🧪 Experimental Feature

Focus Areas are an experimental feature that groups related content by tags. This page and its functionality may change as we refine the categorization system.

⚖️ Governance, Risk & Compliance

Security governance, risk management, and compliance frameworks

382
Contributors
267
Talks
31
Tool Demos
72
Panels
3
Keynotes

Top Contributors

Ajit Hatti(15) Saumil Shah(12) Sunil Varkey(11) Vandana Verma Sehgal(10) Burgess Cooper(8)

Related Tags (26)

Show all 26 tags...

All Entries (373 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-12-11Tool demoBlackhat ThreatShield – The Intelligent Way of Threat Modelling Source Code Satyam Nagpal, Sayooj B Kumar, Ashwin Shenoi#threat-modeling#security-strategy#architecture+1
2025-10-10TalkC0c0n Ghosts in Your GitHub Actions and AI’s Hunt for Hidden Exploits Source Code Suchith Narayan#supply-chain#supply-chain-attack#devsecops+1
2025-08-07Tool demoBlackhat Frogy 2.0 - Automated external attack surface analysis toolkit Source Code Chintan Gurjar#attack-surface#vulnerability-assessment#asset-management+2
2025-08-07Tool demoBlackhat Cloud Offensive Breach and Risk Assessment (COBRA) Source Code Harsha Koushik, Anand Tiwari#cloud-pentesting#risk-management#edr
2025-08-06Tool demoBlackhat ThreatShield - The Intelligent way of Threat Modelling Source Code Ashwin Shenoi, Satyam Nagpal, Sayooj B Kumar#threat-modeling#architecture#devsecops+1
2025-08-06PanelBlackhat Hacking the Status Quo: Tales From Leading Women in Cybersecurity Vandana Verma Sehgal, Chi en Shen, Natalie Silvanovich, Maddie Stone#security-training#cybersecurity-education#security-strategy
2025-08-06TalkBlackhat When ‘Changed Files’ Changed Everything: Uncovering and Responding to the tj-actions Supply Chain Breach Presentation Whitepaper Video Varun Sharma, Ashish Kurmi#ci-cd#incident-management#devsecops+2
2025-04-30TalkRsac Got Supply Pain? A Real-World Approach to Supply Chain SDL Video Mohit Arora, Richard Tonry#secure-development#devsecops#risk-management+4
2025-04-29TalkRsac It’s Always Risky in IT: Frontline Stories and Strategic Insights Whitepaper Video Gourav Nagar, Rohit Bansal#risk-management#security-compliance#cyber-resilience+4
2025-04-04PanelBlackhat Locknote: Highlights & Key Takeaways from Black Hat Asia 2025 Vandana Verma Sehgal, Daniel Cuthbert, Ryan Flores, Vitaly Kamluk, Jeff Moss, Asuka Nakajima#security-strategy#cybersecurity-framework#digital-learning+1
2025-04-03Tool demoBlackhat Mantis - Asset Discovery at Scale Source Code Hitesh Thakur, Praveen Kanniah, Prateek Thakare#asset-inventory#cloud-workload-protection#security-tools+4
2025-04-03Tool demoBlackhat SCAGoat - Exploiting Damn Vulnerable and Compromised SCA Application Source Code Hare Krishna Rai, Gaurav Joshi, K v Prashant#supply-chain#supply-chain-attack#sca+1
2025-03-02PanelNullcon Unlocking India’s Cyber Potential through Strategic Policies, R&D Support, and Robust Public-Private Partnerships Atul Kumar, Savita Utreja#cybersecurity-framework#cybersecurity-strategy#cyber-law+3
2025-03-02PanelNullcon Cyber Fusion Center: The Command Center for Integrated Cyber Defense Avkash Kathiriya, Mathan Babu Kasilingam, Yogi Kapur#security-monitoring#network-defense#threat-modeling+3
2025-03-02TalkNullcon eKYC Crisis: Securing the Lockers Video Kartik Lalan#risk-management#architecture#data-leak+4
2025-03-02PanelNullcon How can organisations protect themselves against Advanced Cyber Threats Bithal Bhardwaj, Vishal Salvi#security-strategy#incident-management#phishing+1
2025-03-02PanelNullcon Modernizing Security Architecture: Platforms or Best-of-Breed, What Works Best? Ketan Vyas, Prajal Kulkarni, Satyavathi Divadari, Srihari Kotni#security-strategy#threat-modeling#zero-trust+3
2025-03-02PanelNullcon Enterprise Readiness for Supply Chain Attacks Sanjay Bahl, Cassie Crossley#supply-chain-security#supply-chain-attack#third-party-risk-management+4
2025-03-02TalkNullcon Securing the chains: Building defensive layers for software supply chains Video Yadhu Krishna M, Akhil Mahendra, Hritik Vijay#blueteam#container-security#sbom+3
2025-03-01PanelNullcon Converging IT and OT Security: Unified strategies for protection, detection and response Burgess Cooper, Kuldeep Singh, Shailendra Fuloria, Rohit Sharma, Sachin Burman, Yask Sharma#ics-security#cloud-workload-protection#security-strategy+1
2025-03-01PanelNullcon Cyber Tech 2030: The Next Chapter in AI, Zero Trust & Offensive Defense Ajit Hatti, Varun Singla#ai-security#zero-trust#ai+3
2025-03-01PanelNullcon Navigating Data Protection in the age of globalisation Saikat Datta, Krishan Dev#data-protection#gdpr#data-governance+4
2024-12-12PanelBlackhat Locknote: Conclusions and Key Takeaways from Black Hat Europe 2024 Vandana Verma Sehgal, Jeff Moss, Stefano Zanero, James Forshaw, Meadow Ellis#security-strategy#cybersecurity-framework#cyber-resilience+2
2024-12-11TalkBlackhat The CVSS Deception: How We’ve Been Misled on Vulnerability Severity Presentation Ankur Sand#blueteam#security-strategy#threat-modeling+1
2024-11-16TalkC0c0n Breach of the borderless: Cyber threat actors targeting India’s cyberspace Abhijith B R#threat-hunting#cybersecurity-strategy#cyber-war+2
2024-11-16PanelC0c0n When Falcon Strikes Back: The Defender’s Dilemma Burgess Cooper, Shivkumar Pandey, A Shiju Rawther, Padnya Manwar, Kishan Kendre#incident-management#security-strategy#threat-modeling+2
2024-11-16TalkC0c0n The subtle art of checkmating CISOs Video Sunil Varkey#risk-management#architecture#security-governance+2
2024-11-16TalkC0c0n Old Bugs, New Tricks: How N-Day Vulnerabilities Are Fueling Today’s Threat Landscape Dharani Sanjaiy#bug-hunting#exploit-delivery#security-strategy+1
2024-11-15TalkC0c0n CISO’s take on BYOAI Video Venugopal Parameswara#risk-management#security-governance#security-compliance+3
2024-11-15TalkC0c0n GenAI and Autonomous Security in the Age of Zero Trust Video Philip Varughese Vayarakunnil#ai#ai-security#zero-trust+2
2024-11-15PanelC0c0n Intelligence led security Midhun Babu, Sameer Ratolikar, M v Sheshadri, A Shiju Rawther, Maya R Nair, Balakrishnan A#security-strategy#data-analytics#ai-security+1
2024-08-29Tool demoHitbsecconf Mantis Source Code Bharath Kumar, Akshay Jain#asset-inventory#dast#anti-phishing
2024-08-09TalkDefcon Reflections on a Decade in Bug Bounties: Experiences and Major Takeaways Video Nikhil Shrivastava, Charles Waterhouse#bug-hunting#bug-bounty#security-training+3
2024-08-08Tool demoBlackhat Active Directory Cyber Deception using Huginn Source Code Rohan Durve, Paul Laine#active-directory#incident-management#identity-governance+3
2024-05-09TalkRsac The Good, the Bad, and the Bounty: 10 Years of Buying Bugs at Microsoft Video Aanchal Gupta, Katie Moussouris#bug-bounty#risk-management#security-governance
2024-05-08TalkBlackhat Cloud and Platform Agnostic Security Posture Management (xSPM) Video Sunil Arora, Parthasarthi Chakraborty#cloud-security-posture-management#security-strategy#security-compliance
2024-05-08TalkRsac How to CTF Infra - Beyond the Challenges and Flags Presentation Jayesh Chauhan, Max Gartman#ctf#cloud-workload-protection#security-strategy+2
2024-05-07TalkRsac Anatomy of a Vulnerability Response - A View from the Inside Video Mohit Arora, Richard Tonry#incident-management#risk-management#compliance-governance
2024-05-07TalkRsac A Proven Approach on Automated Security Architectural Pattern Validation Video Sunil Arora, Parthasarathi Chakraborty#architecture#devsecops#risk-management+1
2024-05-06TalkRsac Headspace’s Privacy Operations Center and Vault Video Shobhit Mehta, Puneet Thapliyal#data-protection#security-operations-center#security-compliance+1
2024-04-19TalkBlackhat China’s Military Cyber Operations: Has the Strategic Support Force Come of Age? Presentation Pukhraj Singh#ics-security#risk-management#architecture
2024-04-18Tool demoBlackhat Mantis - Asset Discovery at Scale Source Code Ankur Bhargava, Prateek Thakare, Saddam Hussain#asset-inventory#architecture#devsecops+1
2024-04-18Tool demoBlackhat Catching adversaries on Azure - Deception on Cloud Source Code Subhash Popuri#azure#cloud-workload-protection#cloud-pentesting+4
2024-04-18Tool demoBlackhat DetectiveSQ: A Extension Auditing Framework Version 2 Govind Krishna, Xian Xiang Chang#audit#application-pentesting#ai-security+4
2024-03-12TalkNullcon Secure Web Gateways are dead. What’s next? Vivek Ramachandran#browser-security#application-hardening#security-strategy+2
2024-03-11TalkNullcon Hacking Trains Presentation Jaden Furtado#hacking#ics-security#network-forensics+2
2023-12-07Tool demoBlackhat Mantis - Asset Discovery at Scale Source Code Prateek Thakare, Bharath Kumar, Praveen Kanniah#red-teaming#asset-inventory#asset-management+2
2023-09-24PanelNullcon A CYBER-PHYSICAL SYSTEM FOR INDIA WITH SECURITY, PRIVACY, AND EQUITY Kunal Korgaonkar, Kapil Jaiswal, Malcolm Dsouza, Manoj Aggarwal, Niraj Sharma#cyber-physical-systems#security-strategy#data-protection+1
2023-09-24PanelNullcon C4CII - SECURING USE OF CLOUD IN CRITICAL INFORMATION INFRASTRUCTURE Saikat Datta, Akash Mahajan, Varun Singla, Navin Kumar Singh, Phil Rodrigues#cloud-security-posture-management#cloud-workload-protection#critical-infrastructure+3
2023-09-24PanelNullcon ADVERSARY SIMULATION AND INCIDENT RESPONSE IMPACT Shomiron Das Gupta, Yogi Kapur, Manish Tiwari#incident-management#incident-detection#forensics+3
2023-09-23PanelNullcon CRITICAL INFORMATION INFRASTRUCTURE(CII) PROTECTION: CHALLENGES AND OPPORTUNITIES- HOW CAN THE NULLCON COMMUNITY CONTRIBUTE Video Saikat Datta, M v Sheshadri, Madhavi Purandare, Mathan Babu Kasilingam, Navin Kumar Singh#critical-infrastructure#cybersecurity-framework#security-strategy+4
2023-09-23PanelNullcon DATA PROTECTION LAW AND ITS POTENTIAL IMPLICATIONS FOR THE INDUSTRY Burgess Cooper, Ashish Bhadouria, Jimmi Thakkar, Sunil Bajpai#data-protection#gdpr#cyber-law
2023-08-12TalkDefcon Getting More Bang for your Buck:Appsec on a Limited Budget Video Vandana Verma Sehgal, Viraj Gandhi#secure-development#devsecops#risk-management+2
2023-08-10TalkBlackhat Does Public Disclosure of Vulnerabilities Affect Hacker Participation in Bug Bounty Programs? Presentation Amit Deokar, Ali Ahmed, Brian Lee#bug-hunting#incident-management#security-strategy+4
2023-08-10TalkDefcon Attacking Vehicle Fleet Management Systems Presentation Video Yashin Mehaboobe#automotive-cybersecurity#ics-security#embedded-systems+4
2023-08-09TalkBlackhat Diversity Microtalks: Perspectives on Creating Change Presentation Aastha Sahni, Andy Ellis, Meghan Jacquot, Sherri Davidoff#security-training#risk-management#security-governance
2023-08-09TalkBlackhat Identifying and Reducing Permission Explosion in AWS: A Graph-Based and Analytical Approach Presentation Pankaj Moolrajani#aws#cloud-security-posture-management#cloud-workload-protection+2
2023-08-09Tool demoBlackhat CASPR - Code Trust Auditing Framework Source Code Ajit Hatti#secure-coding#code-review#secure-development+1
2023-08-07PanelC0c0n DPDP Act - Transformation challenges for BFSI Video Linson Paul, Venugopal Parameswara, Biju K, Babitha B P, Santosh Khadsare#data-protection#gdpr#compliance-frameworks+4
2023-08-07TalkC0c0n Citizen Mobile Security: Responsibilities, Accountability, and Impacts Satyendra Verma#security-training#risk-management#compliance-governance
2023-08-07TalkC0c0n Cyber Threats to Global Financial Systems Video Lince Lawrence#incident-management#risk-management#cloud-monitoring+4
2023-08-07TalkC0c0n ESOC Trinetra Project Pankaj Kumar Dalela#security-governance#risk-management#security-training
2023-08-07PanelC0c0n Evolving Threat Landscape: Strategies for Adapting and Innovating in Cybersecurity Vikas Arora, Sanjay Singh, Baidyanath Kumar, Saurabh Gugnani, Gokulavan Jayaraman, Vijay Nair#security-strategy#threat-modeling#security-training+3
2023-08-07TalkC0c0n Generative AI and Cyber Crimes Video Brijesh Singh#security-training#risk-management#threat-hunting
2023-08-07TalkC0c0n Trust Resiliency - A Lesson Learned from Russia Ukraine War Video Ajit Hatti#incident-management#architecture#risk-management+1
2023-08-07TalkC0c0n The DPDPA Effect: Jubilation, Twinge and Reticence that followed Video Rahul Sharma#security-compliance#security-governance#data-protection+1
2023-08-07PanelC0c0n CII Protection: How can the c0c0n community contribute ? Navin Kumar Singh#security-strategy#open-source-security#threat-modeling
2023-08-06PanelC0c0n Power of Control: Navigating the PDP Act Video Prem Kamath, K Kamaneesh, Swapnil Bangali, Rahul Sharma, Dinesh O Bareja#cyber-law#compliance-frameworks#cybersecurity-strategy+3
2023-08-06TalkC0c0n Securing the Future: Addressing Cybersecurity Challenges in the Age of 5G Video Altaf Shaik#zero-trust#supply-chain-security#attack-surface+4
2023-08-06TalkC0c0n CBDC and future of Finance Video Sunil Raveendran#digital-currency#decentralized-systems#compliance-governance+2
2023-08-06PanelC0c0n nGen Cyber Threats - 2024 and Beyond: Embracing Chaos, Taking Charge Murli Nambiar, A Shiju Rawther, Jacxine Fernandez, Vishal Salvi, Sridhar Govardhan#security-strategy#cybersecurity-framework#cyber-resilience+2
2023-08-06TalkC0c0n AI in Cyber Security and Crime Prevention Vishal Salvi#ai#ai-security#deep-learning+3
2023-08-06TalkC0c0n Insider Threats - Best Practices and Common Pitfalls Video Georgie Kurien#insider-threats#risk-management#security-training+1
2023-08-06TalkC0c0n Cryptocurrencies and challenges to Law Enforcement Agencies Bhushan Gulabrao Borase#decentralized-systems#digital-currency#security-compliance+1
2023-08-06TalkC0c0n Cybercrimes Victim Compensation : Legal Remedies and Process Nisheeth Dixit#security-compliance#security-governance#risk-management+1
2023-08-06TalkC0c0n Digital Innovation and its Impact on CIOs, CISOs and DPOs Navaneethan M#security-compliance#security-governance#risk-management+2
2023-08-06TalkC0c0n Emerging crimes and threat landscape in cyber domain and the need for international cooperation Video Kiran Sivakumar#threat-landscape#threat-modeling#risk-management
2023-08-06TalkC0c0n Influence of Artificial Intelligence in GRC Space Mahesh Kalyanaraman#security-governance#risk-management#security-compliance+2
2023-08-06TalkC0c0n Playing cat and mouse with the Adversary: Sometimes a breach is inevitable Video Abhijith B R#incident-management#risk-management#security-strategy+1
2023-08-06TalkC0c0n Subduing Adversaries with Information Superiority Video Antony K M#threat-hunting#security-monitoring#threat-detection+2
2023-08-06TalkC0c0n Survivability in the Cyber World Video Sunil Varkey#incident-management#risk-management#architecture
2023-05-12PanelBlackhat Trends and Top Takeaways from Black Hat Asia Sudhanshu Chauhan, Ty Miller, Jeff Moss, Asuka Nakajima, Pamela O Shea#cybersecurity-strategy
2023-04-26TalkRsac Is Increasing Security Maturity And Decreasing Operational Load Possible? Video Rohit Dhamankar#risk-management#architecture#security-governance+1
2023-04-26TalkRsac Designing Product Security for a Brighter Smile and a Healthier Tomorrow Presentation Video Lokesh Pidawekar, Apoorva Phadke#secure-development#devsecops#software-security+2
2023-04-21TalkHitbsecconf LOCKNOTE:THE HAND THAT STRIKES, ALSO BLOCKS Presentation Video Saumil Shah#architecture#risk-management#security-training+1
2023-03-09PanelNullcon Elements of a Successful Security Strategy: A Comprehensive Approach Video Sheetal Joseph, Sybe Izzak Rispens, Travis Carelock#security-strategy#security-testing#secure-development+4
2022-12-08PanelBlackhat Locknote: Conclusions and Key Takeaways from Day 2 Anant Shrivastava, Jeff Moss, Jiska Classen, Leigh Anney Galloway, Federico Maggi#security-strategy#threat-modeling#cybersecurity-training+2
2022-12-07Tool demoBlackhat Patronus: Swiss Army Knife SAST Toolkit Source Code Akhil Mahendra, Akshansh Jaiswal, Ashwin Shenoi#sast#software-composition-analysis#asset-inventory+1
2022-09-28TalkRootcon Gazing into the Crystal Ball - The Fog of Cyberwarfare Escalations Harshit Agrawal#ics-security#architecture#risk-management
2022-09-24TalkC0c0n Rationalizing Cyber Security Risk in Risk Language Anish Koshy#risk-management#security-governance#cybersecurity-strategy+3
2022-09-24PanelC0c0n MoonWorking’ and associated legal, ethical, security aspects Georgie Kurien, Sreekumar Balachandran, Sony A, Robin Joy#cybersecurity-strategy#threat-modeling#cyber-law
2022-09-24TalkC0c0n Building Smart, Resilient and Sustainable Cyber Eco System Navin Kumar Singh#risk-management#cybersecurity-strategy#architecture+4
2022-09-24TalkC0c0n Cyber Defence and Role of private players - public private partnership Jasbir Singh Solanki#security-governance#risk-management#security-compliance+1
2022-09-24TalkC0c0n In production with GRC for cloud Mahesh Kalyanaraman#cloud-compliance#security-governance#risk-management+1
2022-09-24TalkC0c0n Power of Narratives in Cyber Security Sunil Varkey#security-training#cybersecurity-education#human-factor+2
2022-09-24PanelC0c0n Data sovereignty - Challenges and the road ahead Sanjeev Sharma, Saranga Rajan, A Muralidhar, Jojy Joy#data-governance#data-protection#gdpr+2
2022-09-23PanelC0c0n What ails the Indian cybersecurity startup ecosystem? Sunil Varkey, Ajit Hatti, Akash Mahajan, Aseem Jakhar, Shubham Mittal#cybersecurity-strategy#business-resilience#cyber-law+3
2022-09-23TalkC0c0n Startup Ecosystem and Investments in Post Covid Era Sunil Kanchi#risk-management#security-compliance#security-governance+2
2022-09-23TalkC0c0n Rolling out Central Bank Digital Currency - Technical Design Considerations Sunil Raveendran#architecture#compliance-governance#risk-management+1
2022-09-23PanelC0c0n Customer, Credit & Risk - Fintech trends 2022 Maya R Nair, Balakrishnan A, A Shiju Rawther, Linson Paul, Shivanath Somanathan#financial-institutions#data-protection#identity-theft+2
2022-09-23TalkC0c0n Technological Reliance for Resilience Tulika Pandey#risk-management#cyber-resilience#architecture+2
2022-09-23PanelC0c0n Digital Apocalypse: Emerging cybersecurity challenges and future Crimes Nidhish Bhatnagar, Amit Dubey, Philip Varughese Vayarakunnil, Rahul Sasi, Saranga Rajan, Suhel Daud#cybersecurity-strategy#cyber-crime#digital-currency
2022-09-23TalkC0c0n Battle of 300 Crore - how they lost it and got most of it back Prashant Choudhary#incident-management#risk-management#architecture
2022-09-23TalkC0c0n Collaborative efforts for safe digital banking Biju K#secure-development#risk-management#architecture
2022-09-23TalkC0c0n Cybersecurity for Manufacturing Santhosh Srinivasan#ics-security#control-systems#critical-infrastructure+2
2022-09-23TalkC0c0n Maximizing ROI on cyber security investments: Do you think Adversary Simulation OR Purple teaming holds the key? Presentation Abhijith B R#risk-management#architecture#devsecops
2022-09-23TalkC0c0n Building a Safer and Innovative Digital Ecosystem Vijay Pamarathi#secure-development#devsecops#software-security+2
2022-09-23TalkC0c0n Log4j vulnerability continuous to be favourite for APT groups through mid 2022 Niranjan Jayanand#security-assessment#apt#exploit-kit+1
2022-09-23TalkC0c0n Ransomware: Prevention, Early Detection and Response Babitha Bp#ransomware#incident-management#malware-prevention+2
2022-09-08TalkNullcon vPrioritizer: Art of Risk Prioritization Presentation Pramod Rana#vulnerability-assessment#security-development-lifecycle#risk-management+3
2022-09-07TalkNullcon Unearthing Malicious And Other “Risky” Open-Source Packages Using Packj Presentation Video Devdutt Patnaik, Ashish Bijlani#open-source-security#supply-chain#supply-chain-attack+3
2022-09-06PanelNullcon Securing India The CERTIn Way Video Saikat Datta, Sanjay Bahl, Ajit Menon, Anuprita Daga#security-strategy#cybersecurity-framework#incident-management+3
2022-09-06PanelNullcon Unlocking Security Collaboration With Cyber Threat Intelligence Video Avkash Kathiriya, Varun Singla, Mathan Babu Kasilingam, Amol Naik#intelligence-sharing#attack-surface#cybersecurity-strategy+1
2022-09-06PanelNullcon Impact of disruptive technologies on CISO’s career & progression Video Burgess Cooper, Sandeep Karan, Jacxine Fernandez, Ravi Kumar, Ankur Bhargava#security-strategy#cybersecurity-framework#ai-security
2022-09-06PanelNullcon Cloud Services for Financial Inclusion: Possibilities & Challenges Video Nandkumar Saravade, Ganesh Ar, Himanshu Das, Navin Kumar Singh#cloud-compliance#cloud-monitoring#financial-institutions+2
2022-09-06PanelNullcon PAM Maturity From Zero Trust To Least Privilege Video Ajay Bongirwar, Charanjit Bhatia, Bala Ramanan#security-strategy#zero-trust#access-management+2
2022-09-06PanelNullcon Secure Service Edge (SSE): Challenges & Upsides of Adoption Video Rahul Neel Mani, Anuprita Daga, Rajesh Hemrajani#cloud-workload-protection#threat-modeling#zero-trust+1
2022-08-25TalkHitbsecconf MPT: Pentest In Action Presentation Video Jyoti Raval#security-assessment#application-pentesting#asset-management+2
2022-08-14TalkDefcon Tales from the trenches - why organizations struggle to get even the basics of OT asset visibility & detection right Vivek Ponnada#ics-security#risk-management#architecture+1
2022-08-11Tool demoBlackhat Patronus: Swiss Army Knife SAST Toolkit Source Code Akhil Mahendra, Akshansh Jaiswal, Ashwin Shenoi#sast#software-composition-analysis#asset-inventory+4
2022-08-11TalkThedianainitiative Connecting Dots Between Security Teams & Customer Expectations Video Shruthi Kamath#security-governance#risk-management#architecture+2
2022-08-11TalkThedianainitiative The Real Cost of Free: What you need to know before downloading a free app Video Ruchira Pokhriyal#app-security#data-protection#security-training+1
2022-08-10TalkBlackhat The Open Threat Hunting Framework: Enabling Organizations to Build, Operationalize, and Scale Threat Hunting Presentation Source Code Sameer Koranne, John Dwyer, Neil Wyler#threat-hunting#security-strategy#threat-modeling
2022-08-10Tool demoBlackhat CASPR - Code Trust Audit Framework Source Code Ajit Hatti#secure-coding#secure-development#security-tools+3
2022-07-23TalkMaycontainhackers How would a real life social media be like? Aditi Bhatnagar#data-protection#security-training#risk-management+3
2022-05-18PanelPhdays Challenges for cybersecurity conferences. Part II Aseem Jakhar, Timur Yunusov, Igor Lukic, Dhillon Andrew Kannabhiran#security-training#cybersecurity-strategy#threat-modeling+3
2022-05-12PanelBlackhat Locknote: Conclusions and Key Takeaways from Black Hat Asia 2022 Vandana Verma Sehgal, Jeff Moss, Ryan Flores, Lidia Giuliano, Stefano Zanero#security-strategy
2022-05-12Tool demoBlackhat Mitigating Open Source Software Supply Chain Attacks Source Code Ajinkya Rajput, Ashish Bijlani#open-source-security#supply-chain#supply-chain-attack+3
2022-04-08TalkNullcon Bheem OS - A next-generation reasonably secure OS using Rust MicroVM Video Akram Ansari, Subash Sn#os#virtual-machine#container-security+3
2021-11-18TalkHackinparis Is it really an intrusion if you get called in?: Mis-configuration based attacks in AWS Kavisha Sheth#aws#cloud-workload-protection#cloud-pentesting+3
2021-11-13TalkC0c0n Third Party Risk Management Mahesh Kalyanaraman#risk-management#compliance-governance#supply-chain+2
2021-11-13TalkC0c0n Cybersecurity in the era of Resilience - A walk through people, process and technology Babitha B P#risk-management#cyber-resilience#architecture+3
2021-11-13TalkC0c0n Changing Cyber Security Paradigm & Cyber Tsunami Sunil Varkey#cybersecurity-strategy#threat-landscape#risk-management+3
2021-11-13TalkC0c0n Post pandemic Transformation - A CISO’s perspective Sridhar Govardhan#risk-management#security-governance#security-compliance+3
2021-11-13TalkC0c0n Connecting the dots between customers and security teams Shruthi Kamath#incident-management#security-training#devsecops+1
2021-11-13TalkC0c0n Crisis Capitalization in a Pandemic Greeshma M R#risk-management#incident-management#security-training+2
2021-11-13TalkC0c0n Need for Zero Trust in Banking Biju K#zero-trust#risk-management#architecture+1
2021-11-13TalkC0c0n Painting Your Organizations with Shades of Red, Blue & Purple Video Hidayath Khan#red-teaming#ethical-hacking#threat-modeling+2
2021-11-13TalkC0c0n Light Basin - Telecom roaming network attack case study Video Akib Sayyed#network-pentesting#network-traffic-analysis#gtp+2
2021-11-12TalkC0c0n Post Covid CISOs - Disappearing trusted boundaries and Innovative CyberSecurity Approaches Illyas Kooliyankal#risk-management#architecture#security-governance+1
2021-11-12TalkC0c0n Regulating Social Media Platforms : Should it be done in Democratic Societies ? J Sam Daniel Stalin, Apar Gupta, Dinesh O Bareja, Prashant Mali, Jiten Jain#security-compliance#security-governance#risk-management+3
2021-11-12TalkC0c0n 2021 Supply Chain Attacks Analysis Ajit Hatti#incident-management#risk-management#supply-chain+1
2021-11-12TalkC0c0n Enterprise Governance and Risk Management Arathy Nair, Muskan Mangla#security-compliance#security-governance#risk-management+1
2021-11-12TalkC0c0n The evolving nature of cyber community Aastha Sahni#security-training#risk-management#cybersecurity-education
2021-11-12TalkC0c0n Data Security and Privacy Abhilasha Vyas#data-protection#encryption#data-loss-prevention+3
2021-11-12TalkC0c0n Executive Presence….a cardinal of the cyber rostrum Bishakha Jain#security-training#architecture#security-governance
2021-10-13TalkRootcon The Kill Chain: Future of Cyber in Defense Video Harshit Agrawal#architecture#ics-security#risk-management
2021-08-26TalkHitbsecconf Gazing Ahead: What Modern RF Combat Looks Like in the Next Decade Presentation Video Harshit Agrawal#ics-security#architecture#risk-management
2021-08-08PanelDefcon Resilient cyber space: The role of hacker and security communities Video Manu Zacharia, Aseem Jakhar, Abhijith B R, Jay Turla, Omar Santos, Dave Lewis, Dhillon Kannabhiran#security-training#threat-modeling#incident-management+3
2021-08-07Tool demoDefcon Tenacity- An Adversary Emulation Tool for Persistence Video Atul Nair, Harshal Tupsamudre#incident-management#security-testing#attack-surface
2021-08-06PanelDefcon Adversary simulation, emulation or purple teaming - How would you define it? Video Anant Shrivastava, Vincent Yiu, Martin Ingesen, Jean Marie Bourbon, Samuel Kimmons, Joe Vest#security-testing#incident-management#red-teaming+3
2021-08-05TalkBlackhat 5G IMSI Catchers Mirage Presentation Video Ravishankar Borgaonkar, Altaf Shaik#ios#android#security-strategy+1
2021-08-04Tool demoBlackhat Attack Surface Framework Source Code Prajwal Panchmahalkar, Mauricio Espinosa#network-defense#application-pentesting#attack-surface+1
2021-05-07PanelBlackhat Insights and Predictions: What’s Next in InfoSec Vandana Verma Sehgal, Neil R. Wyler, Lidia Giuliano, Jeff Wilson, Vitaly Kamluk#security-strategy#cybersecurity-training#cybersecurity-framework+2
2021-05-06Tool demoBlackhat Demystifying the State of Kubernetes Cluster Security - The Cloud Native Way Source Code Vasant Kumar, Rupali Dash#kubernetes#audit#secure-coding+1
2021-03-06PanelNullcon From Reactive to Proactive - Operationalizing your Threat Intel Video Akshat Jain, Amit Ghodekar, Suhas Desai, Ambuj Bhalla#data-analytics#cybersecurity-strategy#intelligence-sharing+1
2021-03-05PanelNullcon Tech Startups/Businesses and Infonomics Video Sourabh Issar, Burgess Cooper, Joerg Simon#data-governance#data-protection#cybersecurity-strategy+1
2021-03-05PanelNullcon CyberPhysical Systems Security - Trends, challenges & opportunities Video Frank Sanjay, Khushwant Pawar, Mayur Mehta, Faruk Kazi#industrial-control-systems#operational-technology#embedded-systems+3
2020-11-21TalkAppsecindonesia The caveats of the unseen: Crouching exposure, Hidden Misconfiguration Ashwin Vamshi#architecture#devsecops#risk-management+1
2020-10-07TalkRootcon Zero Trust in the Era of Cloud Presentation Video Vandana Verma Sehgal#zero-trust#cloud-workload-protection#security-strategy
2020-09-18TalkC0c0n Offensive & Scope Based Recon Video Harsh Bothra#reconnaissance#network-architecture#security-strategy+1
2020-09-18TalkC0c0n Supercharging your initial foothold in Red Team engagements Sachin S Kamath#red-teaming#ethical-hacking#exploit-delivery+3
2020-09-18TalkC0c0n Cyber Security Shifts During COVID-19 Video Sunil Kanchi#risk-management#security-training#compliance-governance+1
2020-09-18TalkC0c0n Coping with Digital Transformation - A CISO perspective Video Maya R Nair#risk-management#security-governance#architecture+2
2020-09-18TalkC0c0n COVID-19 Cyber impact on financial sector and remote employees Video Amit Dubey, Tal Catran, Yair Feldman#incident-management#risk-management#cybersecurity-strategy+4
2020-09-18TalkC0c0n Herd Immunity, in the Cyber World Sunil Varkey#security-training#risk-management#architecture
2020-09-18TalkC0c0n Demystifying Zero Trust - A Real world Video Sandeep Variyam#zero-trust#architecture#security-governance+1
2020-08-22TalkThedianainitiative Deploying discreet infrastructure for targeted phishing campaigns Video Sreehari Haridas#phishing#application-pentesting#social-engineering+3
2020-08-22TalkThedianainitiative Internal Red Team Operations Framework - Building your practical internal Red Team Video Abhijith B R#red-teaming#cyber-war#phishing+3
2020-08-22TalkThedianainitiative Automating Threat Hunting on the Dark Web and other nitty-gritty things Video Apurv Singh Gautam#threat-hunting#nlp#machine-learning+1
2020-08-21TalkThedianainitiative Trust, No Trust or Zero Trust - Myth Demystifying Vandana Verma Sehgal#zero-trust#architecture#security-compliance+2
2020-08-07PanelDefcon D0 N0 H4RM: A Healthcare Security Conversation Video Vidha Murthy, Christian Dameff, Jeff Tully, Jessica Wilkerson, Veronica Schmitt, Ash Luft#data-protection#identity-management#security-training+3
2020-08-06PanelBlackhat Locknote: Conclusions and Key Takeaways from Day 2 Aanchal Gupta, Kymberlee Price, Rodrigo Rubira Branco, Stefano Zanero#security-strategy#threat-modeling#cybersecurity-training+2
2020-08-06TalkBlackhat Making an Impact from India to the Rest of the World by Building and Nurturing Women Infosec Community Presentation Video Vandana Verma Sehgal#security-training#cybersecurity-strategy#social-engineering
2020-08-05Tool demoBlackhat vPrioritizer: Learn to say NO to almost every vulnerability (art of risk prioritisation…) Source Code Pramod Rana#risk-analysis#blueteam#security-strategy+4
2020-03-07PanelNullcon Economics Of Data Breach And Attack Video Bhaskar Medhi, Manu Zacharia, Suchit Mishra, Yash Kadakia#data-loss-prevention#data-protection#cybersecurity-strategy+4
2020-03-07PanelNullcon Hack the law: Protection for cybersecurity research in India Video Apar Gupta, Manu Zacharia, Raman Jit Singh Chima, Neelu Tripathy#cyber-law#cybersecurity-strategy#security-development-lifecycle
2020-03-07PanelNullcon Supply Chain Security In Critical Infrastructure Systems Video Manish Tiwari, Suchit Mishra, Faruk Kazi, Cristofaro Mune#supply-chain-attack#supply-chain-security#critical-infrastructure+3
2020-03-06Tool demoNullcon Providence Source Code Swapnil Kumbhar, Akshay Shah#incident-management#linux#macos+2
2020-03-06PanelNullcon Predicting Danger: Building the Ideal Threat Intelligence Model Video Saikat Datta, Sandeep Sharma, Muslim Koser, Shankar Jadhav#ai-security#machine-learning#nlp+3
2019-12-04TalkBlackhat Bring Your Own Token (BYOT) to Replace the Traditional Smartcards for Strong Authentication and Signing Presentation Whitepaper Video Karthik Ramasamy, Eric Hampshire#blueteam#smartcard#mfa+4
2019-11-01TalkAppsecdayaustralia Protecting the Damned: Deploying Insecure Applications at Scale Video Vivek Ramachandran#blueteam#container-security#docker+3
2019-09-28PanelC0c0n Align security and risk management strategies with enterprise objectives Video Abdul Karim Vettiyanickal, George Eapen, Ranjeet Rai, Amit Dubey, Biju K, Kanu Pathania#security-strategy#cybersecurity-framework#cyber-resilience+4
2019-09-28TalkC0c0n Vulnerability Prioritization with Threat Intelligence Muslim Koser, Devesh Vatsa, Rohit Srivastwa, Dinesh O Bareja#threat-intelligence-analysis#automated-scanning#security-assessment+3
2019-09-28PanelC0c0n Implementing Data Protection Frameworks with evolving Technology-Challenges, Opportunities & Solutions B R Nath, Jijy Oommen, Maya R Nair, Ajay Porus, Georgie Kurien#data-protection#data-governance#security-strategy
2019-09-27TalkC0c0n Advanced Persistent Threat and counter measures A a Gafoor#blueteam#apt#network-defense+4
2019-09-27PanelC0c0n Digital Transformation and Evolving Governance Structure Video A Shiju Rawther, Ajith Balagopal, Balakrishnan A, Sreekumar Balachandran#cybersecurity-strategy#security-governance#risk-management+2
2019-09-27TalkC0c0n Securing Payment Data with PCI Security Standards and Programs Nitin Bhatnagar#blueteam#data-protection#secure-development+3
2019-09-27PanelC0c0n Shouldn’t Organization disclose breaches - The need for a shared platform Video Sunil Varkey, Jacxine Fernandez, Rahul Sasi, K K Chaudhary#data-leak#data-protection#security-testing+4
2019-09-27TalkC0c0n Practical Approach to Cyber Security for financial institutions Georgie Kurien#financial-institutions#secure-development#risk-management+2
2019-09-27TalkC0c0n A Day in the Life of a CISO Sridhar Govardhan#security-compliance#security-governance#risk-management+2
2019-09-27TalkC0c0n CISO Mind Set Lopa Mudraa Basuu#risk-management#security-governance#security-compliance+1
2019-09-27TalkC0c0n Industry 4.0 - Security and Compliance Santhosh Srinivasan#ics-security#security-compliance#security-governance+2
2019-09-27TalkC0c0n RANSOMWARE - to pay or not to pay Seshaprakash Kusuma Sreenivasa#ransomware#incident-management#risk-management
2019-09-27TalkC0c0n Block Chain for Secured Automation Sanat Bhat#blueteam#smart-contracts#decentralised-security+1
2019-09-27TalkC0c0n Defense in Depth for Embedded Systems Presentation Jiggyasu Sharma#embedded-systems#blueteam#hardware-embedded+4
2019-09-27TalkC0c0n Looking a decade ahead: Big data, drones , Robots and cyber security. Rahul Sasi#ics-security#architecture#ai-security+2
2019-09-13Talk44con The CISO’s Dilemma Presentation Video Saumil Shah#blueteam#security-strategy#threat-modeling+4
2019-09-12KeynoteGlobalappsec Making a Change, One at a time - Diversity: More than just Gender Vandana Verma Sehgal#security-training#human-factor#cybersecurity-strategy+3
2019-08-29KeynoteHitbsecconf The CISO’s Dilemma Presentation Video Saumil Shah#blueteam#compliance-governance#security-strategy+4
2019-08-08Tool demoDefcon Let’s Map Your Network Source Code Pramod Rana#reconnaissance#blueteam#network-monitoring+4
2019-03-02PanelNullcon CISO Strategy for OT and IoT risk and Threat Management Video Gaurav Shukla, Gomeet Pant, Rakesh Viswanathan, Sudarshan Rajagopal#ics-security#iot-pentesting#cybersecurity-strategy+3
2019-03-02PanelNullcon Navigating Risk in the Changing Business and Technology Landscape Video Rahul Neel Mani, Burgess Cooper, Manish Tiwari, Mannan Godil#risk-management#cybersecurity-strategy#business-resilience+4
2019-03-02PanelNullcon Actionable Intelligence and Cyber Security Video Durga Dube, M v Sheshadri, Rahul Sasi, Shrikant Shitole, Alan White#data-analytics#incident-management#security-analytics+4
2019-03-01PanelNullcon Clear and Present Danger: Cyber Wars will Target Critical Infrastructure Video Sourabh Issar, Sachin Burman, Sudarshan Rajagopal, Somenath Kundu#cyber-war#critical-infrastructure#security-strategy+1
2018-12-05Tool demoBlackhat Mafia: Mobile Security Automation Framework for Intelligent Auditing Source Code Ankur Bhargava, Mohan Kallepalli#audit#security-testing#secure-development+4
2018-11-02TalkHitbsecconf Defending The Enterprise in 2018 Saumil Shah#blueteam#security-strategy#threat-modeling+3
2018-10-15TalkHacklu Come to the dark side! We have radical insurance groups & ransomware Video Ankit Gangwal, Eireann Leverett#ransomware#risk-management#cyber-insurance+2
2018-10-05TalkC0c0n Defending Healthcare Base Jiggyasu Sharma#blueteam#incident-management#security-monitoring+4
2018-10-05TalkC0c0n Resiliency Focus alongside Digital Disruption Lince Lawrence#architecture#risk-management#security-training+2
2018-10-05TalkC0c0n Artificial Intelligence and Social Media Analytics in Criminal Investigation Amit Dubey#ai#ai-security#nlp+3
2018-10-05TalkC0c0n Digital Innovation revolution in Kerala Government Sunil Varkey#cybersecurity-strategy#architecture#risk-management+2
2018-10-05TalkC0c0n Data management challenge for Privacy compliance Maria Bellarmine#data-protection#security-compliance#data-governance+2
2018-10-05TalkC0c0n Adaptive GRC Mahesh Kalyanaraman#security-compliance#security-governance#risk-management
2018-10-05TalkC0c0n Dealing with Changing Threat Landscape Vijendra Katiyar#threat-landscape#threat-hunting#risk-management
2018-10-05TalkC0c0n Future of Mobility & Cyber Security Suja Chandy#automotive-cybersecurity#ics-security#architecture+2
2018-10-05TalkC0c0n Taking cyber security to the board room Amit Pradhan#risk-management#security-compliance#security-governance+2
2018-10-05TalkC0c0n Will Artificial Intelligence And Machine Learning Bring More Threats On Cyber Security? Roshy John#risk-management#architecture#ai-security+2
2018-10-05TalkC0c0n Blockchains as techno-power structures: towards emergence of P2P Politics Sunil Aggarwal#decentralized-systems#decentralised-security#architecture+1
2018-10-04TalkBrucon Disrupting the Kill Chain Video Vineet Bhatia#incident-management#architecture#windows+3
2018-10-03Tool demoBlackhat Angad: A Malware Detection Framework Using Multi-Dimensional Visualization Presentation Source Code Ankur Tyagi#malware-detection#static-analysis#dynamic-analysis+3
2018-08-16TalkUsenix Chipmunk or Pepe? Using Acoustical Analysis to Detect Voice-Channel Fraud at Scale Video Vijay Balasubramaniyan#threat-detection#architecture#machine-learning+1
2018-08-11TalkDefcon Compression Oracle Attacks on VPN Networks Presentation Ahamed Nafeez#vpn#network-architecture#application-pentesting+3
2018-08-09Tool demoBlackhat Mafia: Mobile Security Automation Framework for Intelligent Auditing Source Code Ankur Bhargava, Sagar Popat, Mohan Kallepalli#audit#security-testing#automated-scanning+4
2018-08-09TalkDefcon Anonymous rate-limiting in services with Direct Anonymous Attestation Presentation Video Konark Modi, Alex Catarineu#data-protection#architecture#security-strategy+1
2018-03-15TalkTroopers Defending Microsoft Environments at Scale Presentation Vineet Bhatia#blueteam#windows#azure+4
2018-03-03PanelNullcon IoT : How long till D Day? Video Aseem Jakhar, Shobha Jagathpal, Rishikesh Kamat, Daniel Cisowski, Michael Pyle#iot-device-management#iot-pentesting#embedded-systems+3
2018-03-03PanelNullcon Managing Cyber Risk in the Connected Environment Video Gaurav Shukla, Ramachandra Hegde, Sudarshan Rajagopal, Kabir Mulchandani#security-strategy#threat-modeling#network-monitoring+1
2018-03-02PanelNullcon The complexity of regulation & cybersecurity Video Saikat Datta, Maya R Nair, Nandkumar Saravade, Sanjay Bahl#cybersecurity-framework#cyber-law#compliance-governance+3
2018-03-02PanelNullcon Economics of Hacks & Data Breaches Who Pays, Who Secures & Who Wins Vinayak Godse, Ashutosh Jain, Bhishma Maheshwari, Manish Tiwari, Suchit Mishra#data-breach#risk-management#cybersecurity-strategy
2018-03-02PanelNullcon Should all ciso promote hall of fame” within their organizations Video Burgess Cooper, Durga Dube, Thom Langford, Harish Pillay#security-training#cybersecurity-strategy#bug-bounty+1
2018-03-01TalkNullcon Software Supply Chain Cyberattack Presentation Samiran Ghatak#red-teaming#cyberattack#supply-chain-attack+1
2017-08-19PanelC0c0n Security in Banking - Being one step aheadt Sunil Varkey, Rajesh Hemrajani, Biju K, Bhavin Bhansali, B R Nath, V George Antony#financial-institutions#secure-development#security-strategy
2017-08-19TalkC0c0n The Public Private Partnership - Navigating the Govt Saikat Datta#security-compliance#security-governance#risk-management+1
2017-08-19TalkC0c0n Building Trust for Digital Transactions in India’s COD Culture Parry Aftab, Betsy Broder, Sridhara R Sidhu, Mirza Faizan#secure-development#risk-management#architecture
2017-08-19TalkC0c0n Trust, the foundation of Digital Mastery Sunil Varkey#identity-management#authentication#risk-management+2
2017-08-18TalkC0c0n Bank on Compliance for Cyber Security Dinesh O Bareja#cyber-law#compliance-frameworks#financial-institutions+4
2017-08-18TalkC0c0n Hunting the Hunters – Fighting CyberCrime at the Source Valan Sivasubramanian#red-teaming#cybersecurity-strategy#cyber-crime+2
2017-08-18TalkC0c0n Prevent Dark Side of your Smart City - A Defensive Security model for Smart City and Critical Infrastructure Manas Pratim Sarma#blueteam#critical-infrastructure#cybersecurity-strategy+2
2017-08-18TalkC0c0n Call Centre Frauds Parry Aftab, Betsy Broder#social-engineering#security-training#risk-management+1
2017-08-18TalkC0c0n Challenges in Digital Banking Biju K#security-training#security-governance#risk-management
2017-08-18TalkC0c0n Moving from Cybersecurity Awareness to Cybersecurity Competence Anup Narayanan#cybersecurity-education#cybersecurity-training#security-training+3
2017-07-28Tool demoDefcon Lamma 1.0 Source Code Ajit Hatti, Antriksh Shah#encryption#security-assessment#audit+1
2017-07-26Tool demoBlackhat Datasploit - Automated Open Source Intelligence (OSINT) Tool Source Code Kunal Aggarwal, Shubham Mittal, Sudhanshu Chauhan#osint#reconnaissance#social-engineering+4
2017-04-13KeynoteHitbsecconf Redefining Defense Presentation Video Saumil Shah#blueteam#security-strategy#incident-management+2
2017-03-31TalkBlackhat The Seven Axioms of Security Presentation Video Saumil Shah#blueteam#security-strategy#threat-modeling+2
2017-03-21TalkTroopers New attacks in 4G technologies Ravishankar Borgaonkar#4g#attack-surface#threat-modeling+1
2017-03-04PanelNullcon Cyber-Security Blue-Print for the Future! Kapil Awasthi, Mathan Babu Kasilingam, Partha Sengupta, Sumit Malhotra#security-strategy#threat-modeling#zero-trust
2017-03-03TalkNullcon Breach Response - Time to shake up the status quo Video K K Mookhey, Pranesh Prakash, Sahir Hidayatullah, Shobha Jagathpal#incident-management#risk-management#architecture+1
2017-03-03PanelNullcon Digital warriors: India and the Future of Conflict on the Internet Video Saikat Datta, Brijesh Datta, Muktesh Chander, Cmde Anand, Anja Kovacs#cyber-war#national-security#digital-currency+2
2017-03-03TalkNullcon Securing Critical National Infrastructure Video Shailendra Fuloria, R Sarangapani, Rahul Tongia, Michael Pyle, Justin Searle#critical-infrastructure#ics-security#risk-management+3
2016-11-04TalkBlackhat Detach Me Not - DoS Attacks Against 4G Cellular Users Worldwide from your Desk Presentation Video Siddharth Rao, Bhanu Kotte, Dr. Silke Holtmanns#dos#red-teaming#ss7+4
2016-10-19TalkHacklu 2016: The Infosec Crossroads Presentation Saumil Shah#philosophy#security-strategy#incident-management+3
2016-09-14Talk44con 2016: The Infosec Crossroads Presentation Video Saumil Shah#blueteam#security-strategy#threat-modeling+4
2016-08-19TalkC0c0n Breaking into Gas stations! Suraj Pratap#red-teaming#ethical-hacking#exploit-delivery+2
2016-08-19TalkC0c0n Esoteric XSS Payloads Presentation Riyaz Walikar#xss#red-teaming#code-injection+3
2016-08-19TalkC0c0n How (in)secure are Indian GSM networks? Ajay Fuloria#gsm#gtp#imsi+4
2016-08-06Tool demoDefcon LAMMA (beta) Source Code Ajit Hatti#encryption#security-assessment#audit+1
2016-08-04Tool demoBlackhat LAMMA Source Code Ajit Hatti#encryption#security-assessment#audit+1
2016-08-04TalkBlackhat Understanding HL7 2.x Standards Pen Testing and Defending HL7 2.x Messages Video Anirudh Duggal#ics-security#risk-management#application-pentesting+3
2016-05-17TalkPhdays Fingerprinting and Attacking a Healthcare Infrastructure Presentation Anirudh Duggal#red-teaming#fingerprinting#ransomware+4
2015-11-05TalkGroundzerosummit Hacking RFIDs under 2000INR Jayesh Chauhan#rfid#red-teaming#hardware-embedded+4
2015-11-05TalkGroundzerosummit OSINT Black Magic: Listen who whispers your name in the dark!!! Presentation Source Code Sudhanshu Chauhan, Nutan Kumar Panda#osint#deep-web#data-leak+4
2015-11-05TalkGroundzerosummit Economics of Post Quantum Crypto Systems : Do we really Need it Ajit Hatti#encryption#quantum-computing#security-strategy+1
2015-09-24TalkAppsecusa Encouraging Diversity and Advancing Cybersecurity Education Shruthi Kamath, Apoorva Giri, Elissa Shevinsky#cybersecurity-education#security-training#risk-management+1
2015-08-07TalkDefcon Getting into the Trust Store We Trust Ajit Hatti#reverse-engineering#architecture#security-strategy
2015-08-01TalkC0c0n Attack chaining for web exploitation- From Information leakage to gaining Root access Abhijeth Dugginapeddi#red-teaming#application-pentesting#attack-surface+2
2015-03-15TalkBlackhat 2015 State of Vulnerability Exploits Presentation Video Amol Sarwate#automated-scanning#vulnerability-assessment#risk-management+1
2015-02-07PanelNullcon Startup panel – Make in India Aseem Jakhar, Radha Shelat, Sumit D Chowdhury, Shomiron Das Gupta, Sastry Tumuluri, Shiju Sathyadevan#security-strategy#cybersecurity-framework#business-resilience+4
2015-02-06PanelNullcon 2015: The Global Threat Defense Landscape - A discussion on the challenges faced by enterprises in engaging the bad guys Shomiron Das Gupta, K S Narayanan, Shantanu Ghosh, Subrahmanya Gupta Boda, Vishal Salvi, Benjamin Rivera#cyber-crime#incident-management#attack-surface+1
2015-02-06PanelNullcon Defender’s Diary: Who’s attacking? What are my options? Sastry Tumuluri, Amit Sharma, Venkatesh Subramaniam, Sachin Burman, Deepak Singla#blueteam#threat-hunting#cybersecurity-strategy
2015-02-06PanelNullcon Why CISO should promote more of such technical events - pros and cons, benefits etc Burgess Cooper, Maya Viswanathan, Sanjay Burman, Sridharan Sankaran, Massoud Issa, Katie Moussouris#security-training#cybersecurity-strategy#security-management
2015-02-06TalkNullcon Building security and compliance into the software delivery process Anubhav Bathla, Dinesh Pillai, S Chandrasekhar, Harish Pillay#secure-development#devsecops#security-compliance+3
2014-11-13TalkGroundzerosummit Attacking Cryptography & PKI Implementations Ajit Hatti#encryption#red-teaming#ssl+4
2014-11-13TalkGroundzerosummit National Cyber Policy and its impact on Business Vaishali Bhagwat#cyber-law#cybersecurity-strategy#business-resilience+3
2014-11-13TalkGroundzerosummit Internet Governance Anjana Kovacs#security-governance#security-compliance#risk-management+1
2014-11-13TalkGroundzerosummit 9 Cell Cyber Diplomacy Alok Vijayant#architecture#risk-management#security-governance
2014-11-13TalkGroundzerosummit Financial Integrity and Cyber Security Karnal Singh#risk-management#security-compliance#security-governance
2014-11-13TalkGroundzerosummit Network Time Protocol in Amplification Inferno Sriram Krishnan#network-pentesting#network-vulnerability-assessment#network-architecture+2
2014-11-13TalkGroundzerosummit APT protection for the Enterprise Deepak Singla#blueteam#apt#security-strategy
2014-10-23TalkT2 Darshak: how to turn your phone into a low cost IMSI catcher device Video Ravishankar Borgaonkar, Swapnil Udar#android#endpoint-protection#android-security+2
2014-08-22TalkC0c0n APT: Case Study of attackers targeting public tendering Rahul Sasi#red-teaming#apt#attack-surface+4
2014-08-22TalkC0c0n Cryptocalypse, Heart Bleed : Is our Government Listening? Ajit Hatti#encryption#ssl#cyber-law+3
2014-08-22TalkC0c0n Cryptographic Backdoors: Subverting the RSA Adhokshaj Mishra#encryption#red-teaming#security-strategy+3
2014-03-18TalkTroopers Evolution of SIM Card Security Presentation Ravishankar Borgaonkar#3gpp#gsma#embedded-systems+4
2014-02-14TalkNullcon User Privacy in Cellular Networks Ravishankar Borgaonkar#data-protection#network-architecture#data-governance+2
2014-02-14TalkNullcon 12 YEARS AND A BAKER’S DOZEN Presentation Video Saumil Shah#philosophy#security-strategy#threat-modeling+3
2013-11-20TalkAppsecusa Project Talk: OWASP OpenSAMM Project Presentation Pravir Chandra, Seba Deleersnyder#software-security#secure-development#devsecops+4
2013-11-20PanelAppsecusa Aim-Ready-Fire Pravir Chandra, Ajoy Kumar, Suprotik Ghose, Jason Rottaupt, Ramin Safai, Sean Barnum, Wendy Nather#appsec#secure-development#security-strategy
2013-11-07TalkGroundzerosummit Central Monitoring System and IT Act 2000 – Balance between rights of citizens and state Vaishali Bhagwat#cyber-law#cybersecurity-strategy#cyber-resilience+2
2013-11-07TalkGroundzerosummit Understanding the anatomy of advanced targeted attacks – The Trend Micro approach Tarun Gupta#forensics#malware-research#attack-surface
2013-11-07TalkGroundzerosummit Abusing Google Apps: Google is my command and control center Presentation Ajin Abraham#android#red-teaming#cloud-pentesting+4
2013-11-07TalkGroundzerosummit Advanced security for advanced threats Kartik Shahani#blueteam#security-strategy#threat-modeling+4
2013-09-27TalkC0c0n Risk and challenges in virtual currencies. Harsh Patel, Swatantra Kumar Gupta#digital-currency#cryptocurrency#decentralized-systems+4
2013-09-27TalkC0c0n Hello CISO! How to make end-users LIKE and FOLLOW “Brand Infosec”? Anup Narayanan#security-training#cybersecurity-education#security-governance+3
2013-09-27TalkC0c0n Disclosing Vulnerabilities: The Bug Bounty Style Nikhil Prabhakar#red-teaming#bug-bounty#ethical-hacking+3
2013-08-15TalkUsenix Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness Presentation Whitepaper Devdatta Akhawe, Adrienne Felt#web-security#security-training#architecture+2
2013-08-15TalkUsenix An Empirical Study of Vulnerability Rewards Programs Presentation Whitepaper Devdatta Akhawe, David Wagner, Matthew Finifter#bug-bounty#software-security#risk-management+2
2013-08-01Tool demoBlackhat Sparty Presentation Source Code Aditya K Sood#secure-coding#audit#blueteam
2013-07-31TalkBlackhat LTE booms with vulnerabilities Whitepaper Ankit Gupta#lte#ddos#network-architecture+2
2013-03-15TalkBlackhat Vulnerability analysis of 2013 SCADA issues Presentation Video Amol Sarwate#scada#ics-security#attack-surface+2
2013-03-01TalkNullcon Sensitive Campus Security with Network Video Aravind Sitaraman#blueteam#network-monitoring#security-strategy+4
2012-12-01TalkClubhack Legal Nuances to the Cloud Presentation Video Ritambhara Agrawal#cyber-law#cloud-compliance#cloud-monitoring+2
2012-12-01TalkClubhack The difference between the “Reality” and “Feeling” of Security: Information Security and the Human Being Presentation Video Thomas Kurian Ambattu#security-training#human-factor#risk-management+2
2012-12-01TalkClubhack Infrastructure Security Presentation Video Sivamurthy Hiremath#blueteam#security-strategy#threat-modeling+1
2012-10-26TalkAppsecusa The 7 Qualities of Highly Secure Software Video Mano Paul#secure-development#software-security#secure-coding+3
2012-09-26TalkNullcon Highly Harmful Audio Waves aka DTMF Fuzzing Video Rahul Sasi#dtmf#red-teaming#fuzzing+3
2012-09-26TalkNullcon How secure is internet banking in India Video Ajit Hatti#web-security#authentication#financial-institutions+1
2012-09-05Talk44con Why Integrity is left alone and not given TLC (Tender, Love and Care) it deserves? Video Jitender Arora#data-protection#security-strategy#threat-modeling+3
2012-08-04TalkC0c0n Impact of cyber laws on various stakeholders Sagar Rahurkar#security-compliance#security-governance#regulatory-compliance+1
2012-08-03TalkC0c0n Business Continuity and Risk Management in Turbulent Times Venkataram Arabolu#risk-management#business-continuity#security-compliance+2
2012-08-03TalkC0c0n The Management of Information Security – A Corporate Practitioner’s Perspective Pawan Kumar Singh#cyber-law#security-strategy#data-protection+2
2012-08-03TalkC0c0n Data Security Alok Vijayant, S Bhansali#data-protection#encryption#data-loss-prevention+3
2012-08-03TalkC0c0n A model to reduce information security risks due to human error Presentation Anup Narayanan#security-training#behavior-change#risk-management
2012-08-03TalkC0c0n Gathering security requirements K v Prashant, Saleem Ahamed#security-testing#secure-development#security-development-lifecycle+2
2012-08-03TalkC0c0n The Weakest Link - Reinforcing the Human Element Sandeep Godbole#security-training#human-factor#cybersecurity-education+3
2012-08-03TalkC0c0n Building Security Incident Detection & Handling Capabilities in Enterprises Sunil Varkey#blueteam#incident-detection#security-strategy+4
2012-08-03TalkC0c0n Contemporary Transcription and Resource Parasitism Arpit Patel#exploitation#firewall#network-monitoring+1
2012-08-03TalkC0c0n Enterprise server security Raghav Shandilya#blueteam#security-tools#network-monitoring+2
2012-03-16TalkBlackhat IVR Security- Internal Network Attack via Phone Lines Presentation Source Code Video Rahul Sasi#red-teaming#ivrs#network-pentesting+3
2012-03-15TalkC0c0n Integrated Dial 100 System for Law Enforcement Nandkumar Saravade, R Srikumar#security-governance#compliance-governance#security-operations-center
2012-02-15TalkNullcon Shall we dust Beep? The Geo-strategic realities of Cyberwar Presentation Pukhraj Singh#cyber-war#security-strategy#attack-surface
2012-02-15TalkNullcon Cyberspace: Global commons or a national asset Kamlesh Bajaj#cyber-law#cybersecurity-framework#incident-management+1
2012-02-15TalkNullcon Application security cost management Video Ketan Vyas#blueteam#application-pentesting#secure-development+2
2011-11-17TalkDeepsec Behavioral Security: 10 steps forward 5 steps backward Video Sourabh Satish#security-training#behavioral-change#risk-management+2
2011-10-08TalkC0c0n Stratagemizing Security Against Perpetrators In Cloud Infrastructure K S Abhiraj#blueteam#cloud-security-posture-management#cloud-pentesting+4
2011-10-07TalkC0c0n Section 43A IT Act compliance Sagar Rahurkar#cyber-law#compliance-frameworks#cybersecurity-strategy+1
2011-09-19TalkBrucon Step-by-Step for Software Security (that anyone can follow) Pravir Chandra#software-security#secure-development#devsecops+4
2011-09-19TalkHacklu The travelling hacksmith Saumil Shah#red-teaming#ethical-hacking#exploit-delivery+2
2011-09-07TalkSecuritybyte Social Web & Privacy – An evolving world Bala Sathiamurthy, Aridaman Tripathi#data-protection#api-security#security-compliance+2
2011-09-06TalkSecuritybyte Application Security Strategies Presentation K K Mookhey#secure-coding#secure-development#web-security+3
2011-09-06TalkSecuritybyte Security Threats on Social Networks Presentation Nithya Raman#social-engineering#web-security#security-training+1
2011-03-15TalkNullcon Information Warfare Ñ The Indian Perspective Alok Vijayant#cybersecurity-strategy#risk-management#security-training+1
2011-02-25TalkNullcon Chupa Rustam Presentation Abhijeet Hatekar#surveillance#red-teaming#application-pentesting+2
2011-02-25TalkNullcon Cyber Crime 101 - Cost of cybercrime, trends & analysis Presentation Simran Gambhir, Cn Shashidhar#cyber-crime#financial-institutions#attack-surface+2
2011-02-25TalkNullcon Security Analysis of India’s Electronic Voting Machines: Memoirs of a whistleblower Presentation Video Hari Krishna Prasad Vemuru#evm#red-teaming#hardware-embedded+3
2011-02-25TalkNullcon Enterprise Paradigm for Controlling Data Leakage Presentation Deepak Rout#data-leak#blueteam#data-loss-prevention+3
2011-02-25TalkNullcon Incident Management and Beyond Dinesh O Bareja#incident-management#data-leak#phishing+2
2011-02-25TalkNullcon Hacking the Parliament – A classic Social Engineering attack Anurag Dhanda#social-engineering#reconnaissance#security-strategy+2
2011-02-25TalkNullcon Protect infrastructure or protect information – Lessons from Wikileaks Presentation Vishal Gupta#data-leak#blueteam#data-protection+2
2010-11-25TalkDeepsec Developers are from Mars, Compliance Auditors are from Venus Video Neelay S Shah#security-compliance#security-governance#risk-management+4
2010-10-29TalkT2 Hacking Femtocells Presentation Ravishankar Borgaonkar, Kevin Redon#reverse-engineering#device-security#hardware-embedded+3
2010-08-01TalkC0c0n Overview of Cyber Legal Systems in India Sagar Rahurkar#cyber-law#cyber-resilience#cybersecurity-strategy+4
2010-08-01TalkC0c0n Hackers’ EcoSystem in India Rohit Srivastwa#security-assessment#security-training#risk-management
2010-04-21TalkHitbsecconf Web Security – Going Nowhere? Presentation Saumil Shah#red-teaming#application-hardening#application-pentesting+4
2010-03-15TalkBlackhat 400 Apps in 40 Days Presentation Video Nish Bhalla, Sahba Kazerooni#risk-management#application-pentesting#attack-surface+1
2010-02-25TalkNullcon Quantum Computing Challenges in the field of security Whitepaper Navin Pai#quantum-computing#security-strategy#threat-modeling+3
2009-12-05TalkClubhack Risk Based Penetration Testing Presentation Nikhil Wagholikar, K K Mookhey#security-assessment#incident-management#cybersecurity-strategy+1
2009-12-05TalkClubhack Indian IT Act 2000 vs 2009 Presentation Rohas Nagpal#cyber-law#embedded-systems#firmware-analysis+4
2009-12-04TalkClubhack Facilitate Collaboration with Information Rights Management Abhijit Tannu#information-rights-management#data-protection#application-hardening+4
2009-11-18TalkSecuritybyte Risk based Penetration Testing Presentation K K Mookhey#security-assessment#risk-management#ethical-hacking+3
2009-11-17TalkSecuritybyte Threat Modeling Presentation Varun Sharma#threat-modeling#blueteam#security-strategy+4
2009-11-17TalkSecuritybyte Business Continuity Case Study Venkataram Arabolu#business-continuity#risk-management#business-resilience+3
2009-11-17TalkSecuritybyte Business Case-Risk Management/Compliance at AMITY Js Sodhi#security-compliance#security-governance#risk-management+2
2009-11-17TalkSecuritybyte Usability and Privacy in Security Presentation Ponnurangam Kumaraguru#data-protection#architecture#security-training+2
2009-10-28TalkHacklu Ownage 2.0 Saumil Shah#red-teaming#ethical-hacking#exploit-delivery+2
2009-08-06TalkC0c0n Cyber Forensics Krishna Sastry Pendyal#forensics#digital-forensics#data-leak+4
2009-08-06TalkC0c0n Information Security Audit Venkatapathy Subramaniam#security-compliance#security-governance#audit+1
2009-08-06TalkC0c0n Cyber Victimisation K Jaishankar#cybersecurity-education#security-training#risk-management+1
2009-08-06TalkC0c0n Information Warfare A a Gafoor, Vinayak Mishra#threat-hunting#threat-modeling#security-training+2
2009-08-06TalkC0c0n Know Your Enemy, and Yourself: Demystifying Threat Modelin Meera Subbarao#blueteam#security-strategy#threat-modeling+4
2009-08-06TalkC0c0n Management & Security of Large Scale Storage Devices Prashant Dinde#blueteam#data-protection#security-strategy+2
2009-08-06TalkC0c0n Microsoft Security Strategies Binoy VC#blueteam#security-strategy#azure+4
2008-12-06TalkClubhack State of Cyber Law in India Presentation Rohas Nagpal#cyber-law#cyber-resilience#cybersecurity-framework+4
2008-12-06TalkClubhack Economic offenses through Credit Card Frauds Dissected Presentation Harshad Patil#fraud#identity-theft#financial-institutions
2008-12-06TalkClubhack Immune IT: Moving from Security to Immunity Presentation Ajit Hatti#blueteam#security-strategy#security-monitoring+4
2008-08-07TalkBlackhat Got Citrix, Hack It! Presentation Video Shanit Gupta#red-teaming#rdp#application-pentesting+1
2008-03-26TalkCansecwest Vulnerabilities Die Hard Kowsik Guruswamy#red-teaming#ethical-hacking#exploit-delivery+2
2008-02-20TalkBlackhat Hacking VoIP through IPSec Tunnels Whitepaper Sachin Joglekar, Sudeep Patwardhan#voip#red-teaming#gsm+2
2007-12-09TalkClubhack 7 years of Indian IT act - 7 Best Cases Presentation Whitepaper Rohas Nagpal#cyber-law#data-governance
2007-04-18TalkCansecwest Low-Rate Denial-of-Service attacks Anil Kumar#red-teaming#dos#network-defense+2
2005-07-28TalkBlackhat Rapid Threat Modeling Presentation Video Akshay Aggarwal#threat-modeling#red-teaming#security-strategy+4
1998-07-29TalkBlackhat Security as an enabler for new business opportunities - The Business Value of Security Karan Khanna#risk-management#business-continuity#cyber-resilience+3