To ensure a smooth experience for all attendees, please be seated in the Auditorium by 8:45 AM for the keynote session. Late arrivals will be directed to overflow session rooms, where the keynote will be available virtually.
Scroll to see more
Time | Keynotes | |||
---|---|---|---|---|
9:00 AM - 9:30 AM |
The Business of Cybersecurity - Trends & TransformationsAnirban Mukherji,CEO & Founder - miniOrange |
|||
9:30 AM - 10:10 AM |
Security - Past, Present & FutureRaj Sabhlok ,Operating Partner - Bessemer Venture, Ex President Zoho |
|||
10:10 AM - 10:40 AM |
Cybersecurity in the Age of AI: Challenges, Opportunities, and SolutionsAkash Sureka ,Strategic Advisor, & Entrepreneur with Exits, Ex MD JP Morgan |
|||
10:40 AM - 11:10 AM |
The State of AI and Generative AI: Challenges and OpportunitiesAbhishek Mukherji ,Ph.D, CTO of Generative AI Solutions - Centific |
|||
11:10 AM - 11.30 AM |
Age of Accelerated AI: What it means to Identity GovernanceVinayak Godse ,CEO, DSCI |
|||
10 min break | ||||
Time/Tracks |
Security Essentials |
Hackers, Threats and Vulnerabilities |
DevSecOps & Application Security |
Platform and Strategy |
11:40 AM - 12:20 PM |
Editor's Pick
Certificates 101 - Understanding the Backbone of Digital TrustKalpesh HiranHead of technology / Cloud Security Specialist, miniOrange (Training Room 1) |
Your application has vulnerabilities and you missed themPratish RayHead of technology (IAM), miniOrange (Auditorium) |
How to train your detection DragonGeet PradhanSecurity Engineer - Lime (Training Room 3) |
Data Alchemy: Turning Insights into Strategic GoldSuraj PandeyHead of Marketing ,miniOrange Ex Govt Officer, PG - Data Science (Training Room 2) |
10 min break | ||||
12:30 PM - 01:10 PM |
From Access to Assurance: IAM’s Critical Role in Meeting ComplianceSwati GuptaHead of IAM, miniOrange (Training Room 3) |
Generative AI Application Performance and SecurityNikhilesh TayalFounder and Teacher - AI ML (Training Room 1) |
Editor's Pick
Shift-Left Security & DevSecOpsKapil BhandariSr. Technology Lead, miniOrange (Auditorium) |
Behind the Scenes of Secure E-Commerce: A Developer’s Toolkit for Cyber DefenseNitesh PamnaniMagento Solution Expert, miniOrange (Training Room 2) |
1:00 PM - 2:00 PM Lunch | ||||
1:15 PM - 1:55 PM |
The Power of Encryption in Preventing ThreatsAtul Kumar ParmarSenior Security Analyst - Cloud, Qualys (Training Room 2) |
Broken Object Level Authorization (BOLA) Attacks on APIsYash YadavSr. API Security Engineer, miniOrange (Auditorium) |
Tackling New CyberSecurity Challenges for Gen AIAbhang MandwaleCyber Security Enthusiast (Training Room 1) |
How to Win Customers with Words That WorkKamlesh AsraniCustomer Success Manager, miniOrange (Training Room 3) |
5 min break | ||||
2.00 PM - 2.40 PM |
Cyber crime complaints and court proceedingsAdv. Prasannakumar Joshi(Training Room 2) |
Editor's Pick
AI Powered Cyber SecurityAmit DabhaneSenior Technical Project Manager - Persistent Systems (Auditorium) |
Governance of Enterprise Kubernetes Clusters On Amazon EKSDivya BaisSr. DevOps Engineer, miniOrange (Training Room 3) |
Manage Access, Security and Maintenance for World’s Most Popular CMSKrishna Vijay, Engineering Manager, miniOrange Pooja Uniyal, Engineering Manager, miniOrange (Training Room 1) |
10 min break | ||||
2:50 PM - 3:30 PM |
Securing Organizations in Cyberspace Using Cyber Threat IntelligenceKhushboo Nalbhimwar, Cyber Threat Intelligence Analyst at Varian – A Siemens Healthineers Company(Training Room 2) |
Editor's Pick
Gone in 60 Microseconds: Stopping IoT and Automotive HacksGaurav BansodPh.D, Global Business|Cybersecurity Consultant, miniOrange (Training Room 1) |
Threat Modeling and Its Implementation in an Agile Cloud-Based ProductArun Pal(Training Room 3) |
Editor's Pick
The miniOrange StoryAnirban Mukherji, Founder & CEO miniOrange(Auditorium) |
10 min break | ||||
3:40 PM - 4:20 PM |
Editor's Pick
Mastering Cloud Security: Best Practices Aligned with the MITRE ATT&CK FrameworkRahul PareekCloud Security Analyst at Qualys (Training Room 3) |
Editor's Pick
The Million Dollars At Stake: Exploring Security In Web3Harsh ParekhFounder & CEO, Securze (Auditorium) |
Editor's Pick
Data Privacy 101Debashish PramanikCo-Founder - PrivacyShield (Training Room 1) |
Doubledagger: Quantum Computing and It's Impact on CybersecurityKrishna ThiteEthical Hacker (Training Room 2) |
10 min break | ||||
4:30 PM - 5:10 PM |
Building OAuth from First PrinciplesManali KaswaEspressif Systems (Training Room 3) |
Beyond the Paradox: Securing AI and Harnessing its Potential to Redefine CybersecuritySumitra BiswalTech Lead in intersection of AI & Cybersecurity, Bosch Global (Auditorium) |
Editor's Pick
Prioritizing Cloud Security: A Comprehensive Risk-Based CSPM StrategyAnuj KumarSr. Security Analyst, Qualys (Training Room 2) |
Active Directory Security: Mitigating LDAP Password Spray attacks using AD ToolsAvi SaxenaAD Specialist, miniOrange (Training Room 1) |
10 min break | ||||
5:20 PM - 6:00 PM |
Two-Way Trust: Securing Web Traffic with Mutual TLS (mTLS)Vidushi Gupta, Ajay Pratap Singh BishtSoftware Engineer, miniOrange (Training Room 2) |
Editor's Pick
Hacker vs Defender: Advanced Tactics and Techniques for Penetration TestingGaurav Todwal,Surinder KumarPre-Requisites: Laptop with BurpSuite/WireShark installedSoftware Engineer, miniOrange (Auditorium) |
Identity Security in the Digital AgeDinesh MishraProduct Manager - SailPoint (Training Room 1) |
Grievance Management System, SIEM, Cyber Education, Mobile Application for threat analyzingHritik Mishra, Operational Director at Cyber Ambassador(Training Room 3) |
End of Day 1 |
Time/Tracks | Security Essentials | Hackers, Threats and Vulnerabilities | DevSecOps & Application Security | Platform and Strategy |
---|---|---|---|---|
9:00 AM - 9:40 AM |
Editor's Pick
From Coarse-Grained Roles to Fine-Grained Policies: Future Proofing Access ControlAnkit AhujaPrincipal Engineer / IAM, miniOrange (Auditorium) |
Editor's Pick
Hack and Code : A programmers journey from hacking to secure codingGaurav SoodHead of Architect, miniOrange (Training Room 1) |
Editor's Pick
From Deployment to Decommissioning: A Strategic Approach to Endpoint Security LifecycleDhruv BhavsarSr. Cloud Security Engineer, miniOrange (Training Room 3) |
Battling Social Engineering in the Age of AIHemant PawarChrome Extension Developer, miniOrange (Training Room 2) |
10 min break | ||||
9:50 AM - 10:30 AM |
Editor's Pick
Modernizing Security Operations with Zero Trust Architecture on Multi CloudSaurabh MishraDevOps Lead - TSYS (Training Room 1) |
Editor's Pick
Owning AWS via Exploiting Alfresco ComponentsOmkar Joshi, Lead Security Engineer - Coupa SoftwarePallavi Deshmukh, Cloud Security Manager - Coupa Software(Auditorium) |
The Foundation of Modern Cyber DefenseLokesh RajawatSr. Software Engineer, miniOrange (Training Room 3) |
Boost Speed, Enhance User Experience: Performance Optimization for WordPress SitesShweta GhateWeb Development Lead, miniOrange (Training Room 2) |
10 min break | ||||
10:40 AM - 11:20 AM |
Future of Authentication: Password-less SecurityKaushik DasputeSr. Engineer (IAM), miniOrange (Training Room 1) |
Editor's Pick
How to be Safe from AI-driven Identity Scams?Vipika KotangaleTechnical Content Writer, miniOrange (Training Room 3) |
From Links to Locks: Building Secure Scalable Network ArchitecturesPradeep KumarPAM Lead, miniOrange (Auditorium) |
Zero Trust Security for WordPress: Is It Feasible? Applying modern cybersecurity frameworks to WordPress environmentsTanuj AgarwalSoftware Engineer, miniOrange (Training Room 2) |
10 min break | ||||
11:30 AM - 12:10 PM |
Editor's Pick
Hack Me If You Can: Demonstration of Hacking and Preventing API VulnerabilitiesGaurav TodwalPre-Requisites: Laptop with BurpSuite/WireShark installedSoftware Engineer (Cyber Security), miniOrange (Auditorium) |
Dark Web Basics, Threats And AccessibilityMihir SomanCyber-Forensics | Innovation Cell Ambassador- IICMIT (Training Room 1) |
Medical Device Cyber SecurityNeelam VarmaMedTech Secure / Executive board leader (Training Room 3) |
Editor's Pick
Innovative social media strategies to Drive Growth in the Modern Business LandscapeAyushi TiwariCybersecurity Specialist, miniOrange (Training Room 2) |
10 min break | ||||
12:20 PM - 1:00 PM |
Digital Identity: Shaping the future of Identity ManagementShyam SharmaSenior Engineer (IAM), miniOrange (Training Room 1) |
Editor's Pick
Cloud Data Security: Encrypting Data as It Leaves Your NetworkAjay Pratap Singh Bisht and Vidushi GuptaSoftware Engineer (CASB), miniOrange (Auditorium) |
TLS Chronicles: The Past, Present, and FutureGaurav SinghSenior Engineer (Cyber Security), miniOrange (Training Room 3) |
Head in the clouds: The evolving cloud threadscapeJoshua BahirvaniSr. Security Researcher, Microsoft (Training Room 2) |
1:00 PM - 2:00 PM Lunch | ||||
2:00 PM - 2:40 PM |
Identity at the Core: The IAM Blueprint for Zero TrustLokesh NaktodePrincipal Engineer (IAM), miniOrange (Auditorium) |
Need for Adversarial Debiasing in ML Models using Synthetic Data for Enhanced SecurityAdith Sukumar(Training Room 2) |
Cybersecurity: A New Priority in the Education SectorPrajwal BhalsingDirector of Information Security, Indir (Training Room 1) |
Advanced Asynchronous Programming Patterns in JavaScriptDhanashree BurhadeWeb Developer, miniOrange (Training Room 3) |
10 min break | ||||
2:50 PM - 3:30 PM |
Enabling Zero Trust: Real-Time Granular Access Control for Modern WorkforcesAjay Pratap Singh BishtSoftware Engineer (CASB), miniOrange (Training Room 1) |
Editor's Pick
AI Bug BountyTanmay S Dikshit, Cyber Sanskar(Auditorium) |
AI Automation in Cybersecurity: Transforming Digital DefenseAnant UpadhyayHICA SSPU (Lead) (Training Room 3) |
Unmasking XSS Attacks in WordPress - Understanding & preventing security threatsIshika BansalSoftware Engineer, miniOrange (Training Room 2) |
10 min break | ||||
3:40 PM - 4:20 PM |
Editor's Pick
Panel DiscussionManish ChhabraNakul SahaNitesh Pamnani(Auditorium) |
Exploring Frontend Vulnerabilities: The Gateway to HackingShubham JajooUI Developer, miniOrange (Training Room 2) |
Unleashing Vulnerability Detection with Open Source Tools: Code, Defend, DeployMrunal DhakateSoftware Engineer (Cyber Security), miniOrange (Training Room 3) |
Editor's Pick
Your Money or Your Life - Framework from Google that keeps users safeAzaruddin ShaikhSEO Specialist, miniOrange (Training Room 1) |
4:30 PM - 5:30 PM | Innovation Sandbox Pitches(Auditorium) |
|||
5:30 PM - 5:50 PM | Closing Keynote by Anirban Mukherji, Founder & CEO, miniOrange(Auditorium) |
|||
5:50 PM - 6:00 PM | Awards Ceremony(Auditorium) |
|||
End of Day 2 |
Agenda
DAY 1
Saturday 11 January
8:00 AM - 9:00 AM
Registrations Open
9:00 AM - 9:30 AM
Opening Keynote
9:30 AM - 11:30 AM
Keynote Sessions
11:30 AM - 6:00 PM
Booths Open
11:30 AM - 6:00 PM
Sessions & Workshops Tracks
- Security Essentials
- Hackers, Threats and Vulnerabilities
- DevSecOps & Application Security
- Platform and Strategy
1:00 PM - 2:00 PM
Lunch
DAY 2
Sunday 12 January
8:00 AM - 9:00 AM
Registration Opens
8:00 AM - 5:00 PM
Booths, Sessions & Workshop Tracks
- Security Essentials
- Hackers, Threats and Vulnerabilities
- DevSecOps & Application Security
- Platform and Strategy
1:00 PM - 2:00 PM
Lunch
5:00 PM - 6:00 PM
Closing Ceremony
Note: Our curated 'Editor's Picks' feature sessions of exceptional value, focusing on advanced identity security topics led by industry leaders and experts. While all sessions are valuable, these are highly recommended for their strategic relevance and insights.