| 2025-08-07 | Tool demo | Blackhat |
AzDevRecon - Azure DevOps Enumeration Tool
| Raunak Parmar | azuredevsecopsiam+1 |
| 2025-08-07 | Tool demo | Blackhat |
Pentest Copilot: Cursor for Pentesters
| Dhruva Goyal, Sitaraman S | pentestingapplication-pentestingvulnerability-assessment+2 |
| 2025-08-07 | Tool demo | Blackhat |
Q-TIP (QR Code Threat Inspection Platform)
| Rushikesh D Nandedkar | incident-responseweb-securityvulnerability-management+2 |
| 2025-08-06 | Talk | Blackhat |
When ‘Changed Files’ Changed Everything: Uncovering and Responding to the tj-actions Supply Chain Breach
| Varun Sharma, Ashish Kurmi | ci-cdincident-responsedevsecops+3 |
| 2025-08-06 | Tool demo | Blackhat |
Open-Source API Firewall by Wallarm - Advanced Protection for REST and GraphQL APIs
| Satinder Khasriya | api-securityweb-securityowasp+1 |
| 2025-08-06 | Tool demo | Blackhat |
ParseAndC 4.0 - The Final Cut
| Parbati Kumar Manna | reverse-engineeringbinary-analysiscode-analysis+4 |
| 2025-08-06 | Tool demo | Blackhat |
Realtic
| Sohan Simha Prabhakar, Samarth Bhaskar Bhat | pentestingvulnerability-assessmentstatic-analysis+3 |
| 2025-08-06 | Tool demo | Blackhat |
ThreatShield - The Intelligent way of Threat Modelling
| Ashwin Shenoi, Satyam Nagpal, Sayooj B Kumar | threat_modelingsecurity-architecturedevsecops+1 |
| 2025-08-06 | Tool demo | Blackhat |
Varunastra: Securing the Depths of Docker V2
| Devang Solanki | container-securitydockerstatic-analysis+4 |
| 2025-08-06 | Tool demo | Blackhat |
vet: Proactive Guardrails against Malicious OSS using Code Analysis
| Abhisek Datta | static-analysissoftware-securitydevsecops+3 |
| 2025-08-06 | Tool demo | Blackhat |
Damn Vulnerable Browser Extension (DVBE): Unmask the risks of your Browser Supplements
| Abhinav Khanna, Krishna Chaganti | web-securitysecure-codingpentesting+3 |
| 2025-08-06 | Talk | Blackhat |
Adversarial Fuzzer for Teleoperation Commands: Evaluating Autonomous Vehicle Resilience
| Shanit Gupta | automotive-cybersecurityvulnerability-managementsecurity-testing+1 |
| 2025-08-06 | Tool demo | Blackhat |
SmuggleShield - Protection Against HTML Smuggling
| Dhiraj Mishra | web-securitymalware-detectionbrowser-security+2 |
| 2025-04-30 | Talk | Rsac |
Got Supply Pain? A Real-World Approach to Supply Chain SDL
| Mohit Arora | secure-developmentdevsecopsvulnerability-management+5 |
| 2025-04-29 | Talk | Rsac |
RAG-NAROK: What Poorly-Built RAGs Can Do to Data Security
| Akash Mukherjee | secure-developmentdevsecopsdata-protection+2 |
| 2025-04-29 | Talk | Rsac |
It’s Always Risky in IT: Frontline Stories and Strategic Insights
| Rohit Bansal | risk-managementsecurity-architecturesecurity-awareness+2 |
| 2025-04-03 | Talk | Blackhat |
ObfusQate: Where Quantum Magic Meets Code Security – Say Goodbye to Easy Cracking!
| Vivek Balachandran | secure-coding |
| 2025-03-02 | Talk | Nullcon |
Hidden in Plain Sight: Large-Scale Exposure of Orphaned Commits on Major Git Platforms
| Kumar Ashwin | vulnerability-managementsecure-codingdevsecops+1 |
| 2025-03-02 | Talk | Nullcon |
Building Glitch-Resistant Firmware: Practical Software Countermeasures for Hardware glitch attacks
| Shyam Kumar Arshid, Chinmay Krishna | embedded-securityfirmware-analysishardware-security+3 |
| 2025-03-01 | Talk | Nullcon |
The Future is Trustless: How zkVMS and zkTLS Transform Bug Bounties
| Anto Joseph | vulnerability-managementbug-bountysecure-development |
| 2024-11-28 | Talk | Blackhat |
Time to Redefine Cybersecurity - Adding T - Trust as new Tenant to “CIA” and make it “I-ACT
| Lalit Ahluwalia | risk-managementsecurity-architecturesecurity-governance+1 |
| 2024-11-27 | Talk | Blackhat |
The Future of Cybersecurity: Addressing New Threats with Groundbreaking Strategies
| Mahesh Babu Kanigiri | risk-managementvulnerability-managementsecurity-architecture+2 |
| 2024-11-27 | Tool demo | Blackhat |
Varunastra: Securing the Depths of Docker
| Kunal Aggarwal | container-securitydockerpentesting+3 |
| 2024-11-26 | Talk | Blackhat |
Cyber Security & Resiliency: a perspective with emerging technologies and Innovation
| Atul Kumar | cybersecurity-strategiesrisk-managementcyber-resilience+2 |
| 2024-11-26 | Talk | Blackhat |
The Double Edge Sword - Cybersecurity & AI
| Karmendra Kohli | security-architecturerisk-managementdevsecops+1 |
| 2024-11-16 | Talk | C0c0n |
The subtle art of checkmating CISOs
| Sunil Varkey | risk-managementsecurity-architecturesecurity-governance+3 |
| 2024-11-15 | Talk | C0c0n |
CISO’s take on BYOAI
| Venugopal Parameswara | risk-managementsecurity-governancecompliance+4 |
| 2024-10-23 | Tool demo | Blackhat |
Cyber Arsenal47
| Simardeep Singh | automated-scanningvulnerability-assessmentpentesting+3 |
| 2024-09-26 | Talk | Rootcon |
How to have visibility and security OF CICD ecosystem
| Pramod Rana | cicd |
| 2024-08-29 | Tool demo | Hitb Sec Conf |
CICDGuard
| Pramod Rana | cicd |
| 2024-06-27 | Talk | Troopers |
The Hidden Dangers Lurking in Your Pocket – Pwning Apple Wallet ecosystem and its apps
| Priyank Nigam | mobile-securitypentestingapi-security+2 |
| 2024-05-09 | Talk | Rsac |
The Good, the Bad, and the Bounty: 10 Years of Buying Bugs at Microsoft
| Aanchal Gupta | vulnerability-managementbug-bountyrisk-management+1 |
| 2024-05-07 | Talk | Rsac |
A Proven Approach on Automated Security Architectural Pattern Validation
| Sunil Arora | security-architecturedevsecopsvulnerability-management+2 |
| 2024-04-18 | Tool demo | Blackhat |
Mantis - Asset Discovery at Scale
| Ankur Bhargava, Prateek Thakare, Saddam Hussain | asset-inventoryvulnerability-managementsecurity-architecture+3 |
| 2023-09-28 | Talk | Hackinparis |
How to have visibility and security OF CICD ecosystem
| Pramod Rana | cicd-securitydevsecopsvulnerability-management+6 |
| 2023-09-23 | Talk | Nullcon |
Journey in setting up OT SOC
| Ramandeep Singh Walia | socics-securityindustrial-control-systems-security+3 |
| 2023-09-23 | Talk | Nullcon |
Secure Coding: Fix From The Root
| Saddam Hussain, Gopika Subramanian | secure-coding |
| 2023-08-12 | Tool demo | Defcon |
Open Source API Security for devsecops
| Ankush Jain, Ankita Gupta 1 | api-securitydevsecopsci-cd+3 |
| 2023-08-12 | Talk | Defcon |
Getting More Bang for your Buck:Appsec on a Limited Budget
| Vandana Verma Sehgal, Viraj Gandhi | secure-developmentdevsecopsrisk-management+3 |
| 2023-08-09 | Talk | Blackhat |
Diversity Microtalks: Perspectives on Creating Change
| Aastha Sahni | security-awarenessrisk-managementsecurity-governance |
| 2023-08-09 | Tool demo | Blackhat |
CASPR - Code Trust Auditing Framework
| Ajit Hatti | secure-coding |
| 2023-08-07 | Talk | C0c0n |
Start Left SDLC Security with Open-Source DevSecOps Tooling
| Aswin Raj, Shruti M G | devsecopssecure-developmentstatic-analysis+3 |
| 2023-08-07 | Talk | C0c0n |
Homomorphic Encryption - Myth to Reality
| Anish Koshy | encryptionsecurity-architectureprivacy+2 |
| 2023-08-07 | Talk | C0c0n |
Shifting left blockchain development for safer DApps
| Dhanith Krishna | blockchain-securitysmart-contractssecure-development+3 |
| 2023-08-07 | Talk | C0c0n |
ESOC Trinetra Project
| Pankaj Kumar Dalela | security-governancerisk-managementvulnerability-management+1 |
| 2023-08-07 | Talk | C0c0n |
Tackling Advanced Threat Landscape with MDR - Best Practices
| Vijayakumar K M | incident-responsethreat-huntingsecurity-monitoring+1 |
| 2023-08-07 | Talk | C0c0n |
Citizen Mobile Security: Responsibilities, Accountability, and Impacts
| Satyendra Verma | mobile-securitysecurity-awarenessrisk-management+1 |
| 2023-08-07 | Talk | C0c0n |
Generative AI and Cyber Crimes
| Brijesh Singh | malwaresecurity-awarenessrisk-management+2 |
| 2023-08-07 | Talk | C0c0n |
Smart Contract Phishing : Attack & Defense
| Tejaswa Rastogi | smart-contractsblockchain-securityphishing+3 |
| 2023-08-06 | Talk | C0c0n |
Taking a Closer Look at CI/CD Pipeline Logs: Extracting Security-Related Information with Build Inspector
| Anshu Kumar, Pavan Sorab | devsecopsci-cdcicd-pipeline+3 |
| 2023-08-06 | Talk | C0c0n |
Influence of Artificial Intelligence in GRC Space
| Mahesh Kalyanaraman | governancerisk-managementcompliance+3 |
| 2023-08-06 | Talk | C0c0n |
Mitigating SSRF at scale the right way with IMDSv2!
| Ayush Priya | web-securityapi-securityaws+3 |
| 2023-08-06 | Talk | C0c0n |
Surviving In Dependency Hell
| Kumar Ashwin | secure-developmentdevsecopsvulnerability-management+1 |
| 2023-08-06 | Talk | C0c0n |
The new way to be secure
| Sakshi Bhutani | secure-developmentdevsecopssoftware-security+3 |
| 2023-08-06 | Talk | C0c0n |
Digital Innovation and its Impact on CIOs, CISOs and DPOs
| Navaneethan M | compliancegovernancerisk-management+4 |
| 2023-08-06 | Talk | C0c0n |
Subduing Adversaries with Information Superiority
| Antony K M | threat-huntingsecurity-monitoringthreat-detection+2 |
| 2023-08-06 | Talk | C0c0n |
Developments in Deep Fake detection
| Tapas Saini | security-architecturesecurity-awarenessreverse-engineering+1 |
| 2023-08-06 | Talk | C0c0n |
Insider Threats - Best Practices and Common Pitfalls
| Georgie Kurien | insider-threatsrisk-managementsecurity-awareness+1 |
| 2023-05-11 | Tool demo | Blackhat |
CASPR - Code Trust Auditing Framework
| Atharva Chincholkar, Srishti Chaubey | secure-coding |
| 2023-04-26 | Talk | Rsac |
Designing Product Security for a Brighter Smile and a Healthier Tomorrow
| Lokesh Pidawekar | secure-developmentdevsecopssoftware-security+2 |
| 2023-04-26 | Talk | Rsac |
Is Increasing Security Maturity And Decreasing Operational Load Possible?
| Rohit Dhamankar | Automationrisk-managementsecurity-architecture+2 |
| 2023-04-21 | Talk | Hitb Sec Conf |
LOCKNOTE:THE HAND THAT STRIKES, ALSO BLOCKS
| Saumil Shah | security-architecturerisk-managementsecurity-awareness+2 |
| 2022-09-24 | Talk | C0c0n |
Building Smart, Resilient and Sustainable Cyber Eco System
| Navin Kumar Singh | risk-managementcybersecurity-strategiessecurity-architecture+4 |
| 2022-09-24 | Talk | C0c0n |
In production with GRC for cloud
| Mahesh Kalyanaraman | cloud-compliancegovernancerisk-management+2 |
| 2022-09-24 | Talk | C0c0n |
Need for Advanced SOC
| Vijayakumar K M | socsecurity-monitoringsecurity-analytics+3 |
| 2022-09-24 | Talk | C0c0n |
Cyber Defence and Role of private players - public private partnership
| Jasbir Singh Solanki | security-governancerisk-managementcompliance+2 |
| 2022-09-24 | Talk | C0c0n |
Power of Narratives in Cyber Security
| Sunil Varkey | security-awarenesscybersecurity-educationhuman-factor+2 |
| 2022-09-24 | Talk | C0c0n |
Rationalizing Cyber Security Risk in Risk Language
| Anish Koshy | risk-managementgovernancecybersecurity-strategies+4 |
| 2022-09-24 | Talk | C0c0n |
BEC, still the sure shot trap
| Georgie Kurien | social-engineeringpentestingsecurity-awareness+1 |
| 2022-09-24 | Talk | C0c0n |
OSINT Tools and Techniques
| Brijesh Singh | threat-huntingintelligence-sharingsecurity-awareness+1 |
| 2022-09-24 | Talk | C0c0n |
Weaponising Social Media for Psychological Operations
| A a Gafoor | social-engineeringsecurity-awarenessthreat-hunting+1 |
| 2022-09-24 | Talk | C0c0n |
Raining CVEs on Wordpress plugins with Semgrep
| Shreya Pohekar, Syed Sheeraz Ali | web-securitystatic-analysissast+2 |
| 2022-09-23 | Talk | C0c0n |
Bridging the gap between Security and Operations
| Sujay Rajashekar Gundagatti | devsecopssecurity-architecturethreat-detection+3 |
| 2022-09-23 | Talk | C0c0n |
Building a Safer and Innovative Digital Ecosystem
| Vijay Pamarathi | secure-developmentdevsecopssoftware-security+2 |
| 2022-09-23 | Talk | C0c0n |
Hyperledger Fabric & Ethereum Apps: Security Deep Dive
| Alex Devassy, Dhanith Krishna | blockchain-securitysmart-contractssolidity+3 |
| 2022-09-23 | Talk | C0c0n |
Maximizing ROI on cyber security investments: Do you think Adversary Simulation OR Purple teaming holds the key?
| Abhijith B R | risk-managementsecurity-architecturedevsecops |
| 2022-09-23 | Talk | C0c0n |
Securing your APIs for a cloud native future
| Navendu Pottekkat | api-securitysecure-developmentdevsecops |
| 2022-09-23 | Talk | C0c0n |
Collaborative efforts for safe digital banking
| Biju K | secure-developmentrisk-managementsecurity-architecture |
| 2022-09-23 | Talk | C0c0n |
Technological Reliance for Resilience
| Tulika Pandey | risk-managementcyber-resiliencesecurity-architecture+2 |
| 2022-09-23 | Talk | C0c0n |
Hacking SmartContracts
| Anto Joseph | blockchain-securitysmart-contractsvulnerability-management+2 |
| 2022-09-08 | Talk | Nullcon |
Pushing Security Left By Mutating Byte Code
| Gaurav Gogia | secure-coding |
| 2022-08-25 | Talk | Hitb Sec Conf |
Building An Army Of Bots By Hijacking A Unicorn’s Twitter Handle
| Rahul Sasi, Vishal Singh | social-engineeringpentestingmalware+2 |
| 2022-08-12 | Talk | Defcon |
Stop worrying about Nation-States and Zero-Days; let’s fix things that have been known for years
| Vivek Ponnada | secure-codingvulnerability-managementdevsecops+1 |
| 2022-08-11 | Talk | The Diana Initiative |
Connecting Dots Between Security Teams & Customer Expectations
| Shruthi Kamath | security-governancerisk-managementsecurity-architecture+2 |
| 2022-08-11 | Talk | The Diana Initiative |
The Real Cost of Free: What you need to know before downloading a free app
| Ruchira Pokhriyal | mobile-securityapp-securityprivacy+3 |
| 2022-08-10 | Tool demo | Blackhat |
CASPR - Code Trust Audit Framework
| Ajit Hatti | secure-coding |
| 2022-07-23 | Talk | May Contain Hackers |
How would a real life social media be like?
| Aditi Bhatnagar | privacydata-protectionsecurity-awareness+4 |
| 2021-11-13 | Talk | C0c0n |
Connecting the dots between customers and security teams
| Shruthi Kamath | incident-responsesecurity-awarenessdevsecops+1 |
| 2021-11-13 | Talk | C0c0n |
Cybersecurity in the era of Resilience - A walk through people, process and technology
| Babitha B P | risk-managementcyber-resiliencesecurity-architecture+3 |
| 2021-11-13 | Talk | C0c0n |
New way of looking at the hidden mysteries in the code
| Vandana Verma Sehgal | code-reviewstatic-analysisreverse-engineering+2 |
| 2021-11-13 | Talk | C0c0n |
Changing Cyber Security Paradigm & Cyber Tsunami
| Sunil Varkey | cybersecurity-strategiesthreat-landscaperisk-management+4 |
| 2021-11-13 | Talk | C0c0n |
Crisis Capitalization in a Pandemic
| Greeshma M R | risk-managementincident-responsesecurity-awareness+3 |
| 2021-11-13 | Talk | C0c0n |
Need for Zero Trust in Banking
| Biju K | zero-trustrisk-managementsecurity-architecture+1 |
| 2021-11-13 | Talk | C0c0n |
Post pandemic Transformation - A CISO’s perspective
| Sridhar Govardhan | risk-managementsecurity-governancecompliance+4 |
| 2021-11-13 | Talk | C0c0n |
Introducing Free & Open Elastic Limitless XDR
| Ravindra Ramnani | threat-detectionsecurity-monitoringvulnerability-management+1 |
| 2021-11-13 | Talk | C0c0n |
Machine learning to detect Chia mining
| Varun Kohli | threat-detectionthreat-huntingmalware-detection+2 |
| 2021-11-13 | Talk | C0c0n |
Mature Your Threat Hunting Program
| Neha Dhyani | threat-huntingthreat-detectionthreat_modeling+2 |
| 2021-11-13 | Talk | C0c0n |
Server-side javascript Injection
| Kavisha Sheth | web-securitysecure-codingweb-pentesting |
| 2021-11-12 | Talk | C0c0n |
Enterprise Governance and Risk Management
| Arathy Nair, Muskan Mangla | compliancegovernancerisk-management+2 |
| 2021-11-12 | Talk | C0c0n |
Executive Presence….a cardinal of the cyber rostrum
| Bishakha Jain | security-awarenesssecurity-architecturesecurity-governance |
| 2021-11-12 | Talk | C0c0n |
Post Covid CISOs - Disappearing trusted boundaries and Innovative CyberSecurity Approaches
| Illyas Kooliyankal | risk-managementsecurity-architecturesecurity-governance+1 |
| 2021-11-12 | Talk | C0c0n |
Regulating Social Media Platforms : Should it be done in Democratic Societies ?
| J Sam Daniel Stalin, Apar Gupta, Dinesh O Bareja, Prashant Mali, Jiten Jain | compliancegovernancerisk-management+4 |
| 2021-11-12 | Talk | C0c0n |
“Let’s Go Phishing”: Discerning the insidious nature of Social Engineering
| Ruchira Pokhriyal, Shashi Karhail | social-engineeringpentestingsecurity-awareness |
| 2021-11-12 | Talk | C0c0n |
The evolving nature of cyber community
| Aastha Sahni | security-awarenessrisk-managementcybersecurity-education |
| 2021-11-12 | Talk | C0c0n |
Understanding the Psychology Behind Threats - adding Twists to your Turns
| Saman Fatima | threat_modelingsecurity-awarenesshuman-factor+1 |
| 2021-11-04 | Talk | Ekoparty |
DIAL: Did I just alert Lambda? A centralized security misconfiguration detection system
| Saransh Rana, Divyanshu Mehta, Harsh Varagiya | awssecurity-monitoringiam+2 |
| 2021-10-15 | Talk | Rootcon |
The Curious case of knowing the unknown
| Vandana Verma Sehgal | vulnerability-managementsecure-codingdevsecops+1 |
| 2021-08-08 | Talk | Defcon |
AppSec 101: A Journey from Engineer to Hacker
| Arjun Gopalakrishna | secure-codingpentestingethical-hacking+2 |
| 2021-08-08 | Talk | Defcon |
Top 20 Secure PLC Coding Practices
| Vivek Ponnada | industrial-control-systems-securitysecure-codingvulnerability-management+3 |
| 2021-08-06 | Talk | Defcon |
Adversary village Kick-off
| Abhijith B R | red-teamingethical-hackingvulnerability-assessment+2 |
| 2021-08-05 | Talk | Defcon |
The Bug Hunter’s Recon Methodology
| Tushar Verma | pentestingvulnerability-assessmentapplication-pentesting+1 |
| 2021-05-06 | Tool demo | Blackhat |
Demystifying the State of Kubernetes Cluster Security - The Cloud Native Way
| Vasant Kumar, Rupali Dash | kubernetescloudaudit+4 |
| 2021-05-06 | Tool demo | Blackhat |
FalconEye: Windows Process Injection Techniques - Catch Them All
| Rajiv Kulkarni, Sushant Paithane | windowsprocess-injectionblueteam+2 |
| 2020-12-09 | Tool demo | Blackhat |
ArcherySec 2.0 - Open Source Vulnerability Assessment and Management
| Anand Tiwari | opensourceblueteampentest+3 |
| 2020-11-21 | Talk | App Sec Indonesia |
The caveats of the unseen: Crouching exposure, Hidden Misconfiguration
| Ashwin Vamshi | vulnerability-managementsecurity-architecturedevsecops+2 |
| 2020-10-01 | Tool demo | Blackhat |
OWASP Python Honeypot
| Sri Harsha Gajavalli | web-securityowasppentesting+1 |
| 2020-09-19 | Talk | C0c0n |
Automate your Recon with ReconNote
| Prasoon Gupta | pentestingvulnerability-assessmentAutomation+1 |
| 2020-09-18 | Talk | C0c0n |
Demystifying Zero Trust - A Real world
| Sandeep Variyam | zero-trustsecurity-architecturesecurity-governance+1 |
| 2020-09-18 | Talk | C0c0n |
Coping with Digital Transformation - A CISO perspective
| Maya R Nair | risk-managementsecurity-governancesecurity-architecture+3 |
| 2020-09-18 | Talk | C0c0n |
Herd Immunity, in the Cyber World
| Sunil Varkey | security-awarenessrisk-managementvulnerability-management+1 |
| 2020-09-18 | Talk | C0c0n |
Cyber Security Shifts During COVID-19
| Sunil Kanchi | risk-managementsecurity-awarenesscompliance-governance+1 |
| 2020-09-18 | Talk | C0c0n |
Web Application hacking with WebZGround
| Parveen Yadav, Narendra Kumar | web-securityweb-pentestingpentesting+3 |
| 2020-08-21 | Talk | The Diana Initiative |
Trust, No Trust or Zero Trust - Myth Demystifying
| Vandana Verma Sehgal | zero-trustsecurity-architecturecompliance+2 |
| 2020-08-09 | Talk | Defcon |
Running an appsec program with open source projects
| Vandana Verma Sehgal | owaspsecure-developmentdevsecops+3 |
| 2020-03-06 | Tool demo | Nullcon |
Talisman
| Suhas Vishwanath | opensourcesecure-developmentdevelopment+5 |
| 2020-03-06 | Tool demo | Nullcon |
VyAPI
| Riddhi Shree | secure-codingawsamazon-cognito+5 |
| 2020-03-06 | Tool demo | Nullcon |
Wolverine
| Furqan Khan, Siddharth Anbalahan | linuxsecure-codingweb-application-security+3 |
| 2019-12-04 | Tool demo | Blackhat |
AutoMacTC: Finding Worms in Apple Orchards - Using AutoMacTC for macOS Incident Response
| Kshitij Kumar, Jai Musunuri | macossecure-codingforensic+2 |
| 2019-11-10 | Talk | Toor Con |
Hot Tub Island
| Jatin Kataria | ethical-hackingsecurity-awareness |
| 2019-09-27 | Talk | C0c0n |
autoSource an automated framework for Source Code Review
| Malkit Singh | code-reviewsecure-codingstatic-analysis+3 |
| 2019-09-27 | Talk | C0c0n |
Security @scale for startups
| Shivanath Somanathan | devsecopssecure-developmentsoftware-security+2 |
| 2019-09-27 | Talk | C0c0n |
Stepping into Password Less Economy
| Ajit Hatti | authenticationidentity-managementsecure-development+1 |
| 2019-09-27 | Talk | C0c0n |
Practical Approach to Cyber Security for financial institutions
| Georgie Kurien | financial-institutionssecure-developmentrisk-management+2 |
| 2019-09-27 | Talk | C0c0n |
CISO Mind Set
| Lopa Mudraa Basuu | risk-managementsecurity-governancecompliance+2 |
| 2019-09-27 | Talk | C0c0n |
A Day in the Life of a CISO
| Sridhar Govardhan | compliancegovernancerisk-management+3 |
| 2019-09-27 | Talk | C0c0n |
Golang for Pentesters / RedTeamers
| Anant Shrivastava | pentestredteamsecure-coding |
| 2019-09-27 | Talk | C0c0n |
Serverless SOAR
| Sabyasachi Dhal, Suresh Sharma | secure-codingpentest |
| 2019-09-27 | Talk | C0c0n |
VyAPI - The Vulnerable Hybrid Android App
| Riddhi Shree | secure-codingawsamazon-cognito+5 |
| 2019-09-13 | Talk | 44 Con |
One Person Army – Playbook on how to be the first Security Engineer at a company
| Kashish Mittal | infrastructuredevsecopsAutomation |
| 2019-09-13 | Talk | Global App Sec |
Real Time Vulnerability Alerting by Using Principles from the United States Tsunami Warning Center
| Amol Sarwate | vulnerability-managementawssecurity-information-event-management+1 |
| 2019-08-30 | Talk | Hitb Sec Conf |
COMMSEC: PErfidious: Make PE Backdooring Great Again!
| Shreyans Doshi | secure-codingredteamblueteam+1 |
| 2019-08-11 | Talk | Defcon |
Shifting the DevSecOps Culture, Taking away the sugar piece and giving the pile to ants
| Vandana Verma Sehgal | devsecopssecure-developmentAutomation+4 |
| 2019-08-11 | Talk | Defcon |
Exploiting and Securing iOS Apps using OWASP iGoat
| Swaroop Yermalkar | mobile-securityios-securityapplication-pentesting+4 |
| 2019-08-08 | Talk | Blackhat |
DevSecOps : What, Why and How
| Anant Shrivastava | devsecopsdevelopmentdevops |
| 2019-08-08 | Talk | Blackhat |
Preventing Authentication Bypass: A Tale of Two Researchers
| Ravi Jaiswal | security-development-lifecycleapplied-security |
| 2019-08-08 | Talk | Defcon |
Phishing in the cloud era
| Ashwin Vamshi, Abhinav Singh | phishingapi-securityweb-security+2 |
| 2019-03-28 | Talk | Blackhat |
DevSecOps : What, Why and How
| Anant Shrivastava | devsecopssecure-coding |
| 2019-03-28 | Tool demo | Blackhat |
Archery - Open Source Vulnerability Assessment and Management- 2.0
| Anand Tiwari | pentestinfrastructureblueteam+3 |
| 2019-03-28 | Tool demo | Blackhat |
Kurukshetra: Playground for Interactive Security Learning
| Anirudh Anand, Mohan Kallepalli, Ankur Bhargava | secure-codingwebblueteam |
| 2019-03-28 | Tool demo | Blackhat |
pytm: A Pythonic Framework for Threat Modeling
| Rohit Shambhuni | secure-codingthreat_modelingredteam |
| 2019-02-28 | Talk | Nullcon |
Building Hardened IoT Implementations with LangSec
| Prashant Anantharaman | iotblueteamsecure-development |
| 2019-02-28 | Talk | Nullcon |
Andromeda - GUI based Dynamic Instrumentation Toolkit powered by Frida
| Shivang Desai | secure-codingpentest |
| 2018-12-06 | Tool demo | Blackhat |
Astra: Automated Security Testing For REST APIs
| Sagar Popat, Harsh Grover | apipentestrest-api+1 |
| 2018-12-05 | Tool demo | Blackhat |
Kurukshetra: Playground for Interactive Security Learning
| Anirudh Anand, Mohan Kallepalli | secure-codingwebblueteam |
| 2018-10-19 | Talk | App Sec Day Australia |
Threat Modeling-as-Code & Automation for DevSecOps wins
| Abhay Bhargav | threat_modelingdevsecops |
| 2018-10-05 | Talk | C0c0n |
Adaptive GRC
| Mahesh Kalyanaraman | compliancegovernancerisk-management+1 |
| 2018-10-05 | Talk | C0c0n |
Blockchains as techno-power structures: towards emergence of P2P Politics
| Sunil Aggarwal | blockchain-securitydecentralized-systemsdecentralised-security+2 |
| 2018-10-05 | Talk | C0c0n |
Future of Mobility & Cyber Security
| Suja Chandy | automotive-cybersecurityindustrial-control-systems-securitysecurity-architecture+2 |
| 2018-10-05 | Talk | C0c0n |
Taking cyber security to the board room
| Amit Pradhan | risk-managementcompliancegovernance+3 |
| 2018-10-05 | Talk | C0c0n |
Resiliency Focus alongside Digital Disruption
| Lince Lawrence | security-architecturerisk-managementsecurity-awareness+2 |
| 2018-09-27 | Talk | Rootcon |
Defending cloud Infrastructures with Cloud Security Suite
| Shivankar Madaan | cloudawsinfrastructure+5 |
| 2018-08-11 | Tool demo | Defcon |
Archery—Open Source Vulnerability Assessment and Management
| Anand Tiwari | pentestinfrastructureblueteam+3 |
| 2018-08-11 | Tool demo | Defcon |
Halcyon IDE
| Sanoop Thomas | reconnaissanceredteamnmap+1 |
| 2018-08-11 | Tool demo | Defcon |
Sh00t—An open platform for manual security testers & bug hunters
| Pavan Mohan | pentestbug-huntingopensource+3 |
| 2018-08-10 | Talk | Defcon |
Building visualisation platforms for OSINT data using open source solutions
| Bharath Kumar, Madhu Akula | security-analyticsthreat-hunting |
| 2018-08-08 | Tool demo | Blackhat |
AutoMacTC: Finding Worms in Apple Orchards - Using AutoMacTC for macOS Incident Response
| Kshitij Kumar, Jai Musunuri | macossecure-codingforensic+2 |
| 2018-08-08 | Tool demo | Blackhat |
Archerysec Tool Demo
| Anand Tiwari | pentestinfrastructureblueteam+3 |
| 2018-08-08 | Tool demo | Blackhat |
Halcyon IDE: For Nmap Script Developers
| Sanoop Thomas | reconnaissanceredteamnmap+1 |
| 2018-08-08 | Tool demo | Blackhat |
SCoDA: Smart COntract Defender and Analyzer
| Ajit Hatti | blueteamanalysissecure-coding |
| 2018-06-27 | Talk | First |
Securing your in-ear fitness coach: Challenges in hardening next generation wearables
| Sumanth Naropanth, Sunil Kumar | mobile-securitysecure-developmentvulnerability-management+2 |
| 2018-03-13 | Talk | Troopers |
Securing your in-ear fitness coach: Challenges in hardening next generation wearables
| Sumanth Naropanth, Kavya Racharla | mobile-securitysecure-developmentvulnerability-management+2 |
| 2018-01-31 | Talk | Owasp App Sec California |
Hunter – Optimize your Pentesters time
| Kiran Shirali | application-pentestingpentestingvulnerability-management+2 |
| 2017-10-05 | Talk | Brucon |
Races, Reaches and Rescues!!! (Race condition vulnerabilities revisited)
| Rushikesh D Nandedkar, Sampada Nandedkar | vulnerability-assessmentpentestingsecure-coding+2 |
| 2017-09-21 | Talk | App Sec Usa |
Androsia: A tool for securing in memory sensitive data
| Samit Anwer | android-securitymobile-securitystatic-analysis+1 |
| 2017-08-19 | Talk | C0c0n |
Building Trust for Digital Transactions in India’s COD Culture
| Parry Aftab | secure-developmentrisk-managementsecurity-architecture |
| 2017-08-19 | Talk | C0c0n |
The Public Private Partnership - Navigating the Govt
| Saikat Datta | compliancegovernancerisk-management+3 |
| 2017-08-19 | Talk | C0c0n |
Trust, the foundation of Digital Mastery
| Sunil Varkey | identity-managementauthenticationrisk-management+2 |
| 2017-08-18 | Talk | C0c0n |
Challenges in Digital Banking
| Biju K | security-awarenesssecurity-governancerisk-management |
| 2017-08-18 | Talk | C0c0n |
Moving from Cybersecurity Awareness to Cybersecurity Competence
| Anup Narayanan | cybersecurity-educationcybersecurity-trainingsecurity-awareness+3 |
| 2017-08-18 | Talk | C0c0n |
Call Centre Frauds
| Parry Aftab | social-engineeringsecurity-awarenessrisk-management+1 |
| 2017-08-18 | Talk | C0c0n |
Cyber bullying-Screen the Mean
| Nitin Awade, Surjata Awade | security-awarenessincident-responsedigital-forensics |
| 2017-08-18 | Talk | C0c0n |
Do Students really require Smartphones
| Pranav a Menon | security-awarenesscybersecurity-educationhuman-factor |
| 2017-08-18 | Talk | C0c0n |
Internet Addiction and Children
| Teena Jose | security-awarenesscybersecurity-educationhuman-factor |
| 2017-08-18 | Talk | C0c0n |
Sleep, Screen and Teenagers
| Natishia Rebecca Chandy, Pulkit Deepak Khatri | security-awarenesshuman-factorbehavioral-change+1 |
| 2017-08-18 | Talk | C0c0n |
Social Media and You
| Parry Aftab | security-awarenesssocial-engineeringhuman-factor+1 |
| 2017-08-18 | Talk | C0c0n |
Threats with online gaming and issues with games like Pokemon
| Riyaz Walikar, Akash Mahajan | security-awarenessmobile-securityvulnerability-management+1 |
| 2017-08-18 | Talk | C0c0n |
Androsia: A tool for securing in memory sensitive data
| Samit Anwer | secure-codingandroidmobile+1 |
| 2017-08-18 | Talk | C0c0n |
Cloud_Security Suite - One stop tool for auditing cloud infrastructure
| Shivankar Madaan, Jayesh Chauhan | cloudawsinfrastructure+5 |
| 2017-08-18 | Talk | C0c0n |
iGoat – A Self Learning Tool for iOS App Pentesting and Security
| Swaroop Yermalkar | iosmobilepentest+3 |
| 2017-07-30 | Tool demo | Blackhat |
Yasuo
| Saurabh Harit | secure-codingredteamblueteam+4 |
| 2017-07-27 | Tool demo | Blackhat |
Fuzzapi - Fuzzing Your RESTAPIs Since Yesterday
| Lalith Rallabhandi, Abhijeth Dugginapeddi, Srinivas Rao | fuzzingapirest-api+3 |
| 2017-07-27 | Tool demo | Blackhat |
Gibber Sense
| Ajit Hatti | secure-codingreconnaissancecryptography+3 |
| 2017-07-26 | Tool demo | Blackhat |
Devknox - Autocorrect Security Issues from Android Studio
| Subho Halder | androidmobilecode-analysis+1 |
| 2017-06-23 | Talk | Hackinparis |
Injecting Security into Web apps with Runtime Patching and Context Learning
| Ajin Abraham | webblueteamsecure-development+6 |
| 2017-05-23 | Talk | Phdays |
Injecting security into web apps in the runtime
| Ajin Abraham | webblueteamsecure-development+6 |
| 2017-03-30 | Tool demo | Blackhat |
Devknox - Autocorrect Security Issues from Android Studio
| Subho Halder | androidmobilecode-analysis+1 |
| 2017-03-03 | Talk | Nullcon |
DevOpSec: Rapid Security in the Cloud with AWS and CIS
| Mikhail Advani, Rajesh Tamhane | devsecopscloudaws+2 |
| 2017-03-03 | Talk | Nullcon |
Injecting Security into Web apps with Runtime Patching and Context Learning
| Ajin Abraham | webblueteamsecure-development+6 |
| 2017-03-03 | Talk | Nullcon |
Securing Critical National Infrastructure
| Shailendra Fuloria, R Sarangapani, Rahul Tongia | critical-infrastructureindustrial-control-systems-securityics-security+4 |
| 2017-01-25 | Talk | Owasp App Sec California |
DASTProxy: Don’t let your automated security testing program stall on crawlInstead focus on business context
| Kiran Shirali | dynamic-analysisdastdevsecops+3 |
| 2017-01-25 | Talk | Owasp App Sec California |
OCSP Stapling in the Wild
| Devdatta Akhawe | web-securityvulnerability-managementsecurity-architecture+1 |
| 2016-11-04 | Tool demo | Blackhat |
Yasuo
| Saurabh Harit | secure-codingredteamblueteam+4 |
| 2016-10-13 | Talk | App Sec Usa |
When encryption is not enough: Attacking Wearable - Mobile Application communication over BLE
| Sumanth Naropanth, Kavya Racharla | mobile-securityvulnerability-managementreverse-engineering+1 |
| 2016-09-23 | Talk | Rootcon |
Halcyon – A Faster Way to Build Custom Scripts for Nmap Scans
| Sanoop Thomas | secure-codingreconnaissanceredteam+1 |
| 2016-08-19 | Talk | C0c0n |
Kill the password - A new era of authentication
| Tamaghna Basu | authenticationiamsecurity-architecture+1 |
| 2016-08-04 | Tool demo | Blackhat |
Droid-FF: Android Fuzzing Framework
| Anto Joseph | androidfuzzingsecure-coding+2 |
| 2016-08-04 | Tool demo | Blackhat |
Maltese (Malware Traffic Emulating Software)
| Sasi Siddharth | dnswebsecure-coding |
| 2016-05-26 | Talk | Hitb Sec Conf |
HITB Lab: Mobile Application Security for iOS and Android
| Tushar Dalvi | mobileandroidios+3 |
| 2016-03-15 | Talk | Groundzerosummit |
Web App Security
| Harpreet Singh, Himanshu Sharma, Nipun Jaswal | web-securityapi-securitysecure-coding+3 |
| 2016-03-11 | Talk | Nullcon |
Real-time Ingestion of security telemetry data into Hadoop distributed system to respond to 0-day
| Pallav Jakhotiya, Vipul Sawant | hadoopsecure-developmentblueteam |
| 2015-09-24 | Talk | App Sec Usa |
Continuous Cloud Security Automation
| Rohit Pitke | awsdevsecopsAutomation+2 |
| 2015-09-24 | Talk | App Sec Usa |
Encouraging Diversity and Advancing Cybersecurity Education
| Shruthi Kamath | cybersecurity-educationsecurity-awarenessrisk-management+1 |
| 2015-08-05 | Tool demo | Blackhat |
PixelCaptcha: A unicode based captcha scheme
| Gursev Singh Kalra | captchasecure-codingdevelopment |
| 2015-08-01 | Talk | C0c0n |
S3curi7y at 36K feet
| Rugved Mehta, Gaurav Trivedi | awsazuregcp+3 |
| 2015-08-01 | Talk | C0c0n |
NoPo - The NoSQL HoneyPot Framework
| Francis Alexander | nosqlsecure-coding |
| 2015-02-06 | Talk | Nullcon |
Building security and compliance into the software delivery process
| Anubhav Bathla, Dinesh Pillai, S Chandrasekhar | secure-developmentdevsecopscompliance+3 |
| 2015-01-27 | Talk | Owasp App Sec California |
The Emperor’s New Password Manager: Security Analysis of Web-based Password Managers
| Devdatta Akhawe | web-securityxsscsrf+3 |
| 2014-11-13 | Talk | Ground Zero Summit |
9 Cell Cyber Diplomacy
| Alok Vijayant | security-architecturerisk-managementsecurity-governance |
| 2014-11-13 | Talk | Ground Zero Summit |
Financial Integrity and Cyber Security
| Karnal Singh | risk-managementcompliancesecurity-governance |
| 2014-11-13 | Talk | Ground Zero Summit |
Internet Governance
| Anjana Kovacs | governancecompliancerisk-management+2 |
| 2014-11-13 | Talk | Ground Zero Summit |
Cyber ‘BrahMos’ - Static analysis driven secure coding
| Joy Sen | secure-coding |
| 2014-08-22 | Talk | C0c0n |
Still Single with a bleeding heart (Tool Release)
| Tamaghna Basu | secure-developmentvulnerability-management |
| 2014-08-21 | Talk | Usenix |
The Emperor’s New Password Manager: Security Analysis of Web-based Password Managers
| Devdatta Akhawe | web-securityxsscsrf+3 |
| 2014-06-23 | Talk | Hackinparis |
Pentesting NoSQL DB’s with NoSQL Exploitation Framework
| Francis Alexander | nosqlsecure-codingpentest |
| 2014-02-14 | Talk | Nullcon |
Attack of the setuid bit - pt_chown and pwning root terminals
| Siddhesh Poyarekar | glibcredteamblueteam+2 |
| 2013-11-21 | Talk | Appsec Usa |
Wassup MOM? Owning the Message Oriented Middleware
| Gursev Singh Kalra | api-securityvulnerability-managementsecure-coding+1 |
| 2013-11-20 | Talk | App Sec Usa |
Project Talk: OWASP OpenSAMM Project
| Pravir Chandra | software-securitysecure-developmentdevsecops+4 |
| 2013-09-27 | Talk | C0c0n |
From Bedroom to Boardroom - Taking your Weekend Infosec Project Global
| Vivek Ramachandran | devsecopssecure-developmentpentesting+2 |
| 2013-09-27 | Talk | C0c0n |
Hello CISO! How to make end-users LIKE and FOLLOW “Brand Infosec”?
| Anup Narayanan | security-awarenesscybersecurity-educationsecurity-governance+3 |
| 2013-09-27 | Talk | C0c0n |
Infiltrating the Intranet with Skanda
| Jayesh Chauhan | redteamsecure-coding |
| 2013-09-27 | Talk | C0c0n |
Snake Bites
| Anant Shrivastava | secure-codingwebpentest+1 |
| 2013-09-27 | Talk | C0c0n |
Static analysis of malware with PyTriage
| Yashin Mehaboobe | secure-coding |
| 2013-08-15 | Talk | Usenix |
An Empirical Study of Vulnerability Rewards Programs
| Devdatta Akhawe | vulnerability-managementbug-bountysoftware-security+3 |
| 2013-08-15 | Talk | Usenix |
Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness
| Devdatta Akhawe | web-securitysecurity-awarenesssecurity-architecture+3 |
| 2013-08-01 | Tool demo | Blackhat |
Sparty
| Aditya K Sood | secure-codingwebaudit+2 |
| 2013-08-01 | Tool demo | Blackhat |
XENOTIX xBOT
| Ajin Abraham | botnetlinuxwindows+3 |
| 2013-03-01 | Talk | Nullcon |
Mobile Code mining for discovery and exploits
| Hemil Shah | mobilecode-analysissecure-development+5 |
| 2012-12-06 | Talk | Blackhat |
The art of exploiting logical flaws in web apps
| Sumit Siddharth | webredteamsecure-coding |
| 2012-12-01 | Talk | Clubhack |
The difference between the “Reality” and “Feeling” of Security: Information Security and the Human Being
| Thomas Kurian Ambattu | security-awarenesshuman-factorrisk-management+2 |
| 2012-10-26 | Talk | App Sec Usa |
The 7 Qualities of Highly Secure Software
| Mano Paul | secure-developmentsoftware-securitysecure-coding+3 |
| 2012-09-28 | Talk | Nullcon |
Alert(/xss/) - How to catch an XSS before someone exploits / reports it?
| Ahamed Nafeez | web-securityxsssecure-coding+2 |
| 2012-08-04 | Talk | C0c0n |
Impact of cyber laws on various stakeholders
| Sagar Rahurkar | compliancegovernanceregulatory-compliance+2 |
| 2012-08-03 | Talk | C0c0n |
A model to reduce information security risks due to human error
| Anup Narayanan | security-awarenessbehavior-changerisk-management |
| 2012-08-03 | Talk | C0c0n |
Layer 8 Exploitation: A threat to National Security
| Aakash Goel | social-engineeringpentestingsecurity-awareness+1 |
| 2012-08-03 | Talk | C0c0n |
The Weakest Link - Reinforcing the Human Element
| Sandeep Godbole | security-awarenesshuman-factorcybersecurity-education+4 |
| 2012-03-15 | Talk | C0c0n |
Integrated Dial 100 System for Law Enforcement
| Nandkumar Saravade | security-governancecompliance-governancesecurity-operations |
| 2012-03-15 | Talk | Nullcon |
An App(le) a day keeps the wallet away
| Antriksh Shah | pentestingweb-securityapi-security+1 |
| 2012-02-15 | Talk | Nullcon |
Best practices to improve the security grading of your project
| Hemant Khandelwal | blueteamthreat_modelingsecure-development |
| 2011-11-17 | Talk | Deepsec |
Behavioral Security: 10 steps forward 5 steps backward
| Sourabh Satish | security-awarenessbehavioral-changerisk-management+2 |
| 2011-09-19 | Talk | Brucon |
Step-by-Step for Software Security (that anyone can follow)
| Pravir Chandra | software-securitysecure-developmentdevsecops+4 |
| 2011-09-07 | Talk | Securitybyte |
Social Web & Privacy – An evolving world
| Bala Sathiamurthy, Aridaman Tripathi | privacydata-protectionapi-security+3 |
| 2011-09-06 | Talk | Securitybyte |
Application Security Strategies
| K K Mookhey | secure-codingsecure-developmentweb-security+3 |
| 2011-09-06 | Talk | Securitybyte |
Security Threats on Social Networks
| Nithya Raman | social-engineeringweb-securitysecurity-awareness+2 |
| 2011-09-06 | Talk | Securitybyte |
Enabling Un-trusted Mashups
| Bishan Singh | web-securityxsscsrf+4 |
| 2011-03-15 | Talk | Nullcon |
Information Warfare Ñ The Indian Perspective
| Alok Vijayant | cybersecurity-strategyrisk-managementsecurity-awareness+1 |
| 2011-02-25 | Talk | Nullcon |
(secure) SiteHoster – Disable XSS & SQL Injection
| Abhishek Kumar | xsssqliblueteam+2 |
| 2010-11-25 | Talk | Deepsec |
Developers are from Mars, Compliance Auditors are from Venus
| Neelay S Shah | compliancegovernancerisk-management+4 |
| 2010-08-01 | Talk | C0c0n |
Hackers’ EcoSystem in India
| Rohit Srivastwa | pentestingsecurity-awarenessrisk-management+1 |
| 2010-04-14 | Talk | Blackhat |
Attacking JAVA Serialized Communication
| Manish Saindane | secure-codingredteamnetwork+1 |
| 2009-12-05 | Talk | Clubhack |
Revealing the Secrets: Source Code Disclosure, Techniques and Impacts
| Anant Kochhar | secure-developmentsecure-coding |
| 2009-11-19 | Talk | Deepsec |
Top 10 Security Issues Developers Don’t Know About
| Neelay S Shah | secure-codingdevsecopsvulnerability-management+3 |
| 2009-11-17 | Talk | Securitybyte |
Applications - The new cyber security frontier
| Mano Paul | secure-developmentdevsecopssoftware-security+2 |
| 2009-11-17 | Talk | Securitybyte |
Usability and Privacy in Security
| Ponnurangam Kumaraguru | privacydata-protectionsecurity-architecture+3 |
| 2009-11-17 | Talk | Securitybyte |
Business Case-Risk Management/Compliance at AMITY
| Js Sodhi | compliancegovernancerisk-management+3 |
| 2009-11-17 | Talk | Securitybyte |
Business Continuity Case Study
| Venkataram Arabolu | business-continuityrisk-managementbusiness-resilience+3 |
| 2009-08-06 | Talk | C0c0n |
Cyber Victimisation
| K Jaishankar | cybersecurity-educationsecurity-awarenessrisk-management+2 |
| 2009-08-06 | Talk | C0c0n |
Information Warfare
| A a Gafoor, Vinayak Mishra | threat-huntingthreat_modelingsecurity-awareness+2 |
| 2009-05-19 | Talk | Syscan |
Securing Applications at Gateway with Web Application Firewalls
| Shreeraj Shah | blueteamwebfootprinting+3 |
| 2009-05-19 | Talk | Syscan |
Securing Enterprise Applications
| Shreeraj Shah | blueteamwebweb-application-security+13 |
| 2009-04-22 | Talk | Hitb Sec Conf |
Application Defense Tactics & Strategies - WAF at the Gateway
| Shreeraj Shah | blueteamwebfootprinting+3 |
| 2008-12-06 | Talk | Clubhack |
Insecure Implementation of Security Best Practices: of hashing, CAPTCHA’s and Caching
| Karmendra Kohli | secure-developmentsecure-codingblueteam+2 |
| 2008-12-06 | Talk | Clubhack |
Reverse Engineering v/s Secure Coding
| Atul Alex | secure-codingreverse-engineeringredteam+2 |
| 2008-10-29 | Talk | Hitb Sec Conf |
Top 10 Web 2.0 Attacks
| Shreeraj Shah | blueteamweb-application-securityajax+8 |
| 2008-04-16 | Talk | Hitb Sec Conf |
Securing Next Generation Applications – Scan, Detect and Mitigate
| Shreeraj Shah | blueteamweb-application-securityajax+8 |
| 2008-03-27 | Talk | Blackhat |
Iron Chef Black Hat: John Henry Challenge
| Pravir Chandra | ethical-hackingsecure-developmentdevsecops |
| 2007-08-02 | Talk | Blackhat |
The Evolution Of Phishing To Organized Crime
| Rohyt Belani | social-engineeringphishingthreat_modeling+2 |
| 2007-08-02 | Talk | Blackhat |
Breaking C++ Applications
| Neel Mehta | redteamsecure-codingapi |
| 2006-09-21 | Talk | Hitb Sec Conf |
Finding Secrets in ISAPI
| Nish Bhalla | secure-codingreverse-engineering |
| 2006-08-02 | Talk | Blackhat |
SQL Injections by Truncation
| Bala Neerumalla | web-securitysql-injectionsecure-coding+1 |
| 2006-01-26 | Talk | Blackhat |
Analysis of Adversarial Code: Problem, Challenges, Results
| Arun Lakhotia | analysissecure-codingblueteam |
| 2005-09-29 | Talk | Hitb Sec Conf |
Analyzing Code for Security Defects
| Nish Bhalla | code-analysisblueteamsecure-coding |
| 2003-12-12 | Talk | Hitb Sec Conf |
Defending Web Applications: Strategies, methods and practices
| Shreeraj Shah | webblueteamsecure-coding+2 |
| 1998-07-29 | Talk | Blackhat |
Security as an enabler for new business opportunities - The Business Value of Security
| Karan Khanna | risk-managementbusiness-continuitycyber-resilience+4 |