🧪 Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Architecture

Focus Area: 🏗️ Security Architecture
128
Total Entries
133
Contributors

Top Contributors

Sunil Varkey(6) Harshit Agrawal(4) Devdatta Akhawe(3) Vandana Verma Sehgal(3) Ajit Hatti(2)

All Entries (128 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-12-11Tool demoBlackhat ThreatShield – The Intelligent Way of Threat Modelling Source Code Satyam Nagpal, Sayooj B Kumar, Ashwin Shenoi#threat-modeling#security-strategy#architecture+1
2025-08-07Tool demoBlackhat Q-TIP (QR Code Threat Inspection Platform) Rushikesh D Nandedkar#incident-management#web-security#architecture+1
2025-08-06Tool demoBlackhat ROP ROCKET: Advanced Framework for Return-Oriented Programming Source Code Shiva Shashank, Bramwell Brizendine#reverse-engineering#exploitation#security-assessment+2
2025-08-06TalkBlackhat The 5G Titanic Presentation Video Altaf Shaik#network-pentesting#network-architecture#architecture
2025-08-06Tool demoBlackhat ThreatShield - The Intelligent way of Threat Modelling Source Code Ashwin Shenoi, Satyam Nagpal, Sayooj B Kumar#threat-modeling#architecture#devsecops+1
2025-04-30TalkRsac Got Supply Pain? A Real-World Approach to Supply Chain SDL Video Mohit Arora, Richard Tonry#secure-development#devsecops#risk-management+4
2025-04-29TalkRsac RAG-NAROK: What Poorly-Built RAGs Can Do to Data Security Whitepaper Video Akash Mukherjee, Saurabh Shintre#secure-development#devsecops#data-protection+1
2025-03-02TalkNullcon Cyber Security from Telco lens Sanjeev Dhallam#network-architecture#network-hardening#network-monitoring+2
2025-03-02TalkNullcon eKYC Crisis: Securing the Lockers Video Kartik Lalan#risk-management#architecture#data-leak+4
2025-03-02TalkNullcon Hidden in Plain Sight: Large-Scale Exposure of Orphaned Commits on Major Git Platforms Presentation Video Kumar Ashwin#secure-coding#devsecops#architecture
2025-03-02PanelNullcon Modernizing Security Architecture: Platforms or Best-of-Breed, What Works Best? Ketan Vyas, Prajal Kulkarni, Satyavathi Divadari, Srihari Kotni#security-strategy#threat-modeling#zero-trust+3
2024-11-16TalkC0c0n The subtle art of checkmating CISOs Video Sunil Varkey#risk-management#architecture#security-governance+2
2024-11-15TalkC0c0n CISO’s take on BYOAI Video Venugopal Parameswara#risk-management#security-governance#security-compliance+3
2024-08-14TalkUsenix Shesha: Multi-head Microarchitectural Leakage Discovery in new-generation Intel Processors Presentation Whitepaper Video Anirban Chakraborty, Nimish Mishra, Debdeep Mukhopadhyay#reverse-engineering#architecture#security-assessment
2024-05-07TalkRsac A Proven Approach on Automated Security Architectural Pattern Validation Video Sunil Arora, Parthasarathi Chakraborty#architecture#devsecops#risk-management+1
2024-04-19TalkBlackhat China’s Military Cyber Operations: Has the Strategic Support Force Come of Age? Presentation Pukhraj Singh#ics-security#risk-management#architecture
2024-04-19TalkBlackhat Faults in Our Bus: Novel Bus Fault Attack to Break Trusted Execution Environments in Embedded Systems Presentation Anirban Chakraborty, Nimish Mishra, Debdeep Mukhopadhyay#embedded-security#firmware-analysis#architecture+1
2024-04-18Tool demoBlackhat Mantis - Asset Discovery at Scale Source Code Ankur Bhargava, Prateek Thakare, Saddam Hussain#asset-inventory#architecture#devsecops+1
2024-03-21TalkCansecwest Rolling in the Dough: How Microsoft Identified and Remidiated a Baker’s Dozen of Security Threats in the Windows DNS Server Video Arif Hussain, George Hughey#security-assessment#architecture#incident-management
2023-11-17TalkDeepsec Nostalgic Memory – Remembering All the Wins and Losses for Protecting Memory Corruption Presentation Shubham Dubey#reverse-engineering#exploitation#architecture
2023-09-28TalkHackinparis How to have visibility and security OF CICD ecosystem Pramod Rana#cicd-security#devsecops#architecture+4
2023-08-12TalkDefcon Getting More Bang for your Buck:Appsec on a Limited Budget Video Vandana Verma Sehgal, Viraj Gandhi#secure-development#devsecops#risk-management+2
2023-08-07TalkC0c0n Homomorphic Encryption - Myth to Reality Video Anish Koshy#encryption#architecture#data-protection+1
2023-08-07TalkC0c0n Trust Resiliency - A Lesson Learned from Russia Ukraine War Video Ajit Hatti#incident-management#architecture#risk-management+1
2023-08-07TalkC0c0n Uncovering Azure’s Silent Threats: A Story of Cloud Vulnerabilities Video Nitesh Surana#azure#cloud-vulnerabilities#cloud-pentesting+1
2023-08-06TalkC0c0n CBDC and future of Finance Video Sunil Raveendran#digital-currency#decentralized-systems#compliance-governance+2
2023-08-06TalkC0c0n Developments in Deep Fake detection Tapas Saini#architecture#security-training#reverse-engineering
2023-08-06TalkC0c0n Expanding capability horizons : Homelabs and beyond Video Anant Shrivastava#security-assessment#network-pentesting#architecture
2023-08-06TalkC0c0n Influence of Artificial Intelligence in GRC Space Mahesh Kalyanaraman#security-governance#risk-management#security-compliance+2
2023-08-06TalkC0c0n Subduing Adversaries with Information Superiority Video Antony K M#threat-hunting#security-monitoring#threat-detection+2
2023-08-06TalkC0c0n Survivability in the Cyber World Video Sunil Varkey#incident-management#risk-management#architecture
2023-08-06TalkC0c0n The new way to be secure Video Sakshi Bhutani#secure-development#devsecops#software-security+3
2023-04-26TalkRsac Designing Product Security for a Brighter Smile and a Healthier Tomorrow Presentation Video Lokesh Pidawekar, Apoorva Phadke#secure-development#devsecops#software-security+2
2023-04-26TalkRsac Is Increasing Security Maturity And Decreasing Operational Load Possible? Video Rohit Dhamankar#risk-management#architecture#security-governance+1
2023-04-21TalkHitbsecconf LOCKNOTE:THE HAND THAT STRIKES, ALSO BLOCKS Presentation Video Saumil Shah#architecture#risk-management#security-training+1
2022-09-28TalkRootcon Gazing into the Crystal Ball - The Fog of Cyberwarfare Escalations Harshit Agrawal#ics-security#architecture#risk-management
2022-09-24TalkC0c0n Building Smart, Resilient and Sustainable Cyber Eco System Navin Kumar Singh#risk-management#cybersecurity-strategy#architecture+4
2022-09-24TalkC0c0n Cyber Defence and Role of private players - public private partnership Jasbir Singh Solanki#security-governance#risk-management#security-compliance+1
2022-09-24TalkC0c0n Know Your Organization? : Mapping Entities in Google Workspace Manish Gupta, Yash Bharadwaj#gcp#identity-management#access-management+1
2022-09-24TalkC0c0n Web3 Security - Security in MetaVerse, and the new world of web3 Rohit Srivastwa#web3#decentralized-systems#smart-contracts+2
2022-09-23TalkC0c0n Battle of 300 Crore - how they lost it and got most of it back Prashant Choudhary#incident-management#risk-management#architecture
2022-09-23TalkC0c0n Bridging the gap between Security and Operations Sujay Rajashekar Gundagatti#devsecops#architecture#threat-detection+2
2022-09-23TalkC0c0n Building a Safer and Innovative Digital Ecosystem Vijay Pamarathi#secure-development#devsecops#software-security+2
2022-09-23TalkC0c0n Collaborative efforts for safe digital banking Biju K#secure-development#risk-management#architecture
2022-09-23TalkC0c0n Cybersecurity for Manufacturing Santhosh Srinivasan#ics-security#control-systems#critical-infrastructure+2
2022-09-23TalkC0c0n Maximizing ROI on cyber security investments: Do you think Adversary Simulation OR Purple teaming holds the key? Presentation Abhijith B R#risk-management#architecture#devsecops
2022-09-23TalkC0c0n Rolling out Central Bank Digital Currency - Technical Design Considerations Sunil Raveendran#architecture#compliance-governance#risk-management+1
2022-09-23TalkC0c0n Technological Reliance for Resilience Tulika Pandey#risk-management#cyber-resilience#architecture+2
2022-08-14TalkDefcon Tales from the trenches - why organizations struggle to get even the basics of OT asset visibility & detection right Vivek Ponnada#ics-security#risk-management#architecture+1
2022-08-11TalkThedianainitiative Connecting Dots Between Security Teams & Customer Expectations Video Shruthi Kamath#security-governance#risk-management#architecture+2
2021-11-13TalkC0c0n Changing Cyber Security Paradigm & Cyber Tsunami Sunil Varkey#cybersecurity-strategy#threat-landscape#risk-management+3
2021-11-13TalkC0c0n Cyber Warfare & Securing Critical Infrastructures Faruk Kazi#critical-infrastructure#ics-security#incident-management+1
2021-11-13TalkC0c0n Cybersecurity in the era of Resilience - A walk through people, process and technology Babitha B P#risk-management#cyber-resilience#architecture+3
2021-11-13TalkC0c0n Enhancing An Multi-Factor Authentication (MFA) through Behavioural Biometrics Kiran Kumar Pg#authentication#mfa#architecture
2021-11-13TalkC0c0n Introducing Free & Open Elastic Limitless XDR Ravindra Ramnani#threat-detection#security-monitoring#architecture
2021-11-13TalkC0c0n Need for Zero Trust in Banking Biju K#zero-trust#risk-management#architecture+1
2021-11-13TalkC0c0n Post pandemic Transformation - A CISO’s perspective Sridhar Govardhan#risk-management#security-governance#security-compliance+3
2021-11-13TalkC0c0n Zero Trust & Micro-segmentation Suresh Menon#segmentation#zero-trust#network-architecture+1
2021-11-12TalkC0c0n Enterprise Governance and Risk Management Arathy Nair, Muskan Mangla#security-compliance#security-governance#risk-management+1
2021-11-12TalkC0c0n Executive Presence….a cardinal of the cyber rostrum Bishakha Jain#security-training#architecture#security-governance
2021-11-12TalkC0c0n Post Covid CISOs - Disappearing trusted boundaries and Innovative CyberSecurity Approaches Illyas Kooliyankal#risk-management#architecture#security-governance+1
2021-11-12TalkC0c0n Regulating Social Media Platforms : Should it be done in Democratic Societies ? J Sam Daniel Stalin, Apar Gupta, Dinesh O Bareja, Prashant Mali, Jiten Jain#security-compliance#security-governance#risk-management+3
2021-10-13TalkRootcon The Kill Chain: Future of Cyber in Defense Video Harshit Agrawal#architecture#ics-security#risk-management
2021-08-26TalkHitbsecconf Gazing Ahead: What Modern RF Combat Looks Like in the Next Decade Presentation Video Harshit Agrawal#ics-security#architecture#risk-management
2021-08-07TalkDefcon The Curious Case of Knowing the Unknown Video Vandana Verma Sehgal#threat-hunting#threat-modeling#architecture+1
2021-08-06TalkDefcon Defending IoT in the Future of High-Tech Warfare Video Harshit Agrawal#iot-pentesting#architecture#ics-security
2020-11-21TalkAppsecindonesia The caveats of the unseen: Crouching exposure, Hidden Misconfiguration Ashwin Vamshi#architecture#devsecops#risk-management+1
2020-09-18TalkC0c0n Herd Immunity, in the Cyber World Sunil Varkey#security-training#risk-management#architecture
2020-09-18TalkC0c0n Coping with Digital Transformation - A CISO perspective Video Maya R Nair#risk-management#security-governance#architecture+2
2020-09-18TalkC0c0n Demystifying Zero Trust - A Real world Video Sandeep Variyam#zero-trust#architecture#security-governance+1
2020-08-21TalkThedianainitiative Trust, No Trust or Zero Trust - Myth Demystifying Vandana Verma Sehgal#zero-trust#architecture#security-compliance+2
2019-11-09TalkToorcon 100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans Video Jatin Kataria, Ang Cui#reverse-engineering#hardware-reverse-engineering#architecture+2
2019-09-27TalkC0c0n A Day in the Life of a CISO Sridhar Govardhan#security-compliance#security-governance#risk-management+2
2019-09-27TalkC0c0n CISO Mind Set Lopa Mudraa Basuu#risk-management#security-governance#security-compliance+1
2019-09-27TalkC0c0n Industry 4.0 - Security and Compliance Santhosh Srinivasan#ics-security#security-compliance#security-governance+2
2019-09-27TalkC0c0n Looking a decade ahead: Big data, drones , Robots and cyber security. Rahul Sasi#ics-security#architecture#ai-security+2
2019-09-27TalkC0c0n Security @scale for startups Shivanath Somanathan#devsecops#secure-development#software-security+2
2019-08-09TalkDefcon 100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans Video Jatin Kataria, Rick Housley, Ang Cui#reverse-engineering#architecture#hardware-reverse-engineering+1
2019-08-08TalkDefcon Anatomy of cloud hacking Pratik Shah#cloud-pentesting#post-exploitation#architecture+1
2018-11-27TalkHitbsecconf COMMSEC: Taking Over Telecom Networks Presentation Video Hardik Mehta, Loay Hassan Abdelrazek#architecture#red-teaming#ss7+2
2018-10-05TalkC0c0n Blockchains as techno-power structures: towards emergence of P2P Politics Sunil Aggarwal#decentralized-systems#decentralised-security#architecture+1
2018-10-05TalkC0c0n Cybersecurity Embedded Digital Transformation - The Future Sunil Kanchi#embedded-security#architecture#ics-security
2018-10-05TalkC0c0n Digital Innovation revolution in Kerala Government Sunil Varkey#cybersecurity-strategy#architecture#risk-management+2
2018-10-05TalkC0c0n Future of Mobility & Cyber Security Suja Chandy#automotive-cybersecurity#ics-security#architecture+2
2018-10-05TalkC0c0n Resiliency Focus alongside Digital Disruption Lince Lawrence#architecture#risk-management#security-training+2
2018-10-05TalkC0c0n Taking cyber security to the board room Amit Pradhan#risk-management#security-compliance#security-governance+2
2018-10-05TalkC0c0n Will Artificial Intelligence And Machine Learning Bring More Threats On Cyber Security? Roshy John#risk-management#architecture#ai-security+2
2018-10-04TalkBrucon Disrupting the Kill Chain Video Vineet Bhatia#incident-management#architecture#windows+3
2018-08-16TalkUsenix Chipmunk or Pepe? Using Acoustical Analysis to Detect Voice-Channel Fraud at Scale Video Vijay Balasubramaniyan#threat-detection#architecture#machine-learning+1
2018-08-16TalkUsenix Man-in-the-Machine: Exploiting Ill-Secured Communication Inside the Computer Presentation Whitepaper Video Siddharth Rao, Thanh Bui, Markku Antikainen, Viswanathan Manihatty Bojan, Tuomas Aura#security-assessment#architecture#application-hardening+4
2018-08-09TalkDefcon Anonymous rate-limiting in services with Direct Anonymous Attestation Presentation Video Konark Modi, Alex Catarineu#data-protection#architecture#security-strategy+1
2018-06-27TalkFirst Securing your in-ear fitness coach: Challenges in hardening next generation wearables Presentation Sumanth Naropanth, Sunil Kumar#secure-development#architecture#devsecops
2018-03-13TalkTroopers Securing your in-ear fitness coach: Challenges in hardening next generation wearables Presentation Video Sumanth Naropanth, Kavya Racharla#secure-development#data-protection#architecture
2017-08-19TalkC0c0n Building Trust for Digital Transactions in India’s COD Culture Parry Aftab, Betsy Broder, Sridhara R Sidhu, Mirza Faizan#secure-development#risk-management#architecture
2017-08-19TalkC0c0n Trust, the foundation of Digital Mastery Sunil Varkey#identity-management#authentication#risk-management+2
2017-08-18TalkC0c0n Dynamic Binary Instrumentation Vivek Arora, Bhaskar Rastogi#dynamic-analysis#reverse-engineering#binary-analysis+1
2017-08-18TalkC0c0n Moving from Cybersecurity Awareness to Cybersecurity Competence Anup Narayanan#cybersecurity-education#cybersecurity-training#security-training+3
2017-08-04TalkSha Attacking OpenSSL using Side-channel Attacks: The RSA case study Whitepaper Video Praveen Vadnala, Lukasz Chmielewski#reverse-engineering#architecture#embedded-security
2017-03-03TalkNullcon Breach Response - Time to shake up the status quo Video K K Mookhey, Pranesh Prakash, Sahir Hidayatullah, Shobha Jagathpal#incident-management#risk-management#architecture+1
2017-03-03TalkNullcon Securing Critical National Infrastructure Video Shailendra Fuloria, R Sarangapani, Rahul Tongia, Michael Pyle, Justin Searle#critical-infrastructure#ics-security#risk-management+3
2017-01-25TalkOwaspappseccalifornia OCSP Stapling in the Wild Video Devdatta Akhawe, Emily Stark#web-security#architecture#devsecops
2016-08-19TalkC0c0n Kill the password - A new era of authentication Tamaghna Basu#authentication#iam#architecture+1
2016-08-07TalkDefcon Cyber Grand Shellphish Video Aravind Machiry, Yan Shoshitaishvili, Antonio Bianchi, Kevin Borgolte, Jacopo Corbetta, Francensco Disperati, Andrew Dutcher, Giovanni Vigna, Chris Salls, Nick Stephens, Fish Wang, John Grosen#automated-exploit-detection#reverse-engineering#vulnerability-assessment+1
2016-03-15TalkGroundzerosummit r00tKidz and Hacking Triveni Singh, Lea Paul#security-assessment#ethical-hacking#privilege-escalation+2
2015-11-05TalkGroundzerosummit Western Air Command B S Singh Deo#network-defense#network-monitoring#network-pentesting+3
2015-09-24TalkAppsecusa Continuous Cloud Security Automation Video Rohit Pitke#aws#devsecops#architecture
2015-08-07TalkDefcon Getting into the Trust Store We Trust Ajit Hatti#reverse-engineering#architecture#security-strategy
2015-08-01TalkC0c0n S3curi7y at 36K feet Rugved Mehta, Gaurav Trivedi#aws#azure#gcp+3
2015-01-27TalkOwaspappseccalifornia Anatomy of memory scraping, credit card stealing POS malware Video Amol Sarwate#reverse-engineering#incident-management#architecture
2014-11-13TalkGroundzerosummit 9 Cell Cyber Diplomacy Alok Vijayant#architecture#risk-management#security-governance
2013-11-20TalkAppsecusa Project Talk: OWASP OpenSAMM Project Presentation Pravir Chandra, Seba Deleersnyder#software-security#secure-development#devsecops+4
2013-09-27TalkC0c0n ARM, Thumb and the Finger Aseem Jakhar#reverse-engineering#binary-analysis#assembly-analysis+2
2013-09-27TalkC0c0n From Bedroom to Boardroom - Taking your Weekend Infosec Project Global Vivek Ramachandran#devsecops#secure-development#security-assessment+2
2013-08-16TalkUsenix Building Securable Infrastructure: Open-Source Private Clouds Video Pravir Chandra#cloud-pentesting#architecture#open-source-security
2013-08-15TalkUsenix Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness Presentation Whitepaper Devdatta Akhawe, Adrienne Felt#web-security#security-training#architecture+2
2013-08-15TalkUsenix An Empirical Study of Vulnerability Rewards Programs Presentation Whitepaper Devdatta Akhawe, David Wagner, Matthew Finifter#bug-bounty#software-security#risk-management+2
2012-12-01TalkClubhack The difference between the “Reality” and “Feeling” of Security: Information Security and the Human Being Presentation Video Thomas Kurian Ambattu#security-training#human-factor#risk-management+2
2012-10-26TalkAppsecusa The 7 Qualities of Highly Secure Software Video Mano Paul#secure-development#software-security#secure-coding+3
2012-08-03TalkC0c0n Business Continuity and Risk Management in Turbulent Times Venkataram Arabolu#risk-management#business-continuity#security-compliance+2
2012-08-03TalkC0c0n The Weakest Link - Reinforcing the Human Element Sandeep Godbole#security-training#human-factor#cybersecurity-education+3
2011-11-17TalkDeepsec Behavioral Security: 10 steps forward 5 steps backward Video Sourabh Satish#security-training#behavioral-change#risk-management+2
2011-09-07TalkSecuritybyte Social Web & Privacy – An evolving world Bala Sathiamurthy, Aridaman Tripathi#data-protection#api-security#security-compliance+2
2011-09-06TalkSecuritybyte Enabling Un-trusted Mashups Presentation Bishan Singh#web-security#xss#csrf+4
2009-11-17TalkSecuritybyte Business Continuity Case Study Venkataram Arabolu#business-continuity#risk-management#business-resilience+3
2009-11-17TalkSecuritybyte Usability and Privacy in Security Presentation Ponnurangam Kumaraguru#data-protection#architecture#security-training+2
2009-08-06TalkC0c0n Information Warfare A a Gafoor, Vinayak Mishra#threat-hunting#threat-modeling#security-training+2
2005-07-28TalkBlackhat Rapid Threat Modeling Presentation Video Akshay Aggarwal#threat-modeling#red-teaming#security-strategy+4
1998-07-29TalkBlackhat Security as an enabler for new business opportunities - The Business Value of Security Karan Khanna#risk-management#business-continuity#cyber-resilience+3