The Organizer
M.Tech is a leading cyber security and network performance solutions provider. From providing integrated end-to-end cyber security to enhancing network infrastructure, M.Tech optimizes organizations’ operations and effectiveness.
Partnering with a strong network of established vendors, we have an unparalleled portfolio of best-of-breed products and solutions that meet every critical IT need – from cloud access security, advanced threat prevention and data-centric security to network system management, monitoring and optimization. We also have a specialized technical team providing a host of comprehensive professional services and 24/7 technical service and support, ensuring your organization’s seamless operation.
At M.Tech, we constantly stay ahead in the ever-changing IT environment, to be the leading cyber security and network performance solutions provider.
Platinum Sponsors

Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading AI-powered, cloud-delivered cyber security platform provider protecting over 100,000 organizations worldwide. Check Point leverages the power of AI everywhere to enhance cyber security efficiency and accuracy through its Infinity Platform, with industry-leading catch rates enabling proactive threat anticipation and smarter, faster response times. The comprehensive platform includes cloud-delivered technologies consisting of Check Point Harmony to secure the workspace, Check Point CloudGuard to secure the cloud, Check Point Quantum to secure the network, and Check Point Infinity Platform Services for collaborative security operations and services.
Gold Sponsors

As a global leader in cybersecurity, Thales and Imperva help the most trusted brands in the world protect critical applications, data, identities, and software anywhere at scale. Through our innovative and integrated platforms, we help organizations increase visibility of risks, better defend against cyber threats, close compliance gaps, and deliver trusted digital services for billions of consumers every day.

Discusses the evolving cybersecurity landscape and the rise of AI-powered attacks.It emphasises the need for SOCs to adapt and leverage AI for defence, moving towards an autonomous SOC. The presentation outlines key security platform architecture requirements, including data collection, correlation and automated response.AI-powered queries and automated responses are highlighted as crucial for modern security operations. It also touches on the importance of adversarial exposure validation and adopting an attacker’s mindset.

With identity security as our sole focus and mission, and after years of research and development, we found a way to deliver end-to-end identity security—securing every dimension of identity. We can protect every type of identity, whether human or machine, on-premises or in the cloud. We extend identity protection everywhere, even to critical systems that were previously hard or impossible to defend, such as legacy systems, command-line tools, IT/OT infrastructure, and air-gapped networks.

Silver Sponsors

While many enterprises are currently in the process of prototyping dozens of AI applications, concerns about data residency, security, and cost often emerge at some point in the proof of concept (POC) phase, slowing both production deployments and the ability to realize business value. And it makes sense, as it can be expensive developing AI apps, not to mention a very time-consuming process with significant security and compliance requirements. Customers in highly regulated industries such as healthcare, financial services, and government have looked to Citrix for over 35 years to address challenges like this. With this partnership, Citrix is once again the key platform to accelerate and drive business agility, now for AI.
By Citrix solutions will solves these challenges, allowing you to securely develop and deliver AI POCs and applications within your existing, secure infrastructure. Doing this minimizes the risk of proprietary information leaking out into public large language models (LLMs), and uses existing Infarstruture to significantly minimize costs.


Tanium is the world’s first converged endpoint management solution: a single platform that can identify where all your data is, patch every device you own in seconds, implement critical security control tools and do it all within a single pane of glass. A single platform that provides real-time data and has real-time impact. We make IT scale: gone are the days of siloed teams referencing different datasets.
Tanium protects against attacks by orchestrating all activities within a single platform that’s fast, reliable and inherently integrated. Combining the reach of IT Operations, Security, Risk and Compliance Management into one location breaks the cycle of unreliable tools, broken processes and incomplete outcomes across siloed teams – enabling the ability to obtain business insights quickly, reduce time to incident resolution, and lower IT cost and complexity.
Tanium is converging tools across the IT operations, risk and compliance and security functions to bring teams together: one platform that provides visibility, control and remediation in IT decision-making. That’s the power of certainty.