| 2025-04-30 | Talk | Rsac |
Got Supply Pain? A Real-World Approach to Supply Chain SDL
| Mohit Arora, Richard Tonry | #secure-development#devsecops#risk-management+4 |
| 2024-05-07 | Talk | Rsac |
Anatomy of a Vulnerability Response - A View from the Inside
| Mohit Arora, Richard Tonry | #incident-management#risk-management#compliance-governance |
| 2023-08-07 | Talk | C0c0n |
Citizen Mobile Security: Responsibilities, Accountability, and Impacts
| Satyendra Verma | #security-training#risk-management#compliance-governance |
| 2023-08-06 | Talk | C0c0n |
CBDC and future of Finance
| Sunil Raveendran | #digital-currency#decentralized-systems#compliance-governance+2 |
| 2023-04-21 | Talk | Hitbsecconf |
LOCKNOTE:THE HAND THAT STRIKES, ALSO BLOCKS
| Saumil Shah | #architecture#risk-management#security-training+1 |
| 2022-09-23 | Talk | C0c0n |
Rolling out Central Bank Digital Currency - Technical Design Considerations
| Sunil Raveendran | #architecture#compliance-governance#risk-management+1 |
| 2022-08-11 | Talk | Thedianainitiative |
Connecting Dots Between Security Teams & Customer Expectations
| Shruthi Kamath | #security-governance#risk-management#architecture+2 |
| 2021-11-13 | Talk | C0c0n |
Third Party Risk Management
| Mahesh Kalyanaraman | #risk-management#compliance-governance#supply-chain+2 |
| 2021-11-12 | Talk | C0c0n |
Post Covid CISOs - Disappearing trusted boundaries and Innovative CyberSecurity Approaches
| Illyas Kooliyankal | #risk-management#architecture#security-governance+1 |
| 2021-08-08 | Panel | Defcon |
Resilient cyber space: The role of hacker and security communities
| Manu Zacharia, Aseem Jakhar, Abhijith B R, Jay Turla, Omar Santos, Dave Lewis, Dhillon Kannabhiran | #security-training#threat-modeling#incident-management+3 |
| 2020-09-18 | Talk | C0c0n |
Cyber Security Shifts During COVID-19
| Sunil Kanchi | #risk-management#security-training#compliance-governance+1 |
| 2019-09-28 | Panel | C0c0n |
Align security and risk management strategies with enterprise objectives
| Abdul Karim Vettiyanickal, George Eapen, Ranjeet Rai, Amit Dubey, Biju K, Kanu Pathania | #security-strategy#cybersecurity-framework#cyber-resilience+4 |
| 2019-09-27 | Talk | C0c0n |
Securing Payment Data with PCI Security Standards and Programs
| Nitin Bhatnagar | #blueteam#data-protection#secure-development+3 |
| 2019-09-27 | Panel | C0c0n |
Shouldn’t Organization disclose breaches - The need for a shared platform
| Sunil Varkey, Jacxine Fernandez, Rahul Sasi, K K Chaudhary | #data-leak#data-protection#security-testing+4 |
| 2019-09-13 | Talk | 44con |
The CISO’s Dilemma
| Saumil Shah | #blueteam#security-strategy#threat-modeling+4 |
| 2019-08-29 | Keynote | Hitbsecconf |
The CISO’s Dilemma
| Saumil Shah | #blueteam#compliance-governance#security-strategy+4 |
| 2018-03-02 | Panel | Nullcon |
The complexity of regulation & cybersecurity
| Saikat Datta, Maya R Nair, Nandkumar Saravade, Sanjay Bahl | #cybersecurity-framework#cyber-law#compliance-governance+3 |
| 2017-03-03 | Talk | Nullcon |
Breach Response - Time to shake up the status quo
| K K Mookhey, Pranesh Prakash, Sahir Hidayatullah, Shobha Jagathpal | #incident-management#risk-management#architecture+1 |
| 2014-11-13 | Talk | Groundzerosummit |
National Cyber Policy and its impact on Business
| Vaishali Bhagwat | #cyber-law#cybersecurity-strategy#business-resilience+3 |
| 2013-11-07 | Talk | Groundzerosummit |
Central Monitoring System and IT Act 2000 – Balance between rights of citizens and state
| Vaishali Bhagwat | #cyber-law#cybersecurity-strategy#cyber-resilience+2 |
| 2012-03-15 | Talk | C0c0n |
Integrated Dial 100 System for Law Enforcement
| Nandkumar Saravade, R Srikumar | #security-governance#compliance-governance#security-operations-center |
| 2011-09-06 | Talk | Securitybyte |
Application Security Strategies
| K K Mookhey | #secure-coding#secure-development#web-security+3 |
| 2008-12-06 | Talk | Clubhack |
State of Cyber Law in India
| Rohas Nagpal | #cyber-law#cyber-resilience#cybersecurity-framework+4 |