
Explore the latest event agenda below, and check back soon for updates.
The integration of AI into cybercrime has transformed attack vectors. Adversaries deploy generative AI to create deepfakes, hyper-personalized phishing, polymorphic malware, and voice synthesis scams, accelerating both scale and deception. “AI vs AI” will define the next era of cyber defence, forcing organizations to deploy AI-driven threat intelligence and autonomous SOCs (Security Operations Centres).
Cloud adoption continues to outpace governance maturity. This session focuses on mitigating vulnerabilities across multi-cloud, hybrid, and SaaS environments. As enterprises migrate to hybrid and multi-cloud ecosystems, cloud-native attacks have surged. Misconfigured APIs, weak identity governance, and lack of visibility across distributed environments contribute to escalating breach frequency and scale.
A focused discussion on India’s evolving regulatory stack, DPDP Act, CERT-In 2025 directives, and sectoral cyber frameworks, and how 2026 will be the first full year of enforcement convergence.
AI, cloud, and the increasingly interconnected nature of business and technology present CISOs with a range of risks and threats that will be particularly challenging this year. Cybersecurity leaders have a lot to consider when trying to keep their organizations safe. But some things stand out more than others or might be under the radar. The session will decode 5 things CISOs should avoid falling short on in 2026.
The CSO 100 Special Awards will recognize 7 security leaders who have successfully implemented Zero Trust Technology across high priority areas.
The CSO 100 Special Awards will recognize 7 security leaders who have successfully implemented Cloud Security across high priority areas.
The CSO 100 Special Awards will recognize 7 security leaders who have successfully implemented Data Security across high priority areas.
The CSO 100 Special Awards will recognize 7 security leaders who have successfully implemented technologies across AI Security.
The CSO 100 Special Awards will recognize 7 security leaders who have successfully implemented technologies across Data Privacy.
The Game Changers Awards will recognize 50 cybersecurity leaders who have used IT innovatively to bolster cybersecurity posture and drive business value at their organization.
Companies continue to grapple with a highly complex and active cybersecurity landscape. While AI promises to simplify and improve safeguards, it also opens doors to new risks. As adversaries get more creative and aggressive, security organizations see value in AI as a means to quickly analyze massive datasets, allowing them to more easily pinpoint vulnerabilities and automate threat response. CSO’s 2025 Security Priorities survey confirmed that there is a mounting interest in integrating AI into cybersecurity strategies.
As ransomware evolves into autonomous, multi-vector extortion and deepfakes redefine the landscape of corporate fraud, CSOs face an unprecedented era of digital risk. This session explores the frontline of 2026’s emerging threats from agentic AI “predator swarms” to the weaponization of synthetic media offering strategic blueprints for defense and resilience. Join us to bridge the gap between reactive security and proactive governance, ensuring your organization remains impenetrable in an age of AI orchestrated warfare.
As regulatory complexity outpaces human capacity, the convergence of GRC and AI marks a transition from periodic “box-ticking” to continuous, autonomous assurance. This session examines how 2026’s leaders are deploying agentic AI to monitor controls in real-time, predict compliance drift, and unify fragmented risk data into a single source of truth. Join us to explore how AI-driven governance is moving from a back-office necessity to a frontline driver of enterprise resilience and competitive advantage.
As AI-enabled security tools move from assistive “Copilots” to autonomous “Agents,” the criteria for trust has changed. This session outlines the non-negotiable questions CISOs must ask vendors regarding model transparency, data lineage, and protection against “agentic drift.” We will explore how to vet AI enabled solutions not just for their defensive speed, but for their alignment with emerging 2026 global AI regulations and long-term ROI.
As attack surfaces expand and threats accelerate to machine speed, the traditional SOC is evolving into an autonomous “agentic” ecosystem. This session deconstructs how 2026’s leaders are deploying AI agents that don’t just alert, but independently investigate, triage, and remediate incidents in real-time. Discover how to transition your team from manual responders to strategic AI supervisors, leveraging generative models to bridge the cyber skills gap and achieve sub-minute mean time to response (MTTR).
As India marches toward the “Viksit Bharat 2047” vision, the focus has shifted from mere digital adoption to strategic digital sovereignty. This session explores how 2026’s leading Indian enterprises are moving beyond reactive “firefighting” to build self-healing infrastructures and indigenous AI-driven defense layers. We will analyze the impact of the latest national cybersecurity policies and how a resilience first mindset is safeguarding India’s critical infrastructure from UPI ecosystems to Aadhaar-linked digital identities.
An interactive expert panel unpacking the surge in AI-driven cyber threats, from generative deepfakes to autonomous attack scripts, and how Indian enterprises can leverage AI defensively.
In an era of software-defined factories and agentic AI, the collision of IT and OT ecosystems has created a multi-dimensional attack surface that legacy tools can no longer protect. This session deconstructs the 2026 blueprint for a “unified security fabric,” moving beyond traditional segmentation to autonomous, real-time monitoring across all levels of the Purdue model. We will analyze how to govern non-human identities and secure autonomous model pipelines without disrupting critical production uptime.
As autonomous AI agents become the primary users of enterprise data, the traditional “verify once” model has become obsolete. This session explores the transition to “Zero Trust 2.0,” where identity governance extends to non-human entities and agentic workflows. Learn how to implement continuous, behavioral-based verification that can keep pace with machine-speed transactions, ensuring your “Shadow AI” doesn’t evolve into an unmanaged and untrusted digital workforce.
The modern CSO is no longer just a “guardian of the gate” but a primary architect of business value. This session deconstructs the 2026 paradox: how to empower the business to deploy autonomous AI agents while maintaining an ironclad risk posture. Learn how top-performing CSOs are moving from “No” to “How,” using AI-driven governance to turn security from a friction point into a competitive accelerator that enables rapid, safe innovation.
With the 2025 notification of the DPDP Rules, 2026 marks the definitive shift from policy awareness to operational execution. This session deconstructs the phased compliance timeline, focusing on the immediate 2026 milestones for “Significant Data Fiduciaries” and the new requirements for India based Consent Managers. Join us to explore how the Digital First Data Protection Board is beginning to adjudicate breaches and what these first-wave rulings mean for your organization’s privacy roadmap in 2026 and beyond.
A leadership-focused CSO panel on the human capital and governance dimension, addressing India’s 30 -50% cybersecurity skills deficit and rising CISO accountability.
CISOs are transitioning from technical guardians to strategic leaders with personal legal accountability for cybersecurity disclosures and governance. Global and domestic regulations now expose CISOs to civil or even criminal penalties for inaccurate incident reporting or compliance failures.
As adversaries weaponize AI to bypass traditional controls, the convergence of AI/ML and Zero Trust has become the cornerstone of a resilient defense strategy. This roundtable explores how to leverage machine learning to automate threat detection while enforcing strict, continuous verification protocols. Join your peers to discuss practical roadmaps for building an adaptive security architecture that stays ahead of this volatile risk landscape.
There is no shortage of theories on data security, but real-world implementation is where the challenges lie. In this candid roundtable, we will strip away the hype to discuss the concrete “Dos and Don’ts” of overhauling a security framework in a live enterprise environment. Exchange insights with your peers on what actually works and what doesn’t when aligning security initiatives with rapid business transformation.
The Hall of Fame awards will recognize CSOs who have received the CSO 100 award for 3 or more consecutive years while serving at the same organisation.
The Fearless 100 awards will recognize 100 CSOs & CISOs for outstanding leadership & Innovation.
India’s regulatory ecosystem is converging with global cybersecurity and privacy standards, positioning it as a key regional data-trust hub. The DPDP India Act introducing a comprehensive regime for AI safety, algorithmic transparency, and tech accountability. Together with DPDP and CERT-In mandates, this will create an interoperable, global-grade compliance environment, influencing investment, cross-border data flows, and vendor relationships.
As GenAI tools permeate the enterprise, the CSO role is shifting from a technical gatekeeper to a strategic governor of data ethics and “Shadow AI.” This session invites leaders to benchmark their readiness, discussing how to balance the demand for innovation with the need to contain automated threats. We will map out the transition from a reactive security posture to a proactive, AI-resilient leadership style.
As Generative AI accelerates development cycles, Application Security stands at a critical juncture between enabling speed and ensuring resilience. This session explores the dual reality of AppSec in the AI era: securing AI-generated code and protecting LLM-integrated applications. Join us to map the road ahead, discussing how to evolve your AppSec strategy to withstand the velocity and complexity of next-gen software supply chains.
In an era of rising digital protectionism, navigating the patchwork of global data sovereignty laws from GDPR to emerging local mandates is a defining challenge for modern CSOs. This session brings together senior editors to dissect the collision between cross border business needs and increasingly strict localization requirements.
A panel linking privacy, compliance, and trust – essential for India’s ambition to become a global digital hub by 2030.