🧪 Experimental Feature

Focus Areas are an experimental feature that groups related content by tags. This page and its functionality may change as we refine the categorization system.

Risk Management

Risk management and related activities

135
Total Entries
121
Contributors
94
Unique Tags
72
Related Tags

Top Contributors

Sunil Varkey(7) Mahesh Kalyanaraman(4) Alok Vijayant(3) Anup Narayanan(3) Biju K(3)

Related Tags (13)

Show all 13 tags...

All Entries (135 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-08-07Tool demoBlackhat Frogy 2.0 - Automated external attack surface analysis toolkit Source Code Chintan Gurjarattack-surfacevulnerability-assessmentasset-management+2
2025-08-07Tool demoBlackhat Cloud Offensive Breach and Risk Assessment (COBRA) Harsha Koushik, Anand Tiwaricloud-pentestingrisk-managementedr
2025-08-06Tool demoBlackhat ThreatShield - The Intelligent way of Threat Modelling Ashwin Shenoi, Satyam Nagpal, Sayooj B Kumarthreat_modelingsecurity-architecturedevsecops+1
2025-08-06TalkBlackhat When ‘Changed Files’ Changed Everything: Uncovering and Responding to the tj-actions Supply Chain Breach Varun Sharma, Ashish Kurmici-cdincident-responsedevsecops+3
2025-04-30TalkRsac Got Supply Pain? A Real-World Approach to Supply Chain SDL Mohit Arorasecure-developmentdevsecopsvulnerability-management+5
2025-04-29TalkRsac It’s Always Risky in IT: Frontline Stories and Strategic Insights Gourav Nagar, Rohit Bansalrisk-managementcompliance
2025-04-29TalkRsac It’s Always Risky in IT: Frontline Stories and Strategic Insights Rohit Bansalrisk-managementsecurity-architecturesecurity-awareness+2
2025-04-03Tool demoBlackhat SCAGoat - Exploiting Damn Vulnerable and Compromised SCA Application Source Code Hare Krishna Rai, Gaurav Joshi, K v Prashantvulnerability-managementsupply-chainsupply-chain-attack+2
2025-03-02TalkNullcon eKYC Crisis: Securing the Lockers Kartik Lalanrisk-managementvulnerability-managementsecurity-architecture
2024-11-28TalkBlackhat Time to Redefine Cybersecurity - Adding T - Trust as new Tenant to “CIA” and make it “I-ACT Lalit Ahluwaliarisk-managementsecurity-architecturesecurity-governance+1
2024-11-27TalkBlackhat The Future of Cybersecurity: Addressing New Threats with Groundbreaking Strategies Mahesh Babu Kanigiririsk-managementvulnerability-managementsecurity-architecture+2
2024-11-26TalkBlackhat Cyber Security & Resiliency: a perspective with emerging technologies and Innovation Atul Kumarcybersecurity-strategiesrisk-managementcyber-resilience+2
2024-11-26TalkBlackhat The Double Edge Sword - Cybersecurity & AI Karmendra Kohlisecurity-architecturerisk-managementdevsecops+1
2024-11-16TalkC0c0n The subtle art of checkmating CISOs Sunil Varkeyrisk-managementsecurity-architecturesecurity-governance+3
2024-11-15TalkC0c0n CISO’s take on BYOAI Venugopal Parameswararisk-managementsecurity-governancecompliance+4
2024-05-09TalkRsac The Good, the Bad, and the Bounty: 10 Years of Buying Bugs at Microsoft Aanchal Guptavulnerability-managementbug-bountyrisk-management+1
2024-05-07TalkRsac A Proven Approach on Automated Security Architectural Pattern Validation Video Sunil Arorasecurity-architecturedevsecopsvulnerability-management+2
2024-05-07TalkRsac Anatomy of a Vulnerability Response - A View from the Inside Video Mohit Aroravulnerability-managementincident-responserisk-management+1
2024-04-19TalkBlackhat China’s Military Cyber Operations: Has the Strategic Support Force Come of Age? Presentation Pukhraj Singhindustrial-control-systems-securityrisk-managementsecurity-architecture
2023-08-12TalkDefcon Getting More Bang for your Buck:Appsec on a Limited Budget Vandana Verma Sehgal, Viraj Gandhisecure-developmentdevsecopsrisk-management+3
2023-08-09TalkBlackhat Diversity Microtalks: Perspectives on Creating Change Presentation Aastha Sahnisecurity-awarenessrisk-managementsecurity-governance
2023-08-07TalkC0c0n Citizen Mobile Security: Responsibilities, Accountability, and Impacts Satyendra Vermamobile-securitysecurity-awarenessrisk-management+1
2023-08-07TalkC0c0n Cyber Threats to Global Financial Systems Video Lince Lawrenceincident-responserisk-management
2023-08-07TalkC0c0n ESOC Trinetra Project Pankaj Kumar Dalelasecurity-governancerisk-managementvulnerability-management+1
2023-08-07TalkC0c0n Generative AI and Cyber Crimes Video Brijesh Singhmalwaresecurity-awarenessrisk-management+2
2023-08-07TalkC0c0n Trust Resiliency - A Lesson Learned from Russia Ukraine War Video Ajit Hattiincident-responsesecurity-architecturerisk-management+2
2023-08-06TalkC0c0n Insider Threats - Best Practices and Common Pitfalls Video Georgie Kurieninsider-threatsrisk-managementsecurity-awareness+1
2023-08-06TalkC0c0n CBDC and future of Finance Video Sunil Raveendranblockchain-securitydigital_currencydecentralized-systems+3
2023-08-06TalkC0c0n Cryptocurrencies and challenges to Law Enforcement Agencies Bhushan Gulabrao Boraseblockchain-securitydecentralized-systemsdigital_currency+2
2023-08-06TalkC0c0n Cybercrimes Victim Compensation : Legal Remedies and Process Nisheeth Dixitcompliancegovernancerisk-management+1
2023-08-06TalkC0c0n Digital Innovation and its Impact on CIOs, CISOs and DPOs Navaneethan Mcompliancegovernancerisk-management+4
2023-08-06TalkC0c0n Emerging crimes and threat landscape in cyber domain and the need for international cooperation Video Kiran Sivakumarthreat-landscapethreat_modelingrisk-management
2023-08-06TalkC0c0n Influence of Artificial Intelligence in GRC Space Mahesh Kalyanaramangovernancerisk-managementcompliance+3
2023-08-06TalkC0c0n Playing cat and mouse with the Adversary: Sometimes a breach is inevitable Video Abhijith B Rincident-responsevulnerability-managementrisk-management
2023-08-06TalkC0c0n Subduing Adversaries with Information Superiority Video Antony K Mthreat-huntingsecurity-monitoringthreat-detection+2
2023-08-06TalkC0c0n Survivability in the Cyber World Video Sunil Varkeyincident-responserisk-managementsecurity-architecture
2023-04-26TalkRsac Is Increasing Security Maturity And Decreasing Operational Load Possible? Rohit DhamankarAutomationrisk-managementsecurity-architecture+2
2023-04-21TalkHitb Sec Conf LOCKNOTE:THE HAND THAT STRIKES, ALSO BLOCKS Presentation Video Saumil Shahsecurity-architecturerisk-managementsecurity-awareness+2
2022-09-28TalkRootcon Gazing into the Crystal Ball - The Fog of Cyberwarfare Escalations Harshit Agrawalindustrial-control-systems-securitysecurity-architecturerisk-management+1
2022-09-24TalkC0c0n Rationalizing Cyber Security Risk in Risk Language Anish Koshyrisk-managementgovernancecybersecurity-strategies+4
2022-09-24TalkC0c0n Building Smart, Resilient and Sustainable Cyber Eco System Navin Kumar Singhrisk-managementcybersecurity-strategiessecurity-architecture+4
2022-09-24TalkC0c0n Cyber Defence and Role of private players - public private partnership Jasbir Singh Solankisecurity-governancerisk-managementcompliance+2
2022-09-24TalkC0c0n In production with GRC for cloud Mahesh Kalyanaramancloud-compliancegovernancerisk-management+2
2022-09-24TalkC0c0n Power of Narratives in Cyber Security Sunil Varkeysecurity-awarenesscybersecurity-educationhuman-factor+2
2022-09-23TalkC0c0n Startup Ecosystem and Investments in Post Covid Era Sunil Kanchirisk-managementcompliancegovernance+2
2022-09-23TalkC0c0n Technological Reliance for Resilience Tulika Pandeyrisk-managementcyber-resiliencesecurity-architecture+2
2022-09-23TalkC0c0n Battle of 300 Crore - how they lost it and got most of it back Prashant Choudharyincident-responsevulnerability-managementrisk-management+1
2022-09-23TalkC0c0n Collaborative efforts for safe digital banking Biju Ksecure-developmentrisk-managementsecurity-architecture
2022-09-23TalkC0c0n Cybersecurity for Manufacturing Santhosh Srinivasanindustrial-control-systems-securityics-securitycontrol-systems+4
2022-09-23TalkC0c0n Maximizing ROI on cyber security investments: Do you think Adversary Simulation OR Purple teaming holds the key? Presentation Abhijith B Rrisk-managementsecurity-architecturedevsecops
2022-09-23TalkC0c0n Rolling out Central Bank Digital Currency - Technical Design Considerations Sunil Raveendranblockchain-securitysecurity-architecturecompliance-governance+2
2022-09-07TalkNullcon Unearthing Malicious And Other “Risky” Open-Source Packages Using Packj Presentation Video Devdutt Patnaikopen-source-securitysupply-chainsupply-chain-attack+3
2022-08-14TalkDefcon Tales from the trenches - why organizations struggle to get even the basics of OT asset visibility & detection right Vivek Ponnadaindustrial-control-systems-securityvulnerability-managementrisk-management+2
2022-08-11TalkThe Diana Initiative Connecting Dots Between Security Teams & Customer Expectations Shruthi Kamathsecurity-governancerisk-managementsecurity-architecture+2
2022-08-11TalkThe Diana Initiative The Real Cost of Free: What you need to know before downloading a free app Ruchira Pokhriyalmobile-securityapp-securityprivacy+3
2022-07-23TalkMay Contain Hackers How would a real life social media be like? Aditi Bhatnagarprivacydata-protectionsecurity-awareness+4
2022-05-12Tool demoBlackhat Mitigating Open Source Software Supply Chain Attacks Source Code Ajinkya Rajputopen-source-securitysupply-chainsupply-chain-attack+3
2021-11-13TalkC0c0n Cybersecurity in the era of Resilience - A walk through people, process and technology Babitha B Prisk-managementcyber-resiliencesecurity-architecture+3
2021-11-13TalkC0c0n Changing Cyber Security Paradigm & Cyber Tsunami Sunil Varkeycybersecurity-strategiesthreat-landscaperisk-management+4
2021-11-13TalkC0c0n Post pandemic Transformation - A CISO’s perspective Sridhar Govardhanrisk-managementsecurity-governancecompliance+4
2021-11-13TalkC0c0n Connecting the dots between customers and security teams Shruthi Kamathincident-responsesecurity-awarenessdevsecops+1
2021-11-13TalkC0c0n Crisis Capitalization in a Pandemic Greeshma M Rrisk-managementincident-responsesecurity-awareness+3
2021-11-13TalkC0c0n Need for Zero Trust in Banking Biju Kzero-trustrisk-managementsecurity-architecture+1
2021-11-13TalkC0c0n Painting Your Organizations with Shades of Red, Blue & Purple Video Hidayath Khanred-teamingethical-hackingthreat_modeling+2
2021-11-13TalkC0c0n Third Party Risk Management Mahesh Kalyanaramanrisk-managementcompliance-governancevulnerability-management+3
2021-11-12TalkC0c0n 2021 Supply Chain Attacks Analysis Ajit Hattivulnerability-managementincident-responserisk-management+2
2021-11-12TalkC0c0n Enterprise Governance and Risk Management Arathy Nair, Muskan Manglacompliancegovernancerisk-management+2
2021-11-12TalkC0c0n Post Covid CISOs - Disappearing trusted boundaries and Innovative CyberSecurity Approaches Illyas Kooliyankalrisk-managementsecurity-architecturesecurity-governance+1
2021-11-12TalkC0c0n Regulating Social Media Platforms : Should it be done in Democratic Societies ? J Sam Daniel Stalin, Apar Gupta, Dinesh O Bareja, Prashant Mali, Jiten Jaincompliancegovernancerisk-management+4
2021-11-12TalkC0c0n The evolving nature of cyber community Aastha Sahnisecurity-awarenessrisk-managementcybersecurity-education
2021-10-13TalkRootcon The Kill Chain: Future of Cyber in Defense Video Harshit Agrawalsecurity-architectureindustrial-control-systems-securityrisk-management
2021-08-26TalkHitb Sec Conf Gazing Ahead: What Modern RF Combat Looks Like in the Next Decade Presentation Video Harshit Agrawalindustrial-control-systems-securitysecurity-architecturevulnerability-management+1
2020-11-21TalkApp Sec Indonesia The caveats of the unseen: Crouching exposure, Hidden Misconfiguration Ashwin Vamshivulnerability-managementsecurity-architecturedevsecops+2
2020-09-18TalkC0c0n Coping with Digital Transformation - A CISO perspective Video Maya R Nairrisk-managementsecurity-governancesecurity-architecture+3
2020-09-18TalkC0c0n Herd Immunity, in the Cyber World Sunil Varkeysecurity-awarenessrisk-managementvulnerability-management+1
2020-09-18TalkC0c0n COVID-19 Cyber impact on financial sector and remote employees Video Amit Dubeyincident-responserisk-management
2020-09-18TalkC0c0n Cyber Security Shifts During COVID-19 Video Sunil Kanchirisk-managementsecurity-awarenesscompliance-governance+1
2020-08-21TalkThe Diana Initiative Trust, No Trust or Zero Trust - Myth Demystifying Vandana Verma Sehgalzero-trustsecurity-architecturecompliance+2
2020-08-05Tool demoBlackhat vPrioritizer: Learn to say NO to almost every vulnerability (art of risk prioritisation…) Source Code Pramod Ranaopensourcerisk-analysisblueteam+2
2019-09-27TalkC0c0n Practical Approach to Cyber Security for financial institutions Georgie Kurienfinancial-institutionssecure-developmentrisk-management+2
2019-09-27TalkC0c0n A Day in the Life of a CISO Sridhar Govardhancompliancegovernancerisk-management+3
2019-09-27TalkC0c0n CISO Mind Set Lopa Mudraa Basuurisk-managementsecurity-governancecompliance+2
2019-09-27TalkC0c0n Industry 4.0 - Security and Compliance Santhosh Srinivasanindustrial-control-systems-securitycompliancegovernance+2
2019-09-27TalkC0c0n RANSOMWARE - to pay or not to pay Seshaprakash Kusuma Sreenivasaransomwareincident-responserisk-management
2018-10-15TalkHacklu Come to the dark side! We have radical insurance groups & ransomware Video Ankit Gangwalransomwarerisk-managementcyber-insurance+2
2018-10-05TalkC0c0n Resiliency Focus alongside Digital Disruption Lince Lawrencesecurity-architecturerisk-managementsecurity-awareness+2
2018-10-05TalkC0c0n Data management challenge for Privacy compliance Maria Bellarminedata-protectionprivacycompliance+4
2018-10-05TalkC0c0n Adaptive GRC Mahesh Kalyanaramancompliancegovernancerisk-management+1
2018-10-05TalkC0c0n Dealing with Changing Threat Landscape Vijendra Katiyarthreat-landscapethreat-huntingrisk-management+1
2018-10-05TalkC0c0n Digital Innovation revolution in Kerala Government Sunil Varkeycybersecurity-strategysecurity-architecturerisk-management+2
2018-10-05TalkC0c0n Future of Mobility & Cyber Security Suja Chandyautomotive-cybersecurityindustrial-control-systems-securitysecurity-architecture+2
2018-10-05TalkC0c0n Taking cyber security to the board room Amit Pradhanrisk-managementcompliancegovernance+3
2018-10-05TalkC0c0n Will Artificial Intelligence And Machine Learning Bring More Threats On Cyber Security? Roshy Johnrisk-managementvulnerability-managementsecurity-architecture
2017-08-19TalkC0c0n Building Trust for Digital Transactions in India’s COD Culture Parry Aftabsecure-developmentrisk-managementsecurity-architecture
2017-08-19TalkC0c0n The Public Private Partnership - Navigating the Govt Saikat Dattacompliancegovernancerisk-management+3
2017-08-19TalkC0c0n Trust, the foundation of Digital Mastery Sunil Varkeyidentity-managementauthenticationrisk-management+2
2017-08-18TalkC0c0n Call Centre Frauds Parry Aftabsocial-engineeringsecurity-awarenessrisk-management+1
2017-08-18TalkC0c0n Challenges in Digital Banking Biju Ksecurity-awarenesssecurity-governancerisk-management
2017-08-18TalkC0c0n Moving from Cybersecurity Awareness to Cybersecurity Competence Anup Narayanancybersecurity-educationcybersecurity-trainingsecurity-awareness+3
2017-08-18TalkC0c0n Threats with online gaming and issues with games like Pokemon Riyaz Walikar, Akash Mahajansecurity-awarenessmobile-securityvulnerability-management+1
2017-03-03TalkNullcon Breach Response - Time to shake up the status quo Video K K Mookhey, Pranesh Prakash, Sahir Hidayatullah, Shobha Jagathpalincident-responsevulnerability-managementrisk-management+2
2017-03-03TalkNullcon Securing Critical National Infrastructure Video Shailendra Fuloria, R Sarangapani, Rahul Tongiacritical-infrastructureindustrial-control-systems-securityics-security+4
2016-08-04TalkBlackhat Understanding HL7 2.x Standards Pen Testing and Defending HL7 2.x Messages Video Anirudh Duggalvulnerability-managementindustrial-control-systems-securityrisk-management
2015-09-24TalkApp Sec Usa Encouraging Diversity and Advancing Cybersecurity Education Shruthi Kamathcybersecurity-educationsecurity-awarenessrisk-management+1
2015-03-15TalkBlackhat 2015 State of Vulnerability Exploits Presentation Video Amol Sarwatevulnerability-managementautomated-scanningvulnerability-assessment+2
2015-02-06TalkNullcon Building security and compliance into the software delivery process Anubhav Bathla, Dinesh Pillai, S Chandrasekharsecure-developmentdevsecopscompliance+3
2014-11-13TalkGround Zero Summit 9 Cell Cyber Diplomacy Alok Vijayantsecurity-architecturerisk-managementsecurity-governance
2014-11-13TalkGround Zero Summit Financial Integrity and Cyber Security Karnal Singhrisk-managementcompliancesecurity-governance
2014-11-13TalkGround Zero Summit Internet Governance Anjana Kovacsgovernancecompliancerisk-management+2
2013-11-20TalkApp Sec Usa Project Talk: OWASP OpenSAMM Project Pravir Chandrasoftware-securitysecure-developmentdevsecops+4
2013-09-27TalkC0c0n Hello CISO! How to make end-users LIKE and FOLLOW “Brand Infosec”? Anup Narayanansecurity-awarenesscybersecurity-educationsecurity-governance+3
2013-08-15TalkUsenix Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness Presentation Whitepaper Devdatta Akhaweweb-securitysecurity-awarenesssecurity-architecture+3
2013-08-15TalkUsenix An Empirical Study of Vulnerability Rewards Programs Presentation Whitepaper Devdatta Akhawevulnerability-managementbug-bountysoftware-security+3
2012-12-01TalkClubhack The difference between the “Reality” and “Feeling” of Security: Information Security and the Human Being Presentation Video Thomas Kurian Ambattusecurity-awarenesshuman-factorrisk-management+2
2012-10-26TalkApp Sec Usa The 7 Qualities of Highly Secure Software Video Mano Paulsecure-developmentsoftware-securitysecure-coding+3
2012-08-04TalkC0c0n Impact of cyber laws on various stakeholders Sagar Rahurkarcompliancegovernanceregulatory-compliance+2
2012-08-03TalkC0c0n Business Continuity and Risk Management in Turbulent Times Venkataram Arabolurisk-managementbusiness-continuitycompliance+2
2012-08-03TalkC0c0n Data Security Alok Vijayantdata-protectionencryptiondata-loss-prevention+4
2012-08-03TalkC0c0n A model to reduce information security risks due to human error Presentation Anup Narayanansecurity-awarenessbehavior-changerisk-management
2012-08-03TalkC0c0n The Weakest Link - Reinforcing the Human Element Sandeep Godbolesecurity-awarenesshuman-factorcybersecurity-education+4
2011-11-17TalkDeepsec Behavioral Security: 10 steps forward 5 steps backward Video Sourabh Satishsecurity-awarenessbehavioral-changerisk-management+2
2011-09-19TalkBrucon Step-by-Step for Software Security (that anyone can follow) Pravir Chandrasoftware-securitysecure-developmentdevsecops+4
2011-09-06TalkSecuritybyte Application Security Strategies Presentation K K Mookheysecure-codingsecure-developmentweb-security+3
2011-09-06TalkSecuritybyte Security Threats on Social Networks Presentation Nithya Ramansocial-engineeringweb-securitysecurity-awareness+2
2011-03-15TalkNullcon Information Warfare Ñ The Indian Perspective Alok Vijayantcybersecurity-strategyrisk-managementsecurity-awareness+1
2010-11-25TalkDeepsec Developers are from Mars, Compliance Auditors are from Venus Video Neelay S Shahcompliancegovernancerisk-management+4
2010-08-01TalkC0c0n Hackers’ EcoSystem in India Rohit Srivastwapentestingsecurity-awarenessrisk-management+1
2010-03-15TalkBlackhat 400 Apps in 40 Days Presentation Video Nish Bhallavulnerability-managementrisk-managementapplication-pentesting+2
2009-11-17TalkSecuritybyte Business Continuity Case Study Venkataram Arabolubusiness-continuityrisk-managementbusiness-resilience+3
2009-11-17TalkSecuritybyte Business Case-Risk Management/Compliance at AMITY Js Sodhicompliancegovernancerisk-management+3
2009-11-17TalkSecuritybyte Usability and Privacy in Security Presentation Ponnurangam Kumaraguruprivacydata-protectionsecurity-architecture+3
2009-08-06TalkC0c0n Cyber Victimisation K Jaishankarcybersecurity-educationsecurity-awarenessrisk-management+2
2009-08-06TalkC0c0n Information Security Audit Venkatapathy Subramaniamcompliancegovernanceaudit+2
2009-08-06TalkC0c0n Information Warfare A a Gafoor, Vinayak Mishrathreat-huntingthreat_modelingsecurity-awareness+2
1998-07-29TalkBlackhat Security as an enabler for new business opportunities - The Business Value of Security Karan Khannarisk-managementbusiness-continuitycyber-resilience+4