SACON- India's Only Security Architecture Conference

Date: 12 May, 2017
City: Pune
Type: Conference
Organiser: SACON
Enquire NowAbout the event
We trust the digital world. We trust our phones to wake us up on time, schedule our day, and keep our e-banking payment information safe as we use a variety of apps to not only pay for our transport to work, but also provide us with entertainment on the way there. The event showcases the latest IT Security practice, with the best speakers from the nation. Learn Security Architecture, SecDevOps, Threat Modelling, SOC, Incident Response, IoT Security & More for IT Security Professionals. Security Architecture Topics- Enterprise Security Architecture Design
- Overview of Google’s BeyondCorp Approach to Security
- Overview of NIST CyberSecurity Framework
- Threat Modeling in Context of Security Architecture
- Developing a Cyber Security Products Stack
- Live Wargaming : Building context specific security stacks
- Scientific Approach to Building a Security Portfolio
- Building your Application Security Program using OpenSAMM
- Live Wargaming : Application Threat Modelling using Microsoft Threat Modeling Tool
- SecDevOps Reference Architecture Stack: How to embed and automate security in DevOps
- IoT Security Architecture Stack: From Threat Modeling to control implementation
- Top Attacks & Trends in IOT Security from BlackHat & DefCon 2016
- Cloud Security Architecture: Amazon’s Security by Design Approach
- Technology Architecture & Key Toools for SOC
- Workshop: Building Content / Rules, Incident Maps & Response Playbooks for SOC
- Startup Security Clinic
- FinTech Security Clinic
Who should attend?
- CTOs, IT Directors, & VPs
- IT and InfoSec execs, leaders, analysts, and practitioners
- Digital security professionals
- IT Security professionals
- Cyber Security professionals
- Enterprise security architecture professionals
Why attend?
- Evolution of Security Architecture and Overview of Different Security Architecture Models (E.g.: SABSA, Open Security Architecture etc.(Re)
- Architecting your Information Security Program - Building a Framework for Transitioning from Current to Ideal State
- How to do Threat Modeling in Context of Security Architecture
- Introduction to CPSAM – CISO Platform Security Architecture Methodology
- Hand on Wargame in Designing Your Security Architecture
- You will receive a certificate mentioning your attendance of the security architecture conference and its sessions. You can add this to your CV or add it to your Linkedin Profile.