| 2025-12-11 | Tool demo | Blackhat |
From Triage to Threat Modeling: Open-Source Security LLM in Action
| Dhruv Kedia, Sajana Weerawardhena | #ai-security#threat-modeling#vulnerability-assessment+1 |
| 2025-12-11 | Tool demo | Blackhat |
SupplyShield: Protecting Your Software Supply Chain
| Rahul Sunder, Yadhu Krishna M, Hritik Vijay, Sourav Kumar | #supply-chain#sbom#software-composition-analysis+3 |
| 2025-12-10 | Tool demo | Blackhat |
Catch the Flow: Securing CI/CD Workflows with Flowlyt
| Hare Krishna Rai, K v Prashant, Nandan Gupta | #ci-cd#supply-chain#devsecops+1 |
| 2025-12-10 | Tool demo | Blackhat |
Securing Secrets from Dev Machine to Deployments Using SLV
| Shibly Meeran, Sriram Krishnan, Keshav Kandasamy | #devsecops#cicd-security#supply-chain |
| 2025-10-10 | Talk | C0c0n |
Ghosts in Your GitHub Actions and AI’s Hunt for Hidden Exploits
| Suchith Narayan | #supply-chain#supply-chain-attack#devsecops+1 |
| 2025-08-07 | Tool demo | Blackhat |
AzDevRecon - Azure DevOps Enumeration Tool
| Raunak Parmar | #azure#devsecops#iam |
| 2025-08-07 | Tool demo | Blackhat |
Pentest Copilot: Cursor for Pentesters
| Dhruva Goyal, Sitaraman Subramanian | #security-assessment#application-pentesting#vulnerability-assessment+1 |
| 2025-08-06 | Tool demo | Blackhat |
Open-Source API Firewall by Wallarm - Advanced Protection for REST and GraphQL APIs
| Satinder Khasriya | #api-security#web-security#owasp+1 |
| 2025-08-06 | Tool demo | Blackhat |
ParseAndC 4.0 - The Final Cut
| Parbati Kumar Manna | #reverse-engineering#binary-analysis#code-analysis+4 |
| 2025-08-06 | Tool demo | Blackhat |
Realtic
| Sohan Simha Prabhakar, Samarth Bhaskar Bhat, Danindu Gammanpilage | #security-assessment#vulnerability-assessment#static-analysis+3 |
| 2025-08-06 | Tool demo | Blackhat |
ThreatShield - The Intelligent way of Threat Modelling
| Ashwin Shenoi, Satyam Nagpal, Sayooj B Kumar | #threat-modeling#architecture#devsecops+1 |
| 2025-08-06 | Tool demo | Blackhat |
Varunastra: Securing the Depths of Docker V2
| Devang Solanki | #container-security#docker#static-analysis+3 |
| 2025-08-06 | Tool demo | Blackhat |
vet: Proactive Guardrails against Malicious OSS using Code Analysis
| Abhisek Datta | #static-analysis#software-security#devsecops+2 |
| 2025-08-06 | Talk | Blackhat |
When ‘Changed Files’ Changed Everything: Uncovering and Responding to the tj-actions Supply Chain Breach
| Varun Sharma, Ashish Kurmi | #ci-cd#incident-management#devsecops+2 |
| 2025-04-30 | Talk | Rsac |
Got Supply Pain? A Real-World Approach to Supply Chain SDL
| Mohit Arora, Richard Tonry | #secure-development#devsecops#risk-management+4 |
| 2025-04-29 | Talk | Rsac |
RAG-NAROK: What Poorly-Built RAGs Can Do to Data Security
| Akash Mukherjee, Saurabh Shintre | #secure-development#devsecops#data-protection+1 |
| 2025-03-02 | Talk | Nullcon |
Hidden in Plain Sight: Large-Scale Exposure of Orphaned Commits on Major Git Platforms
| Kumar Ashwin | #secure-coding#devsecops#architecture |
| 2024-11-15 | Talk | C0c0n |
CISO’s take on BYOAI
| Venugopal Parameswara | #risk-management#security-governance#security-compliance+3 |
| 2024-10-23 | Tool demo | Blackhat |
Cyber Arsenal47
| Simardeep Singh | #automated-scanning#vulnerability-assessment#security-assessment+2 |
| 2024-05-07 | Talk | Rsac |
A Proven Approach on Automated Security Architectural Pattern Validation
| Sunil Arora, Parthasarathi Chakraborty | #architecture#devsecops#risk-management+1 |
| 2024-04-18 | Tool demo | Blackhat |
Mantis - Asset Discovery at Scale
| Ankur Bhargava, Prateek Thakare, Saddam Hussain | #asset-inventory#architecture#devsecops+1 |
| 2023-09-28 | Talk | Hackinparis |
How to have visibility and security OF CICD ecosystem
| Pramod Rana | #cicd-security#devsecops#architecture+4 |
| 2023-08-12 | Talk | Defcon |
Getting More Bang for your Buck:Appsec on a Limited Budget
| Vandana Verma Sehgal, Viraj Gandhi | #secure-development#devsecops#risk-management+2 |
| 2023-08-12 | Tool demo | Defcon |
Open Source API Security for devsecops
| Ankush Jain, Ankita Gupta 1 | #api-security#devsecops#ci-cd+2 |
| 2023-08-07 | Talk | C0c0n |
Homomorphic Encryption - Myth to Reality
| Anish Koshy | #encryption#architecture#data-protection+1 |
| 2023-08-07 | Talk | C0c0n |
Shifting left blockchain development for safer DApps
| Dhanith Krishna | #smart-contracts#secure-development#devsecops+2 |
| 2023-08-07 | Talk | C0c0n |
Start Left SDLC Security with Open-Source DevSecOps Tooling
| Aswin Raj, Shruti M G | #devsecops#secure-development#static-analysis+3 |
| 2023-08-06 | Talk | C0c0n |
Influence of Artificial Intelligence in GRC Space
| Mahesh Kalyanaraman | #security-governance#risk-management#security-compliance+2 |
| 2023-08-06 | Talk | C0c0n |
Mitigating SSRF at scale the right way with IMDSv2!
| Ayush Priya | #web-security#api-security#aws+2 |
| 2023-08-06 | Talk | C0c0n |
Surviving In Dependency Hell
| Kumar Ashwin | #secure-development#devsecops#software-security |
| 2023-08-06 | Talk | C0c0n |
Taking a Closer Look at CI/CD Pipeline Logs: Extracting Security-Related Information with Build Inspector
| Anshu Kumar, Pavan Sorab | #devsecops#ci-cd#cicd-pipeline+2 |
| 2023-08-06 | Talk | C0c0n |
The new way to be secure
| Sakshi Bhutani | #secure-development#devsecops#software-security+3 |
| 2023-04-26 | Talk | Rsac |
Designing Product Security for a Brighter Smile and a Healthier Tomorrow
| Lokesh Pidawekar, Apoorva Phadke | #secure-development#devsecops#software-security+2 |
| 2023-04-26 | Talk | Rsac |
Is Increasing Security Maturity And Decreasing Operational Load Possible?
| Rohit Dhamankar | #risk-management#architecture#security-governance+1 |
| 2023-03-23 | Talk | Insomnihack |
How to have visibility and security OF CICD ecosystem
| Pramod Rana | #ci-cd#devsecops#supply-chain-security+3 |
| 2022-09-24 | Talk | C0c0n |
Building Smart, Resilient and Sustainable Cyber Eco System
| Navin Kumar Singh | #risk-management#cybersecurity-strategy#architecture+4 |
| 2022-09-24 | Talk | C0c0n |
In production with GRC for cloud
| Mahesh Kalyanaraman | #cloud-compliance#security-governance#risk-management+1 |
| 2022-09-23 | Talk | C0c0n |
Bridging the gap between Security and Operations
| Sujay Rajashekar Gundagatti | #devsecops#architecture#threat-detection+2 |
| 2022-09-23 | Talk | C0c0n |
Building a Safer and Innovative Digital Ecosystem
| Vijay Pamarathi | #secure-development#devsecops#software-security+2 |
| 2022-09-23 | Talk | C0c0n |
Hyperledger Fabric & Ethereum Apps: Security Deep Dive
| Alex Devassy, Dhanith Krishna | #smart-contracts#solidity#decentralized-systems+2 |
| 2022-09-23 | Talk | C0c0n |
Maximizing ROI on cyber security investments: Do you think Adversary Simulation OR Purple teaming holds the key?
| Abhijith B R | #risk-management#architecture#devsecops |
| 2022-09-23 | Talk | C0c0n |
Securing your APIs for a cloud native future
| Navendu Pottekkat | #api-security#secure-development#devsecops |
| 2022-08-12 | Talk | Defcon |
Stop worrying about Nation-States and Zero-Days; let’s fix things that have been known for years
| Vivek Ponnada | #secure-coding#devsecops#owasp |
| 2021-11-13 | Talk | C0c0n |
Connecting the dots between customers and security teams
| Shruthi Kamath | #incident-management#security-training#devsecops+1 |
| 2021-11-13 | Talk | C0c0n |
Cybersecurity in the era of Resilience - A walk through people, process and technology
| Babitha B P | #risk-management#cyber-resilience#architecture+3 |
| 2021-11-04 | Talk | Ekoparty |
DIAL: Did I just alert Lambda? A centralized security misconfiguration detection system
| Saransh Rana, Divyanshu Mehta, Harsh Varagiya | #aws#security-monitoring#iam+1 |
| 2021-10-15 | Talk | Rootcon |
The Curious case of knowing the unknown
| Vandana Verma Sehgal | #secure-coding#devsecops#software-security |
| 2021-08-08 | Talk | Defcon |
AppSec 101: A Journey from Engineer to Hacker
| Arjun Gopalakrishna | #secure-coding#security-assessment#ethical-hacking+2 |
| 2020-11-21 | Talk | Appsecindonesia |
The caveats of the unseen: Crouching exposure, Hidden Misconfiguration
| Ashwin Vamshi | #architecture#devsecops#risk-management+1 |
| 2020-10-01 | Tool demo | Blackhat |
OWASP Python Honeypot
| Sri Harsha Gajavalli, Ali Razmjoo | #web-security#owasp#security-assessment+1 |
| 2020-09-19 | Talk | C0c0n |
Automate your Recon with ReconNote
| Prasoon Gupta | #security-assessment#vulnerability-assessment#devsecops |
| 2020-09-18 | Talk | C0c0n |
Demystifying Zero Trust - A Real world
| Sandeep Variyam | #zero-trust#architecture#security-governance+1 |
| 2020-08-09 | Talk | Defcon |
Running an appsec program with open source projects
| Vandana Verma Sehgal | #owasp#secure-development#devsecops+3 |
| 2019-09-27 | Talk | C0c0n |
autoSource an automated framework for Source Code Review
| Malkit Singh | #code-review#secure-coding#static-analysis+3 |
| 2019-09-27 | Talk | C0c0n |
Security @scale for startups
| Shivanath Somanathan | #devsecops#secure-development#software-security+2 |
| 2019-09-27 | Talk | C0c0n |
Stepping into Password Less Economy
| Ajit Hatti | #authentication#identity-management#secure-development+1 |
| 2019-09-13 | Talk | 44con |
One Person Army β Playbook on how to be the first Security Engineer at a company
| Kashish Mittal | #devsecops#application-hardening#secure-development+4 |
| 2019-09-13 | Talk | Globalappsec |
Real Time Vulnerability Alerting by Using Principles from the United States Tsunami Warning Center
| Amol Sarwate | #aws#siem#devsecops |
| 2019-08-11 | Talk | Defcon |
Shifting the DevSecOps Culture, Taking away the sugar piece and giving the pile to ants
| Vandana Verma Sehgal | #devsecops#secure-development#ci-cd+2 |
| 2019-08-08 | Talk | Blackhat |
DevSecOps : What, Why and How
| Anant Shrivastava | #devsecops#ci-cd#cicd-pipeline+4 |
| 2019-03-28 | Talk | Blackhat |
DevSecOps : What, Why and How
| Anant Shrivastava | #devsecops#secure-coding#ci-cd+3 |
| 2018-10-19 | Talk | Appsecdayaustralia |
Threat Modeling-as-Code & Automation for DevSecOps wins
| Abhay Bhargav | #threat-modeling#devsecops#application-hardening+4 |
| 2018-06-27 | Talk | First |
Securing your in-ear fitness coach: Challenges in hardening next generation wearables
| Sumanth Naropanth, Sunil Kumar | #secure-development#architecture#devsecops |
| 2018-01-31 | Talk | Owaspappseccalifornia |
Hunter β Optimize your Pentesters time
| Kiran Shirali | #application-pentesting#security-assessment#devsecops |
| 2017-03-03 | Talk | Nullcon |
DevOpSec: Rapid Security in the Cloud with AWS and CIS
| Mikhail Advani, Rajesh Tamhane | #devsecops#aws#cloud-compliance+4 |
| 2017-01-25 | Talk | Owaspappseccalifornia |
DASTProxy: Donβt let your automated security testing program stall on crawlInstead focus on business context
| Kiran Shirali, Srinivasa Rao Chirathanagandla | #dynamic-analysis#dast#devsecops+2 |
| 2017-01-25 | Talk | Owaspappseccalifornia |
OCSP Stapling in the Wild
| Devdatta Akhawe, Emily Stark | #web-security#architecture#devsecops |
| 2016-08-19 | Talk | C0c0n |
Kill the password - A new era of authentication
| Tamaghna Basu | #authentication#iam#architecture+1 |
| 2015-09-24 | Talk | Appsecusa |
Continuous Cloud Security Automation
| Rohit Pitke | #aws#devsecops#architecture |
| 2015-02-06 | Talk | Nullcon |
Building security and compliance into the software delivery process
| Anubhav Bathla, Dinesh Pillai, S Chandrasekhar, Harish Pillay | #secure-development#devsecops#security-compliance+3 |
| 2013-11-20 | Talk | Appsecusa |
Project Talk: OWASP OpenSAMM Project
| Pravir Chandra, Seba Deleersnyder | #software-security#secure-development#devsecops+4 |
| 2013-09-27 | Talk | C0c0n |
From Bedroom to Boardroom - Taking your Weekend Infosec Project Global
| Vivek Ramachandran | #devsecops#secure-development#security-assessment+2 |
| 2013-08-15 | Talk | Usenix |
An Empirical Study of Vulnerability Rewards Programs
| Devdatta Akhawe, David Wagner, Matthew Finifter | #bug-bounty#software-security#risk-management+2 |
| 2012-10-26 | Talk | Appsecusa |
The 7 Qualities of Highly Secure Software
| Mano Paul | #secure-development#software-security#secure-coding+3 |
| 2011-09-19 | Talk | Brucon |
Step-by-Step for Software Security (that anyone can follow)
| Pravir Chandra | #software-security#secure-development#devsecops+4 |
| 2011-09-06 | Talk | Securitybyte |
Application Security Strategies
| K K Mookhey | #secure-coding#secure-development#web-security+3 |
| 2010-11-25 | Talk | Deepsec |
Developers are from Mars, Compliance Auditors are from Venus
| Neelay S Shah | #security-compliance#security-governance#risk-management+4 |
| 2009-11-19 | Talk | Deepsec |
Top 10 Security Issues Developers Don’t Know About
| Neelay S Shah | #secure-coding#devsecops#software-security+2 |
| 2009-11-17 | Talk | Securitybyte |
Applications - The new cyber security frontier
| Mano Paul | #secure-development#devsecops#software-security+2 |
| 2009-11-17 | Talk | Securitybyte |
Usability and Privacy in Security
| Ponnurangam Kumaraguru | #data-protection#architecture#security-training+2 |
| 2008-03-27 | Talk | Blackhat |
Iron Chef Black Hat: John Henry Challenge
| Pravir Chandra, Jacob West, Brian Chess, Sean Fay | #ethical-hacking#secure-development#devsecops |