| 2025-08-07 | Tool demo | Blackhat |
Frogy 2.0 - Automated external attack surface analysis toolkit
| Chintan Gurjar | #attack-surface#vulnerability-assessment#asset-management+2 |
| 2025-04-29 | Talk | Rsac |
It’s Always Risky in IT: Frontline Stories and Strategic Insights
| Gourav Nagar, Rohit Bansal | #risk-management#security-compliance#cyber-resilience+4 |
| 2025-03-02 | Panel | Nullcon |
Unlocking India’s Cyber Potential through Strategic Policies, R&D Support, and Robust Public-Private Partnerships
| Atul Kumar, Savita Utreja | #cybersecurity-framework#cybersecurity-strategy#cyber-law+3 |
| 2024-12-12 | Panel | Blackhat |
Locknote: Conclusions and Key Takeaways from Black Hat Europe 2024
| Vandana Verma Sehgal, Jeff Moss, Stefano Zanero, James Forshaw, Meadow Ellis | #security-strategy#cybersecurity-framework#cyber-resilience+2 |
| 2024-11-16 | Talk | C0c0n |
Breach of the borderless: Cyber threat actors targeting India’s cyberspace
| Abhijith B R | #threat-hunting#cybersecurity-strategy#cyber-war+2 |
| 2024-04-18 | Tool demo | Blackhat |
Catching adversaries on Azure - Deception on Cloud
| Subhash Popuri | #azure#cloud-workload-protection#cloud-pentesting+4 |
| 2023-12-07 | Tool demo | Blackhat |
Mantis - Asset Discovery at Scale
| Prateek Thakare, Bharath Kumar, Praveen Kanniah | #red-teaming#asset-inventory#asset-management+2 |
| 2023-09-23 | Panel | Nullcon |
CRITICAL INFORMATION INFRASTRUCTURE(CII) PROTECTION: CHALLENGES AND OPPORTUNITIES- HOW CAN THE NULLCON COMMUNITY CONTRIBUTE
| Saikat Datta, M v Sheshadri, Madhavi Purandare, Mathan Babu Kasilingam, Navin Kumar Singh | #critical-infrastructure#cybersecurity-framework#security-strategy+4 |
| 2023-08-06 | Panel | C0c0n |
Power of Control: Navigating the PDP Act
| Prem Kamath, K Kamaneesh, Swapnil Bangali, Rahul Sharma, Dinesh O Bareja | #cyber-law#compliance-frameworks#cybersecurity-strategy+3 |
| 2023-08-06 | Talk | C0c0n |
Securing the Future: Addressing Cybersecurity Challenges in the Age of 5G
| Altaf Shaik | #zero-trust#supply-chain-security#attack-surface+4 |
| 2022-09-24 | Talk | C0c0n |
Rationalizing Cyber Security Risk in Risk Language
| Anish Koshy | #risk-management#security-governance#cybersecurity-strategy+3 |
| 2022-09-23 | Panel | C0c0n |
What ails the Indian cybersecurity startup ecosystem?
| Sunil Varkey, Ajit Hatti, Akash Mahajan, Aseem Jakhar, Shubham Mittal | #cybersecurity-strategy#business-resilience#cyber-law+3 |
| 2022-09-06 | Panel | Nullcon |
Securing India The CERTIn Way
| Saikat Datta, Sanjay Bahl, Ajit Menon, Anuprita Daga | #security-strategy#cybersecurity-framework#incident-management+3 |
| 2022-09-06 | Panel | Nullcon |
Unlocking Security Collaboration With Cyber Threat Intelligence
| Avkash Kathiriya, Varun Singla, Mathan Babu Kasilingam, Amol Naik | #intelligence-sharing#attack-surface#cybersecurity-strategy+1 |
| 2021-08-07 | Tool demo | Defcon |
Tenacity- An Adversary Emulation Tool for Persistence
| Atul Nair, Harshal Tupsamudre | #incident-management#security-testing#attack-surface |
| 2021-08-04 | Tool demo | Blackhat |
Attack Surface Framework
| Prajwal Panchmahalkar, Mauricio Espinosa | #network-defense#application-pentesting#attack-surface+1 |
| 2021-05-07 | Panel | Blackhat |
Insights and Predictions: What’s Next in InfoSec
| Vandana Verma Sehgal, Neil R. Wyler, Lidia Giuliano, Jeff Wilson, Vitaly Kamluk | #security-strategy#cybersecurity-training#cybersecurity-framework+2 |
| 2020-09-18 | Talk | C0c0n |
Offensive & Scope Based Recon
| Harsh Bothra | #reconnaissance#network-architecture#security-strategy+1 |
| 2020-09-18 | Talk | C0c0n |
Supercharging your initial foothold in Red Team engagements
| Sachin S Kamath | #red-teaming#ethical-hacking#exploit-delivery+3 |
| 2020-08-22 | Talk | Thedianainitiative |
Deploying discreet infrastructure for targeted phishing campaigns
| Sreehari Haridas | #phishing#application-pentesting#social-engineering+3 |
| 2020-08-22 | Talk | Thedianainitiative |
Internal Red Team Operations Framework - Building your practical internal Red Team
| Abhijith B R | #red-teaming#cyber-war#phishing+3 |
| 2020-03-07 | Panel | Nullcon |
Economics Of Data Breach And Attack
| Bhaskar Medhi, Manu Zacharia, Suchit Mishra, Yash Kadakia | #data-loss-prevention#data-protection#cybersecurity-strategy+4 |
| 2019-09-28 | Panel | C0c0n |
Align security and risk management strategies with enterprise objectives
| Abdul Karim Vettiyanickal, George Eapen, Ranjeet Rai, Amit Dubey, Biju K, Kanu Pathania | #security-strategy#cybersecurity-framework#cyber-resilience+4 |
| 2019-09-28 | Talk | C0c0n |
Vulnerability Prioritization with Threat Intelligence
| Muslim Koser, Devesh Vatsa, Rohit Srivastwa, Dinesh O Bareja | #threat-intelligence-analysis#automated-scanning#security-assessment+3 |
| 2019-09-27 | Talk | C0c0n |
Advanced Persistent Threat and counter measures
| A a Gafoor | #blueteam#apt#network-defense+4 |
| 2019-08-08 | Tool demo | Defcon |
Let’s Map Your Network
| Pramod Rana | #reconnaissance#blueteam#network-monitoring+4 |
| 2019-03-02 | Panel | Nullcon |
CISO Strategy for OT and IoT risk and Threat Management
| Gaurav Shukla, Gomeet Pant, Rakesh Viswanathan, Sudarshan Rajagopal | #ics-security#iot-pentesting#cybersecurity-strategy+3 |
| 2019-03-02 | Panel | Nullcon |
Navigating Risk in the Changing Business and Technology Landscape
| Rahul Neel Mani, Burgess Cooper, Manish Tiwari, Mannan Godil | #risk-management#cybersecurity-strategy#business-resilience+4 |
| 2018-10-05 | Talk | C0c0n |
Defending Healthcare Base
| Jiggyasu Sharma | #blueteam#incident-management#security-monitoring+4 |
| 2018-10-04 | Talk | Brucon |
Disrupting the Kill Chain
| Vineet Bhatia | #incident-management#architecture#windows+3 |
| 2018-03-15 | Talk | Troopers |
Defending Microsoft Environments at Scale
| Vineet Bhatia | #blueteam#windows#azure+4 |
| 2018-03-03 | Panel | Nullcon |
IoT : How long till D Day?
| Aseem Jakhar, Shobha Jagathpal, Rishikesh Kamat, Daniel Cisowski, Michael Pyle | #iot-device-management#iot-pentesting#embedded-systems+3 |
| 2018-03-02 | Panel | Nullcon |
The complexity of regulation & cybersecurity
| Saikat Datta, Maya R Nair, Nandkumar Saravade, Sanjay Bahl | #cybersecurity-framework#cyber-law#compliance-governance+3 |
| 2017-08-18 | Talk | C0c0n |
Bank on Compliance for Cyber Security
| Dinesh O Bareja | #cyber-law#compliance-frameworks#financial-institutions+4 |
| 2017-07-26 | Tool demo | Blackhat |
Datasploit - Automated Open Source Intelligence (OSINT) Tool
| Kunal Aggarwal, Shubham Mittal, Sudhanshu Chauhan | #osint#reconnaissance#social-engineering+4 |
| 2017-03-21 | Talk | Troopers |
New attacks in 4G technologies
| Ravishankar Borgaonkar | #4g#attack-surface#threat-modeling+1 |
| 2016-09-14 | Talk | 44con |
2016: The Infosec Crossroads
| Saumil Shah | #blueteam#security-strategy#threat-modeling+4 |
| 2016-08-19 | Talk | C0c0n |
Breaking into Gas stations!
| Suraj Pratap | #red-teaming#ethical-hacking#exploit-delivery+2 |
| 2016-08-19 | Talk | C0c0n |
Esoteric XSS Payloads
| Riyaz Walikar | #xss#red-teaming#code-injection+3 |
| 2016-05-17 | Talk | Phdays |
Fingerprinting and Attacking a Healthcare Infrastructure
| Anirudh Duggal | #red-teaming#fingerprinting#ransomware+4 |
| 2015-11-05 | Talk | Groundzerosummit |
Hacking RFIDs under 2000INR
| Jayesh Chauhan | #rfid#red-teaming#hardware-embedded+4 |
| 2015-08-01 | Talk | C0c0n |
Attack chaining for web exploitation- From Information leakage to gaining Root access
| Abhijeth Dugginapeddi | #red-teaming#application-pentesting#attack-surface+2 |
| 2015-02-06 | Panel | Nullcon |
2015: The Global Threat Defense Landscape - A discussion on the challenges faced by enterprises in engaging the bad guys
| Shomiron Das Gupta, K S Narayanan, Shantanu Ghosh, Subrahmanya Gupta Boda, Vishal Salvi, Benjamin Rivera | #cyber-crime#incident-management#attack-surface+1 |
| 2014-11-13 | Talk | Groundzerosummit |
Attacking Cryptography & PKI Implementations
| Ajit Hatti | #encryption#red-teaming#ssl+4 |
| 2014-10-23 | Talk | T2 |
Darshak: how to turn your phone into a low cost IMSI catcher device
| Ravishankar Borgaonkar, Swapnil Udar | #android#endpoint-protection#android-security+2 |
| 2014-08-22 | Talk | C0c0n |
APT: Case Study of attackers targeting public tendering
| Rahul Sasi | #red-teaming#apt#attack-surface+4 |
| 2014-02-14 | Talk | Nullcon |
User Privacy in Cellular Networks
| Ravishankar Borgaonkar | #data-protection#network-architecture#data-governance+2 |
| 2013-11-07 | Talk | Groundzerosummit |
Central Monitoring System and IT Act 2000 – Balance between rights of citizens and state
| Vaishali Bhagwat | #cyber-law#cybersecurity-strategy#cyber-resilience+2 |
| 2013-11-07 | Talk | Groundzerosummit |
Understanding the anatomy of advanced targeted attacks – The Trend Micro approach
| Tarun Gupta | #forensics#malware-research#attack-surface |
| 2013-09-27 | Talk | C0c0n |
Risk and challenges in virtual currencies.
| Harsh Patel, Swatantra Kumar Gupta | #digital-currency#cryptocurrency#decentralized-systems+4 |
| 2013-07-31 | Talk | Blackhat |
LTE booms with vulnerabilities
| Ankit Gupta | #lte#ddos#network-architecture+2 |
| 2013-03-15 | Talk | Blackhat |
Vulnerability analysis of 2013 SCADA issues
| Amol Sarwate | #scada#ics-security#attack-surface+2 |
| 2012-09-26 | Talk | Nullcon |
Highly Harmful Audio Waves aka DTMF Fuzzing
| Rahul Sasi | #dtmf#red-teaming#fuzzing+3 |
| 2012-03-16 | Talk | Blackhat |
IVR Security- Internal Network Attack via Phone Lines
| Rahul Sasi | #red-teaming#ivrs#network-pentesting+3 |
| 2012-02-15 | Talk | Nullcon |
Shall we dust Beep? The Geo-strategic realities of Cyberwar
| Pukhraj Singh | #cyber-war#security-strategy#attack-surface |
| 2011-02-25 | Talk | Nullcon |
Chupa Rustam
| Abhijeet Hatekar | #surveillance#red-teaming#application-pentesting+2 |
| 2011-02-25 | Talk | Nullcon |
Cyber Crime 101 - Cost of cybercrime, trends & analysis
| Simran Gambhir, Cn Shashidhar | #cyber-crime#financial-institutions#attack-surface+2 |
| 2011-02-25 | Talk | Nullcon |
Security Analysis of India’s Electronic Voting Machines: Memoirs of a whistleblower
| Hari Krishna Prasad Vemuru | #evm#red-teaming#hardware-embedded+3 |
| 2010-08-01 | Talk | C0c0n |
Overview of Cyber Legal Systems in India
| Sagar Rahurkar | #cyber-law#cyber-resilience#cybersecurity-strategy+4 |
| 2010-04-21 | Talk | Hitbsecconf |
Web Security – Going Nowhere?
| Saumil Shah | #red-teaming#application-hardening#application-pentesting+4 |
| 2010-03-15 | Talk | Blackhat |
400 Apps in 40 Days
| Nish Bhalla, Sahba Kazerooni | #risk-management#application-pentesting#attack-surface+1 |
| 2009-12-05 | Talk | Clubhack |
Risk Based Penetration Testing
| Nikhil Wagholikar, K K Mookhey | #security-assessment#incident-management#cybersecurity-strategy+1 |
| 2009-11-17 | Talk | Securitybyte |
Threat Modeling
| Varun Sharma | #threat-modeling#blueteam#security-strategy+4 |
| 2009-08-06 | Talk | C0c0n |
Cyber Forensics
| Krishna Sastry Pendyal | #forensics#digital-forensics#data-leak+4 |
| 2008-12-06 | Talk | Clubhack |
State of Cyber Law in India
| Rohas Nagpal | #cyber-law#cyber-resilience#cybersecurity-framework+4 |
| 2008-02-20 | Talk | Blackhat |
Hacking VoIP through IPSec Tunnels
| Sachin Joglekar, Sudeep Patwardhan | #voip#red-teaming#gsm+2 |