| 2025-03-02 | Panel | Nullcon |
Unlocking India’s Cyber Potential through Strategic Policies, R&D Support, and Robust Public-Private Partnerships
| Atul Kumar, Savita Utreja | #cybersecurity-framework#cybersecurity-strategy#cyber-law+3 |
| 2024-11-16 | Talk | C0c0n |
Breach of the borderless: Cyber threat actors targeting India’s cyberspace
| Abhijith B R | #threat-hunting#cybersecurity-strategy#cyber-war+2 |
| 2023-08-07 | Panel | C0c0n |
DPDP Act - Transformation challenges for BFSI
| Linson Paul, Venugopal Parameswara, Biju K, Babitha B P, Santosh Khadsare | #data-protection#gdpr#compliance-frameworks+4 |
| 2023-08-06 | Talk | C0c0n |
AI in Cyber Security and Crime Prevention
| Vishal Salvi | #ai#ai-security#deep-learning+3 |
| 2023-08-06 | Panel | C0c0n |
Power of Control: Navigating the PDP Act
| Prem Kamath, K Kamaneesh, Swapnil Bangali, Rahul Sharma, Dinesh O Bareja | #cyber-law#compliance-frameworks#cybersecurity-strategy+3 |
| 2023-05-12 | Panel | Blackhat |
Trends and Top Takeaways from Black Hat Asia
| Sudhanshu Chauhan, Ty Miller, Jeff Moss, Asuka Nakajima, Pamela O Shea | #cybersecurity-strategy |
| 2022-09-24 | Talk | C0c0n |
Building Smart, Resilient and Sustainable Cyber Eco System
| Navin Kumar Singh | #risk-management#cybersecurity-strategy#architecture+4 |
| 2022-09-24 | Panel | C0c0n |
MoonWorking’ and associated legal, ethical, security aspects
| Georgie Kurien, Sreekumar Balachandran, Sony A, Robin Joy | #cybersecurity-strategy#threat-modeling#cyber-law |
| 2022-09-24 | Talk | C0c0n |
Rationalizing Cyber Security Risk in Risk Language
| Anish Koshy | #risk-management#security-governance#cybersecurity-strategy+3 |
| 2022-09-23 | Panel | C0c0n |
Customer, Credit & Risk - Fintech trends 2022
| Maya R Nair, Balakrishnan A, A Shiju Rawther, Linson Paul, Shivanath Somanathan | #financial-institutions#data-protection#identity-theft+2 |
| 2022-09-23 | Panel | C0c0n |
Digital Apocalypse: Emerging cybersecurity challenges and future Crimes
| Nidhish Bhatnagar, Amit Dubey, Philip Varughese Vayarakunnil, Rahul Sasi, Saranga Rajan, Suhel Daud | #cybersecurity-strategy#cyber-crime#digital-currency |
| 2022-09-23 | Talk | C0c0n |
Startup Ecosystem and Investments in Post Covid Era
| Sunil Kanchi | #risk-management#security-compliance#security-governance+2 |
| 2022-09-23 | Talk | C0c0n |
Technological Reliance for Resilience
| Tulika Pandey | #risk-management#cyber-resilience#architecture+2 |
| 2022-09-23 | Panel | C0c0n |
What ails the Indian cybersecurity startup ecosystem?
| Sunil Varkey, Ajit Hatti, Akash Mahajan, Aseem Jakhar, Shubham Mittal | #cybersecurity-strategy#business-resilience#cyber-law+3 |
| 2022-09-06 | Panel | Nullcon |
Unlocking Security Collaboration With Cyber Threat Intelligence
| Avkash Kathiriya, Varun Singla, Mathan Babu Kasilingam, Amol Naik | #intelligence-sharing#attack-surface#cybersecurity-strategy+1 |
| 2022-05-18 | Panel | Phdays |
Challenges for cybersecurity conferences. Part II
| Aseem Jakhar, Timur Yunusov, Igor Lukic, Dhillon Andrew Kannabhiran | #security-training#cybersecurity-strategy#threat-modeling+3 |
| 2021-11-13 | Talk | C0c0n |
Changing Cyber Security Paradigm & Cyber Tsunami
| Sunil Varkey | #cybersecurity-strategy#threat-landscape#risk-management+3 |
| 2021-11-13 | Talk | C0c0n |
Post pandemic Transformation - A CISO’s perspective
| Sridhar Govardhan | #risk-management#security-governance#security-compliance+3 |
| 2021-03-06 | Panel | Nullcon |
From Reactive to Proactive - Operationalizing your Threat Intel
| Akshat Jain, Amit Ghodekar, Suhas Desai, Ambuj Bhalla | #data-analytics#cybersecurity-strategy#intelligence-sharing+1 |
| 2021-03-05 | Panel | Nullcon |
Tech Startups/Businesses and Infonomics
| Sourabh Issar, Burgess Cooper, Joerg Simon | #data-governance#data-protection#cybersecurity-strategy+1 |
| 2020-09-18 | Talk | C0c0n |
Coping with Digital Transformation - A CISO perspective
| Maya R Nair | #risk-management#security-governance#architecture+2 |
| 2020-09-18 | Talk | C0c0n |
COVID-19 Cyber impact on financial sector and remote employees
| Amit Dubey, Tal Catran, Yair Feldman | #incident-management#risk-management#cybersecurity-strategy+4 |
| 2020-08-22 | Talk | Thedianainitiative |
Automating Threat Hunting on the Dark Web and other nitty-gritty things
| Apurv Singh Gautam | #threat-hunting#nlp#machine-learning+1 |
| 2020-08-06 | Talk | Blackhat |
Making an Impact from India to the Rest of the World by Building and Nurturing Women Infosec Community
| Vandana Verma Sehgal | #security-training#cybersecurity-strategy#social-engineering |
| 2020-03-07 | Panel | Nullcon |
Economics Of Data Breach And Attack
| Bhaskar Medhi, Manu Zacharia, Suchit Mishra, Yash Kadakia | #data-loss-prevention#data-protection#cybersecurity-strategy+4 |
| 2020-03-07 | Panel | Nullcon |
Hack the law: Protection for cybersecurity research in India
| Apar Gupta, Manu Zacharia, Raman Jit Singh Chima, Neelu Tripathy | #cyber-law#cybersecurity-strategy#security-development-lifecycle |
| 2019-09-27 | Panel | C0c0n |
Digital Transformation and Evolving Governance Structure
| A Shiju Rawther, Ajith Balagopal, Balakrishnan A, Sreekumar Balachandran | #cybersecurity-strategy#security-governance#risk-management+2 |
| 2019-09-27 | Panel | C0c0n |
Shouldn’t Organization disclose breaches - The need for a shared platform
| Sunil Varkey, Jacxine Fernandez, Rahul Sasi, K K Chaudhary | #data-leak#data-protection#security-testing+4 |
| 2019-09-12 | Keynote | Globalappsec |
Making a Change, One at a time - Diversity: More than just Gender
| Vandana Verma Sehgal | #security-training#human-factor#cybersecurity-strategy+3 |
| 2019-03-02 | Panel | Nullcon |
Actionable Intelligence and Cyber Security
| Durga Dube, M v Sheshadri, Rahul Sasi, Shrikant Shitole, Alan White | #data-analytics#incident-management#security-analytics+4 |
| 2019-03-02 | Panel | Nullcon |
CISO Strategy for OT and IoT risk and Threat Management
| Gaurav Shukla, Gomeet Pant, Rakesh Viswanathan, Sudarshan Rajagopal | #ics-security#iot-pentesting#cybersecurity-strategy+3 |
| 2019-03-02 | Panel | Nullcon |
Navigating Risk in the Changing Business and Technology Landscape
| Rahul Neel Mani, Burgess Cooper, Manish Tiwari, Mannan Godil | #risk-management#cybersecurity-strategy#business-resilience+4 |
| 2018-10-05 | Talk | C0c0n |
Artificial Intelligence and Social Media Analytics in Criminal Investigation
| Amit Dubey | #ai#ai-security#nlp+3 |
| 2018-10-05 | Talk | C0c0n |
Defending Healthcare Base
| Jiggyasu Sharma | #blueteam#incident-management#security-monitoring+4 |
| 2018-10-05 | Talk | C0c0n |
Digital Innovation revolution in Kerala Government
| Sunil Varkey | #cybersecurity-strategy#architecture#risk-management+2 |
| 2018-03-02 | Panel | Nullcon |
Economics of Hacks & Data Breaches Who Pays, Who Secures & Who Wins
| Vinayak Godse, Ashutosh Jain, Bhishma Maheshwari, Manish Tiwari, Suchit Mishra | #data-breach#risk-management#cybersecurity-strategy |
| 2018-03-02 | Panel | Nullcon |
Should all ciso promote hall of fame” within their organizations
| Burgess Cooper, Durga Dube, Thom Langford, Harish Pillay | #security-training#cybersecurity-strategy#bug-bounty+1 |
| 2017-08-18 | Talk | C0c0n |
Bank on Compliance for Cyber Security
| Dinesh O Bareja | #cyber-law#compliance-frameworks#financial-institutions+4 |
| 2017-08-18 | Talk | C0c0n |
Hunting the Hunters – Fighting CyberCrime at the Source
| Valan Sivasubramanian | #red-teaming#cybersecurity-strategy#cyber-crime+2 |
| 2017-08-18 | Talk | C0c0n |
Prevent Dark Side of your Smart City - A Defensive Security model for Smart City and Critical Infrastructure
| Manas Pratim Sarma | #blueteam#critical-infrastructure#cybersecurity-strategy+2 |
| 2017-03-03 | Panel | Nullcon |
Digital warriors: India and the Future of Conflict on the Internet
| Saikat Datta, Brijesh Datta, Muktesh Chander, Cmde Anand, Anja Kovacs | #cyber-war#national-security#digital-currency+2 |
| 2015-02-06 | Panel | Nullcon |
2015: The Global Threat Defense Landscape - A discussion on the challenges faced by enterprises in engaging the bad guys
| Shomiron Das Gupta, K S Narayanan, Shantanu Ghosh, Subrahmanya Gupta Boda, Vishal Salvi, Benjamin Rivera | #cyber-crime#incident-management#attack-surface+1 |
| 2015-02-06 | Panel | Nullcon |
Defender’s Diary: Who’s attacking? What are my options?
| Sastry Tumuluri, Amit Sharma, Venkatesh Subramaniam, Sachin Burman, Deepak Singla | #blueteam#threat-hunting#cybersecurity-strategy |
| 2015-02-06 | Panel | Nullcon |
Why CISO should promote more of such technical events - pros and cons, benefits etc
| Burgess Cooper, Maya Viswanathan, Sanjay Burman, Sridharan Sankaran, Massoud Issa, Katie Moussouris | #security-training#cybersecurity-strategy#security-management |
| 2014-11-13 | Talk | Groundzerosummit |
National Cyber Policy and its impact on Business
| Vaishali Bhagwat | #cyber-law#cybersecurity-strategy#business-resilience+3 |
| 2014-08-22 | Talk | C0c0n |
APT: Case Study of attackers targeting public tendering
| Rahul Sasi | #red-teaming#apt#attack-surface+4 |
| 2013-11-07 | Talk | Groundzerosummit |
Central Monitoring System and IT Act 2000 – Balance between rights of citizens and state
| Vaishali Bhagwat | #cyber-law#cybersecurity-strategy#cyber-resilience+2 |
| 2013-09-27 | Talk | C0c0n |
Hello CISO! How to make end-users LIKE and FOLLOW “Brand Infosec”?
| Anup Narayanan | #security-training#cybersecurity-education#security-governance+3 |
| 2013-09-27 | Talk | C0c0n |
Risk and challenges in virtual currencies.
| Harsh Patel, Swatantra Kumar Gupta | #digital-currency#cryptocurrency#decentralized-systems+4 |
| 2011-10-07 | Talk | C0c0n |
Section 43A IT Act compliance
| Sagar Rahurkar | #cyber-law#compliance-frameworks#cybersecurity-strategy+1 |
| 2011-03-15 | Talk | Nullcon |
Information Warfare Ñ The Indian Perspective
| Alok Vijayant | #cybersecurity-strategy#risk-management#security-training+1 |
| 2011-02-25 | Talk | Nullcon |
Incident Management and Beyond
| Dinesh O Bareja | #incident-management#data-leak#phishing+2 |
| 2010-08-01 | Talk | C0c0n |
Overview of Cyber Legal Systems in India
| Sagar Rahurkar | #cyber-law#cyber-resilience#cybersecurity-strategy+4 |
| 2009-12-05 | Talk | Clubhack |
Risk Based Penetration Testing
| Nikhil Wagholikar, K K Mookhey | #security-assessment#incident-management#cybersecurity-strategy+1 |