India's 1st & Only Security Architecture Conference

Venue, Date & Time

Bangalore:  12th July, Tuesday,  9 AM to 6 PM
Is there any criteria for attending the conference?
 
Anyone interested in Security Archtecture can join us. However, the content will be technical in nature which may not be suitable for one beginning their journey in IT security

Q

Registration Process & Fees

Q

A

A

Are there any charges for registration?
 
Yes. Passes are available at INR 6500/-. Using Early Bird Discount, you can get it for INR 3500/- only.
Early Bird Discount Code: "EARLYSACON16"

Sign Up for India's Only Security Architecture Conference

What's Next In SACON ?

Copyright © 2016   CISO Platform

Security Architecture Models & Views

 

  • Adopting a Layered Approach to Building Security Architecture
  • Role-based Views of Security Architecture

Session Duration: 45 mins

Speaker: Arnab Chattopadhyay

 

Overview Of Security Maturity Models

 

  • Application of Capability Maturity Model to Security Architecture
  • Overview of SSE-CMM, CPSMM, COBIT

Session Duration: 30 minutes

Speaker: Ravi Mishra

 

Threat Modeling: Process, Taxonomy and Application In Security Architecture 

 

  • Role of Threat Modeling in Security Architecture
  • Building a Threat Taxonomy Mapped to Different Control Categories
  • Threat Modeling Process – Identification, Analysis, Categorization, Mapping to Mitigating Controls and Testing the Model

Session Duration: 30 mins

Speaker: Nilanjan De

 

CPSAM: CISO Platform Security Architecture Model

 

  • Introduction to CPSAM and Comparison to Existing Models
  • Case Study

Session Duration: 30mins

Speaker: Ravi Mishra

 

Security Architecture Process & Deliverables

 

 

• Developing a Business Case for Security Architecture and Selling to Senior Management
• Operational Risk Assessment 
• Designing Logical, Physical and Component Security Architecture
Operational Security Architecture 

Session Duration: 45 mins

Speaker: Arnab Chattopadhyay

 

Background Of IT Security Architecture: From Zachman/TOGAF to SABSA & CPSAM

 

  • Overview of existing frameworks like SABSA, Open security Architecture etc.

Session Duration: 45 mins

Speaker: Bikash Barai

 

What's Next In SACON ?What's Next In SACON ?What's Next In SACON ?What's Next In SACON ?What's Next In SACON ?What's Next In SACON ?
What's Next In SACON ?
What Will You Learn ?

 

  • Evolution of Security Architecture and Overview of Different Security Architecture Models (E.g.: SABSA, Open Security Architecture etc.
  • (Re)Architecting your Information Security Program - Building a Framework for Transitioning from Current to Ideal State
  • How to do Threat Modeling in Context of Security Architecture
  • Introduction to CPSAM – CISO Platform Security Architecture Methodology
  • Hand on Wargame in Designing Your Security Architecture

 

What's Next In SACON ?

Ravi Mishra

Head Of Advisory
CISO Platform

IIT Alumni

"The topic that the speaker is going to present on."

Nilanjan De

Principal Architect
Cigital

Multiple Patents, Zero Day Discovery, IIT Alumni

"The topic that the speaker is going to present on."

"The topic that the speaker is going to present on."

Co-Founder
Cigital India (Earlier iViZ)

Multiple Patents, IIT Alumni, Fortune 40-under-40

Bikash Barai

Arnab Chattopadhayay

Senior Technical Director @
MetricStream.

Ex- Security Architect at British Telecom London

"The topic that the speaker is going to present on."

Partial List Of Speakers

 

We brought together a group of people that have devoted their time and energy in information security industry.

 

What's Next In SACON ? Click here To Book
Wargaming: Application Security Architecture
 

 

Hands on Workshop on Designing Application Security Architecture for your Organization including:

  • Key Design Principles While Designing An Application
  • How Architecture Review is Different From Pen Test?
  • How to Conduct an Application Security Architecture Review? Live Case Study
  • AppSec Program Playbook - How to Prioritize from the 100+ elements of AppSec Program beyond the usual Pen Testing?

Session Duration: 1 hour 45mins

Speaker: Bikash Barai & Nilanjan De

 

What's Next In SACON ?

Agenda

What's Next In SACON ?
  • DAY  1 - Tuesday, 12th July

    Time

    Session

     

    8.30 AM to 9 AM

     

    Registration

     

     

    9 AM to 9:30 AM

     

    Orientation
     

    ·       Need for Security Architecture

    ·       Challenges & Opportunities

    ·       Overview of Event

     

     

    Speaker: Bikash Barai

     

     

     

    9:30 AM to 11 AM

     

    Security Architecture Design
     

    ·       Background of IT Security Architecture

    ·       Security Architecture Models & Views

    ·       Security Architecture Process & Deliverables

     

     

     

    Speaker: Arnab Chattopadhyay

     

     

     

    11 AM to 11:15 AM

     

     

    Break

     

    11:15 AM to 11:45 AM

     

    CPSSM: CISO Platform Security Strategy Model
     

    ·       Introduction to CPSSM and Comparison to Existing Models

     

    Speaker: Bikash Barai

     

     

    11:45 AM to 12:15 PM

     

    From Business Architecture to Security Architecture

     

    ·       Digital Business Architecture

    ·       Threat modeling and security architecture planning

    ·       Case Study- security attack and architectural direction
     

    Speaker: Vinayak Godse

     

     

     

    12:15 PM to 12:45 PM

     

     

    Peak into Future Technologies Shaping Security Architecture
     

    • Practical enterprise security architecture Views, Taxonomy & Checklists
    • Recent innovative approaches - Google's BeyondCorp architecture & Software Defined Perimeters (SDP)

     

    Speaker: Rajesh Deo
     

     

     

    12:45 PM to 1 PM

     

     

    Overview Of Security Maturity Models
     

    •       Types of Maturity Models

    •       SSE-CMM Model Overview

    •       Benchmarking your Security Program

     

    Speaker: Ravi Mishra

     

     

     

    1 PM to 2 PM

     

    Lunch

     

     

    2 PM to 3:45 PM

     

    Wargaming: Application Security Architecture

     

    ·       Part 1: Live Wargaming for building the threat model of an example application

    ·       Part 2: Finding the gaps in inadequate controls

    ·       Part 3: AppSec Program creation - Creating a scenario of an organization and then use controls from OpenSAMM and BSIMM to choose the right elements of the AppSec program

     

     

    Speaker: Bikash Barai  & Nilanjan De

     

     

     

    3:45 to 4 PM

     

    Break

     

    4 PM to 5:45 PM

     

    Wargaming: ATP Security Architecture

    Hands on Workshop on Designing Security Architecture for your Organization including
     

    ·       Critical Controls for ATP beyond Malware Analytics

    ·       Combination of latest technologies like EDR, SA, AMP and more to build your ATP Security Architecture

     

     

    Speaker: Atul Singh

     

     

     

    5:45 PM to 6 PM

     

    Closing

     

     

 

Wargaming: APT Security Architecture

 

Hands on Workshop on Designing Security Architecture for your Organization including

  • Critical Controls for APT Security beyond Malware Analytics
  • Combination of latest technologies like EDR, SA, AMP and more to build your APT Security Architecture

 

Session Duration: 2 hours

Speaker: Ravi Mishra & Atul Singh

 

What's Next In SACON ?

Rajesh Deo

-
EY

 

"The topic that the speaker is going to present on."

Vinayak Godse

Senior Director-Data Protection
Data Security Council Of India (DSCI)

 

"The topic that the speaker is going to present on."

SACON Bangalore 2016  was sold out! Thank you for your participation.

Check Out What's There In Next SACON ?