🧪 Experimental Feature

Focus Areas are an experimental feature that groups related content by tags. This page and its functionality may change as we refine the categorization system.

🔒 Data Privacy & Protection

Data security, privacy protection, and data privacy regulations

205
Contributors
130
Talks
37
Tool Demos
20
Panels
2
Keynotes
2
Awards

Top Contributors

Ajit Hatti(9) Saumil Shah(7) Shubham Mittal(6) Owais Shaikh(5) Umair Nehri(5)

Related Tags (14)

Show all 14 tags...

All Entries (191 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-08-07TalkBlackhat Kernel-Enforced DNS Exfiltration Security: Framework Built for Cloud Environments to Stop Data Breaches via DNS at Scale Presentation Whitepaper Vedang Parasnis#dns#data-leak#kernel+1
2025-04-29TalkRsac RAG-NAROK: What Poorly-Built RAGs Can Do to Data Security Whitepaper Video Akash Mukherjee, Saurabh Shintre#secure-development#devsecops#data-protection+1
2025-03-02TalkNullcon eKYC Crisis: Securing the Lockers Video Kartik Lalan#risk-management#architecture#data-leak+4
2025-03-02TalkNullcon Satellite Communications: Analyzing and Protecting Space-Based Assets Video Drishti Jain#network-pentesting#ics-security#encryption+4
2025-03-01PanelNullcon Navigating Data Protection in the age of globalisation Saikat Datta, Krishan Dev#data-protection#gdpr#data-governance+4
2024-11-15PanelC0c0n Intelligence led security Midhun Babu, Sameer Ratolikar, M v Sheshadri, A Shiju Rawther, Maya R Nair, Balakrishnan A#security-strategy#data-analytics#ai-security+1
2024-09-20Talk44con Unveiling the ghosts of mobile networks: When will old bugs die? Video Altaf Shaik#5g#authentication#encryption+3
2024-08-08Tool demoBlackhat Octopii v2 Source Code Owais Shaikh#red-teaming#ai-security#nlp+2
2024-08-07Tool demoBlackhat BucketLoot - An Automated S3 Bucket Inspector Source Code Kunal Aggarwal, Umair Nehri#aws#cloud-pentesting#reconnaissance+1
2024-05-06TalkRsac Headspace’s Privacy Operations Center and Vault Video Shobhit Mehta, Puneet Thapliyal#data-protection#security-operations-center#security-compliance+1
2024-04-19Tool demoBlackhat Malware clustering using unsupervised ML : CalMal Source Code Himanshu Anand#machine-learning#ai-security#malware-detection+3
2024-04-19Tool demoBlackhat BucketLoot - An Automated S3 Bucket Inspector Source Code Umair Nehri#aws#cloud-pentesting#reconnaissance+1
2024-04-19Tool demoBlackhat Monitoring and Detecting Leaks with GitAlerts Source Code Nikhil Mittal 1#osint#data-leak#reconnaissance+1
2024-04-18Tool demoBlackhat MORF - Mobile Reconnaissance Framework Source Code Amrudesh Balakrishnan, Abhishek Jm, Himanshu Das#reconnaissance#application-pentesting#static-analysis+3
2024-04-18Tool demoBlackhat Secure Local Vault - Git Based Secret Manager Source Code Sriram Krishnan, Shibly Meeran#blueteam#application-hardening#secure-coding+2
2023-12-06Tool demoBlackhat BucketLoot - An Automated S3-compatible Bucket Inspector Source Code Owais Shaikh, Umair Nehri#aws#cloud-pentesting#reconnaissance+1
2023-12-06Tool demoBlackhat Octopii v2 Source Code Owais Shaikh, Umair Nehri#ai#data-protection#nlp+4
2023-12-06Tool demoBlackhat HAWK Eye - PII & Secret Detection tool for your Servers, Database, Filesystems, Cloud Storage Services Source Code Rohit Kumar#bug-hunting#data-loss-prevention#data-protection+4
2023-12-06Tool demoBlackhat AndroCop: One Click Forensic Investigation & Data Extraction Tool Abhinand N, Aswin M Guptha, Varun Nair#android#android-security#mobile-forensics+4
2023-12-06Tool demoBlackhat MORF - Mobile Reconnaissance Framework Source Code Abhishek Jm, Amrudesh Balakrishnan, Himanshu Das#reconnaissance#application-pentesting#static-analysis+3
2023-10-13TalkHackfest Exploring RAM Forensic Analysis for Effective Digital Investigations Video Sneha Banerjee#forensics#memory-forensics#digital-forensics+2
2023-09-24PanelNullcon A CYBER-PHYSICAL SYSTEM FOR INDIA WITH SECURITY, PRIVACY, AND EQUITY Kunal Korgaonkar, Kapil Jaiswal, Malcolm Dsouza, Manoj Aggarwal, Niraj Sharma#cyber-physical-systems#security-strategy#data-protection+1
2023-09-23PanelNullcon DATA PROTECTION LAW AND ITS POTENTIAL IMPLICATIONS FOR THE INDUSTRY Burgess Cooper, Ashish Bhadouria, Jimmi Thakkar, Sunil Bajpai#data-protection#gdpr#cyber-law
2023-09-23TalkNullcon Your App Is Probably A Spyware…Or Is It? Presentation Gaurav Gogia, Pandurang Patil#spyware#secure-development#security-testing+3
2023-08-10TalkBlackhat Does Public Disclosure of Vulnerabilities Affect Hacker Participation in Bug Bounty Programs? Presentation Amit Deokar, Ali Ahmed, Brian Lee#bug-hunting#incident-management#security-strategy+4
2023-08-09Tool demoBlackhat BucketLoot - An Automated S3 Bucket Inspector Source Code Owais Shaikh, Umair Nehri#aws#cloud-pentesting#reconnaissance+1
2023-08-07PanelC0c0n DPDP Act - Transformation challenges for BFSI Video Linson Paul, Venugopal Parameswara, Biju K, Babitha B P, Santosh Khadsare#data-protection#gdpr#compliance-frameworks+4
2023-08-07TalkC0c0n Homomorphic Encryption - Myth to Reality Video Anish Koshy#encryption#architecture#data-protection+1
2023-08-07TalkC0c0n The DPDPA Effect: Jubilation, Twinge and Reticence that followed Video Rahul Sharma#security-compliance#security-governance#data-protection+1
2023-08-06TalkC0c0n A Secure Privacy-Preserving Lightweight Authentication Scheme for Internet of Medical Things Video Panchami V, Mahima Mary Mathews#authentication#data-protection#embedded-security
2023-08-06TalkC0c0n Digital Innovation and its Impact on CIOs, CISOs and DPOs Navaneethan M#security-compliance#security-governance#risk-management+2
2023-08-06TalkC0c0n Securing the Future: Addressing Cybersecurity Challenges in the Age of 5G Video Altaf Shaik#zero-trust#supply-chain-security#attack-surface+4
2023-05-11Tool demoBlackhat MORF - Mobile Reconnaissance Framework Source Code Abhishek Jm, Amrudesh Balakrishnan, Himanshu Das#reconnaissance#application-pentesting#static-analysis+3
2023-05-11Tool demoBlackhat Post-Quantum Cryptography Library Source Code Sagar Bhure, Shain Singh#encryption#quantum-computing#secure-development+3
2023-05-10TalkAuscert Insights into Deakin University’s Data Breach Video Dushyant Sattiraju#incident-management#data-leak#digital-forensics
2023-01-26TalkUsenix Building an Automated Machine for Discovering Privacy Violations at Scale Video Suchakra Sharma#static-analysis#secure-coding#data-protection+2
2022-09-24PanelC0c0n Data sovereignty - Challenges and the road ahead Sanjeev Sharma, Saranga Rajan, A Muralidhar, Jojy Joy#data-governance#data-protection#gdpr+2
2022-09-24PanelC0c0n Ransom Trends in India Pardhasaradhi Ch, Srikanta Prasad, Jacxine Fernandez, Diwakar Sheoran#ransomware#data-loss-prevention#incident-management+2
2022-09-23PanelC0c0n Customer, Credit & Risk - Fintech trends 2022 Maya R Nair, Balakrishnan A, A Shiju Rawther, Linson Paul, Shivanath Somanathan#financial-institutions#data-protection#identity-theft+2
2022-09-23TalkC0c0n A Tale of Credential Leak of a Popular Cloud Threat Actor Nitesh Surana#security-assessment#cloud-pentesting#cloud-workload-protection+2
2022-09-07TalkNullcon Do PDF Tools Conform To The Specification? Presentation Video Prashant Anantharaman#pdf#data-protection#static-analysis+4
2022-09-07TalkNullcon Honey, I Just Put The Hospital On A Ventilator! - DICOM And Its Pitfalls Presentation Video Shyam Sundar Ramaswami, Rakesh Mahanthi#vulnerability-assessment#hmi#data-protection+1
2022-09-06PanelNullcon Cloud Services for Financial Inclusion: Possibilities & Challenges Video Nandkumar Saravade, Ganesh Ar, Himanshu Das, Navin Kumar Singh#cloud-compliance#cloud-monitoring#financial-institutions+2
2022-08-11Tool demoBlackhat Octopii - AI-powered Personal Identifiable Information (PII) scanner Source Code Owais Shaikh#ai#ai-security#data-protection+4
2022-08-11TalkThedianainitiative The Real Cost of Free: What you need to know before downloading a free app Video Ruchira Pokhriyal#app-security#data-protection#security-training+1
2022-08-10TalkBlackhat Attacks From a New Front Door in 4G & 5G Mobile Networks Presentation Video Altaf Shaik, Shinjo Park, Matteo Strada#api-security#access-management#identity-theft+4
2022-07-24TalkMaycontainhackers No Permissions Needed! Video Aditi Bhatnagar#android-security#data-protection#mobile-pentesting+1
2022-07-23TalkHope Combating Ransom-War: Evolving Landscape of Ransomware Infections in Cloud Databases Video Aditya K Sood#ransomware#cloud-pentesting#data-protection
2022-07-23TalkMaycontainhackers How would a real life social media be like? Aditi Bhatnagar#data-protection#security-training#risk-management+3
2021-11-13TalkC0c0n Case study - E-crime group targeting mobile users Rahul Sasi#incident-management#mobile-hacking#phishing+4
2021-11-12TalkC0c0n Data Security and Privacy Abhilasha Vyas#data-protection#encryption#data-loss-prevention+3
2021-11-10Tool demoBlackhat Wireshark Forensics Toolkit Source Code Rishikesh Bhide#forensics#network-forensics#data-protection
2021-03-06PanelNullcon From Reactive to Proactive - Operationalizing your Threat Intel Video Akshat Jain, Amit Ghodekar, Suhas Desai, Ambuj Bhalla#data-analytics#cybersecurity-strategy#intelligence-sharing+1
2021-03-05PanelNullcon Tech Startups/Businesses and Infonomics Video Sourabh Issar, Burgess Cooper, Joerg Simon#data-governance#data-protection#cybersecurity-strategy+1
2020-12-10TalkBlackhat Effective Vulnerability Discovery with Machine Learning Presentation Video Asankhaya Sharma, Ming Yi Ang#security-assessment#machine-learning#software-composition-analysis+4
2020-09-18TalkC0c0n All about IOT Forensics Hima Bindu Vejella#forensics#iot-device-management#iot-pentesting+4
2020-09-18KeynoteC0c0n Data protection and Privacy Data protection and Privacy Video Kris Gopalakrishnan#ai-security#data-protection#identity-theft+2
2020-09-18TalkC0c0n Broken Cryptography & Account Takeover Harsh Bothra#encryption#ssl#security-testing+2
2020-08-07PanelDefcon D0 N0 H4RM: A Healthcare Security Conversation Video Vidha Murthy, Christian Dameff, Jeff Tully, Jessica Wilkerson, Veronica Schmitt, Ash Luft#data-protection#identity-management#security-training+3
2020-08-06Tool demoBlackhat MSTICpy: The Security Analysis Swiss Army Knife Source Code Ashwin Patil, Pete Bryan, Ian Hellen#digital-forensics#incident-management#data-analytics+3
2020-07-26TalkHitbsecconf Swapping Asprin Formulas With MDMA While Red Teaming a Billion Dollar Company Himanshu Sharma, Aman Sachdev#red-teaming#application-pentesting#incident-management+2
2020-03-07PanelNullcon Economics Of Data Breach And Attack Video Bhaskar Medhi, Manu Zacharia, Suchit Mishra, Yash Kadakia#data-loss-prevention#data-protection#cybersecurity-strategy+4
2020-03-06TalkNullcon Automated Classification of Web-Application Attacks for Intrusion Detection Aneet Kumar Dutta#intrusion-detection#machine-learning#application-pentesting+3
2020-03-06PanelNullcon Predicting Danger: Building the Ideal Threat Intelligence Model Video Saikat Datta, Sandeep Sharma, Muslim Koser, Shankar Jadhav#ai-security#machine-learning#nlp+3
2019-12-04Tool demoBlackhat DumpTheGit Source Code Malkit Singh#reconnaissance#data-leak#data-protection+1
2019-10-17TalkHitbsecconf Advances in the Trinity of AI: Data, Algorithms & Compute Infrastructure Presentation Video Anima Anandkumar#ai#deep-learning#data-analytics+1
2019-09-28PanelC0c0n Implementing Data Protection Frameworks with evolving Technology-Challenges, Opportunities & Solutions B R Nath, Jijy Oommen, Maya R Nair, Ajay Porus, Georgie Kurien#data-protection#data-governance#security-strategy
2019-09-27TalkC0c0n Demystifying HealthCare Security Ajay Pratap Singh#blueteam#data-protection#identity-theft+4
2019-09-27PanelC0c0n Shouldn’t Organization disclose breaches - The need for a shared platform Video Sunil Varkey, Jacxine Fernandez, Rahul Sasi, K K Chaudhary#data-leak#data-protection#security-testing+4
2019-09-27TalkC0c0n Securing Payment Data with PCI Security Standards and Programs Nitin Bhatnagar#blueteam#data-protection#secure-development+3
2019-09-27TalkC0c0n Detection of TOR Sources using Artificial Intelligence Roshy John#tor#ai#red-teaming
2019-08-29KeynoteHitbsecconf The CISO’s Dilemma Presentation Video Saumil Shah#blueteam#compliance-governance#security-strategy+4
2019-08-10Tool demoDefcon Local Sheriff Source Code Konark Modi#reconnaissance#blueteam#data-leak+3
2019-08-08TalkDefcon YOUR PHONE IS USING TOR AND LEAKING YOUR PII Presentation Milind Bhargava, Adam Podgorski#data-protection#security-assessment#tor+1
2019-03-28Tool demoBlackhat RTS: Real Time Scrapper Source Code Naveen Rudrappa#blueteam#application-pentesting#security-monitoring+4
2019-03-02PanelNullcon Actionable Intelligence and Cyber Security Video Durga Dube, M v Sheshadri, Rahul Sasi, Shrikant Shitole, Alan White#data-analytics#incident-management#security-analytics+4
2019-03-01PanelNullcon Clash of the Titans; who will survive? Video Burgess Cooper, Durga Dube, Vasanthika Srinath, Jaya Baloo, Shan Lee#ethical-hacking#exploit-delivery#data-leak+1
2018-12-05TalkBlackhat The Undeniable Truth: How Remote Attestation Circumvents Deniability Guarantees in Secure Messaging Protocols Presentation Whitepaper Video N Asokan, Lachlan Gunn, Ricardo Vieitez Parra#red-teaming#encryption#threat-modeling+1
2018-10-05TalkC0c0n Artificial Intelligence and Social Media Analytics in Criminal Investigation Amit Dubey#ai#ai-security#nlp+3
2018-10-05TalkC0c0n Predictive policing using Big Data analytics. Tarun Wig#blueteam#data-analytics#data-protection+3
2018-10-05TalkC0c0n Data management challenge for Privacy compliance Maria Bellarmine#data-protection#security-compliance#data-governance+2
2018-10-05TalkC0c0n OSINT : Indian Citizen Edition Anant Shrivastava#osint#data-governance#identity-theft+2
2018-10-05TalkC0c0n Privacy And Data Protection: Stakeholders’ Perspectives Rahul Sharma#blueteam#data-protection#gdpr+4
2018-10-05TalkC0c0n How can we use machine learning to prevent Frauds and password breaches Tamaghna Basu#machine-learning#blueteam#ai-security+4
2018-10-03Tool demoBlackhat Angad: A Malware Detection Framework Using Multi-Dimensional Visualization Presentation Source Code Ankur Tyagi#malware-detection#static-analysis#dynamic-analysis+3
2018-09-06TalkGrrcon Crypto Gone Rogue: A Tale of Ransomware, Key Management and the CryptoAPI Presentation Video Pranshu Bajpai, Richard Enbody#encryption#ransomware#dynamic-analysis+1
2018-08-12TalkDefcon Last mile authentication problem: Exploiting the missing link in end-to-end secure communication Presentation Video Siddharth Rao, Thanh Bui#encryption#authentication#ipc+1
2018-08-11Tool demoDefcon Local Sheriff Source Code Konark Modi#reconnaissance#blueteam#data-leak+4
2018-08-11TalkDefcon Compression Oracle Attacks on VPN Networks Presentation Ahamed Nafeez#vpn#network-architecture#application-pentesting+3
2018-08-11Tool demoDefcon HealthyPi—Connected Health Source Code Ashwin Whitchurch#raspberry-pi#hardware-embedded#embedded-systems+4
2018-08-10TalkDefcon Building visualisation platforms for OSINT data using open source solutions Video Bharath Kumar, Madhu Akula#security-analytics#threat-hunting#osint+3
2018-08-09TalkDefcon Anonymous rate-limiting in services with Direct Anonymous Attestation Presentation Video Konark Modi, Alex Catarineu#data-protection#architecture#security-strategy+1
2018-08-08Tool demoBlackhat DataSploit 2.0 Source Code Kunal Aggarwal, Shubham Mittal#osint#reconnaissance#data-governance+4
2018-05-29Award Data Exfiltration via Formula Injection #Part1 Source Code Ajay Prashar, Balaji Gopal#data-leak#exploitation#web-security+1
2018-03-13TalkTroopers Securing your in-ear fitness coach: Challenges in hardening next generation wearables Presentation Video Sumanth Naropanth, Kavya Racharla#secure-development#data-protection#architecture
2018-03-03PanelNullcon Forensic Challenges and Road Ahead Video Manu Zacharia, Brijesh Singh, Sanjay Bahl, Vladimir Katalov#data-leak#data-protection#forensics+4
2018-03-02PanelNullcon Should all ciso promote hall of fame” within their organizations Video Shomiron Das Gupta, Hariprasad Chede, Keyur Desai, Subramanian Kumaraswamy#security-training#behavior-change#zero-day+1
2018-03-01TalkNullcon Looting your bank savings using Digital India Presentation Video Indrajeet Bhuyan#red-teaming#application-pentesting#api-security+4
2017-12-07Tool demoBlackhat DataSploit - OSINT Framework Source Code Shubham Mittal#osint#reconnaissance#security-tools+2
2017-12-06TalkBlackhat BREAKING BAD: STEALING PATIENT DATA THROUGH MEDICAL DEVICES Presentation Video Saurabh Harit#red-teaming#data-leak#identity-theft+1
2017-08-18TalkC0c0n OSINT and Privacy Rohit Srivastwa#osint#data-leak#surveillance+4
2017-08-18TalkC0c0n Are TOR Hidden Services really hidden? Demystifying HS Directory surveillance by injecting Decoys inside TOR! Presentation Abhinav Biswas#tor#network-monitoring#incident-detection+1
2017-07-28Tool demoDefcon GibberSense Source Code Ajit Hatti#encryption#red-teaming#security-assessment
2017-07-28Tool demoDefcon Lamma 1.0 Source Code Ajit Hatti, Antriksh Shah#encryption#security-assessment#audit+1
2017-07-27Tool demoBlackhat Gibber Sense Source Code Ajit Hatti#secure-coding#reconnaissance#encryption+3
2017-07-26Tool demoBlackhat Datasploit - Automated Open Source Intelligence (OSINT) Tool Source Code Kunal Aggarwal, Shubham Mittal, Sudhanshu Chauhan#osint#reconnaissance#social-engineering+4
2017-06-24TalkLehack When encryption is not enough: Attacking Wearable - Mobile communication over BLE Presentation Video Sumanth Naropanth, Eliza Chelleng, Kavya Racharla#bluetooth#device-security#encryption+3
2017-05-23TalkPhdays How we hacked distributed configuration management systems Presentation Bharadwaj Machiraju, Francis Alexander#red-teaming#fingerprinting#configuration-management
2017-04-14TalkHitbsecconf Is There a Doctor in The House? Hacking Medical Devices and Healthcare Infrastructure Presentation Video Anirudh Duggal#red-teaming#application-pentesting#data-protection+3
2017-03-31TalkBlackhat Mobile-Telephony Threats in Asia Presentation Whitepaper Video Payas Gupta, Marco Balduzzi, Lion Gu#red-teaming#social-engineering#phishing+2
2017-03-30Tool demoBlackhat Datasploit - Automated Open Source Intelligence (OSINT) Tool Source Code Shubham Mittal#osint#reconnaissance#security-tools+3
2017-03-30Tool demoBlackhat LAMMA 1.0 Source Code Ajit Hatti#encryption#security-assessment#static-analysis+1
2017-02-14TalkRsac Side-Channel Resistant Implementations Praveen Vadnala#side-channel-attacks#embedded-security#encryption
2016-11-05TalkHackfest LockPicker: Leaking data from live LUKS partition Adhokshaj Mishra#linux#red-teaming#data-leak
2016-11-03Tool demoBlackhat DataSploit Presentation Source Code Shubham Mittal, Nutan Kumar Panda#osint#reconnaissance#security-tools+3
2016-10-13TalkAppsecusa When encryption is not enough: Attacking Wearable - Mobile Application communication over BLE Video Sumanth Naropanth, Kavya Racharla, Chandra Prakash Gopalaiah#reverse-engineering#secure-development#ble+4
2016-08-19TalkC0c0n SSD Forensics : A Nightmare for Forensic Investigators Santosh Khadsare#forensics#memory-forensics#incident-management+2
2016-08-06Tool demoDefcon Datasploit Source Code Shubham Mittal#osint#reconnaissance#data-leak+4
2016-08-06Tool demoDefcon LAMMA (beta) Source Code Ajit Hatti#encryption#security-assessment#audit+1
2016-08-04TalkBlackhat Understanding HL7 2.x Standards Pen Testing and Defending HL7 2.x Messages Video Anirudh Duggal#ics-security#risk-management#application-pentesting+3
2016-08-04Tool demoBlackhat LAMMA Source Code Ajit Hatti#encryption#security-assessment#audit+1
2016-05-17TalkPhdays Fingerprinting and Attacking a Healthcare Infrastructure Presentation Anirudh Duggal#red-teaming#fingerprinting#ransomware+4
2016-03-11TalkNullcon Real-time Ingestion of security telemetry data into Hadoop distributed system to respond to 0-day Presentation Pallav Jakhotiya, Vipul Sawant#secure-development#blueteam#data-analytics+3
2015-11-05TalkGroundzerosummit Authentication flaw in Automatic Bank Passbook printing machine. Indrajeet Bhuyan#authentication#identity-management#application-pentesting+3
2015-11-05TalkGroundzerosummit Credit Card Frauds – The money making Ecosystem for Cyber criminals Abhinav Singh#identity-theft#cyber-crime#data-leak+1
2015-11-05TalkGroundzerosummit OSINT Black Magic: Listen who whispers your name in the dark!!! Presentation Source Code Sudhanshu Chauhan, Nutan Kumar Panda#osint#deep-web#data-leak+4
2015-11-05TalkGroundzerosummit Cyber Security in Hospitals:Hospitals Under Seige Anirudh Duggal#hl7#data-protection#incident-management
2015-11-05TalkGroundzerosummit Economics of Post Quantum Crypto Systems : Do we really Need it Ajit Hatti#encryption#quantum-computing#security-strategy+1
2015-11-05TalkGroundzerosummit Elliptical Curve Cryptography Aneesha S#encryption#elliptic-curve-cryptography#secure-development+1
2015-11-05TalkGroundzerosummit Trailing Terror in the Darknets Shesh Sarangdhar#deep-web#tor#cryptocurrency+1
2015-03-26TalkBlackhat The underground Ecosystem of Credit Card frauds Presentation Whitepaper Video Abhinav Singh#red-teaming#data-leak#identity-theft+1
2015-03-03Award FREAK Attack Source Code Karthikeyan Bhargavan, Mi Tls Team#ssl#encryption#vulnerability-discovery
2015-02-06TalkNullcon Anatomy of a credit card stealing POS malware Presentation Video Amol Sarwate#red-teaming#application-pentesting#data-protection+1
2015-02-06TalkNullcon Drone Attacks: How I hijacked a drone Presentation Video Rahul Sasi#red-teaming#drone#gps+2
2014-11-13TalkGroundzerosummit Attacking Cryptography & PKI Implementations Ajit Hatti#encryption#red-teaming#ssl+4
2014-11-13TalkGroundzerosummit Identity theft and its impact on Cyber - Warfare Tarun Wig#identity-theft#phishing#social-engineering
2014-09-28TalkBlackhat Understanding IMSI Privacy Presentation Video Swapnil Udar, Ravishankar Borgaonkar#imsi#red-teaming#android+4
2014-08-22TalkC0c0n Cryptocalypse, Heart Bleed : Is our Government Listening? Ajit Hatti#encryption#ssl#cyber-law+3
2014-08-22TalkC0c0n Cryptographic Backdoors: Subverting the RSA Adhokshaj Mishra#encryption#red-teaming#security-strategy+3
2014-02-15Tool demoNullcon NoSQL Exploitation Framework Source Code Francis Alexander#red-teaming#application-pentesting#security-tools+3
2014-02-14TalkNullcon User Privacy in Cellular Networks Ravishankar Borgaonkar#data-protection#network-architecture#data-governance+2
2014-02-14TalkNullcon Strategic Information Warfare: When Ends define the means Amit Sharma#cyber-war#c4isr#ncw+1
2014-02-14TalkNullcon phoneypdf: A Virtual PDF Analysis Framework Presentation Video Kiran Bandla#pdf#web-security#red-teaming+2
2013-11-21TalkDeepsec Europe In The Carna Botnet: Telnet’s Threat To The Largest Economy Video Parth Shukla#botnet#telnet#network-architecture+3
2012-12-01TalkClubhack Real Time Event Recording System, the tool for Digital Forensics Investigation Presentation Video Madhav Limaye#digital-forensics#endpoint-protection#endpoint-hardening+4
2012-12-01TalkClubhack Content-Type attack -Dark hole in the secure environment Presentation Video Raman Gupta#red-teaming#application-pentesting#pdf+3
2012-09-05Talk44con Why Integrity is left alone and not given TLC (Tender, Love and Care) it deserves? Video Jitender Arora#data-protection#security-strategy#threat-modeling+3
2012-08-03TalkC0c0n Data Security Alok Vijayant, S Bhansali#data-protection#encryption#data-loss-prevention+3
2012-08-03TalkC0c0n Security Incidents – Avoiding the Apocalypse in 2012 Ashish Chandra Mishra#blueteam#phishing#social-engineering+1
2012-08-03TalkC0c0n The Management of Information Security – A Corporate Practitioner’s Perspective Pawan Kumar Singh#cyber-law#security-strategy#data-protection+2
2012-03-15TalkGrrcon SCADA Security: Why is it so hard? Video Amol Sarwate#scada#ics-security#authentication+2
2011-12-04TalkClubhack Android Forensics Presentation Manish Chasta#android#forensics#android-security+4
2011-10-07TalkC0c0n Section 43A IT Act compliance Sagar Rahurkar#cyber-law#compliance-frameworks#cybersecurity-strategy+1
2011-09-07TalkSecuritybyte Data Protection Dipankar Roy#blueteam#data-loss-prevention#data-protection+1
2011-09-07TalkSecuritybyte Social Web & Privacy – An evolving world Bala Sathiamurthy, Aridaman Tripathi#data-protection#api-security#security-compliance+2
2011-09-06TalkSecuritybyte Using Data Analytics for Incident Response Presentation Samir Saklikar#incident-management#data-analytics#security-analytics+3
2011-09-06TalkSecuritybyte Private Internet Circuits - Towards A Next Generation Internet Presentation Sanjay Deshpande#network-architecture#encryption#network-defense
2011-08-07TalkDefcon VDLDS — All Your Voice Are Belong To Us Presentation Video Ganesh Devarajan, Don Le Bert#blueteam#data-leak#cyber-crime
2011-08-03TalkBlackhat Femtocells: A poisonous needle in the operator’s hay stack Presentation Whitepaper Video Ravishankar Borgaonkar, Nico Golde, Kevin Redon#network-pentesting#identity-theft#firmware-analysis
2011-02-25TalkNullcon Enterprise Paradigm for Controlling Data Leakage Presentation Deepak Rout#data-leak#blueteam#data-loss-prevention+3
2011-02-25TalkNullcon Incident Management and Beyond Dinesh O Bareja#incident-management#data-leak#phishing+2
2011-02-25TalkNullcon Protect infrastructure or protect information – Lessons from Wikileaks Presentation Vishal Gupta#data-leak#blueteam#data-protection+2
2011-02-25TalkNullcon SSLSmart – Smart SSL Cipher Enumeration Presentation Gursev Singh Kalra#encryption#ssl#security-assessment
2011-02-25TalkNullcon Fuzzing with complexities Presentation Whitepaper Video Vishwas Sharma#fuzzing#red-teaming#application-pentesting+4
2011-02-25TalkNullcon Chupa Rustam Presentation Abhijeet Hatekar#surveillance#red-teaming#application-pentesting+2
2010-12-04TalkClubhack Data theft in India Presentation K K Mookhey#data-leak#red-teaming#cyber-crime
2010-12-04TalkClubhack Ultimate Pen Test – Compromising a highly secure environment Presentation Nikhil Mittal#security-assessment#social-engineering#application-pentesting+4
2010-08-01TalkC0c0n Client Side Exploits using PDF Presentation Ankur Bhargava, Tamaghna Basu#red-teaming#pdf#data-leak+2
2010-07-30TalkDefcon Hacking Oracle From Web Apps Video Sumit Siddharth#sql-injection#application-pentesting#security-testing+2
2010-07-29TalkBlackhat Hacking Oracle From Web Apps Presentation Whitepaper Video Sumit Siddharth#red-teaming#sql-injection#application-pentesting+3
2010-02-25TalkNullcon Quantum Computing Challenges in the field of security Whitepaper Navin Pai#quantum-computing#security-strategy#threat-modeling+3
2009-12-05TalkClubhack India Cyber Crime Scene - Caught in the Crossfire Presentation Vinoo Thomas, Rahul Mohandas#cyber-crime#data-leak#pdf+3
2009-12-05TalkClubhack Advance Computer Forensic concepts (windows) Presentation Kush Wadhwa#forensics#windows#data-protection
2009-12-05TalkClubhack Open source for securing data with advanced Crypto-Steganography technology Presentation Suhas Desai#encryption#steganography#blueteam
2009-12-04TalkClubhack Facilitate Collaboration with Information Rights Management Abhijit Tannu#information-rights-management#data-protection#application-hardening+4
2009-11-17TalkSecuritybyte Usability and Privacy in Security Presentation Ponnurangam Kumaraguru#data-protection#architecture#security-training+2
2009-08-06TalkC0c0n Cyber Forensics Krishna Sastry Pendyal#forensics#digital-forensics#data-leak+4
2009-08-06TalkC0c0n Management & Security of Large Scale Storage Devices Prashant Dinde#blueteam#data-protection#security-strategy+2
2009-07-29TalkBlackhat Psychotronica: Exposure, Control, and Deceit Presentation Nitesh Dhanjani#red-teaming#reconnaissance#social-engineering+3
2008-12-06TalkClubhack State of Cyber Law in India Presentation Rohas Nagpal#cyber-law#cyber-resilience#cybersecurity-framework+4
2008-12-06TalkClubhack Economic offenses through Credit Card Frauds Dissected Presentation Harshad Patil#fraud#identity-theft#financial-institutions
2007-12-09TalkClubhack 7 years of Indian IT act - 7 Best Cases Presentation Whitepaper Rohas Nagpal#cyber-law#data-governance
2007-12-09TalkClubhack Mining Digital Evidence in Microsoft Windows – Answering Who, When, Why and How? Presentation Chetan Gupta#forensics#windows#data-loss-prevention+4
2007-08-02TalkBlackhat Smoke ’em Out! Presentation Whitepaper Rohyt Belani#forensics#incident-management#digital-forensics+4
2004-05-19TalkBlackhat HTTP Fingerprinting and Advanced Assessment Techniques Presentation Whitepaper Saumil Shah#fingerprinting#blueteam#automated-scanning+2
2004-01-29TalkBlackhat HTTP Fingerprinting and Advanced Assessment Techniques Presentation Whitepaper Saumil Shah#fingerprinting#blueteam#application-pentesting+3
2003-12-16TalkBlackhat HTTP Fingerprinting & Advanced Assessment Techniques Presentation Whitepaper Saumil Shah#fingerprinting#blueteam#network-defense+3
2003-10-01TalkBlackhat HTTP Fingerprinting & Advanced Assessment Techniques Presentation Saumil Shah#fingerprinting#blueteam#application-pentesting+2
2003-07-31TalkBlackhat HTTP Fingerprinting & Advanced Assessment Techniques Presentation Video Saumil Shah#fingerprinting#blueteam#application-pentesting+2
2003-02-26TalkBlackhat HTTP: Advanced Assessment Techniques Presentation Video Saumil Shah#fingerprinting#blueteam#application-pentesting+4
2001-07-13TalkDefcon Security & Privacy are Critically Important Issues in Todays Digitally Connected Age Video Sharad Popli#security-assessment#data-protection#blueteam