πŸ§ͺ Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Devsecops

Focus Area: πŸ” Application Security
81
Total Entries
93
Contributors

Top Contributors

Vandana Verma Sehgal(4) Pravir Chandra(3) Anant Shrivastava(2) Devdatta Akhawe(2) Dhanith Krishna(2)

All Entries (81 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-12-11Tool demoBlackhat From Triage to Threat Modeling: Open-Source Security LLM in Action Source Code Dhruv Kedia, Sajana Weerawardhena#ai-security#threat-modeling#vulnerability-assessment+1
2025-12-11Tool demoBlackhat SupplyShield: Protecting Your Software Supply Chain Source Code Rahul Sunder, Yadhu Krishna M, Hritik Vijay, Sourav Kumar#supply-chain#sbom#software-composition-analysis+3
2025-12-10Tool demoBlackhat Catch the Flow: Securing CI/CD Workflows with Flowlyt Source Code Hare Krishna Rai, K v Prashant, Nandan Gupta#ci-cd#supply-chain#devsecops+1
2025-12-10Tool demoBlackhat Securing Secrets from Dev Machine to Deployments Using SLV Source Code Shibly Meeran, Sriram Krishnan, Keshav Kandasamy#devsecops#cicd-security#supply-chain
2025-10-10TalkC0c0n Ghosts in Your GitHub Actions and AI’s Hunt for Hidden Exploits Source Code Suchith Narayan#supply-chain#supply-chain-attack#devsecops+1
2025-08-07Tool demoBlackhat AzDevRecon - Azure DevOps Enumeration Tool Source Code Raunak Parmar#azure#devsecops#iam
2025-08-07Tool demoBlackhat Pentest Copilot: Cursor for Pentesters Source Code Dhruva Goyal, Sitaraman Subramanian#security-assessment#application-pentesting#vulnerability-assessment+1
2025-08-06Tool demoBlackhat Open-Source API Firewall by Wallarm - Advanced Protection for REST and GraphQL APIs Source Code Satinder Khasriya#api-security#web-security#owasp+1
2025-08-06Tool demoBlackhat ParseAndC 4.0 - The Final Cut Source Code Parbati Kumar Manna#reverse-engineering#binary-analysis#code-analysis+4
2025-08-06Tool demoBlackhat Realtic Source Code Sohan Simha Prabhakar, Samarth Bhaskar Bhat, Danindu Gammanpilage#security-assessment#vulnerability-assessment#static-analysis+3
2025-08-06Tool demoBlackhat ThreatShield - The Intelligent way of Threat Modelling Source Code Ashwin Shenoi, Satyam Nagpal, Sayooj B Kumar#threat-modeling#architecture#devsecops+1
2025-08-06Tool demoBlackhat Varunastra: Securing the Depths of Docker V2 Source Code Devang Solanki#container-security#docker#static-analysis+3
2025-08-06Tool demoBlackhat vet: Proactive Guardrails against Malicious OSS using Code Analysis Source Code Abhisek Datta#static-analysis#software-security#devsecops+2
2025-08-06TalkBlackhat When ‘Changed Files’ Changed Everything: Uncovering and Responding to the tj-actions Supply Chain Breach Presentation Whitepaper Video Varun Sharma, Ashish Kurmi#ci-cd#incident-management#devsecops+2
2025-04-30TalkRsac Got Supply Pain? A Real-World Approach to Supply Chain SDL Video Mohit Arora, Richard Tonry#secure-development#devsecops#risk-management+4
2025-04-29TalkRsac RAG-NAROK: What Poorly-Built RAGs Can Do to Data Security Whitepaper Video Akash Mukherjee, Saurabh Shintre#secure-development#devsecops#data-protection+1
2025-03-02TalkNullcon Hidden in Plain Sight: Large-Scale Exposure of Orphaned Commits on Major Git Platforms Presentation Video Kumar Ashwin#secure-coding#devsecops#architecture
2024-11-15TalkC0c0n CISO’s take on BYOAI Video Venugopal Parameswara#risk-management#security-governance#security-compliance+3
2024-10-23Tool demoBlackhat Cyber Arsenal47 Simardeep Singh#automated-scanning#vulnerability-assessment#security-assessment+2
2024-05-07TalkRsac A Proven Approach on Automated Security Architectural Pattern Validation Video Sunil Arora, Parthasarathi Chakraborty#architecture#devsecops#risk-management+1
2024-04-18Tool demoBlackhat Mantis - Asset Discovery at Scale Source Code Ankur Bhargava, Prateek Thakare, Saddam Hussain#asset-inventory#architecture#devsecops+1
2023-09-28TalkHackinparis How to have visibility and security OF CICD ecosystem Pramod Rana#cicd-security#devsecops#architecture+4
2023-08-12TalkDefcon Getting More Bang for your Buck:Appsec on a Limited Budget Video Vandana Verma Sehgal, Viraj Gandhi#secure-development#devsecops#risk-management+2
2023-08-12Tool demoDefcon Open Source API Security for devsecops Source Code Ankush Jain, Ankita Gupta 1#api-security#devsecops#ci-cd+2
2023-08-07TalkC0c0n Homomorphic Encryption - Myth to Reality Video Anish Koshy#encryption#architecture#data-protection+1
2023-08-07TalkC0c0n Shifting left blockchain development for safer DApps Video Dhanith Krishna#smart-contracts#secure-development#devsecops+2
2023-08-07TalkC0c0n Start Left SDLC Security with Open-Source DevSecOps Tooling Video Aswin Raj, Shruti M G#devsecops#secure-development#static-analysis+3
2023-08-06TalkC0c0n Influence of Artificial Intelligence in GRC Space Mahesh Kalyanaraman#security-governance#risk-management#security-compliance+2
2023-08-06TalkC0c0n Mitigating SSRF at scale the right way with IMDSv2! Video Ayush Priya#web-security#api-security#aws+2
2023-08-06TalkC0c0n Surviving In Dependency Hell Video Kumar Ashwin#secure-development#devsecops#software-security
2023-08-06TalkC0c0n Taking a Closer Look at CI/CD Pipeline Logs: Extracting Security-Related Information with Build Inspector Video Anshu Kumar, Pavan Sorab#devsecops#ci-cd#cicd-pipeline+2
2023-08-06TalkC0c0n The new way to be secure Video Sakshi Bhutani#secure-development#devsecops#software-security+3
2023-04-26TalkRsac Designing Product Security for a Brighter Smile and a Healthier Tomorrow Presentation Video Lokesh Pidawekar, Apoorva Phadke#secure-development#devsecops#software-security+2
2023-04-26TalkRsac Is Increasing Security Maturity And Decreasing Operational Load Possible? Video Rohit Dhamankar#risk-management#architecture#security-governance+1
2023-03-23TalkInsomnihack How to have visibility and security OF CICD ecosystem Video Pramod Rana#ci-cd#devsecops#supply-chain-security+3
2022-09-24TalkC0c0n Building Smart, Resilient and Sustainable Cyber Eco System Navin Kumar Singh#risk-management#cybersecurity-strategy#architecture+4
2022-09-24TalkC0c0n In production with GRC for cloud Mahesh Kalyanaraman#cloud-compliance#security-governance#risk-management+1
2022-09-23TalkC0c0n Bridging the gap between Security and Operations Sujay Rajashekar Gundagatti#devsecops#architecture#threat-detection+2
2022-09-23TalkC0c0n Building a Safer and Innovative Digital Ecosystem Vijay Pamarathi#secure-development#devsecops#software-security+2
2022-09-23TalkC0c0n Hyperledger Fabric & Ethereum Apps: Security Deep Dive Alex Devassy, Dhanith Krishna#smart-contracts#solidity#decentralized-systems+2
2022-09-23TalkC0c0n Maximizing ROI on cyber security investments: Do you think Adversary Simulation OR Purple teaming holds the key? Presentation Abhijith B R#risk-management#architecture#devsecops
2022-09-23TalkC0c0n Securing your APIs for a cloud native future Navendu Pottekkat#api-security#secure-development#devsecops
2022-08-12TalkDefcon Stop worrying about Nation-States and Zero-Days; let’s fix things that have been known for years Video Vivek Ponnada#secure-coding#devsecops#owasp
2021-11-13TalkC0c0n Connecting the dots between customers and security teams Shruthi Kamath#incident-management#security-training#devsecops+1
2021-11-13TalkC0c0n Cybersecurity in the era of Resilience - A walk through people, process and technology Babitha B P#risk-management#cyber-resilience#architecture+3
2021-11-04TalkEkoparty DIAL: Did I just alert Lambda? A centralized security misconfiguration detection system Source Code Video Saransh Rana, Divyanshu Mehta, Harsh Varagiya#aws#security-monitoring#iam+1
2021-10-15TalkRootcon The Curious case of knowing the unknown Video Vandana Verma Sehgal#secure-coding#devsecops#software-security
2021-08-08TalkDefcon AppSec 101: A Journey from Engineer to Hacker Video Arjun Gopalakrishna#secure-coding#security-assessment#ethical-hacking+2
2020-11-21TalkAppsecindonesia The caveats of the unseen: Crouching exposure, Hidden Misconfiguration Ashwin Vamshi#architecture#devsecops#risk-management+1
2020-10-01Tool demoBlackhat OWASP Python Honeypot Source Code Sri Harsha Gajavalli, Ali Razmjoo#web-security#owasp#security-assessment+1
2020-09-19TalkC0c0n Automate your Recon with ReconNote Video Prasoon Gupta#security-assessment#vulnerability-assessment#devsecops
2020-09-18TalkC0c0n Demystifying Zero Trust - A Real world Video Sandeep Variyam#zero-trust#architecture#security-governance+1
2020-08-09TalkDefcon Running an appsec program with open source projects Presentation Video Vandana Verma Sehgal#owasp#secure-development#devsecops+3
2019-09-27TalkC0c0n autoSource an automated framework for Source Code Review Source Code Malkit Singh#code-review#secure-coding#static-analysis+3
2019-09-27TalkC0c0n Security @scale for startups Shivanath Somanathan#devsecops#secure-development#software-security+2
2019-09-27TalkC0c0n Stepping into Password Less Economy Ajit Hatti#authentication#identity-management#secure-development+1
2019-09-13Talk44con One Person Army – Playbook on how to be the first Security Engineer at a company Video Kashish Mittal#devsecops#application-hardening#secure-development+4
2019-09-13TalkGlobalappsec Real Time Vulnerability Alerting by Using Principles from the United States Tsunami Warning Center Amol Sarwate#aws#siem#devsecops
2019-08-11TalkDefcon Shifting the DevSecOps Culture, Taking away the sugar piece and giving the pile to ants Presentation Vandana Verma Sehgal#devsecops#secure-development#ci-cd+2
2019-08-08TalkBlackhat DevSecOps : What, Why and How Presentation Video Anant Shrivastava#devsecops#ci-cd#cicd-pipeline+4
2019-03-28TalkBlackhat DevSecOps : What, Why and How Presentation Video Anant Shrivastava#devsecops#secure-coding#ci-cd+3
2018-10-19TalkAppsecdayaustralia Threat Modeling-as-Code & Automation for DevSecOps wins Video Abhay Bhargav#threat-modeling#devsecops#application-hardening+4
2018-06-27TalkFirst Securing your in-ear fitness coach: Challenges in hardening next generation wearables Presentation Sumanth Naropanth, Sunil Kumar#secure-development#architecture#devsecops
2018-01-31TalkOwaspappseccalifornia Hunter – Optimize your Pentesters time Video Kiran Shirali#application-pentesting#security-assessment#devsecops
2017-03-03TalkNullcon DevOpSec: Rapid Security in the Cloud with AWS and CIS Presentation Video Mikhail Advani, Rajesh Tamhane#devsecops#aws#cloud-compliance+4
2017-01-25TalkOwaspappseccalifornia DASTProxy: Don’t let your automated security testing program stall on crawlInstead focus on business context Presentation Video Kiran Shirali, Srinivasa Rao Chirathanagandla#dynamic-analysis#dast#devsecops+2
2017-01-25TalkOwaspappseccalifornia OCSP Stapling in the Wild Video Devdatta Akhawe, Emily Stark#web-security#architecture#devsecops
2016-08-19TalkC0c0n Kill the password - A new era of authentication Tamaghna Basu#authentication#iam#architecture+1
2015-09-24TalkAppsecusa Continuous Cloud Security Automation Video Rohit Pitke#aws#devsecops#architecture
2015-02-06TalkNullcon Building security and compliance into the software delivery process Anubhav Bathla, Dinesh Pillai, S Chandrasekhar, Harish Pillay#secure-development#devsecops#security-compliance+3
2013-11-20TalkAppsecusa Project Talk: OWASP OpenSAMM Project Presentation Pravir Chandra, Seba Deleersnyder#software-security#secure-development#devsecops+4
2013-09-27TalkC0c0n From Bedroom to Boardroom - Taking your Weekend Infosec Project Global Vivek Ramachandran#devsecops#secure-development#security-assessment+2
2013-08-15TalkUsenix An Empirical Study of Vulnerability Rewards Programs Presentation Whitepaper Devdatta Akhawe, David Wagner, Matthew Finifter#bug-bounty#software-security#risk-management+2
2012-10-26TalkAppsecusa The 7 Qualities of Highly Secure Software Video Mano Paul#secure-development#software-security#secure-coding+3
2011-09-19TalkBrucon Step-by-Step for Software Security (that anyone can follow) Pravir Chandra#software-security#secure-development#devsecops+4
2011-09-06TalkSecuritybyte Application Security Strategies Presentation K K Mookhey#secure-coding#secure-development#web-security+3
2010-11-25TalkDeepsec Developers are from Mars, Compliance Auditors are from Venus Video Neelay S Shah#security-compliance#security-governance#risk-management+4
2009-11-19TalkDeepsec Top 10 Security Issues Developers Don’t Know About Video Neelay S Shah#secure-coding#devsecops#software-security+2
2009-11-17TalkSecuritybyte Applications - The new cyber security frontier Presentation Mano Paul#secure-development#devsecops#software-security+2
2009-11-17TalkSecuritybyte Usability and Privacy in Security Presentation Ponnurangam Kumaraguru#data-protection#architecture#security-training+2
2008-03-27TalkBlackhat Iron Chef Black Hat: John Henry Challenge Presentation Pravir Chandra, Jacob West, Brian Chess, Sean Fay#ethical-hacking#secure-development#devsecops