CISOverse - December 2025

ASPM in Action: Turning Application
Security into Business Decisions

This session brought together CISOs and senior security leaders from enterprises across Bangalore to explore how Application Security Posture Management (ASPM) works in practice, serving as the connective layer that turns application security signals into business-aligned decisions. Across the three tracks: Visibility, Velocity, and Value, the discussion shifted from identifying problems to enabling clearer, more confident decisions.

CISOverse - December 2025

ASPM in Action: Turning Application Security into Business Decisions

This session brought together CISOs and senior security leaders from enterprises across Bangalore to explore how Application Security Posture Management (ASPM) works in practice, serving as the connective layer that turns application security signals into business-aligned decisions. Across the three tracks: Visibility, Velocity, and Value, the discussion shifted from identifying problems to enabling clearer, more confident decisions.

List of Attendees

Kris Gopalakrishnan

Abhishek Suresh

Associate Director &
CISO- Alfahive Inc.
Cybersecurity / Software
(with AI services)

Sharad Sharma

Anvesh Yah 

CISO- Exotel Cloud Communication / Telecom Tech

Mahendra Patil

Dr. Sashank Dara

CTO, CISO & Co-founder- Seconize Cybersecurity/ Risk & Compliance Software

Dr. Nagahanumaiah

Lalit Rawat

CISO- Kanerika
IT Services & Consulting

Speaker

Prathap R

Director Security Engineering- Circles
Telecommunications Technology

Speaker

Snehansu Bhusan

CISO- Multiplier
Global Workforce Platform

Speaker

Shivaling Salakki

Program Manager- CySeck
Cybersecurity / Government-Led Research & Skill Development

Speaker

Aswin GM

Lead Engineer - Boman.ai
Cybersecurity

Speaker

Neha Nanda

Program Coordinator - CISOverse

Speaker

Shashank Dixit

Co-founder - Boman.ai
Cybersecurity

Speaker

Dr. Chidhanandham Arunachalam

Chief Program Officer- Sumeru &
Co-founder - Boman.ai
Cybersecurity

A Glimpse from December 2025 Edition

Main Video Thumbnail

CISO Speaks

After the event, we asked CISOs a few questions - here’s what they had to say.

Vasanth Kumar

Abhishek Suresh

Shares his perspective on measuring AppSec maturity through meaningful metrics that align with business priorities like speed and revenue, and offers a crisp, CISO-level view on what ASPM truly represents.

DM Bhatt

Anvesh Yah

Offers a succinct, one-line CISO perspective on ASPM and its role in modern application security programs, and explores how posture management tools connect the sources of vulnerabilities and help to prioritize them.

DM Bhatt

Dr. Sashank Dara

Discusses how ASPM is evolving to enable executive-level visibility and decision-making, and explores strategies for securing AI-generated code while balancing innovation, speed, and acceptable risk.

DM Bhatt

Snehansu Bhusan

Shares his concise definition of ASPM from a CISO’s lens and explains how security leaders can maintain strong AppSec standards as AI accelerates software delivery and expands the attack surface.

×

CISOverse Playbook

This playbook captures the key insights and practical takeaways from the CISOverse discussion, shaped by real challenges and shared by CISOs and senior security leaders. It is intended to help security teams make sense of growing application risk without adding more tools or complexity.

The playbook focuses on how Application Security Posture Management (ASPM) can act as a connective layer, bringing together visibility, context, and prioritization so security teams can move from data overload to clear, defensible decisions.

Organized around three themes: Visibility, Velocity, and Value, this playbook offers practical guidance on improving clarity, reducing noise, and communicating risk in a way that supports faster delivery, stronger security outcomes, and better executive confidence.

Access the full CISOverse ASPM Playbook

Playbook Page 1
CISOverse E1 Playbook – Cover
Page 2
Page 2
Page 3
Page 3
Page 3
Page 3
Page 3
Page 3
Page 3
Page 3
Page 3
Page 3
Page 3
Page 3
Page 3
Page 3
Page 3
Page 3
Page 3
Page 3
Page 3
Page 3
Page 3
Page 3
Page 3
Page 3
Page 3
Page 3
Page 3
Page 3
Page 3
Page 3
Page 3
Page 3
Page 3
Page 3
Page 3
Page 3
Download PDF