| 2025-08-07 | Tool demo | Blackhat |
Q-TIP (QR Code Threat Inspection Platform)
| Rushikesh D Nandedkar | #incident-management#web-security#architecture+1 |
| 2025-08-06 | Panel | Blackhat |
Hacking the Status Quo: Tales From Leading Women in Cybersecurity
| Vandana Verma Sehgal, Chi en Shen, Natalie Silvanovich, Maddie Stone | #security-training#cybersecurity-education#security-strategy |
| 2025-06-02 | Talk | Confidence |
Adversarial Phishing: Defeating Security Barriers and AI-Driven Countermeasures
| Himanshu Sharma, Rahul Vashista | #phishing#red-teaming#mfa+1 |
| 2025-04-04 | Panel | Blackhat |
Locknote: Highlights & Key Takeaways from Black Hat Asia 2025
| Vandana Verma Sehgal, Daniel Cuthbert, Ryan Flores, Vitaly Kamluk, Jeff Moss, Asuka Nakajima | #security-strategy#cybersecurity-framework#digital-learning+1 |
| 2025-04-03 | Tool demo | Blackhat |
CompartIoT
| Sreesankar S, Aditya Krishna Vinod, Season Cherian | #microcontrollers#hardware-embedded#firmware-analysis+2 |
| 2025-03-02 | Talk | Nullcon |
eKYC Crisis: Securing the Lockers
| Kartik Lalan | #risk-management#architecture#data-leak+4 |
| 2025-03-02 | Panel | Nullcon |
How can organisations protect themselves against Advanced Cyber Threats
| Bithal Bhardwaj, Vishal Salvi | #security-strategy#incident-management#phishing+1 |
| 2025-03-01 | Panel | Nullcon |
Navigating Data Protection in the age of globalisation
| Saikat Datta, Krishan Dev | #data-protection#gdpr#data-governance+4 |
| 2024-11-16 | Talk | C0c0n |
Invisible Invaders: Bypassing Email Security with Legitimate Tools
| Dhruv Bisani | #bypassing#phishing#social-engineering+2 |
| 2024-11-16 | Talk | C0c0n |
Access for Sale: Inside the World of Ransomware Affiliates and Initial Access Brokers
| Nihar Sawant, Jaydev Joshi | #ransomware#phishing#supply-chain-security |
| 2024-11-16 | Talk | C0c0n |
Serverless Phishing Factory: Automate, Attack, Adapt
| Yash Bharadwaj, Manish Gupta | #phishing#serverless#cloud-workload-protection+2 |
| 2024-11-16 | Talk | C0c0n |
The subtle art of checkmating CISOs
| Sunil Varkey | #risk-management#architecture#security-governance+2 |
| 2024-11-15 | Talk | C0c0n |
CISO’s take on BYOAI
| Venugopal Parameswara | #risk-management#security-governance#security-compliance+3 |
| 2024-10-23 | Talk | Blackhat |
Guardians of the OAuth Galaxy: Defending Your Organization from OAuth Application Attacks
| Shruti Ranjit, Mangatas Tondang | #blueteam#oauth#application-pentesting+4 |
| 2024-08-29 | Tool demo | Hitbsecconf |
Mantis
| Bharath Kumar, Akshay Jain | #asset-inventory#dast#anti-phishing |
| 2024-08-09 | Talk | Defcon |
Reflections on a Decade in Bug Bounties: Experiences and Major Takeaways
| Nikhil Shrivastava, Charles Waterhouse | #bug-hunting#bug-bounty#security-training+3 |
| 2023-12-06 | Tool demo | Blackhat |
Octopii v2
| Owais Shaikh, Umair Nehri | #ai#data-protection#nlp+4 |
| 2023-09-28 | Talk | Rootcon |
Azure Illuminati: Unveiling the Mysteries of Cloud Exploitation
| Raunak Parmar | #azure#cloud-pentesting#mfa+4 |
| 2023-09-28 | Talk | Hackinparis |
How to have visibility and security OF CICD ecosystem
| Pramod Rana | #cicd-security#devsecops#architecture+4 |
| 2023-08-10 | Talk | Blackhat |
Does Public Disclosure of Vulnerabilities Affect Hacker Participation in Bug Bounty Programs?
| Amit Deokar, Ali Ahmed, Brian Lee | #bug-hunting#incident-management#security-strategy+4 |
| 2023-08-09 | Tool demo | Blackhat |
AntiSquat - An AI-Powered Phishing Domain Finder
| Owais Shaikh, Umair Nehri | #ai#ai-security#phishing+2 |
| 2023-08-09 | Talk | Blackhat |
Diversity Microtalks: Perspectives on Creating Change
| Aastha Sahni, Andy Ellis, Meghan Jacquot, Sherri Davidoff | #security-training#risk-management#security-governance |
| 2023-08-07 | Panel | C0c0n |
Frictionless Security…Experience Simplified.
| A Shiju Rawther, Maya R Nair, Suresh Sharma, Himanshu Das | #security-training#human-factor#behavior-change+3 |
| 2023-08-07 | Panel | C0c0n |
Evolving Threat Landscape: Strategies for Adapting and Innovating in Cybersecurity
| Vikas Arora, Sanjay Singh, Baidyanath Kumar, Saurabh Gugnani, Gokulavan Jayaraman, Vijay Nair | #security-strategy#threat-modeling#security-training+3 |
| 2023-08-07 | Talk | C0c0n |
Smart Contract Phishing : Attack & Defense
| Tejaswa Rastogi | #smart-contracts#phishing#secure-coding+1 |
| 2023-08-07 | Talk | C0c0n |
Citizen Mobile Security: Responsibilities, Accountability, and Impacts
| Satyendra Verma | #security-training#risk-management#compliance-governance |
| 2023-08-07 | Talk | C0c0n |
ESOC Trinetra Project
| Pankaj Kumar Dalela | #security-governance#risk-management#security-training |
| 2023-08-07 | Talk | C0c0n |
Generative AI and Cyber Crimes
| Brijesh Singh | #security-training#risk-management#threat-hunting |
| 2023-08-06 | Panel | C0c0n |
nGen Cyber Threats - 2024 and Beyond: Embracing Chaos, Taking Charge
| Murli Nambiar, A Shiju Rawther, Jacxine Fernandez, Vishal Salvi, Sridhar Govardhan | #security-strategy#cybersecurity-framework#cyber-resilience+2 |
| 2023-08-06 | Talk | C0c0n |
AI in Cyber Security and Crime Prevention
| Vishal Salvi | #ai#ai-security#deep-learning+3 |
| 2023-08-06 | Talk | C0c0n |
Developments in Deep Fake detection
| Tapas Saini | #architecture#security-training#reverse-engineering |
| 2023-08-06 | Talk | C0c0n |
Insider Threats - Best Practices and Common Pitfalls
| Georgie Kurien | #insider-threats#risk-management#security-training+1 |
| 2023-05-12 | Talk | Blackhat |
Engaging the Next Generation of Cybersecurity Professionals: The Power of Security Zines
| Rohit Sehgal | #digital-learning#security-training#cybersecurity-education+1 |
| 2023-05-11 | Tool demo | Blackhat |
KernelGoat
| Shivankar Madaan | #kernel#secure-development#security-training |
| 2023-04-21 | Talk | Hitbsecconf |
LOCKNOTE:THE HAND THAT STRIKES, ALSO BLOCKS
| Saumil Shah | #architecture#risk-management#security-training+1 |
| 2023-03-09 | Panel | Nullcon |
Elements of a Successful Security Strategy: A Comprehensive Approach
| Sheetal Joseph, Sybe Izzak Rispens, Travis Carelock | #security-strategy#security-testing#secure-development+4 |
| 2022-12-08 | Panel | Blackhat |
Locknote: Conclusions and Key Takeaways from Day 2
| Anant Shrivastava, Jeff Moss, Jiska Classen, Leigh Anney Galloway, Federico Maggi | #security-strategy#threat-modeling#cybersecurity-training+2 |
| 2022-12-08 | Tool demo | Blackhat |
Industrial Control Systems: Capture the Train!
| Dhruv Sharan, Arnaud Soullié | #ctf#ics-security#plc-security+3 |
| 2022-09-24 | Talk | C0c0n |
Power of Narratives in Cyber Security
| Sunil Varkey | #security-training#cybersecurity-education#human-factor+2 |
| 2022-09-24 | Talk | C0c0n |
BEC, still the sure shot trap
| Georgie Kurien | #social-engineering#security-assessment#security-training |
| 2022-09-24 | Talk | C0c0n |
Building Smart, Resilient and Sustainable Cyber Eco System
| Navin Kumar Singh | #risk-management#cybersecurity-strategy#architecture+4 |
| 2022-09-24 | Talk | C0c0n |
OSINT Tools and Techniques
| Brijesh Singh | #threat-hunting#intelligence-sharing#security-training |
| 2022-09-24 | Panel | C0c0n |
Ransom Trends in India
| Pardhasaradhi Ch, Srikanta Prasad, Jacxine Fernandez, Diwakar Sheoran | #ransomware#data-loss-prevention#incident-management+2 |
| 2022-09-24 | Talk | C0c0n |
Weaponising Social Media for Psychological Operations
| A a Gafoor | #social-engineering#security-training#threat-hunting+1 |
| 2022-09-23 | Panel | C0c0n |
Cybersecurity Dissonance: Perception vs Reality
| Dinesh O Bareja, George Eapen, Jairam Ramesh, Rajesh Hemrajani, Suresh Sharma | #cybersecurity-training#phishing#human-factor+1 |
| 2022-09-23 | Talk | C0c0n |
A Tale of Credential Leak of a Popular Cloud Threat Actor
| Nitesh Surana | #security-assessment#cloud-pentesting#cloud-workload-protection+2 |
| 2022-09-23 | Panel | C0c0n |
Customer, Credit & Risk - Fintech trends 2022
| Maya R Nair, Balakrishnan A, A Shiju Rawther, Linson Paul, Shivanath Somanathan | #financial-institutions#data-protection#identity-theft+2 |
| 2022-09-23 | Talk | C0c0n |
Ransomware: Prevention, Early Detection and Response
| Babitha Bp | #ransomware#incident-management#malware-prevention+2 |
| 2022-09-06 | Panel | Nullcon |
Does your SOC sucks?
| Krishna Pandey, Shweta Kshirsagar, Vivek Gopalan, Yogi Kapur | #security-training#incident-management#alert-fatigue+3 |
| 2022-08-25 | Talk | Hitbsecconf |
Building An Army Of Bots By Hijacking A Unicorn’s Twitter Handle
| Rahul Sasi, Vishal Singh | #social-engineering#security-assessment#botnet+1 |
| 2022-08-13 | Panel | Defcon |
Who doesn’t like a little Spice? Emulation Maturity, Team Culture and TTPs
| Niru Ragupathy | #security-development-lifecycle#security-tools#incident-management+2 |
| 2022-08-11 | Tool demo | Blackhat |
Octopii - AI-powered Personal Identifiable Information (PII) scanner
| Owais Shaikh | #ai#ai-security#data-protection+4 |
| 2022-08-11 | Talk | Thedianainitiative |
Connecting Dots Between Security Teams & Customer Expectations
| Shruthi Kamath | #security-governance#risk-management#architecture+2 |
| 2022-08-11 | Talk | Thedianainitiative |
The Real Cost of Free: What you need to know before downloading a free app
| Ruchira Pokhriyal | #app-security#data-protection#security-training+1 |
| 2022-08-10 | Talk | Blackhat |
Attacks From a New Front Door in 4G & 5G Mobile Networks
| Altaf Shaik, Shinjo Park, Matteo Strada | #api-security#access-management#identity-theft+4 |
| 2022-08-10 | Tool demo | Blackhat |
Vajra - Your Weapon To Cloud
| Raunak Parmar | #cloud-pentesting#cloud-security-posture-management#azure+3 |
| 2022-07-23 | Talk | Maycontainhackers |
How would a real life social media be like?
| Aditi Bhatnagar | #data-protection#security-training#risk-management+3 |
| 2022-05-18 | Panel | Phdays |
Challenges for cybersecurity conferences. Part II
| Aseem Jakhar, Timur Yunusov, Igor Lukic, Dhillon Andrew Kannabhiran | #security-training#cybersecurity-strategy#threat-modeling+3 |
| 2022-05-12 | Tool demo | Blackhat |
ThunderCloud: Attack Cloud Without Keys!
| Shivankar Madaan | #aws#cloud-pentesting#phishing |
| 2021-11-13 | Panel | C0c0n |
Human errors & system misconfigurations- We can handle it!
| Amit Dubey, Maninder Singh, Tulika Pandey, Tal Catran, Dunston Pereira, Angel Redoble | #human-factor#security-training#phishing+1 |
| 2021-11-13 | Talk | C0c0n |
Case study - E-crime group targeting mobile users
| Rahul Sasi | #incident-management#mobile-hacking#phishing+4 |
| 2021-11-13 | Talk | C0c0n |
Connecting the dots between customers and security teams
| Shruthi Kamath | #incident-management#security-training#devsecops+1 |
| 2021-11-13 | Talk | C0c0n |
Crisis Capitalization in a Pandemic
| Greeshma M R | #risk-management#incident-management#security-training+2 |
| 2021-11-13 | Talk | C0c0n |
Cybersecurity in the era of Resilience - A walk through people, process and technology
| Babitha B P | #risk-management#cyber-resilience#architecture+3 |
| 2021-11-13 | Talk | C0c0n |
Post pandemic Transformation - A CISO’s perspective
| Sridhar Govardhan | #risk-management#security-governance#security-compliance+3 |
| 2021-11-12 | Panel | C0c0n |
Diversity and Inclusion
| Aarushi Koolwal, Hussaina Begum, Nehal Mehta, Shivani Sharma | #security-training#behavior-change#cybersecurity-education+3 |
| 2021-11-12 | Talk | C0c0n |
The evolving nature of cyber community
| Aastha Sahni | #security-training#risk-management#cybersecurity-education |
| 2021-11-12 | Talk | C0c0n |
Understanding the Psychology Behind Threats - adding Twists to your Turns
| Saman Fatima | #threat-modeling#security-training#human-factor+1 |
| 2021-11-12 | Talk | C0c0n |
“Let’s Go Phishing”: Discerning the insidious nature of Social Engineering
| Ruchira Pokhriyal, Shashi Karhail | #social-engineering#security-assessment#security-training |
| 2021-11-12 | Talk | C0c0n |
Executive Presence….a cardinal of the cyber rostrum
| Bishakha Jain | #security-training#architecture#security-governance |
| 2021-11-12 | Talk | C0c0n |
Regulating Social Media Platforms : Should it be done in Democratic Societies ?
| J Sam Daniel Stalin, Apar Gupta, Dinesh O Bareja, Prashant Mali, Jiten Jain | #security-compliance#security-governance#risk-management+3 |
| 2021-08-08 | Panel | Defcon |
Resilient cyber space: The role of hacker and security communities
| Manu Zacharia, Aseem Jakhar, Abhijith B R, Jay Turla, Omar Santos, Dave Lewis, Dhillon Kannabhiran | #security-training#threat-modeling#incident-management+3 |
| 2021-08-06 | Talk | Defcon |
Adversary village Kick-off
| Abhijith B R | #red-teaming#ethical-hacking#vulnerability-assessment+2 |
| 2021-05-07 | Panel | Blackhat |
Insights and Predictions: What’s Next in InfoSec
| Vandana Verma Sehgal, Neil R. Wyler, Lidia Giuliano, Jeff Wilson, Vitaly Kamluk | #security-strategy#cybersecurity-training#cybersecurity-framework+2 |
| 2020-11-21 | Talk | Appsecindonesia |
The caveats of the unseen: Crouching exposure, Hidden Misconfiguration
| Ashwin Vamshi | #architecture#devsecops#risk-management+1 |
| 2020-10-09 | Talk | Shellcon |
How I Created My Clone Using AI - Next-Gen Social Engineering
| Tamaghna Basu | #ai#social-engineering#ai-security+4 |
| 2020-10-02 | Tool demo | Blackhat |
Phishing Simulation Assessment
| Jyoti Raval | #phishing#blueteam#social-engineering+3 |
| 2020-10-01 | Talk | Blackhat |
Making an Impact from India to the Rest of the World by Building and Nurturing Women Infosec Community
| Vandana Verma Sehgal | #security-training#cybersecurity-education#social-engineering+1 |
| 2020-09-18 | Keynote | C0c0n |
Data protection and Privacy Data protection and Privacy
| Kris Gopalakrishnan | #ai-security#data-protection#identity-theft+2 |
| 2020-09-18 | Talk | C0c0n |
Introducing SniperPhish: A Web-Email Spear Phishing Toolkit
| Sreehari Haridas, Gem George | #phishing#application-pentesting#security-development-lifecycle+4 |
| 2020-09-18 | Talk | C0c0n |
COVID-19 Cyber impact on financial sector and remote employees
| Amit Dubey, Tal Catran, Yair Feldman | #incident-management#risk-management#cybersecurity-strategy+4 |
| 2020-09-18 | Talk | C0c0n |
Herd Immunity, in the Cyber World
| Sunil Varkey | #security-training#risk-management#architecture |
| 2020-09-18 | Talk | C0c0n |
Cyber Security Shifts During COVID-19
| Sunil Kanchi | #risk-management#security-training#compliance-governance+1 |
| 2020-09-18 | Talk | C0c0n |
How I created my clone using AI - next-gen Social Engineering
| Tamaghna Basu | #ai#impersonation#ai-security+3 |
| 2020-08-22 | Talk | Thedianainitiative |
Deploying discreet infrastructure for targeted phishing campaigns
| Sreehari Haridas | #phishing#application-pentesting#social-engineering+3 |
| 2020-08-22 | Talk | Thedianainitiative |
Internal Red Team Operations Framework - Building your practical internal Red Team
| Abhijith B R | #red-teaming#cyber-war#phishing+3 |
| 2020-08-07 | Panel | Defcon |
D0 N0 H4RM: A Healthcare Security Conversation
| Vidha Murthy, Christian Dameff, Jeff Tully, Jessica Wilkerson, Veronica Schmitt, Ash Luft | #data-protection#identity-management#security-training+3 |
| 2020-08-06 | Panel | Blackhat |
Locknote: Conclusions and Key Takeaways from Day 2
| Aanchal Gupta, Kymberlee Price, Rodrigo Rubira Branco, Stefano Zanero | #security-strategy#threat-modeling#cybersecurity-training+2 |
| 2020-08-06 | Tool demo | Blackhat |
Dynamic Labs: Windows & Active Directory Exploitation
| Rohan Durve | #windows#active-directory#security-training |
| 2020-08-06 | Talk | Blackhat |
Making an Impact from India to the Rest of the World by Building and Nurturing Women Infosec Community
| Vandana Verma Sehgal | #security-training#cybersecurity-strategy#social-engineering |
| 2020-08-06 | Talk | Blackhat |
How I Created My Clone Using AI - Next-Gen Social Engineering
| Tamaghna Basu | #ai#social-engineering#impersonation |
| 2020-03-06 | Tool demo | Nullcon |
Phishing Simulation
| Jyoti Raval | #phishing#blueteam#security-training+2 |
| 2020-03-06 | Panel | Nullcon |
Securing the Human Factor
| Rahul Neel Mani, Phoram Mehta, Burgess Cooper, Manish Tiwari, Venkatesh Subramaniam | #human-factor#security-training#social-engineering+3 |
| 2020-03-06 | Panel | Nullcon |
Complication in security practices
| Himanshu Das, Neelu Tripathy, Kushal Das, Ankur Bhargava, Vaibhav Gupta | #security-training#human-factor#behavior-change+3 |
| 2020-03-06 | Tool demo | Nullcon |
spike2kill
| Manish Singh | #web-scraping#ai-security#nlp+4 |
| 2019-09-28 | Talk | Romhack |
Oh! Auth: Implementation pitfalls of OAuth 2.0 & the Auth Providers who have fell in it
| Samit Anwer | #oauth#phishing#csrf+2 |
| 2019-09-27 | Talk | C0c0n |
Demystifying HealthCare Security
| Ajay Pratap Singh | #blueteam#data-protection#identity-theft+4 |
| 2019-09-27 | Talk | C0c0n |
A Day in the Life of a CISO
| Sridhar Govardhan | #security-compliance#security-governance#risk-management+2 |
| 2019-09-27 | Talk | C0c0n |
Practical Approach to Cyber Security for financial institutions
| Georgie Kurien | #financial-institutions#secure-development#risk-management+2 |
| 2019-09-27 | Panel | C0c0n |
Shouldn’t Organization disclose breaches - The need for a shared platform
| Sunil Varkey, Jacxine Fernandez, Rahul Sasi, K K Chaudhary | #data-leak#data-protection#security-testing+4 |
| 2019-09-13 | Talk | 44con |
One Person Army – Playbook on how to be the first Security Engineer at a company
| Kashish Mittal | #devsecops#application-hardening#secure-development+4 |
| 2019-09-12 | Keynote | Globalappsec |
Making a Change, One at a time - Diversity: More than just Gender
| Vandana Verma Sehgal | #security-training#human-factor#cybersecurity-strategy+3 |
| 2019-08-08 | Talk | Defcon |
Phishing in the cloud era
| Ashwin Vamshi, Abhinav Singh | #phishing#api-security#web-security+2 |
| 2019-05-21 | Talk | Phdays |
How to fail in hardware hacking
| Arun Magesh | #red-teaming#embedded-systems#firmware-analysis+1 |
| 2019-03-01 | Panel | Nullcon |
Breached? – Here is how I responded!
| Muslim Koser, Mrudul Uchil, Sachin Burman, Venkata Satish Guttula, Vijay K Verma | #incident-management#digital-forensics#forensics+1 |
| 2019-02-28 | Talk | Nullcon |
Dirty use of USSD Codes
| Ravishankar Borgaonkar | #ussd#red-teaming#social-engineering+3 |
| 2018-10-05 | Talk | C0c0n |
How can we use machine learning to prevent Frauds and password breaches
| Tamaghna Basu | #machine-learning#blueteam#ai-security+4 |
| 2018-10-05 | Talk | C0c0n |
OSINT : Indian Citizen Edition
| Anant Shrivastava | #osint#data-governance#identity-theft+2 |
| 2018-10-05 | Talk | C0c0n |
Privacy And Data Protection: Stakeholders’ Perspectives
| Rahul Sharma | #blueteam#data-protection#gdpr+4 |
| 2018-10-05 | Talk | C0c0n |
Resiliency Focus alongside Digital Disruption
| Lince Lawrence | #architecture#risk-management#security-training+2 |
| 2018-10-05 | Talk | C0c0n |
Taking cyber security to the board room
| Amit Pradhan | #risk-management#security-compliance#security-governance+2 |
| 2018-10-05 | Talk | C0c0n |
Artificial Intelligence and Social Media Analytics in Criminal Investigation
| Amit Dubey | #ai#ai-security#nlp+3 |
| 2018-08-08 | Tool demo | Blackhat |
DataSploit 2.0
| Kunal Aggarwal, Shubham Mittal | #osint#reconnaissance#data-governance+4 |
| 2018-03-02 | Panel | Nullcon |
Should all ciso promote hall of fame” within their organizations
| Shomiron Das Gupta, Hariprasad Chede, Keyur Desai, Subramanian Kumaraswamy | #security-training#behavior-change#zero-day+1 |
| 2018-03-02 | Panel | Nullcon |
Should all ciso promote hall of fame” within their organizations
| Burgess Cooper, Durga Dube, Thom Langford, Harish Pillay | #security-training#cybersecurity-strategy#bug-bounty+1 |
| 2018-03-01 | Talk | Nullcon |
SpotPhish: Zero-Hour Phishing Protection
| Ganesh Varadarajan | #phishing#blueteam#anti-phishing+1 |
| 2018-03-01 | Talk | Nullcon |
Looting your bank savings using Digital India
| Indrajeet Bhuyan | #red-teaming#application-pentesting#api-security+4 |
| 2017-12-07 | Tool demo | Blackhat |
DataSploit - OSINT Framework
| Shubham Mittal | #osint#reconnaissance#security-tools+2 |
| 2017-12-06 | Talk | Blackhat |
BREAKING BAD: STEALING PATIENT DATA THROUGH MEDICAL DEVICES
| Saurabh Harit | #red-teaming#data-leak#identity-theft+1 |
| 2017-08-18 | Talk | C0c0n |
Phishing threats to customers and mitigation
| Bhavin Bhansali | #phishing#anti-phishing#social-engineering+2 |
| 2017-08-18 | Talk | C0c0n |
Moving from Cybersecurity Awareness to Cybersecurity Competence
| Anup Narayanan | #cybersecurity-education#cybersecurity-training#security-training+3 |
| 2017-08-18 | Talk | C0c0n |
OSINT and Privacy
| Rohit Srivastwa | #osint#data-leak#surveillance+4 |
| 2017-08-18 | Talk | C0c0n |
Call Centre Frauds
| Parry Aftab, Betsy Broder | #social-engineering#security-training#risk-management+1 |
| 2017-08-18 | Talk | C0c0n |
Challenges in Digital Banking
| Biju K | #security-training#security-governance#risk-management |
| 2017-07-26 | Talk | Blackhat |
Wire Me Through Machine Learning
| Ankit Singh, Vijay Thaware | #machine-learning#red-teaming#ai-security+3 |
| 2017-07-26 | Tool demo | Blackhat |
Datasploit - Automated Open Source Intelligence (OSINT) Tool
| Kunal Aggarwal, Shubham Mittal, Sudhanshu Chauhan | #osint#reconnaissance#social-engineering+4 |
| 2017-03-31 | Talk | Blackhat |
Mobile-Telephony Threats in Asia
| Payas Gupta, Marco Balduzzi, Lion Gu | #red-teaming#social-engineering#phishing+2 |
| 2016-11-03 | Tool demo | Blackhat |
DataSploit
| Shubham Mittal, Nutan Kumar Panda | #osint#reconnaissance#security-tools+3 |
| 2016-10-19 | Talk | Hacklu |
2016: The Infosec Crossroads
| Saumil Shah | #philosophy#security-strategy#incident-management+3 |
| 2016-09-14 | Talk | 44con |
2016: The Infosec Crossroads
| Saumil Shah | #blueteam#security-strategy#threat-modeling+4 |
| 2016-08-19 | Talk | C0c0n |
The Art of Social Hacking
| Gaurav Trivedi, Rugved Mehta | #reconnaissance#social-engineering#phishing+4 |
| 2016-08-19 | Talk | C0c0n |
Evading Corporate Security – You’re as secure as the weakest link
| Prajwal Panchmahalkar | #red-teaming#employee-education#social-engineering+3 |
| 2015-11-05 | Talk | Groundzerosummit |
Credit Card Frauds – The money making Ecosystem for Cyber criminals
| Abhinav Singh | #identity-theft#cyber-crime#data-leak+1 |
| 2015-11-05 | Talk | Groundzerosummit |
Browser based Malware attacks
| Harsh Daftary | #red-teaming#keylogging#phishing |
| 2015-09-24 | Talk | Appsecusa |
Encouraging Diversity and Advancing Cybersecurity Education
| Shruthi Kamath, Apoorva Giri, Elissa Shevinsky | #cybersecurity-education#security-training#risk-management+1 |
| 2015-08-01 | Talk | C0c0n |
S3curi7y at 36K feet
| Rugved Mehta, Gaurav Trivedi | #aws#azure#gcp+3 |
| 2015-03-26 | Talk | Blackhat |
The underground Ecosystem of Credit Card frauds
| Abhinav Singh | #red-teaming#data-leak#identity-theft+1 |
| 2015-02-07 | Panel | Nullcon |
Startup panel – Make in India
| Aseem Jakhar, Radha Shelat, Sumit D Chowdhury, Shomiron Das Gupta, Sastry Tumuluri, Shiju Sathyadevan | #security-strategy#cybersecurity-framework#business-resilience+4 |
| 2015-02-06 | Panel | Nullcon |
Why CISO should promote more of such technical events - pros and cons, benefits etc
| Burgess Cooper, Maya Viswanathan, Sanjay Burman, Sridharan Sankaran, Massoud Issa, Katie Moussouris | #security-training#cybersecurity-strategy#security-management |
| 2014-11-13 | Talk | Groundzerosummit |
Identity theft and its impact on Cyber - Warfare
| Tarun Wig | #identity-theft#phishing#social-engineering |
| 2014-09-16 | Talk | Deepsec |
Advanced Powershell Threat – Lethal Client Side Attacks
| Nikhil Mittal | #powershell#red-teaming#endpoint-protection+4 |
| 2014-08-22 | Talk | C0c0n |
APT: Case Study of attackers targeting public tendering
| Rahul Sasi | #red-teaming#apt#attack-surface+4 |
| 2014-08-22 | Talk | C0c0n |
Hacking Communication
| Akib Sayyed | #red-teaming#network-architecture#social-engineering+1 |
| 2014-08-07 | Talk | Blackhat |
Lifecycle of a phone fraudster: Exposing fraud activity from reconnaissance to takeover using graph analysis and acoustical anomalies
| Vijay Balasubramaniyan, Raj Bandyopadhyay, Telvis Calhoun | #reconnaissance#social-engineering#blueteam |
| 2014-02-14 | Talk | Nullcon |
12 YEARS AND A BAKER’S DOZEN
| Saumil Shah | #philosophy#security-strategy#threat-modeling+3 |
| 2014-02-14 | Talk | Nullcon |
In air they wander, we exist to blow their cover!!! {Approaches to Evil Twin Detection from a normal user’s perspective}
| Rushikesh D Nandedkar, Amrita C Iyer | #wifi#evil-twin-attack#phishing+1 |
| 2013-11-07 | Talk | Groundzerosummit |
Abusing Google Apps: Google is my command and control center
| Ajin Abraham | #android#red-teaming#cloud-pentesting+4 |
| 2013-11-07 | Talk | Groundzerosummit |
Approach to containing the outbreak of malicious information in online social networks
| Sriniketh Vijayaraghavan | #incident-management#social-engineering#phishing+1 |
| 2013-11-07 | Talk | Groundzerosummit |
The seven sins of Wi-Fi security
| Vivek Ramachandran | #wifi#network-architecture#phishing+1 |
| 2013-11-07 | Talk | Groundzerosummit |
Setting the Data Center on fire
| Ajit Hatti | #red-teaming#incident-management#security-training+1 |
| 2013-09-27 | Talk | C0c0n |
Hello CISO! How to make end-users LIKE and FOLLOW “Brand Infosec”?
| Anup Narayanan | #security-training#cybersecurity-education#security-governance+3 |
| 2013-09-27 | Talk | C0c0n |
Disclosing Vulnerabilities: The Bug Bounty Style
| Nikhil Prabhakar | #red-teaming#bug-bounty#ethical-hacking+3 |
| 2013-08-15 | Talk | Usenix |
Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness
| Devdatta Akhawe, Adrienne Felt | #web-security#security-training#architecture+2 |
| 2013-03-01 | Talk | Nullcon |
Bug Bounty Hunter’s confession
| Amol Naik | #bug-hunting#security-training#ethical-hacking+3 |
| 2012-12-01 | Talk | Clubhack |
The difference between the “Reality” and “Feeling” of Security: Information Security and the Human Being
| Thomas Kurian Ambattu | #security-training#human-factor#risk-management+2 |
| 2012-09-26 | Talk | Nullcon |
Nullcon_delhi_2012
| Prasanna Kanagasabai | #ethical-hacking#social-engineering#security-training+1 |
| 2012-08-03 | Talk | C0c0n |
A model to reduce information security risks due to human error
| Anup Narayanan | #security-training#behavior-change#risk-management |
| 2012-08-03 | Talk | C0c0n |
The Weakest Link - Reinforcing the Human Element
| Sandeep Godbole | #security-training#human-factor#cybersecurity-education+3 |
| 2012-08-03 | Talk | C0c0n |
Layer 8 Exploitation: A threat to National Security
| Aakash Goel | #social-engineering#security-assessment#security-training+1 |
| 2012-08-03 | Talk | C0c0n |
Security Incidents – Avoiding the Apocalypse in 2012
| Ashish Chandra Mishra | #blueteam#phishing#social-engineering+1 |
| 2012-08-03 | Talk | C0c0n |
Building Security Incident Detection & Handling Capabilities in Enterprises
| Sunil Varkey | #blueteam#incident-detection#security-strategy+4 |
| 2011-12-04 | Talk | Clubhack |
Handle Exploitation of Remote System From Email Account
| Bhaumik Merchant | #red-teaming#phishing#social-engineering |
| 2011-12-04 | Talk | Clubhack |
One Link Facebook
| Anand Pandey | #red-teaming#application-pentesting#phishing+1 |
| 2011-12-04 | Talk | Clubhack |
Exploit the Exploit Kits
| Dhruv Soi | #red-teaming#exploit-kit#malware-distribution+4 |
| 2011-11-17 | Talk | Deepsec |
Behavioral Security: 10 steps forward 5 steps backward
| Sourabh Satish | #security-training#behavioral-change#risk-management+2 |
| 2011-09-07 | Talk | Securitybyte |
Social Web & Privacy – An evolving world
| Bala Sathiamurthy, Aridaman Tripathi | #data-protection#api-security#security-compliance+2 |
| 2011-09-06 | Talk | Securitybyte |
Security Threats on Social Networks
| Nithya Raman | #social-engineering#web-security#security-training+1 |
| 2011-08-03 | Talk | Blackhat |
Femtocells: A poisonous needle in the operator’s hay stack
| Ravishankar Borgaonkar, Nico Golde, Kevin Redon | #network-pentesting#identity-theft#firmware-analysis |
| 2011-05-19 | Talk | Hitbsecconf |
Spying on SpyEye – What Lies Beneath?
| Aditya K Sood | #blueteam#botnet#endpoint-protection+4 |
| 2011-03-15 | Talk | Nullcon |
Information Warfare Ñ The Indian Perspective
| Alok Vijayant | #cybersecurity-strategy#risk-management#security-training+1 |
| 2011-02-25 | Talk | Nullcon |
Hacking the Parliament – A classic Social Engineering attack
| Anurag Dhanda | #social-engineering#reconnaissance#security-strategy+2 |
| 2011-02-25 | Talk | Nullcon |
Incident Management and Beyond
| Dinesh O Bareja | #incident-management#data-leak#phishing+2 |
| 2011-02-25 | Talk | Nullcon |
Lessons Learned From 2010
| Saumil Shah | #red-teaming#exploit-delivery#social-engineering+2 |
| 2010-12-04 | Talk | Clubhack |
Ultimate Pen Test – Compromising a highly secure environment
| Nikhil Mittal | #security-assessment#social-engineering#application-pentesting+4 |
| 2010-11-25 | Talk | Deepsec |
Developers are from Mars, Compliance Auditors are from Venus
| Neelay S Shah | #security-compliance#security-governance#risk-management+4 |
| 2010-08-01 | Talk | C0c0n |
Hackers’ EcoSystem in India
| Rohit Srivastwa | #security-assessment#security-training#risk-management |
| 2010-07-01 | Talk | Hitbsecconf |
The Travelling Hacksmith 2009 – 2010
| Saumil Shah | #red-teaming#application-pentesting#phishing+2 |
| 2010-04-21 | Talk | Hitbsecconf |
Web Security – Going Nowhere?
| Saumil Shah | #red-teaming#application-hardening#application-pentesting+4 |
| 2010-02-25 | Talk | Nullcon |
Imposter ke karnamey: The Browser Phishing Tool.
| Lavakumar Kuppan | #phishing#red-teaming#security-testing+1 |
| 2010-02-25 | Talk | Nullcon |
Malware Detection Tool for Websites: A Proof-Of-Concept
| Anant Kochhar | #blueteam#malware-detection#application-pentesting+3 |
| 2009-12-05 | Talk | Clubhack |
India Cyber Crime Scene - Caught in the Crossfire
| Vinoo Thomas, Rahul Mohandas | #cyber-crime#data-leak#pdf+3 |
| 2009-12-05 | Talk | Clubhack |
Lust 2.0 – Desire for free WiFi and the threat of the Imposter
| Lavakumar Kuppan | #wifi#red-teaming#phishing+1 |
| 2009-11-17 | Talk | Securitybyte |
Lust 2.0 – Desire for free WiFi and the threat of the Imposter
| Lavakumar Kuppan | #wifi#phishing#social-engineering |
| 2009-11-17 | Talk | Securitybyte |
Threat Modeling
| Varun Sharma | #threat-modeling#blueteam#security-strategy+4 |
| 2009-11-17 | Talk | Securitybyte |
Usability and Privacy in Security
| Ponnurangam Kumaraguru | #data-protection#architecture#security-training+2 |
| 2009-10-07 | Talk | Hitbsecconf |
How to Own the World – One Desktop at a Time
| Saumil Shah | #social-engineering#red-teaming#firewall |
| 2009-08-06 | Talk | C0c0n |
Cyber Victimisation
| K Jaishankar | #cybersecurity-education#security-training#risk-management+1 |
| 2009-08-06 | Talk | C0c0n |
Know Your Enemy, and Yourself: Demystifying Threat Modelin
| Meera Subbarao | #blueteam#security-strategy#threat-modeling+4 |
| 2009-08-06 | Talk | C0c0n |
Information Warfare
| A a Gafoor, Vinayak Mishra | #threat-hunting#threat-modeling#security-training+2 |
| 2009-08-02 | Talk | Defcon |
Wi-Fish Finder: Who Will Bite the Bait
| Md Sohail Ahmad, Prabhash Dhyani | #wifi#honeypot#phishing+1 |
| 2009-07-29 | Talk | Blackhat |
Psychotronica: Exposure, Control, and Deceit
| Nitesh Dhanjani | #red-teaming#reconnaissance#social-engineering+3 |
| 2008-12-06 | Talk | Clubhack |
AntiSpam - Understanding the good, the bad and the ugly
| Aseem Jakhar | #blueteam#phishing#anti-phishing+1 |
| 2008-12-06 | Talk | Clubhack |
Economic offenses through Credit Card Frauds Dissected
| Harshad Patil | #fraud#identity-theft#financial-institutions |
| 2008-12-06 | Talk | Clubhack |
Immune IT: Moving from Security to Immunity
| Ajit Hatti | #blueteam#security-strategy#security-monitoring+4 |
| 2008-08-06 | Talk | Blackhat |
Bad Sushi: Beating Phishers at Their Own Game
| Nitesh Dhanjani | #phishing#blueteam#network-forensics+2 |
| 2008-03-28 | Talk | Blackhat |
Spam-Evolution
| Aseem Jakhar | #social-engineering#malware-detection#anti-phishing |
| 2007-08-02 | Talk | Blackhat |
The Evolution Of Phishing To Organized Crime
| Rohyt Belani | #social-engineering#phishing#threat-modeling+2 |
| 2006-09-21 | Talk | Hitbsecconf |
Smashing the Stack for Profit - Period
| Rohyt Belani | #red-teaming#application-pentesting#code-review+3 |
| 2005-09-29 | Talk | Hitbsecconf |
Trends in Real World Attacks: A Compilation of Case Studies
| Rohyt Belani | #red-teaming#application-pentesting#application-hardening+4 |