๐Ÿงช Experimental Feature

Focus Areas are an experimental feature that groups related content by tags. This page and its functionality may change as we refine the categorization system.

Data Security

Protection of sensitive data and information

25
Total Entries
27
Contributors
38
Unique Tags
31
Related Tags

Top Contributors

Aditi Bhatnagar(2) Abhilasha Vyas(1) Adhokshaj Mishra(1) Akash Mukherjee(1) Alok Vijayant(1)

Related Tags (9)


All Entries (25 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-04-29TalkRsac RAG-NAROK: What Poorly-Built RAGs Can Do to Data Security Akash Mukherjeesecure-developmentdevsecopsdata-protection+2
2024-05-06TalkRsac Headspace’s Privacy Operations Center and Vault Shobhit Mehtaprivacydata-protectionsecurity-operations-center+2
2023-08-07TalkC0c0n Homomorphic Encryption - Myth to Reality Video Anish Koshyencryptionsecurity-architectureprivacy+2
2023-08-07TalkC0c0n The DPDPA Effect: Jubilation, Twinge and Reticence that followed Video Rahul Sharmacompliancegovernancedata-protection+2
2023-08-06TalkC0c0n Digital Innovation and its Impact on CIOs, CISOs and DPOs Navaneethan Mcompliancegovernancerisk-management+4
2023-08-06TalkC0c0n A Secure Privacy-Preserving Lightweight Authentication Scheme for Internet of Medical Things Video Panchami V, Mahima Mary Mathewsauthenticationprivacyembedded-security+1
2022-08-11TalkThe Diana Initiative The Real Cost of Free: What you need to know before downloading a free app Ruchira Pokhriyalmobile-securityapp-securityprivacy+3
2022-07-24TalkMay Contain Hackers No Permissions Needed! Aditi Bhatnagarandroid-securitymobile-securityprivacy+3
2022-07-23TalkMay Contain Hackers How would a real life social media be like? Aditi Bhatnagarprivacydata-protectionsecurity-awareness+4
2021-11-12TalkC0c0n Data Security and Privacy Abhilasha Vyasdata-protectionprivacyencryption+4
2019-08-08TalkDefcon YOUR PHONE IS USING TOR AND LEAKING YOUR PII Presentation Milind Bhargavamobile-securityprivacypentesting
2018-10-05TalkC0c0n Data management challenge for Privacy compliance Maria Bellarminedata-protectionprivacycompliance+4
2018-08-09TalkDefcon Anonymous rate-limiting in services with Direct Anonymous Attestation Presentation Video Konark Modiprivacysecurity-architecture
2018-03-13TalkTroopers Securing your in-ear fitness coach: Challenges in hardening next generation wearables Presentation Video Sumanth Naropanth, Kavya Racharlamobile-securitysecure-developmentvulnerability-management+2
2015-03-15TalkDefcon TECHNICAL TALK-THWARTING THE SURVEILLANCE IN ONLINE COMMUNICATION Presentation Adhokshaj Mishraprivacysecurity-architecture
2014-02-14TalkNullcon User Privacy in Cellular Networks Ravishankar Borgaonkarprivacy
2012-08-03TalkC0c0n Data Security Alok Vijayantdata-protectionencryptiondata-loss-prevention+4
2011-09-07TalkSecuritybyte Social Web & Privacy โ€“ An evolving world Bala Sathiamurthy, Aridaman Tripathiprivacydata-protectionapi-security+3
2011-09-06TalkSecuritybyte Using Data Analytics for Incident Response Presentation Samir Saklikarincident-responsedata-analytics
2011-08-07TalkDefcon VDLDS โ€” All Your Voice Are Belong To Us Presentation Video Ganesh Devarajanblueteamdata-leakcyber-crime
2011-02-25TalkNullcon Enterprise Paradigm for Controlling Data Leakage Presentation Deepak Routinfrastructuredata-leakblueteam
2011-02-25TalkNullcon Protect infrastructure or protect information โ€“ Lessons from Wikileaks Presentation Vishal Guptainfrastructurewikileaksdata-leak+1
2010-12-04TalkClubhack Data theft in India Presentation K K Mookheydata-leakredteamcyber-crime
2009-11-17TalkSecuritybyte Usability and Privacy in Security Presentation Ponnurangam Kumaraguruprivacydata-protectionsecurity-architecture+3
2001-07-13TalkDefcon Security & Privacy are Critically Important Issues in Todays Digitally Connected Age Video Sharad Poplipentestprivacyblueteam