| 2025-04-29 | Talk | Rsac |
RAG-NAROK: What Poorly-Built RAGs Can Do to Data Security
| Akash Mukherjee, Saurabh Shintre | #secure-development#devsecops#data-protection+1 |
| 2025-03-02 | Talk | Nullcon |
eKYC Crisis: Securing the Lockers
| Kartik Lalan | #risk-management#architecture#data-leak+4 |
| 2025-03-01 | Panel | Nullcon |
Navigating Data Protection in the age of globalisation
| Saikat Datta, Krishan Dev | #data-protection#gdpr#data-governance+4 |
| 2024-08-08 | Tool demo | Blackhat |
Octopii v2
| Owais Shaikh | #red-teaming#ai-security#nlp+2 |
| 2024-05-06 | Talk | Rsac |
Headspace’s Privacy Operations Center and Vault
| Shobhit Mehta, Puneet Thapliyal | #data-protection#security-operations-center#security-compliance+1 |
| 2024-04-18 | Tool demo | Blackhat |
MORF - Mobile Reconnaissance Framework
| Amrudesh Balakrishnan, Abhishek Jm, Himanshu Das | #reconnaissance#application-pentesting#static-analysis+3 |
| 2023-12-06 | Tool demo | Blackhat |
AndroCop: One Click Forensic Investigation & Data Extraction Tool
| Abhinand N, Aswin M Guptha, Varun Nair | #android#android-security#mobile-forensics+4 |
| 2023-12-06 | Tool demo | Blackhat |
HAWK Eye - PII & Secret Detection tool for your Servers, Database, Filesystems, Cloud Storage Services
| Rohit Kumar | #bug-hunting#data-loss-prevention#data-protection+4 |
| 2023-12-06 | Tool demo | Blackhat |
MORF - Mobile Reconnaissance Framework
| Abhishek Jm, Amrudesh Balakrishnan, Himanshu Das | #reconnaissance#application-pentesting#static-analysis+3 |
| 2023-12-06 | Tool demo | Blackhat |
Octopii v2
| Owais Shaikh, Umair Nehri | #ai#data-protection#nlp+4 |
| 2023-09-24 | Panel | Nullcon |
A CYBER-PHYSICAL SYSTEM FOR INDIA WITH SECURITY, PRIVACY, AND EQUITY
| Kunal Korgaonkar, Kapil Jaiswal, Malcolm Dsouza, Manoj Aggarwal, Niraj Sharma | #cyber-physical-systems#security-strategy#data-protection+1 |
| 2023-09-23 | Panel | Nullcon |
DATA PROTECTION LAW AND ITS POTENTIAL IMPLICATIONS FOR THE INDUSTRY
| Burgess Cooper, Ashish Bhadouria, Jimmi Thakkar, Sunil Bajpai | #data-protection#gdpr#cyber-law |
| 2023-09-23 | Talk | Nullcon |
Your App Is Probably A Spyware…Or Is It?
| Gaurav Gogia, Pandurang Patil | #spyware#secure-development#security-testing+3 |
| 2023-08-07 | Panel | C0c0n |
DPDP Act - Transformation challenges for BFSI
| Linson Paul, Venugopal Parameswara, Biju K, Babitha B P, Santosh Khadsare | #data-protection#gdpr#compliance-frameworks+4 |
| 2023-08-07 | Talk | C0c0n |
Homomorphic Encryption - Myth to Reality
| Anish Koshy | #encryption#architecture#data-protection+1 |
| 2023-08-07 | Talk | C0c0n |
The DPDPA Effect: Jubilation, Twinge and Reticence that followed
| Rahul Sharma | #security-compliance#security-governance#data-protection+1 |
| 2023-08-06 | Talk | C0c0n |
A Secure Privacy-Preserving Lightweight Authentication Scheme for Internet of Medical Things
| Panchami V, Mahima Mary Mathews | #authentication#data-protection#embedded-security |
| 2023-08-06 | Talk | C0c0n |
Digital Innovation and its Impact on CIOs, CISOs and DPOs
| Navaneethan M | #security-compliance#security-governance#risk-management+2 |
| 2023-08-06 | Talk | C0c0n |
Securing the Future: Addressing Cybersecurity Challenges in the Age of 5G
| Altaf Shaik | #zero-trust#supply-chain-security#attack-surface+4 |
| 2023-05-11 | Tool demo | Blackhat |
MORF - Mobile Reconnaissance Framework
| Abhishek Jm, Amrudesh Balakrishnan, Himanshu Das | #reconnaissance#application-pentesting#static-analysis+3 |
| 2023-01-26 | Talk | Usenix |
Building an Automated Machine for Discovering Privacy Violations at Scale
| Suchakra Sharma | #static-analysis#secure-coding#data-protection+2 |
| 2022-09-24 | Panel | C0c0n |
Data sovereignty - Challenges and the road ahead
| Sanjeev Sharma, Saranga Rajan, A Muralidhar, Jojy Joy | #data-governance#data-protection#gdpr+2 |
| 2022-09-23 | Panel | C0c0n |
Customer, Credit & Risk - Fintech trends 2022
| Maya R Nair, Balakrishnan A, A Shiju Rawther, Linson Paul, Shivanath Somanathan | #financial-institutions#data-protection#identity-theft+2 |
| 2022-09-07 | Talk | Nullcon |
Do PDF Tools Conform To The Specification?
| Prashant Anantharaman | #pdf#data-protection#static-analysis+4 |
| 2022-09-07 | Talk | Nullcon |
Honey, I Just Put The Hospital On A Ventilator! - DICOM And Its Pitfalls
| Shyam Sundar Ramaswami, Rakesh Mahanthi | #vulnerability-assessment#hmi#data-protection+1 |
| 2022-09-06 | Panel | Nullcon |
Cloud Services for Financial Inclusion: Possibilities & Challenges
| Nandkumar Saravade, Ganesh Ar, Himanshu Das, Navin Kumar Singh | #cloud-compliance#cloud-monitoring#financial-institutions+2 |
| 2022-08-11 | Tool demo | Blackhat |
Octopii - AI-powered Personal Identifiable Information (PII) scanner
| Owais Shaikh | #ai#ai-security#data-protection+4 |
| 2022-08-11 | Talk | Thedianainitiative |
The Real Cost of Free: What you need to know before downloading a free app
| Ruchira Pokhriyal | #app-security#data-protection#security-training+1 |
| 2022-08-10 | Talk | Blackhat |
Attacks From a New Front Door in 4G & 5G Mobile Networks
| Altaf Shaik, Shinjo Park, Matteo Strada | #api-security#access-management#identity-theft+4 |
| 2022-07-24 | Talk | Maycontainhackers |
No Permissions Needed!
| Aditi Bhatnagar | #android-security#data-protection#mobile-pentesting+1 |
| 2022-07-23 | Talk | Hope |
Combating Ransom-War: Evolving Landscape of Ransomware Infections in Cloud Databases
| Aditya K Sood | #ransomware#cloud-pentesting#data-protection |
| 2022-07-23 | Talk | Maycontainhackers |
How would a real life social media be like?
| Aditi Bhatnagar | #data-protection#security-training#risk-management+3 |
| 2021-11-12 | Talk | C0c0n |
Data Security and Privacy
| Abhilasha Vyas | #data-protection#encryption#data-loss-prevention+3 |
| 2021-11-10 | Tool demo | Blackhat |
Wireshark Forensics Toolkit
| Rishikesh Bhide | #forensics#network-forensics#data-protection |
| 2021-03-05 | Panel | Nullcon |
Tech Startups/Businesses and Infonomics
| Sourabh Issar, Burgess Cooper, Joerg Simon | #data-governance#data-protection#cybersecurity-strategy+1 |
| 2020-09-18 | Keynote | C0c0n |
Data protection and Privacy Data protection and Privacy
| Kris Gopalakrishnan | #ai-security#data-protection#identity-theft+2 |
| 2020-08-07 | Panel | Defcon |
D0 N0 H4RM: A Healthcare Security Conversation
| Vidha Murthy, Christian Dameff, Jeff Tully, Jessica Wilkerson, Veronica Schmitt, Ash Luft | #data-protection#identity-management#security-training+3 |
| 2020-03-07 | Panel | Nullcon |
Economics Of Data Breach And Attack
| Bhaskar Medhi, Manu Zacharia, Suchit Mishra, Yash Kadakia | #data-loss-prevention#data-protection#cybersecurity-strategy+4 |
| 2019-12-04 | Tool demo | Blackhat |
DumpTheGit
| Malkit Singh | #reconnaissance#data-leak#data-protection+1 |
| 2019-09-28 | Panel | C0c0n |
Implementing Data Protection Frameworks with evolving Technology-Challenges, Opportunities & Solutions
| B R Nath, Jijy Oommen, Maya R Nair, Ajay Porus, Georgie Kurien | #data-protection#data-governance#security-strategy |
| 2019-09-27 | Talk | C0c0n |
Demystifying HealthCare Security
| Ajay Pratap Singh | #blueteam#data-protection#identity-theft+4 |
| 2019-09-27 | Talk | C0c0n |
Securing Payment Data with PCI Security Standards and Programs
| Nitin Bhatnagar | #blueteam#data-protection#secure-development+3 |
| 2019-09-27 | Panel | C0c0n |
Shouldn’t Organization disclose breaches - The need for a shared platform
| Sunil Varkey, Jacxine Fernandez, Rahul Sasi, K K Chaudhary | #data-leak#data-protection#security-testing+4 |
| 2019-08-29 | Keynote | Hitbsecconf |
The CISO’s Dilemma
| Saumil Shah | #blueteam#compliance-governance#security-strategy+4 |
| 2019-08-08 | Talk | Defcon |
YOUR PHONE IS USING TOR AND LEAKING YOUR PII
| Milind Bhargava, Adam Podgorski | #data-protection#security-assessment#tor+1 |
| 2018-12-05 | Talk | Blackhat |
The Undeniable Truth: How Remote Attestation Circumvents Deniability Guarantees in Secure Messaging Protocols
| N Asokan, Lachlan Gunn, Ricardo Vieitez Parra | #red-teaming#encryption#threat-modeling+1 |
| 2018-10-05 | Talk | C0c0n |
Data management challenge for Privacy compliance
| Maria Bellarmine | #data-protection#security-compliance#data-governance+2 |
| 2018-10-05 | Talk | C0c0n |
Predictive policing using Big Data analytics.
| Tarun Wig | #blueteam#data-analytics#data-protection+3 |
| 2018-10-05 | Talk | C0c0n |
Privacy And Data Protection: Stakeholders’ Perspectives
| Rahul Sharma | #blueteam#data-protection#gdpr+4 |
| 2018-08-11 | Talk | Defcon |
Compression Oracle Attacks on VPN Networks
| Ahamed Nafeez | #vpn#network-architecture#application-pentesting+3 |
| 2018-08-11 | Tool demo | Defcon |
HealthyPi—Connected Health
| Ashwin Whitchurch | #raspberry-pi#hardware-embedded#embedded-systems+4 |
| 2018-08-11 | Tool demo | Defcon |
Local Sheriff
| Konark Modi | #reconnaissance#blueteam#data-leak+4 |
| 2018-08-09 | Talk | Defcon |
Anonymous rate-limiting in services with Direct Anonymous Attestation
| Konark Modi, Alex Catarineu | #data-protection#architecture#security-strategy+1 |
| 2018-03-13 | Talk | Troopers |
Securing your in-ear fitness coach: Challenges in hardening next generation wearables
| Sumanth Naropanth, Kavya Racharla | #secure-development#data-protection#architecture |
| 2018-03-03 | Panel | Nullcon |
Forensic Challenges and Road Ahead
| Manu Zacharia, Brijesh Singh, Sanjay Bahl, Vladimir Katalov | #data-leak#data-protection#forensics+4 |
| 2017-04-14 | Talk | Hitbsecconf |
Is There a Doctor in The House? Hacking Medical Devices and Healthcare Infrastructure
| Anirudh Duggal | #red-teaming#application-pentesting#data-protection+3 |
| 2016-10-13 | Talk | Appsecusa |
When encryption is not enough: Attacking Wearable - Mobile Application communication over BLE
| Sumanth Naropanth, Kavya Racharla, Chandra Prakash Gopalaiah | #reverse-engineering#secure-development#ble+4 |
| 2016-08-04 | Talk | Blackhat |
Understanding HL7 2.x Standards Pen Testing and Defending HL7 2.x Messages
| Anirudh Duggal | #ics-security#risk-management#application-pentesting+3 |
| 2016-05-17 | Talk | Phdays |
Fingerprinting and Attacking a Healthcare Infrastructure
| Anirudh Duggal | #red-teaming#fingerprinting#ransomware+4 |
| 2015-11-05 | Talk | Groundzerosummit |
Cyber Security in Hospitals:Hospitals Under Seige
| Anirudh Duggal | #hl7#data-protection#incident-management |
| 2015-11-05 | Talk | Groundzerosummit |
OSINT Black Magic: Listen who whispers your name in the dark!!!
| Sudhanshu Chauhan, Nutan Kumar Panda | #osint#deep-web#data-leak+4 |
| 2015-02-06 | Talk | Nullcon |
Anatomy of a credit card stealing POS malware
| Amol Sarwate | #red-teaming#application-pentesting#data-protection+1 |
| 2014-09-28 | Talk | Blackhat |
Understanding IMSI Privacy
| Swapnil Udar, Ravishankar Borgaonkar | #imsi#red-teaming#android+4 |
| 2014-02-14 | Talk | Nullcon |
User Privacy in Cellular Networks
| Ravishankar Borgaonkar | #data-protection#network-architecture#data-governance+2 |
| 2012-09-05 | Talk | 44con |
Why Integrity is left alone and not given TLC (Tender, Love and Care) it deserves?
| Jitender Arora | #data-protection#security-strategy#threat-modeling+3 |
| 2012-08-03 | Talk | C0c0n |
Data Security
| Alok Vijayant, S Bhansali | #data-protection#encryption#data-loss-prevention+3 |
| 2012-08-03 | Talk | C0c0n |
The Management of Information Security – A Corporate Practitioner’s Perspective
| Pawan Kumar Singh | #cyber-law#security-strategy#data-protection+2 |
| 2011-10-07 | Talk | C0c0n |
Section 43A IT Act compliance
| Sagar Rahurkar | #cyber-law#compliance-frameworks#cybersecurity-strategy+1 |
| 2011-09-07 | Talk | Securitybyte |
Data Protection
| Dipankar Roy | #blueteam#data-loss-prevention#data-protection+1 |
| 2011-09-07 | Talk | Securitybyte |
Social Web & Privacy – An evolving world
| Bala Sathiamurthy, Aridaman Tripathi | #data-protection#api-security#security-compliance+2 |
| 2011-02-25 | Talk | Nullcon |
Protect infrastructure or protect information – Lessons from Wikileaks
| Vishal Gupta | #data-leak#blueteam#data-protection+2 |
| 2010-07-30 | Talk | Defcon |
Hacking Oracle From Web Apps
| Sumit Siddharth | #sql-injection#application-pentesting#security-testing+2 |
| 2010-07-29 | Talk | Blackhat |
Hacking Oracle From Web Apps
| Sumit Siddharth | #red-teaming#sql-injection#application-pentesting+3 |
| 2009-12-05 | Talk | Clubhack |
Advance Computer Forensic concepts (windows)
| Kush Wadhwa | #forensics#windows#data-protection |
| 2009-12-04 | Talk | Clubhack |
Facilitate Collaboration with Information Rights Management
| Abhijit Tannu | #information-rights-management#data-protection#application-hardening+4 |
| 2009-11-17 | Talk | Securitybyte |
Usability and Privacy in Security
| Ponnurangam Kumaraguru | #data-protection#architecture#security-training+2 |
| 2009-08-06 | Talk | C0c0n |
Management & Security of Large Scale Storage Devices
| Prashant Dinde | #blueteam#data-protection#security-strategy+2 |
| 2007-12-09 | Talk | Clubhack |
Mining Digital Evidence in Microsoft Windows – Answering Who, When, Why and How?
| Chetan Gupta | #forensics#windows#data-loss-prevention+4 |
| 2001-07-13 | Talk | Defcon |
Security & Privacy are Critically Important Issues in Todays Digitally Connected Age
| Sharad Popli | #security-assessment#data-protection#blueteam |