CyberFrat Bengaluru Meet - February 2019
CyberFrat Bengaluru Meet
Date : 9th February 2019 (Saturday)
Time: 10:30 AM - 02:00 PM
Venue : Grant Thornton India
Gurukul 4, Ground Floor, 65/2, Block A, Bagmane Tridib, Bagmane Tech Park, C V Raman Nagar, Bengaluru

10:30-10:50 - CyberFrat introduction & Cyber News - Pooja/Vivek
10:50- 11:10- Security Assessment difference and limitations between OT and IT networks by Mahendra Kumawat

What is Ot network and how it is different from IT Network
Protocol used on OT for communication
Different limitations and control with OT network
Approach and security assessment in OT network

About Speaker
Mahendra Kumawat is currently Working with Accenture as Security Team Lead. Proficient in application security assessments, network security assessments and information security strategies.

11:10-12:10 - IT vs OT – GRC Perspective - CA Narasimhan Elangovan

Historically Operational Technology (OT) Systems, were isolated from information Technology (IT). But with rise in Big Data, Analytics, AI and IoT, there is an increasing need to integrate IT with OT. This is bringing in newer risks and challenges. This session would cover the following:
- Risks & Threats landscape in IT vs OT
- Integration challenges
- Need for Governance
-Key Audit & Compliance areas

About Speaker
CA Narasimhan Elangovan, is a futurist, practicing Chartered Accountant and an Information
System Assurance Professional, partner of KEN & Co., Chartered Accountants, Bengaluru,
India. He is an International Speaker on IS Assurance, Data Analytics, Cyber Security,
Forensic Audit and Data Privacy Laws.

12:10-12:40 - Networking Break
12:40-13:00 - Quiz - Pooja/Vivek

13:00-13:45 - IOT System Security By Amar Prusty, Cloud Data Center Architect, DXC Technology

The internet of things (IoT) presents us with enormous opportunities to positively affect the world around us—everything from increasing air quality to easing traffic to saving water and electricity. We can measure the world in new ways that can impact lives for the better. But just as opportunities increase with IoT, so does data. Secure IOT-Edge-Cloud is critical today as IoT & Digital Technologies are working in close collaboration with larger attack surface for security attacks-Vulnerabilities in IoT-Edge-Cloud-Application Solution Architecture which can be fixed proactively and fast response for attacks. This talk would focus on the overview of Security Risks with IOT-Edge-Cloud and approaches for prevention. It will also give you an overview of cybersecurity, Internet of Things, Edge, Cloud, Secure Application Development.
Key Takeaways
* What are the various security risks prevalent in IoT – Edge cloud.
* How can we prevent the attacks on real-time mission-critical systems
* What are the steps to follow to develop secure applications?

About Speaker
Amar Prusty works as a Cloud-Data Center Consultant Architect with DXC Technology with more than 17 Years of experience in IT Infrastructure and Cloud Consulting, Architecture, Design, Implementation and Support with Global Fortune 500 clients having worked with Aricent (Hughes),Infosys and Hewlett Packard Enterprise in the past for various Industry verticals and developed Thought Leadership in Digital Transformation from a Complex Heterogenous Infrastructure perspective.

13:45-14:00 - Topic discussion for next meet - Pooja/Vivek

Last Day to Register - 7th February 2019

Email address *
Name *
Your answer
Contact Number *
Your answer
Organisation/College *
Your answer
Designation/Stream *
Your answer
A copy of your responses will be emailed to the address you provided.
Never submit passwords through Google Forms.
This content is neither created nor endorsed by Google.