SECURITY ARCHITECTURE 

10-11 NOVEMBER, 2017   |   BANGALORE   |   INDIA 

Security Architecture Conference started as a simple idea to grow the Information Security builder community. The 4th edition of SACON is organized by CISO Platform, the largest social collaboration platform exclusively for CISOs and senior information security executives with 60,000+ subscribers

SACON

PRE- REGISTER

Overview of AI & Machine Learning for CISOs and how they're impacting the security landscape

Summary of Top Talks from prominent security conferences like RSAC, BlackHat, Defcon etc.

Overview of Deception Technology, Architecture & Key Components, Deployment Guidelines

Designing Multiple layers of Security Architecture, from Business Architecture to Technical Security Architecture

AI & Machine Learning for CISOs

Top talks from global conferences

Deception

Cybersecurity Reference Architecture Design 

© Copyright 2017 CISO Platform

International Conference on

“If I hadn't come, it would take another 2 to 3 years to learn and understand these tools”

“Very insightful, will definitely help us create a very effective security architecture”

“The principles .. gives a structure to the thought process”

Alexander Polyakov

Chief Technology Officer, 
ERP Scan

Jacob Torrey

Program Manager, 
Defense Advanced Research Projects Agency (DARPA)

Antti Karjalainen

Software Engineer, 
MediaTek
(Part of Heartbleed Bug Discovery team)

Nir Valtman

Head Of Application Security,
NCR Corporation

Visit The Himalayas, Taj Mahal, The Great Indian Dessert & Palaces, The Western Ghats & many more places

SACON sells out very fast, pre-registration gives you access to special discount schemes and notifications before it's sold out.

Understanding Business / Management

 & Communicating with the Board

Understanding key management concepts so that you can align your security program with business priorities & Creating a reference board presentation template which you can use for 2018

Managing insider threats using behavioural analytics

Insider Threats

Security Threats Landscape for 2017

Evolution of Security Threats landscape & top 10 threats that were new in 2017

Top 10 Security Predictions for 2018

Based on our research, we'll be presenting top 10 predictions for 2018 for you to consider when making your plans

SOC

Reference architecture and overview of key components of a SOC, e.g.: SIEM, Honeypots, Data Sources, Integrations, Threat Intelligence, EDR, Forensics Tools etc.

IR - Incident Response

Building a framework & processes for managing cybersecurity incidents

Security  Architecture Workshop

Designing Multiple layers of Security Architecture, from Business Architecture to Technical Security Architecture

Cyber Range Drills

Wargame on responding to various types of security incidents at a strategic and operational level

Threat Hunting

Here we'll discuss the Key Components, Tool Set, Learning "Hunter" Skills and a Case Study

Cloud Security

Overview of Amazon’s approach to cybersecurity

AppSec

Creating a scenario of an organization and then use controls from OpenSAMM and BSIMM to choose the right elements of the AppSec program

Security Tech Landscape

Overview of new & emerging security technologies in the market and how the security tech landscape is shaping up

Overview of the IoT technology architecture and modelling threats & controls against different components (e.g.: Gateway)

Forensics

Workshop on how to do a comprehensive forensics examination post an incident, at endpoint & network level

SecDevOps

Leveraging the opportunity provided by DevOps to embed & automate security in the CI/CD processes

Startup Security

Startup Security Stack: Using 80-20 rule to build effective security strategy for a startup

PRE- REGISTER NOW

Lalit Ashok, Bengaluru, India

10 & 11 November, 2017

All talks will happen in the main or parallel track, detail of which will be mentioned in emailed agenda

All talks will happen in the main or parallel track, detail of which will be mentioned in emailed agenda

CALL FOR SPEAKERS

SACON 4th edition - International Conference on  Security Architecture. Here are some points to keep in mind while submitting the form:


  • We are looking for highly technical talks (demonstrations,code-level examples..etc are always welcome)
  • The CXO track can have some high level strategic talks which can include Real Case Studies


SUBMIT PAPER

Submit asap. Submission may close if enough good papers are received

SPREAD THE WORD

Don't Forget The Deadline For Submission Is 30th June

Arnab Chattopadhayay

Former Security Architect at BT London, Multiple Patents 

Nilanjan De

Multiple Patents, Zero Day Discovery, IIT Alumni

Ravi Mishra

Head Of CISO Advisory, CISO Platform, IIT Alumni

Bikash Barai

Multiple Patents, IIT Alumni, Fortune 40-under-40, Frequent international speaker at RSA, Interop and more

Kenneth Bradberry

Chief Technology Officer, 
Xerox

Matt Suiche

Speaker & Review Board Member, Black Hat

Reinhold Wochner

Lead Of Digital Security, Raiffeisen Bank International

Allan Thomson

Chief Technology Officer, LookingGlass

SACON VISION

WHO's SPOKEN

WHO COVERED US

WHAT ARE THEY SAYING

YOU'll FALL IN LOVE WITH INDIA

PRE REGISTER FOR SACON 2017

Who Should Attend: CISO, CRO, CIO, Information Security Experts,  IT Risk Professionals, Appsec Professionals ....

AGENDA AT A GLANCE

IOT

PRE- REGISTER NOW

Mobile - We brought together best of the minds in the Security Industry

Alexander Polyakov

Chief Technology Officer, 
ERP Scan

Jacob Torrey

Program Manager, 
Defense Advanced Research Projects Agency (DARPA)

Antti Karjalainen

Software Engineer, 
MediaTek
(Part of Heartbleed Bug Discovery team)

Nir Valtman

Head Of Application Security,
NCR Corporation

Arnab Chattopadhayay

Former Security Architect at BT London, Multiple Patents 

Nilanjan De

Multiple Patents, Zero Day Discovery, IIT Alumni

Ravi Mishra

Head Of CISO Advisory, CISO Platform, IIT Alumni

Bikash Barai

Multiple Patents, IIT Alumni, Fortune 40-under-40, Frequent international speaker at RSA, Interop and more

Matt Suiche

Speaker & Review Board Member, Black Hat

Reinhold Wochner

Lead Of Digital Security, Raiffeisen Bank International

Allan Thomson

Chief Technology Officer, LookingGlass

WHO's SPOKEN

We brought together best of the minds in the Security Industry

Kenneth Bradberry

Chief Technology Officer, 
Xerox

We brought together best of the minds in the Security Industry

CALL FOR SPEAKERS

SACON 4th edition - International Conference on  Security Architecture. Here are some points to keep in mind while submitting the form:


  • We are looking for highly technical talks (demonstrations,code-level examples..etc are always welcome)
  • The CXO track can have some high level strategic talks which can include Real Case Studies


SUBMIT PAPER

“The principles .. gives a structure to the thought process”

“If I hadn't come, it would take another 2 to 3 years to learn and understand these tools”

“Very insightful, will definitely help us create a very effective security architecture”

Don't Forget The Deadline For Submission Is 30th June

Overview of AI & Machine Learning for CISOs and how they're impacting the security landscape

Summary of Top Talks from prominent security conferences like RSAC, BlackHat, Defcon etc.

Overview of Deception Technology, Architecture & Key Components, Deployment Guidelines

Designing Multiple layers of Security Architecture, from Business Architecture to Technical Security Architecture

AI & Machine Learning for CISOs

Top talks from global conferences

Deception

Cybersecurity Reference Architecture Design 

Understanding Business / Management

 & Communicating with the Board

Understanding key management concepts so that you can align your security program with business priorities & Creating a reference board presentation template which you can use for 2018

Managing insider threats using behavioural analytics

Insider Threats

Security Threats Landscape for 2017

Evolution of Security Threats landscape & top 10 threats that were new in 2017

Top 10 Security Predictions for 2018

Based on our research, we'll be presenting top 10 predictions for 2018 for you to consider when making your plans

SOC

Reference architecture and overview of key components of a SOC, e.g.: SIEM, Honeypots, Data Sources, Integrations, Threat Intelligence, EDR, Forensics Tools etc.

IR - Incident Response

Building a framework & processes for managing cybersecurity incidents

Security  Architecture Workshop

Designing Multiple layers of Security Architecture, from Business Architecture to Technical Security Architecture

Cyber Range Drills

Wargame on responding to various types of security incidents at a strategic and operational level

Threat Hunting

Here we'll discuss the Key Components, Tool Set, Learning "Hunter" Skills and a Case Study

Cloud Security

Overview of Amazon’s approach to cybersecurity

AppSec

Creating a scenario of an organization and then use controls from OpenSAMM and BSIMM to choose the right elements of the AppSec program

Security Tech Landscape

Overview of new & emerging security technologies in the market and how the security tech landscape is shaping up

Overview of the IoT technology architecture and modelling threats & controls against different components (e.g.: Gateway)

Forensics

Workshop on how to do a comprehensive forensics examination post an incident, at endpoint & network level

SecDevOps

Leveraging the opportunity provided by DevOps to embed & automate security in the CI/CD processes

Startup Security

Startup Security Stack: Using 80-20 rule to build effective security strategy for a startup

Who Should Attend: CISO, CRO, Information Security Experts,  IT Risk Professionals, Appsec Professionals ....

AGENDA AT A GLANCE

IOT

PRE- REGISTER NOW

SOC

Reference architecture and overview of key components of a SOC, e.g.: SIEM, Honeypots, Data Sources, Integrations, Threat Intelligence, EDR, Forensics Tools etc.

IR - Incident Response

Building a framework & processes for managing cybersecurity incidents

Security  Architecture Workshop

Designing Multiple layers of Security Architecture, from Business Architecture to Technical Security Architecture

Cyber Range Drills

Wargame on responding to various types of security incidents at a strategic and operational level

AGENDA AT A GLANCE

Who Should Attend: CISO, CRO, CIO, Information Security Experts,  IT Risk Professionals, Appsec Professionals ....

Threat Hunting

Here we'll discuss the Key Components, Tool Set, Learning "Hunter" Skills and a Case Study

Cloud Security

Overview of Amazon’s approach to cybersecurity

AppSec

Creating a scenario of an organization and then use controls from OpenSAMM and BSIMM to choose the right elements of the AppSec program

Security Tech Landscape

Overview of new & emerging security technologies in the market and how the security tech landscape is shaping up

Forensics

Workshop on how to do a comprehensive forensics examination post an incident, at endpoint & network level

SecDevOps

Leveraging the opportunity provided by DevOps to embed & automate security in the CI/CD processes

Startup Security

Startup Security Stack: Using 80-20 rule to build effective security strategy for a startup

AI & Machine Learning for CISOs

Overview of AI & Machine Learning for CISOs and how they're impacting the security landscape

Top talks from global conferences

Summary of Top Talks from prominent security conferences like RSAC, BlackHat, Defcon etc.

Deception

Overview of Deception Technology, Architecture & Key Components, Deployment Guidelines

Cybersecurity Reference Architecture Design

Designing Multiple layers of Security Architecture, from Business Architecture to Technical Security Architecture

IOT

Overview of the IoT technology architecture and modelling threats & controls against different components (e.g.: Gateway)

Insider Threats

Managing insider threats using behavioural analytics

Security Threats Landscape for 2017

Evolution of Security Threats landscape & top 10 threats that were new in 2017

Top 10 Security Predictions for 2018

Based on our research, we'll be presenting top 10 predictions for 2018 for you to consider when making your plans

Understanding Business / Management

& Communicating with the Board

Understanding key management concepts so that you can align your security program with business priorities & Creating a reference board presentation template which you can use for 2018

PRE- REGISTER NOW

Do You Have An Interesting Security Technology To Showcase?

TECHNOLOGY DEMO THEATRE

CONTACT FOR OPPORTUNITY

TECHNOLOGY DEMO THEATRE

Do You Have An Interesting Security Technology To Showcase?

CONTACT FOR OPPORTUNITY
Fix the following errors:
Hide