Global Business CISO, Marsh McLennan) and Erik Laird (Vice President - North America, FireCompass). In this fireside chat, we'll decode the complexities of cyber insurance from a CISO’s lens and uncover how to make smarter, security-aligned decisions when it comes to policy design, claims, and ROI.

    As cyberattacks grow in…

  • Created by: Biswajit Banerjee
  • Tags: ciso, cyber insurance, dan bowden

CISO Platform: CISO 100 Awards & Future CISO Awards @ Atlanta

  • Description:

    Nominate for the CISOPlatform CISO 100 Awards & Future CISO Awards - Recognizing Cybersecurity Leaders. Recommend someone you know deserving of this prestigious accolade....Nominate your colleague, mentor, someone you admire or yourself !

    CISO Platform is collaborating as a community partner with EC-Council’s Global CISO Forum, supporting initiatives such as the CISO Platform…

  • Created by: Biswajit Banerjee