{"id":10708,"date":"2022-03-24T17:53:33","date_gmt":"2022-03-24T17:53:33","guid":{"rendered":"https:\/\/ivaluegroup.com\/en-in\/blog\/2022\/03\/24\/safeguarding-crown-jewels-360-insights-2\/"},"modified":"2022-06-28T06:56:13","modified_gmt":"2022-06-28T06:56:13","slug":"safeguarding-crown-jewels-360-insights-2","status":"publish","type":"post","link":"https:\/\/ivaluegroup.com\/en-in\/oems\/events\/current-events\/safeguarding-crown-jewels-360-insights-2\/","title":{"rendered":"&#8220;SAFEGUARDING CROWN JEWELS&#8221; &#8211; 360 \u00b0 INSIGHTS"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"10708\" class=\"elementor elementor-10708\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3f0d9ced elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3f0d9ced\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ab366a8\" data-id=\"ab366a8\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-12c88ee elementor-widget elementor-widget-text-editor\" data-id=\"12c88ee\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.20.0 - 26-03-2024 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<i class=\"fa fa-map-marker\" aria-hidden=\"true\"><\/i> iValue Webinar Room, India\n<i class=\"fa fa-calendar-o\" aria-hidden=\"true\"><\/i> 21\/05\/2020\n<i class=\"fa fa-clock-o\"> <\/i> 12:00 PM to 01:30 PM\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2668ecee elementor-widget elementor-widget-text-editor\" data-id=\"2668ecee\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"font-style: inherit; font-weight: inherit; text-align: justify; background-color: var(--ast-global-color-4); color: var(--ast-global-color-3);\">Dear Valued Customer,<\/span><\/p><p>Attackers are wreaking havoc across the globe with advanced cyber attacks that directly target the most valuable and core assets of an enterprise. Increasing adoption of cloud first strategies and DevOps methodologies widen the attack surface and provides attackers with new pathways to exploit. Attackers or malicious insiders seek access to the heart of the enterprise with the intent to cause costly harm that can include damaged reputations, financial losses, and stolen intellectual property.<\/p><p>iValue InfoSolutions, in association with CyberArk present the next chapter in their 360\u00b0 series &#8211; \u201cSafeguarding Crown Jewels&#8221;. We are glad to have two industry veterans as key speakers &#8211; <strong>Dr. Pavan Duggal, Advocate Supreme Court of India &amp; Chairman, International Commission on Cyber Security Law and Mr. Baljinder Singh, CIO &amp; Head of Enterprise Digital Transformation \u2013 EXL Service.<\/strong> The two experts will share their perspectives on legal &amp; regulatory guidelines, importance of cyber security best practices in securing business, clients, enterprise information and contemporary technologies in enterprise.<\/p><p><strong>Agenda:<\/strong><\/p><ol><li>12:00 PM \u2013 12:10 PM \u2013 Key Note Address by Mr. Harsh Marwah, CGO \u2013 iValue InfoSolutions<\/li><li>12:10 PM \u2013 12:30 PM \u2013 Dr. Pavan Duggal, Advocate Supreme Court Of India &amp; Chairman, International Commission on Cyber Security Law<\/li><li>12:30 PM \u2013 12:45 PM \u2013 Mr. Baljinder Singh, CIO &amp; Head of Enterprise Digital Transformation &#8211; EXL Service<\/li><li>12:45 PM \u2013 01:00 PM \u2013 Mr. Rohan Vaidya, Country Head, CyberArk<\/li><li>01:00 PM \u2013 01:30 PM \u2013 Q&amp;A Session<\/li><\/ol><p>Warm Regards,<br \/><span style=\"font-style: inherit; font-weight: inherit; background-color: var(--ast-global-color-4); color: var(--ast-global-color-3);\">Team Marketing<br \/><\/span><span style=\"font-style: inherit; font-weight: inherit; background-color: var(--ast-global-color-4); color: var(--ast-global-color-3);\">iValue InfoSolutions Pvt. Ltd.<br \/><\/span><span style=\"font-style: inherit; font-weight: inherit; background-color: var(--ast-global-color-4); color: var(--ast-global-color-3);\">Mobile &#8211; +91 95359 99484<br \/><\/span><span style=\"font-style: inherit; font-weight: inherit; background-color: var(--ast-global-color-4); color: var(--ast-global-color-3);\">Email ID &#8211; marketing@iValue.co.in<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9b39c02 elementor-widget elementor-widget-text-editor\" data-id=\"9b39c02\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span id=\"buttoncustom\">#iValue<\/span><span id=\"buttoncustom\">#DigitalEnterprise<\/span><span id=\"buttoncustom\">#CyberCompliance<\/span><span id=\"buttoncustom\">#COVID19<\/span><span id=\"buttoncustom\">#SocialDistancing<\/span><span id=\"buttoncustom\">#PriviledgedAccessManagement<\/span><span id=\"buttoncustom\">#CyberArk<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>iValue Webinar Room, India 21\/05\/2020 12:00 PM to 01:30 PM Dear Valued Customer, Attackers are wreaking havoc across the globe with advanced cyber attacks that directly target the most valuable and core assets of an enterprise. Increasing adoption of cloud first strategies and DevOps methodologies widen the attack surface and provides attackers with new pathways &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/ivaluegroup.com\/en-in\/oems\/events\/current-events\/safeguarding-crown-jewels-360-insights-2\/\"> <span class=\"screen-reader-text\">&#8220;SAFEGUARDING CROWN JEWELS&#8221; &#8211; 360 \u00b0 INSIGHTS<\/span> Read More \u00bb<\/a><\/p>\n","protected":false},"author":1,"featured_media":20572,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"elementor_theme","format":"standard","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"enabled","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[78],"tags":[],"whitepapers":[],"case_studies":[],"acf":[],"_links":{"self":[{"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/posts\/10708"}],"collection":[{"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/comments?post=10708"}],"version-history":[{"count":0,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/posts\/10708\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/media\/20572"}],"wp:attachment":[{"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/media?parent=10708"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/categories?post=10708"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/tags?post=10708"},{"taxonomy":"whitepapers","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/whitepapers?post=10708"},{"taxonomy":"case_studies","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/case_studies?post=10708"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}