🧪 Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Incident Management

Focus Area: 🚨 Incident Response
160
Total Entries
184
Contributors

Top Contributors

Saumil Shah(5) Ajit Hatti(4) Rahul Sasi(4) Rohyt Belani(4) Amit Dubey(3)

All Entries (160 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-08-07Tool demoBlackhat Kubernetes Goat - A Hands-on Interactive Kubernetes Security Playground Source Code Madhu Akula#kubernetes#cloud-workload-protection#container-security+3
2025-08-07Tool demoBlackhat Q-TIP (QR Code Threat Inspection Platform) Rushikesh D Nandedkar#incident-management#web-security#architecture+1
2025-08-06TalkBlackhat When ‘Changed Files’ Changed Everything: Uncovering and Responding to the tj-actions Supply Chain Breach Presentation Whitepaper Video Varun Sharma, Ashish Kurmi#ci-cd#incident-management#devsecops+2
2025-04-04Tool demoBlackhat Decoy Mutex Source Code Madhukar Raina#ransomware#endpoint-protection#malware-prevention+3
2025-04-04PanelBlackhat Locknote: Highlights & Key Takeaways from Black Hat Asia 2025 Vandana Verma Sehgal, Daniel Cuthbert, Ryan Flores, Vitaly Kamluk, Jeff Moss, Asuka Nakajima#security-strategy#cybersecurity-framework#digital-learning+1
2025-04-04Tool demoBlackhat SHIVA Spampot: Actionable Spam and Phishing Intelligence Source Code Rahul Binjve, Viren Kapadia#honeypot#network-monitoring#incident-management+1
2025-03-02PanelNullcon Cyber Fusion Center: The Command Center for Integrated Cyber Defense Avkash Kathiriya, Mathan Babu Kasilingam, Yogi Kapur#security-monitoring#network-defense#threat-modeling+3
2025-03-02PanelNullcon How can organisations protect themselves against Advanced Cyber Threats Bithal Bhardwaj, Vishal Salvi#security-strategy#incident-management#phishing+1
2025-03-01PanelNullcon Converging IT and OT Security: Unified strategies for protection, detection and response Burgess Cooper, Kuldeep Singh, Shailendra Fuloria, Rohit Sharma, Sachin Burman, Yask Sharma#ics-security#cloud-workload-protection#security-strategy+1
2025-03-01TalkNullcon MacOS Lockdown Mode: A Forensic Deep Dive Video Bhargav Rathod#macos#digital-forensics#endpoint-protection+3
2024-12-12Tool demoBlackhat Cloud Offensive Breach and Risk Assessment (COBRA) Source Code Harsha Koushik, Anand Tiwari#cloud-pentesting#cloud-workload-protection#security-testing+3
2024-12-11Tool demoBlackhat Active Directory Cyber Deception using Huginn Source Code Rohan Durve, Paul Laine#active-directory#incident-management#network-forensics+1
2024-11-21TalkSecurityfest Breaking Container Boundary Using Side Channel Attack Video Adhokshaj Mishra#container-security#docker#security-testing+1
2024-11-16TalkC0c0n Invisible Invaders: Bypassing Email Security with Legitimate Tools Dhruv Bisani#bypassing#phishing#social-engineering+2
2024-11-16PanelC0c0n When Falcon Strikes Back: The Defender’s Dilemma Burgess Cooper, Shivkumar Pandey, A Shiju Rawther, Padnya Manwar, Kishan Kendre#incident-management#security-strategy#threat-modeling+2
2024-11-15PanelC0c0n Intelligence led security Midhun Babu, Sameer Ratolikar, M v Sheshadri, A Shiju Rawther, Maya R Nair, Balakrishnan A#security-strategy#data-analytics#ai-security+1
2024-10-23Tool demoBlackhat DarkWidow: Customizable Dropper Tool Targeting Windows Source Code Soumyanil Biswas#darkwidow#windows#exploit-delivery+4
2024-08-29TalkHitbsecconf COMMSEC: CoralRaider Targets Victims Data and Social Media Accounts Presentation Video Chetan Raghuprasad, Joey Chen#reverse-engineering#security-assessment#incident-management
2024-08-29Tool demoHitbsecconf eBPFShield Source Code Sagar Bhure#ids#incident-management#network-monitoring+1
2024-08-08Tool demoBlackhat Active Directory Cyber Deception using Huginn Source Code Rohan Durve, Paul Laine#active-directory#incident-management#identity-governance+3
2024-05-07TalkRsac Anatomy of a Vulnerability Response - A View from the Inside Video Mohit Arora, Richard Tonry#incident-management#risk-management#compliance-governance
2024-04-18Tool demoBlackhat Catching adversaries on Azure - Deception on Cloud Source Code Subhash Popuri#azure#cloud-workload-protection#cloud-pentesting+4
2024-03-21TalkCansecwest Rolling in the Dough: How Microsoft Identified and Remidiated a Baker’s Dozen of Security Threats in the Windows DNS Server Video Arif Hussain, George Hughey#security-assessment#architecture#incident-management
2023-12-06Tool demoBlackhat AndroCop: One Click Forensic Investigation & Data Extraction Tool Abhinand N, Aswin M Guptha, Varun Nair#android#android-security#mobile-forensics+4
2023-09-24PanelNullcon ADVERSARY SIMULATION AND INCIDENT RESPONSE IMPACT Shomiron Das Gupta, Yogi Kapur, Manish Tiwari#incident-management#incident-detection#forensics+3
2023-09-23PanelNullcon CRITICAL INFORMATION INFRASTRUCTURE(CII) PROTECTION: CHALLENGES AND OPPORTUNITIES- HOW CAN THE NULLCON COMMUNITY CONTRIBUTE Video Saikat Datta, M v Sheshadri, Madhavi Purandare, Mathan Babu Kasilingam, Navin Kumar Singh#critical-infrastructure#cybersecurity-framework#security-strategy+4
2023-08-10TalkBlackhat Does Public Disclosure of Vulnerabilities Affect Hacker Participation in Bug Bounty Programs? Presentation Amit Deokar, Ali Ahmed, Brian Lee#bug-hunting#incident-management#security-strategy+4
2023-08-09Tool demoBlackhat ARCTIC - Automated Remediation for Correlation Threat Intelligence Collections Video Ankit Anurag, Ashwath Kumar, Manikandan Rajappan#cloud-access-security-broker#incident-management#security-tools+2
2023-08-09Tool demoBlackhat eBPFShield: Unleashing the Power of eBPF for OS Kernel Exploitation and Security. Source Code Sagar Bhure#kernel#machine-learning#forensics+4
2023-08-07TalkC0c0n Chinese APT against Government officials using G7 summit lure Video Niranjan Jayanand#apt#incident-management#threat-hunting
2023-08-07TalkC0c0n Cyber Threats to Global Financial Systems Video Lince Lawrence#incident-management#risk-management#cloud-monitoring+4
2023-08-07TalkC0c0n Darkweb Investigations Amit Dubey#threat-hunting#digital-forensics#incident-management+1
2023-08-07TalkC0c0n Evasion Tactics of SideCopy & APT36: Persistently targeting Indian Defense Orgs Video Sathwik RAM Prakki#apt#reverse-engineering#incident-management
2023-08-07TalkC0c0n Tackling Advanced Threat Landscape with MDR - Best Practices Video Vijayakumar K M#incident-management#threat-hunting#security-monitoring+1
2023-08-07TalkC0c0n Trust Resiliency - A Lesson Learned from Russia Ukraine War Video Ajit Hatti#incident-management#architecture#risk-management+1
2023-08-06TalkC0c0n Cybercrimes Victim Compensation : Legal Remedies and Process Nisheeth Dixit#security-compliance#security-governance#risk-management+1
2023-08-06TalkC0c0n Dark web for investigations Amit Lokhande#threat-hunting#digital-forensics#network-forensics+3
2023-08-06TalkC0c0n Insider Threats - Best Practices and Common Pitfalls Video Georgie Kurien#insider-threats#risk-management#security-training+1
2023-08-06TalkC0c0n Playing cat and mouse with the Adversary: Sometimes a breach is inevitable Video Abhijith B R#incident-management#risk-management#security-strategy+1
2023-08-06TalkC0c0n Russia-Ukraine Warfare – A Shift in Cyber Threat Landscape Video Jaydev Joshi, Simran Kothari#threat-landscape#incident-management#cyber-war+1
2023-08-06TalkC0c0n Survivability in the Cyber World Video Sunil Varkey#incident-management#risk-management#architecture
2023-05-10TalkAuscert Decentralised, multi-stakeholder and non-linear cyber incident response with the Incident Command System Presentation Video Pukhraj Singh#incident-management#soc#threat-intelligence-analysis
2023-05-10TalkAuscert Insights into Deakin University’s Data Breach Video Dushyant Sattiraju#incident-management#data-leak#digital-forensics
2022-09-24PanelC0c0n Ransom Trends in India Pardhasaradhi Ch, Srikanta Prasad, Jacxine Fernandez, Diwakar Sheoran#ransomware#data-loss-prevention#incident-management+2
2022-09-23TalkC0c0n A Tale of Credential Leak of a Popular Cloud Threat Actor Nitesh Surana#security-assessment#cloud-pentesting#cloud-workload-protection+2
2022-09-23TalkC0c0n Battle of 300 Crore - how they lost it and got most of it back Prashant Choudhary#incident-management#risk-management#architecture
2022-09-23TalkC0c0n Ransomware: Prevention, Early Detection and Response Babitha Bp#ransomware#incident-management#malware-prevention+2
2022-09-23TalkC0c0n Tracking the Bad guys. An interesting story of how the criminal underground operates Aarushi Koolwal, Anjana Sathyan#threat-hunting#incident-management#cyber-crime+4
2022-09-08TalkNullcon Handling A Bug Bounty program From A Blue Team Perspective Presentation Video Ashwath Kumar, Ankit Anurag#blueteam#cloud-monitoring#cloud-pentesting+4
2022-09-06PanelNullcon Does your SOC sucks? Video Krishna Pandey, Shweta Kshirsagar, Vivek Gopalan, Yogi Kapur#security-training#incident-management#alert-fatigue+3
2022-09-06PanelNullcon Securing India The CERTIn Way Video Saikat Datta, Sanjay Bahl, Ajit Menon, Anuprita Daga#security-strategy#cybersecurity-framework#incident-management+3
2022-09-06PanelNullcon Unlocking Security Collaboration With Cyber Threat Intelligence Video Avkash Kathiriya, Varun Singla, Mathan Babu Kasilingam, Amol Naik#intelligence-sharing#attack-surface#cybersecurity-strategy+1
2022-08-13PanelDefcon Who doesn’t like a little Spice? Emulation Maturity, Team Culture and TTPs Niru Ragupathy#security-development-lifecycle#security-tools#incident-management+2
2022-05-18PanelPhdays Challenges for cybersecurity conferences. Part II Aseem Jakhar, Timur Yunusov, Igor Lukic, Dhillon Andrew Kannabhiran#security-training#cybersecurity-strategy#threat-modeling+3
2021-11-13TalkC0c0n Decoding new age hackers and Criminal Investigation Amit Dubey#incident-management#digital-forensics#reverse-engineering
2021-11-13TalkC0c0n A look into cyber-espionage activities targeting critical infrastructure in India Saurabh Sharma, Kurt Baumgartner#ics-security#critical-infrastructure#threat-hunting+1
2021-11-13TalkC0c0n Case Study - Cyber Heist in a Bank and Recovery of Systems and Money Prashant Choudhary#incident-management#forensics#security-assessment
2021-11-13TalkC0c0n Case study - E-crime group targeting mobile users Rahul Sasi#incident-management#mobile-hacking#phishing+4
2021-11-13TalkC0c0n Changing Cyber Security Paradigm & Cyber Tsunami Sunil Varkey#cybersecurity-strategy#threat-landscape#risk-management+3
2021-11-13TalkC0c0n Connecting the dots between customers and security teams Shruthi Kamath#incident-management#security-training#devsecops+1
2021-11-13TalkC0c0n Crisis Capitalization in a Pandemic Greeshma M R#risk-management#incident-management#security-training+2
2021-11-13TalkC0c0n Cyber Warfare & Securing Critical Infrastructures Faruk Kazi#critical-infrastructure#ics-security#incident-management+1
2021-11-13TalkC0c0n Emerging trends in cyber crimes : Investigation tools & techniques Triveni Singh#incident-management#digital-forensics#forensics+3
2021-11-13TalkC0c0n Mature Your Threat Hunting Program Neha Dhyani#threat-hunting#threat-detection#threat-modeling+2
2021-11-13TalkC0c0n Painting Your Organizations with Shades of Red, Blue & Purple Video Hidayath Khan#red-teaming#ethical-hacking#threat-modeling+2
2021-11-12TalkC0c0n 2021 Supply Chain Attacks Analysis Ajit Hatti#incident-management#risk-management#supply-chain+1
2021-11-12PanelC0c0n Stopping Breaches with CrowdStrike Sandeep Rao#endpoint-protection#incident-management#security-monitoring+2
2021-08-08PanelDefcon Resilient cyber space: The role of hacker and security communities Video Manu Zacharia, Aseem Jakhar, Abhijith B R, Jay Turla, Omar Santos, Dave Lewis, Dhillon Kannabhiran#security-training#threat-modeling#incident-management+3
2021-08-07Tool demoDefcon Tenacity- An Adversary Emulation Tool for Persistence Video Atul Nair, Harshal Tupsamudre#incident-management#security-testing#attack-surface
2021-08-06PanelDefcon Adversary simulation, emulation or purple teaming - How would you define it? Video Anant Shrivastava, Vincent Yiu, Martin Ingesen, Jean Marie Bourbon, Samuel Kimmons, Joe Vest#security-testing#incident-management#red-teaming+3
2021-08-05TalkBlackhat PCIe Device Attacks: Beyond DMA. Exploiting PCIe Switches, Messages and Errors Presentation Hareesh Khattri, Nagaraju N Kodalapura, Nam N Nguyen#hardware-embedded#endpoint-protection#incident-management+1
2020-10-07TalkRootcon Automating Threat Hunting on the Dark Web and other nitty-gritty thingso Presentation Video Apurv Singh Gautam#deep-web#red-teaming#threat-hunting+1
2020-10-07TalkRootcon Blockchain Based OT Monitoring Solution (BBOTMS) Presentation Video Asif Hameed Khan, Gagan Jattana#ics#blueteam#decentralized-systems+4
2020-09-18TalkC0c0n COVID-19 Cyber impact on financial sector and remote employees Video Amit Dubey, Tal Catran, Yair Feldman#incident-management#risk-management#cybersecurity-strategy+4
2020-09-18TalkC0c0n Cyber Security Shifts During COVID-19 Video Sunil Kanchi#risk-management#security-training#compliance-governance+1
2020-08-22TalkThedianainitiative Deploying discreet infrastructure for targeted phishing campaigns Video Sreehari Haridas#phishing#application-pentesting#social-engineering+3
2020-08-07PanelDefcon D0 N0 H4RM: A Healthcare Security Conversation Video Vidha Murthy, Christian Dameff, Jeff Tully, Jessica Wilkerson, Veronica Schmitt, Ash Luft#data-protection#identity-management#security-training+3
2020-08-06PanelBlackhat Locknote: Conclusions and Key Takeaways from Day 2 Aanchal Gupta, Kymberlee Price, Rodrigo Rubira Branco, Stefano Zanero#security-strategy#threat-modeling#cybersecurity-training+2
2020-08-06Tool demoBlackhat MSTICpy: The Security Analysis Swiss Army Knife Source Code Ashwin Patil, Pete Bryan, Ian Hellen#digital-forensics#incident-management#data-analytics+3
2020-07-26TalkHitbsecconf Swapping Asprin Formulas With MDMA While Red Teaming a Billion Dollar Company Himanshu Sharma, Aman Sachdev#red-teaming#application-pentesting#incident-management+2
2020-03-06Tool demoNullcon Providence Source Code Swapnil Kumbhar, Akshay Shah#incident-management#linux#macos+2
2019-12-04Tool demoBlackhat AutoMacTC: Finding Worms in Apple Orchards - Using AutoMacTC for macOS Incident Response Source Code Kshitij Kumar, Jai Musunuri#macos#secure-coding#forensics+1
2019-12-04Tool demoBlackhat RTTM: Real Time Threat Monitoring Tool Source Code Naveen Rudrappa, Murali Krishna Segu#blueteam#network-monitoring#security-analytics+2
2019-10-12TalkTexascybersummit TH-2020 Rastrea2r: Collecting & Hunting for IOCs with Gusto and Style Presentation Source Code Sudheendra Bhat#incident-management#threat-hunting#ioc+3
2019-09-27TalkC0c0n RANSOMWARE - to pay or not to pay Seshaprakash Kusuma Sreenivasa#ransomware#incident-management#risk-management
2019-09-27PanelC0c0n Shouldn’t Organization disclose breaches - The need for a shared platform Video Sunil Varkey, Jacxine Fernandez, Rahul Sasi, K K Chaudhary#data-leak#data-protection#security-testing+4
2019-08-29KeynoteHitbsecconf The CISO’s Dilemma Presentation Video Saumil Shah#blueteam#compliance-governance#security-strategy+4
2019-08-08TalkBlackhat Preventing Authentication Bypass: A Tale of Two Researchers Presentation Ravi Jaiswal, Terry Zhang, Ron Chan#security-development-lifecycle#identity-management#authentication+4
2019-08-05Tool demoBlackhat CertPivot: Infra-Chaining + Cert-Check Ajit Hatti#incident-management#threat-hunting#ssl+1
2019-03-28Tool demoBlackhat RTS: Real Time Scrapper Source Code Naveen Rudrappa#blueteam#application-pentesting#security-monitoring+4
2019-03-02PanelNullcon Actionable Intelligence and Cyber Security Video Durga Dube, M v Sheshadri, Rahul Sasi, Shrikant Shitole, Alan White#data-analytics#incident-management#security-analytics+4
2019-03-01PanelNullcon Breached? – Here is how I responded! Video Muslim Koser, Mrudul Uchil, Sachin Burman, Venkata Satish Guttula, Vijay K Verma#incident-management#digital-forensics#forensics+1
2018-10-05TalkC0c0n Defending Healthcare Base Jiggyasu Sharma#blueteam#incident-management#security-monitoring+4
2018-10-04TalkBrucon Disrupting the Kill Chain Video Vineet Bhatia#incident-management#architecture#windows+3
2018-08-09Tool demoBlackhat rastrea2r (reloaded!): Collecting & Hunting for IOCs with Gusto and Style Presentation Source Code Sudheendra Bhat, Ismael Valenzuela#incident-management#rest-api#forensics
2018-08-08Tool demoBlackhat AutoMacTC: Finding Worms in Apple Orchards - Using AutoMacTC for macOS Incident Response Source Code Kshitij Kumar, Jai Musunuri#macos#secure-coding#forensics+1
2018-03-03PanelNullcon Forensic Challenges and Road Ahead Video Manu Zacharia, Brijesh Singh, Sanjay Bahl, Vladimir Katalov#data-leak#data-protection#forensics+4
2018-03-02PanelNullcon Should all ciso promote hall of fame” within their organizations Video Burgess Cooper, Durga Dube, Thom Langford, Harish Pillay#security-training#cybersecurity-strategy#bug-bounty+1
2017-08-18TalkC0c0n Call Centre Frauds Parry Aftab, Betsy Broder#social-engineering#security-training#risk-management+1
2017-08-18TalkC0c0n Cyber Security Threat Management – Model it, Collect Intelligence and Hunt them! Illyas Kooliyankal#blueteam#cyber-crime#intelligence-sharing+3
2017-08-18TalkC0c0n Hunting the Hunters – Fighting CyberCrime at the Source Valan Sivasubramanian#red-teaming#cybersecurity-strategy#cyber-crime+2
2017-04-13KeynoteHitbsecconf Redefining Defense Presentation Video Saumil Shah#blueteam#security-strategy#incident-management+2
2017-03-31TalkBlackhat WHAT MALWARE AUTHORS DON’T WANT YOU TO KNOW - EVASIVE HOLLOW PROCESS INJECTION Presentation Whitepaper Video Monnappa K A#code-injection#red-teaming#malware-research+4
2017-03-03TalkNullcon Breach Response - Time to shake up the status quo Video K K Mookhey, Pranesh Prakash, Sahir Hidayatullah, Shobha Jagathpal#incident-management#risk-management#architecture+1
2017-03-03TalkNullcon Case Study on RFID (proximity cards) hacking Presentation Sarwar Jahan, Ashwath Kumar#rfid#red-teaming#hardware-embedded+4
2016-10-19TalkHacklu 2016: The Infosec Crossroads Presentation Saumil Shah#philosophy#security-strategy#incident-management+3
2016-10-05TalkVirusbulletin One-Click Fileless Infection Presentation Whitepaper Video Himanshu Anand, Chastine Menrige#reverse-engineering#incident-management#endpoint-protection+3
2016-09-14Talk44con 2016: The Infosec Crossroads Presentation Video Saumil Shah#blueteam#security-strategy#threat-modeling+4
2016-08-19TalkC0c0n SSD Forensics : A Nightmare for Forensic Investigators Santosh Khadsare#forensics#memory-forensics#incident-management+2
2016-08-04Tool demoBlackhat rastrea2r: Collecting & Hunting for IOCs with Gusto and Style Source Code Sudheendra Bhat#incident-management#threat-hunting#ioc+1
2016-05-17TalkPhdays Fingerprinting and Attacking a Healthcare Infrastructure Presentation Anirudh Duggal#red-teaming#fingerprinting#ransomware+4
2015-11-05TalkGroundzerosummit Cyber Security in Hospitals:Hospitals Under Seige Anirudh Duggal#hl7#data-protection#incident-management
2015-11-05TalkGroundzerosummit Exposing Cyber Espionage: Hello from Pakistan- IIC Session Jiten Jain#incident-management#reverse-engineering#security-assessment
2015-11-05TalkGroundzerosummit Authentication flaw in Automatic Bank Passbook printing machine. Indrajeet Bhuyan#authentication#identity-management#application-pentesting+3
2015-11-05TalkGroundzerosummit OSINT Black Magic: Listen who whispers your name in the dark!!! Presentation Source Code Sudhanshu Chauhan, Nutan Kumar Panda#osint#deep-web#data-leak+4
2015-10-08TalkBrucon The .11 Veil, Camouflage & Covert!!! Invisible Wifi, Revealed Presentation Video Rushikesh D Nandedkar, Amrita C Iyer#wifi#network-pentesting#security-testing+2
2015-08-09TalkDefcon 802.11 Monitoring with PCAP2XML/SQLite Video Vivek Ramachandran#network-forensics#packet-analysis#network-monitoring+3
2015-03-26TalkBlackhat The underground Ecosystem of Credit Card frauds Presentation Whitepaper Video Abhinav Singh#red-teaming#data-leak#identity-theft+1
2015-03-15TalkBlackhat 2015 State of Vulnerability Exploits Presentation Video Amol Sarwate#automated-scanning#vulnerability-assessment#risk-management+1
2015-02-06PanelNullcon 2015: The Global Threat Defense Landscape - A discussion on the challenges faced by enterprises in engaging the bad guys Shomiron Das Gupta, K S Narayanan, Shantanu Ghosh, Subrahmanya Gupta Boda, Vishal Salvi, Benjamin Rivera#cyber-crime#incident-management#attack-surface+1
2015-01-27TalkOwaspappseccalifornia Anatomy of memory scraping, credit card stealing POS malware Video Amol Sarwate#reverse-engineering#incident-management#architecture
2014-09-28TalkBlackhat Understanding IMSI Privacy Presentation Video Swapnil Udar, Ravishankar Borgaonkar#imsi#red-teaming#android+4
2014-09-18TalkAppsecusa Anatomy of memory scraping, credit card stealing POS malware Video Amol Sarwate#reverse-engineering#memory-forensics#incident-management
2014-08-22TalkC0c0n APT: Case Study of attackers targeting public tendering Rahul Sasi#red-teaming#apt#attack-surface+4
2014-08-22TalkC0c0n Hacking Communication Akib Sayyed#red-teaming#network-architecture#social-engineering+1
2014-08-22TalkC0c0n Piracy Tracker Vargheese Babu#blueteam#network-monitoring#security-analytics+3
2013-11-21TalkDeepsec Europe In The Carna Botnet: Telnet’s Threat To The Largest Economy Video Parth Shukla#botnet#telnet#network-architecture+3
2013-11-07TalkGroundzerosummit Approach to containing the outbreak of malicious information in online social networks Sriniketh Vijayaraghavan#incident-management#social-engineering#phishing+1
2013-11-07TalkGroundzerosummit Setting the Data Center on fire Ajit Hatti#red-teaming#incident-management#security-training+1
2013-08-01TalkBlackhat Hot knives through butter: Bypassing automated analysis systems Presentation Whitepaper Video Abhishek Singh, Zheng Bu#red-teaming#dynamic-analysis#malware-research+1
2013-03-01TalkNullcon Sensitive Campus Security with Network Video Aravind Sitaraman#blueteam#network-monitoring#security-strategy+4
2012-12-01TalkClubhack Real Time Event Recording System, the tool for Digital Forensics Investigation Presentation Video Madhav Limaye#digital-forensics#endpoint-protection#endpoint-hardening+4
2012-09-29TalkNullcon Next-gen Forensics K K Mookhey#forensics#digital-forensics#incident-management+2
2012-09-26TalkNullcon Forensics Timeline Analysis Video Aashish Kunte#forensics#blueteam#digital-forensics+3
2012-09-26TalkNullcon Nullcon_delhi_2012 Presentation Source Code Prasanna Kanagasabai#ethical-hacking#social-engineering#security-training+1
2012-07-14TalkHope Advancements in Botnet Attacks and Malware Distribution Video Aditya K Sood#botnet#web-security#reverse-engineering+1
2012-02-15TalkNullcon Cyberspace: Global commons or a national asset Kamlesh Bajaj#cyber-law#cybersecurity-framework#incident-management+1
2011-11-25TalkMalcon Exploit the Exploit kits Dhruv Soi#blueteam#exploit-kit#malware-detection+3
2011-10-07TalkC0c0n Digital Evidence Sushanth Samudrala#forensics#digital-forensics#incident-management+2
2011-09-06TalkSecuritybyte Using Data Analytics for Incident Response Presentation Samir Saklikar#incident-management#data-analytics#security-analytics+3
2011-03-30TalkTroopers Femtocell: Femtostep to the Holy Grail Presentation Ravishankar Borgaonkar, Kevin Redon#red-teaming#application-pentesting#mobile-hacking+1
2011-02-25TalkNullcon Incident Management and Beyond Dinesh O Bareja#incident-management#data-leak#phishing+2
2011-02-25TalkNullcon Security Analysis of India’s Electronic Voting Machines: Memoirs of a whistleblower Presentation Video Hari Krishna Prasad Vemuru#evm#red-teaming#hardware-embedded+3
2010-12-04TalkClubhack Mantra – Free and Open Source security framework based on browser platform Presentation Abhi M Balakrishnan#blueteam#endpoint-protection#application-pentesting+3
2010-12-04TalkClubhack Windows Memory Forensic Analysis Presentation Aashish Kunte#windows#forensics#memory-forensics+3
2010-08-01TalkC0c0n Concept, Methodology and Challenges in Computer Forensics Sebastian Edassery#forensics#digital-forensics#incident-management+2
2010-07-01TalkHitbsecconf The Travelling Hacksmith 2009 – 2010 Saumil Shah#red-teaming#application-pentesting#phishing+2
2010-02-25TalkNullcon Botnet mitigation, monitoring and management. Presentation Harshad Patil#botnet#blueteam#malware-detection+4
2009-12-05TalkClubhack Incident Handling and Log Analysis for Web Based Incidents Presentation Manindra Kishore#incident-management#forensics#application-pentesting+2
2009-12-05TalkClubhack Risk Based Penetration Testing Presentation Nikhil Wagholikar, K K Mookhey#security-assessment#incident-management#cybersecurity-strategy+1
2009-11-17TalkSecuritybyte Behind the scenes at the MSRC Presentation Suresh Venkateswaran, Dave Midturi#incident-management#forensics#memory-forensics+1
2009-11-17TalkSecuritybyte Business Continuity Case Study Venkataram Arabolu#business-continuity#risk-management#business-resilience+3
2009-08-06TalkC0c0n Cyber Forensics Krishna Sastry Pendyal#forensics#digital-forensics#data-leak+4
2009-08-06TalkC0c0n Cyber Victimisation K Jaishankar#cybersecurity-education#security-training#risk-management+1
2007-12-09TalkClubhack Mining Digital Evidence in Microsoft Windows – Answering Who, When, Why and How? Presentation Chetan Gupta#forensics#windows#data-loss-prevention+4
2007-08-02TalkBlackhat Smoke ’em Out! Presentation Whitepaper Rohyt Belani#forensics#incident-management#digital-forensics+4
2007-08-02TalkBlackhat The Evolution Of Phishing To Organized Crime Video Rohyt Belani#social-engineering#phishing#threat-modeling+2
2006-08-02TalkBlackhat Web Application Incident Response & Forensics: A Whole New Ball Game! Presentation Whitepaper Rohyt Belani, Chuck Willis#application-pentesting#code-review#incident-management+3
2005-09-29TalkHitbsecconf Trends in Real World Attacks: A Compilation of Case Studies Video Rohyt Belani#red-teaming#application-pentesting#application-hardening+4
2004-04-21TalkCansecwest Cisco PSIRT TCP/BGP Sharad Ahlawat#incident-management#forensics#network-forensics