| 2025-04-29 | Talk | Rsac |
RAG-NAROK: What Poorly-Built RAGs Can Do to Data Security
| Akash Mukherjee | secure-developmentdevsecopsdata-protection+2 |
| 2024-05-06 | Talk | Rsac |
Headspace’s Privacy Operations Center and Vault
| Shobhit Mehta | privacydata-protectionsecurity-operations-center+2 |
| 2023-08-07 | Talk | C0c0n |
Homomorphic Encryption - Myth to Reality
| Anish Koshy | encryptionsecurity-architectureprivacy+2 |
| 2023-08-07 | Talk | C0c0n |
The DPDPA Effect: Jubilation, Twinge and Reticence that followed
| Rahul Sharma | compliancegovernancedata-protection+2 |
| 2023-08-06 | Talk | C0c0n |
A Secure Privacy-Preserving Lightweight Authentication Scheme for Internet of Medical Things
| Panchami V, Mahima Mary Mathews | authenticationprivacyembedded-security+1 |
| 2023-08-06 | Talk | C0c0n |
Digital Innovation and its Impact on CIOs, CISOs and DPOs
| Navaneethan M | compliancegovernancerisk-management+4 |
| 2022-08-11 | Talk | The Diana Initiative |
The Real Cost of Free: What you need to know before downloading a free app
| Ruchira Pokhriyal | mobile-securityapp-securityprivacy+3 |
| 2022-07-24 | Talk | May Contain Hackers |
No Permissions Needed!
| Aditi Bhatnagar | android-securitymobile-securityprivacy+3 |
| 2022-07-23 | Talk | May Contain Hackers |
How would a real life social media be like?
| Aditi Bhatnagar | privacydata-protectionsecurity-awareness+4 |
| 2021-11-12 | Talk | C0c0n |
Data Security and Privacy
| Abhilasha Vyas | data-protectionprivacyencryption+4 |
| 2019-09-27 | Talk | C0c0n |
Detection of TOR Sources using Artificial Intelligence
| Roshy John | torairedteam |
| 2019-08-08 | Talk | Defcon |
YOUR PHONE IS USING TOR AND LEAKING YOUR PII
| Milind Bhargava | mobile-securityprivacypentesting |
| 2018-10-05 | Talk | C0c0n |
Data management challenge for Privacy compliance
| Maria Bellarmine | data-protectionprivacycompliance+4 |
| 2018-08-09 | Talk | Defcon |
Anonymous rate-limiting in services with Direct Anonymous Attestation
| Konark Modi | privacysecurity-architecture |
| 2018-03-13 | Talk | Troopers |
Securing your in-ear fitness coach: Challenges in hardening next generation wearables
| Sumanth Naropanth, Kavya Racharla | mobile-securitysecure-developmentvulnerability-management+2 |
| 2017-08-18 | Talk | C0c0n |
Identity Theft
| Devika a V, Meera P | identity_theft |
| 2017-08-18 | Talk | C0c0n |
Are TOR Hidden Services really hidden? Demystifying HS Directory surveillance by injecting Decoys inside TOR!
| Abhinav Biswas | torweb |
| 2017-05-23 | Talk | Phdays |
How we hacked distributed configuration management systems
| Bharadwaj Machiraju, Francis Alexander | redteaminfrastructurefingerprinting |
| 2016-05-17 | Talk | Phdays |
Fingerprinting and Attacking a Healthcare Infrastructure
| Anirudh Duggal | healthcareredteamfingerprinting |
| 2015-03-15 | Talk | Defcon |
TECHNICAL TALK-THWARTING THE SURVEILLANCE IN ONLINE COMMUNICATION
| Adhokshaj Mishra | privacysecurity-architecture |
| 2014-11-13 | Talk | Ground Zero Summit |
Identity theft and its impact on Cyber - Warfare
| Tarun Wig | identity_theft |
| 2014-02-14 | Talk | Nullcon |
User Privacy in Cellular Networks
| Ravishankar Borgaonkar | privacy |
| 2012-08-03 | Talk | C0c0n |
Data Security
| Alok Vijayant | data-protectionencryptiondata-loss-prevention+4 |
| 2011-09-07 | Talk | Securitybyte |
Social Web & Privacy โ An evolving world
| Bala Sathiamurthy, Aridaman Tripathi | privacydata-protectionapi-security+3 |
| 2011-02-25 | Talk | Nullcon |
Chupa Rustam
| Abhijeet Hatekar | networksurveillanceredteam |
| 2009-11-17 | Talk | Securitybyte |
Usability and Privacy in Security
| Ponnurangam Kumaraguru | privacydata-protectionsecurity-architecture+3 |
| 2004-05-19 | Talk | Blackhat |
HTTP Fingerprinting and Advanced Assessment Techniques
| Saumil Shah | webfingerprintingblueteam |
| 2004-01-29 | Talk | Blackhat |
HTTP Fingerprinting and Advanced Assessment Techniques
| Saumil Shah | webfingerprintingblueteam |
| 2003-12-16 | Talk | Blackhat |
HTTP Fingerprinting & Advanced Assessment Techniques
| Saumil Shah | webfingerprintingblueteam |
| 2003-10-01 | Talk | Blackhat |
HTTP Fingerprinting & Advanced Assessment Techniques
| Saumil Shah | webfingerprintingblueteam |
| 2003-07-31 | Talk | Blackhat |
HTTP Fingerprinting & Advanced Assessment Techniques
| Saumil Shah | webfingerprintingblueteam |
| 2003-02-26 | Talk | Blackhat |
HTTP: Advanced Assessment Techniques
| Saumil Shah | webfingerprintingblueteam |
| 2001-07-13 | Talk | Defcon |
Security & Privacy are Critically Important Issues in Todays Digitally Connected Age
| Sharad Popli | pentestprivacyblueteam |