| 2025-12-11 | Tool demo | Blackhat |
ThreatShield – The Intelligent Way of Threat Modelling
| Satyam Nagpal, Sayooj B Kumar, Ashwin Shenoi | #threat-modeling#security-strategy#architecture+1 |
| 2025-08-07 | Tool demo | Blackhat |
Q-TIP (QR Code Threat Inspection Platform)
| Rushikesh D Nandedkar | #incident-management#web-security#architecture+1 |
| 2025-08-06 | Tool demo | Blackhat |
ROP ROCKET: Advanced Framework for Return-Oriented Programming
| Shiva Shashank, Bramwell Brizendine | #reverse-engineering#exploitation#security-assessment+2 |
| 2025-08-06 | Talk | Blackhat |
The 5G Titanic
| Altaf Shaik | #network-pentesting#network-architecture#architecture |
| 2025-08-06 | Tool demo | Blackhat |
ThreatShield - The Intelligent way of Threat Modelling
| Ashwin Shenoi, Satyam Nagpal, Sayooj B Kumar | #threat-modeling#architecture#devsecops+1 |
| 2025-04-30 | Talk | Rsac |
Got Supply Pain? A Real-World Approach to Supply Chain SDL
| Mohit Arora, Richard Tonry | #secure-development#devsecops#risk-management+4 |
| 2025-04-29 | Talk | Rsac |
RAG-NAROK: What Poorly-Built RAGs Can Do to Data Security
| Akash Mukherjee, Saurabh Shintre | #secure-development#devsecops#data-protection+1 |
| 2025-03-02 | Talk | Nullcon |
Cyber Security from Telco lens
| Sanjeev Dhallam | #network-architecture#network-hardening#network-monitoring+2 |
| 2025-03-02 | Talk | Nullcon |
eKYC Crisis: Securing the Lockers
| Kartik Lalan | #risk-management#architecture#data-leak+4 |
| 2025-03-02 | Talk | Nullcon |
Hidden in Plain Sight: Large-Scale Exposure of Orphaned Commits on Major Git Platforms
| Kumar Ashwin | #secure-coding#devsecops#architecture |
| 2025-03-02 | Panel | Nullcon |
Modernizing Security Architecture: Platforms or Best-of-Breed, What Works Best?
| Ketan Vyas, Prajal Kulkarni, Satyavathi Divadari, Srihari Kotni | #security-strategy#threat-modeling#zero-trust+3 |
| 2024-11-16 | Talk | C0c0n |
The subtle art of checkmating CISOs
| Sunil Varkey | #risk-management#architecture#security-governance+2 |
| 2024-11-15 | Talk | C0c0n |
CISO’s take on BYOAI
| Venugopal Parameswara | #risk-management#security-governance#security-compliance+3 |
| 2024-08-14 | Talk | Usenix |
Shesha: Multi-head Microarchitectural Leakage Discovery in new-generation Intel Processors
| Anirban Chakraborty, Nimish Mishra, Debdeep Mukhopadhyay | #reverse-engineering#architecture#security-assessment |
| 2024-05-07 | Talk | Rsac |
A Proven Approach on Automated Security Architectural Pattern Validation
| Sunil Arora, Parthasarathi Chakraborty | #architecture#devsecops#risk-management+1 |
| 2024-04-19 | Talk | Blackhat |
China’s Military Cyber Operations: Has the Strategic Support Force Come of Age?
| Pukhraj Singh | #ics-security#risk-management#architecture |
| 2024-04-19 | Talk | Blackhat |
Faults in Our Bus: Novel Bus Fault Attack to Break Trusted Execution Environments in Embedded Systems
| Anirban Chakraborty, Nimish Mishra, Debdeep Mukhopadhyay | #embedded-security#firmware-analysis#architecture+1 |
| 2024-04-18 | Tool demo | Blackhat |
Mantis - Asset Discovery at Scale
| Ankur Bhargava, Prateek Thakare, Saddam Hussain | #asset-inventory#architecture#devsecops+1 |
| 2024-03-21 | Talk | Cansecwest |
Rolling in the Dough: How Microsoft Identified and Remidiated a Baker’s Dozen of Security Threats in the Windows DNS Server
| Arif Hussain, George Hughey | #security-assessment#architecture#incident-management |
| 2023-11-17 | Talk | Deepsec |
Nostalgic Memory – Remembering All the Wins and Losses for Protecting Memory Corruption
| Shubham Dubey | #reverse-engineering#exploitation#architecture |
| 2023-09-28 | Talk | Hackinparis |
How to have visibility and security OF CICD ecosystem
| Pramod Rana | #cicd-security#devsecops#architecture+4 |
| 2023-08-12 | Talk | Defcon |
Getting More Bang for your Buck:Appsec on a Limited Budget
| Vandana Verma Sehgal, Viraj Gandhi | #secure-development#devsecops#risk-management+2 |
| 2023-08-07 | Talk | C0c0n |
Homomorphic Encryption - Myth to Reality
| Anish Koshy | #encryption#architecture#data-protection+1 |
| 2023-08-07 | Talk | C0c0n |
Trust Resiliency - A Lesson Learned from Russia Ukraine War
| Ajit Hatti | #incident-management#architecture#risk-management+1 |
| 2023-08-07 | Talk | C0c0n |
Uncovering Azure’s Silent Threats: A Story of Cloud Vulnerabilities
| Nitesh Surana | #azure#cloud-vulnerabilities#cloud-pentesting+1 |
| 2023-08-06 | Talk | C0c0n |
CBDC and future of Finance
| Sunil Raveendran | #digital-currency#decentralized-systems#compliance-governance+2 |
| 2023-08-06 | Talk | C0c0n |
Developments in Deep Fake detection
| Tapas Saini | #architecture#security-training#reverse-engineering |
| 2023-08-06 | Talk | C0c0n |
Expanding capability horizons : Homelabs and beyond
| Anant Shrivastava | #security-assessment#network-pentesting#architecture |
| 2023-08-06 | Talk | C0c0n |
Influence of Artificial Intelligence in GRC Space
| Mahesh Kalyanaraman | #security-governance#risk-management#security-compliance+2 |
| 2023-08-06 | Talk | C0c0n |
Subduing Adversaries with Information Superiority
| Antony K M | #threat-hunting#security-monitoring#threat-detection+2 |
| 2023-08-06 | Talk | C0c0n |
Survivability in the Cyber World
| Sunil Varkey | #incident-management#risk-management#architecture |
| 2023-08-06 | Talk | C0c0n |
The new way to be secure
| Sakshi Bhutani | #secure-development#devsecops#software-security+3 |
| 2023-04-26 | Talk | Rsac |
Designing Product Security for a Brighter Smile and a Healthier Tomorrow
| Lokesh Pidawekar, Apoorva Phadke | #secure-development#devsecops#software-security+2 |
| 2023-04-26 | Talk | Rsac |
Is Increasing Security Maturity And Decreasing Operational Load Possible?
| Rohit Dhamankar | #risk-management#architecture#security-governance+1 |
| 2023-04-21 | Talk | Hitbsecconf |
LOCKNOTE:THE HAND THAT STRIKES, ALSO BLOCKS
| Saumil Shah | #architecture#risk-management#security-training+1 |
| 2022-09-28 | Talk | Rootcon |
Gazing into the Crystal Ball - The Fog of Cyberwarfare Escalations
| Harshit Agrawal | #ics-security#architecture#risk-management |
| 2022-09-24 | Talk | C0c0n |
Building Smart, Resilient and Sustainable Cyber Eco System
| Navin Kumar Singh | #risk-management#cybersecurity-strategy#architecture+4 |
| 2022-09-24 | Talk | C0c0n |
Cyber Defence and Role of private players - public private partnership
| Jasbir Singh Solanki | #security-governance#risk-management#security-compliance+1 |
| 2022-09-24 | Talk | C0c0n |
Know Your Organization? : Mapping Entities in Google Workspace
| Manish Gupta, Yash Bharadwaj | #gcp#identity-management#access-management+1 |
| 2022-09-24 | Talk | C0c0n |
Web3 Security - Security in MetaVerse, and the new world of web3
| Rohit Srivastwa | #web3#decentralized-systems#smart-contracts+2 |
| 2022-09-23 | Talk | C0c0n |
Battle of 300 Crore - how they lost it and got most of it back
| Prashant Choudhary | #incident-management#risk-management#architecture |
| 2022-09-23 | Talk | C0c0n |
Bridging the gap between Security and Operations
| Sujay Rajashekar Gundagatti | #devsecops#architecture#threat-detection+2 |
| 2022-09-23 | Talk | C0c0n |
Building a Safer and Innovative Digital Ecosystem
| Vijay Pamarathi | #secure-development#devsecops#software-security+2 |
| 2022-09-23 | Talk | C0c0n |
Collaborative efforts for safe digital banking
| Biju K | #secure-development#risk-management#architecture |
| 2022-09-23 | Talk | C0c0n |
Cybersecurity for Manufacturing
| Santhosh Srinivasan | #ics-security#control-systems#critical-infrastructure+2 |
| 2022-09-23 | Talk | C0c0n |
Maximizing ROI on cyber security investments: Do you think Adversary Simulation OR Purple teaming holds the key?
| Abhijith B R | #risk-management#architecture#devsecops |
| 2022-09-23 | Talk | C0c0n |
Rolling out Central Bank Digital Currency - Technical Design Considerations
| Sunil Raveendran | #architecture#compliance-governance#risk-management+1 |
| 2022-09-23 | Talk | C0c0n |
Technological Reliance for Resilience
| Tulika Pandey | #risk-management#cyber-resilience#architecture+2 |
| 2022-08-14 | Talk | Defcon |
Tales from the trenches - why organizations struggle to get even the basics of OT asset visibility & detection right
| Vivek Ponnada | #ics-security#risk-management#architecture+1 |
| 2022-08-11 | Talk | Thedianainitiative |
Connecting Dots Between Security Teams & Customer Expectations
| Shruthi Kamath | #security-governance#risk-management#architecture+2 |
| 2021-11-13 | Talk | C0c0n |
Changing Cyber Security Paradigm & Cyber Tsunami
| Sunil Varkey | #cybersecurity-strategy#threat-landscape#risk-management+3 |
| 2021-11-13 | Talk | C0c0n |
Cyber Warfare & Securing Critical Infrastructures
| Faruk Kazi | #critical-infrastructure#ics-security#incident-management+1 |
| 2021-11-13 | Talk | C0c0n |
Cybersecurity in the era of Resilience - A walk through people, process and technology
| Babitha B P | #risk-management#cyber-resilience#architecture+3 |
| 2021-11-13 | Talk | C0c0n |
Enhancing An Multi-Factor Authentication (MFA) through Behavioural Biometrics
| Kiran Kumar Pg | #authentication#mfa#architecture |
| 2021-11-13 | Talk | C0c0n |
Introducing Free & Open Elastic Limitless XDR
| Ravindra Ramnani | #threat-detection#security-monitoring#architecture |
| 2021-11-13 | Talk | C0c0n |
Need for Zero Trust in Banking
| Biju K | #zero-trust#risk-management#architecture+1 |
| 2021-11-13 | Talk | C0c0n |
Post pandemic Transformation - A CISO’s perspective
| Sridhar Govardhan | #risk-management#security-governance#security-compliance+3 |
| 2021-11-13 | Talk | C0c0n |
Zero Trust & Micro-segmentation
| Suresh Menon | #segmentation#zero-trust#network-architecture+1 |
| 2021-11-12 | Talk | C0c0n |
Enterprise Governance and Risk Management
| Arathy Nair, Muskan Mangla | #security-compliance#security-governance#risk-management+1 |
| 2021-11-12 | Talk | C0c0n |
Executive Presence….a cardinal of the cyber rostrum
| Bishakha Jain | #security-training#architecture#security-governance |
| 2021-11-12 | Talk | C0c0n |
Post Covid CISOs - Disappearing trusted boundaries and Innovative CyberSecurity Approaches
| Illyas Kooliyankal | #risk-management#architecture#security-governance+1 |
| 2021-11-12 | Talk | C0c0n |
Regulating Social Media Platforms : Should it be done in Democratic Societies ?
| J Sam Daniel Stalin, Apar Gupta, Dinesh O Bareja, Prashant Mali, Jiten Jain | #security-compliance#security-governance#risk-management+3 |
| 2021-10-13 | Talk | Rootcon |
The Kill Chain: Future of Cyber in Defense
| Harshit Agrawal | #architecture#ics-security#risk-management |
| 2021-08-26 | Talk | Hitbsecconf |
Gazing Ahead: What Modern RF Combat Looks Like in the Next Decade
| Harshit Agrawal | #ics-security#architecture#risk-management |
| 2021-08-07 | Talk | Defcon |
The Curious Case of Knowing the Unknown
| Vandana Verma Sehgal | #threat-hunting#threat-modeling#architecture+1 |
| 2021-08-06 | Talk | Defcon |
Defending IoT in the Future of High-Tech Warfare
| Harshit Agrawal | #iot-pentesting#architecture#ics-security |
| 2020-11-21 | Talk | Appsecindonesia |
The caveats of the unseen: Crouching exposure, Hidden Misconfiguration
| Ashwin Vamshi | #architecture#devsecops#risk-management+1 |
| 2020-09-18 | Talk | C0c0n |
Herd Immunity, in the Cyber World
| Sunil Varkey | #security-training#risk-management#architecture |
| 2020-09-18 | Talk | C0c0n |
Coping with Digital Transformation - A CISO perspective
| Maya R Nair | #risk-management#security-governance#architecture+2 |
| 2020-09-18 | Talk | C0c0n |
Demystifying Zero Trust - A Real world
| Sandeep Variyam | #zero-trust#architecture#security-governance+1 |
| 2020-08-21 | Talk | Thedianainitiative |
Trust, No Trust or Zero Trust - Myth Demystifying
| Vandana Verma Sehgal | #zero-trust#architecture#security-compliance+2 |
| 2019-11-09 | Talk | Toorcon |
100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans
| Jatin Kataria, Ang Cui | #reverse-engineering#hardware-reverse-engineering#architecture+2 |
| 2019-09-27 | Talk | C0c0n |
A Day in the Life of a CISO
| Sridhar Govardhan | #security-compliance#security-governance#risk-management+2 |
| 2019-09-27 | Talk | C0c0n |
CISO Mind Set
| Lopa Mudraa Basuu | #risk-management#security-governance#security-compliance+1 |
| 2019-09-27 | Talk | C0c0n |
Industry 4.0 - Security and Compliance
| Santhosh Srinivasan | #ics-security#security-compliance#security-governance+2 |
| 2019-09-27 | Talk | C0c0n |
Looking a decade ahead: Big data, drones , Robots and cyber security.
| Rahul Sasi | #ics-security#architecture#ai-security+2 |
| 2019-09-27 | Talk | C0c0n |
Security @scale for startups
| Shivanath Somanathan | #devsecops#secure-development#software-security+2 |
| 2019-08-09 | Talk | Defcon |
100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans
| Jatin Kataria, Rick Housley, Ang Cui | #reverse-engineering#architecture#hardware-reverse-engineering+1 |
| 2019-08-08 | Talk | Defcon |
Anatomy of cloud hacking
| Pratik Shah | #cloud-pentesting#post-exploitation#architecture+1 |
| 2018-11-27 | Talk | Hitbsecconf |
COMMSEC: Taking Over Telecom Networks
| Hardik Mehta, Loay Hassan Abdelrazek | #architecture#red-teaming#ss7+2 |
| 2018-10-05 | Talk | C0c0n |
Blockchains as techno-power structures: towards emergence of P2P Politics
| Sunil Aggarwal | #decentralized-systems#decentralised-security#architecture+1 |
| 2018-10-05 | Talk | C0c0n |
Cybersecurity Embedded Digital Transformation - The Future
| Sunil Kanchi | #embedded-security#architecture#ics-security |
| 2018-10-05 | Talk | C0c0n |
Digital Innovation revolution in Kerala Government
| Sunil Varkey | #cybersecurity-strategy#architecture#risk-management+2 |
| 2018-10-05 | Talk | C0c0n |
Future of Mobility & Cyber Security
| Suja Chandy | #automotive-cybersecurity#ics-security#architecture+2 |
| 2018-10-05 | Talk | C0c0n |
Resiliency Focus alongside Digital Disruption
| Lince Lawrence | #architecture#risk-management#security-training+2 |
| 2018-10-05 | Talk | C0c0n |
Taking cyber security to the board room
| Amit Pradhan | #risk-management#security-compliance#security-governance+2 |
| 2018-10-05 | Talk | C0c0n |
Will Artificial Intelligence And Machine Learning Bring More Threats On Cyber Security?
| Roshy John | #risk-management#architecture#ai-security+2 |
| 2018-10-04 | Talk | Brucon |
Disrupting the Kill Chain
| Vineet Bhatia | #incident-management#architecture#windows+3 |
| 2018-08-16 | Talk | Usenix |
Chipmunk or Pepe? Using Acoustical Analysis to Detect Voice-Channel Fraud at Scale
| Vijay Balasubramaniyan | #threat-detection#architecture#machine-learning+1 |
| 2018-08-16 | Talk | Usenix |
Man-in-the-Machine: Exploiting Ill-Secured Communication Inside the Computer
| Siddharth Rao, Thanh Bui, Markku Antikainen, Viswanathan Manihatty Bojan, Tuomas Aura | #security-assessment#architecture#application-hardening+4 |
| 2018-08-09 | Talk | Defcon |
Anonymous rate-limiting in services with Direct Anonymous Attestation
| Konark Modi, Alex Catarineu | #data-protection#architecture#security-strategy+1 |
| 2018-06-27 | Talk | First |
Securing your in-ear fitness coach: Challenges in hardening next generation wearables
| Sumanth Naropanth, Sunil Kumar | #secure-development#architecture#devsecops |
| 2018-03-13 | Talk | Troopers |
Securing your in-ear fitness coach: Challenges in hardening next generation wearables
| Sumanth Naropanth, Kavya Racharla | #secure-development#data-protection#architecture |
| 2017-08-19 | Talk | C0c0n |
Building Trust for Digital Transactions in India’s COD Culture
| Parry Aftab, Betsy Broder, Sridhara R Sidhu, Mirza Faizan | #secure-development#risk-management#architecture |
| 2017-08-19 | Talk | C0c0n |
Trust, the foundation of Digital Mastery
| Sunil Varkey | #identity-management#authentication#risk-management+2 |
| 2017-08-18 | Talk | C0c0n |
Dynamic Binary Instrumentation
| Vivek Arora, Bhaskar Rastogi | #dynamic-analysis#reverse-engineering#binary-analysis+1 |
| 2017-08-18 | Talk | C0c0n |
Moving from Cybersecurity Awareness to Cybersecurity Competence
| Anup Narayanan | #cybersecurity-education#cybersecurity-training#security-training+3 |
| 2017-08-04 | Talk | Sha |
Attacking OpenSSL using Side-channel Attacks: The RSA case study
| Praveen Vadnala, Lukasz Chmielewski | #reverse-engineering#architecture#embedded-security |
| 2017-03-03 | Talk | Nullcon |
Breach Response - Time to shake up the status quo
| K K Mookhey, Pranesh Prakash, Sahir Hidayatullah, Shobha Jagathpal | #incident-management#risk-management#architecture+1 |
| 2017-03-03 | Talk | Nullcon |
Securing Critical National Infrastructure
| Shailendra Fuloria, R Sarangapani, Rahul Tongia, Michael Pyle, Justin Searle | #critical-infrastructure#ics-security#risk-management+3 |
| 2017-01-25 | Talk | Owaspappseccalifornia |
OCSP Stapling in the Wild
| Devdatta Akhawe, Emily Stark | #web-security#architecture#devsecops |
| 2016-08-19 | Talk | C0c0n |
Kill the password - A new era of authentication
| Tamaghna Basu | #authentication#iam#architecture+1 |
| 2016-08-07 | Talk | Defcon |
Cyber Grand Shellphish
| Aravind Machiry, Yan Shoshitaishvili, Antonio Bianchi, Kevin Borgolte, Jacopo Corbetta, Francensco Disperati, Andrew Dutcher, Giovanni Vigna, Chris Salls, Nick Stephens, Fish Wang, John Grosen | #automated-exploit-detection#reverse-engineering#vulnerability-assessment+1 |
| 2016-03-15 | Talk | Groundzerosummit |
r00tKidz and Hacking
| Triveni Singh, Lea Paul | #security-assessment#ethical-hacking#privilege-escalation+2 |
| 2015-11-05 | Talk | Groundzerosummit |
Western Air Command
| B S Singh Deo | #network-defense#network-monitoring#network-pentesting+3 |
| 2015-09-24 | Talk | Appsecusa |
Continuous Cloud Security Automation
| Rohit Pitke | #aws#devsecops#architecture |
| 2015-08-07 | Talk | Defcon |
Getting into the Trust Store We Trust
| Ajit Hatti | #reverse-engineering#architecture#security-strategy |
| 2015-08-01 | Talk | C0c0n |
S3curi7y at 36K feet
| Rugved Mehta, Gaurav Trivedi | #aws#azure#gcp+3 |
| 2015-01-27 | Talk | Owaspappseccalifornia |
Anatomy of memory scraping, credit card stealing POS malware
| Amol Sarwate | #reverse-engineering#incident-management#architecture |
| 2014-11-13 | Talk | Groundzerosummit |
9 Cell Cyber Diplomacy
| Alok Vijayant | #architecture#risk-management#security-governance |
| 2013-11-20 | Talk | Appsecusa |
Project Talk: OWASP OpenSAMM Project
| Pravir Chandra, Seba Deleersnyder | #software-security#secure-development#devsecops+4 |
| 2013-09-27 | Talk | C0c0n |
ARM, Thumb and the Finger
| Aseem Jakhar | #reverse-engineering#binary-analysis#assembly-analysis+2 |
| 2013-09-27 | Talk | C0c0n |
From Bedroom to Boardroom - Taking your Weekend Infosec Project Global
| Vivek Ramachandran | #devsecops#secure-development#security-assessment+2 |
| 2013-08-16 | Talk | Usenix |
Building Securable Infrastructure: Open-Source Private Clouds
| Pravir Chandra | #cloud-pentesting#architecture#open-source-security |
| 2013-08-15 | Talk | Usenix |
Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness
| Devdatta Akhawe, Adrienne Felt | #web-security#security-training#architecture+2 |
| 2013-08-15 | Talk | Usenix |
An Empirical Study of Vulnerability Rewards Programs
| Devdatta Akhawe, David Wagner, Matthew Finifter | #bug-bounty#software-security#risk-management+2 |
| 2012-12-01 | Talk | Clubhack |
The difference between the “Reality” and “Feeling” of Security: Information Security and the Human Being
| Thomas Kurian Ambattu | #security-training#human-factor#risk-management+2 |
| 2012-10-26 | Talk | Appsecusa |
The 7 Qualities of Highly Secure Software
| Mano Paul | #secure-development#software-security#secure-coding+3 |
| 2012-08-03 | Talk | C0c0n |
Business Continuity and Risk Management in Turbulent Times
| Venkataram Arabolu | #risk-management#business-continuity#security-compliance+2 |
| 2012-08-03 | Talk | C0c0n |
The Weakest Link - Reinforcing the Human Element
| Sandeep Godbole | #security-training#human-factor#cybersecurity-education+3 |
| 2011-11-17 | Talk | Deepsec |
Behavioral Security: 10 steps forward 5 steps backward
| Sourabh Satish | #security-training#behavioral-change#risk-management+2 |
| 2011-09-07 | Talk | Securitybyte |
Social Web & Privacy – An evolving world
| Bala Sathiamurthy, Aridaman Tripathi | #data-protection#api-security#security-compliance+2 |
| 2011-09-06 | Talk | Securitybyte |
Enabling Un-trusted Mashups
| Bishan Singh | #web-security#xss#csrf+4 |
| 2009-11-17 | Talk | Securitybyte |
Business Continuity Case Study
| Venkataram Arabolu | #business-continuity#risk-management#business-resilience+3 |
| 2009-11-17 | Talk | Securitybyte |
Usability and Privacy in Security
| Ponnurangam Kumaraguru | #data-protection#architecture#security-training+2 |
| 2009-08-06 | Talk | C0c0n |
Information Warfare
| A a Gafoor, Vinayak Mishra | #threat-hunting#threat-modeling#security-training+2 |
| 2005-07-28 | Talk | Blackhat |
Rapid Threat Modeling
| Akshay Aggarwal | #threat-modeling#red-teaming#security-strategy+4 |
| 1998-07-29 | Talk | Blackhat |
Security as an enabler for new business opportunities - The Business Value of Security
| Karan Khanna | #risk-management#business-continuity#cyber-resilience+3 |