| 2025-04-29 | Talk | Rsac |
RAG-NAROK: What Poorly-Built RAGs Can Do to Data Security
| Akash Mukherjee | secure-developmentdevsecopsdata-protection+2 |
| 2024-05-06 | Talk | Rsac |
Headspace’s Privacy Operations Center and Vault
| Shobhit Mehta | privacydata-protectionsecurity-operations-center+2 |
| 2023-08-07 | Talk | C0c0n |
Homomorphic Encryption - Myth to Reality
| Anish Koshy | encryptionsecurity-architectureprivacy+2 |
| 2023-08-07 | Talk | C0c0n |
The DPDPA Effect: Jubilation, Twinge and Reticence that followed
| Rahul Sharma | compliancegovernancedata-protection+2 |
| 2023-08-06 | Talk | C0c0n |
Digital Innovation and its Impact on CIOs, CISOs and DPOs
| Navaneethan M | compliancegovernancerisk-management+4 |
| 2023-08-06 | Talk | C0c0n |
A Secure Privacy-Preserving Lightweight Authentication Scheme for Internet of Medical Things
| Panchami V, Mahima Mary Mathews | authenticationprivacyembedded-security+1 |
| 2022-08-11 | Talk | The Diana Initiative |
The Real Cost of Free: What you need to know before downloading a free app
| Ruchira Pokhriyal | mobile-securityapp-securityprivacy+3 |
| 2022-07-24 | Talk | May Contain Hackers |
No Permissions Needed!
| Aditi Bhatnagar | android-securitymobile-securityprivacy+3 |
| 2022-07-23 | Talk | May Contain Hackers |
How would a real life social media be like?
| Aditi Bhatnagar | privacydata-protectionsecurity-awareness+4 |
| 2021-11-12 | Talk | C0c0n |
Data Security and Privacy
| Abhilasha Vyas | data-protectionprivacyencryption+4 |
| 2019-08-08 | Talk | Defcon |
YOUR PHONE IS USING TOR AND LEAKING YOUR PII
| Milind Bhargava | mobile-securityprivacypentesting |
| 2018-10-05 | Talk | C0c0n |
Data management challenge for Privacy compliance
| Maria Bellarmine | data-protectionprivacycompliance+4 |
| 2018-08-09 | Talk | Defcon |
Anonymous rate-limiting in services with Direct Anonymous Attestation
| Konark Modi | privacysecurity-architecture |
| 2018-03-13 | Talk | Troopers |
Securing your in-ear fitness coach: Challenges in hardening next generation wearables
| Sumanth Naropanth, Kavya Racharla | mobile-securitysecure-developmentvulnerability-management+2 |
| 2015-03-15 | Talk | Defcon |
TECHNICAL TALK-THWARTING THE SURVEILLANCE IN ONLINE COMMUNICATION
| Adhokshaj Mishra | privacysecurity-architecture |
| 2014-02-14 | Talk | Nullcon |
User Privacy in Cellular Networks
| Ravishankar Borgaonkar | privacy |
| 2012-08-03 | Talk | C0c0n |
Data Security
| Alok Vijayant | data-protectionencryptiondata-loss-prevention+4 |
| 2011-09-07 | Talk | Securitybyte |
Social Web & Privacy โ An evolving world
| Bala Sathiamurthy, Aridaman Tripathi | privacydata-protectionapi-security+3 |
| 2011-09-06 | Talk | Securitybyte |
Using Data Analytics for Incident Response
| Samir Saklikar | incident-responsedata-analytics |
| 2011-08-07 | Talk | Defcon |
VDLDS โ All Your Voice Are Belong To Us
| Ganesh Devarajan | blueteamdata-leakcyber-crime |
| 2011-02-25 | Talk | Nullcon |
Enterprise Paradigm for Controlling Data Leakage
| Deepak Rout | infrastructuredata-leakblueteam |
| 2011-02-25 | Talk | Nullcon |
Protect infrastructure or protect information โ Lessons from Wikileaks
| Vishal Gupta | infrastructurewikileaksdata-leak+1 |
| 2010-12-04 | Talk | Clubhack |
Data theft in India
| K K Mookhey | data-leakredteamcyber-crime |
| 2009-11-17 | Talk | Securitybyte |
Usability and Privacy in Security
| Ponnurangam Kumaraguru | privacydata-protectionsecurity-architecture+3 |
| 2001-07-13 | Talk | Defcon |
Security & Privacy are Critically Important Issues in Todays Digitally Connected Age
| Sharad Popli | pentestprivacyblueteam |