🧪 Experimental Feature

Focus Areas are an experimental feature that groups related content by tags. This page and its functionality may change as we refine the categorization system.

📚 Security Awareness

Security awareness and related activities

207
Contributors
150
Talks
18
Tool Demos
29
Panels
2
Keynotes

Top Contributors

Saumil Shah(8) Vandana Verma Sehgal(6) Aseem Jakhar(5) Sunil Varkey(5) Rahul Sasi(4)

Related Tags (13)

Show all 13 tags...

All Entries (199 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-08-07Tool demoBlackhat Q-TIP (QR Code Threat Inspection Platform) Rushikesh D Nandedkar#incident-management#web-security#architecture+1
2025-08-06PanelBlackhat Hacking the Status Quo: Tales From Leading Women in Cybersecurity Vandana Verma Sehgal, Chi en Shen, Natalie Silvanovich, Maddie Stone#security-training#cybersecurity-education#security-strategy
2025-06-02TalkConfidence Adversarial Phishing: Defeating Security Barriers and AI-Driven Countermeasures Video Himanshu Sharma, Rahul Vashista#phishing#red-teaming#mfa+1
2025-04-04PanelBlackhat Locknote: Highlights & Key Takeaways from Black Hat Asia 2025 Vandana Verma Sehgal, Daniel Cuthbert, Ryan Flores, Vitaly Kamluk, Jeff Moss, Asuka Nakajima#security-strategy#cybersecurity-framework#digital-learning+1
2025-04-03Tool demoBlackhat CompartIoT Source Code Sreesankar S, Aditya Krishna Vinod, Season Cherian#microcontrollers#hardware-embedded#firmware-analysis+2
2025-03-02TalkNullcon eKYC Crisis: Securing the Lockers Video Kartik Lalan#risk-management#architecture#data-leak+4
2025-03-02PanelNullcon How can organisations protect themselves against Advanced Cyber Threats Bithal Bhardwaj, Vishal Salvi#security-strategy#incident-management#phishing+1
2025-03-01PanelNullcon Navigating Data Protection in the age of globalisation Saikat Datta, Krishan Dev#data-protection#gdpr#data-governance+4
2024-11-16TalkC0c0n Invisible Invaders: Bypassing Email Security with Legitimate Tools Dhruv Bisani#bypassing#phishing#social-engineering+2
2024-11-16TalkC0c0n Access for Sale: Inside the World of Ransomware Affiliates and Initial Access Brokers Nihar Sawant, Jaydev Joshi#ransomware#phishing#supply-chain-security
2024-11-16TalkC0c0n Serverless Phishing Factory: Automate, Attack, Adapt Yash Bharadwaj, Manish Gupta#phishing#serverless#cloud-workload-protection+2
2024-11-16TalkC0c0n The subtle art of checkmating CISOs Video Sunil Varkey#risk-management#architecture#security-governance+2
2024-11-15TalkC0c0n CISO’s take on BYOAI Video Venugopal Parameswara#risk-management#security-governance#security-compliance+3
2024-10-23TalkBlackhat Guardians of the OAuth Galaxy: Defending Your Organization from OAuth Application Attacks Presentation Video Shruti Ranjit, Mangatas Tondang#blueteam#oauth#application-pentesting+4
2024-08-29Tool demoHitbsecconf Mantis Source Code Bharath Kumar, Akshay Jain#asset-inventory#dast#anti-phishing
2024-08-09TalkDefcon Reflections on a Decade in Bug Bounties: Experiences and Major Takeaways Video Nikhil Shrivastava, Charles Waterhouse#bug-hunting#bug-bounty#security-training+3
2023-12-06Tool demoBlackhat Octopii v2 Source Code Owais Shaikh, Umair Nehri#ai#data-protection#nlp+4
2023-09-28TalkRootcon Azure Illuminati: Unveiling the Mysteries of Cloud Exploitation Video Raunak Parmar#azure#cloud-pentesting#mfa+4
2023-09-28TalkHackinparis How to have visibility and security OF CICD ecosystem Pramod Rana#cicd-security#devsecops#architecture+4
2023-08-10TalkBlackhat Does Public Disclosure of Vulnerabilities Affect Hacker Participation in Bug Bounty Programs? Presentation Amit Deokar, Ali Ahmed, Brian Lee#bug-hunting#incident-management#security-strategy+4
2023-08-09Tool demoBlackhat AntiSquat - An AI-Powered Phishing Domain Finder Source Code Owais Shaikh, Umair Nehri#ai#ai-security#phishing+2
2023-08-09TalkBlackhat Diversity Microtalks: Perspectives on Creating Change Presentation Aastha Sahni, Andy Ellis, Meghan Jacquot, Sherri Davidoff#security-training#risk-management#security-governance
2023-08-07PanelC0c0n Frictionless Security…Experience Simplified. Video A Shiju Rawther, Maya R Nair, Suresh Sharma, Himanshu Das#security-training#human-factor#behavior-change+3
2023-08-07PanelC0c0n Evolving Threat Landscape: Strategies for Adapting and Innovating in Cybersecurity Vikas Arora, Sanjay Singh, Baidyanath Kumar, Saurabh Gugnani, Gokulavan Jayaraman, Vijay Nair#security-strategy#threat-modeling#security-training+3
2023-08-07TalkC0c0n Smart Contract Phishing : Attack & Defense Video Tejaswa Rastogi#smart-contracts#phishing#secure-coding+1
2023-08-07TalkC0c0n Citizen Mobile Security: Responsibilities, Accountability, and Impacts Satyendra Verma#security-training#risk-management#compliance-governance
2023-08-07TalkC0c0n ESOC Trinetra Project Pankaj Kumar Dalela#security-governance#risk-management#security-training
2023-08-07TalkC0c0n Generative AI and Cyber Crimes Video Brijesh Singh#security-training#risk-management#threat-hunting
2023-08-06PanelC0c0n nGen Cyber Threats - 2024 and Beyond: Embracing Chaos, Taking Charge Murli Nambiar, A Shiju Rawther, Jacxine Fernandez, Vishal Salvi, Sridhar Govardhan#security-strategy#cybersecurity-framework#cyber-resilience+2
2023-08-06TalkC0c0n AI in Cyber Security and Crime Prevention Vishal Salvi#ai#ai-security#deep-learning+3
2023-08-06TalkC0c0n Developments in Deep Fake detection Tapas Saini#architecture#security-training#reverse-engineering
2023-08-06TalkC0c0n Insider Threats - Best Practices and Common Pitfalls Video Georgie Kurien#insider-threats#risk-management#security-training+1
2023-05-12TalkBlackhat Engaging the Next Generation of Cybersecurity Professionals: The Power of Security Zines Video Rohit Sehgal#digital-learning#security-training#cybersecurity-education+1
2023-05-11Tool demoBlackhat KernelGoat Source Code Shivankar Madaan#kernel#secure-development#security-training
2023-04-21TalkHitbsecconf LOCKNOTE:THE HAND THAT STRIKES, ALSO BLOCKS Presentation Video Saumil Shah#architecture#risk-management#security-training+1
2023-03-09PanelNullcon Elements of a Successful Security Strategy: A Comprehensive Approach Video Sheetal Joseph, Sybe Izzak Rispens, Travis Carelock#security-strategy#security-testing#secure-development+4
2022-12-08PanelBlackhat Locknote: Conclusions and Key Takeaways from Day 2 Anant Shrivastava, Jeff Moss, Jiska Classen, Leigh Anney Galloway, Federico Maggi#security-strategy#threat-modeling#cybersecurity-training+2
2022-12-08Tool demoBlackhat Industrial Control Systems: Capture the Train! Dhruv Sharan, Arnaud Soullié#ctf#ics-security#plc-security+3
2022-09-24TalkC0c0n Power of Narratives in Cyber Security Sunil Varkey#security-training#cybersecurity-education#human-factor+2
2022-09-24TalkC0c0n BEC, still the sure shot trap Georgie Kurien#social-engineering#security-assessment#security-training
2022-09-24TalkC0c0n Building Smart, Resilient and Sustainable Cyber Eco System Navin Kumar Singh#risk-management#cybersecurity-strategy#architecture+4
2022-09-24TalkC0c0n OSINT Tools and Techniques Brijesh Singh#threat-hunting#intelligence-sharing#security-training
2022-09-24PanelC0c0n Ransom Trends in India Pardhasaradhi Ch, Srikanta Prasad, Jacxine Fernandez, Diwakar Sheoran#ransomware#data-loss-prevention#incident-management+2
2022-09-24TalkC0c0n Weaponising Social Media for Psychological Operations A a Gafoor#social-engineering#security-training#threat-hunting+1
2022-09-23PanelC0c0n Cybersecurity Dissonance: Perception vs Reality Dinesh O Bareja, George Eapen, Jairam Ramesh, Rajesh Hemrajani, Suresh Sharma#cybersecurity-training#phishing#human-factor+1
2022-09-23TalkC0c0n A Tale of Credential Leak of a Popular Cloud Threat Actor Nitesh Surana#security-assessment#cloud-pentesting#cloud-workload-protection+2
2022-09-23PanelC0c0n Customer, Credit & Risk - Fintech trends 2022 Maya R Nair, Balakrishnan A, A Shiju Rawther, Linson Paul, Shivanath Somanathan#financial-institutions#data-protection#identity-theft+2
2022-09-23TalkC0c0n Ransomware: Prevention, Early Detection and Response Babitha Bp#ransomware#incident-management#malware-prevention+2
2022-09-06PanelNullcon Does your SOC sucks? Video Krishna Pandey, Shweta Kshirsagar, Vivek Gopalan, Yogi Kapur#security-training#incident-management#alert-fatigue+3
2022-08-25TalkHitbsecconf Building An Army Of Bots By Hijacking A Unicorn’s Twitter Handle Presentation Video Rahul Sasi, Vishal Singh#social-engineering#security-assessment#botnet+1
2022-08-13PanelDefcon Who doesn’t like a little Spice? Emulation Maturity, Team Culture and TTPs Niru Ragupathy#security-development-lifecycle#security-tools#incident-management+2
2022-08-11Tool demoBlackhat Octopii - AI-powered Personal Identifiable Information (PII) scanner Source Code Owais Shaikh#ai#ai-security#data-protection+4
2022-08-11TalkThedianainitiative Connecting Dots Between Security Teams & Customer Expectations Video Shruthi Kamath#security-governance#risk-management#architecture+2
2022-08-11TalkThedianainitiative The Real Cost of Free: What you need to know before downloading a free app Video Ruchira Pokhriyal#app-security#data-protection#security-training+1
2022-08-10TalkBlackhat Attacks From a New Front Door in 4G & 5G Mobile Networks Presentation Video Altaf Shaik, Shinjo Park, Matteo Strada#api-security#access-management#identity-theft+4
2022-08-10Tool demoBlackhat Vajra - Your Weapon To Cloud Source Code Raunak Parmar#cloud-pentesting#cloud-security-posture-management#azure+3
2022-07-23TalkMaycontainhackers How would a real life social media be like? Aditi Bhatnagar#data-protection#security-training#risk-management+3
2022-05-18PanelPhdays Challenges for cybersecurity conferences. Part II Aseem Jakhar, Timur Yunusov, Igor Lukic, Dhillon Andrew Kannabhiran#security-training#cybersecurity-strategy#threat-modeling+3
2022-05-12Tool demoBlackhat ThunderCloud: Attack Cloud Without Keys! Source Code Shivankar Madaan#aws#cloud-pentesting#phishing
2021-11-13PanelC0c0n Human errors & system misconfigurations- We can handle it! Amit Dubey, Maninder Singh, Tulika Pandey, Tal Catran, Dunston Pereira, Angel Redoble#human-factor#security-training#phishing+1
2021-11-13TalkC0c0n Case study - E-crime group targeting mobile users Rahul Sasi#incident-management#mobile-hacking#phishing+4
2021-11-13TalkC0c0n Connecting the dots between customers and security teams Shruthi Kamath#incident-management#security-training#devsecops+1
2021-11-13TalkC0c0n Crisis Capitalization in a Pandemic Greeshma M R#risk-management#incident-management#security-training+2
2021-11-13TalkC0c0n Cybersecurity in the era of Resilience - A walk through people, process and technology Babitha B P#risk-management#cyber-resilience#architecture+3
2021-11-13TalkC0c0n Post pandemic Transformation - A CISO’s perspective Sridhar Govardhan#risk-management#security-governance#security-compliance+3
2021-11-12PanelC0c0n Diversity and Inclusion Aarushi Koolwal, Hussaina Begum, Nehal Mehta, Shivani Sharma#security-training#behavior-change#cybersecurity-education+3
2021-11-12TalkC0c0n The evolving nature of cyber community Aastha Sahni#security-training#risk-management#cybersecurity-education
2021-11-12TalkC0c0n Understanding the Psychology Behind Threats - adding Twists to your Turns Saman Fatima#threat-modeling#security-training#human-factor+1
2021-11-12TalkC0c0n “Let’s Go Phishing”: Discerning the insidious nature of Social Engineering Ruchira Pokhriyal, Shashi Karhail#social-engineering#security-assessment#security-training
2021-11-12TalkC0c0n Executive Presence….a cardinal of the cyber rostrum Bishakha Jain#security-training#architecture#security-governance
2021-11-12TalkC0c0n Regulating Social Media Platforms : Should it be done in Democratic Societies ? J Sam Daniel Stalin, Apar Gupta, Dinesh O Bareja, Prashant Mali, Jiten Jain#security-compliance#security-governance#risk-management+3
2021-08-08PanelDefcon Resilient cyber space: The role of hacker and security communities Video Manu Zacharia, Aseem Jakhar, Abhijith B R, Jay Turla, Omar Santos, Dave Lewis, Dhillon Kannabhiran#security-training#threat-modeling#incident-management+3
2021-08-06TalkDefcon Adversary village Kick-off Video Abhijith B R#red-teaming#ethical-hacking#vulnerability-assessment+2
2021-05-07PanelBlackhat Insights and Predictions: What’s Next in InfoSec Vandana Verma Sehgal, Neil R. Wyler, Lidia Giuliano, Jeff Wilson, Vitaly Kamluk#security-strategy#cybersecurity-training#cybersecurity-framework+2
2020-11-21TalkAppsecindonesia The caveats of the unseen: Crouching exposure, Hidden Misconfiguration Ashwin Vamshi#architecture#devsecops#risk-management+1
2020-10-09TalkShellcon How I Created My Clone Using AI - Next-Gen Social Engineering Video Tamaghna Basu#ai#social-engineering#ai-security+4
2020-10-02Tool demoBlackhat Phishing Simulation Assessment Source Code Jyoti Raval#phishing#blueteam#social-engineering+3
2020-10-01TalkBlackhat Making an Impact from India to the Rest of the World by Building and Nurturing Women Infosec Community Presentation Video Vandana Verma Sehgal#security-training#cybersecurity-education#social-engineering+1
2020-09-18KeynoteC0c0n Data protection and Privacy Data protection and Privacy Video Kris Gopalakrishnan#ai-security#data-protection#identity-theft+2
2020-09-18TalkC0c0n Introducing SniperPhish: A Web-Email Spear Phishing Toolkit Source Code Video Sreehari Haridas, Gem George#phishing#application-pentesting#security-development-lifecycle+4
2020-09-18TalkC0c0n COVID-19 Cyber impact on financial sector and remote employees Video Amit Dubey, Tal Catran, Yair Feldman#incident-management#risk-management#cybersecurity-strategy+4
2020-09-18TalkC0c0n Herd Immunity, in the Cyber World Sunil Varkey#security-training#risk-management#architecture
2020-09-18TalkC0c0n Cyber Security Shifts During COVID-19 Video Sunil Kanchi#risk-management#security-training#compliance-governance+1
2020-09-18TalkC0c0n How I created my clone using AI - next-gen Social Engineering Video Tamaghna Basu#ai#impersonation#ai-security+3
2020-08-22TalkThedianainitiative Deploying discreet infrastructure for targeted phishing campaigns Video Sreehari Haridas#phishing#application-pentesting#social-engineering+3
2020-08-22TalkThedianainitiative Internal Red Team Operations Framework - Building your practical internal Red Team Video Abhijith B R#red-teaming#cyber-war#phishing+3
2020-08-07PanelDefcon D0 N0 H4RM: A Healthcare Security Conversation Video Vidha Murthy, Christian Dameff, Jeff Tully, Jessica Wilkerson, Veronica Schmitt, Ash Luft#data-protection#identity-management#security-training+3
2020-08-06PanelBlackhat Locknote: Conclusions and Key Takeaways from Day 2 Aanchal Gupta, Kymberlee Price, Rodrigo Rubira Branco, Stefano Zanero#security-strategy#threat-modeling#cybersecurity-training+2
2020-08-06Tool demoBlackhat Dynamic Labs: Windows & Active Directory Exploitation Source Code Rohan Durve#windows#active-directory#security-training
2020-08-06TalkBlackhat Making an Impact from India to the Rest of the World by Building and Nurturing Women Infosec Community Presentation Video Vandana Verma Sehgal#security-training#cybersecurity-strategy#social-engineering
2020-08-06TalkBlackhat How I Created My Clone Using AI - Next-Gen Social Engineering Presentation Video Tamaghna Basu#ai#social-engineering#impersonation
2020-03-06Tool demoNullcon Phishing Simulation Source Code Jyoti Raval#phishing#blueteam#security-training+2
2020-03-06PanelNullcon Securing the Human Factor Video Rahul Neel Mani, Phoram Mehta, Burgess Cooper, Manish Tiwari, Venkatesh Subramaniam#human-factor#security-training#social-engineering+3
2020-03-06PanelNullcon Complication in security practices Video Himanshu Das, Neelu Tripathy, Kushal Das, Ankur Bhargava, Vaibhav Gupta#security-training#human-factor#behavior-change+3
2020-03-06Tool demoNullcon spike2kill Source Code Manish Singh#web-scraping#ai-security#nlp+4
2019-09-28TalkRomhack Oh! Auth: Implementation pitfalls of OAuth 2.0 & the Auth Providers who have fell in it Presentation Video Samit Anwer#oauth#phishing#csrf+2
2019-09-27TalkC0c0n Demystifying HealthCare Security Ajay Pratap Singh#blueteam#data-protection#identity-theft+4
2019-09-27TalkC0c0n A Day in the Life of a CISO Sridhar Govardhan#security-compliance#security-governance#risk-management+2
2019-09-27TalkC0c0n Practical Approach to Cyber Security for financial institutions Georgie Kurien#financial-institutions#secure-development#risk-management+2
2019-09-27PanelC0c0n Shouldn’t Organization disclose breaches - The need for a shared platform Video Sunil Varkey, Jacxine Fernandez, Rahul Sasi, K K Chaudhary#data-leak#data-protection#security-testing+4
2019-09-13Talk44con One Person Army – Playbook on how to be the first Security Engineer at a company Video Kashish Mittal#devsecops#application-hardening#secure-development+4
2019-09-12KeynoteGlobalappsec Making a Change, One at a time - Diversity: More than just Gender Vandana Verma Sehgal#security-training#human-factor#cybersecurity-strategy+3
2019-08-08TalkDefcon Phishing in the cloud era Presentation Ashwin Vamshi, Abhinav Singh#phishing#api-security#web-security+2
2019-05-21TalkPhdays How to fail in hardware hacking Presentation Arun Magesh#red-teaming#embedded-systems#firmware-analysis+1
2019-03-01PanelNullcon Breached? – Here is how I responded! Video Muslim Koser, Mrudul Uchil, Sachin Burman, Venkata Satish Guttula, Vijay K Verma#incident-management#digital-forensics#forensics+1
2019-02-28TalkNullcon Dirty use of USSD Codes Ravishankar Borgaonkar#ussd#red-teaming#social-engineering+3
2018-10-05TalkC0c0n How can we use machine learning to prevent Frauds and password breaches Tamaghna Basu#machine-learning#blueteam#ai-security+4
2018-10-05TalkC0c0n OSINT : Indian Citizen Edition Anant Shrivastava#osint#data-governance#identity-theft+2
2018-10-05TalkC0c0n Privacy And Data Protection: Stakeholders’ Perspectives Rahul Sharma#blueteam#data-protection#gdpr+4
2018-10-05TalkC0c0n Resiliency Focus alongside Digital Disruption Lince Lawrence#architecture#risk-management#security-training+2
2018-10-05TalkC0c0n Taking cyber security to the board room Amit Pradhan#risk-management#security-compliance#security-governance+2
2018-10-05TalkC0c0n Artificial Intelligence and Social Media Analytics in Criminal Investigation Amit Dubey#ai#ai-security#nlp+3
2018-08-08Tool demoBlackhat DataSploit 2.0 Source Code Kunal Aggarwal, Shubham Mittal#osint#reconnaissance#data-governance+4
2018-03-02PanelNullcon Should all ciso promote hall of fame” within their organizations Video Shomiron Das Gupta, Hariprasad Chede, Keyur Desai, Subramanian Kumaraswamy#security-training#behavior-change#zero-day+1
2018-03-02PanelNullcon Should all ciso promote hall of fame” within their organizations Video Burgess Cooper, Durga Dube, Thom Langford, Harish Pillay#security-training#cybersecurity-strategy#bug-bounty+1
2018-03-01TalkNullcon SpotPhish: Zero-Hour Phishing Protection Source Code Video Ganesh Varadarajan#phishing#blueteam#anti-phishing+1
2018-03-01TalkNullcon Looting your bank savings using Digital India Presentation Video Indrajeet Bhuyan#red-teaming#application-pentesting#api-security+4
2017-12-07Tool demoBlackhat DataSploit - OSINT Framework Source Code Shubham Mittal#osint#reconnaissance#security-tools+2
2017-12-06TalkBlackhat BREAKING BAD: STEALING PATIENT DATA THROUGH MEDICAL DEVICES Presentation Video Saurabh Harit#red-teaming#data-leak#identity-theft+1
2017-08-18TalkC0c0n Phishing threats to customers and mitigation Bhavin Bhansali#phishing#anti-phishing#social-engineering+2
2017-08-18TalkC0c0n Moving from Cybersecurity Awareness to Cybersecurity Competence Anup Narayanan#cybersecurity-education#cybersecurity-training#security-training+3
2017-08-18TalkC0c0n OSINT and Privacy Rohit Srivastwa#osint#data-leak#surveillance+4
2017-08-18TalkC0c0n Call Centre Frauds Parry Aftab, Betsy Broder#social-engineering#security-training#risk-management+1
2017-08-18TalkC0c0n Challenges in Digital Banking Biju K#security-training#security-governance#risk-management
2017-07-26TalkBlackhat Wire Me Through Machine Learning Presentation Video Ankit Singh, Vijay Thaware#machine-learning#red-teaming#ai-security+3
2017-07-26Tool demoBlackhat Datasploit - Automated Open Source Intelligence (OSINT) Tool Source Code Kunal Aggarwal, Shubham Mittal, Sudhanshu Chauhan#osint#reconnaissance#social-engineering+4
2017-03-31TalkBlackhat Mobile-Telephony Threats in Asia Presentation Whitepaper Video Payas Gupta, Marco Balduzzi, Lion Gu#red-teaming#social-engineering#phishing+2
2016-11-03Tool demoBlackhat DataSploit Presentation Source Code Shubham Mittal, Nutan Kumar Panda#osint#reconnaissance#security-tools+3
2016-10-19TalkHacklu 2016: The Infosec Crossroads Presentation Saumil Shah#philosophy#security-strategy#incident-management+3
2016-09-14Talk44con 2016: The Infosec Crossroads Presentation Video Saumil Shah#blueteam#security-strategy#threat-modeling+4
2016-08-19TalkC0c0n The Art of Social Hacking Gaurav Trivedi, Rugved Mehta#reconnaissance#social-engineering#phishing+4
2016-08-19TalkC0c0n Evading Corporate Security – You’re as secure as the weakest link Prajwal Panchmahalkar#red-teaming#employee-education#social-engineering+3
2015-11-05TalkGroundzerosummit Credit Card Frauds – The money making Ecosystem for Cyber criminals Abhinav Singh#identity-theft#cyber-crime#data-leak+1
2015-11-05TalkGroundzerosummit Browser based Malware attacks Harsh Daftary#red-teaming#keylogging#phishing
2015-09-24TalkAppsecusa Encouraging Diversity and Advancing Cybersecurity Education Shruthi Kamath, Apoorva Giri, Elissa Shevinsky#cybersecurity-education#security-training#risk-management+1
2015-08-01TalkC0c0n S3curi7y at 36K feet Rugved Mehta, Gaurav Trivedi#aws#azure#gcp+3
2015-03-26TalkBlackhat The underground Ecosystem of Credit Card frauds Presentation Whitepaper Video Abhinav Singh#red-teaming#data-leak#identity-theft+1
2015-02-07PanelNullcon Startup panel – Make in India Aseem Jakhar, Radha Shelat, Sumit D Chowdhury, Shomiron Das Gupta, Sastry Tumuluri, Shiju Sathyadevan#security-strategy#cybersecurity-framework#business-resilience+4
2015-02-06PanelNullcon Why CISO should promote more of such technical events - pros and cons, benefits etc Burgess Cooper, Maya Viswanathan, Sanjay Burman, Sridharan Sankaran, Massoud Issa, Katie Moussouris#security-training#cybersecurity-strategy#security-management
2014-11-13TalkGroundzerosummit Identity theft and its impact on Cyber - Warfare Tarun Wig#identity-theft#phishing#social-engineering
2014-09-16TalkDeepsec Advanced Powershell Threat – Lethal Client Side Attacks Presentation Video Nikhil Mittal#powershell#red-teaming#endpoint-protection+4
2014-08-22TalkC0c0n APT: Case Study of attackers targeting public tendering Rahul Sasi#red-teaming#apt#attack-surface+4
2014-08-22TalkC0c0n Hacking Communication Akib Sayyed#red-teaming#network-architecture#social-engineering+1
2014-08-07TalkBlackhat Lifecycle of a phone fraudster: Exposing fraud activity from reconnaissance to takeover using graph analysis and acoustical anomalies Presentation Whitepaper Video Vijay Balasubramaniyan, Raj Bandyopadhyay, Telvis Calhoun#reconnaissance#social-engineering#blueteam
2014-02-14TalkNullcon 12 YEARS AND A BAKER’S DOZEN Presentation Video Saumil Shah#philosophy#security-strategy#threat-modeling+3
2014-02-14TalkNullcon In air they wander, we exist to blow their cover!!! {Approaches to Evil Twin Detection from a normal user’s perspective} Presentation Video Rushikesh D Nandedkar, Amrita C Iyer#wifi#evil-twin-attack#phishing+1
2013-11-07TalkGroundzerosummit Abusing Google Apps: Google is my command and control center Presentation Ajin Abraham#android#red-teaming#cloud-pentesting+4
2013-11-07TalkGroundzerosummit Approach to containing the outbreak of malicious information in online social networks Sriniketh Vijayaraghavan#incident-management#social-engineering#phishing+1
2013-11-07TalkGroundzerosummit The seven sins of Wi-Fi security Vivek Ramachandran#wifi#network-architecture#phishing+1
2013-11-07TalkGroundzerosummit Setting the Data Center on fire Ajit Hatti#red-teaming#incident-management#security-training+1
2013-09-27TalkC0c0n Hello CISO! How to make end-users LIKE and FOLLOW “Brand Infosec”? Anup Narayanan#security-training#cybersecurity-education#security-governance+3
2013-09-27TalkC0c0n Disclosing Vulnerabilities: The Bug Bounty Style Nikhil Prabhakar#red-teaming#bug-bounty#ethical-hacking+3
2013-08-15TalkUsenix Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness Presentation Whitepaper Devdatta Akhawe, Adrienne Felt#web-security#security-training#architecture+2
2013-03-01TalkNullcon Bug Bounty Hunter’s confession Presentation Amol Naik#bug-hunting#security-training#ethical-hacking+3
2012-12-01TalkClubhack The difference between the “Reality” and “Feeling” of Security: Information Security and the Human Being Presentation Video Thomas Kurian Ambattu#security-training#human-factor#risk-management+2
2012-09-26TalkNullcon Nullcon_delhi_2012 Presentation Source Code Prasanna Kanagasabai#ethical-hacking#social-engineering#security-training+1
2012-08-03TalkC0c0n A model to reduce information security risks due to human error Presentation Anup Narayanan#security-training#behavior-change#risk-management
2012-08-03TalkC0c0n The Weakest Link - Reinforcing the Human Element Sandeep Godbole#security-training#human-factor#cybersecurity-education+3
2012-08-03TalkC0c0n Layer 8 Exploitation: A threat to National Security Aakash Goel#social-engineering#security-assessment#security-training+1
2012-08-03TalkC0c0n Security Incidents – Avoiding the Apocalypse in 2012 Ashish Chandra Mishra#blueteam#phishing#social-engineering+1
2012-08-03TalkC0c0n Building Security Incident Detection & Handling Capabilities in Enterprises Sunil Varkey#blueteam#incident-detection#security-strategy+4
2011-12-04TalkClubhack Handle Exploitation of Remote System From Email Account Presentation Bhaumik Merchant#red-teaming#phishing#social-engineering
2011-12-04TalkClubhack One Link Facebook Presentation Anand Pandey#red-teaming#application-pentesting#phishing+1
2011-12-04TalkClubhack Exploit the Exploit Kits Presentation Dhruv Soi#red-teaming#exploit-kit#malware-distribution+4
2011-11-17TalkDeepsec Behavioral Security: 10 steps forward 5 steps backward Video Sourabh Satish#security-training#behavioral-change#risk-management+2
2011-09-07TalkSecuritybyte Social Web & Privacy – An evolving world Bala Sathiamurthy, Aridaman Tripathi#data-protection#api-security#security-compliance+2
2011-09-06TalkSecuritybyte Security Threats on Social Networks Presentation Nithya Raman#social-engineering#web-security#security-training+1
2011-08-03TalkBlackhat Femtocells: A poisonous needle in the operator’s hay stack Presentation Whitepaper Video Ravishankar Borgaonkar, Nico Golde, Kevin Redon#network-pentesting#identity-theft#firmware-analysis
2011-05-19TalkHitbsecconf Spying on SpyEye – What Lies Beneath? Presentation Aditya K Sood#blueteam#botnet#endpoint-protection+4
2011-03-15TalkNullcon Information Warfare Ñ The Indian Perspective Alok Vijayant#cybersecurity-strategy#risk-management#security-training+1
2011-02-25TalkNullcon Hacking the Parliament – A classic Social Engineering attack Anurag Dhanda#social-engineering#reconnaissance#security-strategy+2
2011-02-25TalkNullcon Incident Management and Beyond Dinesh O Bareja#incident-management#data-leak#phishing+2
2011-02-25TalkNullcon Lessons Learned From 2010 Presentation Video Saumil Shah#red-teaming#exploit-delivery#social-engineering+2
2010-12-04TalkClubhack Ultimate Pen Test – Compromising a highly secure environment Presentation Nikhil Mittal#security-assessment#social-engineering#application-pentesting+4
2010-11-25TalkDeepsec Developers are from Mars, Compliance Auditors are from Venus Video Neelay S Shah#security-compliance#security-governance#risk-management+4
2010-08-01TalkC0c0n Hackers’ EcoSystem in India Rohit Srivastwa#security-assessment#security-training#risk-management
2010-07-01TalkHitbsecconf The Travelling Hacksmith 2009 – 2010 Saumil Shah#red-teaming#application-pentesting#phishing+2
2010-04-21TalkHitbsecconf Web Security – Going Nowhere? Presentation Saumil Shah#red-teaming#application-hardening#application-pentesting+4
2010-02-25TalkNullcon Imposter ke karnamey: The Browser Phishing Tool. Lavakumar Kuppan#phishing#red-teaming#security-testing+1
2010-02-25TalkNullcon Malware Detection Tool for Websites: A Proof-Of-Concept Presentation Anant Kochhar#blueteam#malware-detection#application-pentesting+3
2009-12-05TalkClubhack India Cyber Crime Scene - Caught in the Crossfire Presentation Vinoo Thomas, Rahul Mohandas#cyber-crime#data-leak#pdf+3
2009-12-05TalkClubhack Lust 2.0 – Desire for free WiFi and the threat of the Imposter Presentation Lavakumar Kuppan#wifi#red-teaming#phishing+1
2009-11-17TalkSecuritybyte Lust 2.0 – Desire for free WiFi and the threat of the Imposter Presentation Lavakumar Kuppan#wifi#phishing#social-engineering
2009-11-17TalkSecuritybyte Threat Modeling Presentation Varun Sharma#threat-modeling#blueteam#security-strategy+4
2009-11-17TalkSecuritybyte Usability and Privacy in Security Presentation Ponnurangam Kumaraguru#data-protection#architecture#security-training+2
2009-10-07TalkHitbsecconf How to Own the World – One Desktop at a Time Presentation Video Saumil Shah#social-engineering#red-teaming#firewall
2009-08-06TalkC0c0n Cyber Victimisation K Jaishankar#cybersecurity-education#security-training#risk-management+1
2009-08-06TalkC0c0n Know Your Enemy, and Yourself: Demystifying Threat Modelin Meera Subbarao#blueteam#security-strategy#threat-modeling+4
2009-08-06TalkC0c0n Information Warfare A a Gafoor, Vinayak Mishra#threat-hunting#threat-modeling#security-training+2
2009-08-02TalkDefcon Wi-Fish Finder: Who Will Bite the Bait Presentation Video Md Sohail Ahmad, Prabhash Dhyani#wifi#honeypot#phishing+1
2009-07-29TalkBlackhat Psychotronica: Exposure, Control, and Deceit Presentation Nitesh Dhanjani#red-teaming#reconnaissance#social-engineering+3
2008-12-06TalkClubhack AntiSpam - Understanding the good, the bad and the ugly Presentation Aseem Jakhar#blueteam#phishing#anti-phishing+1
2008-12-06TalkClubhack Economic offenses through Credit Card Frauds Dissected Presentation Harshad Patil#fraud#identity-theft#financial-institutions
2008-12-06TalkClubhack Immune IT: Moving from Security to Immunity Presentation Ajit Hatti#blueteam#security-strategy#security-monitoring+4
2008-08-06TalkBlackhat Bad Sushi: Beating Phishers at Their Own Game Presentation Video Nitesh Dhanjani#phishing#blueteam#network-forensics+2
2008-03-28TalkBlackhat Spam-Evolution Whitepaper Aseem Jakhar#social-engineering#malware-detection#anti-phishing
2007-08-02TalkBlackhat The Evolution Of Phishing To Organized Crime Video Rohyt Belani#social-engineering#phishing#threat-modeling+2
2006-09-21TalkHitbsecconf Smashing the Stack for Profit - Period Presentation Video Rohyt Belani#red-teaming#application-pentesting#code-review+3
2005-09-29TalkHitbsecconf Trends in Real World Attacks: A Compilation of Case Studies Video Rohyt Belani#red-teaming#application-pentesting#application-hardening+4