| 2025-08-07 | Tool demo | Blackhat |
Cloud Offensive Breach and Risk Assessment (COBRA)
| Harsha Koushik, Anand Tiwari | cloud-pentestingrisk-managementedr |
| 2025-08-06 | Tool demo | Blackhat |
ThreatShield - The Intelligent way of Threat Modelling
| Ashwin Shenoi, Satyam Nagpal, Sayooj B Kumar | threat_modelingsecurity-architecturedevsecops+1 |
| 2025-04-30 | Talk | Rsac |
Got Supply Pain? A Real-World Approach to Supply Chain SDL
| Mohit Arora | secure-developmentdevsecopsvulnerability-management+5 |
| 2025-04-29 | Talk | Rsac |
It’s Always Risky in IT: Frontline Stories and Strategic Insights
| Gourav Nagar, Rohit Bansal | risk-managementcompliance |
| 2025-04-29 | Talk | Rsac |
It’s Always Risky in IT: Frontline Stories and Strategic Insights
| Rohit Bansal | risk-managementsecurity-architecturesecurity-awareness+2 |
| 2025-03-02 | Talk | Nullcon |
eKYC Crisis: Securing the Lockers
| Kartik Lalan | risk-managementvulnerability-managementsecurity-architecture |
| 2024-11-28 | Talk | Blackhat |
Time to Redefine Cybersecurity - Adding T - Trust as new Tenant to “CIA” and make it “I-ACT
| Lalit Ahluwalia | risk-managementsecurity-architecturesecurity-governance+1 |
| 2024-11-27 | Talk | Blackhat |
The Future of Cybersecurity: Addressing New Threats with Groundbreaking Strategies
| Mahesh Babu Kanigiri | risk-managementvulnerability-managementsecurity-architecture+2 |
| 2024-11-26 | Talk | Blackhat |
Cyber Security & Resiliency: a perspective with emerging technologies and Innovation
| Atul Kumar | cybersecurity-strategiesrisk-managementcyber-resilience+2 |
| 2024-11-26 | Talk | Blackhat |
The Double Edge Sword - Cybersecurity & AI
| Karmendra Kohli | security-architecturerisk-managementdevsecops+1 |
| 2024-11-16 | Talk | C0c0n |
The subtle art of checkmating CISOs
| Sunil Varkey | risk-managementsecurity-architecturesecurity-governance+3 |
| 2024-11-15 | Talk | C0c0n |
CISO’s take on BYOAI
| Venugopal Parameswara | risk-managementsecurity-governancecompliance+4 |
| 2024-05-09 | Talk | Rsac |
The Good, the Bad, and the Bounty: 10 Years of Buying Bugs at Microsoft
| Aanchal Gupta | vulnerability-managementbug-bountyrisk-management+1 |
| 2024-05-07 | Talk | Rsac |
A Proven Approach on Automated Security Architectural Pattern Validation
| Sunil Arora | security-architecturedevsecopsvulnerability-management+2 |
| 2024-05-07 | Talk | Rsac |
Anatomy of a Vulnerability Response - A View from the Inside
| Mohit Arora | vulnerability-managementincident-responserisk-management+1 |
| 2024-05-06 | Talk | Rsac |
Headspace’s Privacy Operations Center and Vault
| Shobhit Mehta | privacydata-protectionsecurity-operations-center+2 |
| 2024-04-19 | Talk | Blackhat |
China’s Military Cyber Operations: Has the Strategic Support Force Come of Age?
| Pukhraj Singh | industrial-control-systems-securityrisk-managementsecurity-architecture |
| 2024-04-18 | Tool demo | Blackhat |
DetectiveSQ: A Extension Auditing Framework Version 2
| Govind Krishna | audit |
| 2023-08-12 | Talk | Defcon |
Getting More Bang for your Buck:Appsec on a Limited Budget
| Vandana Verma Sehgal, Viraj Gandhi | secure-developmentdevsecopsrisk-management+3 |
| 2023-08-09 | Talk | Blackhat |
Diversity Microtalks: Perspectives on Creating Change
| Aastha Sahni | security-awarenessrisk-managementsecurity-governance |
| 2023-08-07 | Talk | C0c0n |
The DPDPA Effect: Jubilation, Twinge and Reticence that followed
| Rahul Sharma | compliancegovernancedata-protection+2 |
| 2023-08-07 | Talk | C0c0n |
Citizen Mobile Security: Responsibilities, Accountability, and Impacts
| Satyendra Verma | mobile-securitysecurity-awarenessrisk-management+1 |
| 2023-08-07 | Talk | C0c0n |
Cyber Threats to Global Financial Systems
| Lince Lawrence | incident-responserisk-management |
| 2023-08-07 | Talk | C0c0n |
ESOC Trinetra Project
| Pankaj Kumar Dalela | security-governancerisk-managementvulnerability-management+1 |
| 2023-08-07 | Talk | C0c0n |
Generative AI and Cyber Crimes
| Brijesh Singh | malwaresecurity-awarenessrisk-management+2 |
| 2023-08-07 | Talk | C0c0n |
Trust Resiliency - A Lesson Learned from Russia Ukraine War
| Ajit Hatti | incident-responsesecurity-architecturerisk-management+2 |
| 2023-08-06 | Talk | C0c0n |
Cryptocurrencies and challenges to Law Enforcement Agencies
| Bhushan Gulabrao Borase | blockchain-securitydecentralized-systemsdigital_currency+2 |
| 2023-08-06 | Talk | C0c0n |
Cybercrimes Victim Compensation : Legal Remedies and Process
| Nisheeth Dixit | compliancegovernancerisk-management+1 |
| 2023-08-06 | Talk | C0c0n |
Digital Innovation and its Impact on CIOs, CISOs and DPOs
| Navaneethan M | compliancegovernancerisk-management+4 |
| 2023-08-06 | Talk | C0c0n |
Influence of Artificial Intelligence in GRC Space
| Mahesh Kalyanaraman | governancerisk-managementcompliance+3 |
| 2023-08-06 | Talk | C0c0n |
CBDC and future of Finance
| Sunil Raveendran | blockchain-securitydigital_currencydecentralized-systems+3 |
| 2023-08-06 | Talk | C0c0n |
Emerging crimes and threat landscape in cyber domain and the need for international cooperation
| Kiran Sivakumar | threat-landscapethreat_modelingrisk-management |
| 2023-08-06 | Talk | C0c0n |
Insider Threats - Best Practices and Common Pitfalls
| Georgie Kurien | insider-threatsrisk-managementsecurity-awareness+1 |
| 2023-08-06 | Talk | C0c0n |
Playing cat and mouse with the Adversary: Sometimes a breach is inevitable
| Abhijith B R | incident-responsevulnerability-managementrisk-management |
| 2023-08-06 | Talk | C0c0n |
Subduing Adversaries with Information Superiority
| Antony K M | threat-huntingsecurity-monitoringthreat-detection+2 |
| 2023-08-06 | Talk | C0c0n |
Survivability in the Cyber World
| Sunil Varkey | incident-responserisk-managementsecurity-architecture |
| 2023-04-26 | Talk | Rsac |
Is Increasing Security Maturity And Decreasing Operational Load Possible?
| Rohit Dhamankar | Automationrisk-managementsecurity-architecture+2 |
| 2023-04-21 | Talk | Hitb Sec Conf |
LOCKNOTE:THE HAND THAT STRIKES, ALSO BLOCKS
| Saumil Shah | security-architecturerisk-managementsecurity-awareness+2 |
| 2022-09-28 | Talk | Rootcon |
Gazing into the Crystal Ball - The Fog of Cyberwarfare Escalations
| Harshit Agrawal | industrial-control-systems-securitysecurity-architecturerisk-management+1 |
| 2022-09-24 | Talk | C0c0n |
Building Smart, Resilient and Sustainable Cyber Eco System
| Navin Kumar Singh | risk-managementcybersecurity-strategiessecurity-architecture+4 |
| 2022-09-24 | Talk | C0c0n |
Cyber Defence and Role of private players - public private partnership
| Jasbir Singh Solanki | security-governancerisk-managementcompliance+2 |
| 2022-09-24 | Talk | C0c0n |
Rationalizing Cyber Security Risk in Risk Language
| Anish Koshy | risk-managementgovernancecybersecurity-strategies+4 |
| 2022-09-24 | Talk | C0c0n |
In production with GRC for cloud
| Mahesh Kalyanaraman | cloud-compliancegovernancerisk-management+2 |
| 2022-09-24 | Talk | C0c0n |
Power of Narratives in Cyber Security
| Sunil Varkey | security-awarenesscybersecurity-educationhuman-factor+2 |
| 2022-09-23 | Talk | C0c0n |
Startup Ecosystem and Investments in Post Covid Era
| Sunil Kanchi | risk-managementcompliancegovernance+2 |
| 2022-09-23 | Talk | C0c0n |
Battle of 300 Crore - how they lost it and got most of it back
| Prashant Choudhary | incident-responsevulnerability-managementrisk-management+1 |
| 2022-09-23 | Talk | C0c0n |
Collaborative efforts for safe digital banking
| Biju K | secure-developmentrisk-managementsecurity-architecture |
| 2022-09-23 | Talk | C0c0n |
Cybersecurity for Manufacturing
| Santhosh Srinivasan | industrial-control-systems-securityics-securitycontrol-systems+4 |
| 2022-09-23 | Talk | C0c0n |
Maximizing ROI on cyber security investments: Do you think Adversary Simulation OR Purple teaming holds the key?
| Abhijith B R | risk-managementsecurity-architecturedevsecops |
| 2022-09-23 | Talk | C0c0n |
Rolling out Central Bank Digital Currency - Technical Design Considerations
| Sunil Raveendran | blockchain-securitysecurity-architecturecompliance-governance+2 |
| 2022-09-23 | Talk | C0c0n |
Technological Reliance for Resilience
| Tulika Pandey | risk-managementcyber-resiliencesecurity-architecture+2 |
| 2022-08-14 | Talk | Defcon |
Tales from the trenches - why organizations struggle to get even the basics of OT asset visibility & detection right
| Vivek Ponnada | industrial-control-systems-securityvulnerability-managementrisk-management+2 |
| 2022-08-11 | Talk | The Diana Initiative |
Connecting Dots Between Security Teams & Customer Expectations
| Shruthi Kamath | security-governancerisk-managementsecurity-architecture+2 |
| 2022-08-11 | Talk | The Diana Initiative |
The Real Cost of Free: What you need to know before downloading a free app
| Ruchira Pokhriyal | mobile-securityapp-securityprivacy+3 |
| 2022-07-23 | Talk | May Contain Hackers |
How would a real life social media be like?
| Aditi Bhatnagar | privacydata-protectionsecurity-awareness+4 |
| 2021-11-13 | Talk | C0c0n |
Crisis Capitalization in a Pandemic
| Greeshma M R | risk-managementincident-responsesecurity-awareness+3 |
| 2021-11-13 | Talk | C0c0n |
Post pandemic Transformation - A CISO’s perspective
| Sridhar Govardhan | risk-managementsecurity-governancecompliance+4 |
| 2021-11-13 | Talk | C0c0n |
Changing Cyber Security Paradigm & Cyber Tsunami
| Sunil Varkey | cybersecurity-strategiesthreat-landscaperisk-management+4 |
| 2021-11-13 | Talk | C0c0n |
Connecting the dots between customers and security teams
| Shruthi Kamath | incident-responsesecurity-awarenessdevsecops+1 |
| 2021-11-13 | Talk | C0c0n |
Cybersecurity in the era of Resilience - A walk through people, process and technology
| Babitha B P | risk-managementcyber-resiliencesecurity-architecture+3 |
| 2021-11-13 | Talk | C0c0n |
Need for Zero Trust in Banking
| Biju K | zero-trustrisk-managementsecurity-architecture+1 |
| 2021-11-13 | Talk | C0c0n |
Painting Your Organizations with Shades of Red, Blue & Purple
| Hidayath Khan | red-teamingethical-hackingthreat_modeling+2 |
| 2021-11-13 | Talk | C0c0n |
Third Party Risk Management
| Mahesh Kalyanaraman | risk-managementcompliance-governancevulnerability-management+3 |
| 2021-11-12 | Talk | C0c0n |
Data Security and Privacy
| Abhilasha Vyas | data-protectionprivacyencryption+4 |
| 2021-11-12 | Talk | C0c0n |
Enterprise Governance and Risk Management
| Arathy Nair, Muskan Mangla | compliancegovernancerisk-management+2 |
| 2021-11-12 | Talk | C0c0n |
Regulating Social Media Platforms : Should it be done in Democratic Societies ?
| J Sam Daniel Stalin, Apar Gupta, Dinesh O Bareja, Prashant Mali, Jiten Jain | compliancegovernancerisk-management+4 |
| 2021-11-12 | Talk | C0c0n |
2021 Supply Chain Attacks Analysis
| Ajit Hatti | vulnerability-managementincident-responserisk-management+2 |
| 2021-11-12 | Talk | C0c0n |
Post Covid CISOs - Disappearing trusted boundaries and Innovative CyberSecurity Approaches
| Illyas Kooliyankal | risk-managementsecurity-architecturesecurity-governance+1 |
| 2021-11-12 | Talk | C0c0n |
The evolving nature of cyber community
| Aastha Sahni | security-awarenessrisk-managementcybersecurity-education |
| 2021-10-13 | Talk | Rootcon |
The Kill Chain: Future of Cyber in Defense
| Harshit Agrawal | security-architectureindustrial-control-systems-securityrisk-management |
| 2021-08-26 | Talk | Hitb Sec Conf |
Gazing Ahead: What Modern RF Combat Looks Like in the Next Decade
| Harshit Agrawal | industrial-control-systems-securitysecurity-architecturevulnerability-management+1 |
| 2021-05-06 | Tool demo | Blackhat |
Demystifying the State of Kubernetes Cluster Security - The Cloud Native Way
| Vasant Kumar, Rupali Dash | kubernetescloudaudit+4 |
| 2020-11-21 | Talk | App Sec Indonesia |
The caveats of the unseen: Crouching exposure, Hidden Misconfiguration
| Ashwin Vamshi | vulnerability-managementsecurity-architecturedevsecops+2 |
| 2020-09-18 | Talk | C0c0n |
Coping with Digital Transformation - A CISO perspective
| Maya R Nair | risk-managementsecurity-governancesecurity-architecture+3 |
| 2020-09-18 | Talk | C0c0n |
Herd Immunity, in the Cyber World
| Sunil Varkey | security-awarenessrisk-managementvulnerability-management+1 |
| 2020-09-18 | Talk | C0c0n |
COVID-19 Cyber impact on financial sector and remote employees
| Amit Dubey | incident-responserisk-management |
| 2020-09-18 | Talk | C0c0n |
Cyber Security Shifts During COVID-19
| Sunil Kanchi | risk-managementsecurity-awarenesscompliance-governance+1 |
| 2020-08-21 | Talk | The Diana Initiative |
Trust, No Trust or Zero Trust - Myth Demystifying
| Vandana Verma Sehgal | zero-trustsecurity-architecturecompliance+2 |
| 2020-08-05 | Tool demo | Blackhat |
vPrioritizer: Learn to say NO to almost every vulnerability (art of risk prioritisation…)
| Pramod Rana | opensourcerisk-analysisblueteam+2 |
| 2020-03-06 | Tool demo | Nullcon |
Providence
| Swapnil Kumbhar, Akshay Shah | incident-responselinuxmacos+2 |
| 2019-09-27 | Talk | C0c0n |
A Day in the Life of a CISO
| Sridhar Govardhan | compliancegovernancerisk-management+3 |
| 2019-09-27 | Talk | C0c0n |
CISO Mind Set
| Lopa Mudraa Basuu | risk-managementsecurity-governancecompliance+2 |
| 2019-09-27 | Talk | C0c0n |
Industry 4.0 - Security and Compliance
| Santhosh Srinivasan | industrial-control-systems-securitycompliancegovernance+2 |
| 2019-09-27 | Talk | C0c0n |
Practical Approach to Cyber Security for financial institutions
| Georgie Kurien | financial-institutionssecure-developmentrisk-management+2 |
| 2019-09-27 | Talk | C0c0n |
RANSOMWARE - to pay or not to pay
| Seshaprakash Kusuma Sreenivasa | ransomwareincident-responserisk-management |
| 2019-03-28 | Tool demo | Blackhat |
Cloud Security Suite: One-Stop Tool for AWS/GCP/Azure Security Audit
| Jayesh Chauhan | pentestblueteamcloud+4 |
| 2018-12-05 | Tool demo | Blackhat |
Mafia: Mobile Security Automation Framework for Intelligent Auditing
| Ankur Bhargava, Mohan Kallepalli | mobileAutomationaudit+1 |
| 2018-10-15 | Talk | Hacklu |
Come to the dark side! We have radical insurance groups & ransomware
| Ankit Gangwal | ransomwarerisk-managementcyber-insurance+2 |
| 2018-10-05 | Talk | C0c0n |
Adaptive GRC
| Mahesh Kalyanaraman | compliancegovernancerisk-management+1 |
| 2018-10-05 | Talk | C0c0n |
Data management challenge for Privacy compliance
| Maria Bellarmine | data-protectionprivacycompliance+4 |
| 2018-10-05 | Talk | C0c0n |
Digital Innovation revolution in Kerala Government
| Sunil Varkey | cybersecurity-strategysecurity-architecturerisk-management+2 |
| 2018-10-05 | Talk | C0c0n |
Taking cyber security to the board room
| Amit Pradhan | risk-managementcompliancegovernance+3 |
| 2018-10-05 | Talk | C0c0n |
Dealing with Changing Threat Landscape
| Vijendra Katiyar | threat-landscapethreat-huntingrisk-management+1 |
| 2018-10-05 | Talk | C0c0n |
Future of Mobility & Cyber Security
| Suja Chandy | automotive-cybersecurityindustrial-control-systems-securitysecurity-architecture+2 |
| 2018-10-05 | Talk | C0c0n |
Resiliency Focus alongside Digital Disruption
| Lince Lawrence | security-architecturerisk-managementsecurity-awareness+2 |
| 2018-10-05 | Talk | C0c0n |
Will Artificial Intelligence And Machine Learning Bring More Threats On Cyber Security?
| Roshy John | risk-managementvulnerability-managementsecurity-architecture |
| 2018-08-09 | Tool demo | Blackhat |
Mafia: Mobile Security Automation Framework for Intelligent Auditing
| Ankur Bhargava, Sagar Popat, Mohan Kallepalli | mobileAutomationaudit+1 |
| 2018-08-08 | Tool demo | Blackhat |
Cloud Security Suite: One Stop Tool for AWS/GCP/Azure Security Audit
| Divya S John, Jayesh Chauhan, Shivankar Madaan | pentestblueteamcloud+4 |
| 2017-12-30 | Tool demo | Blackhat |
Cloud Security Suite - One Stop Tool for AWS Security Audit
| Shivankar Madaan, Prajal Kulkarni, Jayesh Chauhan | pentestblueteamcloud+4 |
| 2017-08-19 | Talk | C0c0n |
The Public Private Partnership - Navigating the Govt
| Saikat Datta | compliancegovernancerisk-management+3 |
| 2017-08-19 | Talk | C0c0n |
Building Trust for Digital Transactions in India’s COD Culture
| Parry Aftab | secure-developmentrisk-managementsecurity-architecture |
| 2017-08-19 | Talk | C0c0n |
Trust, the foundation of Digital Mastery
| Sunil Varkey | identity-managementauthenticationrisk-management+2 |
| 2017-08-18 | Talk | C0c0n |
Call Centre Frauds
| Parry Aftab | social-engineeringsecurity-awarenessrisk-management+1 |
| 2017-08-18 | Talk | C0c0n |
Challenges in Digital Banking
| Biju K | security-awarenesssecurity-governancerisk-management |
| 2017-08-18 | Talk | C0c0n |
Moving from Cybersecurity Awareness to Cybersecurity Competence
| Anup Narayanan | cybersecurity-educationcybersecurity-trainingsecurity-awareness+3 |
| 2017-08-18 | Talk | C0c0n |
Threats with online gaming and issues with games like Pokemon
| Riyaz Walikar, Akash Mahajan | security-awarenessmobile-securityvulnerability-management+1 |
| 2017-07-28 | Tool demo | Defcon |
Lamma 1.0
| Ajit Hatti, Antriksh Shah | cryptographypentestaudit+1 |
| 2017-03-03 | Talk | Nullcon |
Securing Critical National Infrastructure
| Shailendra Fuloria, R Sarangapani, Rahul Tongia | critical-infrastructureindustrial-control-systems-securityics-security+4 |
| 2017-03-03 | Talk | Nullcon |
Breach Response - Time to shake up the status quo
| K K Mookhey, Pranesh Prakash, Sahir Hidayatullah, Shobha Jagathpal | incident-responsevulnerability-managementrisk-management+2 |
| 2016-08-06 | Tool demo | Defcon |
LAMMA (beta)
| Ajit Hatti | cryptographypentestaudit+1 |
| 2016-08-04 | Talk | Blackhat |
Understanding HL7 2.x Standards Pen Testing and Defending HL7 2.x Messages
| Anirudh Duggal | vulnerability-managementindustrial-control-systems-securityrisk-management |
| 2016-08-04 | Tool demo | Blackhat |
LAMMA
| Ajit Hatti | cryptographypentestaudit+1 |
| 2015-09-24 | Talk | App Sec Usa |
Encouraging Diversity and Advancing Cybersecurity Education
| Shruthi Kamath | cybersecurity-educationsecurity-awarenessrisk-management+1 |
| 2015-03-15 | Talk | Blackhat |
2015 State of Vulnerability Exploits
| Amol Sarwate | vulnerability-managementautomated-scanningvulnerability-assessment+2 |
| 2015-02-06 | Talk | Nullcon |
Building security and compliance into the software delivery process
| Anubhav Bathla, Dinesh Pillai, S Chandrasekhar | secure-developmentdevsecopscompliance+3 |
| 2014-11-13 | Talk | Ground Zero Summit |
Financial Integrity and Cyber Security
| Karnal Singh | risk-managementcompliancesecurity-governance |
| 2014-11-13 | Talk | Ground Zero Summit |
Internet Governance
| Anjana Kovacs | governancecompliancerisk-management+2 |
| 2014-11-13 | Talk | Ground Zero Summit |
9 Cell Cyber Diplomacy
| Alok Vijayant | security-architecturerisk-managementsecurity-governance |
| 2013-11-20 | Talk | App Sec Usa |
Project Talk: OWASP OpenSAMM Project
| Pravir Chandra | software-securitysecure-developmentdevsecops+4 |
| 2013-09-27 | Talk | C0c0n |
Hello CISO! How to make end-users LIKE and FOLLOW “Brand Infosec”?
| Anup Narayanan | security-awarenesscybersecurity-educationsecurity-governance+3 |
| 2013-08-15 | Talk | Usenix |
Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness
| Devdatta Akhawe | web-securitysecurity-awarenesssecurity-architecture+3 |
| 2013-08-15 | Talk | Usenix |
An Empirical Study of Vulnerability Rewards Programs
| Devdatta Akhawe | vulnerability-managementbug-bountysoftware-security+3 |
| 2013-08-01 | Tool demo | Blackhat |
Sparty
| Aditya K Sood | secure-codingwebaudit+2 |
| 2012-12-01 | Talk | Clubhack |
The difference between the “Reality” and “Feeling” of Security: Information Security and the Human Being
| Thomas Kurian Ambattu | security-awarenesshuman-factorrisk-management+2 |
| 2012-10-26 | Talk | App Sec Usa |
The 7 Qualities of Highly Secure Software
| Mano Paul | secure-developmentsoftware-securitysecure-coding+3 |
| 2012-08-04 | Talk | C0c0n |
Impact of cyber laws on various stakeholders
| Sagar Rahurkar | compliancegovernanceregulatory-compliance+2 |
| 2012-08-03 | Talk | C0c0n |
Business Continuity and Risk Management in Turbulent Times
| Venkataram Arabolu | risk-managementbusiness-continuitycompliance+2 |
| 2012-08-03 | Talk | C0c0n |
A model to reduce information security risks due to human error
| Anup Narayanan | security-awarenessbehavior-changerisk-management |
| 2012-08-03 | Talk | C0c0n |
The Weakest Link - Reinforcing the Human Element
| Sandeep Godbole | security-awarenesshuman-factorcybersecurity-education+4 |
| 2012-03-15 | Talk | C0c0n |
Integrated Dial 100 System for Law Enforcement
| Nandkumar Saravade | security-governancecompliance-governancesecurity-operations |
| 2011-11-17 | Talk | Deepsec |
Behavioral Security: 10 steps forward 5 steps backward
| Sourabh Satish | security-awarenessbehavioral-changerisk-management+2 |
| 2011-09-19 | Talk | Brucon |
Step-by-Step for Software Security (that anyone can follow)
| Pravir Chandra | software-securitysecure-developmentdevsecops+4 |
| 2011-09-07 | Talk | Securitybyte |
Social Web & Privacy – An evolving world
| Bala Sathiamurthy, Aridaman Tripathi | privacydata-protectionapi-security+3 |
| 2011-09-06 | Talk | Securitybyte |
Application Security Strategies
| K K Mookhey | secure-codingsecure-developmentweb-security+3 |
| 2011-09-06 | Talk | Securitybyte |
Security Threats on Social Networks
| Nithya Raman | social-engineeringweb-securitysecurity-awareness+2 |
| 2011-03-15 | Talk | Nullcon |
Information Warfare Ñ The Indian Perspective
| Alok Vijayant | cybersecurity-strategyrisk-managementsecurity-awareness+1 |
| 2010-11-25 | Talk | Deepsec |
Developers are from Mars, Compliance Auditors are from Venus
| Neelay S Shah | compliancegovernancerisk-management+4 |
| 2010-08-01 | Talk | C0c0n |
Hackers’ EcoSystem in India
| Rohit Srivastwa | pentestingsecurity-awarenessrisk-management+1 |
| 2010-03-15 | Talk | Blackhat |
400 Apps in 40 Days
| Nish Bhalla | vulnerability-managementrisk-managementapplication-pentesting+2 |
| 2009-11-17 | Talk | Securitybyte |
Business Case-Risk Management/Compliance at AMITY
| Js Sodhi | compliancegovernancerisk-management+3 |
| 2009-11-17 | Talk | Securitybyte |
Business Continuity Case Study
| Venkataram Arabolu | business-continuityrisk-managementbusiness-resilience+3 |
| 2009-11-17 | Talk | Securitybyte |
Usability and Privacy in Security
| Ponnurangam Kumaraguru | privacydata-protectionsecurity-architecture+3 |
| 2009-08-06 | Talk | C0c0n |
Information Security Audit
| Venkatapathy Subramaniam | compliancegovernanceaudit+2 |
| 2009-08-06 | Talk | C0c0n |
Cyber Victimisation
| K Jaishankar | cybersecurity-educationsecurity-awarenessrisk-management+2 |
| 2009-08-06 | Talk | C0c0n |
Information Warfare
| A a Gafoor, Vinayak Mishra | threat-huntingthreat_modelingsecurity-awareness+2 |
| 1998-07-29 | Talk | Blackhat |
Security as an enabler for new business opportunities - The Business Value of Security
| Karan Khanna | risk-managementbusiness-continuitycyber-resilience+4 |