AISS 2022 Report
AISS 2022 Report
Report
Inaugural 06
Workshops 07
Plenary 16
Speakers 22
Track Sessions 34
Keynotes 37
AISS Highlights 42
Book Launch 42
Hackathon 43
Innovation Box 43
CyberShikshaa 44
Privacy Sub-Summit 44
Diversity Session 45
Workshop with Government eMarketplace (GeM) 45
Start-Up Pavillion 45
Digital Forensics Sub-Summit – Fourth Edition 46
Moot Court Session 47
Excellence Awards 48
Sponsors 53
Partners 54
Exhibitors 55
About DSCI
Data Security Council of India (DSCI) is a premier industry body on data
protection in India, set up by NASSCOM®, committed to making the
cyberspace safe, secure and trusted by establishing best practices,
standards and initiatives in cyber security and privacy. DSCI works together
with the government and their agencies, Law Enforcement Agencies (LEA),
industry sectors including IT-BPM, BFSI, CII, telecom, industry associations,
data protection authorities and think tanks for public advocacy, thought
leadership, capacity building and outreach initiatives.
This year’s edition entailed deliberations organized around the broad areas
of cyber security leadership, enterprise security strategy, securing third
parties and nth relations, security technology & architecture, digital risk
management, cyber resilience, expectations and obligations around data
protection, security consolidation, platformization, security operations
excellence, security for critical and emerging sectors et. al.
The Summit also hosted the 12th edition of the Excellence Awards, a
platform that celebrates the noteworthy contributions of individuals and
organizations to the subject and profession of Cyber Security & Data
Protection.
Masterclass by
02 How to securely sanitize your device to prevent data leak?
Masterclass by
03 Myths and Realities of XDR: Ask the experts the what, the how and the why of XDR
Masterclass by
04 Identifying and Detecting Active Directory Attacks
Masterclass by
05 Protecting Your Digital Terrain by Building Zero Trust Architecture and Fostering
Automation
Masterclass by
06 Collaboration & Automated Response Exercise (C.A.R.E) SecOps
Masterclass by
07 Reimagining Cybersecurity: Integrated Platforms are the Future
Masterclass by
08 Let’s get Sassy - critical enablers for the modern enterprise
Masterclass by
09 Synergistic Product Security
Masterclass by
The objective of this workshop was to provide 2. At the end of the workshop, participants were
comprehensive training in firmware reverse able to decompile the file and identify functions
engineering using Ghidra, coupled with hands-on (C-Function(s)) of interest. They were able to
experience in executing replay attacks on a widely- navigate to main function of the firmware from
used consumer-grade device available in the Indian the reset vector. Lastly, they were able to identify
market. The workshop exceeded expectations, strings from the firmware file and how to use
boasting an engaging and interactive session that them to build an attack.
drew an enthusiastic crowd of over 40 participants,
3. While bluetooth has been around for ages,
surpassing the originally planned capacity of 30
Bluetooth Low Energy (BLE) is behind several
seats. Attendees included professionals from both
“smart” gadgets, from Eyeglasses to Heart-Rate
industry and academia, making it a resounding
Monitors. Unfortunately, bluetooth does not
success.
mandate security, resulting in manufacturers
Key Takeaways: releasing several insecure products. Several
low-cost BLE sniffers (<= US $10) can be tailored
1. Ghidra is a free, open-source software reverse
to run different attacks on BLE Devices. The
engineering tool developed by the National
participants were trained to use a BLE Sniffer
Security Agency (NSA) and made available to
and an open-source tool Wireshark to perform
the public in 2019. It is used for disassembling
a replay attack on a popular consumer-grade
and analysing compiled code, and can be
device in the Indian market.
used to study how programs work, identify
vulnerabilities, and develop exploits. It is widely
used by cybersecurity professionals, researchers,
and hobbyists to perform reverse engineering on
firmware and to analyse malware.
The Session gave a complete overview of how ‘Data well as a certificate of destruction for compliance
Sanitization’ can be done by using the Automated purposes. Blancco’s data sanitization service is
Tool from BlanccoThe limitations associated with designed to meet various regulatory requirements,
physical destruction, outsourcing, and low-level including GDPR, HIPAA, and PCI DSS, and provides
formatting have been thoroughly examined. However, organizations with peace of mind that their sensitive
these drawbacks can be effectively mitigated through data is permanently erased and cannot be accessed
the implementation of data sanitization processes or retrieved by unauthorized parties.
like Blancco. Data Sanitization is the process of
securely and permanently erasing sensitive data
from IT assets, such as hard drives, laptops, and
mobile devices, to prevent unauthorized access
and protect against data breaches. Blancco’s data
sanitization service uses advanced algorithms to
overwrite data multiple times to ensure that it cannot
be recovered using any software or hardware-based
recovery tools. The service also includes a detailed
report that provides proof of erasure, including the
date, time, and location of the erasure process, as
Masterclass by Tenable
Masterclass by TCS
The “Let’s Get Sassy” workshop by Netskope requires strict identity verification for all users and
provided valuable insights into modern security devices. By adopting this approach, organizations
models and strategies for protecting digital can improve data security and threat protection.
resources in an increasingly complex and borderless The workshop emphasized the importance of a
world. The workshop addressed the changing threat converged approach to networking and security,
landscape and needs of modern organizations, which combines networking and security to provide a
which have become more agile and flexible due to seamless working experience for users irrespective
digital transformation. The traditional approach of their location. Moreover, the key enablers for
of securing resources by carrying all user traffic modern enterprises, including data security, visibility,
back to central data centers and security stacks is and threat protection, are discussed in detail.
no longer practical. Instead, a convergence model
based on zero-trust principles is proposed, which
Masterclass by Qualys
Track 2: Modern Infrastructure Protection-Cloud, Container and Serverless
Presented by:
• Shrikant Dhanawade, Director, Product Management, Cloud Security, Qualys
Moderator:
• Umesh Mehta, President & CIO, PI Industries Ltd.
Speakers:
• Narendra Nath G, Joint Secretary, NSCS
• Payal Malik, Adviser (Economics) & Head Economics Division, Competition Commission of India
• Nitin Varma, Managing Director India & SAARC, CrowdStrike
• Shrirang Raddi, AVP and Head of Client Relations, Financial Services, Infosys
Moderator:
• Sanjay Bahl, Director General, CERT-In
Speakers:
• Jaspal Singh Sawhney, Global CISO, Tata Communications
• Sameer Ratolikar, Senior Executive Vice President & CISO, HDFC Bank
• Arvind Sharma, Enterprise Technology Specialist, APAC, Trellix
• Ashish Upreti, Account Executive, Magnet Forensics
Moderator:
• Sanjay Bahl, Director General, CERT-In
Speakers:
• Mr. P. Prakash IPS, Inspector General of Police, Kerala Cyber Dome
• Mr. Sandeep Khanna, CISO, UIDAI
• Mr. Golok Simli, Principal Advisor & CTO, Passport Seva Programme MEA, India
• Dr. Gulshan Rai, Former National Cybersecurity Coordinator
DMITRY VOLKOV DR. DURGA PRASAD DUBE FAIZUL MUFTI DR. FARUK KAZI
Chief Executive Officer, Executive Vice President, Vice President, Information Dean - Research,
Group-IB Reliance Industries Limited Security, Genpact Development and
Consultancy, Veermata
Jijabai Technological Institute
MAJ GEN MANJEET SINGH MANOJ KURUVANTHODY MANOJ TASKER MOHAMMAD WASIM
Joint Secretary (Cyber), CISO & DPO, Country Manager, India, Group Vice President,
National Security Council Tredence Inc Anomali Sapeint
Secretariat
SAMEER RATOLIKAR SAMIR K MODY PROF. SANDEEP SHUKLA DR. SANJAY BAHL
Executive Vice President & Vice President - Threat Professor, Computer Science Director General,
CISO, HDFC Bank Research, K7 Security and Engineering, IIT Kanpur CERT-In
DR. SANJAY KATKAR SHANBHAG SANJAY CDR SANJEEV SINGH LT. COL SANTOSH
Joint MD & Chief Technical Segment Head - Process Chief Information Security KHADSARE
Officer, Quick Heal Automation and Motion & Data Protection Officer, Digital Forensics Expert
Control, Siemens Birlasoft
SAPAN TALWAR DR. SASHANK DARA SATBIR SINGH DR. SAURABH GARG
Head of Information Security, CTO, CISO & Cofounder, Head Sales Engineering India Chief Executive Officer,
Perfetti Van Melle Seconize & SAARC, CrowdStrike Unique Identification
Authority of India
What happens when Cyber Security Speaker: Desmond D’Silva, Director Sales -
Companies get Breached Enterprise & Alliances, Seqrite
Speaker: Rahul Sasi, Co Founder, CEO -
CloudSEK
DSCI’s first-ever edited volume- Gearing Up for Digital ++ Reimagining Security and Trust is an
anthology of articles authored by distinguished leaders coming from diverse experiences across
sectors, industry, policy, diplomacy and law who have composed views on some of the pertinent
themes of our times into an edited volume. Aligned with DSCI’s thought leadership mandate, the book
focuses on security, trust, privacy and other prominent issues arising out of the contemporary developments
in digital space which have implications both for the industry and policy-making at large. This volume is
divided into three sections- Accelerating Digital++. Securing Digital ++ and Future of Digital++, focusing on
various complexities and angles of digital infrastructure as a holistic subject matter.
Download the ebook now.
Manan Garg
Winner 1nv4s10n
Aryaman Behera
Innovation Box
Most Innovative Product of the Year
DSCI hosted the 9th edition of Innovation Box, an esteemed platform designed to foster and empower aspiring
entrepreneurs and start-ups in the field of cybersecurity and privacy technology.
Six remarkable start-ups, namely Cyberstanc, Disecto, napiD, Prophaze, Protectt.ai, and SecneurX, all nurtured
by National Centers of Excellence (CoE), actively participated in the Innovation Box. They eagerly joined
this prestigious gathering to exhibit the immense potential and innovative prowess of their products and
services. Out of the impressive array of participants, Prophaze emerged as the standout start-up, securing
the prestigious title of The Most Innovative Product of the Year.
Microsoft & Data Security Council of India (DSCI) with support from ISEA an initiative of Ministry of Electronics
& IT (MeitY) launched Project Cyber Shikshaa for skilling women engineering graduates in the niche field of
Cyber Security in September 2018. This endeavour has trained over 800 young women engineers across
India in cybersecurity. The training program has spanned across 22 batches from 13 cities across 11 states
in classroom mode, blended and fully virtual mode. CyberShikshaa students being placed successfully in
global corporations, large technology services firms, start-ups and even law enforcement agencies is a highly
satisfying outcome.
Our ‘Women on Break’ privacy program under Cybershikshaa is a first-of-its-kind initiative where women
professionals from different fi elds received in-depth training in Privacy and certified in DSCI Certified Privacy
Professional (DCPP). Many of them, some even after a nine-year break, were able to secure placement in large
corporations and resume their professional careers in a new domain. More than 100 women professionals on
career break have got trained in Data Privacy, giving them opportunities to re-enter the workforce in the realm
of Data Protection and Data Privacy.
Privacy Sub-Summit was aimed at comprehensively capturing the developments ongoing in the Privacy realm
from technological, regulatory and policy standpoint drawing expert points of view from the leaders and
subject matter experts from across the board. The sub-summit included privacy & policy highlights from the
DSCI team, a session with leading DPOs from the country on organising the internal privacy functions in an
organisation, two keynote addresses on evolving privacy expectations and operationalising privacy by design
and concluded with a panel discussion on the privacy in India. Key takeaways are mentioned below:
• Effective privacy implementation in any organisation will require cross-function collaboration of Data
Protection Officers with other business functions.
• The role of DPOs is not merely a regulatory and compliance concern but their function gains importance
in streamlining the internal data governance in an organisation.
• To implement privacy by design in development of products and services, organisations must think from
a consumer perspective and implement these principles throughout the entire lifecycle of processes and
technologies from designing phase to deployment, use, and disposal.
• In developing data governance policies and data protection laws in India, it is important to take into
consideration the Indian political and cultural context and the unique requirements of the Indian industry.
A session on ‘Diversity and Inclusion: Women in Security’ was organized on the sidelines of AISS 2022, the
session was led by -Mr. Visagan Subburayalu, Senior Director, Technology, Target in India -Mr. Vinayak Godse
CEO, Data Security Council of India -Ms. Leenika Khattar, Director of Diversity, Inclusion, and Belonging –
Charter, NASSCOM -Ms. Sakshi Vidur, Director Information Security, Ex - Philip, Ex - Yum! Brands -Ms. Selva
Rani, Cyber Security Delivery Head. The discussion aimed to bring in various perspectives around the
changing role of women in security and discuss measures that should be taken to reduce the gender gap in
the industry. Alumni of Cybershikhsaa program present at the session added to the discussion by sharing
their struggles of re-entering the industry after a long career break, and how CyberShikshaa course helped
them make a comeback.
In order to facilitate the onboarding of Indian Cyber security companies and Startups on Government
e-Marketplace (GeM), the GeM team conducted a workshop at AISS2022, where start-ups and security
product companies learned about the GeM ecosystem, various initiatives to support the emerging players,
registration process, and had resolution of their queries.
This Insightful workshop was led by Vishal Kapil, AVP - Seller Management & Anoop Dhanvijay, Director -
CPSEs & Ministries, Government e-Marketplace.
The workshop aimed at giving a complete insight on the services & facilities provided on the GeM platform with
a step-by-step approach on how to register on the portal. Such facilitation and support from key stakeholders
really help build a strong Innovation ecosystem in the country.
Start-Up Pavillion
National CoE organized a start-up pavilion at AISS 2022, inaugurated by Ms. Tulika Pandey, Scientist ‘F’ &
Director, Ministry of Electronics & Information Technology, GOI, with a capacity of 12 pods, and 11 incubated
start-ups. It was an attempt to provide a platform for NCoE’s incubated startups to network and pitch their
high-potential cybersecurity products.
This year’s edition of Digital Forensics Sub-Summit had a variety of topics that were observed to be of a great
interest to law enforcement agencies, digital forensics practitioners, and others.
Inauguration
The sub-summit was inaugurated by Hon’ble Justice Talwant Singh, High Court of Delhi in the presence of Mr.
P.S. Sandhu, I.P.S, DGP, CID, Karnataka, Mr. Rajendra S Pawar, Chairman, DSCI, and Mr. Vinayak Godse, CEO,
DSCI at NASSCOM-DSCI Annual Information Security Summit 2022.
Character played: Hon. Judge, prosecuting officer, defense advocate, Investigating officer, Forensics expert.
Resource persons
• Hon’ble Justice Talwant Singh, High Court, New Delhi- JUDGE
• Mr Vakul Sharma, Advocate, Supreme Court – DEFENSE LAWYER
• Mr Atul Kumar Pandey, NLIU, Bhopal - PUBLIC PROSECUTOR
• Mr Krishna Sastry Pendyala, Former Scientist, CFSL- FORENSIC EXPERT
• Mr K N Yashavantha Kumar, DySP, Karnataka Police - INVESTIGATING OFFICER
The 12th edition of the DSCI Excellence Awards was graced by the presence of Dr.
Saurabh Garg, CEO of UIDAI, and Mr. Rajendra S. Pawar, Chairman & Co-Founder
of NIIT Group, who acted as chief guests and felicitated awards to the winners.
The awards ceremony serves as a platform to recognize and celebrate the
contributions made by individuals and organizations in the field of cybersecurity
and data protection.
The winners of the 12th edition excellence awards were selected with scrutiny by
the eminent jury panel-
Product Segment 26
27 WINNERS FELICIATED
21 AWARD CATEGORIES
Including 4 Special Jury
Including Sub-Categories
Recognition
Corporate Segment
Kunal Bahl G. Narendra Nath Praveena Rai Umesh Mehta Vidya Srinivasan
CEO and Co-Founder, Joint Secretary, Chief Operating Officer, President and CIO, Sr. Vice President,
Snapdeal National Security Council NPCI PI Industries Ltd. Genpact
(Jury Chair) Secretariat, GoI
Product Segment
Amal Krishna Raman Roy Sameer Ratolikar Sanjay Bahl Shyam Penumaka
Chief General Manager (E&T) Chairman and MD, CISO, Director General, Partner,
Head IT, ONGC Quatrro HDFC Bank CERT-In Dallas Venture Capital
(Jury Chair)
Corporate Segment
Best Security Practices Best Security Practices Best Security Practices Best Security Practices
in Banking Sector in Energy Sector in Critical Information in Insurance Sector
Infrastructure
Best Security Practices in IT-ITeS Sector Best Security Practices Best Security Operations
in Government Sector Centre of the Year
Large Small/Medium (User Organizations)
PLATINUM SPONSORS
GOLD SPONSOR
SILVER SPONSORS
ASSOCIATE SPONSORS
PARTNERS
Forensic Sub- Badge & Lanyard Data Sanitization Identity Security
Academic Partner
Summit Partner Partner Partner Partner
Delegate Certificate Delegate Kit Innovation Box Zero Trust Security Mobile App Security
Partner Partner Partner Partner Partner
EXHIBITORS
NSEIT