🧪 Experimental Feature

Focus Areas are an experimental feature that groups related content by tags. This page and its functionality may change as we refine the categorization system.

Security Awareness

Security awareness and related activities

130
Total Entries
129
Contributors
100
Unique Tags
53
Related Tags

Top Contributors

Sunil Varkey(5) Anup Narayanan(3) Georgie Kurien(3) Mahesh Kalyanaraman(3) Shruthi Kamath(3)

Related Tags (14)

Show all 14 tags...

All Entries (130 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-08-07Tool demoBlackhat Q-TIP (QR Code Threat Inspection Platform) Rushikesh D Nandedkarincident-responseweb-securityvulnerability-management+2
2025-04-29TalkRsac It’s Always Risky in IT: Frontline Stories and Strategic Insights Rohit Bansalrisk-managementsecurity-architecturesecurity-awareness+2
2024-11-28TalkBlackhat Time to Redefine Cybersecurity - Adding T - Trust as new Tenant to “CIA” and make it “I-ACT Lalit Ahluwaliarisk-managementsecurity-architecturesecurity-governance+1
2024-11-27TalkBlackhat The Future of Cybersecurity: Addressing New Threats with Groundbreaking Strategies Mahesh Babu Kanigiririsk-managementvulnerability-managementsecurity-architecture+2
2024-11-26TalkBlackhat The Double Edge Sword - Cybersecurity & AI Karmendra Kohlisecurity-architecturerisk-managementdevsecops+1
2024-11-16TalkC0c0n Serverless Phishing Factory: Automate, Attack, Adapt Yash Bharadwaj, Manish Guptaphishing
2024-11-16TalkC0c0n The subtle art of checkmating CISOs Sunil Varkeyrisk-managementsecurity-architecturesecurity-governance+3
2024-11-15TalkC0c0n CISO’s take on BYOAI Venugopal Parameswararisk-managementsecurity-governancecompliance+4
2024-10-23Tool demoBlackhat Cyber Arsenal47 Simardeep Singhautomated-scanningvulnerability-assessmentpentesting+3
2024-08-29Tool demoHitb Sec Conf Mantis Source Code Bharath Kumar, Akshay Jainvulnerability-managementasset-inventorydast+2
2024-05-09TalkRsac The Good, the Bad, and the Bounty: 10 Years of Buying Bugs at Microsoft Aanchal Guptavulnerability-managementbug-bountyrisk-management+1
2024-05-07TalkRsac A Proven Approach on Automated Security Architectural Pattern Validation Video Sunil Arorasecurity-architecturedevsecopsvulnerability-management+2
2023-09-28TalkHackinparis How to have visibility and security OF CICD ecosystem Pramod Ranacicd-securitydevsecopsvulnerability-management+6
2023-08-09TalkBlackhat Diversity Microtalks: Perspectives on Creating Change Presentation Aastha Sahnisecurity-awarenessrisk-managementsecurity-governance
2023-08-07TalkC0c0n Smart Contract Phishing : Attack & Defense Video Tejaswa Rastogismart-contractsblockchain-securityphishing+3
2023-08-07TalkC0c0n Citizen Mobile Security: Responsibilities, Accountability, and Impacts Satyendra Vermamobile-securitysecurity-awarenessrisk-management+1
2023-08-07TalkC0c0n ESOC Trinetra Project Pankaj Kumar Dalelasecurity-governancerisk-managementvulnerability-management+1
2023-08-07TalkC0c0n Generative AI and Cyber Crimes Video Brijesh Singhmalwaresecurity-awarenessrisk-management+2
2023-08-06TalkC0c0n Developments in Deep Fake detection Tapas Sainisecurity-architecturesecurity-awarenessreverse-engineering+1
2023-08-06TalkC0c0n Insider Threats - Best Practices and Common Pitfalls Video Georgie Kurieninsider-threatsrisk-managementsecurity-awareness+1
2023-08-06TalkC0c0n Digital Innovation and its Impact on CIOs, CISOs and DPOs Navaneethan Mcompliancegovernancerisk-management+4
2023-08-06TalkC0c0n Influence of Artificial Intelligence in GRC Space Mahesh Kalyanaramangovernancerisk-managementcompliance+3
2023-05-12TalkBlackhat Engaging the Next Generation of Cybersecurity Professionals: The Power of Security Zines Video Rohit Sehgaldigital_learning
2023-04-26TalkRsac Designing Product Security for a Brighter Smile and a Healthier Tomorrow Presentation Video Lokesh Pidawekarsecure-developmentdevsecopssoftware-security+2
2023-04-26TalkRsac Is Increasing Security Maturity And Decreasing Operational Load Possible? Rohit DhamankarAutomationrisk-managementsecurity-architecture+2
2023-04-21TalkHitb Sec Conf LOCKNOTE:THE HAND THAT STRIKES, ALSO BLOCKS Presentation Video Saumil Shahsecurity-architecturerisk-managementsecurity-awareness+2
2022-09-24TalkC0c0n Power of Narratives in Cyber Security Sunil Varkeysecurity-awarenesscybersecurity-educationhuman-factor+2
2022-09-24TalkC0c0n BEC, still the sure shot trap Georgie Kuriensocial-engineeringpentestingsecurity-awareness+1
2022-09-24TalkC0c0n Building Smart, Resilient and Sustainable Cyber Eco System Navin Kumar Singhrisk-managementcybersecurity-strategiessecurity-architecture+4
2022-09-24TalkC0c0n OSINT Tools and Techniques Brijesh Singhthreat-huntingintelligence-sharingsecurity-awareness+1
2022-09-24TalkC0c0n Weaponising Social Media for Psychological Operations A a Gafoorsocial-engineeringsecurity-awarenessthreat-hunting+1
2022-09-24TalkC0c0n Cyber Defence and Role of private players - public private partnership Jasbir Singh Solankisecurity-governancerisk-managementcompliance+2
2022-09-24TalkC0c0n In production with GRC for cloud Mahesh Kalyanaramancloud-compliancegovernancerisk-management+2
2022-09-24TalkC0c0n Rationalizing Cyber Security Risk in Risk Language Anish Koshyrisk-managementgovernancecybersecurity-strategies+4
2022-09-23TalkC0c0n Building a Safer and Innovative Digital Ecosystem Vijay Pamarathisecure-developmentdevsecopssoftware-security+2
2022-09-23TalkC0c0n Technological Reliance for Resilience Tulika Pandeyrisk-managementcyber-resiliencesecurity-architecture+2
2022-08-25TalkHitb Sec Conf Building An Army Of Bots By Hijacking A Unicorn’s Twitter Handle Presentation Rahul Sasi, Vishal Singhsocial-engineeringpentestingmalware+2
2022-08-11TalkThe Diana Initiative Connecting Dots Between Security Teams & Customer Expectations Shruthi Kamathsecurity-governancerisk-managementsecurity-architecture+2
2022-08-11TalkThe Diana Initiative The Real Cost of Free: What you need to know before downloading a free app Ruchira Pokhriyalmobile-securityapp-securityprivacy+3
2022-07-23TalkMay Contain Hackers How would a real life social media be like? Aditi Bhatnagarprivacydata-protectionsecurity-awareness+4
2021-11-13TalkC0c0n Connecting the dots between customers and security teams Shruthi Kamathincident-responsesecurity-awarenessdevsecops+1
2021-11-13TalkC0c0n Crisis Capitalization in a Pandemic Greeshma M Rrisk-managementincident-responsesecurity-awareness+3
2021-11-13TalkC0c0n Cybersecurity in the era of Resilience - A walk through people, process and technology Babitha B Prisk-managementcyber-resiliencesecurity-architecture+3
2021-11-13TalkC0c0n Post pandemic Transformation - A CISO’s perspective Sridhar Govardhanrisk-managementsecurity-governancecompliance+4
2021-11-13TalkC0c0n Changing Cyber Security Paradigm & Cyber Tsunami Sunil Varkeycybersecurity-strategiesthreat-landscaperisk-management+4
2021-11-13TalkC0c0n Need for Zero Trust in Banking Biju Kzero-trustrisk-managementsecurity-architecture+1
2021-11-12TalkC0c0n The evolving nature of cyber community Aastha Sahnisecurity-awarenessrisk-managementcybersecurity-education
2021-11-12TalkC0c0n Understanding the Psychology Behind Threats - adding Twists to your Turns Saman Fatimathreat_modelingsecurity-awarenesshuman-factor+1
2021-11-12TalkC0c0n “Let’s Go Phishing”: Discerning the insidious nature of Social Engineering Ruchira Pokhriyal, Shashi Karhailsocial-engineeringpentestingsecurity-awareness
2021-11-12TalkC0c0n Executive Presence….a cardinal of the cyber rostrum Bishakha Jainsecurity-awarenesssecurity-architecturesecurity-governance
2021-11-12TalkC0c0n Regulating Social Media Platforms : Should it be done in Democratic Societies ? J Sam Daniel Stalin, Apar Gupta, Dinesh O Bareja, Prashant Mali, Jiten Jaincompliancegovernancerisk-management+4
2021-11-12TalkC0c0n Enterprise Governance and Risk Management Arathy Nair, Muskan Manglacompliancegovernancerisk-management+2
2021-11-12TalkC0c0n Post Covid CISOs - Disappearing trusted boundaries and Innovative CyberSecurity Approaches Illyas Kooliyankalrisk-managementsecurity-architecturesecurity-governance+1
2021-08-06TalkDefcon Adversary village Kick-off Video Abhijith B Rred-teamingethical-hackingvulnerability-assessment+2
2020-11-21TalkApp Sec Indonesia The caveats of the unseen: Crouching exposure, Hidden Misconfiguration Ashwin Vamshivulnerability-managementsecurity-architecturedevsecops+2
2020-10-02Tool demoBlackhat Phishing Simulation Assessment Source Code Jyoti Ravalphishinginfrastructureblueteam
2020-09-18TalkC0c0n Introducing SniperPhish: A Web-Email Spear Phishing Toolkit Source Code Video Sreehari Haridas, Gem Georgephishing
2020-09-18TalkC0c0n Herd Immunity, in the Cyber World Sunil Varkeysecurity-awarenessrisk-managementvulnerability-management+1
2020-09-18TalkC0c0n Cyber Security Shifts During COVID-19 Video Sunil Kanchirisk-managementsecurity-awarenesscompliance-governance+1
2020-09-18TalkC0c0n Coping with Digital Transformation - A CISO perspective Video Maya R Nairrisk-managementsecurity-governancesecurity-architecture+3
2020-09-18TalkC0c0n Demystifying Zero Trust - A Real world Video Sandeep Variyamzero-trustsecurity-architecturesecurity-governance+1
2020-08-22TalkThe Diana Initiative Deploying discreet infrastructure for targeted phishing campaigns Sreehari Haridasphishing
2020-08-21TalkThe Diana Initiative Trust, No Trust or Zero Trust - Myth Demystifying Vandana Verma Sehgalzero-trustsecurity-architecturecompliance+2
2020-08-06TalkBlackhat How I Created My Clone Using AI - Next-Gen Social Engineering Presentation Video Tamaghna Basuaiclonesocial-engineering+1
2020-03-06Tool demoNullcon Phishing Simulation Source Code Jyoti Ravalphishinginfrastructureblueteam
2019-11-10TalkToor Con Hot Tub Island Jatin Katariaethical-hackingsecurity-awareness
2019-09-27TalkC0c0n A Day in the Life of a CISO Sridhar Govardhancompliancegovernancerisk-management+3
2019-09-27TalkC0c0n Practical Approach to Cyber Security for financial institutions Georgie Kurienfinancial-institutionssecure-developmentrisk-management+2
2019-09-27TalkC0c0n CISO Mind Set Lopa Mudraa Basuurisk-managementsecurity-governancecompliance+2
2019-08-08TalkDefcon Phishing in the cloud era Presentation Ashwin Vamshi, Abhinav Singhphishingapi-securityweb-security+2
2018-10-05TalkC0c0n Resiliency Focus alongside Digital Disruption Lince Lawrencesecurity-architecturerisk-managementsecurity-awareness+2
2018-10-05TalkC0c0n Taking cyber security to the board room Amit Pradhanrisk-managementcompliancegovernance+3
2018-10-05TalkC0c0n Adaptive GRC Mahesh Kalyanaramancompliancegovernancerisk-management+1
2018-10-05TalkC0c0n Blockchains as techno-power structures: towards emergence of P2P Politics Sunil Aggarwalblockchain-securitydecentralized-systemsdecentralised-security+2
2018-10-05TalkC0c0n Future of Mobility & Cyber Security Suja Chandyautomotive-cybersecurityindustrial-control-systems-securitysecurity-architecture+2
2018-03-01TalkNullcon SpotPhish: Zero-Hour Phishing Protection Source Code Video Ganesh Varadarajanopensourcephishingbrowser+2
2017-08-19TalkC0c0n The Public Private Partnership - Navigating the Govt Saikat Dattacompliancegovernancerisk-management+3
2017-08-19TalkC0c0n Trust, the foundation of Digital Mastery Sunil Varkeyidentity-managementauthenticationrisk-management+2
2017-08-18TalkC0c0n Sleep, Screen and Teenagers Natishia Rebecca Chandy, Pulkit Deepak Khatrisecurity-awarenesshuman-factorbehavioral-change+1
2017-08-18TalkC0c0n Do Students really require Smartphones Pranav a Menonsecurity-awarenesscybersecurity-educationhuman-factor
2017-08-18TalkC0c0n Internet Addiction and Children Teena Josesecurity-awarenesscybersecurity-educationhuman-factor
2017-08-18TalkC0c0n Moving from Cybersecurity Awareness to Cybersecurity Competence Anup Narayanancybersecurity-educationcybersecurity-trainingsecurity-awareness+3
2017-08-18TalkC0c0n Social Media and You Parry Aftabsecurity-awarenesssocial-engineeringhuman-factor+1
2017-08-18TalkC0c0n Technology-The New Frontier in Teaching Bindu Monydigital_learning
2017-08-18TalkC0c0n The need for Teachers to cope with Technology Shibi Ananddigital_learning
2017-08-18TalkC0c0n The Role of Teachers in Digital Era Nisha Prayandigital_learning
2017-08-18TalkC0c0n Identity Theft Devika a V, Meera Pidentity_theft
2017-08-18TalkC0c0n Phishing threats to customers and mitigation Bhavin Bhansaliphishing
2017-08-18TalkC0c0n Call Centre Frauds Parry Aftabsocial-engineeringsecurity-awarenessrisk-management+1
2017-08-18TalkC0c0n Challenges in Digital Banking Biju Ksecurity-awarenesssecurity-governancerisk-management
2017-08-18TalkC0c0n Cyber bullying-Screen the Mean Nitin Awade, Surjata Awadesecurity-awarenessincident-responsedigital-forensics
2017-08-18TalkC0c0n Threats with online gaming and issues with games like Pokemon Riyaz Walikar, Akash Mahajansecurity-awarenessmobile-securityvulnerability-management+1
2017-03-03TalkNullcon Securing Critical National Infrastructure Video Shailendra Fuloria, R Sarangapani, Rahul Tongiacritical-infrastructureindustrial-control-systems-securityics-security+4
2015-09-24TalkApp Sec Usa Encouraging Diversity and Advancing Cybersecurity Education Shruthi Kamathcybersecurity-educationsecurity-awarenessrisk-management+1
2015-08-01TalkC0c0n S3curi7y at 36K feet Rugved Mehta, Gaurav Trivediawsazuregcp+3
2014-11-13TalkGround Zero Summit Identity theft and its impact on Cyber - Warfare Tarun Wigidentity_theft
2014-11-13TalkGround Zero Summit 9 Cell Cyber Diplomacy Alok Vijayantsecurity-architecturerisk-managementsecurity-governance
2014-11-13TalkGround Zero Summit Financial Integrity and Cyber Security Karnal Singhrisk-managementcompliancesecurity-governance
2014-11-13TalkGround Zero Summit Internet Governance Anjana Kovacsgovernancecompliancerisk-management+2
2014-08-07TalkBlackhat Lifecycle of a phone fraudster: Exposing fraud activity from reconnaissance to takeover using graph analysis and acoustical anomalies Presentation Whitepaper Video Vijay Balasubramaniyan, Raj Bandyopadhyaymobilereconnaissanceinfrastructure+2
2014-02-14TalkNullcon In air they wander, we exist to blow their cover!!! {Approaches to Evil Twin Detection from a normal user’s perspective} Presentation Video Rushikesh D Nandedkar, Amrita C Iyernetworkwifievil-twin-attack+2
2013-11-07TalkGround Zero Summit Approach to containing the outbreak of malicious information in online social networks Sriniketh Vijayaraghavanincident-responsesocial-engineering
2013-09-27TalkC0c0n Hello CISO! How to make end-users LIKE and FOLLOW “Brand Infosec”? Anup Narayanansecurity-awarenesscybersecurity-educationsecurity-governance+3
2013-09-13TalkGrrcon Matriux Leandros - An Open Source Penetration Testing and Forensic Distribution Prajwal Panchmahalkarpentestingforensicsdigital-forensics+2
2013-08-15TalkUsenix Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness Presentation Whitepaper Devdatta Akhaweweb-securitysecurity-awarenesssecurity-architecture+3
2012-12-01TalkClubhack The difference between the “Reality” and “Feeling” of Security: Information Security and the Human Being Presentation Video Thomas Kurian Ambattusecurity-awarenesshuman-factorrisk-management+2
2012-08-04TalkC0c0n Impact of cyber laws on various stakeholders Sagar Rahurkarcompliancegovernanceregulatory-compliance+2
2012-08-03TalkC0c0n A model to reduce information security risks due to human error Presentation Anup Narayanansecurity-awarenessbehavior-changerisk-management
2012-08-03TalkC0c0n The Weakest Link - Reinforcing the Human Element Sandeep Godbolesecurity-awarenesshuman-factorcybersecurity-education+4
2012-08-03TalkC0c0n Layer 8 Exploitation: A threat to National Security Aakash Goelsocial-engineeringpentestingsecurity-awareness+1
2012-03-15TalkC0c0n Integrated Dial 100 System for Law Enforcement Nandkumar Saravadesecurity-governancecompliance-governancesecurity-operations
2011-11-17TalkDeepsec Behavioral Security: 10 steps forward 5 steps backward Video Sourabh Satishsecurity-awarenessbehavioral-changerisk-management+2
2011-09-19TalkBrucon Step-by-Step for Software Security (that anyone can follow) Pravir Chandrasoftware-securitysecure-developmentdevsecops+4
2011-09-07TalkSecuritybyte Social Web & Privacy – An evolving world Bala Sathiamurthy, Aridaman Tripathiprivacydata-protectionapi-security+3
2011-09-06TalkSecuritybyte Security Threats on Social Networks Presentation Nithya Ramansocial-engineeringweb-securitysecurity-awareness+2
2011-03-15TalkNullcon Information Warfare Ñ The Indian Perspective Alok Vijayantcybersecurity-strategyrisk-managementsecurity-awareness+1
2011-02-25TalkNullcon Hacking the Parliament – A classic Social Engineering attack Anurag Dhandasocial-engineeringreconnaissance
2010-11-25TalkDeepsec Developers are from Mars, Compliance Auditors are from Venus Video Neelay S Shahcompliancegovernancerisk-management+4
2010-08-01TalkC0c0n Hackers’ EcoSystem in India Rohit Srivastwapentestingsecurity-awarenessrisk-management+1
2010-02-25TalkNullcon Imposter ke karnamey: The Browser Phishing Tool. Lavakumar Kuppanwebphishingredteam
2009-11-17TalkSecuritybyte Usability and Privacy in Security Presentation Ponnurangam Kumaraguruprivacydata-protectionsecurity-architecture+3
2009-11-17TalkSecuritybyte Business Case-Risk Management/Compliance at AMITY Js Sodhicompliancegovernancerisk-management+3
2009-11-17TalkSecuritybyte Business Continuity Case Study Venkataram Arabolubusiness-continuityrisk-managementbusiness-resilience+3
2009-10-07TalkHitb Sec Conf How to Own the World – One Desktop at a Time Presentation Video Saumil Shahwebsocial-engineeringredteam+1
2009-08-06TalkC0c0n Cyber Victimisation K Jaishankarcybersecurity-educationsecurity-awarenessrisk-management+2
2009-08-06TalkC0c0n Information Warfare A a Gafoor, Vinayak Mishrathreat-huntingthreat_modelingsecurity-awareness+2
2009-08-02TalkDefcon Wi-Fish Finder: Who Will Bite the Bait Presentation Video Md Sohail Ahmad, Prabhash Dhyaninetworkwifiinfrastructure+3
2008-08-06TalkBlackhat Bad Sushi: Beating Phishers at Their Own Game Presentation Video Nitesh Dhanjani, Billy Riosphishingblueteam
2007-08-02TalkBlackhat The Evolution Of Phishing To Organized Crime Video Rohyt Belanisocial-engineeringphishingthreat_modeling+2
1998-07-29TalkBlackhat Security as an enabler for new business opportunities - The Business Value of Security Karan Khannarisk-managementbusiness-continuitycyber-resilience+4