🧪 Experimental Feature

Focus Areas are an experimental feature that groups related content by tags. This page and its functionality may change as we refine the categorization system.

Security Governance

Security governance and related activities

122
Total Entries
118
Contributors
89
Unique Tags
73
Related Tags

Top Contributors

Sunil Varkey(6) Anup Narayanan(3) Georgie Kurien(3) Mahesh Kalyanaraman(3) Shruthi Kamath(3)

Related Tags (10)


All Entries (122 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-08-07Tool demoBlackhat Q-TIP (QR Code Threat Inspection Platform) Rushikesh D Nandedkarincident-responseweb-securityvulnerability-management+2
2025-04-29TalkRsac It’s Always Risky in IT: Frontline Stories and Strategic Insights Rohit Bansalrisk-managementsecurity-architecturesecurity-awareness+2
2024-11-28TalkBlackhat Time to Redefine Cybersecurity - Adding T - Trust as new Tenant to “CIA” and make it “I-ACT Lalit Ahluwaliarisk-managementsecurity-architecturesecurity-governance+1
2024-11-27TalkBlackhat The Future of Cybersecurity: Addressing New Threats with Groundbreaking Strategies Mahesh Babu Kanigiririsk-managementvulnerability-managementsecurity-architecture+2
2024-11-26TalkBlackhat The Double Edge Sword - Cybersecurity & AI Karmendra Kohlisecurity-architecturerisk-managementdevsecops+1
2024-11-16TalkC0c0n The subtle art of checkmating CISOs Sunil Varkeyrisk-managementsecurity-architecturesecurity-governance+3
2024-11-15TalkC0c0n CISO’s take on BYOAI Venugopal Parameswararisk-managementsecurity-governancecompliance+4
2024-10-23Tool demoBlackhat Cyber Arsenal47 Simardeep Singhautomated-scanningvulnerability-assessmentpentesting+3
2024-08-29Tool demoHitb Sec Conf Mantis Source Code Bharath Kumar, Akshay Jainvulnerability-managementasset-inventorydast+2
2024-05-09TalkRsac The Good, the Bad, and the Bounty: 10 Years of Buying Bugs at Microsoft Aanchal Guptavulnerability-managementbug-bountyrisk-management+1
2024-05-07TalkRsac A Proven Approach on Automated Security Architectural Pattern Validation Video Sunil Arorasecurity-architecturedevsecopsvulnerability-management+2
2024-05-06TalkRsac Headspace’s Privacy Operations Center and Vault Shobhit Mehtaprivacydata-protectionsecurity-operations-center+2
2024-04-18Tool demoBlackhat Mantis - Asset Discovery at Scale Source Code Ankur Bhargava, Prateek Thakare, Saddam Hussainasset-inventoryvulnerability-managementsecurity-architecture+3
2023-09-28TalkHackinparis How to have visibility and security OF CICD ecosystem Pramod Ranacicd-securitydevsecopsvulnerability-management+6
2023-08-09TalkBlackhat Diversity Microtalks: Perspectives on Creating Change Presentation Aastha Sahnisecurity-awarenessrisk-managementsecurity-governance
2023-08-07TalkC0c0n The DPDPA Effect: Jubilation, Twinge and Reticence that followed Video Rahul Sharmacompliancegovernancedata-protection+2
2023-08-07TalkC0c0n ESOC Trinetra Project Pankaj Kumar Dalelasecurity-governancerisk-managementvulnerability-management+1
2023-08-07TalkC0c0n Citizen Mobile Security: Responsibilities, Accountability, and Impacts Satyendra Vermamobile-securitysecurity-awarenessrisk-management+1
2023-08-07TalkC0c0n Generative AI and Cyber Crimes Video Brijesh Singhmalwaresecurity-awarenessrisk-management+2
2023-08-06TalkC0c0n Cybercrimes Victim Compensation : Legal Remedies and Process Nisheeth Dixitcompliancegovernancerisk-management+1
2023-08-06TalkC0c0n Digital Innovation and its Impact on CIOs, CISOs and DPOs Navaneethan Mcompliancegovernancerisk-management+4
2023-08-06TalkC0c0n Influence of Artificial Intelligence in GRC Space Mahesh Kalyanaramangovernancerisk-managementcompliance+3
2023-08-06TalkC0c0n Developments in Deep Fake detection Tapas Sainisecurity-architecturesecurity-awarenessreverse-engineering+1
2023-08-06TalkC0c0n Insider Threats - Best Practices and Common Pitfalls Video Georgie Kurieninsider-threatsrisk-managementsecurity-awareness+1
2023-04-26TalkRsac Designing Product Security for a Brighter Smile and a Healthier Tomorrow Presentation Video Lokesh Pidawekarsecure-developmentdevsecopssoftware-security+2
2023-04-26TalkRsac Is Increasing Security Maturity And Decreasing Operational Load Possible? Rohit DhamankarAutomationrisk-managementsecurity-architecture+2
2023-04-21TalkHitb Sec Conf LOCKNOTE:THE HAND THAT STRIKES, ALSO BLOCKS Presentation Video Saumil Shahsecurity-architecturerisk-managementsecurity-awareness+2
2022-09-24TalkC0c0n Cyber Defence and Role of private players - public private partnership Jasbir Singh Solankisecurity-governancerisk-managementcompliance+2
2022-09-24TalkC0c0n In production with GRC for cloud Mahesh Kalyanaramancloud-compliancegovernancerisk-management+2
2022-09-24TalkC0c0n Rationalizing Cyber Security Risk in Risk Language Anish Koshyrisk-managementgovernancecybersecurity-strategies+4
2022-09-24TalkC0c0n Building Smart, Resilient and Sustainable Cyber Eco System Navin Kumar Singhrisk-managementcybersecurity-strategiessecurity-architecture+4
2022-09-24TalkC0c0n Power of Narratives in Cyber Security Sunil Varkeysecurity-awarenesscybersecurity-educationhuman-factor+2
2022-09-24TalkC0c0n Need for Advanced SOC Vijayakumar K Msocsecurity-monitoringsecurity-analytics+3
2022-09-24TalkC0c0n BEC, still the sure shot trap Georgie Kuriensocial-engineeringpentestingsecurity-awareness+1
2022-09-24TalkC0c0n OSINT Tools and Techniques Brijesh Singhthreat-huntingintelligence-sharingsecurity-awareness+1
2022-09-24TalkC0c0n Weaponising Social Media for Psychological Operations A a Gafoorsocial-engineeringsecurity-awarenessthreat-hunting+1
2022-09-23TalkC0c0n Startup Ecosystem and Investments in Post Covid Era Sunil Kanchirisk-managementcompliancegovernance+2
2022-09-23TalkC0c0n Building a Safer and Innovative Digital Ecosystem Vijay Pamarathisecure-developmentdevsecopssoftware-security+2
2022-09-23TalkC0c0n Technological Reliance for Resilience Tulika Pandeyrisk-managementcyber-resiliencesecurity-architecture+2
2022-09-23TalkC0c0n Bridging the gap between Security and Operations Sujay Rajashekar Gundagattidevsecopssecurity-architecturethreat-detection+3
2022-08-25TalkHitb Sec Conf Building An Army Of Bots By Hijacking A Unicorn’s Twitter Handle Presentation Rahul Sasi, Vishal Singhsocial-engineeringpentestingmalware+2
2022-08-11TalkThe Diana Initiative Connecting Dots Between Security Teams & Customer Expectations Shruthi Kamathsecurity-governancerisk-managementsecurity-architecture+2
2022-08-11TalkThe Diana Initiative The Real Cost of Free: What you need to know before downloading a free app Ruchira Pokhriyalmobile-securityapp-securityprivacy+3
2022-07-23TalkMay Contain Hackers How would a real life social media be like? Aditi Bhatnagarprivacydata-protectionsecurity-awareness+4
2021-11-13TalkC0c0n Crisis Capitalization in a Pandemic Greeshma M Rrisk-managementincident-responsesecurity-awareness+3
2021-11-13TalkC0c0n Post pandemic Transformation - A CISO’s perspective Sridhar Govardhanrisk-managementsecurity-governancecompliance+4
2021-11-13TalkC0c0n Changing Cyber Security Paradigm & Cyber Tsunami Sunil Varkeycybersecurity-strategiesthreat-landscaperisk-management+4
2021-11-13TalkC0c0n Cybersecurity in the era of Resilience - A walk through people, process and technology Babitha B Prisk-managementcyber-resiliencesecurity-architecture+3
2021-11-13TalkC0c0n Need for Zero Trust in Banking Biju Kzero-trustrisk-managementsecurity-architecture+1
2021-11-13TalkC0c0n Machine learning to detect Chia mining Varun Kohlithreat-detectionthreat-huntingmalware-detection+2
2021-11-13TalkC0c0n Connecting the dots between customers and security teams Shruthi Kamathincident-responsesecurity-awarenessdevsecops+1
2021-11-12TalkC0c0n Enterprise Governance and Risk Management Arathy Nair, Muskan Manglacompliancegovernancerisk-management+2
2021-11-12TalkC0c0n Regulating Social Media Platforms : Should it be done in Democratic Societies ? J Sam Daniel Stalin, Apar Gupta, Dinesh O Bareja, Prashant Mali, Jiten Jaincompliancegovernancerisk-management+4
2021-11-12TalkC0c0n Executive Presence….a cardinal of the cyber rostrum Bishakha Jainsecurity-awarenesssecurity-architecturesecurity-governance
2021-11-12TalkC0c0n Post Covid CISOs - Disappearing trusted boundaries and Innovative CyberSecurity Approaches Illyas Kooliyankalrisk-managementsecurity-architecturesecurity-governance+1
2021-11-12TalkC0c0n “Let’s Go Phishing”: Discerning the insidious nature of Social Engineering Ruchira Pokhriyal, Shashi Karhailsocial-engineeringpentestingsecurity-awareness
2021-11-12TalkC0c0n The evolving nature of cyber community Aastha Sahnisecurity-awarenessrisk-managementcybersecurity-education
2021-11-12TalkC0c0n Understanding the Psychology Behind Threats - adding Twists to your Turns Saman Fatimathreat_modelingsecurity-awarenesshuman-factor+1
2021-08-06TalkDefcon Adversary village Kick-off Video Abhijith B Rred-teamingethical-hackingvulnerability-assessment+2
2020-11-21TalkApp Sec Indonesia The caveats of the unseen: Crouching exposure, Hidden Misconfiguration Ashwin Vamshivulnerability-managementsecurity-architecturedevsecops+2
2020-09-18TalkC0c0n Coping with Digital Transformation - A CISO perspective Video Maya R Nairrisk-managementsecurity-governancesecurity-architecture+3
2020-09-18TalkC0c0n Demystifying Zero Trust - A Real world Video Sandeep Variyamzero-trustsecurity-architecturesecurity-governance+1
2020-09-18TalkC0c0n Herd Immunity, in the Cyber World Sunil Varkeysecurity-awarenessrisk-managementvulnerability-management+1
2020-09-18TalkC0c0n Cyber Security Shifts During COVID-19 Video Sunil Kanchirisk-managementsecurity-awarenesscompliance-governance+1
2020-08-21TalkThe Diana Initiative Trust, No Trust or Zero Trust - Myth Demystifying Vandana Verma Sehgalzero-trustsecurity-architecturecompliance+2
2019-11-10TalkToor Con Hot Tub Island Jatin Katariaethical-hackingsecurity-awareness
2019-09-27TalkC0c0n A Day in the Life of a CISO Sridhar Govardhancompliancegovernancerisk-management+3
2019-09-27TalkC0c0n CISO Mind Set Lopa Mudraa Basuurisk-managementsecurity-governancecompliance+2
2019-09-27TalkC0c0n Industry 4.0 - Security and Compliance Santhosh Srinivasanindustrial-control-systems-securitycompliancegovernance+2
2019-09-27TalkC0c0n Practical Approach to Cyber Security for financial institutions Georgie Kurienfinancial-institutionssecure-developmentrisk-management+2
2019-08-08TalkDefcon Phishing in the cloud era Presentation Ashwin Vamshi, Abhinav Singhphishingapi-securityweb-security+2
2018-10-05TalkC0c0n Digital Innovation revolution in Kerala Government Sunil Varkeycybersecurity-strategysecurity-architecturerisk-management+2
2018-10-05TalkC0c0n Adaptive GRC Mahesh Kalyanaramancompliancegovernancerisk-management+1
2018-10-05TalkC0c0n Taking cyber security to the board room Amit Pradhanrisk-managementcompliancegovernance+3
2018-10-05TalkC0c0n Blockchains as techno-power structures: towards emergence of P2P Politics Sunil Aggarwalblockchain-securitydecentralized-systemsdecentralised-security+2
2018-10-05TalkC0c0n Future of Mobility & Cyber Security Suja Chandyautomotive-cybersecurityindustrial-control-systems-securitysecurity-architecture+2
2018-10-05TalkC0c0n Resiliency Focus alongside Digital Disruption Lince Lawrencesecurity-architecturerisk-managementsecurity-awareness+2
2018-08-10TalkDefcon Building visualisation platforms for OSINT data using open source solutions Video Bharath Kumar, Madhu Akulasecurity-analyticsthreat-hunting
2017-08-19TalkC0c0n The Public Private Partnership - Navigating the Govt Saikat Dattacompliancegovernancerisk-management+3
2017-08-19TalkC0c0n Trust, the foundation of Digital Mastery Sunil Varkeyidentity-managementauthenticationrisk-management+2
2017-08-18TalkC0c0n Challenges in Digital Banking Biju Ksecurity-awarenesssecurity-governancerisk-management
2017-08-18TalkC0c0n Moving from Cybersecurity Awareness to Cybersecurity Competence Anup Narayanancybersecurity-educationcybersecurity-trainingsecurity-awareness+3
2017-08-18TalkC0c0n Call Centre Frauds Parry Aftabsocial-engineeringsecurity-awarenessrisk-management+1
2017-08-18TalkC0c0n Cyber bullying-Screen the Mean Nitin Awade, Surjata Awadesecurity-awarenessincident-responsedigital-forensics
2017-08-18TalkC0c0n Do Students really require Smartphones Pranav a Menonsecurity-awarenesscybersecurity-educationhuman-factor
2017-08-18TalkC0c0n Internet Addiction and Children Teena Josesecurity-awarenesscybersecurity-educationhuman-factor
2017-08-18TalkC0c0n Sleep, Screen and Teenagers Natishia Rebecca Chandy, Pulkit Deepak Khatrisecurity-awarenesshuman-factorbehavioral-change+1
2017-08-18TalkC0c0n Social Media and You Parry Aftabsecurity-awarenesssocial-engineeringhuman-factor+1
2017-08-18TalkC0c0n Threats with online gaming and issues with games like Pokemon Riyaz Walikar, Akash Mahajansecurity-awarenessmobile-securityvulnerability-management+1
2017-03-03TalkNullcon Securing Critical National Infrastructure Video Shailendra Fuloria, R Sarangapani, Rahul Tongiacritical-infrastructureindustrial-control-systems-securityics-security+4
2015-09-24TalkApp Sec Usa Encouraging Diversity and Advancing Cybersecurity Education Shruthi Kamathcybersecurity-educationsecurity-awarenessrisk-management+1
2015-08-01TalkC0c0n S3curi7y at 36K feet Rugved Mehta, Gaurav Trivediawsazuregcp+3
2015-02-06TalkNullcon Building security and compliance into the software delivery process Anubhav Bathla, Dinesh Pillai, S Chandrasekharsecure-developmentdevsecopscompliance+3
2014-11-13TalkGround Zero Summit Internet Governance Anjana Kovacsgovernancecompliancerisk-management+2
2014-11-13TalkGround Zero Summit 9 Cell Cyber Diplomacy Alok Vijayantsecurity-architecturerisk-managementsecurity-governance
2014-11-13TalkGround Zero Summit Financial Integrity and Cyber Security Karnal Singhrisk-managementcompliancesecurity-governance
2013-11-20TalkApp Sec Usa Project Talk: OWASP OpenSAMM Project Pravir Chandrasoftware-securitysecure-developmentdevsecops+4
2013-09-27TalkC0c0n Hello CISO! How to make end-users LIKE and FOLLOW “Brand Infosec”? Anup Narayanansecurity-awarenesscybersecurity-educationsecurity-governance+3
2013-09-13TalkGrrcon Matriux Leandros - An Open Source Penetration Testing and Forensic Distribution Prajwal Panchmahalkarpentestingforensicsdigital-forensics+2
2013-08-15TalkUsenix Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness Presentation Whitepaper Devdatta Akhaweweb-securitysecurity-awarenesssecurity-architecture+3
2012-12-01TalkClubhack The difference between the “Reality” and “Feeling” of Security: Information Security and the Human Being Presentation Video Thomas Kurian Ambattusecurity-awarenesshuman-factorrisk-management+2
2012-08-04TalkC0c0n Impact of cyber laws on various stakeholders Sagar Rahurkarcompliancegovernanceregulatory-compliance+2
2012-08-03TalkC0c0n Business Continuity and Risk Management in Turbulent Times Venkataram Arabolurisk-managementbusiness-continuitycompliance+2
2012-08-03TalkC0c0n The Weakest Link - Reinforcing the Human Element Sandeep Godbolesecurity-awarenesshuman-factorcybersecurity-education+4
2012-08-03TalkC0c0n A model to reduce information security risks due to human error Presentation Anup Narayanansecurity-awarenessbehavior-changerisk-management
2012-08-03TalkC0c0n Layer 8 Exploitation: A threat to National Security Aakash Goelsocial-engineeringpentestingsecurity-awareness+1
2012-03-15TalkC0c0n Integrated Dial 100 System for Law Enforcement Nandkumar Saravadesecurity-governancecompliance-governancesecurity-operations
2011-11-17TalkDeepsec Behavioral Security: 10 steps forward 5 steps backward Video Sourabh Satishsecurity-awarenessbehavioral-changerisk-management+2
2011-09-19TalkBrucon Step-by-Step for Software Security (that anyone can follow) Pravir Chandrasoftware-securitysecure-developmentdevsecops+4
2011-09-07TalkSecuritybyte Social Web & Privacy – An evolving world Bala Sathiamurthy, Aridaman Tripathiprivacydata-protectionapi-security+3
2011-09-06TalkSecuritybyte Security Threats on Social Networks Presentation Nithya Ramansocial-engineeringweb-securitysecurity-awareness+2
2011-03-15TalkNullcon Information Warfare Ñ The Indian Perspective Alok Vijayantcybersecurity-strategyrisk-managementsecurity-awareness+1
2010-11-25TalkDeepsec Developers are from Mars, Compliance Auditors are from Venus Video Neelay S Shahcompliancegovernancerisk-management+4
2010-08-01TalkC0c0n Hackers’ EcoSystem in India Rohit Srivastwapentestingsecurity-awarenessrisk-management+1
2009-11-17TalkSecuritybyte Business Case-Risk Management/Compliance at AMITY Js Sodhicompliancegovernancerisk-management+3
2009-11-17TalkSecuritybyte Business Continuity Case Study Venkataram Arabolubusiness-continuityrisk-managementbusiness-resilience+3
2009-11-17TalkSecuritybyte Usability and Privacy in Security Presentation Ponnurangam Kumaraguruprivacydata-protectionsecurity-architecture+3
2009-08-06TalkC0c0n Information Security Audit Venkatapathy Subramaniamcompliancegovernanceaudit+2
2009-08-06TalkC0c0n Cyber Victimisation K Jaishankarcybersecurity-educationsecurity-awarenessrisk-management+2
2009-08-06TalkC0c0n Information Warfare A a Gafoor, Vinayak Mishrathreat-huntingthreat_modelingsecurity-awareness+2
2007-08-02TalkBlackhat The Evolution Of Phishing To Organized Crime Video Rohyt Belanisocial-engineeringphishingthreat_modeling+2
1998-07-29TalkBlackhat Security as an enabler for new business opportunities - The Business Value of Security Karan Khannarisk-managementbusiness-continuitycyber-resilience+4