/
Virtual
Zoom
/
Speakers 80+ Experts
/
Panel 6 Panels
/
Participants
  • Digital Security Summit is the nation’s most innovative cyber security-technology event in Bangladesh, offering unique educational, collaborative, and workforce development host by Aspire Tech. This summit offers more value than similar cyber conferences with diverse focus areas, premier speakers, and unmatched accessibility. Our core focus is on Protection from cybercrime for nations & Organizations cyber security awareness, bringing together the latest innovations and thought leaders in Digital security from across the public and private sectors, the Digital Security Summit is the place to learn, share and discuss the key themes for Secure Digital Bangladesh. All content will be delivered via our virtual events platform, so all you have to do is register once and then join us for the sessions that are most relevant to your requirements at the moment. The Summit attracts both government and commercial participants. Companies are diverse and include financial firms, healthcare, education, retail, and energy industries, genetic research, and high technology.

  • Aspire Tech Services and Solutions Limited is a leader of next-generation information technology (IT) services and solutions. Our mission is to enable superior returns on client’s technology investments through best-in-class industry solutions, domain expertise, and global scale. The company is well known for its excellent challenge management skill on IT sectors which leads towards high customer satisfaction, the best quality of work, and add value to the commitment made to the clients. We are often asked, "What is it that you do?" We tell them, respectfully and yet truthfully: we do amazing things. We help solve big challenges. Technically complex, mission-critical challenges. ATSS specializing in Data Center, Cloud Services, Digital Security Services, Database Service, Big Data solutions, Data Warehouse Solutions, Disaster recovery solutions, and Infrastructure Support and Service to fill the void for professional, customer-focused expertise in government and private sectors. The company differentiates itself by emphasizing services and supports that focus on modern technology with cost-effectiveness compare to other IT companies. The continuous addition of entrepreneurs in the global market and increasing competition amongst existing companies presents an opportunity for ATSS to mobilize new ideas and opportunities to the IT industry.

image description
Meet with our speakers

Expert Speakers

image description

Leighton Johnson

CTO at ISFMT, Inc., USA

The CTO and Founder of ISFMT (Information Security Forensics Management Team), A provider of computer security, forensics consulting & certification training, cyber security and forensics classes and seminars Worldwide.

image description

Faisal Quader

President at Technuf, LLC USA

Adjunct Professor ,College of Engineering and Information Technology ,University of Maryland. Specialties: Cybersecurity, Identity & Access Management, Information Technology, Technology Management and Agile Methodology

image description

Javier Fernando Castillo

Industrial Cybersecurity and Critical Infrastructure Manager Argentina

Establish and lead the OT Cybersecurity and Critical Infrastructure strategy to ensure the confidentiality. Experienced Cyber Security Professional and Skilled in Business Process.

image description

Roxana Magdo

EMEA Business Development Director - Ixia Solutions Group at Keysight France

Experienced player in technology environment both at development and business level

image description

Jahangir Dewan

Experienced Executive ... USA

Founder, Director of SBIT Inc, inVision Design. Developing Business in Solar Arena - Solar Power Plant, Solar Pump and Solar Home System ,Global Business Strategies , Semiconductor and Software Engineering.

image description

Mohammad Zaman

AWS USA

Leader, Solutions Architecture (AWS). Specialist in IT & Business Transformation, Data Center Consolidation & Outsourcing. IT Cost Alignment with Business Revenue. Cloud Solution and Cloud Acceleration Program.

image description

Didier Rutagarama

Security Consulting Manager USA

Security Consulting Manager, Accenture . Information Technology and cyber-security leader in system architecture, development, deployment, and maintaining high quality customer service and satisfaction.

image description

CHINENYE CHIZEA

Chief Information Security Officer at National Identity Management Commission Nigeria

Chief Information Security Officer at National Identity Management Commission in Nigeria. Professional experience from a diverse background in Information Security, IT management, Enterprise Architecture, and Compliance.

image description

Trish McGill

Sr. Subject Matter Expert Cyber Security IT/OT Netherlands

A leading Trusted Advisor and Sr. Subject Matter Expert in IT/OT cyber Security and Compliance worldwide. Trish is a keynote speaker and panelist at various worldwide conferences.

image description

Erdal Ozkaya

Chief Cybersecurity Strategist | CISO at Comodo Australia

Dr Erdal Ozkaya is known as a passionate, solutions-focused professional with a comprehensive global background within the information technology, information security, and cyber security fields. In addition, he is a well-known public speaker, an award-winning technical expert, a book author, and writer of certifications (courseware and exams) for prestigious organizations such as Microsoft, EC Council, and other expert-level vendors.

image description

Mansi Thakar

Doctor of Digital Health United States

Advisory board member of SANS Institute. Develops IT strategic vision , professional speaker in the CyberSecurity & IT industry, specific volunteer. Quick and fast learner. Aptitude and curiosity for novel ideas.

image description

Samer Adi

Technology Operations and Security Leader at Goodfood Market (TSX:FOOD) Canada

Technology Operations and Security Leader, good food. Author, public speaker, motivator, and strong advocate for infrastructure modernization, data security and privacy. skills in the IT Infrastructure.

image description

Prof. Dr. Touhid Bhuiyan

Department of Computer Science and Engineering Australia

Experienced Professor with a demonstrated history of working in the education management industry. Skilled in Cyber Security, Database, Big Data Analytics, Analytical Skills, Lecturing

image description

Matteo Merialdo

Security Research and Development Belgium

R&D for the Security Business Unit in RHEA Group, He lead a team of 20+. Within my R&D Section and supervise completely my team, from a technical, budget and career development perspective.

image description

Dr. Jabed Chowdhury

Lecturer at La Trobe University Australia

Currently working as Lecturer at La Trobe University, Melbourne, Australia. Working with blockchain consensus and privacy model. Skilled in Blockchain Technologies and Web Technologies.

image description

Muhammad Siddiqui

Chief Information Officer at International Medical Center United States

Chief Information Officer in International Medical Center . A key member of the executive leadership and transformation strategy team, strengthen data-driven and decision-making.

image description

Srikanth Nagarajan

Digital Security Technology Leader USA

Experienced Chief Technology Officer with a Cyber Security focus and a seasoned IT Executive with a demonstrated history of working in the information technology and services industry.

image description

Alam Mohammad

Cyber & Digital Risk Strategist Germany

Former Cybersecurity IoT leader in Deloitte’s Risk Advisory practice , specializes in assisting clients with the risk associated with cyber threats and professional experience in information security and digital technology.

image description

Nawab Kabir, CISS

Information Security Advisor Canada

He is CyberSecurity Adviser. He create jargon-free, easy to understand, cybersecurity program that is suited for your particular business and help to identify the risks and place only relevant security controls.

image description

Mario Demarillas

CISO and Head of IT Consulting and Software Engineering at Exceture Inc. Philippines

Mario has 20 years of professional experience in Information Systems and Internal Audit, Fraud Examination, Information and Cyber Security, Data Privacy and IT Governance consultation.

image description

Filipi Pires

Security Researcher | Speaker | Writer | Cybersecurity Advocate | Hacking Is Not Crime Advocate Brazil

Professional with over 12 years of experience in Cyber Security, and IT Security, Infrastructure Development in Very Large Enterprise as an Expert of Infrastructure Solutions.

image description

Sergey Ozhegov

Risk Managment and Information Security Russia

image description

Daminda Kumara

Head of Cyber Security at Wesfarmers Industrial and Safety Australia

He is a Cybersecurity leader with 20 years Technical experience and 8 years cyber-security experience within large corporate in construction, Supply chain and financial environments.

image description

Trish McGill

Sr. Subject Matter Expert Cyber Security IT/OT Netherlands

A leading Trusted Advisor and Sr. Subject Matter Expert in IT/OT cyber Security and Compliance worldwide. Trish is a keynote speaker and panelist at various worldwide conferences.

image description

Magnus Solberg

VP & Head of Security Governance, Storebrand and Vice President ISACA Norway Chapter Norway

Magnus Solberg is an InfoSec evangelist with a deep-rooted holistic approach to tackling the threats of our digital age. He's convinced that information security begins and ends with people and has over 15 years of information security experience in the entire span of the People-Process-Technology triad.

image description

Manish Chandegara

IT Head and CISO Insulator Business at Grasim Industries Limited (Aditya Birla Group) India

Experienced Infrastructure Project Manager Implemented Many IT Infrastructure Projects & driving the operations & management of Many Companies like, IBM, Roquette France, HP etc.

image description

Sayyed Zakir Ali Rizwe

Head IT/IS/OT Systems, Cyber-Security & Power Generation Audits at K-Electric Pakistan

C-level professional with 21+ exciting years of innovative & impactful experience in IT system & security operations, information security & business continuity programs.

image description

Mike Wilkes

Technology evangelist and Chief Information Security Officer, SecurityScorecard USA

Senior security executive with broad experience designing, building and supporting high-availability infrastructures for the financial services, energy, media and retail sectors.

image description

Dr. Jabed Chowdhury

Lecturer at La Trobe University Australia

Currently working as Lecturer at La Trobe University, Melbourne, Australia. Working with blockchain consensus and privacy model. Skilled in Blockchain Technologies and Web Technologies.

image description

Mansi Thakar

Doctor of Digital Health United States

Advisory board member of SANS Institute. Develops IT strategic vision , professional speaker in the CyberSecurity & IT industry, specific volunteer. Quick and fast learner. Aptitude and curiosity for novel ideas.

image description

Erdal Ozkaya

Chief Cybersecurity Strategist | CISO at Comodo Australia

Dr Erdal Ozkaya is known as a passionate, solutions-focused professional with a comprehensive global background within the information technology, information security, and cyber security fields. In addition, he is a well-known public speaker, an award-winning technical expert, a book author, and writer of certifications (courseware and exams) for prestigious organizations such as Microsoft, EC Council, and other expert-level vendors.

image description

Matteo Merialdo

Security Research and Development Belgium

R&D for the Security Business Unit in RHEA Group, He lead a team of 20+. Within my R&D Section and supervise completely my team, from a technical, budget and career development perspective.

image description

Mahmud Rahman

Information Security Leader | USA

Principal Security Architect/Engineering Program Manager of IBM. Designed and managed IBM Cloud services and Built Security Programs. Developed novel system using data mining.

image description

Muhammad Siddiqui

Chief Information Officer at International Medical Center United States

Chief Information Officer in International Medical Center . A key member of the executive leadership and transformation strategy team, strengthen data-driven and decision-making.

image description

Srikanth Nagarajan

Digital Security Technology Leader USA

Experienced Chief Technology Officer with a Cyber Security focus and a seasoned IT Executive with a demonstrated history of working in the information technology and services industry.

image description

Zia I

Hedge Fund USA

Security Engineer with over 20+ years of experience building mature security programs for large multi-national corporations.

Why should you join The
Digital Security Summit - 2022?
  • In-depth technical talks from industry experts

  • 6 interactive panel discussions.

  • Elevate your knowledge, skills, and industry connections.

  • Boost Your Expertise with workshop.

  • Networking with leading experts, and your peers from around the world.

  • Learn how security experts are defending domestic and international cyber threats.

know about our

summit schedule

* In Bangladesh Time Zone (GMT+6)

image description

Welcome and Introduction

Welcome to Digital-Security Summit 2022 hosted by Aspire Tech. In this section, you will be able to introduce us and different cybersecurity-related.

image description

Opening Keynote

In this session, you will be able to know about the Digital Security Summit 2022’s keynote high ethically

image description

Opening Security Briefing

image description

Opening Security Briefing

image description

Opening Security Briefing

image description

Opening Security Briefing

Our Honorable Chief Guest ( Post and Telecom minister from Bangladesh) will be there, and he/she will keep his/her valuable speech and will justify the summit with his/her opinion.

image description

Presentation : Top Threats in Cyber Security in Bangladesh

image description

Presentation : DoD Cybersecurity & Securing Govt Networks

image description

IoT / Industry 4.0 - Opportunities& Challenges

image description

Presentation : DevOPS and Cloud Security

image description

Panel 1 : Career Opportunities and Future in Cyber Security (Education Ministry)

image description

Presentation : Women in Cyber Security is Not a nice to have, it's a MUST

image description

Sponsor (Silver)

Sponsored By Hi Tech Park

image description

Presentation : Your first 100 Days as CISO (or) Crash! Boom! Bang! How your CISO will not be enough to tackle your next crisis

image description

Presentation : Data breach monitoring on state level

image description

Presentation : Dark Web Monitoring

image description

Presentation : Why are you allowing these Malware/Ransomware to execute/run ?

image description

Presentation : PAM: Is it Culture? Project? Mindset or Platform?

image description

Presentation : Building and Sustaining TPRM Programs for e-Commerce Resilience

image description

Training : Developing and Implementing Vulnerability Management

image description

Training : Benefits and Challenges of SOAR Platforms

image description

Presentation : ​Critical Success Factors in CyberSecurity and /Cybersecurity's Inconvenient Truth: The Nation State Threat

image description

Presentation : 5 Key Pillars in Building a Robust OT Cybersecurity Program

image description

Training : Securing Government & Protecting the Critical Infrastructure

image description

Training : DoD Cybersecurity & Cyber Incident Response

image description

Presentation : Questions Board Should Ask About Cyber Security

image description

Presentation : Cybersecurity strategy and implementation plan

image description

Panel 3 : "Cybersecurity - A Crucial Factor for Our Digital Bangladesh Bangladesh’s Telecommunications & ISP Strategy, Policy and Compliance for Cybersecurity"

image description

Sponsor - Rangeforce : Why and how upskilling Cyber Response and Protection Teams has changed for ever.

image description

Training : If You Can’t Visualize it, You Can’t Fix it: Who Can Access Your Cloud Data?

image description

Presentation : IIoT / Industry 4.0 - Opportunities& Challenges

image description

Presentation : Digitization of education in schools and cyber security of children

image description

GDPR: Personal data shall be processed lawfully

image description

Presentation : The Intelligence Led Cybersecurity Program - A Pragmatic Perspective.

image description

Sponsor (Diamond)

Sponsored By Arshad Parvez(Oracle)

image description

Training : How To Become A Security Architect

image description

Presentation : Don’t let cyber threats put your LIGHTS OUT

image description

Presentation : Women in Cyber - Mentorships, The Circle of Life

image description

Panel 4 : Digitization of education in schools and cyber security of children

image description

Presentation : Building a security culture in corona times and beyond

image description

Presentation :Cybersecurity: a crucial Factor for our digital Bangladesh.

image description

Presentation : Risk Identification, Analysis, Monitor and Control

image description

Closing Keynote

summit logo

Hackathon!!

Take The Challenge

Date

2nd October

Time

3PM - 6PM

Platform

VIRTUAL EVENT

Registration is Free

Top 3 Participant Will Be Rewarded!

prize image
Level Up with

Panel Discussion

  • Career Opportunities and Future in Cyber Security
  • Workshop Date : 01/10/2022

    Panel discussions bring together leading experts to discuss a specific topic of interest. According to The US Bureau of Labor Statistics’ Information Security Analyst’s Outlook, cybersecurity jobs are among the fastest-growing career areas nationally. It's not just in the US but also growing career areas all over the world.
  • 9:00 PM - 10:00 PM (GMT+6)
  • Cybersecurity - A Crucial Factor for Our Digital Bangladesh
  • image description
    image description
    image description
    image description
    image description
    image description
  • Workshop Date : 02/10/2022

    Day by day we are devoted to the technological sector and with that we need to be developed in digital security. Besides that, Bangladesh is recovering from many cyber-attacks and protecting those attacks handsomely. We will be able to know such things from the session.
  • 12:00 PM -1:00 PM (GMT+6)
  • Digitization of education in schools and cyber security of children
  • Workshop Date : 02/10/2022

    In this Panel discussion, you will be able to comprehend the importance of digitalization of education and cyber security of childrens. Our well renowned speakers will also discuss on various aspects regarding digitalization process of education, which is very imortant for proper growth of children in modern days.
  • 7:00 PM -8:00 PM (GMT+6)
  • Cyber Security Threat Landscape in Bangladesh
  • Workshop Date : 02/10/2022

    What makes these sessions so valuable that is this session is about our country’s Digital security threat. How Bangladesh is working with the sector, and we will be also able to learn and will be able to implement the necessary steps as per the discussion. And the interesting part is how we can help with
  • N/A
  • Cloud Transformation: Security and Visibility in the Accelerated Journey
  • The process of moving your work to the cloud, including the migration of apps, software programs, desktops, data, or an entire infrastructure in alignment with the organization's business objectives, is recognized as cloud transformation. And with that cloud security has become so important and, in this session, we will be able to know about those things.
  • N/A
  • Digital Security – National Policy and Preparedness.
  • image description
    image description
    image description
    image description
    image description
    image description
  • With these panel discussions you will be able to know how important the National Policy and Preparedness on Digital Security is. Also, you will be able to know about our country’s Digital security policy. Our expert panelists will describe how it can be improved and what the effects will be.
  • N/A

Fill up this form
For Registration

By Checking this box, I agree to submit the information to the cyber security summit organizer . They may gather my name, email address, phone numbers, and other similar identifiers in addition to my title and employer.
registration icon

Number of Registered Members

Participate in our Online Training Workshops

Trainer : Leighton Johnson
Securing Government & Protecting the Critical Infrastructure
Format : Live Online
Duration : 3 Hour
Cost : Free $ 1000
Starts : 6 AM,1st Oct(GMT+6)
Trainer : Leighton Johnson
DoD Cybersecurity & Cyber Incident Response
Format : Live Online
Duration : 2 Hours
Cost : Free $ 1000
Starts : 9 AM,1st Oct(GMT+6)
Trainer : Jamshed Hasan
Who Can Aaccess your Cloud Data ?
Format : Live Online
Duration : 1 Hours
Cost : Free $1000
Starts : 1.30 PM,2nd Oct(GMT+6)
Trainer : Srikanth Nagarajan
Become a Cyber Security Architect
Format : Live Online
Duration : 1 Hours
Cost : Free $1000
Starts : 5 PM, 2nd Oct(GMT+6)
Trainer : Golam Mortuza Azam
Benefits and Challenges of SOAR Platforms
Format : Live Online
Duration : 1 Hour
Cost : Free $1000
Starts : 4 AM, 2nd Oct(GMT+6)
Trainer : Moe Hassan
Vulnerability Management
Format : Live Online
Duration : 1 Hour
Cost : Free $1000
Starts : 3 AM, 2nd Oct(GMT+6)
loader