Lala Lajpatrai Institute of Management

Lorem ipsum dolor sit amet, consectetur adipiscing elit.            Donec nec enim eu purus rutrum placerat viverra eu elit.            Etiam eu scelerisque enim.

Lorem ipsum dolor sit amet, consectetur adipiscing elit.            Donec nec enim eu purus rutrum placerat viverra eu elit.            Etiam eu scelerisque enim.

Institute Name Lala Lajpatrai Institute Of Management
Name of the Event / Guest lecture Management Development Program on “Business Security in Digital Age Through Cyber Risk Management and Data Protection Laws”
Resource Person Mr.Satish Hiwale, Prof. Neeta Khobragade, Prof. Hemant Samant, Shubham Sawant, Adv. (Dr.) Mohini Suryavanshi, and Mr Sachin Ralhan
Date 11/04/2025
Venue Seminar Hall No. 610, 6th Floor, Lala Lajpatrai Institute of Management, Mahalaxmi, Mumbai
Faculty In charge Dr. Keval Govardhan Ukey & Dr. Suresh Suvarna
Student support Nishita Singh, Shraddha Modsing, Palak Gupta, Hardiki, Tejashree , Hemanshree Singh and Harsharan Kaur
Description

Program Overview

On April 11, 2025, a Management Development Program (MDP) on “Business Security in Digital Age Through Cyber Risk Management and Data Protection Laws” was successfully conducted. The event commenced with the registration of participants, setting an organized tone. This was followed by the National Anthem and the Rajya Geet, creating a respectful and patriotic ambiance. The inaugural ceremony featured the presence of dignitaries including Honourable Chairman Dr. Kamalji Gupta, Director Dr. H.J. Bhasin, Student Counselor Dr. Asha Agarwal, and Guest of Honour Mr. Satish Hiwale. The felicitation of dignitaries was carried out by Dr. H.J. Bhasin. Other notable attendees included Prof. Neeta Khobragade, Mr. Shubham Sawant, Adv. Mohini Suryavanshi, and Mr. Sachin Ralhan, whose presence enriched the program’s knowledge base.

Session I: Cybersecurity & Digital Risk Management

The first technical session began with guest introductions by Shraddha Modsing and felicitation by Dr. Keval Ukey. The keynote speaker for this session, Prof. Neeta Khobragade, Head of the Department of Digital and Cyber Forensics at the Government Institute of Forensic Science, Mumbai, delivered an insightful address. She began by tracing the history of e-commerce, highlighting its origins from Electronic Data Interchange (EDI) in the 1960s to the first online transaction in 1979. The session explored types of e-commerce B2B and B2C and delved into foundational web technologies such as Unix, HTML, and early browsers like Netscape Navigator. A significant portion was dedicated to web server attacks, covering threats like XSS, DoS/DDoS, command injection, and brute force attacks, as well as the dangers posed by misconfigured or outdated software. The session proceeded with an in-depth discussion on intrusion detection and prevention systems (IDS/IPS), distinguishing between network-based and host-based systems and comparing signature-based vs anomaly-based detection. Further, the technical explanation of the TCP 3-way handshake using packet captures via Wireshark illustrated how secure connections are established. Finally, the Diffie-Hellman Key Exchange was explained with mathematical examples, emphasizing the secure transfer of encryption keys. The session concluded by emphasizing the evolution of e-commerce and the critical need for robust cybersecurity measures to ensure safe digital transactions.

Session II: Enterprise Security, Ethical Hacking & Cyber Threat Mitigation

The second session was opened by Shraddha, with guest felicitation by Prof. Pradeep Singh. Mr. Shubham Sawant led the session with a detailed presentation on enterprise-wide cybersecurity and ethical hacking. He began with an overview of enterprise security, which involves securing an organization’s digital infrastructure through a unified and strategic approach. The concept of ethical hacking was then introduced, explaining the role of white-hat hackers who simulate cyberattacks to expose vulnerabilities. Mr. Sawant distinguished between white hat and black hat hackers and elaborated on the phases of ethical hacking, which include reconnaissance, scanning, and vulnerability assessments across networks, applications, and databases. Further, Mr. Sawant elaborated on industry-standard testing methodologies including static and dynamic analysis. The session included an overview of endpoint security tools, such as Microsoft Defender and CrowdStrike Falcon, with a focus on their threat detection and behavioral analysis capabilities. He also addressed the importance of securing business assets, identifying critical resources, and implementing controlled access protocols. The session concluded with practical cyber hygiene tips, advocating for regular software updates, strong password policies, and the use of two-factor authentication. Prof. Pradeep Singh provided the concluding remarks, highlighting the critical role of ethical hacking in organizational cybersecurity strategy.

Session III: Data Protection Laws: Compliance & Business Strategies

Session III commenced with a warm welcome and introduction by Hemanshree and the felicitation of guest speaker Adv. Mohini Suryavanshi by Dr. Suresh Suvarna. In her address, Adv. Suryavanshi provided a comprehensive overview of data protection laws, drawing from the GDPR and aligning them with India’s emerging data protection landscape. She elaborated on key terms including personal data, which pertains to any identifiable individual information such as names, locations, or online identifiers. The process of data processing from collection to erasure—was explained in detail, along with the roles and responsibilities of data controllers and processors. Adv. Suryavanshi underscored the significant penalties for non-compliance, citing GDPR’s provision for fines up to €20 million or 4% of global turnover. The discussion centered around how businesses can align their data handling practices with legal requirements through structured compliance strategies. She emphasized transparency, informed consent, data minimization, and secure storage as pillars of lawful data governance. Dr. Shakti Awasthi closed the session with a call to action for businesses to treat compliance not just as a legal mandate but as a cornerstone of ethical digital practice.

Session IV: CSR, Social Impact & Funding for NGOs & Start-ups

The final session was chaired by Mr. Hemant Samant, Chief Trustee of Shri Sant Gadge Maharaj Dharmshala Trust, Parel, Mumbai. Mr. Hemant Sawant introduced the session guests, followed by felicitation by Dr. Keval Ukey. The keynote speaker, Mr. Sachin Ralhan, delivered his speech online. Mr. Ralhan’s presentation explored cybersecurity and digital resilience in the context of NGOs and start-ups. He highlighted global funding channels that support digital initiatives for social good and promoted the use of Digital Personal Data Protection (DPDP) Act as a framework for compliance. He emphasized beneficent data practices, vendor governance, and the role of ethical AI and responsible technology in ensuring fair and inclusive digital systems. Mr. Ralhan also advocated for cybersafety campaigns for women and children, digital training at the grassroots level, and the co-creation of secure digital tools for civil society. Mr. Hemant Samant further reinforced the need for secure and privacy-respecting digital environments. He elaborated on corporate accountability, emphasizing eco-friendly technologies, cybersecurity awareness, and ethical AI adoption. His remarks underlined the importance of CSR and social impact strategies, such as digital literacy, environmental monitoring, and equitable access to technology in rural and underserved regions.

Conclusion

The MDP program successfully brought together experts from academia, industry, and legal domains to share insights on securing digital enterprises in the modern age. Through focused sessions on cybersecurity, ethical hacking, data protection laws, and social impact strategies, the event provided a holistic understanding of the challenges and opportunities in managing cyber risk and legal compliance. Participants left with a broadened perspective and actionable strategies for protecting organizational assets in an increasingly connected world.