Agenda:10:30-10:50 - CyberFrat introduction & Cyber News - Pooja/Vivek10:50- 11:10- Security Assessment difference and limitations between OT and IT networks by Mahendra Kumawat
What is Ot network and how it is different from IT NetworkProtocol used on OT for communicationDifferent limitations and control with OT networkApproach and security assessment in OT network
About SpeakerMahendra Kumawat is currently Working with Accenture as Security Team Lead. Proficient in application security assessments, network security assessments and information security strategies.
11:10-12:10 - IT vs OT – GRC Perspective - CA Narasimhan Elangovan
Historically Operational Technology (OT) Systems, were isolated from information Technology (IT). But with rise in Big Data, Analytics, AI and IoT, there is an increasing need to integrate IT with OT. This is bringing in newer risks and challenges. This session would cover the following:- Risks & Threats landscape in IT vs OT- Integration challenges- Need for Governance-Key Audit & Compliance areas
About SpeakerCA Narasimhan Elangovan, is a futurist, practicing Chartered Accountant and an InformationSystem Assurance Professional, partner of KEN & Co., Chartered Accountants, Bengaluru,India. He is an International Speaker on IS Assurance, Data Analytics, Cyber Security,Forensic Audit and Data Privacy Laws.
12:10-12:40 - Networking Break12:40-13:00 - Quiz - Pooja/Vivek
13:00-13:45 - IOT System Security By Amar Prusty, Cloud Data Center Architect, DXC Technology
The internet of things (IoT) presents us with enormous opportunities to positively affect the world around us—everything from increasing air quality to easing traffic to saving water and electricity. We can measure the world in new ways that can impact lives for the better. But just as opportunities increase with IoT, so does data. Secure IOT-Edge-Cloud is critical today as IoT & Digital Technologies are working in close collaboration with larger attack surface for security attacks-Vulnerabilities in IoT-Edge-Cloud-Application Solution Architecture which can be fixed proactively and fast response for attacks. This talk would focus on the overview of Security Risks with IOT-Edge-Cloud and approaches for prevention. It will also give you an overview of cybersecurity, Internet of Things, Edge, Cloud, Secure Application Development.Key Takeaways* What are the various security risks prevalent in IoT – Edge cloud.* How can we prevent the attacks on real-time mission-critical systems* What are the steps to follow to develop secure applications?
About SpeakerAmar Prusty works as a Cloud-Data Center Consultant Architect with DXC Technology with more than 17 Years of experience in IT Infrastructure and Cloud Consulting, Architecture, Design, Implementation and Support with Global Fortune 500 clients having worked with Aricent (Hughes),Infosys and Hewlett Packard Enterprise in the past for various Industry verticals and developed Thought Leadership in Digital Transformation from a Complex Heterogenous Infrastructure perspective.
13:45-14:00 - Topic discussion for next meet - Pooja/Vivek
Last Day to Register - 7th February 2019http://cyberfrat.com/bengalurumeet/