e-Crime India is designed to meet the needs of key stakeholders and decision makers who are responsible for managing information and technology risk, protecting sensitive data, securing technology and ensuring compliance with multiple regulatory requirements.
The agenda provides strategic and technical advice, examples of best practice and practical case studies that detail how in-house professionals can meet the demands of evolving business models. The conference provides unique perspectives on how organisations can take advantage of emerging opportunities to increase productivity or decrease cost while at the same time maintaining the security and integrity of IT systems and electronic assets.
Those attending include heads and directors of I.T., information security, technology risk management, information risk management, application and network security, business continuity and resilience, investigations, forensics, privacy, audit and compliance. Industry sectors typically represented range from banking through to oil and gas.
e-Crime India is part of the Global e-Crime Series which provides audiences around the world with insight and information on solutions that can help reduce risk, enable operational flexibility, minimise complexity, create value and keep costs low.
Protecting information and IT assets at the speed of business
Rethinking defence in depth to meet the need for data-centric security
Unlocking the power of IT and security data to enhance risk management capabilities
Advancing metrics and measuring effectiveness
Adapting the controls environment to account for changing attack vectors and threat profiles
Achieving balance across people, process and technology
Advancing incident response to ensure a fast reaction to identified threats
Closing windows of vulnerability and facilitating forensic investigations
Collaboration, cooperation and communication
Working with internal and external stakeholders to prevent, detect and respond to cyber threats
Privacy, policy and practice
Changes in the regulatory environment and their implications for securing and protecting personally identifiable information