🧪 Experimental Feature

Focus Areas are an experimental feature that groups related content by tags. This page and its functionality may change as we refine the categorization system.

🏗️ Security Architecture

Security architecture and related activities

350
Contributors
269
Talks
25
Tool Demos
47
Panels
2
Keynotes

Top Contributors

Saumil Shah(14) Ajit Hatti(9) Vandana Verma Sehgal(9) Ravishankar Borgaonkar(8) Sunil Varkey(8)

Related Tags (8)


All Entries (343 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-12-11Tool demoBlackhat ThreatShield – The Intelligent Way of Threat Modelling Source Code Satyam Nagpal, Sayooj B Kumar, Ashwin Shenoi#threat-modeling#security-strategy#architecture+1
2025-12-11Tool demoBlackhat From Triage to Threat Modeling: Open-Source Security LLM in Action Source Code Dhruv Kedia, Sajana Weerawardhena#ai-security#threat-modeling#vulnerability-assessment+1
2025-08-07Tool demoBlackhat Q-TIP (QR Code Threat Inspection Platform) Rushikesh D Nandedkar#incident-management#web-security#architecture+1
2025-08-06Tool demoBlackhat ROP ROCKET: Advanced Framework for Return-Oriented Programming Source Code Shiva Shashank, Bramwell Brizendine#reverse-engineering#exploitation#security-assessment+2
2025-08-06TalkBlackhat The 5G Titanic Presentation Video Altaf Shaik#network-pentesting#network-architecture#architecture
2025-08-06Tool demoBlackhat ThreatShield - The Intelligent way of Threat Modelling Source Code Ashwin Shenoi, Satyam Nagpal, Sayooj B Kumar#threat-modeling#architecture#devsecops+1
2025-08-06PanelBlackhat Hacking the Status Quo: Tales From Leading Women in Cybersecurity Vandana Verma Sehgal, Chi en Shen, Natalie Silvanovich, Maddie Stone#security-training#cybersecurity-education#security-strategy
2025-04-30TalkRsac Got Supply Pain? A Real-World Approach to Supply Chain SDL Video Mohit Arora, Richard Tonry#secure-development#devsecops#risk-management+4
2025-04-29TalkRsac RAG-NAROK: What Poorly-Built RAGs Can Do to Data Security Whitepaper Video Akash Mukherjee, Saurabh Shintre#secure-development#devsecops#data-protection+1
2025-04-29TalkRsac It’s Always Risky in IT: Frontline Stories and Strategic Insights Whitepaper Video Gourav Nagar, Rohit Bansal#risk-management#security-compliance#cyber-resilience+4
2025-04-29TalkRsac XPIA Attacks—Rethinking Defense in Depth for an AI-Powered World Video Aanchal Gupta, Abhilasha Bhargav Spantzel, John Leo Jr, Stefano Zanero#ai#ai-security#input-validation+3
2025-04-04PanelBlackhat Locknote: Highlights & Key Takeaways from Black Hat Asia 2025 Vandana Verma Sehgal, Daniel Cuthbert, Ryan Flores, Vitaly Kamluk, Jeff Moss, Asuka Nakajima#security-strategy#cybersecurity-framework#digital-learning+1
2025-04-03Tool demoBlackhat Mantis - Asset Discovery at Scale Source Code Hitesh Thakur, Praveen Kanniah, Prateek Thakare#asset-inventory#cloud-workload-protection#security-tools+4
2025-03-02TalkNullcon Cyber Security from Telco lens Sanjeev Dhallam#network-architecture#network-hardening#network-monitoring+2
2025-03-02TalkNullcon eKYC Crisis: Securing the Lockers Video Kartik Lalan#risk-management#architecture#data-leak+4
2025-03-02TalkNullcon Hidden in Plain Sight: Large-Scale Exposure of Orphaned Commits on Major Git Platforms Presentation Video Kumar Ashwin#secure-coding#devsecops#architecture
2025-03-02PanelNullcon Modernizing Security Architecture: Platforms or Best-of-Breed, What Works Best? Ketan Vyas, Prajal Kulkarni, Satyavathi Divadari, Srihari Kotni#security-strategy#threat-modeling#zero-trust+3
2025-03-02TalkNullcon Satellite Communications: Analyzing and Protecting Space-Based Assets Video Drishti Jain#network-pentesting#ics-security#encryption+4
2025-03-02PanelNullcon How can organisations protect themselves against Advanced Cyber Threats Bithal Bhardwaj, Vishal Salvi#security-strategy#incident-management#phishing+1
2025-03-02PanelNullcon Cyber Fusion Center: The Command Center for Integrated Cyber Defense Avkash Kathiriya, Mathan Babu Kasilingam, Yogi Kapur#security-monitoring#network-defense#threat-modeling+3
2025-03-01PanelNullcon Converging IT and OT Security: Unified strategies for protection, detection and response Burgess Cooper, Kuldeep Singh, Shailendra Fuloria, Rohit Sharma, Sachin Burman, Yask Sharma#ics-security#cloud-workload-protection#security-strategy+1
2025-03-01PanelNullcon Cyber Tech 2030: The Next Chapter in AI, Zero Trust & Offensive Defense Ajit Hatti, Varun Singla#ai-security#zero-trust#ai+3
2025-03-01PanelNullcon Navigating Data Protection in the age of globalisation Saikat Datta, Krishan Dev#data-protection#gdpr#data-governance+4
2025-03-01TalkNullcon MLOps Under Attack: Threat Modeling Modern AI Systems Presentation Sandeep Singh#ai#ml#ai-security+4
2025-03-01TalkNullcon The Future is Trustless: How zkVMS and zkTLS Transform Bug Bounties Video Anto Joseph#bug-bounty#secure-development#security-testing+2
2024-12-12PanelBlackhat Locknote: Conclusions and Key Takeaways from Black Hat Europe 2024 Vandana Verma Sehgal, Jeff Moss, Stefano Zanero, James Forshaw, Meadow Ellis#security-strategy#cybersecurity-framework#cyber-resilience+2
2024-12-12Tool demoBlackhat Cloud Offensive Breach and Risk Assessment (COBRA) Source Code Harsha Koushik, Anand Tiwari#cloud-pentesting#cloud-workload-protection#security-testing+3
2024-12-11TalkBlackhat The CVSS Deception: How We’ve Been Misled on Vulnerability Severity Presentation Ankur Sand#blueteam#security-strategy#threat-modeling+1
2024-11-21TalkSecurityfest Wheels of Wonder Video Hrishikesh Somchatwar#automotive-cybersecurity#car-hacking#embedded-systems+4
2024-11-16TalkC0c0n The subtle art of checkmating CISOs Video Sunil Varkey#risk-management#architecture#security-governance+2
2024-11-16TalkC0c0n Old Bugs, New Tricks: How N-Day Vulnerabilities Are Fueling Today’s Threat Landscape Dharani Sanjaiy#bug-hunting#exploit-delivery#security-strategy+1
2024-11-16PanelC0c0n When Falcon Strikes Back: The Defender’s Dilemma Burgess Cooper, Shivkumar Pandey, A Shiju Rawther, Padnya Manwar, Kishan Kendre#incident-management#security-strategy#threat-modeling+2
2024-11-15TalkC0c0n CISO’s take on BYOAI Video Venugopal Parameswara#risk-management#security-governance#security-compliance+3
2024-11-15TalkC0c0n GenAI and Autonomous Security in the Age of Zero Trust Video Philip Varughese Vayarakunnil#ai#ai-security#zero-trust+2
2024-11-15PanelC0c0n Intelligence led security Midhun Babu, Sameer Ratolikar, M v Sheshadri, A Shiju Rawther, Maya R Nair, Balakrishnan A#security-strategy#data-analytics#ai-security+1
2024-09-26TalkRootcon How to have visibility and security OF CICD ecosystem Video Pramod Rana#ci-cd#application-hardening#cicd-pipeline+4
2024-09-20Talk44con Unveiling the ghosts of mobile networks: When will old bugs die? Video Altaf Shaik#5g#authentication#encryption+3
2024-08-14TalkUsenix Shesha: Multi-head Microarchitectural Leakage Discovery in new-generation Intel Processors Presentation Whitepaper Video Anirban Chakraborty, Nimish Mishra, Debdeep Mukhopadhyay#reverse-engineering#architecture#security-assessment
2024-08-10TalkDefcon Sneaky Extensions: The MV3 Escape Artists Video Vivek Ramachandran, Shourya Pratap Singh#web-security#security-assessment#application-pentesting+4
2024-08-09TalkDefcon Breaking Secure Web Gateways (SWG) for Fun and Profit Video Vivek Ramachandran, Jeswin Mathai#swg#cloud-access-security-broker#application-pentesting+4
2024-08-09TalkDefcon Breaking Secure Web Gateways (SWG) for Fun and Profit Video Vivek Ramachandran, Jeswin Mathai#ssl#application-pentesting#secure-coding+3
2024-08-09TalkDefcon Reflections on a Decade in Bug Bounties: Experiences and Major Takeaways Video Nikhil Shrivastava, Charles Waterhouse#bug-hunting#bug-bounty#security-training+3
2024-08-08Tool demoBlackhat Active Directory Cyber Deception using Huginn Source Code Rohan Durve, Paul Laine#active-directory#incident-management#identity-governance+3
2024-08-08Tool demoBlackhat Cloud Offensive Breach and Risk Assessment (COBRA) Source Code Anand Tiwari, Harsha Koushik#cloud-security-posture-management#cloud-pentesting#security-testing+1
2024-08-07Tool demoBlackhat TrafficWardenX: OpenWRT Security & Monitoring Sampad Adhikary, Tripti Sharma#openwrt#network-monitoring#security-tools+3
2024-05-08TalkRsac How to CTF Infra - Beyond the Challenges and Flags Presentation Jayesh Chauhan, Max Gartman#ctf#cloud-workload-protection#security-strategy+2
2024-05-08TalkBlackhat Cloud and Platform Agnostic Security Posture Management (xSPM) Video Sunil Arora, Parthasarthi Chakraborty#cloud-security-posture-management#security-strategy#security-compliance
2024-05-07TalkRsac A Proven Approach on Automated Security Architectural Pattern Validation Video Sunil Arora, Parthasarathi Chakraborty#architecture#devsecops#risk-management+1
2024-04-19TalkBlackhat China’s Military Cyber Operations: Has the Strategic Support Force Come of Age? Presentation Pukhraj Singh#ics-security#risk-management#architecture
2024-04-19TalkBlackhat Faults in Our Bus: Novel Bus Fault Attack to Break Trusted Execution Environments in Embedded Systems Presentation Anirban Chakraborty, Nimish Mishra, Debdeep Mukhopadhyay#embedded-security#firmware-analysis#architecture+1
2024-04-18Tool demoBlackhat Mantis - Asset Discovery at Scale Source Code Ankur Bhargava, Prateek Thakare, Saddam Hussain#asset-inventory#architecture#devsecops+1
2024-04-18Tool demoBlackhat Catching adversaries on Azure - Deception on Cloud Source Code Subhash Popuri#azure#cloud-workload-protection#cloud-pentesting+4
2024-03-21TalkCansecwest Rolling in the Dough: How Microsoft Identified and Remidiated a Baker’s Dozen of Security Threats in the Windows DNS Server Video Arif Hussain, George Hughey#security-assessment#architecture#incident-management
2024-03-12TalkNullcon Secure Web Gateways are dead. What’s next? Vivek Ramachandran#browser-security#application-hardening#security-strategy+2
2024-03-11TalkNullcon Hacking Trains Presentation Jaden Furtado#hacking#ics-security#network-forensics+2
2023-12-06Tool demoBlackhat SSH into any device from anywhere with ZERO Open Network ports Source Code Anthony Prakash, Colin Constable#ssh#zero-trust#secure-development+1
2023-11-17TalkDeepsec Nostalgic Memory – Remembering All the Wins and Losses for Protecting Memory Corruption Presentation Shubham Dubey#reverse-engineering#exploitation#architecture
2023-09-28TalkHackinparis How to have visibility and security OF CICD ecosystem Pramod Rana#cicd-security#devsecops#architecture+4
2023-09-24PanelNullcon A CYBER-PHYSICAL SYSTEM FOR INDIA WITH SECURITY, PRIVACY, AND EQUITY Kunal Korgaonkar, Kapil Jaiswal, Malcolm Dsouza, Manoj Aggarwal, Niraj Sharma#cyber-physical-systems#security-strategy#data-protection+1
2023-09-24PanelNullcon ADVERSARY SIMULATION AND INCIDENT RESPONSE IMPACT Shomiron Das Gupta, Yogi Kapur, Manish Tiwari#incident-management#incident-detection#forensics+3
2023-09-24PanelNullcon C4CII - SECURING USE OF CLOUD IN CRITICAL INFORMATION INFRASTRUCTURE Saikat Datta, Akash Mahajan, Varun Singla, Navin Kumar Singh, Phil Rodrigues#cloud-security-posture-management#cloud-workload-protection#critical-infrastructure+3
2023-09-23PanelNullcon CRITICAL INFORMATION INFRASTRUCTURE(CII) PROTECTION: CHALLENGES AND OPPORTUNITIES- HOW CAN THE NULLCON COMMUNITY CONTRIBUTE Video Saikat Datta, M v Sheshadri, Madhavi Purandare, Mathan Babu Kasilingam, Navin Kumar Singh#critical-infrastructure#cybersecurity-framework#security-strategy+4
2023-09-23TalkNullcon How I hacked your bank account: A detailed look at UPI Security Video Abhay Rana#hacking#application-hardening#input-validation+2
2023-09-23TalkNullcon The Curious Case Of The Rogue SOAR Presentation Video Mukesh Sai Kumar, Jaden Furtado#blueteam#application-pentesting#dynamic-analysis+3
2023-09-23TalkNullcon Uncovering Azure’s Silent Threats: A Journey Into Cloud Vulnerabilities Presentation Video Nitesh Surana#azure#cloud-pentesting#application-hardening+4
2023-08-12TalkDefcon Getting More Bang for your Buck:Appsec on a Limited Budget Video Vandana Verma Sehgal, Viraj Gandhi#secure-development#devsecops#risk-management+2
2023-08-10TalkBlackhat Does Public Disclosure of Vulnerabilities Affect Hacker Participation in Bug Bounty Programs? Presentation Amit Deokar, Ali Ahmed, Brian Lee#bug-hunting#incident-management#security-strategy+4
2023-08-09TalkBlackhat Identifying and Reducing Permission Explosion in AWS: A Graph-Based and Analytical Approach Presentation Pankaj Moolrajani#aws#cloud-security-posture-management#cloud-workload-protection+2
2023-08-07TalkC0c0n Homomorphic Encryption - Myth to Reality Video Anish Koshy#encryption#architecture#data-protection+1
2023-08-07TalkC0c0n Trust Resiliency - A Lesson Learned from Russia Ukraine War Video Ajit Hatti#incident-management#architecture#risk-management+1
2023-08-07TalkC0c0n Uncovering Azure’s Silent Threats: A Story of Cloud Vulnerabilities Video Nitesh Surana#azure#cloud-vulnerabilities#cloud-pentesting+1
2023-08-07PanelC0c0n CII Protection: How can the c0c0n community contribute ? Navin Kumar Singh#security-strategy#open-source-security#threat-modeling
2023-08-07TalkC0c0n Cyber Threats to Global Financial Systems Video Lince Lawrence#incident-management#risk-management#cloud-monitoring+4
2023-08-07PanelC0c0n Evolving Threat Landscape: Strategies for Adapting and Innovating in Cybersecurity Vikas Arora, Sanjay Singh, Baidyanath Kumar, Saurabh Gugnani, Gokulavan Jayaraman, Vijay Nair#security-strategy#threat-modeling#security-training+3
2023-08-06TalkC0c0n CBDC and future of Finance Video Sunil Raveendran#digital-currency#decentralized-systems#compliance-governance+2
2023-08-06TalkC0c0n Developments in Deep Fake detection Tapas Saini#architecture#security-training#reverse-engineering
2023-08-06TalkC0c0n Expanding capability horizons : Homelabs and beyond Video Anant Shrivastava#security-assessment#network-pentesting#architecture
2023-08-06TalkC0c0n Influence of Artificial Intelligence in GRC Space Mahesh Kalyanaraman#security-governance#risk-management#security-compliance+2
2023-08-06TalkC0c0n Subduing Adversaries with Information Superiority Video Antony K M#threat-hunting#security-monitoring#threat-detection+2
2023-08-06TalkC0c0n Survivability in the Cyber World Video Sunil Varkey#incident-management#risk-management#architecture
2023-08-06TalkC0c0n The new way to be secure Video Sakshi Bhutani#secure-development#devsecops#software-security+3
2023-08-06PanelC0c0n nGen Cyber Threats - 2024 and Beyond: Embracing Chaos, Taking Charge Murli Nambiar, A Shiju Rawther, Jacxine Fernandez, Vishal Salvi, Sridhar Govardhan#security-strategy#cybersecurity-framework#cyber-resilience+2
2023-08-06TalkC0c0n Playing cat and mouse with the Adversary: Sometimes a breach is inevitable Video Abhijith B R#incident-management#risk-management#security-strategy+1
2023-08-06TalkC0c0n Securing the Future: Addressing Cybersecurity Challenges in the Age of 5G Video Altaf Shaik#zero-trust#supply-chain-security#attack-surface+4
2023-08-06TalkC0c0n Emerging crimes and threat landscape in cyber domain and the need for international cooperation Video Kiran Sivakumar#threat-landscape#threat-modeling#risk-management
2023-08-06TalkC0c0n Time To Choose - Conventional CTI Or NextGen External Threat Landscape Management Video Kumar Ritesh#threat-landscape#threat-modeling#threat-hunting+2
2023-04-26TalkRsac Designing Product Security for a Brighter Smile and a Healthier Tomorrow Presentation Video Lokesh Pidawekar, Apoorva Phadke#secure-development#devsecops#software-security+2
2023-04-26TalkRsac Is Increasing Security Maturity And Decreasing Operational Load Possible? Video Rohit Dhamankar#risk-management#architecture#security-governance+1
2023-04-21TalkHitbsecconf LOCKNOTE:THE HAND THAT STRIKES, ALSO BLOCKS Presentation Video Saumil Shah#architecture#risk-management#security-training+1
2023-03-09PanelNullcon Elements of a Successful Security Strategy: A Comprehensive Approach Video Sheetal Joseph, Sybe Izzak Rispens, Travis Carelock#security-strategy#security-testing#secure-development+4
2022-12-08PanelBlackhat Locknote: Conclusions and Key Takeaways from Day 2 Anant Shrivastava, Jeff Moss, Jiska Classen, Leigh Anney Galloway, Federico Maggi#security-strategy#threat-modeling#cybersecurity-training+2
2022-09-28TalkRootcon Gazing into the Crystal Ball - The Fog of Cyberwarfare Escalations Harshit Agrawal#ics-security#architecture#risk-management
2022-09-24TalkC0c0n Building Smart, Resilient and Sustainable Cyber Eco System Navin Kumar Singh#risk-management#cybersecurity-strategy#architecture+4
2022-09-24TalkC0c0n Cyber Defence and Role of private players - public private partnership Jasbir Singh Solanki#security-governance#risk-management#security-compliance+1
2022-09-24TalkC0c0n Know Your Organization? : Mapping Entities in Google Workspace Manish Gupta, Yash Bharadwaj#gcp#identity-management#access-management+1
2022-09-24TalkC0c0n Web3 Security - Security in MetaVerse, and the new world of web3 Rohit Srivastwa#web3#decentralized-systems#smart-contracts+2
2022-09-24PanelC0c0n Data sovereignty - Challenges and the road ahead Sanjeev Sharma, Saranga Rajan, A Muralidhar, Jojy Joy#data-governance#data-protection#gdpr+2
2022-09-24PanelC0c0n MoonWorking’ and associated legal, ethical, security aspects Georgie Kurien, Sreekumar Balachandran, Sony A, Robin Joy#cybersecurity-strategy#threat-modeling#cyber-law
2022-09-24TalkC0c0n Weaponising Social Media for Psychological Operations A a Gafoor#social-engineering#security-training#threat-hunting+1
2022-09-23TalkC0c0n Battle of 300 Crore - how they lost it and got most of it back Prashant Choudhary#incident-management#risk-management#architecture
2022-09-23TalkC0c0n Bridging the gap between Security and Operations Sujay Rajashekar Gundagatti#devsecops#architecture#threat-detection+2
2022-09-23TalkC0c0n Building a Safer and Innovative Digital Ecosystem Vijay Pamarathi#secure-development#devsecops#software-security+2
2022-09-23TalkC0c0n Collaborative efforts for safe digital banking Biju K#secure-development#risk-management#architecture
2022-09-23TalkC0c0n Cybersecurity for Manufacturing Santhosh Srinivasan#ics-security#control-systems#critical-infrastructure+2
2022-09-23TalkC0c0n Maximizing ROI on cyber security investments: Do you think Adversary Simulation OR Purple teaming holds the key? Presentation Abhijith B R#risk-management#architecture#devsecops
2022-09-23TalkC0c0n Rolling out Central Bank Digital Currency - Technical Design Considerations Sunil Raveendran#architecture#compliance-governance#risk-management+1
2022-09-23TalkC0c0n Technological Reliance for Resilience Tulika Pandey#risk-management#cyber-resilience#architecture+2
2022-09-23TalkC0c0n Log4j vulnerability continuous to be favourite for APT groups through mid 2022 Niranjan Jayanand#security-assessment#apt#exploit-kit+1
2022-09-23TalkC0c0n Ransomware: Prevention, Early Detection and Response Babitha Bp#ransomware#incident-management#malware-prevention+2
2022-09-23TalkC0c0n Threats Landscape and Intelligence of API & Shield to protect Navaneethan M#api-security#threat-landscape#threat-hunting+1
2022-09-06PanelNullcon Cloud Services for Financial Inclusion: Possibilities & Challenges Video Nandkumar Saravade, Ganesh Ar, Himanshu Das, Navin Kumar Singh#cloud-compliance#cloud-monitoring#financial-institutions+2
2022-09-06PanelNullcon Impact of disruptive technologies on CISO’s career & progression Video Burgess Cooper, Sandeep Karan, Jacxine Fernandez, Ravi Kumar, Ankur Bhargava#security-strategy#cybersecurity-framework#ai-security
2022-09-06PanelNullcon PAM Maturity From Zero Trust To Least Privilege Video Ajay Bongirwar, Charanjit Bhatia, Bala Ramanan#security-strategy#zero-trust#access-management+2
2022-09-06PanelNullcon Secure Service Edge (SSE): Challenges & Upsides of Adoption Video Rahul Neel Mani, Anuprita Daga, Rajesh Hemrajani#cloud-workload-protection#threat-modeling#zero-trust+1
2022-09-06PanelNullcon Securing India The CERTIn Way Video Saikat Datta, Sanjay Bahl, Ajit Menon, Anuprita Daga#security-strategy#cybersecurity-framework#incident-management+3
2022-08-26TalkHitbsecconf CAN A FUZZER MATCH A HUMAN Presentation Bhargava Shastry#fuzzing#solidity#smart-contracts+4
2022-08-14TalkDefcon Tales from the trenches - why organizations struggle to get even the basics of OT asset visibility & detection right Vivek Ponnada#ics-security#risk-management#architecture+1
2022-08-13PanelDefcon Who doesn’t like a little Spice? Emulation Maturity, Team Culture and TTPs Niru Ragupathy#security-development-lifecycle#security-tools#incident-management+2
2022-08-11TalkThedianainitiative Connecting Dots Between Security Teams & Customer Expectations Video Shruthi Kamath#security-governance#risk-management#architecture+2
2022-08-10TalkBlackhat The Open Threat Hunting Framework: Enabling Organizations to Build, Operationalize, and Scale Threat Hunting Presentation Source Code Sameer Koranne, John Dwyer, Neil Wyler#threat-hunting#security-strategy#threat-modeling
2022-05-18PanelPhdays Challenges for cybersecurity conferences. Part II Aseem Jakhar, Timur Yunusov, Igor Lukic, Dhillon Andrew Kannabhiran#security-training#cybersecurity-strategy#threat-modeling+3
2022-05-12PanelBlackhat Locknote: Conclusions and Key Takeaways from Black Hat Asia 2022 Vandana Verma Sehgal, Jeff Moss, Ryan Flores, Lidia Giuliano, Stefano Zanero#security-strategy
2022-04-08TalkNullcon Bheem OS - A next-generation reasonably secure OS using Rust MicroVM Video Akram Ansari, Subash Sn#os#virtual-machine#container-security+3
2021-11-18TalkHackinparis Is it really an intrusion if you get called in?: Mis-configuration based attacks in AWS Kavisha Sheth#aws#cloud-workload-protection#cloud-pentesting+3
2021-11-13TalkC0c0n Changing Cyber Security Paradigm & Cyber Tsunami Sunil Varkey#cybersecurity-strategy#threat-landscape#risk-management+3
2021-11-13TalkC0c0n Cyber Warfare & Securing Critical Infrastructures Faruk Kazi#critical-infrastructure#ics-security#incident-management+1
2021-11-13TalkC0c0n Cybersecurity in the era of Resilience - A walk through people, process and technology Babitha B P#risk-management#cyber-resilience#architecture+3
2021-11-13TalkC0c0n Enhancing An Multi-Factor Authentication (MFA) through Behavioural Biometrics Kiran Kumar Pg#authentication#mfa#architecture
2021-11-13TalkC0c0n Introducing Free & Open Elastic Limitless XDR Ravindra Ramnani#threat-detection#security-monitoring#architecture
2021-11-13TalkC0c0n Need for Zero Trust in Banking Biju K#zero-trust#risk-management#architecture+1
2021-11-13TalkC0c0n Post pandemic Transformation - A CISO’s perspective Sridhar Govardhan#risk-management#security-governance#security-compliance+3
2021-11-13TalkC0c0n Zero Trust & Micro-segmentation Suresh Menon#segmentation#zero-trust#network-architecture+1
2021-11-13TalkC0c0n Mature Your Threat Hunting Program Neha Dhyani#threat-hunting#threat-detection#threat-modeling+2
2021-11-13TalkC0c0n Painting Your Organizations with Shades of Red, Blue & Purple Video Hidayath Khan#red-teaming#ethical-hacking#threat-modeling+2
2021-11-12TalkC0c0n Enterprise Governance and Risk Management Arathy Nair, Muskan Mangla#security-compliance#security-governance#risk-management+1
2021-11-12TalkC0c0n Executive Presence….a cardinal of the cyber rostrum Bishakha Jain#security-training#architecture#security-governance
2021-11-12TalkC0c0n Post Covid CISOs - Disappearing trusted boundaries and Innovative CyberSecurity Approaches Illyas Kooliyankal#risk-management#architecture#security-governance+1
2021-11-12TalkC0c0n Regulating Social Media Platforms : Should it be done in Democratic Societies ? J Sam Daniel Stalin, Apar Gupta, Dinesh O Bareja, Prashant Mali, Jiten Jain#security-compliance#security-governance#risk-management+3
2021-11-12TalkC0c0n Understanding the Psychology Behind Threats - adding Twists to your Turns Saman Fatima#threat-modeling#security-training#human-factor+1
2021-10-13TalkRootcon The Kill Chain: Future of Cyber in Defense Video Harshit Agrawal#architecture#ics-security#risk-management
2021-08-26TalkHitbsecconf Gazing Ahead: What Modern RF Combat Looks Like in the Next Decade Presentation Video Harshit Agrawal#ics-security#architecture#risk-management
2021-08-08PanelDefcon Resilient cyber space: The role of hacker and security communities Video Manu Zacharia, Aseem Jakhar, Abhijith B R, Jay Turla, Omar Santos, Dave Lewis, Dhillon Kannabhiran#security-training#threat-modeling#incident-management+3
2021-08-07TalkDefcon The Curious Case of Knowing the Unknown Video Vandana Verma Sehgal#threat-hunting#threat-modeling#architecture+1
2021-08-06TalkDefcon Defending IoT in the Future of High-Tech Warfare Video Harshit Agrawal#iot-pentesting#architecture#ics-security
2021-08-06PanelDefcon Adversary simulation, emulation or purple teaming - How would you define it? Video Anant Shrivastava, Vincent Yiu, Martin Ingesen, Jean Marie Bourbon, Samuel Kimmons, Joe Vest#security-testing#incident-management#red-teaming+3
2021-08-05TalkBlackhat 5G IMSI Catchers Mirage Presentation Video Ravishankar Borgaonkar, Altaf Shaik#ios#android#security-strategy+1
2021-08-05TalkBlackhat The Devil is in the GAN: Defending Deep Generative Models Against Adversarial Attacks Presentation Ambrish Rawat, Killian Levacher, Mathieu Sinn#ai#ai-security#deep-learning+4
2021-05-07PanelBlackhat Insights and Predictions: What’s Next in InfoSec Vandana Verma Sehgal, Neil R. Wyler, Lidia Giuliano, Jeff Wilson, Vitaly Kamluk#security-strategy#cybersecurity-training#cybersecurity-framework+2
2021-03-06PanelNullcon From Reactive to Proactive - Operationalizing your Threat Intel Video Akshat Jain, Amit Ghodekar, Suhas Desai, Ambuj Bhalla#data-analytics#cybersecurity-strategy#intelligence-sharing+1
2021-03-05PanelNullcon CyberPhysical Systems Security - Trends, challenges & opportunities Video Frank Sanjay, Khushwant Pawar, Mayur Mehta, Faruk Kazi#industrial-control-systems#operational-technology#embedded-systems+3
2020-11-21TalkAppsecindonesia The caveats of the unseen: Crouching exposure, Hidden Misconfiguration Ashwin Vamshi#architecture#devsecops#risk-management+1
2020-10-07TalkRootcon Zero Trust in the Era of Cloud Presentation Video Vandana Verma Sehgal#zero-trust#cloud-workload-protection#security-strategy
2020-09-18TalkC0c0n Herd Immunity, in the Cyber World Sunil Varkey#security-training#risk-management#architecture
2020-09-18TalkC0c0n Coping with Digital Transformation - A CISO perspective Video Maya R Nair#risk-management#security-governance#architecture+2
2020-09-18TalkC0c0n Demystifying Zero Trust - A Real world Video Sandeep Variyam#zero-trust#architecture#security-governance+1
2020-09-18TalkC0c0n Offensive & Scope Based Recon Video Harsh Bothra#reconnaissance#network-architecture#security-strategy+1
2020-09-18TalkC0c0n Supercharging your initial foothold in Red Team engagements Sachin S Kamath#red-teaming#ethical-hacking#exploit-delivery+3
2020-09-18TalkC0c0n Introducing SniperPhish: A Web-Email Spear Phishing Toolkit Source Code Video Sreehari Haridas, Gem George#phishing#application-pentesting#security-development-lifecycle+4
2020-09-16TalkAuscert Modern Browser Security - The First line of Defense Video Prateek Gianchandani#browser-security#exploit-development#fuzzing+1
2020-08-21TalkThedianainitiative Trust, No Trust or Zero Trust - Myth Demystifying Vandana Verma Sehgal#zero-trust#architecture#security-compliance+2
2020-08-06PanelBlackhat Locknote: Conclusions and Key Takeaways from Day 2 Aanchal Gupta, Kymberlee Price, Rodrigo Rubira Branco, Stefano Zanero#security-strategy#threat-modeling#cybersecurity-training+2
2020-08-05Tool demoBlackhat vPrioritizer: Learn to say NO to almost every vulnerability (art of risk prioritisation…) Source Code Pramod Rana#risk-analysis#blueteam#security-strategy+4
2020-03-06Tool demoNullcon Omniscient Source Code Pramod Rana#reconnaissance#blueteam#network-monitoring+4
2020-03-06Tool demoNullcon PivotSuite Source Code Manish Gupta#red-teaming#security-assessment#network-architecture+2
2020-03-06PanelNullcon Predicting Danger: Building the Ideal Threat Intelligence Model Video Saikat Datta, Sandeep Sharma, Muslim Koser, Shankar Jadhav#ai-security#machine-learning#nlp+3
2019-12-04TalkBlackhat Bring Your Own Token (BYOT) to Replace the Traditional Smartcards for Strong Authentication and Signing Presentation Whitepaper Video Karthik Ramasamy, Eric Hampshire#blueteam#smartcard#mfa+4
2019-11-09TalkToorcon 100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans Video Jatin Kataria, Ang Cui#reverse-engineering#hardware-reverse-engineering#architecture+2
2019-11-01TalkAppsecdayaustralia Protecting the Damned: Deploying Insecure Applications at Scale Video Vivek Ramachandran#blueteam#container-security#docker+3
2019-10-10TalkBrucon Security transition from 4G to 5G: are we secure enough? Presentation Video Altaf Shaik, Ravishankar Borgaonkar#5g#4g#network-architecture+3
2019-09-28PanelC0c0n Align security and risk management strategies with enterprise objectives Video Abdul Karim Vettiyanickal, George Eapen, Ranjeet Rai, Amit Dubey, Biju K, Kanu Pathania#security-strategy#cybersecurity-framework#cyber-resilience+4
2019-09-28PanelC0c0n Implementing Data Protection Frameworks with evolving Technology-Challenges, Opportunities & Solutions B R Nath, Jijy Oommen, Maya R Nair, Ajay Porus, Georgie Kurien#data-protection#data-governance#security-strategy
2019-09-28TalkC0c0n Vulnerability Prioritization with Threat Intelligence Muslim Koser, Devesh Vatsa, Rohit Srivastwa, Dinesh O Bareja#threat-intelligence-analysis#automated-scanning#security-assessment+3
2019-09-27TalkC0c0n A Day in the Life of a CISO Sridhar Govardhan#security-compliance#security-governance#risk-management+2
2019-09-27TalkC0c0n CISO Mind Set Lopa Mudraa Basuu#risk-management#security-governance#security-compliance+1
2019-09-27TalkC0c0n Industry 4.0 - Security and Compliance Santhosh Srinivasan#ics-security#security-compliance#security-governance+2
2019-09-27TalkC0c0n Looking a decade ahead: Big data, drones , Robots and cyber security. Rahul Sasi#ics-security#architecture#ai-security+2
2019-09-27TalkC0c0n Security @scale for startups Shivanath Somanathan#devsecops#secure-development#software-security+2
2019-09-27TalkC0c0n Block Chain for Secured Automation Sanat Bhat#blueteam#smart-contracts#decentralised-security+1
2019-09-27TalkC0c0n Defense in Depth for Embedded Systems Presentation Jiggyasu Sharma#embedded-systems#blueteam#hardware-embedded+4
2019-09-13Talk44con The CISO’s Dilemma Presentation Video Saumil Shah#blueteam#security-strategy#threat-modeling+4
2019-09-13Talk44con One Person Army – Playbook on how to be the first Security Engineer at a company Video Kashish Mittal#devsecops#application-hardening#secure-development+4
2019-08-29KeynoteHitbsecconf The CISO’s Dilemma Presentation Video Saumil Shah#blueteam#compliance-governance#security-strategy+4
2019-08-09TalkDefcon 100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans Video Jatin Kataria, Rick Housley, Ang Cui#reverse-engineering#architecture#hardware-reverse-engineering+1
2019-08-08TalkDefcon Anatomy of cloud hacking Pratik Shah#cloud-pentesting#post-exploitation#architecture+1
2019-08-08Tool demoDefcon Let’s Map Your Network Source Code Pramod Rana#reconnaissance#blueteam#network-monitoring+4
2019-08-08TalkBlackhat 100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans Presentation Video Jatin Kataria, Richard Housley, Ang Cui#reverse-engineering#hardware-embedded#exploit-delivery+3
2019-08-07Tool demoBlackhat Medaudit: Auditing Medical Devices and Healthcare Infrastructure Source Code Anirudh Duggal#security-assessment#application-pentesting#network-architecture+1
2019-05-10TalkHitbsecconf HAXPO: RF Exploitation: Demystifying IoT/OT Hacks with SDR Presentation Video Himanshu Mehta, Harshit Agrawal#rf#red-teaming#hardware-embedded+3
2019-05-09TalkHitbsecconf Make ARM Shellcode Great Again Presentation Video Saumil Shah#arm#embedded-systems#firmware-analysis+1
2019-03-28Tool demoBlackhat pytm: A Pythonic Framework for Threat Modeling Source Code Rohit Shambhuni, Izar Tarandach#secure-coding#threat-modeling#red-teaming
2019-03-02PanelNullcon CISO Strategy for OT and IoT risk and Threat Management Video Gaurav Shukla, Gomeet Pant, Rakesh Viswanathan, Sudarshan Rajagopal#ics-security#iot-pentesting#cybersecurity-strategy+3
2019-03-01PanelNullcon Clear and Present Danger: Cyber Wars will Target Critical Infrastructure Video Sourabh Issar, Sachin Burman, Sudarshan Rajagopal, Somenath Kundu#cyber-war#critical-infrastructure#security-strategy+1
2019-02-28TalkNullcon A Hacker Walks into a Co-working Space Video Rahul Binjve#red-teaming#application-pentesting#network-architecture+2
2019-02-28TalkNullcon Dirty use of USSD Codes Ravishankar Borgaonkar#ussd#red-teaming#social-engineering+3
2018-12-05TalkBlackhat The Undeniable Truth: How Remote Attestation Circumvents Deniability Guarantees in Secure Messaging Protocols Presentation Whitepaper Video N Asokan, Lachlan Gunn, Ricardo Vieitez Parra#red-teaming#encryption#threat-modeling+1
2018-11-27TalkHitbsecconf COMMSEC: Taking Over Telecom Networks Presentation Video Hardik Mehta, Loay Hassan Abdelrazek#architecture#red-teaming#ss7+2
2018-11-02TalkHackfest Exploiting Connected Medical Devices: Lessons Learned & Data Earned Video Saurabh Harit#red-teaming#wearables#iot-device-management+4
2018-11-02TalkHitbsecconf Defending The Enterprise in 2018 Saumil Shah#blueteam#security-strategy#threat-modeling+3
2018-10-19TalkAppsecdayaustralia Threat Modeling-as-Code & Automation for DevSecOps wins Video Abhay Bhargav#threat-modeling#devsecops#application-hardening+4
2018-10-15TalkHacklu Come to the dark side! We have radical insurance groups & ransomware Video Ankit Gangwal, Eireann Leverett#ransomware#risk-management#cyber-insurance+2
2018-10-05TalkC0c0n Blockchains as techno-power structures: towards emergence of P2P Politics Sunil Aggarwal#decentralized-systems#decentralised-security#architecture+1
2018-10-05TalkC0c0n Cybersecurity Embedded Digital Transformation - The Future Sunil Kanchi#embedded-security#architecture#ics-security
2018-10-05TalkC0c0n Digital Innovation revolution in Kerala Government Sunil Varkey#cybersecurity-strategy#architecture#risk-management+2
2018-10-05TalkC0c0n Future of Mobility & Cyber Security Suja Chandy#automotive-cybersecurity#ics-security#architecture+2
2018-10-05TalkC0c0n Resiliency Focus alongside Digital Disruption Lince Lawrence#architecture#risk-management#security-training+2
2018-10-05TalkC0c0n Taking cyber security to the board room Amit Pradhan#risk-management#security-compliance#security-governance+2
2018-10-05TalkC0c0n Will Artificial Intelligence And Machine Learning Bring More Threats On Cyber Security? Roshy John#risk-management#architecture#ai-security+2
2018-10-05TalkC0c0n Defending Healthcare Base Jiggyasu Sharma#blueteam#incident-management#security-monitoring+4
2018-10-04TalkBrucon Disrupting the Kill Chain Video Vineet Bhatia#incident-management#architecture#windows+3
2018-08-16TalkUsenix Chipmunk or Pepe? Using Acoustical Analysis to Detect Voice-Channel Fraud at Scale Video Vijay Balasubramaniyan#threat-detection#architecture#machine-learning+1
2018-08-16TalkUsenix Man-in-the-Machine: Exploiting Ill-Secured Communication Inside the Computer Presentation Whitepaper Video Siddharth Rao, Thanh Bui, Markku Antikainen, Viswanathan Manihatty Bojan, Tuomas Aura#security-assessment#architecture#application-hardening+4
2018-08-11TalkDefcon Compression Oracle Attacks on VPN Networks Presentation Ahamed Nafeez#vpn#network-architecture#application-pentesting+3
2018-08-09TalkDefcon Anonymous rate-limiting in services with Direct Anonymous Attestation Presentation Video Konark Modi, Alex Catarineu#data-protection#architecture#security-strategy+1
2018-08-08Tool demoBlackhat DataSploit 2.0 Source Code Kunal Aggarwal, Shubham Mittal#osint#reconnaissance#data-governance+4
2018-08-08Tool demoBlackhat PA Toolkit: Wireshark Plugins for Pentesters Source Code Nishant Sharma, Jeswin Mathai#wireshark#security-assessment#network-architecture+2
2018-08-08Tool demoBlackhat DejaVu: An Open Source Deception Framework Source Code Bhadreshkumar Patel, Harish Ramadoss#blueteam#network-defense#honeypot+4
2018-08-08Tool demoBlackhat ThreatPlaybook Source Code Abhay Bhargav, Sharath Kumar#threat-modeling#ci-cd#security-development-lifecycle+4
2018-06-27TalkFirst Securing your in-ear fitness coach: Challenges in hardening next generation wearables Presentation Sumanth Naropanth, Sunil Kumar#secure-development#architecture#devsecops
2018-03-13TalkTroopers Securing your in-ear fitness coach: Challenges in hardening next generation wearables Presentation Video Sumanth Naropanth, Kavya Racharla#secure-development#data-protection#architecture
2018-03-03PanelNullcon Managing Cyber Risk in the Connected Environment Video Gaurav Shukla, Ramachandra Hegde, Sudarshan Rajagopal, Kabir Mulchandani#security-strategy#threat-modeling#network-monitoring+1
2018-03-03PanelNullcon Next generation cyber SOC Video K K Mookhey, Mathan Babu Kasilingam, Hidayath Khan, Shivkumar Pandey, Michael Smith#security-analytics#security-monitoring#cloud-workload-protection+4
2018-03-01TalkNullcon DARWIN (A parasite covert wireless network) Video Rushikesh D Nandedkar#wifi#red-teaming#network-architecture+1
2018-03-01TalkNullcon Looting your bank savings using Digital India Presentation Video Indrajeet Bhuyan#red-teaming#application-pentesting#api-security+4
2018-03-01TalkNullcon A Game between Adversary and AI Scientist Presentation Video Satnam Singh#ai#blueteam#ai-security+3
2017-11-17TalkDeepsec How Secure Are Your VoLTE And VoWiFi Calls? Video Sreepriya Chalakkal#volte#vowifi#sip+1
2017-08-19TalkC0c0n Building Trust for Digital Transactions in India’s COD Culture Parry Aftab, Betsy Broder, Sridhara R Sidhu, Mirza Faizan#secure-development#risk-management#architecture
2017-08-19TalkC0c0n Trust, the foundation of Digital Mastery Sunil Varkey#identity-management#authentication#risk-management+2
2017-08-19PanelC0c0n Security in Banking - Being one step aheadt Sunil Varkey, Rajesh Hemrajani, Biju K, Bhavin Bhansali, B R Nath, V George Antony#financial-institutions#secure-development#security-strategy
2017-08-18TalkC0c0n Dynamic Binary Instrumentation Vivek Arora, Bhaskar Rastogi#dynamic-analysis#reverse-engineering#binary-analysis+1
2017-08-18TalkC0c0n Moving from Cybersecurity Awareness to Cybersecurity Competence Anup Narayanan#cybersecurity-education#cybersecurity-training#security-training+3
2017-08-18TalkC0c0n Phishing threats to customers and mitigation Bhavin Bhansali#phishing#anti-phishing#social-engineering+2
2017-08-18TalkC0c0n 10 Things I Hate About Your Honeypots or How to Setup Honeypots That Work Rahul Binjve#honeypot#blueteam#network-monitoring+3
2017-08-18TalkC0c0n Cyber Threat Intelligence - Are We There , Yet…? A Shiju Rawther#threat-hunting#threat-modeling#ioc+3
2017-08-18TalkC0c0n Prevent Dark Side of your Smart City - A Defensive Security model for Smart City and Critical Infrastructure Manas Pratim Sarma#blueteam#critical-infrastructure#cybersecurity-strategy+2
2017-08-04TalkSha Attacking OpenSSL using Side-channel Attacks: The RSA case study Whitepaper Video Praveen Vadnala, Lukasz Chmielewski#reverse-engineering#architecture#embedded-security
2017-04-14TalkHitbsecconf COMMSEC: IoT Hacking Simplified Presentation Source Code Video Aseem Jakhar#red-teaming#iot-pentesting#hardware-embedded+2
2017-04-13KeynoteHitbsecconf Redefining Defense Presentation Video Saumil Shah#blueteam#security-strategy#incident-management+2
2017-03-31TalkBlackhat The Seven Axioms of Security Presentation Video Saumil Shah#blueteam#security-strategy#threat-modeling+2
2017-03-21TalkTroopers New attacks in 4G technologies Ravishankar Borgaonkar#4g#attack-surface#threat-modeling+1
2017-03-04PanelNullcon Cyber-Security Blue-Print for the Future! Kapil Awasthi, Mathan Babu Kasilingam, Partha Sengupta, Sumit Malhotra#security-strategy#threat-modeling#zero-trust
2017-03-03TalkNullcon Breach Response - Time to shake up the status quo Video K K Mookhey, Pranesh Prakash, Sahir Hidayatullah, Shobha Jagathpal#incident-management#risk-management#architecture+1
2017-03-03TalkNullcon Securing Critical National Infrastructure Video Shailendra Fuloria, R Sarangapani, Rahul Tongia, Michael Pyle, Justin Searle#critical-infrastructure#ics-security#risk-management+3
2017-01-25TalkOwaspappseccalifornia OCSP Stapling in the Wild Video Devdatta Akhawe, Emily Stark#web-security#architecture#devsecops
2016-11-04TalkBlackhat Detach Me Not - DoS Attacks Against 4G Cellular Users Worldwide from your Desk Presentation Video Siddharth Rao, Bhanu Kotte, Dr. Silke Holtmanns#dos#red-teaming#ss7+4
2016-10-27TalkBrucon Decepticon The Rise and Evolution of an Intelligent Evil Twin…!!! Video Rushikesh D Nandedkar, Amrita C Iyer, Krishnakant Patil#reverse-engineering#evil-twin-attack#network-monitoring+3
2016-10-19TalkHacklu 2016: The Infosec Crossroads Presentation Saumil Shah#philosophy#security-strategy#incident-management+3
2016-10-13TalkAppsecusa When encryption is not enough: Attacking Wearable - Mobile Application communication over BLE Video Sumanth Naropanth, Kavya Racharla, Chandra Prakash Gopalaiah#reverse-engineering#secure-development#ble+4
2016-09-14Talk44con 2016: The Infosec Crossroads Presentation Video Saumil Shah#blueteam#security-strategy#threat-modeling+4
2016-08-19TalkC0c0n Kill the password - A new era of authentication Tamaghna Basu#authentication#iam#architecture+1
2016-08-19TalkC0c0n How (in)secure are Indian GSM networks? Ajay Fuloria#gsm#gtp#imsi+4
2016-08-19TalkC0c0n Abusing Digital Certificates : Malware Style Ajit Hatti#red-teaming#exploit-delivery#threat-modeling
2016-08-07TalkDefcon Cyber Grand Shellphish Video Aravind Machiry, Yan Shoshitaishvili, Antonio Bianchi, Kevin Borgolte, Jacopo Corbetta, Francensco Disperati, Andrew Dutcher, Giovanni Vigna, Chris Salls, Nick Stephens, Fish Wang, John Grosen#automated-exploit-detection#reverse-engineering#vulnerability-assessment+1
2016-08-06Tool demoDefcon Datasploit Source Code Shubham Mittal#osint#reconnaissance#data-leak+4
2016-08-04Tool demoBlackhat Maltese (Malware Traffic Emulating Software) Source Code Sasi Siddharth#dns#secure-coding#malware-detection+2
2016-03-15TalkGroundzerosummit r00tKidz and Hacking Triveni Singh, Lea Paul#security-assessment#ethical-hacking#privilege-escalation+2
2015-11-05TalkGroundzerosummit Western Air Command B S Singh Deo#network-defense#network-monitoring#network-pentesting+3
2015-11-05TalkGroundzerosummit Elliptical Curve Cryptography Aneesha S#encryption#elliptic-curve-cryptography#secure-development+1
2015-11-05TalkGroundzerosummit Economics of Post Quantum Crypto Systems : Do we really Need it Ajit Hatti#encryption#quantum-computing#security-strategy+1
2015-11-05TalkGroundzerosummit Wolves Among Sheep: Defeating Targeted Attacks With Deception Sahir Hidayatullah, Raviraj Doshi#blueteam#incident-detection#honeypot+2
2015-10-08TalkBrucon The .11 Veil, Camouflage & Covert!!! Invisible Wifi, Revealed Presentation Video Rushikesh D Nandedkar, Amrita C Iyer#wifi#network-pentesting#security-testing+2
2015-09-24TalkAppsecusa Continuous Cloud Security Automation Video Rohit Pitke#aws#devsecops#architecture
2015-08-07TalkDefcon Getting into the Trust Store We Trust Ajit Hatti#reverse-engineering#architecture#security-strategy
2015-08-01TalkC0c0n S3curi7y at 36K feet Rugved Mehta, Gaurav Trivedi#aws#azure#gcp+3
2015-02-07PanelNullcon Startup panel – Make in India Aseem Jakhar, Radha Shelat, Sumit D Chowdhury, Shomiron Das Gupta, Sastry Tumuluri, Shiju Sathyadevan#security-strategy#cybersecurity-framework#business-resilience+4
2015-01-27TalkOwaspappseccalifornia Anatomy of memory scraping, credit card stealing POS malware Video Amol Sarwate#reverse-engineering#incident-management#architecture
2014-11-13TalkGroundzerosummit 9 Cell Cyber Diplomacy Alok Vijayant#architecture#risk-management#security-governance
2014-11-13TalkGroundzerosummit Network Time Protocol in Amplification Inferno Sriram Krishnan#network-pentesting#network-vulnerability-assessment#network-architecture+2
2014-11-13TalkGroundzerosummit Attacking Cryptography & PKI Implementations Ajit Hatti#encryption#red-teaming#ssl+4
2014-11-13TalkGroundzerosummit APT protection for the Enterprise Deepak Singla#blueteam#apt#security-strategy
2014-09-28TalkBlackhat Understanding IMSI Privacy Presentation Video Swapnil Udar, Ravishankar Borgaonkar#imsi#red-teaming#android+4
2014-08-22TalkC0c0n Hacking Communication Akib Sayyed#red-teaming#network-architecture#social-engineering+1
2014-08-22TalkC0c0n Cryptocalypse, Heart Bleed : Is our Government Listening? Ajit Hatti#encryption#ssl#cyber-law+3
2014-08-22TalkC0c0n Cryptographic Backdoors: Subverting the RSA Adhokshaj Mishra#encryption#red-teaming#security-strategy+3
2014-03-18TalkTroopers Evolution of SIM Card Security Presentation Ravishankar Borgaonkar#3gpp#gsma#embedded-systems+4
2014-02-14TalkNullcon User Privacy in Cellular Networks Ravishankar Borgaonkar#data-protection#network-architecture#data-governance+2
2014-02-14TalkNullcon Wi-Hawk Password Auditing Tool Presentation Source Code Anamika Singh#wifi#red-teaming#network-architecture
2014-02-14TalkNullcon 12 YEARS AND A BAKER’S DOZEN Presentation Video Saumil Shah#philosophy#security-strategy#threat-modeling+3
2013-11-21TalkDeepsec Europe In The Carna Botnet: Telnet’s Threat To The Largest Economy Video Parth Shukla#botnet#telnet#network-architecture+3
2013-11-20TalkAppsecusa Project Talk: OWASP OpenSAMM Project Presentation Pravir Chandra, Seba Deleersnyder#software-security#secure-development#devsecops+4
2013-11-20PanelAppsecusa Aim-Ready-Fire Pravir Chandra, Ajoy Kumar, Suprotik Ghose, Jason Rottaupt, Ramin Safai, Sean Barnum, Wendy Nather#appsec#secure-development#security-strategy
2013-11-07TalkGroundzerosummit The seven sins of Wi-Fi security Vivek Ramachandran#wifi#network-architecture#phishing+1
2013-11-07TalkGroundzerosummit Abusing Google Apps: Google is my command and control center Presentation Ajin Abraham#android#red-teaming#cloud-pentesting+4
2013-11-07TalkGroundzerosummit Advanced security for advanced threats Kartik Shahani#blueteam#security-strategy#threat-modeling+4
2013-11-07TalkGroundzerosummit Setting the Data Center on fire Ajit Hatti#red-teaming#incident-management#security-training+1
2013-09-27TalkC0c0n ARM, Thumb and the Finger Aseem Jakhar#reverse-engineering#binary-analysis#assembly-analysis+2
2013-09-27TalkC0c0n From Bedroom to Boardroom - Taking your Weekend Infosec Project Global Vivek Ramachandran#devsecops#secure-development#security-assessment+2
2013-09-27TalkC0c0n Disclosing Vulnerabilities: The Bug Bounty Style Nikhil Prabhakar#red-teaming#bug-bounty#ethical-hacking+3
2013-08-16TalkUsenix Building Securable Infrastructure: Open-Source Private Clouds Video Pravir Chandra#cloud-pentesting#architecture#open-source-security
2013-08-15TalkUsenix Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness Presentation Whitepaper Devdatta Akhawe, Adrienne Felt#web-security#security-training#architecture+2
2013-08-15TalkUsenix An Empirical Study of Vulnerability Rewards Programs Presentation Whitepaper Devdatta Akhawe, David Wagner, Matthew Finifter#bug-bounty#software-security#risk-management+2
2013-07-31TalkBlackhat LTE booms with vulnerabilities Whitepaper Ankit Gupta#lte#ddos#network-architecture+2
2013-03-01TalkNullcon Sensitive Campus Security with Network Video Aravind Sitaraman#blueteam#network-monitoring#security-strategy+4
2012-12-01TalkClubhack The difference between the “Reality” and “Feeling” of Security: Information Security and the Human Being Presentation Video Thomas Kurian Ambattu#security-training#human-factor#risk-management+2
2012-12-01TalkClubhack Infrastructure Security Presentation Video Sivamurthy Hiremath#blueteam#security-strategy#threat-modeling+1
2012-10-26TalkAppsecusa The 7 Qualities of Highly Secure Software Video Mano Paul#secure-development#software-security#secure-coding+3
2012-09-05Talk44con Why Integrity is left alone and not given TLC (Tender, Love and Care) it deserves? Video Jitender Arora#data-protection#security-strategy#threat-modeling+3
2012-08-03TalkC0c0n Business Continuity and Risk Management in Turbulent Times Venkataram Arabolu#risk-management#business-continuity#security-compliance+2
2012-08-03TalkC0c0n The Weakest Link - Reinforcing the Human Element Sandeep Godbole#security-training#human-factor#cybersecurity-education+3
2012-08-03TalkC0c0n Building Security Incident Detection & Handling Capabilities in Enterprises Sunil Varkey#blueteam#incident-detection#security-strategy+4
2012-08-03TalkC0c0n Contemporary Transcription and Resource Parasitism Arpit Patel#exploitation#firewall#network-monitoring+1
2012-08-03TalkC0c0n Enterprise server security Raghav Shandilya#blueteam#security-tools#network-monitoring+2
2012-08-03TalkC0c0n The Management of Information Security – A Corporate Practitioner’s Perspective Pawan Kumar Singh#cyber-law#security-strategy#data-protection+2
2012-08-03TalkC0c0n Gathering security requirements K v Prashant, Saleem Ahamed#security-testing#secure-development#security-development-lifecycle+2
2012-03-16TalkBlackhat IVR Security- Internal Network Attack via Phone Lines Presentation Source Code Video Rahul Sasi#red-teaming#ivrs#network-pentesting+3
2012-02-15TalkNullcon Cyberspace: Global commons or a national asset Kamlesh Bajaj#cyber-law#cybersecurity-framework#incident-management+1
2012-02-15TalkNullcon Shall we dust Beep? The Geo-strategic realities of Cyberwar Presentation Pukhraj Singh#cyber-war#security-strategy#attack-surface
2012-02-15TalkNullcon Best practices to improve the security grading of your project Video Hemant Khandelwal#blueteam#threat-modeling#secure-development
2011-12-04TalkClubhack Exploit the Exploit Kits Presentation Dhruv Soi#red-teaming#exploit-kit#malware-distribution+4
2011-11-17TalkDeepsec Behavioral Security: 10 steps forward 5 steps backward Video Sourabh Satish#security-training#behavioral-change#risk-management+2
2011-10-08TalkC0c0n Stratagemizing Security Against Perpetrators In Cloud Infrastructure K S Abhiraj#blueteam#cloud-security-posture-management#cloud-pentesting+4
2011-10-07TalkC0c0n Exploiting the TCP Simultaneous Connection to Provide a Low Cost DoS Mitigation Solution Presentation Ahamed Nafeez#red-teaming#network-pentesting#network-architecture
2011-09-19TalkHacklu The travelling hacksmith Saumil Shah#red-teaming#ethical-hacking#exploit-delivery+2
2011-09-07TalkSecuritybyte Social Web & Privacy – An evolving world Bala Sathiamurthy, Aridaman Tripathi#data-protection#api-security#security-compliance+2
2011-09-06TalkSecuritybyte Enabling Un-trusted Mashups Presentation Bishan Singh#web-security#xss#csrf+4
2011-09-06TalkSecuritybyte Private Internet Circuits - Towards A Next Generation Internet Presentation Sanjay Deshpande#network-architecture#encryption#network-defense
2011-09-06TalkSecuritybyte Using Data Analytics for Incident Response Presentation Samir Saklikar#incident-management#data-analytics#security-analytics+3
2011-02-25TalkNullcon Enterprise Paradigm for Controlling Data Leakage Presentation Deepak Rout#data-leak#blueteam#data-loss-prevention+3
2011-02-25TalkNullcon Hacking the Parliament – A classic Social Engineering attack Anurag Dhanda#social-engineering#reconnaissance#security-strategy+2
2011-02-25TalkNullcon Protect infrastructure or protect information – Lessons from Wikileaks Presentation Vishal Gupta#data-leak#blueteam#data-protection+2
2010-12-04TalkClubhack Ultimate Pen Test – Compromising a highly secure environment Presentation Nikhil Mittal#security-assessment#social-engineering#application-pentesting+4
2010-10-29TalkT2 Hacking Femtocells Presentation Ravishankar Borgaonkar, Kevin Redon#reverse-engineering#device-security#hardware-embedded+3
2010-04-21TalkHitbsecconf Web Security – Going Nowhere? Presentation Saumil Shah#red-teaming#application-hardening#application-pentesting+4
2010-02-25TalkNullcon Quantum Computing Challenges in the field of security Whitepaper Navin Pai#quantum-computing#security-strategy#threat-modeling+3
2009-12-05TalkClubhack Indian IT Act 2000 vs 2009 Presentation Rohas Nagpal#cyber-law#embedded-systems#firmware-analysis+4
2009-11-18TalkSecuritybyte Risk based Penetration Testing Presentation K K Mookhey#security-assessment#risk-management#ethical-hacking+3
2009-11-17TalkSecuritybyte Business Continuity Case Study Venkataram Arabolu#business-continuity#risk-management#business-resilience+3
2009-11-17TalkSecuritybyte Usability and Privacy in Security Presentation Ponnurangam Kumaraguru#data-protection#architecture#security-training+2
2009-11-17TalkSecuritybyte Threat Modeling Presentation Varun Sharma#threat-modeling#blueteam#security-strategy+4
2009-10-28TalkHacklu Ownage 2.0 Saumil Shah#red-teaming#ethical-hacking#exploit-delivery+2
2009-08-06TalkC0c0n Information Warfare A a Gafoor, Vinayak Mishra#threat-hunting#threat-modeling#security-training+2
2009-08-06TalkC0c0n Know Your Enemy, and Yourself: Demystifying Threat Modelin Meera Subbarao#blueteam#security-strategy#threat-modeling+4
2009-08-06TalkC0c0n Management & Security of Large Scale Storage Devices Prashant Dinde#blueteam#data-protection#security-strategy+2
2009-08-06TalkC0c0n Microsoft Security Strategies Binoy VC#blueteam#security-strategy#azure+4
2008-12-06TalkClubhack Immune IT: Moving from Security to Immunity Presentation Ajit Hatti#blueteam#security-strategy#security-monitoring+4
2008-08-07TalkBlackhat Got Citrix, Hack It! Presentation Video Shanit Gupta#red-teaming#rdp#application-pentesting+1
2008-03-26TalkCansecwest Vulnerabilities Die Hard Kowsik Guruswamy#red-teaming#ethical-hacking#exploit-delivery+2
2007-12-09TalkClubhack Vulnerabilities in VoIP Products and Services Whitepaper Gaurav Saha#voip#red-teaming#sip+3
2007-08-02TalkBlackhat The Evolution Of Phishing To Organized Crime Video Rohyt Belani#social-engineering#phishing#threat-modeling+2
2007-04-18TalkCansecwest Low-Rate Denial-of-Service attacks Anil Kumar#red-teaming#dos#network-defense+2
2005-07-28TalkBlackhat Rapid Threat Modeling Presentation Video Akshay Aggarwal#threat-modeling#red-teaming#security-strategy+4
2003-12-12TalkHitbsecconf Threats to Wireless Networks - War Driving Video Anurana Saluja#wifi#network-architecture#threat-modeling+1
2003-02-26TalkBlackhat HTTP: Advanced Assessment Techniques Presentation Video Saumil Shah#fingerprinting#blueteam#application-pentesting+4
1998-07-29TalkBlackhat Security as an enabler for new business opportunities - The Business Value of Security Karan Khanna#risk-management#business-continuity#cyber-resilience+3