Close this search box.

Data Security

19th Annual Banking Technology Conference, Expo & Citations 2024 by Indian Banking Association (IBA)

Trident Hotel, Nariman Point, Mumbai
9th Feb 2024, 09:00 – 18:00 Hrs.

Rapid digitalisation has introduced new complexities around security and compliance which strongly impact customer engagement, experience and business models. Visit us at Booth #10 to understand how we can help you with proactive readiness for incident management; DPDP compliance and managing Third Party Risks effectively. 


10:00 – 10:45Inaugural & keynote address
10:45 – 15:30Panel 1: Next S curve of analytics: Gen AI-powered financial services
Panel 2: Building Tech Resilient Banks
Panel 3: Digital Public Infrastructure: Leveraging Fintechs & DPIs to redefine banking
Panel 4: Building Robust Cybersecurity Measures to Safeguard Banks
15:30 – 16:30CEO Panel : Building AI-enabled Bank in the Digital Era
16:30 – 18:30Banking technology Citations
18:30 – 18:35Vote of thanks
Request A Free Security Rating Report

Contact Us For A Customized Briefing Session

Data Security Advisory

Guidance and recommendations on data security strategy, identifying data security control gaps, and recommending appropriate solutions to ensure confidentiality, integrity, and availability of data.

Data Discovery and Classification

Identify enterprise-wide sensitive data within systems/networks/storage repositories to improve visibility into and security of the data landscape.

Data Loss Prevention

Policy-based technical controls to prevent the unauthorized access, use, or transmission of sensitive data and to prevent sensitive data exfiltration.

Information Rights Management (DRM)

Enforce access controls, usage policies, and restrictions to protect intellectual property rights and prevent unauthorized copying, distribution, and modification of digital information

Data Obfuscation

Convert data into a coded or “masked” form to make it unrecognizable to unauthorized individuals.

Mobile Device Management (MDM/UEM)

Centralized management and control of mobile devices through security policies, managed access, and data protection measures.

Database Activity Monitoring

Database monitoring and auditing to detect unauthorized activities and safeguard data bases