πŸ§ͺ Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Data Governance

Focus Area: πŸ”’ Data Privacy & Protection
23
Total Entries
43
Contributors

Top Contributors

Kunal Aggarwal(2) Saikat Datta(2) Shubham Mittal(2) A Muralidhar(1) Abhijit Tannu(1)

All Entries (23 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-03-01PanelNullcon Navigating Data Protection in the age of globalisation Saikat Datta, Krishan Dev#data-protection#gdpr#data-governance+4
2024-04-19Tool demoBlackhat Malware clustering using unsupervised ML : CalMal Source Code Himanshu Anand#machine-learning#ai-security#malware-detection+3
2023-08-10TalkBlackhat Does Public Disclosure of Vulnerabilities Affect Hacker Participation in Bug Bounty Programs? Presentation Amit Deokar, Ali Ahmed, Brian Lee#bug-hunting#incident-management#security-strategy+4
2023-08-07PanelC0c0n DPDP Act - Transformation challenges for BFSI Video Linson Paul, Venugopal Parameswara, Biju K, Babitha B P, Santosh Khadsare#data-protection#gdpr#compliance-frameworks+4
2022-09-24PanelC0c0n Data sovereignty - Challenges and the road ahead Sanjeev Sharma, Saranga Rajan, A Muralidhar, Jojy Joy#data-governance#data-protection#gdpr+2
2021-11-12TalkC0c0n Data Security and Privacy Abhilasha Vyas#data-protection#encryption#data-loss-prevention+3
2021-03-05PanelNullcon Tech Startups/Businesses and Infonomics Video Sourabh Issar, Burgess Cooper, Joerg Simon#data-governance#data-protection#cybersecurity-strategy+1
2020-12-10TalkBlackhat Effective Vulnerability Discovery with Machine Learning Presentation Video Asankhaya Sharma, Ming Yi Ang#security-assessment#machine-learning#software-composition-analysis+4
2020-08-07PanelDefcon D0 N0 H4RM: A Healthcare Security Conversation Video Vidha Murthy, Christian Dameff, Jeff Tully, Jessica Wilkerson, Veronica Schmitt, Ash Luft#data-protection#identity-management#security-training+3
2020-08-06Tool demoBlackhat MSTICpy: The Security Analysis Swiss Army Knife Source Code Ashwin Patil, Pete Bryan, Ian Hellen#digital-forensics#incident-management#data-analytics+3
2020-03-06TalkNullcon Automated Classification of Web-Application Attacks for Intrusion Detection Aneet Kumar Dutta#intrusion-detection#machine-learning#application-pentesting+3
2020-03-06PanelNullcon Predicting Danger: Building the Ideal Threat Intelligence Model Video Saikat Datta, Sandeep Sharma, Muslim Koser, Shankar Jadhav#ai-security#machine-learning#nlp+3
2019-09-28PanelC0c0n Implementing Data Protection Frameworks with evolving Technology-Challenges, Opportunities & Solutions B R Nath, Jijy Oommen, Maya R Nair, Ajay Porus, Georgie Kurien#data-protection#data-governance#security-strategy
2019-03-02PanelNullcon Actionable Intelligence and Cyber Security Video Durga Dube, M v Sheshadri, Rahul Sasi, Shrikant Shitole, Alan White#data-analytics#incident-management#security-analytics+4
2018-10-05TalkC0c0n Data management challenge for Privacy compliance Maria Bellarmine#data-protection#security-compliance#data-governance+2
2018-10-05TalkC0c0n OSINT : Indian Citizen Edition Anant Shrivastava#osint#data-governance#identity-theft+2
2018-08-08Tool demoBlackhat DataSploit 2.0 Source Code Kunal Aggarwal, Shubham Mittal#osint#reconnaissance#data-governance+4
2017-07-26Tool demoBlackhat Datasploit - Automated Open Source Intelligence (OSINT) Tool Source Code Kunal Aggarwal, Shubham Mittal, Sudhanshu Chauhan#osint#reconnaissance#social-engineering+4
2016-03-11TalkNullcon Real-time Ingestion of security telemetry data into Hadoop distributed system to respond to 0-day Presentation Pallav Jakhotiya, Vipul Sawant#secure-development#blueteam#data-analytics+3
2014-02-14TalkNullcon User Privacy in Cellular Networks Ravishankar Borgaonkar#data-protection#network-architecture#data-governance+2
2012-08-03TalkC0c0n Data Security Alok Vijayant, S Bhansali#data-protection#encryption#data-loss-prevention+3
2009-12-04TalkClubhack Facilitate Collaboration with Information Rights Management Abhijit Tannu#information-rights-management#data-protection#application-hardening+4
2007-12-09TalkClubhack 7 years of Indian IT act - 7 Best Cases Presentation Whitepaper Rohas Nagpal#cyber-law#data-governance