| 2025-04-03 | Tool demo | Blackhat |
R0fuzz: A Collaborative Fuzzer
| Season Cherian, Anikait Panigrahi, Aparna Balaji | #fuzzing#ics-security#industrial-control-systems+2 |
| 2025-03-02 | Talk | Nullcon |
Satellite Communications: Analyzing and Protecting Space-Based Assets
| Drishti Jain | #network-pentesting#ics-security#encryption+4 |
| 2025-03-01 | Panel | Nullcon |
Converging IT and OT Security: Unified strategies for protection, detection and response
| Burgess Cooper, Kuldeep Singh, Shailendra Fuloria, Rohit Sharma, Sachin Burman, Yask Sharma | #ics-security#cloud-workload-protection#security-strategy+1 |
| 2024-11-21 | Talk | Deepsec |
Hacking with Physics v2.0
| Hrishikesh Somchatwar | #ics-security#embedded-security#firmware-analysis+2 |
| 2024-11-15 | Talk | C0c0n |
Hackers highway: Uncovering vulnerabilities hidden behind every car’s license plate
| Kartik Lalan | #automotive-cybersecurity#reverse-engineering#security-assessment+1 |
| 2024-11-15 | Panel | C0c0n |
The Pager Attack: A Wake-Up Call for Global Cyber Defense Strategies
| Aseem Jakhar, M Nagarajan, Tarun Wig, Philip Varughese Vayarakunnil, Nikhil Shrivastava | #cyber-warfare#critical-infrastructure#ics-security |
| 2024-10-23 | Tool demo | Blackhat |
R0fuzz: A Collaborative Fuzzer
| Season Cherian, Vishnu Dev, Vivek N J | #fuzzing#ics-security#industrial-control-systems+1 |
| 2024-08-10 | Talk | Defcon |
Compromising an Electronic Logging Device and Creating a Truck2Truck Worm
| Rik Chatterjee, Jake Jepson | #eld#embedded-systems#ics-security+3 |
| 2024-08-08 | Tool demo | Blackhat |
ICSGoat: A Damn Vulnerable ICS Infrastructure
| Shantanu Kale, Divya Nain | #ics-security#scada#plc-security+2 |
| 2024-04-19 | Talk | Blackhat |
China’s Military Cyber Operations: Has the Strategic Support Force Come of Age?
| Pukhraj Singh | #ics-security#risk-management#architecture |
| 2024-04-19 | Talk | Blackhat |
Faults in Our Bus: Novel Bus Fault Attack to Break Trusted Execution Environments in Embedded Systems
| Anirban Chakraborty, Nimish Mishra, Debdeep Mukhopadhyay | #embedded-security#firmware-analysis#architecture+1 |
| 2024-04-18 | Tool demo | Blackhat |
R0fuzz
| Season Cherian, Vishnu Dev | #fuzzing#ics-security#ics+2 |
| 2024-03-11 | Talk | Nullcon |
Hacking Trains
| Jaden Furtado | #hacking#ics-security#network-forensics+2 |
| 2023-09-23 | Talk | Nullcon |
Journey in setting up OT SOC
| Ramandeep Singh Walia | #soc#ics-security#threat-detection+1 |
| 2023-09-23 | Panel | Nullcon |
THREAT INTEL SHARING IN OT COMMUNITY AND INDUSTRY
| Ramandeep Singh Walia, Yask Sharma, Sanjeev Sharma, Britto Sidhan, Rohit Sharma | #ics-security#cyber-war#intelligence-sharing+3 |
| 2023-08-24 | Talk | Hitbsecconf |
Hardware Backdooring an eScooter
| Arun Mane | #reverse-engineering#ics-security#automotive-cybersecurity |
| 2023-08-10 | Talk | Defcon |
Attacking Vehicle Fleet Management Systems
| Yashin Mehaboobe | #automotive-cybersecurity#ics-security#embedded-systems+4 |
| 2023-08-10 | Talk | Defcamp |
Hardware Backdooring an e-Scooter
| Arun Mane | #reverse-engineering#ics-security#automotive-cybersecurity |
| 2023-08-07 | Talk | C0c0n |
Exploring Threats in Operational Technology
| Manjunath Hiregange | #ics-security#operational-technology#threat-hunting+1 |
| 2023-08-07 | Talk | C0c0n |
Trust Resiliency - A Lesson Learned from Russia Ukraine War
| Ajit Hatti | #incident-management#architecture#risk-management+1 |
| 2022-12-08 | Tool demo | Blackhat |
Industrial Control Systems: Capture the Train!
| Dhruv Sharan, Arnaud Soullié | #ctf#ics-security#plc-security+3 |
| 2022-09-28 | Talk | Rootcon |
Gazing into the Crystal Ball - The Fog of Cyberwarfare Escalations
| Harshit Agrawal | #ics-security#architecture#risk-management |
| 2022-09-24 | Talk | C0c0n |
CANalyse: A Vehicle Network Analysis and Attack Tool
| Kartheek Lade | #network-pentesting#network-traffic-analysis#can-bus+1 |
| 2022-09-23 | Talk | C0c0n |
Cybersecurity for Manufacturing
| Santhosh Srinivasan | #ics-security#control-systems#critical-infrastructure+2 |
| 2022-08-14 | Talk | Defcon |
Tales from the trenches - why organizations struggle to get even the basics of OT asset visibility & detection right
| Vivek Ponnada | #ics-security#risk-management#architecture+1 |
| 2022-05-12 | Talk | Blackhat |
Non-Intrusive Vulnerability Localization and Hotpatching for Industrial Control Systems
| Prashant Rajput, Michail Maniatakos | #ics-security#control-systems#hardware-embedded+3 |
| 2021-11-19 | Talk | Hackfest |
Hacking with Physics
| Hrishikesh Somchatwar | #ics-security#automotive-cybersecurity#embedded-systems+4 |
| 2021-11-13 | Talk | C0c0n |
A look into cyber-espionage activities targeting critical infrastructure in India
| Saurabh Sharma, Kurt Baumgartner | #ics-security#critical-infrastructure#threat-hunting+1 |
| 2021-11-13 | Talk | C0c0n |
Cyber Warfare & Securing Critical Infrastructures
| Faruk Kazi | #critical-infrastructure#ics-security#incident-management+1 |
| 2021-11-13 | Talk | C0c0n |
Securing OT in O&G Industry
| George Eapen | #ics-security#control-systems#critical-infrastructure |
| 2021-11-12 | Talk | C0c0n |
ICS Security —- A need, a challenge and a new change in Mindset
| Dhruv Gupta | #ics-security#critical-infrastructure#control-systems+1 |
| 2021-10-13 | Talk | Rootcon |
The Kill Chain: Future of Cyber in Defense
| Harshit Agrawal | #architecture#ics-security#risk-management |
| 2021-08-26 | Talk | Hitbsecconf |
Gazing Ahead: What Modern RF Combat Looks Like in the Next Decade
| Harshit Agrawal | #ics-security#architecture#risk-management |
| 2021-08-08 | Talk | Defcon |
Top 20 Secure PLC Coding Practices
| Vivek Ponnada, Sarah Fluchs | #ics-security#secure-coding#control-systems+1 |
| 2021-08-06 | Talk | Defcon |
Defending IoT in the Future of High-Tech Warfare
| Harshit Agrawal | #iot-pentesting#architecture#ics-security |
| 2021-05-07 | Tool demo | Blackhat |
CANalyse: A Vehicle Network Analysis and Attack Tool
| Kartheek Lade | #automobile#car-hacking#iot-device-management+4 |
| 2020-10-07 | Talk | Rootcon |
How I Pwned the ICS data during my internship
| Shail Patel | #ics#red-teaming#ics-security+1 |
| 2019-09-27 | Talk | C0c0n |
Hacking ICS devices for Fun
| Arun Mane | #red-teaming#ics-security#exploit-delivery+1 |
| 2019-09-27 | Talk | C0c0n |
Industry 4.0 - Security and Compliance
| Santhosh Srinivasan | #ics-security#security-compliance#security-governance+2 |
| 2019-09-27 | Talk | C0c0n |
Looking a decade ahead: Big data, drones , Robots and cyber security.
| Rahul Sasi | #ics-security#architecture#ai-security+2 |
| 2019-09-23 | Talk | Rootcon |
Hacking ICS devices/PLC’s for Fun - ICS and IOT Hacking
| Arun Mane | #red-teaming#ics#ics-security+3 |
| 2019-08-08 | Talk | Defcon |
Hacking ICS devices for Fun Penetration Testing of Vehicle Components
| Arun Mane | #automotive-cybersecurity#can-bus#ics-security+2 |
| 2019-03-02 | Panel | Nullcon |
CISO Strategy for OT and IoT risk and Threat Management
| Gaurav Shukla, Gomeet Pant, Rakesh Viswanathan, Sudarshan Rajagopal | #ics-security#iot-pentesting#cybersecurity-strategy+3 |
| 2019-03-01 | Panel | Nullcon |
Clear and Present Danger: Cyber Wars will Target Critical Infrastructure
| Sourabh Issar, Sachin Burman, Sudarshan Rajagopal, Somenath Kundu | #cyber-war#critical-infrastructure#security-strategy+1 |
| 2018-10-05 | Talk | C0c0n |
Cybersecurity Embedded Digital Transformation - The Future
| Sunil Kanchi | #embedded-security#architecture#ics-security |
| 2018-10-05 | Talk | C0c0n |
Future of Mobility & Cyber Security
| Suja Chandy | #automotive-cybersecurity#ics-security#architecture+2 |
| 2017-07-27 | Talk | Defcon |
ICS Humla
| Sneha Rajguru, Arun Mane | #ics-security#security-assessment#embedded-systems+4 |
| 2017-03-03 | Talk | Nullcon |
Securing Critical National Infrastructure
| Shailendra Fuloria, R Sarangapani, Rahul Tongia, Michael Pyle, Justin Searle | #critical-infrastructure#ics-security#risk-management+3 |
| 2016-08-04 | Talk | Blackhat |
Understanding HL7 2.x Standards Pen Testing and Defending HL7 2.x Messages
| Anirudh Duggal | #ics-security#risk-management#application-pentesting+3 |
| 2015-11-05 | Talk | Groundzerosummit |
Sanctioned to Hack: Your SCADA HMIs Belong to Us!
| Aditya K Sood | #ics-security#web-security#firmware-analysis+2 |
| 2015-09-25 | Talk | Appsecusa |
The State of Web Application Security in SCADA Web Human Machine Interfaces (HMIs)!
| Aditya K Sood | #scada#hmi#web-security+1 |
| 2014-11-13 | Talk | Groundzerosummit |
SCADA Exploitation through Firmware
| Ashish Saxena | #red-teaming#firmware-analysis#ics-security+3 |
| 2014-08-07 | Tool demo | Blackhat |
C-SCAD: Assessing Security flaws in clearscada Web_X client!
| Aditya K Sood | #red-teaming#security-assessment#ics-security+3 |
| 2014-02-14 | Talk | Nullcon |
2014 The year in which we cannot ignore SCADA
| Amol Sarwate | #scada#blueteam#ics-security+4 |
| 2013-11-21 | Talk | Deepsec |
Europe In The Carna Botnet: Telnet’s Threat To The Largest Economy
| Parth Shukla | #botnet#telnet#network-architecture+3 |
| 2013-11-20 | Talk | Appsecusa |
Why is SCADA Security an Uphill Battle?
| Amol Sarwate | #scada#application-pentesting#application-hardening+4 |
| 2013-03-15 | Talk | Blackhat |
Vulnerability analysis of 2013 SCADA issues
| Amol Sarwate | #scada#ics-security#attack-surface+2 |
| 2012-12-01 | Talk | Clubhack |
Smart Grid Security
| Falgun Rathod | #blueteam#critical-infrastructure#cyber-physical-systems+2 |
| 2012-11-23 | Talk | Malcon |
Tampering in Energy Meters
| Mohit Arora | #energy-theft#embedded-systems#firmware-analysis+2 |
| 2012-03-15 | Talk | Hackinparis |
SCADA Security: Why Is It So Hard ?
| Amol Sarwate | #ics-security#scada#control-systems+2 |
| 2012-03-15 | Talk | Grrcon |
SCADA Security: Why is it so hard?
| Amol Sarwate | #scada#ics-security#authentication+2 |
| 2012-02-15 | Talk | Nullcon |
SCADA Security: Why is it so hard
| Amol Sarwate | #scada#ics-security#control-systems+1 |
| 2011-12-14 | Talk | Blackhat |
SCADA Security - Why Is It So Hard?
| Amol Sarwate | #scada#ics-security#control-systems+1 |