🧪 Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Data Protection

Focus Area: 🔒 Data Privacy & Protection
79
Total Entries
108
Contributors

Top Contributors

Anirudh Duggal(4) Himanshu Das(4) Abhishek Jm(3) Amrudesh Balakrishnan(3) Owais Shaikh(3)

All Entries (79 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-04-29TalkRsac RAG-NAROK: What Poorly-Built RAGs Can Do to Data Security Whitepaper Video Akash Mukherjee, Saurabh Shintre#secure-development#devsecops#data-protection+1
2025-03-02TalkNullcon eKYC Crisis: Securing the Lockers Video Kartik Lalan#risk-management#architecture#data-leak+4
2025-03-01PanelNullcon Navigating Data Protection in the age of globalisation Saikat Datta, Krishan Dev#data-protection#gdpr#data-governance+4
2024-08-08Tool demoBlackhat Octopii v2 Source Code Owais Shaikh#red-teaming#ai-security#nlp+2
2024-05-06TalkRsac Headspace’s Privacy Operations Center and Vault Video Shobhit Mehta, Puneet Thapliyal#data-protection#security-operations-center#security-compliance+1
2024-04-18Tool demoBlackhat MORF - Mobile Reconnaissance Framework Source Code Amrudesh Balakrishnan, Abhishek Jm, Himanshu Das#reconnaissance#application-pentesting#static-analysis+3
2023-12-06Tool demoBlackhat AndroCop: One Click Forensic Investigation & Data Extraction Tool Abhinand N, Aswin M Guptha, Varun Nair#android#android-security#mobile-forensics+4
2023-12-06Tool demoBlackhat HAWK Eye - PII & Secret Detection tool for your Servers, Database, Filesystems, Cloud Storage Services Source Code Rohit Kumar#bug-hunting#data-loss-prevention#data-protection+4
2023-12-06Tool demoBlackhat MORF - Mobile Reconnaissance Framework Source Code Abhishek Jm, Amrudesh Balakrishnan, Himanshu Das#reconnaissance#application-pentesting#static-analysis+3
2023-12-06Tool demoBlackhat Octopii v2 Source Code Owais Shaikh, Umair Nehri#ai#data-protection#nlp+4
2023-09-24PanelNullcon A CYBER-PHYSICAL SYSTEM FOR INDIA WITH SECURITY, PRIVACY, AND EQUITY Kunal Korgaonkar, Kapil Jaiswal, Malcolm Dsouza, Manoj Aggarwal, Niraj Sharma#cyber-physical-systems#security-strategy#data-protection+1
2023-09-23PanelNullcon DATA PROTECTION LAW AND ITS POTENTIAL IMPLICATIONS FOR THE INDUSTRY Burgess Cooper, Ashish Bhadouria, Jimmi Thakkar, Sunil Bajpai#data-protection#gdpr#cyber-law
2023-09-23TalkNullcon Your App Is Probably A Spyware…Or Is It? Presentation Gaurav Gogia, Pandurang Patil#spyware#secure-development#security-testing+3
2023-08-07PanelC0c0n DPDP Act - Transformation challenges for BFSI Video Linson Paul, Venugopal Parameswara, Biju K, Babitha B P, Santosh Khadsare#data-protection#gdpr#compliance-frameworks+4
2023-08-07TalkC0c0n Homomorphic Encryption - Myth to Reality Video Anish Koshy#encryption#architecture#data-protection+1
2023-08-07TalkC0c0n The DPDPA Effect: Jubilation, Twinge and Reticence that followed Video Rahul Sharma#security-compliance#security-governance#data-protection+1
2023-08-06TalkC0c0n A Secure Privacy-Preserving Lightweight Authentication Scheme for Internet of Medical Things Video Panchami V, Mahima Mary Mathews#authentication#data-protection#embedded-security
2023-08-06TalkC0c0n Digital Innovation and its Impact on CIOs, CISOs and DPOs Navaneethan M#security-compliance#security-governance#risk-management+2
2023-08-06TalkC0c0n Securing the Future: Addressing Cybersecurity Challenges in the Age of 5G Video Altaf Shaik#zero-trust#supply-chain-security#attack-surface+4
2023-05-11Tool demoBlackhat MORF - Mobile Reconnaissance Framework Source Code Abhishek Jm, Amrudesh Balakrishnan, Himanshu Das#reconnaissance#application-pentesting#static-analysis+3
2023-01-26TalkUsenix Building an Automated Machine for Discovering Privacy Violations at Scale Video Suchakra Sharma#static-analysis#secure-coding#data-protection+2
2022-09-24PanelC0c0n Data sovereignty - Challenges and the road ahead Sanjeev Sharma, Saranga Rajan, A Muralidhar, Jojy Joy#data-governance#data-protection#gdpr+2
2022-09-23PanelC0c0n Customer, Credit & Risk - Fintech trends 2022 Maya R Nair, Balakrishnan A, A Shiju Rawther, Linson Paul, Shivanath Somanathan#financial-institutions#data-protection#identity-theft+2
2022-09-07TalkNullcon Do PDF Tools Conform To The Specification? Presentation Video Prashant Anantharaman#pdf#data-protection#static-analysis+4
2022-09-07TalkNullcon Honey, I Just Put The Hospital On A Ventilator! - DICOM And Its Pitfalls Presentation Video Shyam Sundar Ramaswami, Rakesh Mahanthi#vulnerability-assessment#hmi#data-protection+1
2022-09-06PanelNullcon Cloud Services for Financial Inclusion: Possibilities & Challenges Video Nandkumar Saravade, Ganesh Ar, Himanshu Das, Navin Kumar Singh#cloud-compliance#cloud-monitoring#financial-institutions+2
2022-08-11Tool demoBlackhat Octopii - AI-powered Personal Identifiable Information (PII) scanner Source Code Owais Shaikh#ai#ai-security#data-protection+4
2022-08-11TalkThedianainitiative The Real Cost of Free: What you need to know before downloading a free app Video Ruchira Pokhriyal#app-security#data-protection#security-training+1
2022-08-10TalkBlackhat Attacks From a New Front Door in 4G & 5G Mobile Networks Presentation Video Altaf Shaik, Shinjo Park, Matteo Strada#api-security#access-management#identity-theft+4
2022-07-24TalkMaycontainhackers No Permissions Needed! Video Aditi Bhatnagar#android-security#data-protection#mobile-pentesting+1
2022-07-23TalkHope Combating Ransom-War: Evolving Landscape of Ransomware Infections in Cloud Databases Video Aditya K Sood#ransomware#cloud-pentesting#data-protection
2022-07-23TalkMaycontainhackers How would a real life social media be like? Aditi Bhatnagar#data-protection#security-training#risk-management+3
2021-11-12TalkC0c0n Data Security and Privacy Abhilasha Vyas#data-protection#encryption#data-loss-prevention+3
2021-11-10Tool demoBlackhat Wireshark Forensics Toolkit Source Code Rishikesh Bhide#forensics#network-forensics#data-protection
2021-03-05PanelNullcon Tech Startups/Businesses and Infonomics Video Sourabh Issar, Burgess Cooper, Joerg Simon#data-governance#data-protection#cybersecurity-strategy+1
2020-09-18KeynoteC0c0n Data protection and Privacy Data protection and Privacy Video Kris Gopalakrishnan#ai-security#data-protection#identity-theft+2
2020-08-07PanelDefcon D0 N0 H4RM: A Healthcare Security Conversation Video Vidha Murthy, Christian Dameff, Jeff Tully, Jessica Wilkerson, Veronica Schmitt, Ash Luft#data-protection#identity-management#security-training+3
2020-03-07PanelNullcon Economics Of Data Breach And Attack Video Bhaskar Medhi, Manu Zacharia, Suchit Mishra, Yash Kadakia#data-loss-prevention#data-protection#cybersecurity-strategy+4
2019-12-04Tool demoBlackhat DumpTheGit Source Code Malkit Singh#reconnaissance#data-leak#data-protection+1
2019-09-28PanelC0c0n Implementing Data Protection Frameworks with evolving Technology-Challenges, Opportunities & Solutions B R Nath, Jijy Oommen, Maya R Nair, Ajay Porus, Georgie Kurien#data-protection#data-governance#security-strategy
2019-09-27TalkC0c0n Demystifying HealthCare Security Ajay Pratap Singh#blueteam#data-protection#identity-theft+4
2019-09-27TalkC0c0n Securing Payment Data with PCI Security Standards and Programs Nitin Bhatnagar#blueteam#data-protection#secure-development+3
2019-09-27PanelC0c0n Shouldn’t Organization disclose breaches - The need for a shared platform Video Sunil Varkey, Jacxine Fernandez, Rahul Sasi, K K Chaudhary#data-leak#data-protection#security-testing+4
2019-08-29KeynoteHitbsecconf The CISO’s Dilemma Presentation Video Saumil Shah#blueteam#compliance-governance#security-strategy+4
2019-08-08TalkDefcon YOUR PHONE IS USING TOR AND LEAKING YOUR PII Presentation Milind Bhargava, Adam Podgorski#data-protection#security-assessment#tor+1
2018-12-05TalkBlackhat The Undeniable Truth: How Remote Attestation Circumvents Deniability Guarantees in Secure Messaging Protocols Presentation Whitepaper Video N Asokan, Lachlan Gunn, Ricardo Vieitez Parra#red-teaming#encryption#threat-modeling+1
2018-10-05TalkC0c0n Data management challenge for Privacy compliance Maria Bellarmine#data-protection#security-compliance#data-governance+2
2018-10-05TalkC0c0n Predictive policing using Big Data analytics. Tarun Wig#blueteam#data-analytics#data-protection+3
2018-10-05TalkC0c0n Privacy And Data Protection: Stakeholders’ Perspectives Rahul Sharma#blueteam#data-protection#gdpr+4
2018-08-11TalkDefcon Compression Oracle Attacks on VPN Networks Presentation Ahamed Nafeez#vpn#network-architecture#application-pentesting+3
2018-08-11Tool demoDefcon HealthyPi—Connected Health Source Code Ashwin Whitchurch#raspberry-pi#hardware-embedded#embedded-systems+4
2018-08-11Tool demoDefcon Local Sheriff Source Code Konark Modi#reconnaissance#blueteam#data-leak+4
2018-08-09TalkDefcon Anonymous rate-limiting in services with Direct Anonymous Attestation Presentation Video Konark Modi, Alex Catarineu#data-protection#architecture#security-strategy+1
2018-03-13TalkTroopers Securing your in-ear fitness coach: Challenges in hardening next generation wearables Presentation Video Sumanth Naropanth, Kavya Racharla#secure-development#data-protection#architecture
2018-03-03PanelNullcon Forensic Challenges and Road Ahead Video Manu Zacharia, Brijesh Singh, Sanjay Bahl, Vladimir Katalov#data-leak#data-protection#forensics+4
2017-04-14TalkHitbsecconf Is There a Doctor in The House? Hacking Medical Devices and Healthcare Infrastructure Presentation Video Anirudh Duggal#red-teaming#application-pentesting#data-protection+3
2016-10-13TalkAppsecusa When encryption is not enough: Attacking Wearable - Mobile Application communication over BLE Video Sumanth Naropanth, Kavya Racharla, Chandra Prakash Gopalaiah#reverse-engineering#secure-development#ble+4
2016-08-04TalkBlackhat Understanding HL7 2.x Standards Pen Testing and Defending HL7 2.x Messages Video Anirudh Duggal#ics-security#risk-management#application-pentesting+3
2016-05-17TalkPhdays Fingerprinting and Attacking a Healthcare Infrastructure Presentation Anirudh Duggal#red-teaming#fingerprinting#ransomware+4
2015-11-05TalkGroundzerosummit Cyber Security in Hospitals:Hospitals Under Seige Anirudh Duggal#hl7#data-protection#incident-management
2015-11-05TalkGroundzerosummit OSINT Black Magic: Listen who whispers your name in the dark!!! Presentation Source Code Sudhanshu Chauhan, Nutan Kumar Panda#osint#deep-web#data-leak+4
2015-02-06TalkNullcon Anatomy of a credit card stealing POS malware Presentation Video Amol Sarwate#red-teaming#application-pentesting#data-protection+1
2014-09-28TalkBlackhat Understanding IMSI Privacy Presentation Video Swapnil Udar, Ravishankar Borgaonkar#imsi#red-teaming#android+4
2014-02-14TalkNullcon User Privacy in Cellular Networks Ravishankar Borgaonkar#data-protection#network-architecture#data-governance+2
2012-09-05Talk44con Why Integrity is left alone and not given TLC (Tender, Love and Care) it deserves? Video Jitender Arora#data-protection#security-strategy#threat-modeling+3
2012-08-03TalkC0c0n Data Security Alok Vijayant, S Bhansali#data-protection#encryption#data-loss-prevention+3
2012-08-03TalkC0c0n The Management of Information Security – A Corporate Practitioner’s Perspective Pawan Kumar Singh#cyber-law#security-strategy#data-protection+2
2011-10-07TalkC0c0n Section 43A IT Act compliance Sagar Rahurkar#cyber-law#compliance-frameworks#cybersecurity-strategy+1
2011-09-07TalkSecuritybyte Data Protection Dipankar Roy#blueteam#data-loss-prevention#data-protection+1
2011-09-07TalkSecuritybyte Social Web & Privacy – An evolving world Bala Sathiamurthy, Aridaman Tripathi#data-protection#api-security#security-compliance+2
2011-02-25TalkNullcon Protect infrastructure or protect information – Lessons from Wikileaks Presentation Vishal Gupta#data-leak#blueteam#data-protection+2
2010-07-30TalkDefcon Hacking Oracle From Web Apps Video Sumit Siddharth#sql-injection#application-pentesting#security-testing+2
2010-07-29TalkBlackhat Hacking Oracle From Web Apps Presentation Whitepaper Video Sumit Siddharth#red-teaming#sql-injection#application-pentesting+3
2009-12-05TalkClubhack Advance Computer Forensic concepts (windows) Presentation Kush Wadhwa#forensics#windows#data-protection
2009-12-04TalkClubhack Facilitate Collaboration with Information Rights Management Abhijit Tannu#information-rights-management#data-protection#application-hardening+4
2009-11-17TalkSecuritybyte Usability and Privacy in Security Presentation Ponnurangam Kumaraguru#data-protection#architecture#security-training+2
2009-08-06TalkC0c0n Management & Security of Large Scale Storage Devices Prashant Dinde#blueteam#data-protection#security-strategy+2
2007-12-09TalkClubhack Mining Digital Evidence in Microsoft Windows – Answering Who, When, Why and How? Presentation Chetan Gupta#forensics#windows#data-loss-prevention+4
2001-07-13TalkDefcon Security & Privacy are Critically Important Issues in Todays Digitally Connected Age Video Sharad Popli#security-assessment#data-protection#blueteam