🧪 Experimental Feature

Focus Areas are an experimental feature that groups related content by tags. This page and its functionality may change as we refine the categorization system.

DevSecOps

DevSecOps and related activities

283
Total Entries
254
Contributors
178
Unique Tags
50
Related Tags

Top Contributors

Shreeraj Shah(6) Vandana Verma Sehgal(6) Ajit Hatti(5) Devdatta Akhawe(5) Sunil Varkey(5)

Related Tags (16)

Show all 16 tags...

All Entries (283 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-08-07Tool demoBlackhat AzDevRecon - Azure DevOps Enumeration Tool Source Code Raunak Parmarazuredevsecopsiam+1
2025-08-07Tool demoBlackhat Pentest Copilot: Cursor for Pentesters Source Code Dhruva Goyal, Sitaraman Spentestingapplication-pentestingvulnerability-assessment+2
2025-08-07Tool demoBlackhat Q-TIP (QR Code Threat Inspection Platform) Rushikesh D Nandedkarincident-responseweb-securityvulnerability-management+2
2025-08-06TalkBlackhat When ‘Changed Files’ Changed Everything: Uncovering and Responding to the tj-actions Supply Chain Breach Varun Sharma, Ashish Kurmici-cdincident-responsedevsecops+3
2025-08-06Tool demoBlackhat Open-Source API Firewall by Wallarm - Advanced Protection for REST and GraphQL APIs Source Code Satinder Khasriyaapi-securityweb-securityowasp+1
2025-08-06Tool demoBlackhat ParseAndC 4.0 - The Final Cut Source Code Parbati Kumar Mannareverse-engineeringbinary-analysiscode-analysis+4
2025-08-06Tool demoBlackhat Realtic Sohan Simha Prabhakar, Samarth Bhaskar Bhatpentestingvulnerability-assessmentstatic-analysis+3
2025-08-06Tool demoBlackhat ThreatShield - The Intelligent way of Threat Modelling Ashwin Shenoi, Satyam Nagpal, Sayooj B Kumarthreat_modelingsecurity-architecturedevsecops+1
2025-08-06Tool demoBlackhat Varunastra: Securing the Depths of Docker V2 Source Code Devang Solankicontainer-securitydockerstatic-analysis+4
2025-08-06Tool demoBlackhat vet: Proactive Guardrails against Malicious OSS using Code Analysis Source Code Abhisek Dattastatic-analysissoftware-securitydevsecops+3
2025-08-06Tool demoBlackhat Damn Vulnerable Browser Extension (DVBE): Unmask the risks of your Browser Supplements Source Code Abhinav Khanna, Krishna Chagantiweb-securitysecure-codingpentesting+3
2025-08-06TalkBlackhat Adversarial Fuzzer for Teleoperation Commands: Evaluating Autonomous Vehicle Resilience Shanit Guptaautomotive-cybersecurityvulnerability-managementsecurity-testing+1
2025-08-06Tool demoBlackhat SmuggleShield - Protection Against HTML Smuggling Source Code Dhiraj Mishraweb-securitymalware-detectionbrowser-security+2
2025-04-30TalkRsac Got Supply Pain? A Real-World Approach to Supply Chain SDL Mohit Arorasecure-developmentdevsecopsvulnerability-management+5
2025-04-29TalkRsac RAG-NAROK: What Poorly-Built RAGs Can Do to Data Security Akash Mukherjeesecure-developmentdevsecopsdata-protection+2
2025-04-29TalkRsac It’s Always Risky in IT: Frontline Stories and Strategic Insights Rohit Bansalrisk-managementsecurity-architecturesecurity-awareness+2
2025-04-03TalkBlackhat ObfusQate: Where Quantum Magic Meets Code Security – Say Goodbye to Easy Cracking! Vivek Balachandransecure-coding
2025-03-02TalkNullcon Hidden in Plain Sight: Large-Scale Exposure of Orphaned Commits on Major Git Platforms Kumar Ashwinvulnerability-managementsecure-codingdevsecops+1
2025-03-02TalkNullcon Building Glitch-Resistant Firmware: Practical Software Countermeasures for Hardware glitch attacks Presentation Shyam Kumar Arshid, Chinmay Krishnaembedded-securityfirmware-analysishardware-security+3
2025-03-01TalkNullcon The Future is Trustless: How zkVMS and zkTLS Transform Bug Bounties Video Anto Josephvulnerability-managementbug-bountysecure-development
2024-11-28TalkBlackhat Time to Redefine Cybersecurity - Adding T - Trust as new Tenant to “CIA” and make it “I-ACT Lalit Ahluwaliarisk-managementsecurity-architecturesecurity-governance+1
2024-11-27TalkBlackhat The Future of Cybersecurity: Addressing New Threats with Groundbreaking Strategies Mahesh Babu Kanigiririsk-managementvulnerability-managementsecurity-architecture+2
2024-11-27Tool demoBlackhat Varunastra: Securing the Depths of Docker Source Code Kunal Aggarwalcontainer-securitydockerpentesting+3
2024-11-26TalkBlackhat Cyber Security & Resiliency: a perspective with emerging technologies and Innovation Atul Kumarcybersecurity-strategiesrisk-managementcyber-resilience+2
2024-11-26TalkBlackhat The Double Edge Sword - Cybersecurity & AI Karmendra Kohlisecurity-architecturerisk-managementdevsecops+1
2024-11-16TalkC0c0n The subtle art of checkmating CISOs Sunil Varkeyrisk-managementsecurity-architecturesecurity-governance+3
2024-11-15TalkC0c0n CISO’s take on BYOAI Venugopal Parameswararisk-managementsecurity-governancecompliance+4
2024-10-23Tool demoBlackhat Cyber Arsenal47 Simardeep Singhautomated-scanningvulnerability-assessmentpentesting+3
2024-09-26TalkRootcon How to have visibility and security OF CICD ecosystem Video Pramod Ranacicd
2024-08-29Tool demoHitb Sec Conf CICDGuard Source Code Pramod Ranacicd
2024-06-27TalkTroopers The Hidden Dangers Lurking in Your Pocket – Pwning Apple Wallet ecosystem and its apps Presentation Priyank Nigammobile-securitypentestingapi-security+2
2024-05-09TalkRsac The Good, the Bad, and the Bounty: 10 Years of Buying Bugs at Microsoft Aanchal Guptavulnerability-managementbug-bountyrisk-management+1
2024-05-07TalkRsac A Proven Approach on Automated Security Architectural Pattern Validation Video Sunil Arorasecurity-architecturedevsecopsvulnerability-management+2
2024-04-18Tool demoBlackhat Mantis - Asset Discovery at Scale Source Code Ankur Bhargava, Prateek Thakare, Saddam Hussainasset-inventoryvulnerability-managementsecurity-architecture+3
2023-09-28TalkHackinparis How to have visibility and security OF CICD ecosystem Pramod Ranacicd-securitydevsecopsvulnerability-management+6
2023-09-23TalkNullcon Journey in setting up OT SOC Presentation Ramandeep Singh Waliasocics-securityindustrial-control-systems-security+3
2023-09-23TalkNullcon Secure Coding: Fix From The Root Presentation Saddam Hussain, Gopika Subramaniansecure-coding
2023-08-12Tool demoDefcon Open Source API Security for devsecops Source Code Ankush Jain, Ankita Gupta 1api-securitydevsecopsci-cd+3
2023-08-12TalkDefcon Getting More Bang for your Buck:Appsec on a Limited Budget Vandana Verma Sehgal, Viraj Gandhisecure-developmentdevsecopsrisk-management+3
2023-08-09TalkBlackhat Diversity Microtalks: Perspectives on Creating Change Presentation Aastha Sahnisecurity-awarenessrisk-managementsecurity-governance
2023-08-09Tool demoBlackhat CASPR - Code Trust Auditing Framework Ajit Hattisecure-coding
2023-08-07TalkC0c0n Start Left SDLC Security with Open-Source DevSecOps Tooling Video Aswin Raj, Shruti M Gdevsecopssecure-developmentstatic-analysis+3
2023-08-07TalkC0c0n Homomorphic Encryption - Myth to Reality Video Anish Koshyencryptionsecurity-architectureprivacy+2
2023-08-07TalkC0c0n Shifting left blockchain development for safer DApps Video Dhanith Krishnablockchain-securitysmart-contractssecure-development+3
2023-08-07TalkC0c0n ESOC Trinetra Project Pankaj Kumar Dalelasecurity-governancerisk-managementvulnerability-management+1
2023-08-07TalkC0c0n Tackling Advanced Threat Landscape with MDR - Best Practices Video Vijayakumar K Mincident-responsethreat-huntingsecurity-monitoring+1
2023-08-07TalkC0c0n Citizen Mobile Security: Responsibilities, Accountability, and Impacts Satyendra Vermamobile-securitysecurity-awarenessrisk-management+1
2023-08-07TalkC0c0n Generative AI and Cyber Crimes Video Brijesh Singhmalwaresecurity-awarenessrisk-management+2
2023-08-07TalkC0c0n Smart Contract Phishing : Attack & Defense Video Tejaswa Rastogismart-contractsblockchain-securityphishing+3
2023-08-06TalkC0c0n Taking a Closer Look at CI/CD Pipeline Logs: Extracting Security-Related Information with Build Inspector Video Anshu Kumar, Pavan Sorabdevsecopsci-cdcicd-pipeline+3
2023-08-06TalkC0c0n Influence of Artificial Intelligence in GRC Space Mahesh Kalyanaramangovernancerisk-managementcompliance+3
2023-08-06TalkC0c0n Mitigating SSRF at scale the right way with IMDSv2! Video Ayush Priyaweb-securityapi-securityaws+3
2023-08-06TalkC0c0n Surviving In Dependency Hell Video Kumar Ashwinsecure-developmentdevsecopsvulnerability-management+1
2023-08-06TalkC0c0n The new way to be secure Video Sakshi Bhutanisecure-developmentdevsecopssoftware-security+3
2023-08-06TalkC0c0n Digital Innovation and its Impact on CIOs, CISOs and DPOs Navaneethan Mcompliancegovernancerisk-management+4
2023-08-06TalkC0c0n Subduing Adversaries with Information Superiority Video Antony K Mthreat-huntingsecurity-monitoringthreat-detection+2
2023-08-06TalkC0c0n Developments in Deep Fake detection Tapas Sainisecurity-architecturesecurity-awarenessreverse-engineering+1
2023-08-06TalkC0c0n Insider Threats - Best Practices and Common Pitfalls Video Georgie Kurieninsider-threatsrisk-managementsecurity-awareness+1
2023-05-11Tool demoBlackhat CASPR - Code Trust Auditing Framework Source Code Atharva Chincholkar, Srishti Chaubeysecure-coding
2023-04-26TalkRsac Designing Product Security for a Brighter Smile and a Healthier Tomorrow Presentation Video Lokesh Pidawekarsecure-developmentdevsecopssoftware-security+2
2023-04-26TalkRsac Is Increasing Security Maturity And Decreasing Operational Load Possible? Rohit DhamankarAutomationrisk-managementsecurity-architecture+2
2023-04-21TalkHitb Sec Conf LOCKNOTE:THE HAND THAT STRIKES, ALSO BLOCKS Presentation Video Saumil Shahsecurity-architecturerisk-managementsecurity-awareness+2
2022-09-24TalkC0c0n Building Smart, Resilient and Sustainable Cyber Eco System Navin Kumar Singhrisk-managementcybersecurity-strategiessecurity-architecture+4
2022-09-24TalkC0c0n In production with GRC for cloud Mahesh Kalyanaramancloud-compliancegovernancerisk-management+2
2022-09-24TalkC0c0n Need for Advanced SOC Vijayakumar K Msocsecurity-monitoringsecurity-analytics+3
2022-09-24TalkC0c0n Cyber Defence and Role of private players - public private partnership Jasbir Singh Solankisecurity-governancerisk-managementcompliance+2
2022-09-24TalkC0c0n Power of Narratives in Cyber Security Sunil Varkeysecurity-awarenesscybersecurity-educationhuman-factor+2
2022-09-24TalkC0c0n Rationalizing Cyber Security Risk in Risk Language Anish Koshyrisk-managementgovernancecybersecurity-strategies+4
2022-09-24TalkC0c0n BEC, still the sure shot trap Georgie Kuriensocial-engineeringpentestingsecurity-awareness+1
2022-09-24TalkC0c0n OSINT Tools and Techniques Brijesh Singhthreat-huntingintelligence-sharingsecurity-awareness+1
2022-09-24TalkC0c0n Weaponising Social Media for Psychological Operations A a Gafoorsocial-engineeringsecurity-awarenessthreat-hunting+1
2022-09-24TalkC0c0n Raining CVEs on Wordpress plugins with Semgrep Shreya Pohekar, Syed Sheeraz Aliweb-securitystatic-analysissast+2
2022-09-23TalkC0c0n Bridging the gap between Security and Operations Sujay Rajashekar Gundagattidevsecopssecurity-architecturethreat-detection+3
2022-09-23TalkC0c0n Building a Safer and Innovative Digital Ecosystem Vijay Pamarathisecure-developmentdevsecopssoftware-security+2
2022-09-23TalkC0c0n Hyperledger Fabric & Ethereum Apps: Security Deep Dive Alex Devassy, Dhanith Krishnablockchain-securitysmart-contractssolidity+3
2022-09-23TalkC0c0n Maximizing ROI on cyber security investments: Do you think Adversary Simulation OR Purple teaming holds the key? Presentation Abhijith B Rrisk-managementsecurity-architecturedevsecops
2022-09-23TalkC0c0n Securing your APIs for a cloud native future Navendu Pottekkatapi-securitysecure-developmentdevsecops
2022-09-23TalkC0c0n Collaborative efforts for safe digital banking Biju Ksecure-developmentrisk-managementsecurity-architecture
2022-09-23TalkC0c0n Technological Reliance for Resilience Tulika Pandeyrisk-managementcyber-resiliencesecurity-architecture+2
2022-09-23TalkC0c0n Hacking SmartContracts Anto Josephblockchain-securitysmart-contractsvulnerability-management+2
2022-09-08TalkNullcon Pushing Security Left By Mutating Byte Code Presentation Video Gaurav Gogiasecure-coding
2022-08-25TalkHitb Sec Conf Building An Army Of Bots By Hijacking A Unicorn’s Twitter Handle Presentation Rahul Sasi, Vishal Singhsocial-engineeringpentestingmalware+2
2022-08-12TalkDefcon Stop worrying about Nation-States and Zero-Days; let’s fix things that have been known for years Video Vivek Ponnadasecure-codingvulnerability-managementdevsecops+1
2022-08-11TalkThe Diana Initiative Connecting Dots Between Security Teams & Customer Expectations Shruthi Kamathsecurity-governancerisk-managementsecurity-architecture+2
2022-08-11TalkThe Diana Initiative The Real Cost of Free: What you need to know before downloading a free app Ruchira Pokhriyalmobile-securityapp-securityprivacy+3
2022-08-10Tool demoBlackhat CASPR - Code Trust Audit Framework Ajit Hattisecure-coding
2022-07-23TalkMay Contain Hackers How would a real life social media be like? Aditi Bhatnagarprivacydata-protectionsecurity-awareness+4
2021-11-13TalkC0c0n Connecting the dots between customers and security teams Shruthi Kamathincident-responsesecurity-awarenessdevsecops+1
2021-11-13TalkC0c0n Cybersecurity in the era of Resilience - A walk through people, process and technology Babitha B Prisk-managementcyber-resiliencesecurity-architecture+3
2021-11-13TalkC0c0n New way of looking at the hidden mysteries in the code Vandana Verma Sehgalcode-reviewstatic-analysisreverse-engineering+2
2021-11-13TalkC0c0n Changing Cyber Security Paradigm & Cyber Tsunami Sunil Varkeycybersecurity-strategiesthreat-landscaperisk-management+4
2021-11-13TalkC0c0n Crisis Capitalization in a Pandemic Greeshma M Rrisk-managementincident-responsesecurity-awareness+3
2021-11-13TalkC0c0n Need for Zero Trust in Banking Biju Kzero-trustrisk-managementsecurity-architecture+1
2021-11-13TalkC0c0n Post pandemic Transformation - A CISO’s perspective Sridhar Govardhanrisk-managementsecurity-governancecompliance+4
2021-11-13TalkC0c0n Introducing Free & Open Elastic Limitless XDR Ravindra Ramnanithreat-detectionsecurity-monitoringvulnerability-management+1
2021-11-13TalkC0c0n Machine learning to detect Chia mining Varun Kohlithreat-detectionthreat-huntingmalware-detection+2
2021-11-13TalkC0c0n Mature Your Threat Hunting Program Neha Dhyanithreat-huntingthreat-detectionthreat_modeling+2
2021-11-13TalkC0c0n Server-side javascript Injection Presentation Kavisha Shethweb-securitysecure-codingweb-pentesting
2021-11-12TalkC0c0n Enterprise Governance and Risk Management Arathy Nair, Muskan Manglacompliancegovernancerisk-management+2
2021-11-12TalkC0c0n Executive Presence….a cardinal of the cyber rostrum Bishakha Jainsecurity-awarenesssecurity-architecturesecurity-governance
2021-11-12TalkC0c0n Post Covid CISOs - Disappearing trusted boundaries and Innovative CyberSecurity Approaches Illyas Kooliyankalrisk-managementsecurity-architecturesecurity-governance+1
2021-11-12TalkC0c0n Regulating Social Media Platforms : Should it be done in Democratic Societies ? J Sam Daniel Stalin, Apar Gupta, Dinesh O Bareja, Prashant Mali, Jiten Jaincompliancegovernancerisk-management+4
2021-11-12TalkC0c0n “Let’s Go Phishing”: Discerning the insidious nature of Social Engineering Ruchira Pokhriyal, Shashi Karhailsocial-engineeringpentestingsecurity-awareness
2021-11-12TalkC0c0n The evolving nature of cyber community Aastha Sahnisecurity-awarenessrisk-managementcybersecurity-education
2021-11-12TalkC0c0n Understanding the Psychology Behind Threats - adding Twists to your Turns Saman Fatimathreat_modelingsecurity-awarenesshuman-factor+1
2021-11-04TalkEkoparty DIAL: Did I just alert Lambda? A centralized security misconfiguration detection system Source Code Video Saransh Rana, Divyanshu Mehta, Harsh Varagiyaawssecurity-monitoringiam+2
2021-10-15TalkRootcon The Curious case of knowing the unknown Video Vandana Verma Sehgalvulnerability-managementsecure-codingdevsecops+1
2021-08-08TalkDefcon AppSec 101: A Journey from Engineer to Hacker Video Arjun Gopalakrishnasecure-codingpentestingethical-hacking+2
2021-08-08TalkDefcon Top 20 Secure PLC Coding Practices Video Vivek Ponnadaindustrial-control-systems-securitysecure-codingvulnerability-management+3
2021-08-06TalkDefcon Adversary village Kick-off Video Abhijith B Rred-teamingethical-hackingvulnerability-assessment+2
2021-08-05TalkDefcon The Bug Hunter’s Recon Methodology Video Tushar Vermapentestingvulnerability-assessmentapplication-pentesting+1
2021-05-06Tool demoBlackhat Demystifying the State of Kubernetes Cluster Security - The Cloud Native Way Source Code Vasant Kumar, Rupali Dashkubernetescloudaudit+4
2021-05-06Tool demoBlackhat FalconEye: Windows Process Injection Techniques - Catch Them All Presentation Source Code Rajiv Kulkarni, Sushant Paithanewindowsprocess-injectionblueteam+2
2020-12-09Tool demoBlackhat ArcherySec 2.0 - Open Source Vulnerability Assessment and Management Presentation Source Code Anand Tiwariopensourceblueteampentest+3
2020-11-21TalkApp Sec Indonesia The caveats of the unseen: Crouching exposure, Hidden Misconfiguration Ashwin Vamshivulnerability-managementsecurity-architecturedevsecops+2
2020-10-01Tool demoBlackhat OWASP Python Honeypot Source Code Sri Harsha Gajavalliweb-securityowasppentesting+1
2020-09-19TalkC0c0n Automate your Recon with ReconNote Video Prasoon Guptapentestingvulnerability-assessmentAutomation+1
2020-09-18TalkC0c0n Demystifying Zero Trust - A Real world Video Sandeep Variyamzero-trustsecurity-architecturesecurity-governance+1
2020-09-18TalkC0c0n Coping with Digital Transformation - A CISO perspective Video Maya R Nairrisk-managementsecurity-governancesecurity-architecture+3
2020-09-18TalkC0c0n Herd Immunity, in the Cyber World Sunil Varkeysecurity-awarenessrisk-managementvulnerability-management+1
2020-09-18TalkC0c0n Cyber Security Shifts During COVID-19 Video Sunil Kanchirisk-managementsecurity-awarenesscompliance-governance+1
2020-09-18TalkC0c0n Web Application hacking with WebZGround Video Parveen Yadav, Narendra Kumarweb-securityweb-pentestingpentesting+3
2020-08-21TalkThe Diana Initiative Trust, No Trust or Zero Trust - Myth Demystifying Vandana Verma Sehgalzero-trustsecurity-architecturecompliance+2
2020-08-09TalkDefcon Running an appsec program with open source projects Presentation Video Vandana Verma Sehgalowaspsecure-developmentdevsecops+3
2020-03-06Tool demoNullcon Talisman Source Code Suhas Vishwanathopensourcesecure-developmentdevelopment+5
2020-03-06Tool demoNullcon VyAPI Source Code Riddhi Shreesecure-codingawsamazon-cognito+5
2020-03-06Tool demoNullcon Wolverine Source Code Furqan Khan, Siddharth Anbalahanlinuxsecure-codingweb-application-security+3
2019-12-04Tool demoBlackhat AutoMacTC: Finding Worms in Apple Orchards - Using AutoMacTC for macOS Incident Response Kshitij Kumar, Jai Musunurimacossecure-codingforensic+2
2019-11-10TalkToor Con Hot Tub Island Jatin Katariaethical-hackingsecurity-awareness
2019-09-27TalkC0c0n autoSource an automated framework for Source Code Review Source Code Malkit Singhcode-reviewsecure-codingstatic-analysis+3
2019-09-27TalkC0c0n Security @scale for startups Shivanath Somanathandevsecopssecure-developmentsoftware-security+2
2019-09-27TalkC0c0n Stepping into Password Less Economy Ajit Hattiauthenticationidentity-managementsecure-development+1
2019-09-27TalkC0c0n Practical Approach to Cyber Security for financial institutions Georgie Kurienfinancial-institutionssecure-developmentrisk-management+2
2019-09-27TalkC0c0n CISO Mind Set Lopa Mudraa Basuurisk-managementsecurity-governancecompliance+2
2019-09-27TalkC0c0n A Day in the Life of a CISO Sridhar Govardhancompliancegovernancerisk-management+3
2019-09-27TalkC0c0n Golang for Pentesters / RedTeamers Presentation Anant Shrivastavapentestredteamsecure-coding
2019-09-27TalkC0c0n Serverless SOAR Source Code Sabyasachi Dhal, Suresh Sharmasecure-codingpentest
2019-09-27TalkC0c0n VyAPI - The Vulnerable Hybrid Android App Presentation Source Code Riddhi Shreesecure-codingawsamazon-cognito+5
2019-09-13Talk44 Con One Person Army – Playbook on how to be the first Security Engineer at a company Video Kashish MittalinfrastructuredevsecopsAutomation
2019-09-13TalkGlobal App Sec Real Time Vulnerability Alerting by Using Principles from the United States Tsunami Warning Center Amol Sarwatevulnerability-managementawssecurity-information-event-management+1
2019-08-30TalkHitb Sec Conf COMMSEC: PErfidious: Make PE Backdooring Great Again! Presentation Video Shreyans Doshisecure-codingredteamblueteam+1
2019-08-11TalkDefcon Shifting the DevSecOps Culture, Taking away the sugar piece and giving the pile to ants Presentation Vandana Verma Sehgaldevsecopssecure-developmentAutomation+4
2019-08-11TalkDefcon Exploiting and Securing iOS Apps using OWASP iGoat Swaroop Yermalkarmobile-securityios-securityapplication-pentesting+4
2019-08-08TalkBlackhat DevSecOps : What, Why and How Presentation Video Anant Shrivastavadevsecopsdevelopmentdevops
2019-08-08TalkBlackhat Preventing Authentication Bypass: A Tale of Two Researchers Presentation Ravi Jaiswalsecurity-development-lifecycleapplied-security
2019-08-08TalkDefcon Phishing in the cloud era Presentation Ashwin Vamshi, Abhinav Singhphishingapi-securityweb-security+2
2019-03-28TalkBlackhat DevSecOps : What, Why and How Presentation Video Anant Shrivastavadevsecopssecure-coding
2019-03-28Tool demoBlackhat Archery - Open Source Vulnerability Assessment and Management- 2.0 Source Code Anand Tiwaripentestinfrastructureblueteam+3
2019-03-28Tool demoBlackhat Kurukshetra: Playground for Interactive Security Learning Source Code Anirudh Anand, Mohan Kallepalli, Ankur Bhargavasecure-codingwebblueteam
2019-03-28Tool demoBlackhat pytm: A Pythonic Framework for Threat Modeling Source Code Rohit Shambhunisecure-codingthreat_modelingredteam
2019-02-28TalkNullcon Building Hardened IoT Implementations with LangSec Video Prashant Anantharamaniotblueteamsecure-development
2019-02-28TalkNullcon Andromeda - GUI based Dynamic Instrumentation Toolkit powered by Frida Source Code Video Shivang Desaisecure-codingpentest
2018-12-06Tool demoBlackhat Astra: Automated Security Testing For REST APIs Source Code Sagar Popat, Harsh Groverapipentestrest-api+1
2018-12-05Tool demoBlackhat Kurukshetra: Playground for Interactive Security Learning Source Code Anirudh Anand, Mohan Kallepallisecure-codingwebblueteam
2018-10-19TalkApp Sec Day Australia Threat Modeling-as-Code & Automation for DevSecOps wins Video Abhay Bhargavthreat_modelingdevsecops
2018-10-05TalkC0c0n Adaptive GRC Mahesh Kalyanaramancompliancegovernancerisk-management+1
2018-10-05TalkC0c0n Blockchains as techno-power structures: towards emergence of P2P Politics Sunil Aggarwalblockchain-securitydecentralized-systemsdecentralised-security+2
2018-10-05TalkC0c0n Future of Mobility & Cyber Security Suja Chandyautomotive-cybersecurityindustrial-control-systems-securitysecurity-architecture+2
2018-10-05TalkC0c0n Taking cyber security to the board room Amit Pradhanrisk-managementcompliancegovernance+3
2018-10-05TalkC0c0n Resiliency Focus alongside Digital Disruption Lince Lawrencesecurity-architecturerisk-managementsecurity-awareness+2
2018-09-27TalkRootcon Defending cloud Infrastructures with Cloud Security Suite Presentation Source Code Video Shivankar Madaancloudawsinfrastructure+5
2018-08-11Tool demoDefcon Archery—Open Source Vulnerability Assessment and Management Source Code Anand Tiwaripentestinfrastructureblueteam+3
2018-08-11Tool demoDefcon Halcyon IDE Source Code Sanoop Thomasreconnaissanceredteamnmap+1
2018-08-11Tool demoDefcon Sh00t—An open platform for manual security testers & bug hunters Source Code Pavan Mohanpentestbug-huntingopensource+3
2018-08-10TalkDefcon Building visualisation platforms for OSINT data using open source solutions Video Bharath Kumar, Madhu Akulasecurity-analyticsthreat-hunting
2018-08-08Tool demoBlackhat AutoMacTC: Finding Worms in Apple Orchards - Using AutoMacTC for macOS Incident Response Kshitij Kumar, Jai Musunurimacossecure-codingforensic+2
2018-08-08Tool demoBlackhat Archerysec Tool Demo Source Code Anand Tiwaripentestinfrastructureblueteam+3
2018-08-08Tool demoBlackhat Halcyon IDE: For Nmap Script Developers Source Code Sanoop Thomasreconnaissanceredteamnmap+1
2018-08-08Tool demoBlackhat SCoDA: Smart COntract Defender and Analyzer Ajit Hattiblueteamanalysissecure-coding
2018-06-27TalkFirst Securing your in-ear fitness coach: Challenges in hardening next generation wearables Presentation Sumanth Naropanth, Sunil Kumarmobile-securitysecure-developmentvulnerability-management+2
2018-03-13TalkTroopers Securing your in-ear fitness coach: Challenges in hardening next generation wearables Presentation Video Sumanth Naropanth, Kavya Racharlamobile-securitysecure-developmentvulnerability-management+2
2018-01-31TalkOwasp App Sec California Hunter – Optimize your Pentesters time Video Kiran Shiraliapplication-pentestingpentestingvulnerability-management+2
2017-10-05TalkBrucon Races, Reaches and Rescues!!! (Race condition vulnerabilities revisited) Rushikesh D Nandedkar, Sampada Nandedkarvulnerability-assessmentpentestingsecure-coding+2
2017-09-21TalkApp Sec Usa Androsia: A tool for securing in memory sensitive data Video Samit Anwerandroid-securitymobile-securitystatic-analysis+1
2017-08-19TalkC0c0n Building Trust for Digital Transactions in India’s COD Culture Parry Aftabsecure-developmentrisk-managementsecurity-architecture
2017-08-19TalkC0c0n The Public Private Partnership - Navigating the Govt Saikat Dattacompliancegovernancerisk-management+3
2017-08-19TalkC0c0n Trust, the foundation of Digital Mastery Sunil Varkeyidentity-managementauthenticationrisk-management+2
2017-08-18TalkC0c0n Challenges in Digital Banking Biju Ksecurity-awarenesssecurity-governancerisk-management
2017-08-18TalkC0c0n Moving from Cybersecurity Awareness to Cybersecurity Competence Anup Narayanancybersecurity-educationcybersecurity-trainingsecurity-awareness+3
2017-08-18TalkC0c0n Call Centre Frauds Parry Aftabsocial-engineeringsecurity-awarenessrisk-management+1
2017-08-18TalkC0c0n Cyber bullying-Screen the Mean Nitin Awade, Surjata Awadesecurity-awarenessincident-responsedigital-forensics
2017-08-18TalkC0c0n Do Students really require Smartphones Pranav a Menonsecurity-awarenesscybersecurity-educationhuman-factor
2017-08-18TalkC0c0n Internet Addiction and Children Teena Josesecurity-awarenesscybersecurity-educationhuman-factor
2017-08-18TalkC0c0n Sleep, Screen and Teenagers Natishia Rebecca Chandy, Pulkit Deepak Khatrisecurity-awarenesshuman-factorbehavioral-change+1
2017-08-18TalkC0c0n Social Media and You Parry Aftabsecurity-awarenesssocial-engineeringhuman-factor+1
2017-08-18TalkC0c0n Threats with online gaming and issues with games like Pokemon Riyaz Walikar, Akash Mahajansecurity-awarenessmobile-securityvulnerability-management+1
2017-08-18TalkC0c0n Androsia: A tool for securing in memory sensitive data Source Code Samit Anwersecure-codingandroidmobile+1
2017-08-18TalkC0c0n Cloud_Security Suite - One stop tool for auditing cloud infrastructure Source Code Shivankar Madaan, Jayesh Chauhancloudawsinfrastructure+5
2017-08-18TalkC0c0n iGoat – A Self Learning Tool for iOS App Pentesting and Security Source Code Swaroop Yermalkariosmobilepentest+3
2017-07-30Tool demoBlackhat Yasuo Source Code Saurabh Haritsecure-codingredteamblueteam+4
2017-07-27Tool demoBlackhat Fuzzapi - Fuzzing Your RESTAPIs Since Yesterday Source Code Lalith Rallabhandi, Abhijeth Dugginapeddi, Srinivas Raofuzzingapirest-api+3
2017-07-27Tool demoBlackhat Gibber Sense Source Code Ajit Hattisecure-codingreconnaissancecryptography+3
2017-07-26Tool demoBlackhat Devknox - Autocorrect Security Issues from Android Studio Source Code Subho Halderandroidmobilecode-analysis+1
2017-06-23TalkHackinparis Injecting Security into Web apps with Runtime Patching and Context Learning Presentation Video Ajin Abrahamwebblueteamsecure-development+6
2017-05-23TalkPhdays Injecting security into web apps in the runtime Presentation Ajin Abrahamwebblueteamsecure-development+6
2017-03-30Tool demoBlackhat Devknox - Autocorrect Security Issues from Android Studio Source Code Subho Halderandroidmobilecode-analysis+1
2017-03-03TalkNullcon DevOpSec: Rapid Security in the Cloud with AWS and CIS Presentation Video Mikhail Advani, Rajesh Tamhanedevsecopscloudaws+2
2017-03-03TalkNullcon Injecting Security into Web apps with Runtime Patching and Context Learning Presentation Video Ajin Abrahamwebblueteamsecure-development+6
2017-03-03TalkNullcon Securing Critical National Infrastructure Video Shailendra Fuloria, R Sarangapani, Rahul Tongiacritical-infrastructureindustrial-control-systems-securityics-security+4
2017-01-25TalkOwasp App Sec California DASTProxy: Don’t let your automated security testing program stall on crawlInstead focus on business context Presentation Video Kiran Shiralidynamic-analysisdastdevsecops+3
2017-01-25TalkOwasp App Sec California OCSP Stapling in the Wild Devdatta Akhaweweb-securityvulnerability-managementsecurity-architecture+1
2016-11-04Tool demoBlackhat Yasuo Source Code Saurabh Haritsecure-codingredteamblueteam+4
2016-10-13TalkApp Sec Usa When encryption is not enough: Attacking Wearable - Mobile Application communication over BLE Video Sumanth Naropanth, Kavya Racharlamobile-securityvulnerability-managementreverse-engineering+1
2016-09-23TalkRootcon Halcyon – A Faster Way to Build Custom Scripts for Nmap Scans Presentation Source Code Video Sanoop Thomassecure-codingreconnaissanceredteam+1
2016-08-19TalkC0c0n Kill the password - A new era of authentication Tamaghna Basuauthenticationiamsecurity-architecture+1
2016-08-04Tool demoBlackhat Droid-FF: Android Fuzzing Framework Source Code Anto Josephandroidfuzzingsecure-coding+2
2016-08-04Tool demoBlackhat Maltese (Malware Traffic Emulating Software) Source Code Sasi Siddharthdnswebsecure-coding
2016-05-26TalkHitb Sec Conf HITB Lab: Mobile Application Security for iOS and Android Source Code Tushar Dalvimobileandroidios+3
2016-03-15TalkGroundzerosummit Web App Security Harpreet Singh, Himanshu Sharma, Nipun Jaswalweb-securityapi-securitysecure-coding+3
2016-03-11TalkNullcon Real-time Ingestion of security telemetry data into Hadoop distributed system to respond to 0-day Presentation Pallav Jakhotiya, Vipul Sawanthadoopsecure-developmentblueteam
2015-09-24TalkApp Sec Usa Continuous Cloud Security Automation Video Rohit PitkeawsdevsecopsAutomation+2
2015-09-24TalkApp Sec Usa Encouraging Diversity and Advancing Cybersecurity Education Shruthi Kamathcybersecurity-educationsecurity-awarenessrisk-management+1
2015-08-05Tool demoBlackhat PixelCaptcha: A unicode based captcha scheme Whitepaper Source Code Gursev Singh Kalracaptchasecure-codingdevelopment
2015-08-01TalkC0c0n S3curi7y at 36K feet Rugved Mehta, Gaurav Trivediawsazuregcp+3
2015-08-01TalkC0c0n NoPo - The NoSQL HoneyPot Framework Source Code Francis Alexandernosqlsecure-coding
2015-02-06TalkNullcon Building security and compliance into the software delivery process Anubhav Bathla, Dinesh Pillai, S Chandrasekharsecure-developmentdevsecopscompliance+3
2015-01-27TalkOwasp App Sec California The Emperor’s New Password Manager: Security Analysis of Web-based Password Managers Video Devdatta Akhaweweb-securityxsscsrf+3
2014-11-13TalkGround Zero Summit 9 Cell Cyber Diplomacy Alok Vijayantsecurity-architecturerisk-managementsecurity-governance
2014-11-13TalkGround Zero Summit Financial Integrity and Cyber Security Karnal Singhrisk-managementcompliancesecurity-governance
2014-11-13TalkGround Zero Summit Internet Governance Anjana Kovacsgovernancecompliancerisk-management+2
2014-11-13TalkGround Zero Summit Cyber ‘BrahMos’ - Static analysis driven secure coding Joy Sensecure-coding
2014-08-22TalkC0c0n Still Single with a bleeding heart (Tool Release) Tamaghna Basusecure-developmentvulnerability-management
2014-08-21TalkUsenix The Emperor’s New Password Manager: Security Analysis of Web-based Password Managers Presentation Whitepaper Devdatta Akhaweweb-securityxsscsrf+3
2014-06-23TalkHackinparis Pentesting NoSQL DB’s with NoSQL Exploitation Framework Presentation Video Francis Alexandernosqlsecure-codingpentest
2014-02-14TalkNullcon Attack of the setuid bit - pt_chown and pwning root terminals Presentation Siddhesh Poyarekarglibcredteamblueteam+2
2013-11-21TalkAppsec Usa Wassup MOM? Owning the Message Oriented Middleware Video Gursev Singh Kalraapi-securityvulnerability-managementsecure-coding+1
2013-11-20TalkApp Sec Usa Project Talk: OWASP OpenSAMM Project Pravir Chandrasoftware-securitysecure-developmentdevsecops+4
2013-09-27TalkC0c0n From Bedroom to Boardroom - Taking your Weekend Infosec Project Global Vivek Ramachandrandevsecopssecure-developmentpentesting+2
2013-09-27TalkC0c0n Hello CISO! How to make end-users LIKE and FOLLOW “Brand Infosec”? Anup Narayanansecurity-awarenesscybersecurity-educationsecurity-governance+3
2013-09-27TalkC0c0n Infiltrating the Intranet with Skanda Source Code Jayesh Chauhanredteamsecure-coding
2013-09-27TalkC0c0n Snake Bites Presentation Anant Shrivastavasecure-codingwebpentest+1
2013-09-27TalkC0c0n Static analysis of malware with PyTriage Presentation Yashin Mehaboobesecure-coding
2013-08-15TalkUsenix An Empirical Study of Vulnerability Rewards Programs Presentation Whitepaper Devdatta Akhawevulnerability-managementbug-bountysoftware-security+3
2013-08-15TalkUsenix Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness Presentation Whitepaper Devdatta Akhaweweb-securitysecurity-awarenesssecurity-architecture+3
2013-08-01Tool demoBlackhat Sparty Presentation Source Code Aditya K Soodsecure-codingwebaudit+2
2013-08-01Tool demoBlackhat XENOTIX xBOT Source Code Ajin Abrahambotnetlinuxwindows+3
2013-03-01TalkNullcon Mobile Code mining for discovery and exploits Presentation Video Hemil Shahmobilecode-analysissecure-development+5
2012-12-06TalkBlackhat The art of exploiting logical flaws in web apps Presentation Whitepaper Sumit Siddharthwebredteamsecure-coding
2012-12-01TalkClubhack The difference between the “Reality” and “Feeling” of Security: Information Security and the Human Being Presentation Video Thomas Kurian Ambattusecurity-awarenesshuman-factorrisk-management+2
2012-10-26TalkApp Sec Usa The 7 Qualities of Highly Secure Software Video Mano Paulsecure-developmentsoftware-securitysecure-coding+3
2012-09-28TalkNullcon Alert(/xss/) - How to catch an XSS before someone exploits / reports it? Ahamed Nafeezweb-securityxsssecure-coding+2
2012-08-04TalkC0c0n Impact of cyber laws on various stakeholders Sagar Rahurkarcompliancegovernanceregulatory-compliance+2
2012-08-03TalkC0c0n A model to reduce information security risks due to human error Presentation Anup Narayanansecurity-awarenessbehavior-changerisk-management
2012-08-03TalkC0c0n Layer 8 Exploitation: A threat to National Security Aakash Goelsocial-engineeringpentestingsecurity-awareness+1
2012-08-03TalkC0c0n The Weakest Link - Reinforcing the Human Element Sandeep Godbolesecurity-awarenesshuman-factorcybersecurity-education+4
2012-03-15TalkC0c0n Integrated Dial 100 System for Law Enforcement Nandkumar Saravadesecurity-governancecompliance-governancesecurity-operations
2012-03-15TalkNullcon An App(le) a day keeps the wallet away Antriksh Shahpentestingweb-securityapi-security+1
2012-02-15TalkNullcon Best practices to improve the security grading of your project Video Hemant Khandelwalblueteamthreat_modelingsecure-development
2011-11-17TalkDeepsec Behavioral Security: 10 steps forward 5 steps backward Video Sourabh Satishsecurity-awarenessbehavioral-changerisk-management+2
2011-09-19TalkBrucon Step-by-Step for Software Security (that anyone can follow) Pravir Chandrasoftware-securitysecure-developmentdevsecops+4
2011-09-07TalkSecuritybyte Social Web & Privacy – An evolving world Bala Sathiamurthy, Aridaman Tripathiprivacydata-protectionapi-security+3
2011-09-06TalkSecuritybyte Application Security Strategies Presentation K K Mookheysecure-codingsecure-developmentweb-security+3
2011-09-06TalkSecuritybyte Security Threats on Social Networks Presentation Nithya Ramansocial-engineeringweb-securitysecurity-awareness+2
2011-09-06TalkSecuritybyte Enabling Un-trusted Mashups Presentation Bishan Singhweb-securityxsscsrf+4
2011-03-15TalkNullcon Information Warfare Ñ The Indian Perspective Alok Vijayantcybersecurity-strategyrisk-managementsecurity-awareness+1
2011-02-25TalkNullcon (secure) SiteHoster – Disable XSS & SQL Injection Presentation Whitepaper Source Code Abhishek Kumarxsssqliblueteam+2
2010-11-25TalkDeepsec Developers are from Mars, Compliance Auditors are from Venus Video Neelay S Shahcompliancegovernancerisk-management+4
2010-08-01TalkC0c0n Hackers’ EcoSystem in India Rohit Srivastwapentestingsecurity-awarenessrisk-management+1
2010-04-14TalkBlackhat Attacking JAVA Serialized Communication Presentation Whitepaper Source Code Manish Saindanesecure-codingredteamnetwork+1
2009-12-05TalkClubhack Revealing the Secrets: Source Code Disclosure, Techniques and Impacts Presentation Anant Kochharsecure-developmentsecure-coding
2009-11-19TalkDeepsec Top 10 Security Issues Developers Don’t Know About Video Neelay S Shahsecure-codingdevsecopsvulnerability-management+3
2009-11-17TalkSecuritybyte Applications - The new cyber security frontier Presentation Mano Paulsecure-developmentdevsecopssoftware-security+2
2009-11-17TalkSecuritybyte Usability and Privacy in Security Presentation Ponnurangam Kumaraguruprivacydata-protectionsecurity-architecture+3
2009-11-17TalkSecuritybyte Business Case-Risk Management/Compliance at AMITY Js Sodhicompliancegovernancerisk-management+3
2009-11-17TalkSecuritybyte Business Continuity Case Study Venkataram Arabolubusiness-continuityrisk-managementbusiness-resilience+3
2009-08-06TalkC0c0n Cyber Victimisation K Jaishankarcybersecurity-educationsecurity-awarenessrisk-management+2
2009-08-06TalkC0c0n Information Warfare A a Gafoor, Vinayak Mishrathreat-huntingthreat_modelingsecurity-awareness+2
2009-05-19TalkSyscan Securing Applications at Gateway with Web Application Firewalls Shreeraj Shahblueteamwebfootprinting+3
2009-05-19TalkSyscan Securing Enterprise Applications Shreeraj Shahblueteamwebweb-application-security+13
2009-04-22TalkHitb Sec Conf Application Defense Tactics & Strategies - WAF at the Gateway Presentation Shreeraj Shahblueteamwebfootprinting+3
2008-12-06TalkClubhack Insecure Implementation of Security Best Practices: of hashing, CAPTCHA’s and Caching Presentation Karmendra Kohlisecure-developmentsecure-codingblueteam+2
2008-12-06TalkClubhack Reverse Engineering v/s Secure Coding Presentation Atul Alexsecure-codingreverse-engineeringredteam+2
2008-10-29TalkHitb Sec Conf Top 10 Web 2.0 Attacks Presentation Video Shreeraj Shahblueteamweb-application-securityajax+8
2008-04-16TalkHitb Sec Conf Securing Next Generation Applications – Scan, Detect and Mitigate Shreeraj Shahblueteamweb-application-securityajax+8
2008-03-27TalkBlackhat Iron Chef Black Hat: John Henry Challenge Presentation Pravir Chandraethical-hackingsecure-developmentdevsecops
2007-08-02TalkBlackhat The Evolution Of Phishing To Organized Crime Video Rohyt Belanisocial-engineeringphishingthreat_modeling+2
2007-08-02TalkBlackhat Breaking C++ Applications Whitepaper Neel Mehtaredteamsecure-codingapi
2006-09-21TalkHitb Sec Conf Finding Secrets in ISAPI Presentation Nish Bhallasecure-codingreverse-engineering
2006-08-02TalkBlackhat SQL Injections by Truncation Presentation Bala Neerumallaweb-securitysql-injectionsecure-coding+1
2006-01-26TalkBlackhat Analysis of Adversarial Code: Problem, Challenges, Results Presentation Arun Lakhotiaanalysissecure-codingblueteam
2005-09-29TalkHitb Sec Conf Analyzing Code for Security Defects Presentation Nish Bhallacode-analysisblueteamsecure-coding
2003-12-12TalkHitb Sec Conf Defending Web Applications: Strategies, methods and practices Shreeraj Shahwebblueteamsecure-coding+2
1998-07-29TalkBlackhat Security as an enabler for new business opportunities - The Business Value of Security Karan Khannarisk-managementbusiness-continuitycyber-resilience+4