Prof. Kannan Srinathan, Assistant Professor, IIIT Hyderabad
Title: Advantages of Additional Adversity
Abstract: In computer science, the uncertainties related to the run-time environment are captured via a fictitious entity called the adversary. Popular adversaries include (a) the worst-case input provider in algorithms, (b) the eavesdropping adversary in cryptography, (c) adversarial noise in coding theory, (d) the event-scheduling adversary in concurrent/distributed systems, to name a few. An anomalous yet amazing feature of plethora of adversaries is that they may sometimes destructively interfere with each other, and ironically, make it easier to solve problems in more adverse environments than in benign ones. In this talk, we look at a few such peculiar situations related to information security. Specifically, we shall discuss (a) information security protocols (are easier to design!) over noisy networks, (b) cryptographic algorithms (are more secure!) based on quantum uncertainty and (c) randomization enables (a more efficient!) proof of knowledge.
Bio: Kannan Srinathan is an Assistant Professor at IIIT-Hyderabad. He is an alumnus of IIT Madras where he did his Ph.D. in Computer Science and Engineering. His research interests include cryptography, distributed computing and quantum algorithms. He has published over 100 research papers in reputed International journals and Conferences proceedings. He is a recipient of the IBM Outstanding PhD Dissertation Award, 2006 and Microsoft Young Faculty Fellowship Award, 2010.

Dr. Arun Balaji Buduru, IIIT Delhi
Title: User-Centric Approaches for Protecting Cyber Infrastructures with Self-Learning Capabilities
Abstract: Cyber systems, including Internet of Things (IoT), are increasingly being used ubiquitously tovastly improve operational efficiencies and reduce costs in critical areas, such as finance,transportation, defense, healthcare. Over the past two decades, computing efficiency andhardware costs have dramatically been improved. These improvements have made cyber and IoTsystems omnipotent, and control many aspects of human lives. Emerging trends in successfulcyber system breaches have shown increasing sophistication in attacks and that attackers are nolonger limited by resources, including human and computing power. Most existing cyber defensesystems, including for IoT, do not learn and/or incorporate human behavior(s) and preferences intheir approaches which are needed for developing effective and robust cyber defense systems.Consequently, the security solutions developed may not be usable or implementable by theuser(s) thereby drastically reducing the effectiveness of these security solutions. To address theseissues, user-centric approachesforprotecting cyber infrastructures withself-learning capabilitiesthat incorporateprobabilistic human behavior(s) will be presented.
In this talk we will explore two such approaches to, (1) Continuously authenticating the legitimate user based onfinger gesture inputs on a touch-based smart device without requiring the legitimate user to provide additional intentional touch inputs, (2) predicting security breaches in critical cloud infrastructures by capturing system-widecausal relationships and probabilistic users’ behavior(s) based state transitions at subsystemlevel. In addition we will also explore prediction of security breaches in a partially observable environments.
Bio: Dr. Arun Balaji Buduru is an assistant professor at Indraprastha Institute of Information Technology, Delhi. He received his Ph.D. in Computer Science, specializing in Information Assurance, at Arizona State University in 2016. His research interests include cyber security, reinforcement learning and stochastic planning.He received his B.E. degree in Computer Science in 2011 from Anna University at Chennai, India.He has worked as a research intern as part of Cisco IoT Architecture Group. His current research focuses on adaptive user re-authentication on touch-based devices, predicting security breaches in critical cyber infrastructures, and user behavior based adaptive IoT device reconfiguration.

Dr. Sameep Mehta, IBM Research
Title: Secure Analytics & Securing the Analytics.
Abstract: This talk will focus on motivating the need for developing algorithms in the Cloud based environment from the security view point. We will present the notion of "Always Encrypted" data which allows query processing and analytics on encrypted data. In the last part of the talk, we will discuss a new type of threat which affects the ML models deployed as a service. We will outline some of the interesting research directions in this space.
Bio: Sameep Mehta is a Senior Researcher and Manager at IBM Research - India. He received his Ph.D. in Data Mining and Visualization from Ohio State University. His current research interests are in Security, Privacy aware Data Mining, Text Mining, Machine Learning, Big Data Technologies, Social Data Analytics and Knowledge Graph. He has published extensively in top conferences in Data Mining, Services and Visualization. He is a regular speaker at conferences and was a PC chair for Big Data Analytics Conference 2014. He also serves as Adjunct Faculty at IIIT-Delhi in the area of Data Analytics.

Prof. Sandeep Kumar Shukla, Professor, IIT Kanpur
Title: How Safe are our Critical Infrastructures from Cyber Attacks?
Abstract: Last year Ukraine suffered a prolonged blackout of its power system induced by cyber attacks. The same repeated last month as well. Turkey's banking network was under attack last year slowing down all banking transactions for two consecutive days leading to major economic loss. Kaspersky's 2016 predictions on cyber thread situation in January 2016 included warning for interference through cyber attacks into their presidential election process and all signs indicate that it happened. Kaspersky's 2017 prediction has ominous warnings for possible compromise of 2017 European electoral processes. An analysis of 2012 July blackout shows that even though it was not a cyber attack induced massive blackout but one can conceive of a similar situation by cyber attack through systematic encroachment of advanced persistent threats into various PMUs, digital relays, and other IEDs.
In this talk we will talk briefly about the threat landscape for our national critical infrastructure, and outline some directions that we should consider following to enhance the cyber protection and resilience of our critical infrastructure.
Bio: Prof. Sandeep K. Shukla is the Poonam and Prabhu Goel Chair Professor of Computer Science and Engineering at IIT Kanpur. He is an IEEE fellow, ACM Distinguished Scientist, ACM distinguished speaker, and IEEE Computer Society Distinguished Visitor. He is currently a Ramanujan Fellow. In the past he has received the Presidential Early Career Award for Scientist and Engineers in the US, Humboldt Foundation's Bessel Award from Germany, SUNY Albany Distinguished Alumni award, Virginia Tech Faculty Fellow Award etc. He is currently one of the coordinators of the IIT Kanpur's Interdisciplinary Center for Cyber Security and Defense of Critical Infrastructure. He is the editor in chief of ACM Transactions on Embedded Computing Systems, and an associate editor of ACM Transactions on Cyber Physical Systems. In the past he has been in the editorial board of IEEE Transactions on Computers, IEEE Design & Test, IEEE Embedded Systems Letters, IEEE Transactions on Industrial Informatics etc.

Mr. Felix Mohan, CEO, CISO Cybersecurity
Title: Cognitive Security & Impact on National Security and Workforce
Abstract: TBA
Bio: Felix Mohan ranks amongst India's foremost information security thought leaders with over 30 years experience in the field of Information Technology and Information Security.

Dr. Anu Khosla, Director, SAG DRDO
Title: TBA
Abstract: TBA
Bio: Dr. Anu Khosla is the Director of Scientific Analysis Group , a DRDO research lab involved in research in Information Security and Cryptology.
After completing her B Tech (Electronics & Communications) from Delhi College of Engineering (presently DTU) in 1982, she joined Defence Research & Development Organization, Delhi in 1983. Her research interests include Speech Technology, Pattern Recognition, Information Security and Signal Processing.
She has been associated with various Research and Development projects and has published about 20 research papers in journals and conferences. She has also written the Chapter on ‘Speech Cryptology’ in the book titled ‘Cryptology: System Identification & Key Clustering’ by Dr I J Kumar, published by Agean Park Press. She has also provided consultancy in the area of Speech Analysis to JNU for their project ‘Mapping Language , Mind and Brain’. She has been the External Examiner for IP University and DTU for past three/ four years.

Dr. Madan M. Oberoi, Director, Cyber Innovation and Outreach, IGCI
Title: TBA
Abstract: TBA
Bio: Dr. Madan M. Oberoi is an Indian Police Service (IPS) officer of 1992 batch. He is presently deployed as Director, Cyber Innovation and Outreach, INTERPOL, and located at the INTERPOL Global Complex for Innovation (IGCI) in Singapore. He supervises two sub-directorates including ‘Strategy & Outreach’ sub-directorate and ‘Research & Innovation’ sub-directorate. Dr. Oberoi holds a PhD in the area of cybercrime from Indian Institute of Technology (IIT), Delhi. He is a Hubert H. Humphrey Fellow (2010-2011) under Fulbright Scholarship Program in the area of "Cyber Security" from University of Washington. He also holds a Master’s Degree in ‘Management and Systems’ from IIT Delhi and another Master’s degree in Police Management.
Dr. Oberoi has worked as Inspector General of Police, Deputy Inspector General of Police and as Superintendent of Police with Central Bureau of Investigation (CBI), the Premier Federal Investigation Agency of India. He has headed CBI’s Cyber-Crime Cell and has also worked as the Head of Technical, Forensic and Coordination (TFC) Zone of Central Bureau of Investigation. He has also been involved with a number of task forces /committees working in the area of technological up gradation and was responsible for setting up a “Hi-Tech Centre for Cyber-Crime Forensic Analysis” in CBI. Dr. Oberoi has also held many critical posts in Delhi Police as well. He has headed police force in three districts including Central District of New Delhi. He has also worked as head of Prime Minister’s Security Unit in Delhi Police. In his last posting with Delhi Police, he was heading their Special Cell, which is responsible for Anti-Terror Operations and also action against Organized Crime. Dr. Oberoi additionally also headed the Licensing Unit of Delhi Police.
Dr. Oberoi has served in two UN Peace Keeping Missions. He was head of the Management Information Unit of UN Mission in Bosnia and Herzegovina at Mission HQ in Sarajevo. He has also served as Head of Data Centre in Mission HQ of UN Mission in Kosovo at Pristina.