| 2025-04-29 | Talk | Rsac |
It’s Always Risky in IT: Frontline Stories and Strategic Insights
| Gourav Nagar, Rohit Bansal | #risk-management#security-compliance#cyber-resilience+4 |
| 2025-04-04 | Panel | Blackhat |
Locknote: Highlights & Key Takeaways from Black Hat Asia 2025
| Vandana Verma Sehgal | #security-strategy#cybersecurity-framework#digital-learning+1 |
| 2025-03-02 | Panel | Nullcon |
Unlocking India’s Cyber Potential through Strategic Policies, R&D Support, and Robust Public-Private Partnerships
| Atul Kumar, Savita Utreja | #cybersecurity-framework#cybersecurity-strategy#cyber-law+3 |
| 2024-12-12 | Panel | Blackhat |
Locknote: Conclusions and Key Takeaways from Black Hat Europe 2024
| Vandana Verma Sehgal | #security-strategy#cybersecurity-framework#cyber-resilience+2 |
| 2024-11-16 | Panel | C0c0n |
When Falcon Strikes Back: The Defender’s Dilemma
| Burgess Cooper, Shivkumar Pandey, A Shiju Rawther, Padnya Manwar, Kishan Kendre | #incident-management#security-strategy#threat-modeling+2 |
| 2023-09-24 | Panel | Nullcon |
C4CII - SECURING USE OF CLOUD IN CRITICAL INFORMATION INFRASTRUCTURE
| Saikat Datta, Akash Mahajan, Varun Singla, Navin Kumar Singh | #cloud-security-posture-management#cloud-workload-protection#critical-infrastructure+3 |
| 2023-09-23 | Panel | Nullcon |
CRITICAL INFORMATION INFRASTRUCTURE(CII) PROTECTION: CHALLENGES AND OPPORTUNITIES- HOW CAN THE NULLCON COMMUNITY CONTRIBUTE
| Saikat Datta, M v Sheshadri, Madhavi Purandare, Mathan Babu Kasilingam, Navin Kumar Singh | #critical-infrastructure#cybersecurity-framework#security-strategy+4 |
| 2023-08-06 | Panel | C0c0n |
nGen Cyber Threats - 2024 and Beyond: Embracing Chaos, Taking Charge
| Murli Nambiar, A Shiju Rawther, Jacxine Fernandez, Vishal Salvi, Sridhar Govardhan | #security-strategy#cybersecurity-framework#cyber-resilience+2 |
| 2023-03-09 | Panel | Nullcon |
Elements of a Successful Security Strategy: A Comprehensive Approach
| Sheetal Joseph | #security-strategy#security-testing#secure-development+4 |
| 2022-09-06 | Panel | Nullcon |
Impact of disruptive technologies on CISO’s career & progression
| Burgess Cooper, Sandeep Karan, Jacxine Fernandez, Ravi Kumar, Ankur Bhargava | #security-strategy#cybersecurity-framework#ai-security |
| 2022-09-06 | Panel | Nullcon |
Securing India The CERTIn Way
| Saikat Datta, Sanjay Bahl, Ajit Menon, Anuprita Daga | #security-strategy#cybersecurity-framework#incident-management+3 |
| 2022-05-18 | Panel | Phdays |
Challenges for cybersecurity conferences. Part II
| Aseem Jakhar | #security-training#cybersecurity-strategy#threat-modeling+3 |
| 2021-08-08 | Panel | Defcon |
Resilient cyber space: The role of hacker and security communities
| Manu Zacharia, Aseem Jakhar, Abhijith B R | #security-training#threat-modeling#incident-management+3 |
| 2021-05-07 | Panel | Blackhat |
Insights and Predictions: What’s Next in InfoSec
| Vandana Verma Sehgal | #security-strategy#cybersecurity-training#cybersecurity-framework+2 |
| 2021-03-05 | Panel | Nullcon |
Tech Startups/Businesses and Infonomics
| Sourabh Issar, Burgess Cooper | #data-governance#data-protection#cybersecurity-strategy+1 |
| 2020-03-07 | Panel | Nullcon |
Supply Chain Security In Critical Infrastructure Systems
| Manish Tiwari, Suchit Mishra, Faruk Kazi | #supply-chain-attack#supply-chain-security#critical-infrastructure+3 |
| 2019-09-28 | Panel | C0c0n |
Align security and risk management strategies with enterprise objectives
| Abdul Karim Vettiyanickal, George Eapen, Ranjeet Rai, Amit Dubey, Biju K, Kanu Pathania | #security-strategy#cybersecurity-framework#cyber-resilience+4 |
| 2018-03-03 | Panel | Nullcon |
Managing Cyber Risk in the Connected Environment
| Gaurav Shukla, Ramachandra Hegde, Sudarshan Rajagopal | #security-strategy#threat-modeling#network-monitoring+1 |
| 2018-03-02 | Panel | Nullcon |
The complexity of regulation & cybersecurity
| Saikat Datta, Maya R Nair, Nandkumar Saravade, Sanjay Bahl | #cybersecurity-framework#cyber-law#compliance-governance+3 |
| 2015-02-07 | Panel | Nullcon |
Startup panel – Make in India
| Aseem Jakhar, Radha Shelat, Sumit D Chowdhury, Shomiron Das Gupta, Sastry Tumuluri, Shiju Sathyadevan | #security-strategy#cybersecurity-framework#business-resilience+4 |
| 2014-08-22 | Talk | C0c0n |
Cryptocalypse, Heart Bleed : Is our Government Listening?
| Ajit Hatti | #encryption#ssl#cyber-law+3 |
| 2012-02-15 | Talk | Nullcon |
Cyberspace: Global commons or a national asset
| Kamlesh Bajaj | #cyber-law#cybersecurity-framework#incident-management+1 |
| 2011-02-25 | Talk | Nullcon |
Cyber Crime 101 - Cost of cybercrime, trends & analysis
| Simran Gambhir, Cn Shashidhar | #cyber-crime#financial-institutions#attack-surface+2 |
| 2011-02-25 | Talk | Nullcon |
Enterprise Paradigm for Controlling Data Leakage
| Deepak Rout | #data-leak#blueteam#data-loss-prevention+3 |
| 2010-02-25 | Talk | Nullcon |
Quantum Computing Challenges in the field of security
| Navin Pai | #quantum-computing#security-strategy#threat-modeling+3 |
| 2008-12-06 | Talk | Clubhack |
State of Cyber Law in India
| Rohas Nagpal | #cyber-law#cyber-resilience#cybersecurity-framework+4 |