| 2025-12-11 | Tool demo | Blackhat |
ThreatShield – The Intelligent Way of Threat Modelling
| Satyam Nagpal, Sayooj B Kumar, Ashwin Shenoi | #threat-modeling#security-strategy#architecture+1 |
| 2025-10-10 | Talk | C0c0n |
Ghosts in Your GitHub Actions and AI’s Hunt for Hidden Exploits
| Suchith Narayan | #supply-chain#supply-chain-attack#devsecops+1 |
| 2025-08-07 | Tool demo | Blackhat |
Frogy 2.0 - Automated external attack surface analysis toolkit
| Chintan Gurjar | #attack-surface#vulnerability-assessment#asset-management+2 |
| 2025-08-07 | Tool demo | Blackhat |
Cloud Offensive Breach and Risk Assessment (COBRA)
| Harsha Koushik, Anand Tiwari | #cloud-pentesting#risk-management#edr |
| 2025-08-06 | Tool demo | Blackhat |
ThreatShield - The Intelligent way of Threat Modelling
| Ashwin Shenoi, Satyam Nagpal, Sayooj B Kumar | #threat-modeling#architecture#devsecops+1 |
| 2025-08-06 | Panel | Blackhat |
Hacking the Status Quo: Tales From Leading Women in Cybersecurity
| Vandana Verma Sehgal, Chi en Shen, Natalie Silvanovich, Maddie Stone | #security-training#cybersecurity-education#security-strategy |
| 2025-08-06 | Talk | Blackhat |
When ‘Changed Files’ Changed Everything: Uncovering and Responding to the tj-actions Supply Chain Breach
| Varun Sharma, Ashish Kurmi | #ci-cd#incident-management#devsecops+2 |
| 2025-04-30 | Talk | Rsac |
Got Supply Pain? A Real-World Approach to Supply Chain SDL
| Mohit Arora, Richard Tonry | #secure-development#devsecops#risk-management+4 |
| 2025-04-29 | Talk | Rsac |
It’s Always Risky in IT: Frontline Stories and Strategic Insights
| Gourav Nagar, Rohit Bansal | #risk-management#security-compliance#cyber-resilience+4 |
| 2025-04-04 | Panel | Blackhat |
Locknote: Highlights & Key Takeaways from Black Hat Asia 2025
| Vandana Verma Sehgal, Daniel Cuthbert, Ryan Flores, Vitaly Kamluk, Jeff Moss, Asuka Nakajima | #security-strategy#cybersecurity-framework#digital-learning+1 |
| 2025-04-03 | Tool demo | Blackhat |
Mantis - Asset Discovery at Scale
| Hitesh Thakur, Praveen Kanniah, Prateek Thakare | #asset-inventory#cloud-workload-protection#security-tools+4 |
| 2025-04-03 | Tool demo | Blackhat |
SCAGoat - Exploiting Damn Vulnerable and Compromised SCA Application
| Hare Krishna Rai, Gaurav Joshi, K v Prashant | #supply-chain#supply-chain-attack#sca+1 |
| 2025-03-02 | Panel | Nullcon |
Unlocking India’s Cyber Potential through Strategic Policies, R&D Support, and Robust Public-Private Partnerships
| Atul Kumar, Savita Utreja | #cybersecurity-framework#cybersecurity-strategy#cyber-law+3 |
| 2025-03-02 | Panel | Nullcon |
Cyber Fusion Center: The Command Center for Integrated Cyber Defense
| Avkash Kathiriya, Mathan Babu Kasilingam, Yogi Kapur | #security-monitoring#network-defense#threat-modeling+3 |
| 2025-03-02 | Talk | Nullcon |
eKYC Crisis: Securing the Lockers
| Kartik Lalan | #risk-management#architecture#data-leak+4 |
| 2025-03-02 | Panel | Nullcon |
How can organisations protect themselves against Advanced Cyber Threats
| Bithal Bhardwaj, Vishal Salvi | #security-strategy#incident-management#phishing+1 |
| 2025-03-02 | Panel | Nullcon |
Modernizing Security Architecture: Platforms or Best-of-Breed, What Works Best?
| Ketan Vyas, Prajal Kulkarni, Satyavathi Divadari, Srihari Kotni | #security-strategy#threat-modeling#zero-trust+3 |
| 2025-03-02 | Panel | Nullcon |
Enterprise Readiness for Supply Chain Attacks
| Sanjay Bahl, Cassie Crossley | #supply-chain-security#supply-chain-attack#third-party-risk-management+4 |
| 2025-03-02 | Talk | Nullcon |
Securing the chains: Building defensive layers for software supply chains
| Yadhu Krishna M, Akhil Mahendra, Hritik Vijay | #blueteam#container-security#sbom+3 |
| 2025-03-01 | Panel | Nullcon |
Converging IT and OT Security: Unified strategies for protection, detection and response
| Burgess Cooper, Kuldeep Singh, Shailendra Fuloria, Rohit Sharma, Sachin Burman, Yask Sharma | #ics-security#cloud-workload-protection#security-strategy+1 |
| 2025-03-01 | Panel | Nullcon |
Cyber Tech 2030: The Next Chapter in AI, Zero Trust & Offensive Defense
| Ajit Hatti, Varun Singla | #ai-security#zero-trust#ai+3 |
| 2025-03-01 | Panel | Nullcon |
Navigating Data Protection in the age of globalisation
| Saikat Datta, Krishan Dev | #data-protection#gdpr#data-governance+4 |
| 2024-12-12 | Panel | Blackhat |
Locknote: Conclusions and Key Takeaways from Black Hat Europe 2024
| Vandana Verma Sehgal, Jeff Moss, Stefano Zanero, James Forshaw, Meadow Ellis | #security-strategy#cybersecurity-framework#cyber-resilience+2 |
| 2024-12-11 | Talk | Blackhat |
The CVSS Deception: How We’ve Been Misled on Vulnerability Severity
| Ankur Sand | #blueteam#security-strategy#threat-modeling+1 |
| 2024-11-16 | Talk | C0c0n |
Breach of the borderless: Cyber threat actors targeting India’s cyberspace
| Abhijith B R | #threat-hunting#cybersecurity-strategy#cyber-war+2 |
| 2024-11-16 | Panel | C0c0n |
When Falcon Strikes Back: The Defender’s Dilemma
| Burgess Cooper, Shivkumar Pandey, A Shiju Rawther, Padnya Manwar, Kishan Kendre | #incident-management#security-strategy#threat-modeling+2 |
| 2024-11-16 | Talk | C0c0n |
The subtle art of checkmating CISOs
| Sunil Varkey | #risk-management#architecture#security-governance+2 |
| 2024-11-16 | Talk | C0c0n |
Old Bugs, New Tricks: How N-Day Vulnerabilities Are Fueling Today’s Threat Landscape
| Dharani Sanjaiy | #bug-hunting#exploit-delivery#security-strategy+1 |
| 2024-11-15 | Talk | C0c0n |
CISO’s take on BYOAI
| Venugopal Parameswara | #risk-management#security-governance#security-compliance+3 |
| 2024-11-15 | Talk | C0c0n |
GenAI and Autonomous Security in the Age of Zero Trust
| Philip Varughese Vayarakunnil | #ai#ai-security#zero-trust+2 |
| 2024-11-15 | Panel | C0c0n |
Intelligence led security
| Midhun Babu, Sameer Ratolikar, M v Sheshadri, A Shiju Rawther, Maya R Nair, Balakrishnan A | #security-strategy#data-analytics#ai-security+1 |
| 2024-08-29 | Tool demo | Hitbsecconf |
Mantis
| Bharath Kumar, Akshay Jain | #asset-inventory#dast#anti-phishing |
| 2024-08-09 | Talk | Defcon |
Reflections on a Decade in Bug Bounties: Experiences and Major Takeaways
| Nikhil Shrivastava, Charles Waterhouse | #bug-hunting#bug-bounty#security-training+3 |
| 2024-08-08 | Tool demo | Blackhat |
Active Directory Cyber Deception using Huginn
| Rohan Durve, Paul Laine | #active-directory#incident-management#identity-governance+3 |
| 2024-05-09 | Talk | Rsac |
The Good, the Bad, and the Bounty: 10 Years of Buying Bugs at Microsoft
| Aanchal Gupta, Katie Moussouris | #bug-bounty#risk-management#security-governance |
| 2024-05-08 | Talk | Blackhat |
Cloud and Platform Agnostic Security Posture Management (xSPM)
| Sunil Arora, Parthasarthi Chakraborty | #cloud-security-posture-management#security-strategy#security-compliance |
| 2024-05-08 | Talk | Rsac |
How to CTF Infra - Beyond the Challenges and Flags
| Jayesh Chauhan, Max Gartman | #ctf#cloud-workload-protection#security-strategy+2 |
| 2024-05-07 | Talk | Rsac |
Anatomy of a Vulnerability Response - A View from the Inside
| Mohit Arora, Richard Tonry | #incident-management#risk-management#compliance-governance |
| 2024-05-07 | Talk | Rsac |
A Proven Approach on Automated Security Architectural Pattern Validation
| Sunil Arora, Parthasarathi Chakraborty | #architecture#devsecops#risk-management+1 |
| 2024-05-06 | Talk | Rsac |
Headspace’s Privacy Operations Center and Vault
| Shobhit Mehta, Puneet Thapliyal | #data-protection#security-operations-center#security-compliance+1 |
| 2024-04-19 | Talk | Blackhat |
China’s Military Cyber Operations: Has the Strategic Support Force Come of Age?
| Pukhraj Singh | #ics-security#risk-management#architecture |
| 2024-04-18 | Tool demo | Blackhat |
Mantis - Asset Discovery at Scale
| Ankur Bhargava, Prateek Thakare, Saddam Hussain | #asset-inventory#architecture#devsecops+1 |
| 2024-04-18 | Tool demo | Blackhat |
Catching adversaries on Azure - Deception on Cloud
| Subhash Popuri | #azure#cloud-workload-protection#cloud-pentesting+4 |
| 2024-04-18 | Tool demo | Blackhat |
DetectiveSQ: A Extension Auditing Framework Version 2
| Govind Krishna, Xian Xiang Chang | #audit#application-pentesting#ai-security+4 |
| 2024-03-12 | Talk | Nullcon |
Secure Web Gateways are dead. What’s next?
| Vivek Ramachandran | #browser-security#application-hardening#security-strategy+2 |
| 2024-03-11 | Talk | Nullcon |
Hacking Trains
| Jaden Furtado | #hacking#ics-security#network-forensics+2 |
| 2023-12-07 | Tool demo | Blackhat |
Mantis - Asset Discovery at Scale
| Prateek Thakare, Bharath Kumar, Praveen Kanniah | #red-teaming#asset-inventory#asset-management+2 |
| 2023-09-24 | Panel | Nullcon |
A CYBER-PHYSICAL SYSTEM FOR INDIA WITH SECURITY, PRIVACY, AND EQUITY
| Kunal Korgaonkar, Kapil Jaiswal, Malcolm Dsouza, Manoj Aggarwal, Niraj Sharma | #cyber-physical-systems#security-strategy#data-protection+1 |
| 2023-09-24 | Panel | Nullcon |
C4CII - SECURING USE OF CLOUD IN CRITICAL INFORMATION INFRASTRUCTURE
| Saikat Datta, Akash Mahajan, Varun Singla, Navin Kumar Singh, Phil Rodrigues | #cloud-security-posture-management#cloud-workload-protection#critical-infrastructure+3 |
| 2023-09-24 | Panel | Nullcon |
ADVERSARY SIMULATION AND INCIDENT RESPONSE IMPACT
| Shomiron Das Gupta, Yogi Kapur, Manish Tiwari | #incident-management#incident-detection#forensics+3 |
| 2023-09-23 | Panel | Nullcon |
CRITICAL INFORMATION INFRASTRUCTURE(CII) PROTECTION: CHALLENGES AND OPPORTUNITIES- HOW CAN THE NULLCON COMMUNITY CONTRIBUTE
| Saikat Datta, M v Sheshadri, Madhavi Purandare, Mathan Babu Kasilingam, Navin Kumar Singh | #critical-infrastructure#cybersecurity-framework#security-strategy+4 |
| 2023-09-23 | Panel | Nullcon |
DATA PROTECTION LAW AND ITS POTENTIAL IMPLICATIONS FOR THE INDUSTRY
| Burgess Cooper, Ashish Bhadouria, Jimmi Thakkar, Sunil Bajpai | #data-protection#gdpr#cyber-law |
| 2023-08-12 | Talk | Defcon |
Getting More Bang for your Buck:Appsec on a Limited Budget
| Vandana Verma Sehgal, Viraj Gandhi | #secure-development#devsecops#risk-management+2 |
| 2023-08-10 | Talk | Blackhat |
Does Public Disclosure of Vulnerabilities Affect Hacker Participation in Bug Bounty Programs?
| Amit Deokar, Ali Ahmed, Brian Lee | #bug-hunting#incident-management#security-strategy+4 |
| 2023-08-10 | Talk | Defcon |
Attacking Vehicle Fleet Management Systems
| Yashin Mehaboobe | #automotive-cybersecurity#ics-security#embedded-systems+4 |
| 2023-08-09 | Talk | Blackhat |
Diversity Microtalks: Perspectives on Creating Change
| Aastha Sahni, Andy Ellis, Meghan Jacquot, Sherri Davidoff | #security-training#risk-management#security-governance |
| 2023-08-09 | Talk | Blackhat |
Identifying and Reducing Permission Explosion in AWS: A Graph-Based and Analytical Approach
| Pankaj Moolrajani | #aws#cloud-security-posture-management#cloud-workload-protection+2 |
| 2023-08-09 | Tool demo | Blackhat |
CASPR - Code Trust Auditing Framework
| Ajit Hatti | #secure-coding#code-review#secure-development+1 |
| 2023-08-07 | Panel | C0c0n |
DPDP Act - Transformation challenges for BFSI
| Linson Paul, Venugopal Parameswara, Biju K, Babitha B P, Santosh Khadsare | #data-protection#gdpr#compliance-frameworks+4 |
| 2023-08-07 | Talk | C0c0n |
Citizen Mobile Security: Responsibilities, Accountability, and Impacts
| Satyendra Verma | #security-training#risk-management#compliance-governance |
| 2023-08-07 | Talk | C0c0n |
Cyber Threats to Global Financial Systems
| Lince Lawrence | #incident-management#risk-management#cloud-monitoring+4 |
| 2023-08-07 | Talk | C0c0n |
ESOC Trinetra Project
| Pankaj Kumar Dalela | #security-governance#risk-management#security-training |
| 2023-08-07 | Panel | C0c0n |
Evolving Threat Landscape: Strategies for Adapting and Innovating in Cybersecurity
| Vikas Arora, Sanjay Singh, Baidyanath Kumar, Saurabh Gugnani, Gokulavan Jayaraman, Vijay Nair | #security-strategy#threat-modeling#security-training+3 |
| 2023-08-07 | Talk | C0c0n |
Generative AI and Cyber Crimes
| Brijesh Singh | #security-training#risk-management#threat-hunting |
| 2023-08-07 | Talk | C0c0n |
Trust Resiliency - A Lesson Learned from Russia Ukraine War
| Ajit Hatti | #incident-management#architecture#risk-management+1 |
| 2023-08-07 | Talk | C0c0n |
The DPDPA Effect: Jubilation, Twinge and Reticence that followed
| Rahul Sharma | #security-compliance#security-governance#data-protection+1 |
| 2023-08-07 | Panel | C0c0n |
CII Protection: How can the c0c0n community contribute ?
| Navin Kumar Singh | #security-strategy#open-source-security#threat-modeling |
| 2023-08-06 | Panel | C0c0n |
Power of Control: Navigating the PDP Act
| Prem Kamath, K Kamaneesh, Swapnil Bangali, Rahul Sharma, Dinesh O Bareja | #cyber-law#compliance-frameworks#cybersecurity-strategy+3 |
| 2023-08-06 | Talk | C0c0n |
Securing the Future: Addressing Cybersecurity Challenges in the Age of 5G
| Altaf Shaik | #zero-trust#supply-chain-security#attack-surface+4 |
| 2023-08-06 | Talk | C0c0n |
CBDC and future of Finance
| Sunil Raveendran | #digital-currency#decentralized-systems#compliance-governance+2 |
| 2023-08-06 | Panel | C0c0n |
nGen Cyber Threats - 2024 and Beyond: Embracing Chaos, Taking Charge
| Murli Nambiar, A Shiju Rawther, Jacxine Fernandez, Vishal Salvi, Sridhar Govardhan | #security-strategy#cybersecurity-framework#cyber-resilience+2 |
| 2023-08-06 | Talk | C0c0n |
AI in Cyber Security and Crime Prevention
| Vishal Salvi | #ai#ai-security#deep-learning+3 |
| 2023-08-06 | Talk | C0c0n |
Insider Threats - Best Practices and Common Pitfalls
| Georgie Kurien | #insider-threats#risk-management#security-training+1 |
| 2023-08-06 | Talk | C0c0n |
Cryptocurrencies and challenges to Law Enforcement Agencies
| Bhushan Gulabrao Borase | #decentralized-systems#digital-currency#security-compliance+1 |
| 2023-08-06 | Talk | C0c0n |
Cybercrimes Victim Compensation : Legal Remedies and Process
| Nisheeth Dixit | #security-compliance#security-governance#risk-management+1 |
| 2023-08-06 | Talk | C0c0n |
Digital Innovation and its Impact on CIOs, CISOs and DPOs
| Navaneethan M | #security-compliance#security-governance#risk-management+2 |
| 2023-08-06 | Talk | C0c0n |
Emerging crimes and threat landscape in cyber domain and the need for international cooperation
| Kiran Sivakumar | #threat-landscape#threat-modeling#risk-management |
| 2023-08-06 | Talk | C0c0n |
Influence of Artificial Intelligence in GRC Space
| Mahesh Kalyanaraman | #security-governance#risk-management#security-compliance+2 |
| 2023-08-06 | Talk | C0c0n |
Playing cat and mouse with the Adversary: Sometimes a breach is inevitable
| Abhijith B R | #incident-management#risk-management#security-strategy+1 |
| 2023-08-06 | Talk | C0c0n |
Subduing Adversaries with Information Superiority
| Antony K M | #threat-hunting#security-monitoring#threat-detection+2 |
| 2023-08-06 | Talk | C0c0n |
Survivability in the Cyber World
| Sunil Varkey | #incident-management#risk-management#architecture |
| 2023-05-12 | Panel | Blackhat |
Trends and Top Takeaways from Black Hat Asia
| Sudhanshu Chauhan, Ty Miller, Jeff Moss, Asuka Nakajima, Pamela O Shea | #cybersecurity-strategy |
| 2023-04-26 | Talk | Rsac |
Is Increasing Security Maturity And Decreasing Operational Load Possible?
| Rohit Dhamankar | #risk-management#architecture#security-governance+1 |
| 2023-04-26 | Talk | Rsac |
Designing Product Security for a Brighter Smile and a Healthier Tomorrow
| Lokesh Pidawekar, Apoorva Phadke | #secure-development#devsecops#software-security+2 |
| 2023-04-21 | Talk | Hitbsecconf |
LOCKNOTE:THE HAND THAT STRIKES, ALSO BLOCKS
| Saumil Shah | #architecture#risk-management#security-training+1 |
| 2023-03-09 | Panel | Nullcon |
Elements of a Successful Security Strategy: A Comprehensive Approach
| Sheetal Joseph, Sybe Izzak Rispens, Travis Carelock | #security-strategy#security-testing#secure-development+4 |
| 2022-12-08 | Panel | Blackhat |
Locknote: Conclusions and Key Takeaways from Day 2
| Anant Shrivastava, Jeff Moss, Jiska Classen, Leigh Anney Galloway, Federico Maggi | #security-strategy#threat-modeling#cybersecurity-training+2 |
| 2022-12-07 | Tool demo | Blackhat |
Patronus: Swiss Army Knife SAST Toolkit
| Akhil Mahendra, Akshansh Jaiswal, Ashwin Shenoi | #sast#software-composition-analysis#asset-inventory+1 |
| 2022-09-28 | Talk | Rootcon |
Gazing into the Crystal Ball - The Fog of Cyberwarfare Escalations
| Harshit Agrawal | #ics-security#architecture#risk-management |
| 2022-09-24 | Talk | C0c0n |
Rationalizing Cyber Security Risk in Risk Language
| Anish Koshy | #risk-management#security-governance#cybersecurity-strategy+3 |
| 2022-09-24 | Panel | C0c0n |
MoonWorking’ and associated legal, ethical, security aspects
| Georgie Kurien, Sreekumar Balachandran, Sony A, Robin Joy | #cybersecurity-strategy#threat-modeling#cyber-law |
| 2022-09-24 | Talk | C0c0n |
Building Smart, Resilient and Sustainable Cyber Eco System
| Navin Kumar Singh | #risk-management#cybersecurity-strategy#architecture+4 |
| 2022-09-24 | Talk | C0c0n |
Cyber Defence and Role of private players - public private partnership
| Jasbir Singh Solanki | #security-governance#risk-management#security-compliance+1 |
| 2022-09-24 | Talk | C0c0n |
In production with GRC for cloud
| Mahesh Kalyanaraman | #cloud-compliance#security-governance#risk-management+1 |
| 2022-09-24 | Talk | C0c0n |
Power of Narratives in Cyber Security
| Sunil Varkey | #security-training#cybersecurity-education#human-factor+2 |
| 2022-09-24 | Panel | C0c0n |
Data sovereignty - Challenges and the road ahead
| Sanjeev Sharma, Saranga Rajan, A Muralidhar, Jojy Joy | #data-governance#data-protection#gdpr+2 |
| 2022-09-23 | Panel | C0c0n |
What ails the Indian cybersecurity startup ecosystem?
| Sunil Varkey, Ajit Hatti, Akash Mahajan, Aseem Jakhar, Shubham Mittal | #cybersecurity-strategy#business-resilience#cyber-law+3 |
| 2022-09-23 | Talk | C0c0n |
Startup Ecosystem and Investments in Post Covid Era
| Sunil Kanchi | #risk-management#security-compliance#security-governance+2 |
| 2022-09-23 | Talk | C0c0n |
Rolling out Central Bank Digital Currency - Technical Design Considerations
| Sunil Raveendran | #architecture#compliance-governance#risk-management+1 |
| 2022-09-23 | Panel | C0c0n |
Customer, Credit & Risk - Fintech trends 2022
| Maya R Nair, Balakrishnan A, A Shiju Rawther, Linson Paul, Shivanath Somanathan | #financial-institutions#data-protection#identity-theft+2 |
| 2022-09-23 | Talk | C0c0n |
Technological Reliance for Resilience
| Tulika Pandey | #risk-management#cyber-resilience#architecture+2 |
| 2022-09-23 | Panel | C0c0n |
Digital Apocalypse: Emerging cybersecurity challenges and future Crimes
| Nidhish Bhatnagar, Amit Dubey, Philip Varughese Vayarakunnil, Rahul Sasi, Saranga Rajan, Suhel Daud | #cybersecurity-strategy#cyber-crime#digital-currency |
| 2022-09-23 | Talk | C0c0n |
Battle of 300 Crore - how they lost it and got most of it back
| Prashant Choudhary | #incident-management#risk-management#architecture |
| 2022-09-23 | Talk | C0c0n |
Collaborative efforts for safe digital banking
| Biju K | #secure-development#risk-management#architecture |
| 2022-09-23 | Talk | C0c0n |
Cybersecurity for Manufacturing
| Santhosh Srinivasan | #ics-security#control-systems#critical-infrastructure+2 |
| 2022-09-23 | Talk | C0c0n |
Maximizing ROI on cyber security investments: Do you think Adversary Simulation OR Purple teaming holds the key?
| Abhijith B R | #risk-management#architecture#devsecops |
| 2022-09-23 | Talk | C0c0n |
Building a Safer and Innovative Digital Ecosystem
| Vijay Pamarathi | #secure-development#devsecops#software-security+2 |
| 2022-09-23 | Talk | C0c0n |
Log4j vulnerability continuous to be favourite for APT groups through mid 2022
| Niranjan Jayanand | #security-assessment#apt#exploit-kit+1 |
| 2022-09-23 | Talk | C0c0n |
Ransomware: Prevention, Early Detection and Response
| Babitha Bp | #ransomware#incident-management#malware-prevention+2 |
| 2022-09-08 | Talk | Nullcon |
vPrioritizer: Art of Risk Prioritization
| Pramod Rana | #vulnerability-assessment#security-development-lifecycle#risk-management+3 |
| 2022-09-07 | Talk | Nullcon |
Unearthing Malicious And Other “Risky” Open-Source Packages Using Packj
| Devdutt Patnaik, Ashish Bijlani | #open-source-security#supply-chain#supply-chain-attack+3 |
| 2022-09-06 | Panel | Nullcon |
Securing India The CERTIn Way
| Saikat Datta, Sanjay Bahl, Ajit Menon, Anuprita Daga | #security-strategy#cybersecurity-framework#incident-management+3 |
| 2022-09-06 | Panel | Nullcon |
Unlocking Security Collaboration With Cyber Threat Intelligence
| Avkash Kathiriya, Varun Singla, Mathan Babu Kasilingam, Amol Naik | #intelligence-sharing#attack-surface#cybersecurity-strategy+1 |
| 2022-09-06 | Panel | Nullcon |
Impact of disruptive technologies on CISO’s career & progression
| Burgess Cooper, Sandeep Karan, Jacxine Fernandez, Ravi Kumar, Ankur Bhargava | #security-strategy#cybersecurity-framework#ai-security |
| 2022-09-06 | Panel | Nullcon |
Cloud Services for Financial Inclusion: Possibilities & Challenges
| Nandkumar Saravade, Ganesh Ar, Himanshu Das, Navin Kumar Singh | #cloud-compliance#cloud-monitoring#financial-institutions+2 |
| 2022-09-06 | Panel | Nullcon |
PAM Maturity From Zero Trust To Least Privilege
| Ajay Bongirwar, Charanjit Bhatia, Bala Ramanan | #security-strategy#zero-trust#access-management+2 |
| 2022-09-06 | Panel | Nullcon |
Secure Service Edge (SSE): Challenges & Upsides of Adoption
| Rahul Neel Mani, Anuprita Daga, Rajesh Hemrajani | #cloud-workload-protection#threat-modeling#zero-trust+1 |
| 2022-08-25 | Talk | Hitbsecconf |
MPT: Pentest In Action
| Jyoti Raval | #security-assessment#application-pentesting#asset-management+2 |
| 2022-08-14 | Talk | Defcon |
Tales from the trenches - why organizations struggle to get even the basics of OT asset visibility & detection right
| Vivek Ponnada | #ics-security#risk-management#architecture+1 |
| 2022-08-11 | Tool demo | Blackhat |
Patronus: Swiss Army Knife SAST Toolkit
| Akhil Mahendra, Akshansh Jaiswal, Ashwin Shenoi | #sast#software-composition-analysis#asset-inventory+4 |
| 2022-08-11 | Talk | Thedianainitiative |
Connecting Dots Between Security Teams & Customer Expectations
| Shruthi Kamath | #security-governance#risk-management#architecture+2 |
| 2022-08-11 | Talk | Thedianainitiative |
The Real Cost of Free: What you need to know before downloading a free app
| Ruchira Pokhriyal | #app-security#data-protection#security-training+1 |
| 2022-08-10 | Talk | Blackhat |
The Open Threat Hunting Framework: Enabling Organizations to Build, Operationalize, and Scale Threat Hunting
| Sameer Koranne, John Dwyer, Neil Wyler | #threat-hunting#security-strategy#threat-modeling |
| 2022-08-10 | Tool demo | Blackhat |
CASPR - Code Trust Audit Framework
| Ajit Hatti | #secure-coding#secure-development#security-tools+3 |
| 2022-07-23 | Talk | Maycontainhackers |
How would a real life social media be like?
| Aditi Bhatnagar | #data-protection#security-training#risk-management+3 |
| 2022-05-18 | Panel | Phdays |
Challenges for cybersecurity conferences. Part II
| Aseem Jakhar, Timur Yunusov, Igor Lukic, Dhillon Andrew Kannabhiran | #security-training#cybersecurity-strategy#threat-modeling+3 |
| 2022-05-12 | Panel | Blackhat |
Locknote: Conclusions and Key Takeaways from Black Hat Asia 2022
| Vandana Verma Sehgal, Jeff Moss, Ryan Flores, Lidia Giuliano, Stefano Zanero | #security-strategy |
| 2022-05-12 | Tool demo | Blackhat |
Mitigating Open Source Software Supply Chain Attacks
| Ajinkya Rajput, Ashish Bijlani | #open-source-security#supply-chain#supply-chain-attack+3 |
| 2022-04-08 | Talk | Nullcon |
Bheem OS - A next-generation reasonably secure OS using Rust MicroVM
| Akram Ansari, Subash Sn | #os#virtual-machine#container-security+3 |
| 2021-11-18 | Talk | Hackinparis |
Is it really an intrusion if you get called in?: Mis-configuration based attacks in AWS
| Kavisha Sheth | #aws#cloud-workload-protection#cloud-pentesting+3 |
| 2021-11-13 | Talk | C0c0n |
Third Party Risk Management
| Mahesh Kalyanaraman | #risk-management#compliance-governance#supply-chain+2 |
| 2021-11-13 | Talk | C0c0n |
Cybersecurity in the era of Resilience - A walk through people, process and technology
| Babitha B P | #risk-management#cyber-resilience#architecture+3 |
| 2021-11-13 | Talk | C0c0n |
Changing Cyber Security Paradigm & Cyber Tsunami
| Sunil Varkey | #cybersecurity-strategy#threat-landscape#risk-management+3 |
| 2021-11-13 | Talk | C0c0n |
Post pandemic Transformation - A CISO’s perspective
| Sridhar Govardhan | #risk-management#security-governance#security-compliance+3 |
| 2021-11-13 | Talk | C0c0n |
Connecting the dots between customers and security teams
| Shruthi Kamath | #incident-management#security-training#devsecops+1 |
| 2021-11-13 | Talk | C0c0n |
Crisis Capitalization in a Pandemic
| Greeshma M R | #risk-management#incident-management#security-training+2 |
| 2021-11-13 | Talk | C0c0n |
Need for Zero Trust in Banking
| Biju K | #zero-trust#risk-management#architecture+1 |
| 2021-11-13 | Talk | C0c0n |
Painting Your Organizations with Shades of Red, Blue & Purple
| Hidayath Khan | #red-teaming#ethical-hacking#threat-modeling+2 |
| 2021-11-13 | Talk | C0c0n |
Light Basin - Telecom roaming network attack case study
| Akib Sayyed | #network-pentesting#network-traffic-analysis#gtp+2 |
| 2021-11-12 | Talk | C0c0n |
Post Covid CISOs - Disappearing trusted boundaries and Innovative CyberSecurity Approaches
| Illyas Kooliyankal | #risk-management#architecture#security-governance+1 |
| 2021-11-12 | Talk | C0c0n |
Regulating Social Media Platforms : Should it be done in Democratic Societies ?
| J Sam Daniel Stalin, Apar Gupta, Dinesh O Bareja, Prashant Mali, Jiten Jain | #security-compliance#security-governance#risk-management+3 |
| 2021-11-12 | Talk | C0c0n |
2021 Supply Chain Attacks Analysis
| Ajit Hatti | #incident-management#risk-management#supply-chain+1 |
| 2021-11-12 | Talk | C0c0n |
Enterprise Governance and Risk Management
| Arathy Nair, Muskan Mangla | #security-compliance#security-governance#risk-management+1 |
| 2021-11-12 | Talk | C0c0n |
The evolving nature of cyber community
| Aastha Sahni | #security-training#risk-management#cybersecurity-education |
| 2021-11-12 | Talk | C0c0n |
Data Security and Privacy
| Abhilasha Vyas | #data-protection#encryption#data-loss-prevention+3 |
| 2021-11-12 | Talk | C0c0n |
Executive Presence….a cardinal of the cyber rostrum
| Bishakha Jain | #security-training#architecture#security-governance |
| 2021-10-13 | Talk | Rootcon |
The Kill Chain: Future of Cyber in Defense
| Harshit Agrawal | #architecture#ics-security#risk-management |
| 2021-08-26 | Talk | Hitbsecconf |
Gazing Ahead: What Modern RF Combat Looks Like in the Next Decade
| Harshit Agrawal | #ics-security#architecture#risk-management |
| 2021-08-08 | Panel | Defcon |
Resilient cyber space: The role of hacker and security communities
| Manu Zacharia, Aseem Jakhar, Abhijith B R, Jay Turla, Omar Santos, Dave Lewis, Dhillon Kannabhiran | #security-training#threat-modeling#incident-management+3 |
| 2021-08-07 | Tool demo | Defcon |
Tenacity- An Adversary Emulation Tool for Persistence
| Atul Nair, Harshal Tupsamudre | #incident-management#security-testing#attack-surface |
| 2021-08-06 | Panel | Defcon |
Adversary simulation, emulation or purple teaming - How would you define it?
| Anant Shrivastava, Vincent Yiu, Martin Ingesen, Jean Marie Bourbon, Samuel Kimmons, Joe Vest | #security-testing#incident-management#red-teaming+3 |
| 2021-08-05 | Talk | Blackhat |
5G IMSI Catchers Mirage
| Ravishankar Borgaonkar, Altaf Shaik | #ios#android#security-strategy+1 |
| 2021-08-04 | Tool demo | Blackhat |
Attack Surface Framework
| Prajwal Panchmahalkar, Mauricio Espinosa | #network-defense#application-pentesting#attack-surface+1 |
| 2021-05-07 | Panel | Blackhat |
Insights and Predictions: What’s Next in InfoSec
| Vandana Verma Sehgal, Neil R. Wyler, Lidia Giuliano, Jeff Wilson, Vitaly Kamluk | #security-strategy#cybersecurity-training#cybersecurity-framework+2 |
| 2021-05-06 | Tool demo | Blackhat |
Demystifying the State of Kubernetes Cluster Security - The Cloud Native Way
| Vasant Kumar, Rupali Dash | #kubernetes#audit#secure-coding+1 |
| 2021-03-06 | Panel | Nullcon |
From Reactive to Proactive - Operationalizing your Threat Intel
| Akshat Jain, Amit Ghodekar, Suhas Desai, Ambuj Bhalla | #data-analytics#cybersecurity-strategy#intelligence-sharing+1 |
| 2021-03-05 | Panel | Nullcon |
Tech Startups/Businesses and Infonomics
| Sourabh Issar, Burgess Cooper, Joerg Simon | #data-governance#data-protection#cybersecurity-strategy+1 |
| 2021-03-05 | Panel | Nullcon |
CyberPhysical Systems Security - Trends, challenges & opportunities
| Frank Sanjay, Khushwant Pawar, Mayur Mehta, Faruk Kazi | #industrial-control-systems#operational-technology#embedded-systems+3 |
| 2020-11-21 | Talk | Appsecindonesia |
The caveats of the unseen: Crouching exposure, Hidden Misconfiguration
| Ashwin Vamshi | #architecture#devsecops#risk-management+1 |
| 2020-10-07 | Talk | Rootcon |
Zero Trust in the Era of Cloud
| Vandana Verma Sehgal | #zero-trust#cloud-workload-protection#security-strategy |
| 2020-09-18 | Talk | C0c0n |
Offensive & Scope Based Recon
| Harsh Bothra | #reconnaissance#network-architecture#security-strategy+1 |
| 2020-09-18 | Talk | C0c0n |
Supercharging your initial foothold in Red Team engagements
| Sachin S Kamath | #red-teaming#ethical-hacking#exploit-delivery+3 |
| 2020-09-18 | Talk | C0c0n |
Cyber Security Shifts During COVID-19
| Sunil Kanchi | #risk-management#security-training#compliance-governance+1 |
| 2020-09-18 | Talk | C0c0n |
Coping with Digital Transformation - A CISO perspective
| Maya R Nair | #risk-management#security-governance#architecture+2 |
| 2020-09-18 | Talk | C0c0n |
COVID-19 Cyber impact on financial sector and remote employees
| Amit Dubey, Tal Catran, Yair Feldman | #incident-management#risk-management#cybersecurity-strategy+4 |
| 2020-09-18 | Talk | C0c0n |
Herd Immunity, in the Cyber World
| Sunil Varkey | #security-training#risk-management#architecture |
| 2020-09-18 | Talk | C0c0n |
Demystifying Zero Trust - A Real world
| Sandeep Variyam | #zero-trust#architecture#security-governance+1 |
| 2020-08-22 | Talk | Thedianainitiative |
Deploying discreet infrastructure for targeted phishing campaigns
| Sreehari Haridas | #phishing#application-pentesting#social-engineering+3 |
| 2020-08-22 | Talk | Thedianainitiative |
Internal Red Team Operations Framework - Building your practical internal Red Team
| Abhijith B R | #red-teaming#cyber-war#phishing+3 |
| 2020-08-22 | Talk | Thedianainitiative |
Automating Threat Hunting on the Dark Web and other nitty-gritty things
| Apurv Singh Gautam | #threat-hunting#nlp#machine-learning+1 |
| 2020-08-21 | Talk | Thedianainitiative |
Trust, No Trust or Zero Trust - Myth Demystifying
| Vandana Verma Sehgal | #zero-trust#architecture#security-compliance+2 |
| 2020-08-07 | Panel | Defcon |
D0 N0 H4RM: A Healthcare Security Conversation
| Vidha Murthy, Christian Dameff, Jeff Tully, Jessica Wilkerson, Veronica Schmitt, Ash Luft | #data-protection#identity-management#security-training+3 |
| 2020-08-06 | Panel | Blackhat |
Locknote: Conclusions and Key Takeaways from Day 2
| Aanchal Gupta, Kymberlee Price, Rodrigo Rubira Branco, Stefano Zanero | #security-strategy#threat-modeling#cybersecurity-training+2 |
| 2020-08-06 | Talk | Blackhat |
Making an Impact from India to the Rest of the World by Building and Nurturing Women Infosec Community
| Vandana Verma Sehgal | #security-training#cybersecurity-strategy#social-engineering |
| 2020-08-05 | Tool demo | Blackhat |
vPrioritizer: Learn to say NO to almost every vulnerability (art of risk prioritisation…)
| Pramod Rana | #risk-analysis#blueteam#security-strategy+4 |
| 2020-03-07 | Panel | Nullcon |
Economics Of Data Breach And Attack
| Bhaskar Medhi, Manu Zacharia, Suchit Mishra, Yash Kadakia | #data-loss-prevention#data-protection#cybersecurity-strategy+4 |
| 2020-03-07 | Panel | Nullcon |
Hack the law: Protection for cybersecurity research in India
| Apar Gupta, Manu Zacharia, Raman Jit Singh Chima, Neelu Tripathy | #cyber-law#cybersecurity-strategy#security-development-lifecycle |
| 2020-03-07 | Panel | Nullcon |
Supply Chain Security In Critical Infrastructure Systems
| Manish Tiwari, Suchit Mishra, Faruk Kazi, Cristofaro Mune | #supply-chain-attack#supply-chain-security#critical-infrastructure+3 |
| 2020-03-06 | Tool demo | Nullcon |
Providence
| Swapnil Kumbhar, Akshay Shah | #incident-management#linux#macos+2 |
| 2020-03-06 | Panel | Nullcon |
Predicting Danger: Building the Ideal Threat Intelligence Model
| Saikat Datta, Sandeep Sharma, Muslim Koser, Shankar Jadhav | #ai-security#machine-learning#nlp+3 |
| 2019-12-04 | Talk | Blackhat |
Bring Your Own Token (BYOT) to Replace the Traditional Smartcards for Strong Authentication and Signing
| Karthik Ramasamy, Eric Hampshire | #blueteam#smartcard#mfa+4 |
| 2019-11-01 | Talk | Appsecdayaustralia |
Protecting the Damned: Deploying Insecure Applications at Scale
| Vivek Ramachandran | #blueteam#container-security#docker+3 |
| 2019-09-28 | Panel | C0c0n |
Align security and risk management strategies with enterprise objectives
| Abdul Karim Vettiyanickal, George Eapen, Ranjeet Rai, Amit Dubey, Biju K, Kanu Pathania | #security-strategy#cybersecurity-framework#cyber-resilience+4 |
| 2019-09-28 | Talk | C0c0n |
Vulnerability Prioritization with Threat Intelligence
| Muslim Koser, Devesh Vatsa, Rohit Srivastwa, Dinesh O Bareja | #threat-intelligence-analysis#automated-scanning#security-assessment+3 |
| 2019-09-28 | Panel | C0c0n |
Implementing Data Protection Frameworks with evolving Technology-Challenges, Opportunities & Solutions
| B R Nath, Jijy Oommen, Maya R Nair, Ajay Porus, Georgie Kurien | #data-protection#data-governance#security-strategy |
| 2019-09-27 | Talk | C0c0n |
Advanced Persistent Threat and counter measures
| A a Gafoor | #blueteam#apt#network-defense+4 |
| 2019-09-27 | Panel | C0c0n |
Digital Transformation and Evolving Governance Structure
| A Shiju Rawther, Ajith Balagopal, Balakrishnan A, Sreekumar Balachandran | #cybersecurity-strategy#security-governance#risk-management+2 |
| 2019-09-27 | Talk | C0c0n |
Securing Payment Data with PCI Security Standards and Programs
| Nitin Bhatnagar | #blueteam#data-protection#secure-development+3 |
| 2019-09-27 | Panel | C0c0n |
Shouldn’t Organization disclose breaches - The need for a shared platform
| Sunil Varkey, Jacxine Fernandez, Rahul Sasi, K K Chaudhary | #data-leak#data-protection#security-testing+4 |
| 2019-09-27 | Talk | C0c0n |
Practical Approach to Cyber Security for financial institutions
| Georgie Kurien | #financial-institutions#secure-development#risk-management+2 |
| 2019-09-27 | Talk | C0c0n |
A Day in the Life of a CISO
| Sridhar Govardhan | #security-compliance#security-governance#risk-management+2 |
| 2019-09-27 | Talk | C0c0n |
CISO Mind Set
| Lopa Mudraa Basuu | #risk-management#security-governance#security-compliance+1 |
| 2019-09-27 | Talk | C0c0n |
Industry 4.0 - Security and Compliance
| Santhosh Srinivasan | #ics-security#security-compliance#security-governance+2 |
| 2019-09-27 | Talk | C0c0n |
RANSOMWARE - to pay or not to pay
| Seshaprakash Kusuma Sreenivasa | #ransomware#incident-management#risk-management |
| 2019-09-27 | Talk | C0c0n |
Block Chain for Secured Automation
| Sanat Bhat | #blueteam#smart-contracts#decentralised-security+1 |
| 2019-09-27 | Talk | C0c0n |
Defense in Depth for Embedded Systems
| Jiggyasu Sharma | #embedded-systems#blueteam#hardware-embedded+4 |
| 2019-09-27 | Talk | C0c0n |
Looking a decade ahead: Big data, drones , Robots and cyber security.
| Rahul Sasi | #ics-security#architecture#ai-security+2 |
| 2019-09-13 | Talk | 44con |
The CISO’s Dilemma
| Saumil Shah | #blueteam#security-strategy#threat-modeling+4 |
| 2019-09-12 | Keynote | Globalappsec |
Making a Change, One at a time - Diversity: More than just Gender
| Vandana Verma Sehgal | #security-training#human-factor#cybersecurity-strategy+3 |
| 2019-08-29 | Keynote | Hitbsecconf |
The CISO’s Dilemma
| Saumil Shah | #blueteam#compliance-governance#security-strategy+4 |
| 2019-08-08 | Tool demo | Defcon |
Let’s Map Your Network
| Pramod Rana | #reconnaissance#blueteam#network-monitoring+4 |
| 2019-03-02 | Panel | Nullcon |
CISO Strategy for OT and IoT risk and Threat Management
| Gaurav Shukla, Gomeet Pant, Rakesh Viswanathan, Sudarshan Rajagopal | #ics-security#iot-pentesting#cybersecurity-strategy+3 |
| 2019-03-02 | Panel | Nullcon |
Navigating Risk in the Changing Business and Technology Landscape
| Rahul Neel Mani, Burgess Cooper, Manish Tiwari, Mannan Godil | #risk-management#cybersecurity-strategy#business-resilience+4 |
| 2019-03-02 | Panel | Nullcon |
Actionable Intelligence and Cyber Security
| Durga Dube, M v Sheshadri, Rahul Sasi, Shrikant Shitole, Alan White | #data-analytics#incident-management#security-analytics+4 |
| 2019-03-01 | Panel | Nullcon |
Clear and Present Danger: Cyber Wars will Target Critical Infrastructure
| Sourabh Issar, Sachin Burman, Sudarshan Rajagopal, Somenath Kundu | #cyber-war#critical-infrastructure#security-strategy+1 |
| 2018-12-05 | Tool demo | Blackhat |
Mafia: Mobile Security Automation Framework for Intelligent Auditing
| Ankur Bhargava, Mohan Kallepalli | #audit#security-testing#secure-development+4 |
| 2018-11-02 | Talk | Hitbsecconf |
Defending The Enterprise in 2018
| Saumil Shah | #blueteam#security-strategy#threat-modeling+3 |
| 2018-10-15 | Talk | Hacklu |
Come to the dark side! We have radical insurance groups & ransomware
| Ankit Gangwal, Eireann Leverett | #ransomware#risk-management#cyber-insurance+2 |
| 2018-10-05 | Talk | C0c0n |
Defending Healthcare Base
| Jiggyasu Sharma | #blueteam#incident-management#security-monitoring+4 |
| 2018-10-05 | Talk | C0c0n |
Resiliency Focus alongside Digital Disruption
| Lince Lawrence | #architecture#risk-management#security-training+2 |
| 2018-10-05 | Talk | C0c0n |
Artificial Intelligence and Social Media Analytics in Criminal Investigation
| Amit Dubey | #ai#ai-security#nlp+3 |
| 2018-10-05 | Talk | C0c0n |
Digital Innovation revolution in Kerala Government
| Sunil Varkey | #cybersecurity-strategy#architecture#risk-management+2 |
| 2018-10-05 | Talk | C0c0n |
Data management challenge for Privacy compliance
| Maria Bellarmine | #data-protection#security-compliance#data-governance+2 |
| 2018-10-05 | Talk | C0c0n |
Adaptive GRC
| Mahesh Kalyanaraman | #security-compliance#security-governance#risk-management |
| 2018-10-05 | Talk | C0c0n |
Dealing with Changing Threat Landscape
| Vijendra Katiyar | #threat-landscape#threat-hunting#risk-management |
| 2018-10-05 | Talk | C0c0n |
Future of Mobility & Cyber Security
| Suja Chandy | #automotive-cybersecurity#ics-security#architecture+2 |
| 2018-10-05 | Talk | C0c0n |
Taking cyber security to the board room
| Amit Pradhan | #risk-management#security-compliance#security-governance+2 |
| 2018-10-05 | Talk | C0c0n |
Will Artificial Intelligence And Machine Learning Bring More Threats On Cyber Security?
| Roshy John | #risk-management#architecture#ai-security+2 |
| 2018-10-05 | Talk | C0c0n |
Blockchains as techno-power structures: towards emergence of P2P Politics
| Sunil Aggarwal | #decentralized-systems#decentralised-security#architecture+1 |
| 2018-10-04 | Talk | Brucon |
Disrupting the Kill Chain
| Vineet Bhatia | #incident-management#architecture#windows+3 |
| 2018-10-03 | Tool demo | Blackhat |
Angad: A Malware Detection Framework Using Multi-Dimensional Visualization
| Ankur Tyagi | #malware-detection#static-analysis#dynamic-analysis+3 |
| 2018-08-16 | Talk | Usenix |
Chipmunk or Pepe? Using Acoustical Analysis to Detect Voice-Channel Fraud at Scale
| Vijay Balasubramaniyan | #threat-detection#architecture#machine-learning+1 |
| 2018-08-11 | Talk | Defcon |
Compression Oracle Attacks on VPN Networks
| Ahamed Nafeez | #vpn#network-architecture#application-pentesting+3 |
| 2018-08-09 | Tool demo | Blackhat |
Mafia: Mobile Security Automation Framework for Intelligent Auditing
| Ankur Bhargava, Sagar Popat, Mohan Kallepalli | #audit#security-testing#automated-scanning+4 |
| 2018-08-09 | Talk | Defcon |
Anonymous rate-limiting in services with Direct Anonymous Attestation
| Konark Modi, Alex Catarineu | #data-protection#architecture#security-strategy+1 |
| 2018-03-15 | Talk | Troopers |
Defending Microsoft Environments at Scale
| Vineet Bhatia | #blueteam#windows#azure+4 |
| 2018-03-03 | Panel | Nullcon |
IoT : How long till D Day?
| Aseem Jakhar, Shobha Jagathpal, Rishikesh Kamat, Daniel Cisowski, Michael Pyle | #iot-device-management#iot-pentesting#embedded-systems+3 |
| 2018-03-03 | Panel | Nullcon |
Managing Cyber Risk in the Connected Environment
| Gaurav Shukla, Ramachandra Hegde, Sudarshan Rajagopal, Kabir Mulchandani | #security-strategy#threat-modeling#network-monitoring+1 |
| 2018-03-02 | Panel | Nullcon |
The complexity of regulation & cybersecurity
| Saikat Datta, Maya R Nair, Nandkumar Saravade, Sanjay Bahl | #cybersecurity-framework#cyber-law#compliance-governance+3 |
| 2018-03-02 | Panel | Nullcon |
Economics of Hacks & Data Breaches Who Pays, Who Secures & Who Wins
| Vinayak Godse, Ashutosh Jain, Bhishma Maheshwari, Manish Tiwari, Suchit Mishra | #data-breach#risk-management#cybersecurity-strategy |
| 2018-03-02 | Panel | Nullcon |
Should all ciso promote hall of fame” within their organizations
| Burgess Cooper, Durga Dube, Thom Langford, Harish Pillay | #security-training#cybersecurity-strategy#bug-bounty+1 |
| 2018-03-01 | Talk | Nullcon |
Software Supply Chain Cyberattack
| Samiran Ghatak | #red-teaming#cyberattack#supply-chain-attack+1 |
| 2017-08-19 | Panel | C0c0n |
Security in Banking - Being one step aheadt
| Sunil Varkey, Rajesh Hemrajani, Biju K, Bhavin Bhansali, B R Nath, V George Antony | #financial-institutions#secure-development#security-strategy |
| 2017-08-19 | Talk | C0c0n |
The Public Private Partnership - Navigating the Govt
| Saikat Datta | #security-compliance#security-governance#risk-management+1 |
| 2017-08-19 | Talk | C0c0n |
Building Trust for Digital Transactions in India’s COD Culture
| Parry Aftab, Betsy Broder, Sridhara R Sidhu, Mirza Faizan | #secure-development#risk-management#architecture |
| 2017-08-19 | Talk | C0c0n |
Trust, the foundation of Digital Mastery
| Sunil Varkey | #identity-management#authentication#risk-management+2 |
| 2017-08-18 | Talk | C0c0n |
Bank on Compliance for Cyber Security
| Dinesh O Bareja | #cyber-law#compliance-frameworks#financial-institutions+4 |
| 2017-08-18 | Talk | C0c0n |
Hunting the Hunters – Fighting CyberCrime at the Source
| Valan Sivasubramanian | #red-teaming#cybersecurity-strategy#cyber-crime+2 |
| 2017-08-18 | Talk | C0c0n |
Prevent Dark Side of your Smart City - A Defensive Security model for Smart City and Critical Infrastructure
| Manas Pratim Sarma | #blueteam#critical-infrastructure#cybersecurity-strategy+2 |
| 2017-08-18 | Talk | C0c0n |
Call Centre Frauds
| Parry Aftab, Betsy Broder | #social-engineering#security-training#risk-management+1 |
| 2017-08-18 | Talk | C0c0n |
Challenges in Digital Banking
| Biju K | #security-training#security-governance#risk-management |
| 2017-08-18 | Talk | C0c0n |
Moving from Cybersecurity Awareness to Cybersecurity Competence
| Anup Narayanan | #cybersecurity-education#cybersecurity-training#security-training+3 |
| 2017-07-28 | Tool demo | Defcon |
Lamma 1.0
| Ajit Hatti, Antriksh Shah | #encryption#security-assessment#audit+1 |
| 2017-07-26 | Tool demo | Blackhat |
Datasploit - Automated Open Source Intelligence (OSINT) Tool
| Kunal Aggarwal, Shubham Mittal, Sudhanshu Chauhan | #osint#reconnaissance#social-engineering+4 |
| 2017-04-13 | Keynote | Hitbsecconf |
Redefining Defense
| Saumil Shah | #blueteam#security-strategy#incident-management+2 |
| 2017-03-31 | Talk | Blackhat |
The Seven Axioms of Security
| Saumil Shah | #blueteam#security-strategy#threat-modeling+2 |
| 2017-03-21 | Talk | Troopers |
New attacks in 4G technologies
| Ravishankar Borgaonkar | #4g#attack-surface#threat-modeling+1 |
| 2017-03-04 | Panel | Nullcon |
Cyber-Security Blue-Print for the Future!
| Kapil Awasthi, Mathan Babu Kasilingam, Partha Sengupta, Sumit Malhotra | #security-strategy#threat-modeling#zero-trust |
| 2017-03-03 | Talk | Nullcon |
Breach Response - Time to shake up the status quo
| K K Mookhey, Pranesh Prakash, Sahir Hidayatullah, Shobha Jagathpal | #incident-management#risk-management#architecture+1 |
| 2017-03-03 | Panel | Nullcon |
Digital warriors: India and the Future of Conflict on the Internet
| Saikat Datta, Brijesh Datta, Muktesh Chander, Cmde Anand, Anja Kovacs | #cyber-war#national-security#digital-currency+2 |
| 2017-03-03 | Talk | Nullcon |
Securing Critical National Infrastructure
| Shailendra Fuloria, R Sarangapani, Rahul Tongia, Michael Pyle, Justin Searle | #critical-infrastructure#ics-security#risk-management+3 |
| 2016-11-04 | Talk | Blackhat |
Detach Me Not - DoS Attacks Against 4G Cellular Users Worldwide from your Desk
| Siddharth Rao, Bhanu Kotte, Dr. Silke Holtmanns | #dos#red-teaming#ss7+4 |
| 2016-10-19 | Talk | Hacklu |
2016: The Infosec Crossroads
| Saumil Shah | #philosophy#security-strategy#incident-management+3 |
| 2016-09-14 | Talk | 44con |
2016: The Infosec Crossroads
| Saumil Shah | #blueteam#security-strategy#threat-modeling+4 |
| 2016-08-19 | Talk | C0c0n |
Breaking into Gas stations!
| Suraj Pratap | #red-teaming#ethical-hacking#exploit-delivery+2 |
| 2016-08-19 | Talk | C0c0n |
Esoteric XSS Payloads
| Riyaz Walikar | #xss#red-teaming#code-injection+3 |
| 2016-08-19 | Talk | C0c0n |
How (in)secure are Indian GSM networks?
| Ajay Fuloria | #gsm#gtp#imsi+4 |
| 2016-08-06 | Tool demo | Defcon |
LAMMA (beta)
| Ajit Hatti | #encryption#security-assessment#audit+1 |
| 2016-08-04 | Tool demo | Blackhat |
LAMMA
| Ajit Hatti | #encryption#security-assessment#audit+1 |
| 2016-08-04 | Talk | Blackhat |
Understanding HL7 2.x Standards Pen Testing and Defending HL7 2.x Messages
| Anirudh Duggal | #ics-security#risk-management#application-pentesting+3 |
| 2016-05-17 | Talk | Phdays |
Fingerprinting and Attacking a Healthcare Infrastructure
| Anirudh Duggal | #red-teaming#fingerprinting#ransomware+4 |
| 2015-11-05 | Talk | Groundzerosummit |
Hacking RFIDs under 2000INR
| Jayesh Chauhan | #rfid#red-teaming#hardware-embedded+4 |
| 2015-11-05 | Talk | Groundzerosummit |
OSINT Black Magic: Listen who whispers your name in the dark!!!
| Sudhanshu Chauhan, Nutan Kumar Panda | #osint#deep-web#data-leak+4 |
| 2015-11-05 | Talk | Groundzerosummit |
Economics of Post Quantum Crypto Systems : Do we really Need it
| Ajit Hatti | #encryption#quantum-computing#security-strategy+1 |
| 2015-09-24 | Talk | Appsecusa |
Encouraging Diversity and Advancing Cybersecurity Education
| Shruthi Kamath, Apoorva Giri, Elissa Shevinsky | #cybersecurity-education#security-training#risk-management+1 |
| 2015-08-07 | Talk | Defcon |
Getting into the Trust Store We Trust
| Ajit Hatti | #reverse-engineering#architecture#security-strategy |
| 2015-08-01 | Talk | C0c0n |
Attack chaining for web exploitation- From Information leakage to gaining Root access
| Abhijeth Dugginapeddi | #red-teaming#application-pentesting#attack-surface+2 |
| 2015-03-15 | Talk | Blackhat |
2015 State of Vulnerability Exploits
| Amol Sarwate | #automated-scanning#vulnerability-assessment#risk-management+1 |
| 2015-02-07 | Panel | Nullcon |
Startup panel – Make in India
| Aseem Jakhar, Radha Shelat, Sumit D Chowdhury, Shomiron Das Gupta, Sastry Tumuluri, Shiju Sathyadevan | #security-strategy#cybersecurity-framework#business-resilience+4 |
| 2015-02-06 | Panel | Nullcon |
2015: The Global Threat Defense Landscape - A discussion on the challenges faced by enterprises in engaging the bad guys
| Shomiron Das Gupta, K S Narayanan, Shantanu Ghosh, Subrahmanya Gupta Boda, Vishal Salvi, Benjamin Rivera | #cyber-crime#incident-management#attack-surface+1 |
| 2015-02-06 | Panel | Nullcon |
Defender’s Diary: Who’s attacking? What are my options?
| Sastry Tumuluri, Amit Sharma, Venkatesh Subramaniam, Sachin Burman, Deepak Singla | #blueteam#threat-hunting#cybersecurity-strategy |
| 2015-02-06 | Panel | Nullcon |
Why CISO should promote more of such technical events - pros and cons, benefits etc
| Burgess Cooper, Maya Viswanathan, Sanjay Burman, Sridharan Sankaran, Massoud Issa, Katie Moussouris | #security-training#cybersecurity-strategy#security-management |
| 2015-02-06 | Talk | Nullcon |
Building security and compliance into the software delivery process
| Anubhav Bathla, Dinesh Pillai, S Chandrasekhar, Harish Pillay | #secure-development#devsecops#security-compliance+3 |
| 2014-11-13 | Talk | Groundzerosummit |
Attacking Cryptography & PKI Implementations
| Ajit Hatti | #encryption#red-teaming#ssl+4 |
| 2014-11-13 | Talk | Groundzerosummit |
National Cyber Policy and its impact on Business
| Vaishali Bhagwat | #cyber-law#cybersecurity-strategy#business-resilience+3 |
| 2014-11-13 | Talk | Groundzerosummit |
Internet Governance
| Anjana Kovacs | #security-governance#security-compliance#risk-management+1 |
| 2014-11-13 | Talk | Groundzerosummit |
9 Cell Cyber Diplomacy
| Alok Vijayant | #architecture#risk-management#security-governance |
| 2014-11-13 | Talk | Groundzerosummit |
Financial Integrity and Cyber Security
| Karnal Singh | #risk-management#security-compliance#security-governance |
| 2014-11-13 | Talk | Groundzerosummit |
Network Time Protocol in Amplification Inferno
| Sriram Krishnan | #network-pentesting#network-vulnerability-assessment#network-architecture+2 |
| 2014-11-13 | Talk | Groundzerosummit |
APT protection for the Enterprise
| Deepak Singla | #blueteam#apt#security-strategy |
| 2014-10-23 | Talk | T2 |
Darshak: how to turn your phone into a low cost IMSI catcher device
| Ravishankar Borgaonkar, Swapnil Udar | #android#endpoint-protection#android-security+2 |
| 2014-08-22 | Talk | C0c0n |
APT: Case Study of attackers targeting public tendering
| Rahul Sasi | #red-teaming#apt#attack-surface+4 |
| 2014-08-22 | Talk | C0c0n |
Cryptocalypse, Heart Bleed : Is our Government Listening?
| Ajit Hatti | #encryption#ssl#cyber-law+3 |
| 2014-08-22 | Talk | C0c0n |
Cryptographic Backdoors: Subverting the RSA
| Adhokshaj Mishra | #encryption#red-teaming#security-strategy+3 |
| 2014-03-18 | Talk | Troopers |
Evolution of SIM Card Security
| Ravishankar Borgaonkar | #3gpp#gsma#embedded-systems+4 |
| 2014-02-14 | Talk | Nullcon |
User Privacy in Cellular Networks
| Ravishankar Borgaonkar | #data-protection#network-architecture#data-governance+2 |
| 2014-02-14 | Talk | Nullcon |
12 YEARS AND A BAKER’S DOZEN
| Saumil Shah | #philosophy#security-strategy#threat-modeling+3 |
| 2013-11-20 | Talk | Appsecusa |
Project Talk: OWASP OpenSAMM Project
| Pravir Chandra, Seba Deleersnyder | #software-security#secure-development#devsecops+4 |
| 2013-11-20 | Panel | Appsecusa |
Aim-Ready-Fire
| Pravir Chandra, Ajoy Kumar, Suprotik Ghose, Jason Rottaupt, Ramin Safai, Sean Barnum, Wendy Nather | #appsec#secure-development#security-strategy |
| 2013-11-07 | Talk | Groundzerosummit |
Central Monitoring System and IT Act 2000 – Balance between rights of citizens and state
| Vaishali Bhagwat | #cyber-law#cybersecurity-strategy#cyber-resilience+2 |
| 2013-11-07 | Talk | Groundzerosummit |
Understanding the anatomy of advanced targeted attacks – The Trend Micro approach
| Tarun Gupta | #forensics#malware-research#attack-surface |
| 2013-11-07 | Talk | Groundzerosummit |
Abusing Google Apps: Google is my command and control center
| Ajin Abraham | #android#red-teaming#cloud-pentesting+4 |
| 2013-11-07 | Talk | Groundzerosummit |
Advanced security for advanced threats
| Kartik Shahani | #blueteam#security-strategy#threat-modeling+4 |
| 2013-09-27 | Talk | C0c0n |
Risk and challenges in virtual currencies.
| Harsh Patel, Swatantra Kumar Gupta | #digital-currency#cryptocurrency#decentralized-systems+4 |
| 2013-09-27 | Talk | C0c0n |
Hello CISO! How to make end-users LIKE and FOLLOW “Brand Infosec”?
| Anup Narayanan | #security-training#cybersecurity-education#security-governance+3 |
| 2013-09-27 | Talk | C0c0n |
Disclosing Vulnerabilities: The Bug Bounty Style
| Nikhil Prabhakar | #red-teaming#bug-bounty#ethical-hacking+3 |
| 2013-08-15 | Talk | Usenix |
Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness
| Devdatta Akhawe, Adrienne Felt | #web-security#security-training#architecture+2 |
| 2013-08-15 | Talk | Usenix |
An Empirical Study of Vulnerability Rewards Programs
| Devdatta Akhawe, David Wagner, Matthew Finifter | #bug-bounty#software-security#risk-management+2 |
| 2013-08-01 | Tool demo | Blackhat |
Sparty
| Aditya K Sood | #secure-coding#audit#blueteam |
| 2013-07-31 | Talk | Blackhat |
LTE booms with vulnerabilities
| Ankit Gupta | #lte#ddos#network-architecture+2 |
| 2013-03-15 | Talk | Blackhat |
Vulnerability analysis of 2013 SCADA issues
| Amol Sarwate | #scada#ics-security#attack-surface+2 |
| 2013-03-01 | Talk | Nullcon |
Sensitive Campus Security with Network
| Aravind Sitaraman | #blueteam#network-monitoring#security-strategy+4 |
| 2012-12-01 | Talk | Clubhack |
Legal Nuances to the Cloud
| Ritambhara Agrawal | #cyber-law#cloud-compliance#cloud-monitoring+2 |
| 2012-12-01 | Talk | Clubhack |
The difference between the “Reality” and “Feeling” of Security: Information Security and the Human Being
| Thomas Kurian Ambattu | #security-training#human-factor#risk-management+2 |
| 2012-12-01 | Talk | Clubhack |
Infrastructure Security
| Sivamurthy Hiremath | #blueteam#security-strategy#threat-modeling+1 |
| 2012-10-26 | Talk | Appsecusa |
The 7 Qualities of Highly Secure Software
| Mano Paul | #secure-development#software-security#secure-coding+3 |
| 2012-09-26 | Talk | Nullcon |
Highly Harmful Audio Waves aka DTMF Fuzzing
| Rahul Sasi | #dtmf#red-teaming#fuzzing+3 |
| 2012-09-26 | Talk | Nullcon |
How secure is internet banking in India
| Ajit Hatti | #web-security#authentication#financial-institutions+1 |
| 2012-09-05 | Talk | 44con |
Why Integrity is left alone and not given TLC (Tender, Love and Care) it deserves?
| Jitender Arora | #data-protection#security-strategy#threat-modeling+3 |
| 2012-08-04 | Talk | C0c0n |
Impact of cyber laws on various stakeholders
| Sagar Rahurkar | #security-compliance#security-governance#regulatory-compliance+1 |
| 2012-08-03 | Talk | C0c0n |
Business Continuity and Risk Management in Turbulent Times
| Venkataram Arabolu | #risk-management#business-continuity#security-compliance+2 |
| 2012-08-03 | Talk | C0c0n |
The Management of Information Security – A Corporate Practitioner’s Perspective
| Pawan Kumar Singh | #cyber-law#security-strategy#data-protection+2 |
| 2012-08-03 | Talk | C0c0n |
Data Security
| Alok Vijayant, S Bhansali | #data-protection#encryption#data-loss-prevention+3 |
| 2012-08-03 | Talk | C0c0n |
A model to reduce information security risks due to human error
| Anup Narayanan | #security-training#behavior-change#risk-management |
| 2012-08-03 | Talk | C0c0n |
Gathering security requirements
| K v Prashant, Saleem Ahamed | #security-testing#secure-development#security-development-lifecycle+2 |
| 2012-08-03 | Talk | C0c0n |
The Weakest Link - Reinforcing the Human Element
| Sandeep Godbole | #security-training#human-factor#cybersecurity-education+3 |
| 2012-08-03 | Talk | C0c0n |
Building Security Incident Detection & Handling Capabilities in Enterprises
| Sunil Varkey | #blueteam#incident-detection#security-strategy+4 |
| 2012-08-03 | Talk | C0c0n |
Contemporary Transcription and Resource Parasitism
| Arpit Patel | #exploitation#firewall#network-monitoring+1 |
| 2012-08-03 | Talk | C0c0n |
Enterprise server security
| Raghav Shandilya | #blueteam#security-tools#network-monitoring+2 |
| 2012-03-16 | Talk | Blackhat |
IVR Security- Internal Network Attack via Phone Lines
| Rahul Sasi | #red-teaming#ivrs#network-pentesting+3 |
| 2012-03-15 | Talk | C0c0n |
Integrated Dial 100 System for Law Enforcement
| Nandkumar Saravade, R Srikumar | #security-governance#compliance-governance#security-operations-center |
| 2012-02-15 | Talk | Nullcon |
Shall we dust Beep? The Geo-strategic realities of Cyberwar
| Pukhraj Singh | #cyber-war#security-strategy#attack-surface |
| 2012-02-15 | Talk | Nullcon |
Cyberspace: Global commons or a national asset
| Kamlesh Bajaj | #cyber-law#cybersecurity-framework#incident-management+1 |
| 2012-02-15 | Talk | Nullcon |
Application security cost management
| Ketan Vyas | #blueteam#application-pentesting#secure-development+2 |
| 2011-11-17 | Talk | Deepsec |
Behavioral Security: 10 steps forward 5 steps backward
| Sourabh Satish | #security-training#behavioral-change#risk-management+2 |
| 2011-10-08 | Talk | C0c0n |
Stratagemizing Security Against Perpetrators In Cloud Infrastructure
| K S Abhiraj | #blueteam#cloud-security-posture-management#cloud-pentesting+4 |
| 2011-10-07 | Talk | C0c0n |
Section 43A IT Act compliance
| Sagar Rahurkar | #cyber-law#compliance-frameworks#cybersecurity-strategy+1 |
| 2011-09-19 | Talk | Brucon |
Step-by-Step for Software Security (that anyone can follow)
| Pravir Chandra | #software-security#secure-development#devsecops+4 |
| 2011-09-19 | Talk | Hacklu |
The travelling hacksmith
| Saumil Shah | #red-teaming#ethical-hacking#exploit-delivery+2 |
| 2011-09-07 | Talk | Securitybyte |
Social Web & Privacy – An evolving world
| Bala Sathiamurthy, Aridaman Tripathi | #data-protection#api-security#security-compliance+2 |
| 2011-09-06 | Talk | Securitybyte |
Application Security Strategies
| K K Mookhey | #secure-coding#secure-development#web-security+3 |
| 2011-09-06 | Talk | Securitybyte |
Security Threats on Social Networks
| Nithya Raman | #social-engineering#web-security#security-training+1 |
| 2011-03-15 | Talk | Nullcon |
Information Warfare Ñ The Indian Perspective
| Alok Vijayant | #cybersecurity-strategy#risk-management#security-training+1 |
| 2011-02-25 | Talk | Nullcon |
Chupa Rustam
| Abhijeet Hatekar | #surveillance#red-teaming#application-pentesting+2 |
| 2011-02-25 | Talk | Nullcon |
Cyber Crime 101 - Cost of cybercrime, trends & analysis
| Simran Gambhir, Cn Shashidhar | #cyber-crime#financial-institutions#attack-surface+2 |
| 2011-02-25 | Talk | Nullcon |
Security Analysis of India’s Electronic Voting Machines: Memoirs of a whistleblower
| Hari Krishna Prasad Vemuru | #evm#red-teaming#hardware-embedded+3 |
| 2011-02-25 | Talk | Nullcon |
Enterprise Paradigm for Controlling Data Leakage
| Deepak Rout | #data-leak#blueteam#data-loss-prevention+3 |
| 2011-02-25 | Talk | Nullcon |
Incident Management and Beyond
| Dinesh O Bareja | #incident-management#data-leak#phishing+2 |
| 2011-02-25 | Talk | Nullcon |
Hacking the Parliament – A classic Social Engineering attack
| Anurag Dhanda | #social-engineering#reconnaissance#security-strategy+2 |
| 2011-02-25 | Talk | Nullcon |
Protect infrastructure or protect information – Lessons from Wikileaks
| Vishal Gupta | #data-leak#blueteam#data-protection+2 |
| 2010-11-25 | Talk | Deepsec |
Developers are from Mars, Compliance Auditors are from Venus
| Neelay S Shah | #security-compliance#security-governance#risk-management+4 |
| 2010-10-29 | Talk | T2 |
Hacking Femtocells
| Ravishankar Borgaonkar, Kevin Redon | #reverse-engineering#device-security#hardware-embedded+3 |
| 2010-08-01 | Talk | C0c0n |
Overview of Cyber Legal Systems in India
| Sagar Rahurkar | #cyber-law#cyber-resilience#cybersecurity-strategy+4 |
| 2010-08-01 | Talk | C0c0n |
Hackers’ EcoSystem in India
| Rohit Srivastwa | #security-assessment#security-training#risk-management |
| 2010-04-21 | Talk | Hitbsecconf |
Web Security – Going Nowhere?
| Saumil Shah | #red-teaming#application-hardening#application-pentesting+4 |
| 2010-03-15 | Talk | Blackhat |
400 Apps in 40 Days
| Nish Bhalla, Sahba Kazerooni | #risk-management#application-pentesting#attack-surface+1 |
| 2010-02-25 | Talk | Nullcon |
Quantum Computing Challenges in the field of security
| Navin Pai | #quantum-computing#security-strategy#threat-modeling+3 |
| 2009-12-05 | Talk | Clubhack |
Risk Based Penetration Testing
| Nikhil Wagholikar, K K Mookhey | #security-assessment#incident-management#cybersecurity-strategy+1 |
| 2009-12-05 | Talk | Clubhack |
Indian IT Act 2000 vs 2009
| Rohas Nagpal | #cyber-law#embedded-systems#firmware-analysis+4 |
| 2009-12-04 | Talk | Clubhack |
Facilitate Collaboration with Information Rights Management
| Abhijit Tannu | #information-rights-management#data-protection#application-hardening+4 |
| 2009-11-18 | Talk | Securitybyte |
Risk based Penetration Testing
| K K Mookhey | #security-assessment#risk-management#ethical-hacking+3 |
| 2009-11-17 | Talk | Securitybyte |
Threat Modeling
| Varun Sharma | #threat-modeling#blueteam#security-strategy+4 |
| 2009-11-17 | Talk | Securitybyte |
Business Continuity Case Study
| Venkataram Arabolu | #business-continuity#risk-management#business-resilience+3 |
| 2009-11-17 | Talk | Securitybyte |
Business Case-Risk Management/Compliance at AMITY
| Js Sodhi | #security-compliance#security-governance#risk-management+2 |
| 2009-11-17 | Talk | Securitybyte |
Usability and Privacy in Security
| Ponnurangam Kumaraguru | #data-protection#architecture#security-training+2 |
| 2009-10-28 | Talk | Hacklu |
Ownage 2.0
| Saumil Shah | #red-teaming#ethical-hacking#exploit-delivery+2 |
| 2009-08-06 | Talk | C0c0n |
Cyber Forensics
| Krishna Sastry Pendyal | #forensics#digital-forensics#data-leak+4 |
| 2009-08-06 | Talk | C0c0n |
Information Security Audit
| Venkatapathy Subramaniam | #security-compliance#security-governance#audit+1 |
| 2009-08-06 | Talk | C0c0n |
Cyber Victimisation
| K Jaishankar | #cybersecurity-education#security-training#risk-management+1 |
| 2009-08-06 | Talk | C0c0n |
Information Warfare
| A a Gafoor, Vinayak Mishra | #threat-hunting#threat-modeling#security-training+2 |
| 2009-08-06 | Talk | C0c0n |
Know Your Enemy, and Yourself: Demystifying Threat Modelin
| Meera Subbarao | #blueteam#security-strategy#threat-modeling+4 |
| 2009-08-06 | Talk | C0c0n |
Management & Security of Large Scale Storage Devices
| Prashant Dinde | #blueteam#data-protection#security-strategy+2 |
| 2009-08-06 | Talk | C0c0n |
Microsoft Security Strategies
| Binoy VC | #blueteam#security-strategy#azure+4 |
| 2008-12-06 | Talk | Clubhack |
State of Cyber Law in India
| Rohas Nagpal | #cyber-law#cyber-resilience#cybersecurity-framework+4 |
| 2008-12-06 | Talk | Clubhack |
Economic offenses through Credit Card Frauds Dissected
| Harshad Patil | #fraud#identity-theft#financial-institutions |
| 2008-12-06 | Talk | Clubhack |
Immune IT: Moving from Security to Immunity
| Ajit Hatti | #blueteam#security-strategy#security-monitoring+4 |
| 2008-08-07 | Talk | Blackhat |
Got Citrix, Hack It!
| Shanit Gupta | #red-teaming#rdp#application-pentesting+1 |
| 2008-03-26 | Talk | Cansecwest |
Vulnerabilities Die Hard
| Kowsik Guruswamy | #red-teaming#ethical-hacking#exploit-delivery+2 |
| 2008-02-20 | Talk | Blackhat |
Hacking VoIP through IPSec Tunnels
| Sachin Joglekar, Sudeep Patwardhan | #voip#red-teaming#gsm+2 |
| 2007-12-09 | Talk | Clubhack |
7 years of Indian IT act - 7 Best Cases
| Rohas Nagpal | #cyber-law#data-governance |
| 2007-04-18 | Talk | Cansecwest |
Low-Rate Denial-of-Service attacks
| Anil Kumar | #red-teaming#dos#network-defense+2 |
| 2005-07-28 | Talk | Blackhat |
Rapid Threat Modeling
| Akshay Aggarwal | #threat-modeling#red-teaming#security-strategy+4 |
| 1998-07-29 | Talk | Blackhat |
Security as an enabler for new business opportunities - The Business Value of Security
| Karan Khanna | #risk-management#business-continuity#cyber-resilience+3 |