🧪 Experimental Feature

Focus Areas are an experimental feature that groups related content by tags. This page and its functionality may change as we refine the categorization system.

Security Architecture

Security architecture and related activities

147
Total Entries
150
Contributors
110
Unique Tags
73
Related Tags

Top Contributors

Sunil Varkey(6) Harshit Agrawal(4) Devdatta Akhawe(3) Vandana Verma Sehgal(3) A a Gafoor(2)

Related Tags (6)


All Entries (147 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-08-07Tool demoBlackhat Q-TIP (QR Code Threat Inspection Platform) Rushikesh D Nandedkarincident-responseweb-securityvulnerability-management+2
2025-08-06TalkBlackhat The 5G Titanic Altaf Shaiknetwork-pentestingnetwork-architecturevulnerability-management+1
2025-08-06Tool demoBlackhat ROP ROCKET: Advanced Framework for Return-Oriented Programming Source Code Shiva Shashankreverse-engineeringexploitationpentesting+3
2025-08-06Tool demoBlackhat ThreatShield - The Intelligent way of Threat Modelling Ashwin Shenoi, Satyam Nagpal, Sayooj B Kumarthreat_modelingsecurity-architecturedevsecops+1
2025-04-30TalkRsac Got Supply Pain? A Real-World Approach to Supply Chain SDL Mohit Arorasecure-developmentdevsecopsvulnerability-management+5
2025-04-29TalkRsac It’s Always Risky in IT: Frontline Stories and Strategic Insights Rohit Bansalrisk-managementsecurity-architecturesecurity-awareness+2
2025-04-29TalkRsac RAG-NAROK: What Poorly-Built RAGs Can Do to Data Security Akash Mukherjeesecure-developmentdevsecopsdata-protection+2
2025-03-02TalkNullcon Cyber Security from Telco lens Sanjeev Dhallamnetwork-architecturenetwork-hardeningnetwork-monitoring+2
2025-03-02TalkNullcon eKYC Crisis: Securing the Lockers Kartik Lalanrisk-managementvulnerability-managementsecurity-architecture
2025-03-02TalkNullcon Hidden in Plain Sight: Large-Scale Exposure of Orphaned Commits on Major Git Platforms Kumar Ashwinvulnerability-managementsecure-codingdevsecops+1
2024-11-28TalkBlackhat From Breach to Blueprint: Building a Resilient Future Amit Ghodekarincident-responsevulnerability-managementpentesting+3
2024-11-28TalkBlackhat Harnessing Language Models for Detection of Evasive Malicious Email Attachments Abhishek Singh, Kalpesh Mantrisecurity-architecturesecurity-information-event-management
2024-11-28TalkBlackhat Time to Redefine Cybersecurity - Adding T - Trust as new Tenant to “CIA” and make it “I-ACT Lalit Ahluwaliarisk-managementsecurity-architecturesecurity-governance+1
2024-11-27TalkBlackhat The Future of Cybersecurity: Addressing New Threats with Groundbreaking Strategies Mahesh Babu Kanigiririsk-managementvulnerability-managementsecurity-architecture+2
2024-11-26TalkBlackhat Cyber Security & Resiliency: a perspective with emerging technologies and Innovation Atul Kumarcybersecurity-strategiesrisk-managementcyber-resilience+2
2024-11-26TalkBlackhat The Double Edge Sword - Cybersecurity & AI Karmendra Kohlisecurity-architecturerisk-managementdevsecops+1
2024-11-16TalkC0c0n The subtle art of checkmating CISOs Sunil Varkeyrisk-managementsecurity-architecturesecurity-governance+3
2024-11-15TalkC0c0n CISO’s take on BYOAI Venugopal Parameswararisk-managementsecurity-governancecompliance+4
2024-08-14TalkUsenix Shesha: Multi-head Microarchitectural Leakage Discovery in new-generation Intel Processors Presentation Whitepaper Video Anirban Chakraborty, Nimish Mishra, Debdeep Mukhopadhyayreverse-engineeringvulnerability-managementsecurity-architecture+1
2024-05-07TalkRsac A Proven Approach on Automated Security Architectural Pattern Validation Video Sunil Arorasecurity-architecturedevsecopsvulnerability-management+2
2024-04-19TalkBlackhat China’s Military Cyber Operations: Has the Strategic Support Force Come of Age? Presentation Pukhraj Singhindustrial-control-systems-securityrisk-managementsecurity-architecture
2024-04-19TalkBlackhat Faults in Our Bus: Novel Bus Fault Attack to Break Trusted Execution Environments in Embedded Systems Presentation Anirban Chakraborty, Nimish Mishra, Debdeep Mukhopadhyayembedded-securityfirmware-analysisvulnerability-management+2
2024-04-18Tool demoBlackhat Mantis - Asset Discovery at Scale Source Code Ankur Bhargava, Prateek Thakare, Saddam Hussainasset-inventoryvulnerability-managementsecurity-architecture+3
2024-03-21TalkCan Sec West Rolling in the Dough: How Microsoft Identified and Remidiated a Baker’s Dozen of Security Threats in the Windows DNS Server Arif Hussainvulnerability-managementpentestingsecurity-architecture+1
2023-11-17TalkDeepsec Nostalgic Memory – Remembering All the Wins and Losses for Protecting Memory Corruption Shubham Dubeyvulnerability-managementreverse-engineeringexploitation+1
2023-09-28TalkHackinparis How to have visibility and security OF CICD ecosystem Pramod Ranacicd-securitydevsecopsvulnerability-management+6
2023-08-12TalkDefcon Getting More Bang for your Buck:Appsec on a Limited Budget Vandana Verma Sehgal, Viraj Gandhisecure-developmentdevsecopsrisk-management+3
2023-08-07TalkC0c0n Homomorphic Encryption - Myth to Reality Video Anish Koshyencryptionsecurity-architectureprivacy+2
2023-08-07TalkC0c0n Trust Resiliency - A Lesson Learned from Russia Ukraine War Video Ajit Hattiincident-responsesecurity-architecturerisk-management+2
2023-08-07TalkC0c0n Uncovering Azure’s Silent Threats: A Story of Cloud Vulnerabilities Video Nitesh Suranaazurecloud-vulnerabilitiescloud-pentesting+2
2023-08-06TalkC0c0n CBDC and future of Finance Video Sunil Raveendranblockchain-securitydigital_currencydecentralized-systems+3
2023-08-06TalkC0c0n Developments in Deep Fake detection Tapas Sainisecurity-architecturesecurity-awarenessreverse-engineering+1
2023-08-06TalkC0c0n Expanding capability horizons : Homelabs and beyond Video Anant Shrivastavapentestingnetwork-pentestingsecurity-architecture+1
2023-08-06TalkC0c0n Influence of Artificial Intelligence in GRC Space Mahesh Kalyanaramangovernancerisk-managementcompliance+3
2023-08-06TalkC0c0n Subduing Adversaries with Information Superiority Video Antony K Mthreat-huntingsecurity-monitoringthreat-detection+2
2023-08-06TalkC0c0n Survivability in the Cyber World Video Sunil Varkeyincident-responserisk-managementsecurity-architecture
2023-08-06TalkC0c0n The new way to be secure Video Sakshi Bhutanisecure-developmentdevsecopssoftware-security+3
2023-08-06TalkC0c0n Emerging crimes and threat landscape in cyber domain and the need for international cooperation Video Kiran Sivakumarthreat-landscapethreat_modelingrisk-management
2023-08-06TalkC0c0n Time To Choose - Conventional CTI Or NextGen External Threat Landscape Management Video Kumar Riteshthreat-landscapethreat_modelingthreat-hunting+2
2023-04-26TalkRsac Designing Product Security for a Brighter Smile and a Healthier Tomorrow Presentation Video Lokesh Pidawekarsecure-developmentdevsecopssoftware-security+2
2023-04-26TalkRsac Is Increasing Security Maturity And Decreasing Operational Load Possible? Rohit DhamankarAutomationrisk-managementsecurity-architecture+2
2023-04-21TalkHitb Sec Conf LOCKNOTE:THE HAND THAT STRIKES, ALSO BLOCKS Presentation Video Saumil Shahsecurity-architecturerisk-managementsecurity-awareness+2
2022-09-28TalkRootcon Gazing into the Crystal Ball - The Fog of Cyberwarfare Escalations Harshit Agrawalindustrial-control-systems-securitysecurity-architecturerisk-management+1
2022-09-24TalkC0c0n Building Smart, Resilient and Sustainable Cyber Eco System Navin Kumar Singhrisk-managementcybersecurity-strategiessecurity-architecture+4
2022-09-24TalkC0c0n Cyber Defence and Role of private players - public private partnership Jasbir Singh Solankisecurity-governancerisk-managementcompliance+2
2022-09-24TalkC0c0n Know Your Organization? : Mapping Entities in Google Workspace Manish Gupta, Yash Bharadwajgcpidentity-managementaccess-management+2
2022-09-24TalkC0c0n Web3 Security - Security in MetaVerse, and the new world of web3 Rohit Srivastwablockchain-securityweb3decentralized-systems+3
2022-09-24TalkC0c0n Weaponising Social Media for Psychological Operations A a Gafoorsocial-engineeringsecurity-awarenessthreat-hunting+1
2022-09-23TalkC0c0n Battle of 300 Crore - how they lost it and got most of it back Prashant Choudharyincident-responsevulnerability-managementrisk-management+1
2022-09-23TalkC0c0n Bridging the gap between Security and Operations Sujay Rajashekar Gundagattidevsecopssecurity-architecturethreat-detection+3
2022-09-23TalkC0c0n Building a Safer and Innovative Digital Ecosystem Vijay Pamarathisecure-developmentdevsecopssoftware-security+2
2022-09-23TalkC0c0n Collaborative efforts for safe digital banking Biju Ksecure-developmentrisk-managementsecurity-architecture
2022-09-23TalkC0c0n Cybersecurity for Manufacturing Santhosh Srinivasanindustrial-control-systems-securityics-securitycontrol-systems+4
2022-09-23TalkC0c0n Maximizing ROI on cyber security investments: Do you think Adversary Simulation OR Purple teaming holds the key? Presentation Abhijith B Rrisk-managementsecurity-architecturedevsecops
2022-09-23TalkC0c0n Rolling out Central Bank Digital Currency - Technical Design Considerations Sunil Raveendranblockchain-securitysecurity-architecturecompliance-governance+2
2022-09-23TalkC0c0n Technological Reliance for Resilience Tulika Pandeyrisk-managementcyber-resiliencesecurity-architecture+2
2022-09-23TalkC0c0n Threats Landscape and Intelligence of API & Shield to protect Navaneethan Mapi-securitythreat-landscapethreat-hunting+1
2022-08-14TalkDefcon Tales from the trenches - why organizations struggle to get even the basics of OT asset visibility & detection right Vivek Ponnadaindustrial-control-systems-securityvulnerability-managementrisk-management+2
2022-08-11TalkThe Diana Initiative Connecting Dots Between Security Teams & Customer Expectations Shruthi Kamathsecurity-governancerisk-managementsecurity-architecture+2
2021-11-13TalkC0c0n Zero Trust & Micro-segmentation Suresh Menonsegmentationzero-trustnetwork-architecture+1
2021-11-13TalkC0c0n Changing Cyber Security Paradigm & Cyber Tsunami Sunil Varkeycybersecurity-strategiesthreat-landscaperisk-management+4
2021-11-13TalkC0c0n Cyber Warfare & Securing Critical Infrastructures Faruk Kazicritical-infrastructureindustrial-control-systems-securityincident-response+1
2021-11-13TalkC0c0n Cybersecurity in the era of Resilience - A walk through people, process and technology Babitha B Prisk-managementcyber-resiliencesecurity-architecture+3
2021-11-13TalkC0c0n Enhancing An Multi-Factor Authentication (MFA) through Behavioural Biometrics Kiran Kumar Pgauthenticationmfasecurity-architecture
2021-11-13TalkC0c0n Introducing Free & Open Elastic Limitless XDR Ravindra Ramnanithreat-detectionsecurity-monitoringvulnerability-management+1
2021-11-13TalkC0c0n Need for Zero Trust in Banking Biju Kzero-trustrisk-managementsecurity-architecture+1
2021-11-13TalkC0c0n Post pandemic Transformation - A CISO’s perspective Sridhar Govardhanrisk-managementsecurity-governancecompliance+4
2021-11-13TalkC0c0n Mature Your Threat Hunting Program Neha Dhyanithreat-huntingthreat-detectionthreat_modeling+2
2021-11-13TalkC0c0n Painting Your Organizations with Shades of Red, Blue & Purple Video Hidayath Khanred-teamingethical-hackingthreat_modeling+2
2021-11-12TalkC0c0n Enterprise Governance and Risk Management Arathy Nair, Muskan Manglacompliancegovernancerisk-management+2
2021-11-12TalkC0c0n Executive Presence….a cardinal of the cyber rostrum Bishakha Jainsecurity-awarenesssecurity-architecturesecurity-governance
2021-11-12TalkC0c0n Post Covid CISOs - Disappearing trusted boundaries and Innovative CyberSecurity Approaches Illyas Kooliyankalrisk-managementsecurity-architecturesecurity-governance+1
2021-11-12TalkC0c0n Regulating Social Media Platforms : Should it be done in Democratic Societies ? J Sam Daniel Stalin, Apar Gupta, Dinesh O Bareja, Prashant Mali, Jiten Jaincompliancegovernancerisk-management+4
2021-11-12TalkC0c0n Understanding the Psychology Behind Threats - adding Twists to your Turns Saman Fatimathreat_modelingsecurity-awarenesshuman-factor+1
2021-10-13TalkRootcon The Kill Chain: Future of Cyber in Defense Video Harshit Agrawalsecurity-architectureindustrial-control-systems-securityrisk-management
2021-08-26TalkHitb Sec Conf Gazing Ahead: What Modern RF Combat Looks Like in the Next Decade Presentation Video Harshit Agrawalindustrial-control-systems-securitysecurity-architecturevulnerability-management+1
2021-08-07TalkDefcon The Curious Case of Knowing the Unknown Video Vandana Verma Sehgalthreat-huntingthreat_modelingsecurity-architecture+2
2021-08-06TalkDefcon Defending IoT in the Future of High-Tech Warfare Video Harshit Agrawalvulnerability-managementiot-pentestingsecurity-architecture+1
2020-11-21TalkApp Sec Indonesia The caveats of the unseen: Crouching exposure, Hidden Misconfiguration Ashwin Vamshivulnerability-managementsecurity-architecturedevsecops+2
2020-09-18TalkC0c0n Herd Immunity, in the Cyber World Sunil Varkeysecurity-awarenessrisk-managementvulnerability-management+1
2020-09-18TalkC0c0n Coping with Digital Transformation - A CISO perspective Video Maya R Nairrisk-managementsecurity-governancesecurity-architecture+3
2020-09-18TalkC0c0n Demystifying Zero Trust - A Real world Video Sandeep Variyamzero-trustsecurity-architecturesecurity-governance+1
2020-08-21TalkThe Diana Initiative Trust, No Trust or Zero Trust - Myth Demystifying Vandana Verma Sehgalzero-trustsecurity-architecturecompliance+2
2019-11-09TalkToor Con 100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans Jatin Katariareverse-engineeringhardware-reverse-engineeringvulnerability-management+3
2019-09-27TalkC0c0n A Day in the Life of a CISO Sridhar Govardhancompliancegovernancerisk-management+3
2019-09-27TalkC0c0n CISO Mind Set Lopa Mudraa Basuurisk-managementsecurity-governancecompliance+2
2019-09-27TalkC0c0n Industry 4.0 - Security and Compliance Santhosh Srinivasanindustrial-control-systems-securitycompliancegovernance+2
2019-09-27TalkC0c0n Looking a decade ahead: Big data, drones , Robots and cyber security. Rahul Sasiindustrial-control-systems-securitysecurity-architecture
2019-09-27TalkC0c0n Security @scale for startups Shivanath Somanathandevsecopssecure-developmentsoftware-security+2
2019-08-09TalkDefcon 100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans Jatin Katariareverse-engineeringvulnerability-managementsecurity-architecture+2
2019-08-08TalkDefcon Anatomy of cloud hacking Pratik Shahcloud-pentestingpost-exploitationcloud-architecture+1
2019-03-28Tool demoBlackhat pytm: A Pythonic Framework for Threat Modeling Source Code Rohit Shambhunisecure-codingthreat_modelingredteam
2018-10-19TalkApp Sec Day Australia Threat Modeling-as-Code & Automation for DevSecOps wins Video Abhay Bhargavthreat_modelingdevsecops
2018-10-15TalkHacklu Come to the dark side! We have radical insurance groups & ransomware Video Ankit Gangwalransomwarerisk-managementcyber-insurance+2
2018-10-05TalkC0c0n Blockchains as techno-power structures: towards emergence of P2P Politics Sunil Aggarwalblockchain-securitydecentralized-systemsdecentralised-security+2
2018-10-05TalkC0c0n Cybersecurity Embedded Digital Transformation - The Future Sunil Kanchiembedded-securitysecurity-architectureindustrial-control-systems-security
2018-10-05TalkC0c0n Digital Innovation revolution in Kerala Government Sunil Varkeycybersecurity-strategysecurity-architecturerisk-management+2
2018-10-05TalkC0c0n Future of Mobility & Cyber Security Suja Chandyautomotive-cybersecurityindustrial-control-systems-securitysecurity-architecture+2
2018-10-05TalkC0c0n Resiliency Focus alongside Digital Disruption Lince Lawrencesecurity-architecturerisk-managementsecurity-awareness+2
2018-10-05TalkC0c0n Taking cyber security to the board room Amit Pradhanrisk-managementcompliancegovernance+3
2018-10-05TalkC0c0n Will Artificial Intelligence And Machine Learning Bring More Threats On Cyber Security? Roshy Johnrisk-managementvulnerability-managementsecurity-architecture
2018-10-04TalkBrucon Disrupting the Kill Chain Video Vineet Bhatiaincident-responsevulnerability-managementsecurity-architecture
2018-08-16TalkUsenix Chipmunk or Pepe? Using Acoustical Analysis to Detect Voice-Channel Fraud at Scale Video Vijay Balasubramaniyanthreat-detectionsecurity-architecture
2018-08-16TalkUsenix Man-in-the-Machine: Exploiting Ill-Secured Communication Inside the Computer Presentation Whitepaper Video Siddharth Raopentestingvulnerability-managementsecurity-architecture+1
2018-08-09TalkDefcon Anonymous rate-limiting in services with Direct Anonymous Attestation Presentation Video Konark Modiprivacysecurity-architecture
2018-08-08Tool demoBlackhat ThreatPlaybook Source Code Abhay Bhargav, Sharath Kumarthreat_modeling
2018-06-27TalkFirst Securing your in-ear fitness coach: Challenges in hardening next generation wearables Presentation Sumanth Naropanth, Sunil Kumarmobile-securitysecure-developmentvulnerability-management+2
2018-03-13TalkTroopers Securing your in-ear fitness coach: Challenges in hardening next generation wearables Presentation Video Sumanth Naropanth, Kavya Racharlamobile-securitysecure-developmentvulnerability-management+2
2017-08-19TalkC0c0n Building Trust for Digital Transactions in India’s COD Culture Parry Aftabsecure-developmentrisk-managementsecurity-architecture
2017-08-19TalkC0c0n Trust, the foundation of Digital Mastery Sunil Varkeyidentity-managementauthenticationrisk-management+2
2017-08-18TalkC0c0n Dynamic Binary Instrumentation Vivek Arora, Bhaskar Rastogidynamic-analysisreverse-engineeringbinary-analysis+1
2017-08-18TalkC0c0n Moving from Cybersecurity Awareness to Cybersecurity Competence Anup Narayanancybersecurity-educationcybersecurity-trainingsecurity-awareness+3
2017-08-18TalkC0c0n Cyber Threat Intelligence - Are We There , Yet…? A Shiju Rawtherthreat-huntingthreat_modelingioc+3
2017-08-04TalkSha Attacking OpenSSL using Side-channel Attacks: The RSA case study Whitepaper Praveen Vadnalareverse-engineeringvulnerability-managementsecurity-architecture+1
2017-03-03TalkNullcon Breach Response - Time to shake up the status quo Video K K Mookhey, Pranesh Prakash, Sahir Hidayatullah, Shobha Jagathpalincident-responsevulnerability-managementrisk-management+2
2017-03-03TalkNullcon Securing Critical National Infrastructure Video Shailendra Fuloria, R Sarangapani, Rahul Tongiacritical-infrastructureindustrial-control-systems-securityics-security+4
2017-01-25TalkOwasp App Sec California OCSP Stapling in the Wild Devdatta Akhaweweb-securityvulnerability-managementsecurity-architecture+1
2016-08-19TalkC0c0n Kill the password - A new era of authentication Tamaghna Basuauthenticationiamsecurity-architecture+1
2016-08-07TalkDefcon Cyber Grand Shellphish Video Aravind Machiryautomated-exploit-detectionreverse-engineeringvulnerability-assessment+1
2016-03-15TalkGroundzerosummit r00tKidz and Hacking Triveni Singhpentestingethical-hackingprivilege-escalation+3
2015-11-05TalkGround Zero Summit Western Air Command B S Singh Deonetwork-defensenetwork-monitoringnetwork-pentesting+3
2015-09-24TalkApp Sec Usa Continuous Cloud Security Automation Video Rohit PitkeawsdevsecopsAutomation+2
2015-08-07TalkDefcon Getting into the Trust Store We Trust Ajit Hattireverse-engineeringsecurity-architecturevulnerability-management
2015-08-01TalkC0c0n S3curi7y at 36K feet Rugved Mehta, Gaurav Trivediawsazuregcp+3
2015-03-15TalkDefcon TECHNICAL TALK-THWARTING THE SURVEILLANCE IN ONLINE COMMUNICATION Presentation Adhokshaj Mishraprivacysecurity-architecture
2015-01-27TalkOwasp App Sec California Anatomy of memory scraping, credit card stealing POS malware Video Amol Sarwatereverse-engineeringvulnerability-managementincident-response+1
2014-11-13TalkGround Zero Summit 9 Cell Cyber Diplomacy Alok Vijayantsecurity-architecturerisk-managementsecurity-governance
2013-11-20TalkApp Sec Usa Project Talk: OWASP OpenSAMM Project Pravir Chandrasoftware-securitysecure-developmentdevsecops+4
2013-09-27TalkC0c0n ARM, Thumb and the Finger Aseem Jakharreverse-engineeringbinary-analysisassembly-analysis+2
2013-09-27TalkC0c0n From Bedroom to Boardroom - Taking your Weekend Infosec Project Global Vivek Ramachandrandevsecopssecure-developmentpentesting+2
2013-08-15TalkUsenix Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness Presentation Whitepaper Devdatta Akhaweweb-securitysecurity-awarenesssecurity-architecture+3
2013-08-15TalkUsenix An Empirical Study of Vulnerability Rewards Programs Presentation Whitepaper Devdatta Akhawevulnerability-managementbug-bountysoftware-security+3
2012-12-01TalkClubhack The difference between the “Reality” and “Feeling” of Security: Information Security and the Human Being Presentation Video Thomas Kurian Ambattusecurity-awarenesshuman-factorrisk-management+2
2012-10-26TalkApp Sec Usa The 7 Qualities of Highly Secure Software Video Mano Paulsecure-developmentsoftware-securitysecure-coding+3
2012-08-03TalkC0c0n Business Continuity and Risk Management in Turbulent Times Venkataram Arabolurisk-managementbusiness-continuitycompliance+2
2012-08-03TalkC0c0n The Weakest Link - Reinforcing the Human Element Sandeep Godbolesecurity-awarenesshuman-factorcybersecurity-education+4
2012-02-15TalkNullcon Best practices to improve the security grading of your project Video Hemant Khandelwalblueteamthreat_modelingsecure-development
2011-11-17TalkDeepsec Behavioral Security: 10 steps forward 5 steps backward Video Sourabh Satishsecurity-awarenessbehavioral-changerisk-management+2
2011-09-07TalkSecuritybyte Social Web & Privacy – An evolving world Bala Sathiamurthy, Aridaman Tripathiprivacydata-protectionapi-security+3
2011-09-06TalkSecuritybyte Enabling Un-trusted Mashups Presentation Bishan Singhweb-securityxsscsrf+4
2009-11-17TalkSecuritybyte Business Continuity Case Study Venkataram Arabolubusiness-continuityrisk-managementbusiness-resilience+3
2009-11-17TalkSecuritybyte Usability and Privacy in Security Presentation Ponnurangam Kumaraguruprivacydata-protectionsecurity-architecture+3
2009-11-17TalkSecuritybyte Threat Modeling Presentation Varun Sharmathreat_modelinginfrastructureblueteam
2009-08-06TalkC0c0n Information Warfare A a Gafoor, Vinayak Mishrathreat-huntingthreat_modelingsecurity-awareness+2
2007-08-02TalkBlackhat The Evolution Of Phishing To Organized Crime Video Rohyt Belanisocial-engineeringphishingthreat_modeling+2
2005-07-28TalkBlackhat Rapid Threat Modeling Presentation Video Akshay Aggarwalthreat_modelingredteam
1998-07-29TalkBlackhat Security as an enabler for new business opportunities - The Business Value of Security Karan Khannarisk-managementbusiness-continuitycyber-resilience+4