| 2025-12-11 | Tool demo | Blackhat |
ThreatShield – The Intelligent Way of Threat Modelling
| Satyam Nagpal, Sayooj B Kumar, Ashwin Shenoi | #threat-modeling#security-strategy#architecture+1 |
| 2025-12-11 | Tool demo | Blackhat |
From Triage to Threat Modeling: Open-Source Security LLM in Action
| Dhruv Kedia, Sajana Weerawardhena | #ai-security#threat-modeling#vulnerability-assessment+1 |
| 2025-08-07 | Tool demo | Blackhat |
Q-TIP (QR Code Threat Inspection Platform)
| Rushikesh D Nandedkar | #incident-management#web-security#architecture+1 |
| 2025-08-06 | Tool demo | Blackhat |
ROP ROCKET: Advanced Framework for Return-Oriented Programming
| Shiva Shashank, Bramwell Brizendine | #reverse-engineering#exploitation#security-assessment+2 |
| 2025-08-06 | Talk | Blackhat |
The 5G Titanic
| Altaf Shaik | #network-pentesting#network-architecture#architecture |
| 2025-08-06 | Tool demo | Blackhat |
ThreatShield - The Intelligent way of Threat Modelling
| Ashwin Shenoi, Satyam Nagpal, Sayooj B Kumar | #threat-modeling#architecture#devsecops+1 |
| 2025-08-06 | Panel | Blackhat |
Hacking the Status Quo: Tales From Leading Women in Cybersecurity
| Vandana Verma Sehgal, Chi en Shen, Natalie Silvanovich, Maddie Stone | #security-training#cybersecurity-education#security-strategy |
| 2025-04-30 | Talk | Rsac |
Got Supply Pain? A Real-World Approach to Supply Chain SDL
| Mohit Arora, Richard Tonry | #secure-development#devsecops#risk-management+4 |
| 2025-04-29 | Talk | Rsac |
RAG-NAROK: What Poorly-Built RAGs Can Do to Data Security
| Akash Mukherjee, Saurabh Shintre | #secure-development#devsecops#data-protection+1 |
| 2025-04-29 | Talk | Rsac |
It’s Always Risky in IT: Frontline Stories and Strategic Insights
| Gourav Nagar, Rohit Bansal | #risk-management#security-compliance#cyber-resilience+4 |
| 2025-04-29 | Talk | Rsac |
XPIA Attacks—Rethinking Defense in Depth for an AI-Powered World
| Aanchal Gupta, Abhilasha Bhargav Spantzel, John Leo Jr, Stefano Zanero | #ai#ai-security#input-validation+3 |
| 2025-04-04 | Panel | Blackhat |
Locknote: Highlights & Key Takeaways from Black Hat Asia 2025
| Vandana Verma Sehgal, Daniel Cuthbert, Ryan Flores, Vitaly Kamluk, Jeff Moss, Asuka Nakajima | #security-strategy#cybersecurity-framework#digital-learning+1 |
| 2025-04-03 | Tool demo | Blackhat |
Mantis - Asset Discovery at Scale
| Hitesh Thakur, Praveen Kanniah, Prateek Thakare | #asset-inventory#cloud-workload-protection#security-tools+4 |
| 2025-03-02 | Talk | Nullcon |
Cyber Security from Telco lens
| Sanjeev Dhallam | #network-architecture#network-hardening#network-monitoring+2 |
| 2025-03-02 | Talk | Nullcon |
eKYC Crisis: Securing the Lockers
| Kartik Lalan | #risk-management#architecture#data-leak+4 |
| 2025-03-02 | Talk | Nullcon |
Hidden in Plain Sight: Large-Scale Exposure of Orphaned Commits on Major Git Platforms
| Kumar Ashwin | #secure-coding#devsecops#architecture |
| 2025-03-02 | Panel | Nullcon |
Modernizing Security Architecture: Platforms or Best-of-Breed, What Works Best?
| Ketan Vyas, Prajal Kulkarni, Satyavathi Divadari, Srihari Kotni | #security-strategy#threat-modeling#zero-trust+3 |
| 2025-03-02 | Talk | Nullcon |
Satellite Communications: Analyzing and Protecting Space-Based Assets
| Drishti Jain | #network-pentesting#ics-security#encryption+4 |
| 2025-03-02 | Panel | Nullcon |
How can organisations protect themselves against Advanced Cyber Threats
| Bithal Bhardwaj, Vishal Salvi | #security-strategy#incident-management#phishing+1 |
| 2025-03-02 | Panel | Nullcon |
Cyber Fusion Center: The Command Center for Integrated Cyber Defense
| Avkash Kathiriya, Mathan Babu Kasilingam, Yogi Kapur | #security-monitoring#network-defense#threat-modeling+3 |
| 2025-03-01 | Panel | Nullcon |
Converging IT and OT Security: Unified strategies for protection, detection and response
| Burgess Cooper, Kuldeep Singh, Shailendra Fuloria, Rohit Sharma, Sachin Burman, Yask Sharma | #ics-security#cloud-workload-protection#security-strategy+1 |
| 2025-03-01 | Panel | Nullcon |
Cyber Tech 2030: The Next Chapter in AI, Zero Trust & Offensive Defense
| Ajit Hatti, Varun Singla | #ai-security#zero-trust#ai+3 |
| 2025-03-01 | Panel | Nullcon |
Navigating Data Protection in the age of globalisation
| Saikat Datta, Krishan Dev | #data-protection#gdpr#data-governance+4 |
| 2025-03-01 | Talk | Nullcon |
MLOps Under Attack: Threat Modeling Modern AI Systems
| Sandeep Singh | #ai#ml#ai-security+4 |
| 2025-03-01 | Talk | Nullcon |
The Future is Trustless: How zkVMS and zkTLS Transform Bug Bounties
| Anto Joseph | #bug-bounty#secure-development#security-testing+2 |
| 2024-12-12 | Panel | Blackhat |
Locknote: Conclusions and Key Takeaways from Black Hat Europe 2024
| Vandana Verma Sehgal, Jeff Moss, Stefano Zanero, James Forshaw, Meadow Ellis | #security-strategy#cybersecurity-framework#cyber-resilience+2 |
| 2024-12-12 | Tool demo | Blackhat |
Cloud Offensive Breach and Risk Assessment (COBRA)
| Harsha Koushik, Anand Tiwari | #cloud-pentesting#cloud-workload-protection#security-testing+3 |
| 2024-12-11 | Talk | Blackhat |
The CVSS Deception: How We’ve Been Misled on Vulnerability Severity
| Ankur Sand | #blueteam#security-strategy#threat-modeling+1 |
| 2024-11-21 | Talk | Securityfest |
Wheels of Wonder
| Hrishikesh Somchatwar | #automotive-cybersecurity#car-hacking#embedded-systems+4 |
| 2024-11-16 | Talk | C0c0n |
The subtle art of checkmating CISOs
| Sunil Varkey | #risk-management#architecture#security-governance+2 |
| 2024-11-16 | Talk | C0c0n |
Old Bugs, New Tricks: How N-Day Vulnerabilities Are Fueling Today’s Threat Landscape
| Dharani Sanjaiy | #bug-hunting#exploit-delivery#security-strategy+1 |
| 2024-11-16 | Panel | C0c0n |
When Falcon Strikes Back: The Defender’s Dilemma
| Burgess Cooper, Shivkumar Pandey, A Shiju Rawther, Padnya Manwar, Kishan Kendre | #incident-management#security-strategy#threat-modeling+2 |
| 2024-11-15 | Talk | C0c0n |
CISO’s take on BYOAI
| Venugopal Parameswara | #risk-management#security-governance#security-compliance+3 |
| 2024-11-15 | Talk | C0c0n |
GenAI and Autonomous Security in the Age of Zero Trust
| Philip Varughese Vayarakunnil | #ai#ai-security#zero-trust+2 |
| 2024-11-15 | Panel | C0c0n |
Intelligence led security
| Midhun Babu, Sameer Ratolikar, M v Sheshadri, A Shiju Rawther, Maya R Nair, Balakrishnan A | #security-strategy#data-analytics#ai-security+1 |
| 2024-09-26 | Talk | Rootcon |
How to have visibility and security OF CICD ecosystem
| Pramod Rana | #ci-cd#application-hardening#cicd-pipeline+4 |
| 2024-09-20 | Talk | 44con |
Unveiling the ghosts of mobile networks: When will old bugs die?
| Altaf Shaik | #5g#authentication#encryption+3 |
| 2024-08-14 | Talk | Usenix |
Shesha: Multi-head Microarchitectural Leakage Discovery in new-generation Intel Processors
| Anirban Chakraborty, Nimish Mishra, Debdeep Mukhopadhyay | #reverse-engineering#architecture#security-assessment |
| 2024-08-10 | Talk | Defcon |
Sneaky Extensions: The MV3 Escape Artists
| Vivek Ramachandran, Shourya Pratap Singh | #web-security#security-assessment#application-pentesting+4 |
| 2024-08-09 | Talk | Defcon |
Breaking Secure Web Gateways (SWG) for Fun and Profit
| Vivek Ramachandran, Jeswin Mathai | #swg#cloud-access-security-broker#application-pentesting+4 |
| 2024-08-09 | Talk | Defcon |
Breaking Secure Web Gateways (SWG) for Fun and Profit
| Vivek Ramachandran, Jeswin Mathai | #ssl#application-pentesting#secure-coding+3 |
| 2024-08-09 | Talk | Defcon |
Reflections on a Decade in Bug Bounties: Experiences and Major Takeaways
| Nikhil Shrivastava, Charles Waterhouse | #bug-hunting#bug-bounty#security-training+3 |
| 2024-08-08 | Tool demo | Blackhat |
Active Directory Cyber Deception using Huginn
| Rohan Durve, Paul Laine | #active-directory#incident-management#identity-governance+3 |
| 2024-08-08 | Tool demo | Blackhat |
Cloud Offensive Breach and Risk Assessment (COBRA)
| Anand Tiwari, Harsha Koushik | #cloud-security-posture-management#cloud-pentesting#security-testing+1 |
| 2024-08-07 | Tool demo | Blackhat |
TrafficWardenX: OpenWRT Security & Monitoring
| Sampad Adhikary, Tripti Sharma | #openwrt#network-monitoring#security-tools+3 |
| 2024-05-08 | Talk | Rsac |
How to CTF Infra - Beyond the Challenges and Flags
| Jayesh Chauhan, Max Gartman | #ctf#cloud-workload-protection#security-strategy+2 |
| 2024-05-08 | Talk | Blackhat |
Cloud and Platform Agnostic Security Posture Management (xSPM)
| Sunil Arora, Parthasarthi Chakraborty | #cloud-security-posture-management#security-strategy#security-compliance |
| 2024-05-07 | Talk | Rsac |
A Proven Approach on Automated Security Architectural Pattern Validation
| Sunil Arora, Parthasarathi Chakraborty | #architecture#devsecops#risk-management+1 |
| 2024-04-19 | Talk | Blackhat |
China’s Military Cyber Operations: Has the Strategic Support Force Come of Age?
| Pukhraj Singh | #ics-security#risk-management#architecture |
| 2024-04-19 | Talk | Blackhat |
Faults in Our Bus: Novel Bus Fault Attack to Break Trusted Execution Environments in Embedded Systems
| Anirban Chakraborty, Nimish Mishra, Debdeep Mukhopadhyay | #embedded-security#firmware-analysis#architecture+1 |
| 2024-04-18 | Tool demo | Blackhat |
Mantis - Asset Discovery at Scale
| Ankur Bhargava, Prateek Thakare, Saddam Hussain | #asset-inventory#architecture#devsecops+1 |
| 2024-04-18 | Tool demo | Blackhat |
Catching adversaries on Azure - Deception on Cloud
| Subhash Popuri | #azure#cloud-workload-protection#cloud-pentesting+4 |
| 2024-03-21 | Talk | Cansecwest |
Rolling in the Dough: How Microsoft Identified and Remidiated a Baker’s Dozen of Security Threats in the Windows DNS Server
| Arif Hussain, George Hughey | #security-assessment#architecture#incident-management |
| 2024-03-12 | Talk | Nullcon |
Secure Web Gateways are dead. What’s next?
| Vivek Ramachandran | #browser-security#application-hardening#security-strategy+2 |
| 2024-03-11 | Talk | Nullcon |
Hacking Trains
| Jaden Furtado | #hacking#ics-security#network-forensics+2 |
| 2023-12-06 | Tool demo | Blackhat |
SSH into any device from anywhere with ZERO Open Network ports
| Anthony Prakash, Colin Constable | #ssh#zero-trust#secure-development+1 |
| 2023-11-17 | Talk | Deepsec |
Nostalgic Memory – Remembering All the Wins and Losses for Protecting Memory Corruption
| Shubham Dubey | #reverse-engineering#exploitation#architecture |
| 2023-09-28 | Talk | Hackinparis |
How to have visibility and security OF CICD ecosystem
| Pramod Rana | #cicd-security#devsecops#architecture+4 |
| 2023-09-24 | Panel | Nullcon |
A CYBER-PHYSICAL SYSTEM FOR INDIA WITH SECURITY, PRIVACY, AND EQUITY
| Kunal Korgaonkar, Kapil Jaiswal, Malcolm Dsouza, Manoj Aggarwal, Niraj Sharma | #cyber-physical-systems#security-strategy#data-protection+1 |
| 2023-09-24 | Panel | Nullcon |
ADVERSARY SIMULATION AND INCIDENT RESPONSE IMPACT
| Shomiron Das Gupta, Yogi Kapur, Manish Tiwari | #incident-management#incident-detection#forensics+3 |
| 2023-09-24 | Panel | Nullcon |
C4CII - SECURING USE OF CLOUD IN CRITICAL INFORMATION INFRASTRUCTURE
| Saikat Datta, Akash Mahajan, Varun Singla, Navin Kumar Singh, Phil Rodrigues | #cloud-security-posture-management#cloud-workload-protection#critical-infrastructure+3 |
| 2023-09-23 | Panel | Nullcon |
CRITICAL INFORMATION INFRASTRUCTURE(CII) PROTECTION: CHALLENGES AND OPPORTUNITIES- HOW CAN THE NULLCON COMMUNITY CONTRIBUTE
| Saikat Datta, M v Sheshadri, Madhavi Purandare, Mathan Babu Kasilingam, Navin Kumar Singh | #critical-infrastructure#cybersecurity-framework#security-strategy+4 |
| 2023-09-23 | Talk | Nullcon |
How I hacked your bank account: A detailed look at UPI Security
| Abhay Rana | #hacking#application-hardening#input-validation+2 |
| 2023-09-23 | Talk | Nullcon |
The Curious Case Of The Rogue SOAR
| Mukesh Sai Kumar, Jaden Furtado | #blueteam#application-pentesting#dynamic-analysis+3 |
| 2023-09-23 | Talk | Nullcon |
Uncovering Azure’s Silent Threats: A Journey Into Cloud Vulnerabilities
| Nitesh Surana | #azure#cloud-pentesting#application-hardening+4 |
| 2023-08-12 | Talk | Defcon |
Getting More Bang for your Buck:Appsec on a Limited Budget
| Vandana Verma Sehgal, Viraj Gandhi | #secure-development#devsecops#risk-management+2 |
| 2023-08-10 | Talk | Blackhat |
Does Public Disclosure of Vulnerabilities Affect Hacker Participation in Bug Bounty Programs?
| Amit Deokar, Ali Ahmed, Brian Lee | #bug-hunting#incident-management#security-strategy+4 |
| 2023-08-09 | Talk | Blackhat |
Identifying and Reducing Permission Explosion in AWS: A Graph-Based and Analytical Approach
| Pankaj Moolrajani | #aws#cloud-security-posture-management#cloud-workload-protection+2 |
| 2023-08-07 | Talk | C0c0n |
Homomorphic Encryption - Myth to Reality
| Anish Koshy | #encryption#architecture#data-protection+1 |
| 2023-08-07 | Talk | C0c0n |
Trust Resiliency - A Lesson Learned from Russia Ukraine War
| Ajit Hatti | #incident-management#architecture#risk-management+1 |
| 2023-08-07 | Talk | C0c0n |
Uncovering Azure’s Silent Threats: A Story of Cloud Vulnerabilities
| Nitesh Surana | #azure#cloud-vulnerabilities#cloud-pentesting+1 |
| 2023-08-07 | Panel | C0c0n |
CII Protection: How can the c0c0n community contribute ?
| Navin Kumar Singh | #security-strategy#open-source-security#threat-modeling |
| 2023-08-07 | Talk | C0c0n |
Cyber Threats to Global Financial Systems
| Lince Lawrence | #incident-management#risk-management#cloud-monitoring+4 |
| 2023-08-07 | Panel | C0c0n |
Evolving Threat Landscape: Strategies for Adapting and Innovating in Cybersecurity
| Vikas Arora, Sanjay Singh, Baidyanath Kumar, Saurabh Gugnani, Gokulavan Jayaraman, Vijay Nair | #security-strategy#threat-modeling#security-training+3 |
| 2023-08-06 | Talk | C0c0n |
CBDC and future of Finance
| Sunil Raveendran | #digital-currency#decentralized-systems#compliance-governance+2 |
| 2023-08-06 | Talk | C0c0n |
Developments in Deep Fake detection
| Tapas Saini | #architecture#security-training#reverse-engineering |
| 2023-08-06 | Talk | C0c0n |
Expanding capability horizons : Homelabs and beyond
| Anant Shrivastava | #security-assessment#network-pentesting#architecture |
| 2023-08-06 | Talk | C0c0n |
Influence of Artificial Intelligence in GRC Space
| Mahesh Kalyanaraman | #security-governance#risk-management#security-compliance+2 |
| 2023-08-06 | Talk | C0c0n |
Subduing Adversaries with Information Superiority
| Antony K M | #threat-hunting#security-monitoring#threat-detection+2 |
| 2023-08-06 | Talk | C0c0n |
Survivability in the Cyber World
| Sunil Varkey | #incident-management#risk-management#architecture |
| 2023-08-06 | Talk | C0c0n |
The new way to be secure
| Sakshi Bhutani | #secure-development#devsecops#software-security+3 |
| 2023-08-06 | Panel | C0c0n |
nGen Cyber Threats - 2024 and Beyond: Embracing Chaos, Taking Charge
| Murli Nambiar, A Shiju Rawther, Jacxine Fernandez, Vishal Salvi, Sridhar Govardhan | #security-strategy#cybersecurity-framework#cyber-resilience+2 |
| 2023-08-06 | Talk | C0c0n |
Playing cat and mouse with the Adversary: Sometimes a breach is inevitable
| Abhijith B R | #incident-management#risk-management#security-strategy+1 |
| 2023-08-06 | Talk | C0c0n |
Securing the Future: Addressing Cybersecurity Challenges in the Age of 5G
| Altaf Shaik | #zero-trust#supply-chain-security#attack-surface+4 |
| 2023-08-06 | Talk | C0c0n |
Emerging crimes and threat landscape in cyber domain and the need for international cooperation
| Kiran Sivakumar | #threat-landscape#threat-modeling#risk-management |
| 2023-08-06 | Talk | C0c0n |
Time To Choose - Conventional CTI Or NextGen External Threat Landscape Management
| Kumar Ritesh | #threat-landscape#threat-modeling#threat-hunting+2 |
| 2023-04-26 | Talk | Rsac |
Designing Product Security for a Brighter Smile and a Healthier Tomorrow
| Lokesh Pidawekar, Apoorva Phadke | #secure-development#devsecops#software-security+2 |
| 2023-04-26 | Talk | Rsac |
Is Increasing Security Maturity And Decreasing Operational Load Possible?
| Rohit Dhamankar | #risk-management#architecture#security-governance+1 |
| 2023-04-21 | Talk | Hitbsecconf |
LOCKNOTE:THE HAND THAT STRIKES, ALSO BLOCKS
| Saumil Shah | #architecture#risk-management#security-training+1 |
| 2023-03-09 | Panel | Nullcon |
Elements of a Successful Security Strategy: A Comprehensive Approach
| Sheetal Joseph, Sybe Izzak Rispens, Travis Carelock | #security-strategy#security-testing#secure-development+4 |
| 2022-12-08 | Panel | Blackhat |
Locknote: Conclusions and Key Takeaways from Day 2
| Anant Shrivastava, Jeff Moss, Jiska Classen, Leigh Anney Galloway, Federico Maggi | #security-strategy#threat-modeling#cybersecurity-training+2 |
| 2022-09-28 | Talk | Rootcon |
Gazing into the Crystal Ball - The Fog of Cyberwarfare Escalations
| Harshit Agrawal | #ics-security#architecture#risk-management |
| 2022-09-24 | Talk | C0c0n |
Building Smart, Resilient and Sustainable Cyber Eco System
| Navin Kumar Singh | #risk-management#cybersecurity-strategy#architecture+4 |
| 2022-09-24 | Talk | C0c0n |
Cyber Defence and Role of private players - public private partnership
| Jasbir Singh Solanki | #security-governance#risk-management#security-compliance+1 |
| 2022-09-24 | Talk | C0c0n |
Know Your Organization? : Mapping Entities in Google Workspace
| Manish Gupta, Yash Bharadwaj | #gcp#identity-management#access-management+1 |
| 2022-09-24 | Talk | C0c0n |
Web3 Security - Security in MetaVerse, and the new world of web3
| Rohit Srivastwa | #web3#decentralized-systems#smart-contracts+2 |
| 2022-09-24 | Panel | C0c0n |
Data sovereignty - Challenges and the road ahead
| Sanjeev Sharma, Saranga Rajan, A Muralidhar, Jojy Joy | #data-governance#data-protection#gdpr+2 |
| 2022-09-24 | Panel | C0c0n |
MoonWorking’ and associated legal, ethical, security aspects
| Georgie Kurien, Sreekumar Balachandran, Sony A, Robin Joy | #cybersecurity-strategy#threat-modeling#cyber-law |
| 2022-09-24 | Talk | C0c0n |
Weaponising Social Media for Psychological Operations
| A a Gafoor | #social-engineering#security-training#threat-hunting+1 |
| 2022-09-23 | Talk | C0c0n |
Battle of 300 Crore - how they lost it and got most of it back
| Prashant Choudhary | #incident-management#risk-management#architecture |
| 2022-09-23 | Talk | C0c0n |
Bridging the gap between Security and Operations
| Sujay Rajashekar Gundagatti | #devsecops#architecture#threat-detection+2 |
| 2022-09-23 | Talk | C0c0n |
Building a Safer and Innovative Digital Ecosystem
| Vijay Pamarathi | #secure-development#devsecops#software-security+2 |
| 2022-09-23 | Talk | C0c0n |
Collaborative efforts for safe digital banking
| Biju K | #secure-development#risk-management#architecture |
| 2022-09-23 | Talk | C0c0n |
Cybersecurity for Manufacturing
| Santhosh Srinivasan | #ics-security#control-systems#critical-infrastructure+2 |
| 2022-09-23 | Talk | C0c0n |
Maximizing ROI on cyber security investments: Do you think Adversary Simulation OR Purple teaming holds the key?
| Abhijith B R | #risk-management#architecture#devsecops |
| 2022-09-23 | Talk | C0c0n |
Rolling out Central Bank Digital Currency - Technical Design Considerations
| Sunil Raveendran | #architecture#compliance-governance#risk-management+1 |
| 2022-09-23 | Talk | C0c0n |
Technological Reliance for Resilience
| Tulika Pandey | #risk-management#cyber-resilience#architecture+2 |
| 2022-09-23 | Talk | C0c0n |
Log4j vulnerability continuous to be favourite for APT groups through mid 2022
| Niranjan Jayanand | #security-assessment#apt#exploit-kit+1 |
| 2022-09-23 | Talk | C0c0n |
Ransomware: Prevention, Early Detection and Response
| Babitha Bp | #ransomware#incident-management#malware-prevention+2 |
| 2022-09-23 | Talk | C0c0n |
Threats Landscape and Intelligence of API & Shield to protect
| Navaneethan M | #api-security#threat-landscape#threat-hunting+1 |
| 2022-09-06 | Panel | Nullcon |
Cloud Services for Financial Inclusion: Possibilities & Challenges
| Nandkumar Saravade, Ganesh Ar, Himanshu Das, Navin Kumar Singh | #cloud-compliance#cloud-monitoring#financial-institutions+2 |
| 2022-09-06 | Panel | Nullcon |
Impact of disruptive technologies on CISO’s career & progression
| Burgess Cooper, Sandeep Karan, Jacxine Fernandez, Ravi Kumar, Ankur Bhargava | #security-strategy#cybersecurity-framework#ai-security |
| 2022-09-06 | Panel | Nullcon |
PAM Maturity From Zero Trust To Least Privilege
| Ajay Bongirwar, Charanjit Bhatia, Bala Ramanan | #security-strategy#zero-trust#access-management+2 |
| 2022-09-06 | Panel | Nullcon |
Secure Service Edge (SSE): Challenges & Upsides of Adoption
| Rahul Neel Mani, Anuprita Daga, Rajesh Hemrajani | #cloud-workload-protection#threat-modeling#zero-trust+1 |
| 2022-09-06 | Panel | Nullcon |
Securing India The CERTIn Way
| Saikat Datta, Sanjay Bahl, Ajit Menon, Anuprita Daga | #security-strategy#cybersecurity-framework#incident-management+3 |
| 2022-08-26 | Talk | Hitbsecconf |
CAN A FUZZER MATCH A HUMAN
| Bhargava Shastry | #fuzzing#solidity#smart-contracts+4 |
| 2022-08-14 | Talk | Defcon |
Tales from the trenches - why organizations struggle to get even the basics of OT asset visibility & detection right
| Vivek Ponnada | #ics-security#risk-management#architecture+1 |
| 2022-08-13 | Panel | Defcon |
Who doesn’t like a little Spice? Emulation Maturity, Team Culture and TTPs
| Niru Ragupathy | #security-development-lifecycle#security-tools#incident-management+2 |
| 2022-08-11 | Talk | Thedianainitiative |
Connecting Dots Between Security Teams & Customer Expectations
| Shruthi Kamath | #security-governance#risk-management#architecture+2 |
| 2022-08-10 | Talk | Blackhat |
The Open Threat Hunting Framework: Enabling Organizations to Build, Operationalize, and Scale Threat Hunting
| Sameer Koranne, John Dwyer, Neil Wyler | #threat-hunting#security-strategy#threat-modeling |
| 2022-05-18 | Panel | Phdays |
Challenges for cybersecurity conferences. Part II
| Aseem Jakhar, Timur Yunusov, Igor Lukic, Dhillon Andrew Kannabhiran | #security-training#cybersecurity-strategy#threat-modeling+3 |
| 2022-05-12 | Panel | Blackhat |
Locknote: Conclusions and Key Takeaways from Black Hat Asia 2022
| Vandana Verma Sehgal, Jeff Moss, Ryan Flores, Lidia Giuliano, Stefano Zanero | #security-strategy |
| 2022-04-08 | Talk | Nullcon |
Bheem OS - A next-generation reasonably secure OS using Rust MicroVM
| Akram Ansari, Subash Sn | #os#virtual-machine#container-security+3 |
| 2021-11-18 | Talk | Hackinparis |
Is it really an intrusion if you get called in?: Mis-configuration based attacks in AWS
| Kavisha Sheth | #aws#cloud-workload-protection#cloud-pentesting+3 |
| 2021-11-13 | Talk | C0c0n |
Changing Cyber Security Paradigm & Cyber Tsunami
| Sunil Varkey | #cybersecurity-strategy#threat-landscape#risk-management+3 |
| 2021-11-13 | Talk | C0c0n |
Cyber Warfare & Securing Critical Infrastructures
| Faruk Kazi | #critical-infrastructure#ics-security#incident-management+1 |
| 2021-11-13 | Talk | C0c0n |
Cybersecurity in the era of Resilience - A walk through people, process and technology
| Babitha B P | #risk-management#cyber-resilience#architecture+3 |
| 2021-11-13 | Talk | C0c0n |
Enhancing An Multi-Factor Authentication (MFA) through Behavioural Biometrics
| Kiran Kumar Pg | #authentication#mfa#architecture |
| 2021-11-13 | Talk | C0c0n |
Introducing Free & Open Elastic Limitless XDR
| Ravindra Ramnani | #threat-detection#security-monitoring#architecture |
| 2021-11-13 | Talk | C0c0n |
Need for Zero Trust in Banking
| Biju K | #zero-trust#risk-management#architecture+1 |
| 2021-11-13 | Talk | C0c0n |
Post pandemic Transformation - A CISO’s perspective
| Sridhar Govardhan | #risk-management#security-governance#security-compliance+3 |
| 2021-11-13 | Talk | C0c0n |
Zero Trust & Micro-segmentation
| Suresh Menon | #segmentation#zero-trust#network-architecture+1 |
| 2021-11-13 | Talk | C0c0n |
Mature Your Threat Hunting Program
| Neha Dhyani | #threat-hunting#threat-detection#threat-modeling+2 |
| 2021-11-13 | Talk | C0c0n |
Painting Your Organizations with Shades of Red, Blue & Purple
| Hidayath Khan | #red-teaming#ethical-hacking#threat-modeling+2 |
| 2021-11-12 | Talk | C0c0n |
Enterprise Governance and Risk Management
| Arathy Nair, Muskan Mangla | #security-compliance#security-governance#risk-management+1 |
| 2021-11-12 | Talk | C0c0n |
Executive Presence….a cardinal of the cyber rostrum
| Bishakha Jain | #security-training#architecture#security-governance |
| 2021-11-12 | Talk | C0c0n |
Post Covid CISOs - Disappearing trusted boundaries and Innovative CyberSecurity Approaches
| Illyas Kooliyankal | #risk-management#architecture#security-governance+1 |
| 2021-11-12 | Talk | C0c0n |
Regulating Social Media Platforms : Should it be done in Democratic Societies ?
| J Sam Daniel Stalin, Apar Gupta, Dinesh O Bareja, Prashant Mali, Jiten Jain | #security-compliance#security-governance#risk-management+3 |
| 2021-11-12 | Talk | C0c0n |
Understanding the Psychology Behind Threats - adding Twists to your Turns
| Saman Fatima | #threat-modeling#security-training#human-factor+1 |
| 2021-10-13 | Talk | Rootcon |
The Kill Chain: Future of Cyber in Defense
| Harshit Agrawal | #architecture#ics-security#risk-management |
| 2021-08-26 | Talk | Hitbsecconf |
Gazing Ahead: What Modern RF Combat Looks Like in the Next Decade
| Harshit Agrawal | #ics-security#architecture#risk-management |
| 2021-08-08 | Panel | Defcon |
Resilient cyber space: The role of hacker and security communities
| Manu Zacharia, Aseem Jakhar, Abhijith B R, Jay Turla, Omar Santos, Dave Lewis, Dhillon Kannabhiran | #security-training#threat-modeling#incident-management+3 |
| 2021-08-07 | Talk | Defcon |
The Curious Case of Knowing the Unknown
| Vandana Verma Sehgal | #threat-hunting#threat-modeling#architecture+1 |
| 2021-08-06 | Talk | Defcon |
Defending IoT in the Future of High-Tech Warfare
| Harshit Agrawal | #iot-pentesting#architecture#ics-security |
| 2021-08-06 | Panel | Defcon |
Adversary simulation, emulation or purple teaming - How would you define it?
| Anant Shrivastava, Vincent Yiu, Martin Ingesen, Jean Marie Bourbon, Samuel Kimmons, Joe Vest | #security-testing#incident-management#red-teaming+3 |
| 2021-08-05 | Talk | Blackhat |
5G IMSI Catchers Mirage
| Ravishankar Borgaonkar, Altaf Shaik | #ios#android#security-strategy+1 |
| 2021-08-05 | Talk | Blackhat |
The Devil is in the GAN: Defending Deep Generative Models Against Adversarial Attacks
| Ambrish Rawat, Killian Levacher, Mathieu Sinn | #ai#ai-security#deep-learning+4 |
| 2021-05-07 | Panel | Blackhat |
Insights and Predictions: What’s Next in InfoSec
| Vandana Verma Sehgal, Neil R. Wyler, Lidia Giuliano, Jeff Wilson, Vitaly Kamluk | #security-strategy#cybersecurity-training#cybersecurity-framework+2 |
| 2021-03-06 | Panel | Nullcon |
From Reactive to Proactive - Operationalizing your Threat Intel
| Akshat Jain, Amit Ghodekar, Suhas Desai, Ambuj Bhalla | #data-analytics#cybersecurity-strategy#intelligence-sharing+1 |
| 2021-03-05 | Panel | Nullcon |
CyberPhysical Systems Security - Trends, challenges & opportunities
| Frank Sanjay, Khushwant Pawar, Mayur Mehta, Faruk Kazi | #industrial-control-systems#operational-technology#embedded-systems+3 |
| 2020-11-21 | Talk | Appsecindonesia |
The caveats of the unseen: Crouching exposure, Hidden Misconfiguration
| Ashwin Vamshi | #architecture#devsecops#risk-management+1 |
| 2020-10-07 | Talk | Rootcon |
Zero Trust in the Era of Cloud
| Vandana Verma Sehgal | #zero-trust#cloud-workload-protection#security-strategy |
| 2020-09-18 | Talk | C0c0n |
Herd Immunity, in the Cyber World
| Sunil Varkey | #security-training#risk-management#architecture |
| 2020-09-18 | Talk | C0c0n |
Coping with Digital Transformation - A CISO perspective
| Maya R Nair | #risk-management#security-governance#architecture+2 |
| 2020-09-18 | Talk | C0c0n |
Demystifying Zero Trust - A Real world
| Sandeep Variyam | #zero-trust#architecture#security-governance+1 |
| 2020-09-18 | Talk | C0c0n |
Offensive & Scope Based Recon
| Harsh Bothra | #reconnaissance#network-architecture#security-strategy+1 |
| 2020-09-18 | Talk | C0c0n |
Supercharging your initial foothold in Red Team engagements
| Sachin S Kamath | #red-teaming#ethical-hacking#exploit-delivery+3 |
| 2020-09-18 | Talk | C0c0n |
Introducing SniperPhish: A Web-Email Spear Phishing Toolkit
| Sreehari Haridas, Gem George | #phishing#application-pentesting#security-development-lifecycle+4 |
| 2020-09-16 | Talk | Auscert |
Modern Browser Security - The First line of Defense
| Prateek Gianchandani | #browser-security#exploit-development#fuzzing+1 |
| 2020-08-21 | Talk | Thedianainitiative |
Trust, No Trust or Zero Trust - Myth Demystifying
| Vandana Verma Sehgal | #zero-trust#architecture#security-compliance+2 |
| 2020-08-06 | Panel | Blackhat |
Locknote: Conclusions and Key Takeaways from Day 2
| Aanchal Gupta, Kymberlee Price, Rodrigo Rubira Branco, Stefano Zanero | #security-strategy#threat-modeling#cybersecurity-training+2 |
| 2020-08-05 | Tool demo | Blackhat |
vPrioritizer: Learn to say NO to almost every vulnerability (art of risk prioritisation…)
| Pramod Rana | #risk-analysis#blueteam#security-strategy+4 |
| 2020-03-06 | Tool demo | Nullcon |
Omniscient
| Pramod Rana | #reconnaissance#blueteam#network-monitoring+4 |
| 2020-03-06 | Tool demo | Nullcon |
PivotSuite
| Manish Gupta | #red-teaming#security-assessment#network-architecture+2 |
| 2020-03-06 | Panel | Nullcon |
Predicting Danger: Building the Ideal Threat Intelligence Model
| Saikat Datta, Sandeep Sharma, Muslim Koser, Shankar Jadhav | #ai-security#machine-learning#nlp+3 |
| 2019-12-04 | Talk | Blackhat |
Bring Your Own Token (BYOT) to Replace the Traditional Smartcards for Strong Authentication and Signing
| Karthik Ramasamy, Eric Hampshire | #blueteam#smartcard#mfa+4 |
| 2019-11-09 | Talk | Toorcon |
100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans
| Jatin Kataria, Ang Cui | #reverse-engineering#hardware-reverse-engineering#architecture+2 |
| 2019-11-01 | Talk | Appsecdayaustralia |
Protecting the Damned: Deploying Insecure Applications at Scale
| Vivek Ramachandran | #blueteam#container-security#docker+3 |
| 2019-10-10 | Talk | Brucon |
Security transition from 4G to 5G: are we secure enough?
| Altaf Shaik, Ravishankar Borgaonkar | #5g#4g#network-architecture+3 |
| 2019-09-28 | Panel | C0c0n |
Align security and risk management strategies with enterprise objectives
| Abdul Karim Vettiyanickal, George Eapen, Ranjeet Rai, Amit Dubey, Biju K, Kanu Pathania | #security-strategy#cybersecurity-framework#cyber-resilience+4 |
| 2019-09-28 | Panel | C0c0n |
Implementing Data Protection Frameworks with evolving Technology-Challenges, Opportunities & Solutions
| B R Nath, Jijy Oommen, Maya R Nair, Ajay Porus, Georgie Kurien | #data-protection#data-governance#security-strategy |
| 2019-09-28 | Talk | C0c0n |
Vulnerability Prioritization with Threat Intelligence
| Muslim Koser, Devesh Vatsa, Rohit Srivastwa, Dinesh O Bareja | #threat-intelligence-analysis#automated-scanning#security-assessment+3 |
| 2019-09-27 | Talk | C0c0n |
A Day in the Life of a CISO
| Sridhar Govardhan | #security-compliance#security-governance#risk-management+2 |
| 2019-09-27 | Talk | C0c0n |
CISO Mind Set
| Lopa Mudraa Basuu | #risk-management#security-governance#security-compliance+1 |
| 2019-09-27 | Talk | C0c0n |
Industry 4.0 - Security and Compliance
| Santhosh Srinivasan | #ics-security#security-compliance#security-governance+2 |
| 2019-09-27 | Talk | C0c0n |
Looking a decade ahead: Big data, drones , Robots and cyber security.
| Rahul Sasi | #ics-security#architecture#ai-security+2 |
| 2019-09-27 | Talk | C0c0n |
Security @scale for startups
| Shivanath Somanathan | #devsecops#secure-development#software-security+2 |
| 2019-09-27 | Talk | C0c0n |
Block Chain for Secured Automation
| Sanat Bhat | #blueteam#smart-contracts#decentralised-security+1 |
| 2019-09-27 | Talk | C0c0n |
Defense in Depth for Embedded Systems
| Jiggyasu Sharma | #embedded-systems#blueteam#hardware-embedded+4 |
| 2019-09-13 | Talk | 44con |
The CISO’s Dilemma
| Saumil Shah | #blueteam#security-strategy#threat-modeling+4 |
| 2019-09-13 | Talk | 44con |
One Person Army – Playbook on how to be the first Security Engineer at a company
| Kashish Mittal | #devsecops#application-hardening#secure-development+4 |
| 2019-08-29 | Keynote | Hitbsecconf |
The CISO’s Dilemma
| Saumil Shah | #blueteam#compliance-governance#security-strategy+4 |
| 2019-08-09 | Talk | Defcon |
100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans
| Jatin Kataria, Rick Housley, Ang Cui | #reverse-engineering#architecture#hardware-reverse-engineering+1 |
| 2019-08-08 | Talk | Defcon |
Anatomy of cloud hacking
| Pratik Shah | #cloud-pentesting#post-exploitation#architecture+1 |
| 2019-08-08 | Tool demo | Defcon |
Let’s Map Your Network
| Pramod Rana | #reconnaissance#blueteam#network-monitoring+4 |
| 2019-08-08 | Talk | Blackhat |
100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans
| Jatin Kataria, Richard Housley, Ang Cui | #reverse-engineering#hardware-embedded#exploit-delivery+3 |
| 2019-08-07 | Tool demo | Blackhat |
Medaudit: Auditing Medical Devices and Healthcare Infrastructure
| Anirudh Duggal | #security-assessment#application-pentesting#network-architecture+1 |
| 2019-05-10 | Talk | Hitbsecconf |
HAXPO: RF Exploitation: Demystifying IoT/OT Hacks with SDR
| Himanshu Mehta, Harshit Agrawal | #rf#red-teaming#hardware-embedded+3 |
| 2019-05-09 | Talk | Hitbsecconf |
Make ARM Shellcode Great Again
| Saumil Shah | #arm#embedded-systems#firmware-analysis+1 |
| 2019-03-28 | Tool demo | Blackhat |
pytm: A Pythonic Framework for Threat Modeling
| Rohit Shambhuni, Izar Tarandach | #secure-coding#threat-modeling#red-teaming |
| 2019-03-02 | Panel | Nullcon |
CISO Strategy for OT and IoT risk and Threat Management
| Gaurav Shukla, Gomeet Pant, Rakesh Viswanathan, Sudarshan Rajagopal | #ics-security#iot-pentesting#cybersecurity-strategy+3 |
| 2019-03-01 | Panel | Nullcon |
Clear and Present Danger: Cyber Wars will Target Critical Infrastructure
| Sourabh Issar, Sachin Burman, Sudarshan Rajagopal, Somenath Kundu | #cyber-war#critical-infrastructure#security-strategy+1 |
| 2019-02-28 | Talk | Nullcon |
A Hacker Walks into a Co-working Space
| Rahul Binjve | #red-teaming#application-pentesting#network-architecture+2 |
| 2019-02-28 | Talk | Nullcon |
Dirty use of USSD Codes
| Ravishankar Borgaonkar | #ussd#red-teaming#social-engineering+3 |
| 2018-12-05 | Talk | Blackhat |
The Undeniable Truth: How Remote Attestation Circumvents Deniability Guarantees in Secure Messaging Protocols
| N Asokan, Lachlan Gunn, Ricardo Vieitez Parra | #red-teaming#encryption#threat-modeling+1 |
| 2018-11-27 | Talk | Hitbsecconf |
COMMSEC: Taking Over Telecom Networks
| Hardik Mehta, Loay Hassan Abdelrazek | #architecture#red-teaming#ss7+2 |
| 2018-11-02 | Talk | Hackfest |
Exploiting Connected Medical Devices: Lessons Learned & Data Earned
| Saurabh Harit | #red-teaming#wearables#iot-device-management+4 |
| 2018-11-02 | Talk | Hitbsecconf |
Defending The Enterprise in 2018
| Saumil Shah | #blueteam#security-strategy#threat-modeling+3 |
| 2018-10-19 | Talk | Appsecdayaustralia |
Threat Modeling-as-Code & Automation for DevSecOps wins
| Abhay Bhargav | #threat-modeling#devsecops#application-hardening+4 |
| 2018-10-15 | Talk | Hacklu |
Come to the dark side! We have radical insurance groups & ransomware
| Ankit Gangwal, Eireann Leverett | #ransomware#risk-management#cyber-insurance+2 |
| 2018-10-05 | Talk | C0c0n |
Blockchains as techno-power structures: towards emergence of P2P Politics
| Sunil Aggarwal | #decentralized-systems#decentralised-security#architecture+1 |
| 2018-10-05 | Talk | C0c0n |
Cybersecurity Embedded Digital Transformation - The Future
| Sunil Kanchi | #embedded-security#architecture#ics-security |
| 2018-10-05 | Talk | C0c0n |
Digital Innovation revolution in Kerala Government
| Sunil Varkey | #cybersecurity-strategy#architecture#risk-management+2 |
| 2018-10-05 | Talk | C0c0n |
Future of Mobility & Cyber Security
| Suja Chandy | #automotive-cybersecurity#ics-security#architecture+2 |
| 2018-10-05 | Talk | C0c0n |
Resiliency Focus alongside Digital Disruption
| Lince Lawrence | #architecture#risk-management#security-training+2 |
| 2018-10-05 | Talk | C0c0n |
Taking cyber security to the board room
| Amit Pradhan | #risk-management#security-compliance#security-governance+2 |
| 2018-10-05 | Talk | C0c0n |
Will Artificial Intelligence And Machine Learning Bring More Threats On Cyber Security?
| Roshy John | #risk-management#architecture#ai-security+2 |
| 2018-10-05 | Talk | C0c0n |
Defending Healthcare Base
| Jiggyasu Sharma | #blueteam#incident-management#security-monitoring+4 |
| 2018-10-04 | Talk | Brucon |
Disrupting the Kill Chain
| Vineet Bhatia | #incident-management#architecture#windows+3 |
| 2018-08-16 | Talk | Usenix |
Chipmunk or Pepe? Using Acoustical Analysis to Detect Voice-Channel Fraud at Scale
| Vijay Balasubramaniyan | #threat-detection#architecture#machine-learning+1 |
| 2018-08-16 | Talk | Usenix |
Man-in-the-Machine: Exploiting Ill-Secured Communication Inside the Computer
| Siddharth Rao, Thanh Bui, Markku Antikainen, Viswanathan Manihatty Bojan, Tuomas Aura | #security-assessment#architecture#application-hardening+4 |
| 2018-08-11 | Talk | Defcon |
Compression Oracle Attacks on VPN Networks
| Ahamed Nafeez | #vpn#network-architecture#application-pentesting+3 |
| 2018-08-09 | Talk | Defcon |
Anonymous rate-limiting in services with Direct Anonymous Attestation
| Konark Modi, Alex Catarineu | #data-protection#architecture#security-strategy+1 |
| 2018-08-08 | Tool demo | Blackhat |
DataSploit 2.0
| Kunal Aggarwal, Shubham Mittal | #osint#reconnaissance#data-governance+4 |
| 2018-08-08 | Tool demo | Blackhat |
PA Toolkit: Wireshark Plugins for Pentesters
| Nishant Sharma, Jeswin Mathai | #wireshark#security-assessment#network-architecture+2 |
| 2018-08-08 | Tool demo | Blackhat |
DejaVu: An Open Source Deception Framework
| Bhadreshkumar Patel, Harish Ramadoss | #blueteam#network-defense#honeypot+4 |
| 2018-08-08 | Tool demo | Blackhat |
ThreatPlaybook
| Abhay Bhargav, Sharath Kumar | #threat-modeling#ci-cd#security-development-lifecycle+4 |
| 2018-06-27 | Talk | First |
Securing your in-ear fitness coach: Challenges in hardening next generation wearables
| Sumanth Naropanth, Sunil Kumar | #secure-development#architecture#devsecops |
| 2018-03-13 | Talk | Troopers |
Securing your in-ear fitness coach: Challenges in hardening next generation wearables
| Sumanth Naropanth, Kavya Racharla | #secure-development#data-protection#architecture |
| 2018-03-03 | Panel | Nullcon |
Managing Cyber Risk in the Connected Environment
| Gaurav Shukla, Ramachandra Hegde, Sudarshan Rajagopal, Kabir Mulchandani | #security-strategy#threat-modeling#network-monitoring+1 |
| 2018-03-03 | Panel | Nullcon |
Next generation cyber SOC
| K K Mookhey, Mathan Babu Kasilingam, Hidayath Khan, Shivkumar Pandey, Michael Smith | #security-analytics#security-monitoring#cloud-workload-protection+4 |
| 2018-03-01 | Talk | Nullcon |
DARWIN (A parasite covert wireless network)
| Rushikesh D Nandedkar | #wifi#red-teaming#network-architecture+1 |
| 2018-03-01 | Talk | Nullcon |
Looting your bank savings using Digital India
| Indrajeet Bhuyan | #red-teaming#application-pentesting#api-security+4 |
| 2018-03-01 | Talk | Nullcon |
A Game between Adversary and AI Scientist
| Satnam Singh | #ai#blueteam#ai-security+3 |
| 2017-11-17 | Talk | Deepsec |
How Secure Are Your VoLTE And VoWiFi Calls?
| Sreepriya Chalakkal | #volte#vowifi#sip+1 |
| 2017-08-19 | Talk | C0c0n |
Building Trust for Digital Transactions in India’s COD Culture
| Parry Aftab, Betsy Broder, Sridhara R Sidhu, Mirza Faizan | #secure-development#risk-management#architecture |
| 2017-08-19 | Talk | C0c0n |
Trust, the foundation of Digital Mastery
| Sunil Varkey | #identity-management#authentication#risk-management+2 |
| 2017-08-19 | Panel | C0c0n |
Security in Banking - Being one step aheadt
| Sunil Varkey, Rajesh Hemrajani, Biju K, Bhavin Bhansali, B R Nath, V George Antony | #financial-institutions#secure-development#security-strategy |
| 2017-08-18 | Talk | C0c0n |
Dynamic Binary Instrumentation
| Vivek Arora, Bhaskar Rastogi | #dynamic-analysis#reverse-engineering#binary-analysis+1 |
| 2017-08-18 | Talk | C0c0n |
Moving from Cybersecurity Awareness to Cybersecurity Competence
| Anup Narayanan | #cybersecurity-education#cybersecurity-training#security-training+3 |
| 2017-08-18 | Talk | C0c0n |
Phishing threats to customers and mitigation
| Bhavin Bhansali | #phishing#anti-phishing#social-engineering+2 |
| 2017-08-18 | Talk | C0c0n |
10 Things I Hate About Your Honeypots or How to Setup Honeypots That Work
| Rahul Binjve | #honeypot#blueteam#network-monitoring+3 |
| 2017-08-18 | Talk | C0c0n |
Cyber Threat Intelligence - Are We There , Yet…?
| A Shiju Rawther | #threat-hunting#threat-modeling#ioc+3 |
| 2017-08-18 | Talk | C0c0n |
Prevent Dark Side of your Smart City - A Defensive Security model for Smart City and Critical Infrastructure
| Manas Pratim Sarma | #blueteam#critical-infrastructure#cybersecurity-strategy+2 |
| 2017-08-04 | Talk | Sha |
Attacking OpenSSL using Side-channel Attacks: The RSA case study
| Praveen Vadnala, Lukasz Chmielewski | #reverse-engineering#architecture#embedded-security |
| 2017-04-14 | Talk | Hitbsecconf |
COMMSEC: IoT Hacking Simplified
| Aseem Jakhar | #red-teaming#iot-pentesting#hardware-embedded+2 |
| 2017-04-13 | Keynote | Hitbsecconf |
Redefining Defense
| Saumil Shah | #blueteam#security-strategy#incident-management+2 |
| 2017-03-31 | Talk | Blackhat |
The Seven Axioms of Security
| Saumil Shah | #blueteam#security-strategy#threat-modeling+2 |
| 2017-03-21 | Talk | Troopers |
New attacks in 4G technologies
| Ravishankar Borgaonkar | #4g#attack-surface#threat-modeling+1 |
| 2017-03-04 | Panel | Nullcon |
Cyber-Security Blue-Print for the Future!
| Kapil Awasthi, Mathan Babu Kasilingam, Partha Sengupta, Sumit Malhotra | #security-strategy#threat-modeling#zero-trust |
| 2017-03-03 | Talk | Nullcon |
Breach Response - Time to shake up the status quo
| K K Mookhey, Pranesh Prakash, Sahir Hidayatullah, Shobha Jagathpal | #incident-management#risk-management#architecture+1 |
| 2017-03-03 | Talk | Nullcon |
Securing Critical National Infrastructure
| Shailendra Fuloria, R Sarangapani, Rahul Tongia, Michael Pyle, Justin Searle | #critical-infrastructure#ics-security#risk-management+3 |
| 2017-01-25 | Talk | Owaspappseccalifornia |
OCSP Stapling in the Wild
| Devdatta Akhawe, Emily Stark | #web-security#architecture#devsecops |
| 2016-11-04 | Talk | Blackhat |
Detach Me Not - DoS Attacks Against 4G Cellular Users Worldwide from your Desk
| Siddharth Rao, Bhanu Kotte, Dr. Silke Holtmanns | #dos#red-teaming#ss7+4 |
| 2016-10-27 | Talk | Brucon |
Decepticon The Rise and Evolution of an Intelligent Evil Twin…!!!
| Rushikesh D Nandedkar, Amrita C Iyer, Krishnakant Patil | #reverse-engineering#evil-twin-attack#network-monitoring+3 |
| 2016-10-19 | Talk | Hacklu |
2016: The Infosec Crossroads
| Saumil Shah | #philosophy#security-strategy#incident-management+3 |
| 2016-10-13 | Talk | Appsecusa |
When encryption is not enough: Attacking Wearable - Mobile Application communication over BLE
| Sumanth Naropanth, Kavya Racharla, Chandra Prakash Gopalaiah | #reverse-engineering#secure-development#ble+4 |
| 2016-09-14 | Talk | 44con |
2016: The Infosec Crossroads
| Saumil Shah | #blueteam#security-strategy#threat-modeling+4 |
| 2016-08-19 | Talk | C0c0n |
Kill the password - A new era of authentication
| Tamaghna Basu | #authentication#iam#architecture+1 |
| 2016-08-19 | Talk | C0c0n |
How (in)secure are Indian GSM networks?
| Ajay Fuloria | #gsm#gtp#imsi+4 |
| 2016-08-19 | Talk | C0c0n |
Abusing Digital Certificates : Malware Style
| Ajit Hatti | #red-teaming#exploit-delivery#threat-modeling |
| 2016-08-07 | Talk | Defcon |
Cyber Grand Shellphish
| Aravind Machiry, Yan Shoshitaishvili, Antonio Bianchi, Kevin Borgolte, Jacopo Corbetta, Francensco Disperati, Andrew Dutcher, Giovanni Vigna, Chris Salls, Nick Stephens, Fish Wang, John Grosen | #automated-exploit-detection#reverse-engineering#vulnerability-assessment+1 |
| 2016-08-06 | Tool demo | Defcon |
Datasploit
| Shubham Mittal | #osint#reconnaissance#data-leak+4 |
| 2016-08-04 | Tool demo | Blackhat |
Maltese (Malware Traffic Emulating Software)
| Sasi Siddharth | #dns#secure-coding#malware-detection+2 |
| 2016-03-15 | Talk | Groundzerosummit |
r00tKidz and Hacking
| Triveni Singh, Lea Paul | #security-assessment#ethical-hacking#privilege-escalation+2 |
| 2015-11-05 | Talk | Groundzerosummit |
Western Air Command
| B S Singh Deo | #network-defense#network-monitoring#network-pentesting+3 |
| 2015-11-05 | Talk | Groundzerosummit |
Elliptical Curve Cryptography
| Aneesha S | #encryption#elliptic-curve-cryptography#secure-development+1 |
| 2015-11-05 | Talk | Groundzerosummit |
Economics of Post Quantum Crypto Systems : Do we really Need it
| Ajit Hatti | #encryption#quantum-computing#security-strategy+1 |
| 2015-11-05 | Talk | Groundzerosummit |
Wolves Among Sheep: Defeating Targeted Attacks With Deception
| Sahir Hidayatullah, Raviraj Doshi | #blueteam#incident-detection#honeypot+2 |
| 2015-10-08 | Talk | Brucon |
The .11 Veil, Camouflage & Covert!!! Invisible Wifi, Revealed
| Rushikesh D Nandedkar, Amrita C Iyer | #wifi#network-pentesting#security-testing+2 |
| 2015-09-24 | Talk | Appsecusa |
Continuous Cloud Security Automation
| Rohit Pitke | #aws#devsecops#architecture |
| 2015-08-07 | Talk | Defcon |
Getting into the Trust Store We Trust
| Ajit Hatti | #reverse-engineering#architecture#security-strategy |
| 2015-08-01 | Talk | C0c0n |
S3curi7y at 36K feet
| Rugved Mehta, Gaurav Trivedi | #aws#azure#gcp+3 |
| 2015-02-07 | Panel | Nullcon |
Startup panel – Make in India
| Aseem Jakhar, Radha Shelat, Sumit D Chowdhury, Shomiron Das Gupta, Sastry Tumuluri, Shiju Sathyadevan | #security-strategy#cybersecurity-framework#business-resilience+4 |
| 2015-01-27 | Talk | Owaspappseccalifornia |
Anatomy of memory scraping, credit card stealing POS malware
| Amol Sarwate | #reverse-engineering#incident-management#architecture |
| 2014-11-13 | Talk | Groundzerosummit |
9 Cell Cyber Diplomacy
| Alok Vijayant | #architecture#risk-management#security-governance |
| 2014-11-13 | Talk | Groundzerosummit |
Network Time Protocol in Amplification Inferno
| Sriram Krishnan | #network-pentesting#network-vulnerability-assessment#network-architecture+2 |
| 2014-11-13 | Talk | Groundzerosummit |
Attacking Cryptography & PKI Implementations
| Ajit Hatti | #encryption#red-teaming#ssl+4 |
| 2014-11-13 | Talk | Groundzerosummit |
APT protection for the Enterprise
| Deepak Singla | #blueteam#apt#security-strategy |
| 2014-09-28 | Talk | Blackhat |
Understanding IMSI Privacy
| Swapnil Udar, Ravishankar Borgaonkar | #imsi#red-teaming#android+4 |
| 2014-08-22 | Talk | C0c0n |
Hacking Communication
| Akib Sayyed | #red-teaming#network-architecture#social-engineering+1 |
| 2014-08-22 | Talk | C0c0n |
Cryptocalypse, Heart Bleed : Is our Government Listening?
| Ajit Hatti | #encryption#ssl#cyber-law+3 |
| 2014-08-22 | Talk | C0c0n |
Cryptographic Backdoors: Subverting the RSA
| Adhokshaj Mishra | #encryption#red-teaming#security-strategy+3 |
| 2014-03-18 | Talk | Troopers |
Evolution of SIM Card Security
| Ravishankar Borgaonkar | #3gpp#gsma#embedded-systems+4 |
| 2014-02-14 | Talk | Nullcon |
User Privacy in Cellular Networks
| Ravishankar Borgaonkar | #data-protection#network-architecture#data-governance+2 |
| 2014-02-14 | Talk | Nullcon |
Wi-Hawk Password Auditing Tool
| Anamika Singh | #wifi#red-teaming#network-architecture |
| 2014-02-14 | Talk | Nullcon |
12 YEARS AND A BAKER’S DOZEN
| Saumil Shah | #philosophy#security-strategy#threat-modeling+3 |
| 2013-11-21 | Talk | Deepsec |
Europe In The Carna Botnet: Telnet’s Threat To The Largest Economy
| Parth Shukla | #botnet#telnet#network-architecture+3 |
| 2013-11-20 | Talk | Appsecusa |
Project Talk: OWASP OpenSAMM Project
| Pravir Chandra, Seba Deleersnyder | #software-security#secure-development#devsecops+4 |
| 2013-11-20 | Panel | Appsecusa |
Aim-Ready-Fire
| Pravir Chandra, Ajoy Kumar, Suprotik Ghose, Jason Rottaupt, Ramin Safai, Sean Barnum, Wendy Nather | #appsec#secure-development#security-strategy |
| 2013-11-07 | Talk | Groundzerosummit |
The seven sins of Wi-Fi security
| Vivek Ramachandran | #wifi#network-architecture#phishing+1 |
| 2013-11-07 | Talk | Groundzerosummit |
Abusing Google Apps: Google is my command and control center
| Ajin Abraham | #android#red-teaming#cloud-pentesting+4 |
| 2013-11-07 | Talk | Groundzerosummit |
Advanced security for advanced threats
| Kartik Shahani | #blueteam#security-strategy#threat-modeling+4 |
| 2013-11-07 | Talk | Groundzerosummit |
Setting the Data Center on fire
| Ajit Hatti | #red-teaming#incident-management#security-training+1 |
| 2013-09-27 | Talk | C0c0n |
ARM, Thumb and the Finger
| Aseem Jakhar | #reverse-engineering#binary-analysis#assembly-analysis+2 |
| 2013-09-27 | Talk | C0c0n |
From Bedroom to Boardroom - Taking your Weekend Infosec Project Global
| Vivek Ramachandran | #devsecops#secure-development#security-assessment+2 |
| 2013-09-27 | Talk | C0c0n |
Disclosing Vulnerabilities: The Bug Bounty Style
| Nikhil Prabhakar | #red-teaming#bug-bounty#ethical-hacking+3 |
| 2013-08-16 | Talk | Usenix |
Building Securable Infrastructure: Open-Source Private Clouds
| Pravir Chandra | #cloud-pentesting#architecture#open-source-security |
| 2013-08-15 | Talk | Usenix |
Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness
| Devdatta Akhawe, Adrienne Felt | #web-security#security-training#architecture+2 |
| 2013-08-15 | Talk | Usenix |
An Empirical Study of Vulnerability Rewards Programs
| Devdatta Akhawe, David Wagner, Matthew Finifter | #bug-bounty#software-security#risk-management+2 |
| 2013-07-31 | Talk | Blackhat |
LTE booms with vulnerabilities
| Ankit Gupta | #lte#ddos#network-architecture+2 |
| 2013-03-01 | Talk | Nullcon |
Sensitive Campus Security with Network
| Aravind Sitaraman | #blueteam#network-monitoring#security-strategy+4 |
| 2012-12-01 | Talk | Clubhack |
The difference between the “Reality” and “Feeling” of Security: Information Security and the Human Being
| Thomas Kurian Ambattu | #security-training#human-factor#risk-management+2 |
| 2012-12-01 | Talk | Clubhack |
Infrastructure Security
| Sivamurthy Hiremath | #blueteam#security-strategy#threat-modeling+1 |
| 2012-10-26 | Talk | Appsecusa |
The 7 Qualities of Highly Secure Software
| Mano Paul | #secure-development#software-security#secure-coding+3 |
| 2012-09-05 | Talk | 44con |
Why Integrity is left alone and not given TLC (Tender, Love and Care) it deserves?
| Jitender Arora | #data-protection#security-strategy#threat-modeling+3 |
| 2012-08-03 | Talk | C0c0n |
Business Continuity and Risk Management in Turbulent Times
| Venkataram Arabolu | #risk-management#business-continuity#security-compliance+2 |
| 2012-08-03 | Talk | C0c0n |
The Weakest Link - Reinforcing the Human Element
| Sandeep Godbole | #security-training#human-factor#cybersecurity-education+3 |
| 2012-08-03 | Talk | C0c0n |
Building Security Incident Detection & Handling Capabilities in Enterprises
| Sunil Varkey | #blueteam#incident-detection#security-strategy+4 |
| 2012-08-03 | Talk | C0c0n |
Contemporary Transcription and Resource Parasitism
| Arpit Patel | #exploitation#firewall#network-monitoring+1 |
| 2012-08-03 | Talk | C0c0n |
Enterprise server security
| Raghav Shandilya | #blueteam#security-tools#network-monitoring+2 |
| 2012-08-03 | Talk | C0c0n |
The Management of Information Security – A Corporate Practitioner’s Perspective
| Pawan Kumar Singh | #cyber-law#security-strategy#data-protection+2 |
| 2012-08-03 | Talk | C0c0n |
Gathering security requirements
| K v Prashant, Saleem Ahamed | #security-testing#secure-development#security-development-lifecycle+2 |
| 2012-03-16 | Talk | Blackhat |
IVR Security- Internal Network Attack via Phone Lines
| Rahul Sasi | #red-teaming#ivrs#network-pentesting+3 |
| 2012-02-15 | Talk | Nullcon |
Cyberspace: Global commons or a national asset
| Kamlesh Bajaj | #cyber-law#cybersecurity-framework#incident-management+1 |
| 2012-02-15 | Talk | Nullcon |
Shall we dust Beep? The Geo-strategic realities of Cyberwar
| Pukhraj Singh | #cyber-war#security-strategy#attack-surface |
| 2012-02-15 | Talk | Nullcon |
Best practices to improve the security grading of your project
| Hemant Khandelwal | #blueteam#threat-modeling#secure-development |
| 2011-12-04 | Talk | Clubhack |
Exploit the Exploit Kits
| Dhruv Soi | #red-teaming#exploit-kit#malware-distribution+4 |
| 2011-11-17 | Talk | Deepsec |
Behavioral Security: 10 steps forward 5 steps backward
| Sourabh Satish | #security-training#behavioral-change#risk-management+2 |
| 2011-10-08 | Talk | C0c0n |
Stratagemizing Security Against Perpetrators In Cloud Infrastructure
| K S Abhiraj | #blueteam#cloud-security-posture-management#cloud-pentesting+4 |
| 2011-10-07 | Talk | C0c0n |
Exploiting the TCP Simultaneous Connection to Provide a Low Cost DoS Mitigation Solution
| Ahamed Nafeez | #red-teaming#network-pentesting#network-architecture |
| 2011-09-19 | Talk | Hacklu |
The travelling hacksmith
| Saumil Shah | #red-teaming#ethical-hacking#exploit-delivery+2 |
| 2011-09-07 | Talk | Securitybyte |
Social Web & Privacy – An evolving world
| Bala Sathiamurthy, Aridaman Tripathi | #data-protection#api-security#security-compliance+2 |
| 2011-09-06 | Talk | Securitybyte |
Enabling Un-trusted Mashups
| Bishan Singh | #web-security#xss#csrf+4 |
| 2011-09-06 | Talk | Securitybyte |
Private Internet Circuits - Towards A Next Generation Internet
| Sanjay Deshpande | #network-architecture#encryption#network-defense |
| 2011-09-06 | Talk | Securitybyte |
Using Data Analytics for Incident Response
| Samir Saklikar | #incident-management#data-analytics#security-analytics+3 |
| 2011-02-25 | Talk | Nullcon |
Enterprise Paradigm for Controlling Data Leakage
| Deepak Rout | #data-leak#blueteam#data-loss-prevention+3 |
| 2011-02-25 | Talk | Nullcon |
Hacking the Parliament – A classic Social Engineering attack
| Anurag Dhanda | #social-engineering#reconnaissance#security-strategy+2 |
| 2011-02-25 | Talk | Nullcon |
Protect infrastructure or protect information – Lessons from Wikileaks
| Vishal Gupta | #data-leak#blueteam#data-protection+2 |
| 2010-12-04 | Talk | Clubhack |
Ultimate Pen Test – Compromising a highly secure environment
| Nikhil Mittal | #security-assessment#social-engineering#application-pentesting+4 |
| 2010-10-29 | Talk | T2 |
Hacking Femtocells
| Ravishankar Borgaonkar, Kevin Redon | #reverse-engineering#device-security#hardware-embedded+3 |
| 2010-04-21 | Talk | Hitbsecconf |
Web Security – Going Nowhere?
| Saumil Shah | #red-teaming#application-hardening#application-pentesting+4 |
| 2010-02-25 | Talk | Nullcon |
Quantum Computing Challenges in the field of security
| Navin Pai | #quantum-computing#security-strategy#threat-modeling+3 |
| 2009-12-05 | Talk | Clubhack |
Indian IT Act 2000 vs 2009
| Rohas Nagpal | #cyber-law#embedded-systems#firmware-analysis+4 |
| 2009-11-18 | Talk | Securitybyte |
Risk based Penetration Testing
| K K Mookhey | #security-assessment#risk-management#ethical-hacking+3 |
| 2009-11-17 | Talk | Securitybyte |
Business Continuity Case Study
| Venkataram Arabolu | #business-continuity#risk-management#business-resilience+3 |
| 2009-11-17 | Talk | Securitybyte |
Usability and Privacy in Security
| Ponnurangam Kumaraguru | #data-protection#architecture#security-training+2 |
| 2009-11-17 | Talk | Securitybyte |
Threat Modeling
| Varun Sharma | #threat-modeling#blueteam#security-strategy+4 |
| 2009-10-28 | Talk | Hacklu |
Ownage 2.0
| Saumil Shah | #red-teaming#ethical-hacking#exploit-delivery+2 |
| 2009-08-06 | Talk | C0c0n |
Information Warfare
| A a Gafoor, Vinayak Mishra | #threat-hunting#threat-modeling#security-training+2 |
| 2009-08-06 | Talk | C0c0n |
Know Your Enemy, and Yourself: Demystifying Threat Modelin
| Meera Subbarao | #blueteam#security-strategy#threat-modeling+4 |
| 2009-08-06 | Talk | C0c0n |
Management & Security of Large Scale Storage Devices
| Prashant Dinde | #blueteam#data-protection#security-strategy+2 |
| 2009-08-06 | Talk | C0c0n |
Microsoft Security Strategies
| Binoy VC | #blueteam#security-strategy#azure+4 |
| 2008-12-06 | Talk | Clubhack |
Immune IT: Moving from Security to Immunity
| Ajit Hatti | #blueteam#security-strategy#security-monitoring+4 |
| 2008-08-07 | Talk | Blackhat |
Got Citrix, Hack It!
| Shanit Gupta | #red-teaming#rdp#application-pentesting+1 |
| 2008-03-26 | Talk | Cansecwest |
Vulnerabilities Die Hard
| Kowsik Guruswamy | #red-teaming#ethical-hacking#exploit-delivery+2 |
| 2007-12-09 | Talk | Clubhack |
Vulnerabilities in VoIP Products and Services
| Gaurav Saha | #voip#red-teaming#sip+3 |
| 2007-08-02 | Talk | Blackhat |
The Evolution Of Phishing To Organized Crime
| Rohyt Belani | #social-engineering#phishing#threat-modeling+2 |
| 2007-04-18 | Talk | Cansecwest |
Low-Rate Denial-of-Service attacks
| Anil Kumar | #red-teaming#dos#network-defense+2 |
| 2005-07-28 | Talk | Blackhat |
Rapid Threat Modeling
| Akshay Aggarwal | #threat-modeling#red-teaming#security-strategy+4 |
| 2003-12-12 | Talk | Hitbsecconf |
Threats to Wireless Networks - War Driving
| Anurana Saluja | #wifi#network-architecture#threat-modeling+1 |
| 2003-02-26 | Talk | Blackhat |
HTTP: Advanced Assessment Techniques
| Saumil Shah | #fingerprinting#blueteam#application-pentesting+4 |
| 1998-07-29 | Talk | Blackhat |
Security as an enabler for new business opportunities - The Business Value of Security
| Karan Khanna | #risk-management#business-continuity#cyber-resilience+3 |