🧪 Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Risk Management

Focus Area: ⚖️ Governance, Risk & Compliance
133
Total Entries
134
Contributors

Top Contributors

Sunil Varkey(7) Biju K(4) Mahesh Kalyanaraman(4) Anup Narayanan(3) Harshit Agrawal(3)

All Entries (133 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-08-07Tool demoBlackhat Cloud Offensive Breach and Risk Assessment (COBRA) Source Code Harsha Koushik, Anand Tiwari#cloud-pentesting#risk-management#edr
2025-08-06Tool demoBlackhat ThreatShield - The Intelligent way of Threat Modelling Source Code Ashwin Shenoi, Satyam Nagpal, Sayooj B Kumar#threat-modeling#architecture#devsecops+1
2025-04-30TalkRsac Got Supply Pain? A Real-World Approach to Supply Chain SDL Video Mohit Arora, Richard Tonry#secure-development#devsecops#risk-management+4
2025-04-29TalkRsac It’s Always Risky in IT: Frontline Stories and Strategic Insights Whitepaper Video Gourav Nagar, Rohit Bansal#risk-management#security-compliance#cyber-resilience+4
2025-03-02TalkNullcon eKYC Crisis: Securing the Lockers Video Kartik Lalan#risk-management#architecture#data-leak+4
2024-11-16TalkC0c0n The subtle art of checkmating CISOs Video Sunil Varkey#risk-management#architecture#security-governance+2
2024-11-15TalkC0c0n CISO’s take on BYOAI Video Venugopal Parameswara#risk-management#security-governance#security-compliance+3
2024-05-09TalkRsac The Good, the Bad, and the Bounty: 10 Years of Buying Bugs at Microsoft Video Aanchal Gupta, Katie Moussouris#bug-bounty#risk-management#security-governance
2024-05-07TalkRsac A Proven Approach on Automated Security Architectural Pattern Validation Video Sunil Arora, Parthasarathi Chakraborty#architecture#devsecops#risk-management+1
2024-05-07TalkRsac Anatomy of a Vulnerability Response - A View from the Inside Video Mohit Arora, Richard Tonry#incident-management#risk-management#compliance-governance
2024-04-19TalkBlackhat China’s Military Cyber Operations: Has the Strategic Support Force Come of Age? Presentation Pukhraj Singh#ics-security#risk-management#architecture
2023-08-12TalkDefcon Getting More Bang for your Buck:Appsec on a Limited Budget Video Vandana Verma Sehgal, Viraj Gandhi#secure-development#devsecops#risk-management+2
2023-08-09TalkBlackhat Diversity Microtalks: Perspectives on Creating Change Presentation Aastha Sahni, Andy Ellis, Meghan Jacquot, Sherri Davidoff#security-training#risk-management#security-governance
2023-08-07TalkC0c0n Citizen Mobile Security: Responsibilities, Accountability, and Impacts Satyendra Verma#security-training#risk-management#compliance-governance
2023-08-07TalkC0c0n Cyber Threats to Global Financial Systems Video Lince Lawrence#incident-management#risk-management#cloud-monitoring+4
2023-08-07TalkC0c0n ESOC Trinetra Project Pankaj Kumar Dalela#security-governance#risk-management#security-training
2023-08-07PanelC0c0n Evolving Threat Landscape: Strategies for Adapting and Innovating in Cybersecurity Vikas Arora, Sanjay Singh, Baidyanath Kumar, Saurabh Gugnani, Gokulavan Jayaraman, Vijay Nair#security-strategy#threat-modeling#security-training+3
2023-08-07TalkC0c0n Generative AI and Cyber Crimes Video Brijesh Singh#security-training#risk-management#threat-hunting
2023-08-07TalkC0c0n Trust Resiliency - A Lesson Learned from Russia Ukraine War Video Ajit Hatti#incident-management#architecture#risk-management+1
2023-08-06TalkC0c0n CBDC and future of Finance Video Sunil Raveendran#digital-currency#decentralized-systems#compliance-governance+2
2023-08-06TalkC0c0n Cryptocurrencies and challenges to Law Enforcement Agencies Bhushan Gulabrao Borase#decentralized-systems#digital-currency#security-compliance+1
2023-08-06TalkC0c0n Cybercrimes Victim Compensation : Legal Remedies and Process Nisheeth Dixit#security-compliance#security-governance#risk-management+1
2023-08-06TalkC0c0n Digital Innovation and its Impact on CIOs, CISOs and DPOs Navaneethan M#security-compliance#security-governance#risk-management+2
2023-08-06TalkC0c0n Emerging crimes and threat landscape in cyber domain and the need for international cooperation Video Kiran Sivakumar#threat-landscape#threat-modeling#risk-management
2023-08-06TalkC0c0n Influence of Artificial Intelligence in GRC Space Mahesh Kalyanaraman#security-governance#risk-management#security-compliance+2
2023-08-06TalkC0c0n Insider Threats - Best Practices and Common Pitfalls Video Georgie Kurien#insider-threats#risk-management#security-training+1
2023-08-06TalkC0c0n Playing cat and mouse with the Adversary: Sometimes a breach is inevitable Video Abhijith B R#incident-management#risk-management#security-strategy+1
2023-08-06TalkC0c0n Subduing Adversaries with Information Superiority Video Antony K M#threat-hunting#security-monitoring#threat-detection+2
2023-08-06TalkC0c0n Survivability in the Cyber World Video Sunil Varkey#incident-management#risk-management#architecture
2023-04-26TalkRsac Is Increasing Security Maturity And Decreasing Operational Load Possible? Video Rohit Dhamankar#risk-management#architecture#security-governance+1
2023-04-21TalkHitbsecconf LOCKNOTE:THE HAND THAT STRIKES, ALSO BLOCKS Presentation Video Saumil Shah#architecture#risk-management#security-training+1
2022-09-28TalkRootcon Gazing into the Crystal Ball - The Fog of Cyberwarfare Escalations Harshit Agrawal#ics-security#architecture#risk-management
2022-09-24TalkC0c0n Building Smart, Resilient and Sustainable Cyber Eco System Navin Kumar Singh#risk-management#cybersecurity-strategy#architecture+4
2022-09-24TalkC0c0n Cyber Defence and Role of private players - public private partnership Jasbir Singh Solanki#security-governance#risk-management#security-compliance+1
2022-09-24TalkC0c0n In production with GRC for cloud Mahesh Kalyanaraman#cloud-compliance#security-governance#risk-management+1
2022-09-24TalkC0c0n Power of Narratives in Cyber Security Sunil Varkey#security-training#cybersecurity-education#human-factor+2
2022-09-24TalkC0c0n Rationalizing Cyber Security Risk in Risk Language Anish Koshy#risk-management#security-governance#cybersecurity-strategy+3
2022-09-23TalkC0c0n Battle of 300 Crore - how they lost it and got most of it back Prashant Choudhary#incident-management#risk-management#architecture
2022-09-23TalkC0c0n Collaborative efforts for safe digital banking Biju K#secure-development#risk-management#architecture
2022-09-23TalkC0c0n Cybersecurity for Manufacturing Santhosh Srinivasan#ics-security#control-systems#critical-infrastructure+2
2022-09-23TalkC0c0n Maximizing ROI on cyber security investments: Do you think Adversary Simulation OR Purple teaming holds the key? Presentation Abhijith B R#risk-management#architecture#devsecops
2022-09-23TalkC0c0n Rolling out Central Bank Digital Currency - Technical Design Considerations Sunil Raveendran#architecture#compliance-governance#risk-management+1
2022-09-23TalkC0c0n Startup Ecosystem and Investments in Post Covid Era Sunil Kanchi#risk-management#security-compliance#security-governance+2
2022-09-23TalkC0c0n Technological Reliance for Resilience Tulika Pandey#risk-management#cyber-resilience#architecture+2
2022-09-08TalkNullcon vPrioritizer: Art of Risk Prioritization Presentation Pramod Rana#vulnerability-assessment#security-development-lifecycle#risk-management+3
2022-08-14TalkDefcon Tales from the trenches - why organizations struggle to get even the basics of OT asset visibility & detection right Vivek Ponnada#ics-security#risk-management#architecture+1
2022-08-11TalkThedianainitiative Connecting Dots Between Security Teams & Customer Expectations Video Shruthi Kamath#security-governance#risk-management#architecture+2
2022-08-11TalkThedianainitiative The Real Cost of Free: What you need to know before downloading a free app Video Ruchira Pokhriyal#app-security#data-protection#security-training+1
2022-07-23TalkMaycontainhackers How would a real life social media be like? Aditi Bhatnagar#data-protection#security-training#risk-management+3
2021-11-13TalkC0c0n Changing Cyber Security Paradigm & Cyber Tsunami Sunil Varkey#cybersecurity-strategy#threat-landscape#risk-management+3
2021-11-13TalkC0c0n Connecting the dots between customers and security teams Shruthi Kamath#incident-management#security-training#devsecops+1
2021-11-13TalkC0c0n Crisis Capitalization in a Pandemic Greeshma M R#risk-management#incident-management#security-training+2
2021-11-13TalkC0c0n Cybersecurity in the era of Resilience - A walk through people, process and technology Babitha B P#risk-management#cyber-resilience#architecture+3
2021-11-13TalkC0c0n Need for Zero Trust in Banking Biju K#zero-trust#risk-management#architecture+1
2021-11-13TalkC0c0n Painting Your Organizations with Shades of Red, Blue & Purple Video Hidayath Khan#red-teaming#ethical-hacking#threat-modeling+2
2021-11-13TalkC0c0n Post pandemic Transformation - A CISO’s perspective Sridhar Govardhan#risk-management#security-governance#security-compliance+3
2021-11-13TalkC0c0n Third Party Risk Management Mahesh Kalyanaraman#risk-management#compliance-governance#supply-chain+2
2021-11-12TalkC0c0n 2021 Supply Chain Attacks Analysis Ajit Hatti#incident-management#risk-management#supply-chain+1
2021-11-12TalkC0c0n Enterprise Governance and Risk Management Arathy Nair, Muskan Mangla#security-compliance#security-governance#risk-management+1
2021-11-12TalkC0c0n Post Covid CISOs - Disappearing trusted boundaries and Innovative CyberSecurity Approaches Illyas Kooliyankal#risk-management#architecture#security-governance+1
2021-11-12TalkC0c0n Regulating Social Media Platforms : Should it be done in Democratic Societies ? J Sam Daniel Stalin, Apar Gupta, Dinesh O Bareja, Prashant Mali, Jiten Jain#security-compliance#security-governance#risk-management+3
2021-11-12TalkC0c0n The evolving nature of cyber community Aastha Sahni#security-training#risk-management#cybersecurity-education
2021-10-13TalkRootcon The Kill Chain: Future of Cyber in Defense Video Harshit Agrawal#architecture#ics-security#risk-management
2021-08-26TalkHitbsecconf Gazing Ahead: What Modern RF Combat Looks Like in the Next Decade Presentation Video Harshit Agrawal#ics-security#architecture#risk-management
2020-11-21TalkAppsecindonesia The caveats of the unseen: Crouching exposure, Hidden Misconfiguration Ashwin Vamshi#architecture#devsecops#risk-management+1
2020-09-18TalkC0c0n Herd Immunity, in the Cyber World Sunil Varkey#security-training#risk-management#architecture
2020-09-18TalkC0c0n Coping with Digital Transformation - A CISO perspective Video Maya R Nair#risk-management#security-governance#architecture+2
2020-09-18TalkC0c0n COVID-19 Cyber impact on financial sector and remote employees Video Amit Dubey, Tal Catran, Yair Feldman#incident-management#risk-management#cybersecurity-strategy+4
2020-09-18TalkC0c0n Cyber Security Shifts During COVID-19 Video Sunil Kanchi#risk-management#security-training#compliance-governance+1
2020-08-21TalkThedianainitiative Trust, No Trust or Zero Trust - Myth Demystifying Vandana Verma Sehgal#zero-trust#architecture#security-compliance+2
2020-03-07PanelNullcon Supply Chain Security In Critical Infrastructure Systems Video Manish Tiwari, Suchit Mishra, Faruk Kazi, Cristofaro Mune#supply-chain-attack#supply-chain-security#critical-infrastructure+3
2019-09-28PanelC0c0n Align security and risk management strategies with enterprise objectives Video Abdul Karim Vettiyanickal, George Eapen, Ranjeet Rai, Amit Dubey, Biju K, Kanu Pathania#security-strategy#cybersecurity-framework#cyber-resilience+4
2019-09-27TalkC0c0n A Day in the Life of a CISO Sridhar Govardhan#security-compliance#security-governance#risk-management+2
2019-09-27TalkC0c0n CISO Mind Set Lopa Mudraa Basuu#risk-management#security-governance#security-compliance+1
2019-09-27PanelC0c0n Digital Transformation and Evolving Governance Structure Video A Shiju Rawther, Ajith Balagopal, Balakrishnan A, Sreekumar Balachandran#cybersecurity-strategy#security-governance#risk-management+2
2019-09-27TalkC0c0n Industry 4.0 - Security and Compliance Santhosh Srinivasan#ics-security#security-compliance#security-governance+2
2019-09-27TalkC0c0n Practical Approach to Cyber Security for financial institutions Georgie Kurien#financial-institutions#secure-development#risk-management+2
2019-09-27TalkC0c0n RANSOMWARE - to pay or not to pay Seshaprakash Kusuma Sreenivasa#ransomware#incident-management#risk-management
2019-03-02PanelNullcon Navigating Risk in the Changing Business and Technology Landscape Video Rahul Neel Mani, Burgess Cooper, Manish Tiwari, Mannan Godil#risk-management#cybersecurity-strategy#business-resilience+4
2018-10-15TalkHacklu Come to the dark side! We have radical insurance groups & ransomware Video Ankit Gangwal, Eireann Leverett#ransomware#risk-management#cyber-insurance+2
2018-10-05TalkC0c0n Adaptive GRC Mahesh Kalyanaraman#security-compliance#security-governance#risk-management
2018-10-05TalkC0c0n Dealing with Changing Threat Landscape Vijendra Katiyar#threat-landscape#threat-hunting#risk-management
2018-10-05TalkC0c0n Digital Innovation revolution in Kerala Government Sunil Varkey#cybersecurity-strategy#architecture#risk-management+2
2018-10-05TalkC0c0n Future of Mobility & Cyber Security Suja Chandy#automotive-cybersecurity#ics-security#architecture+2
2018-10-05TalkC0c0n Resiliency Focus alongside Digital Disruption Lince Lawrence#architecture#risk-management#security-training+2
2018-10-05TalkC0c0n Taking cyber security to the board room Amit Pradhan#risk-management#security-compliance#security-governance+2
2018-10-05TalkC0c0n Will Artificial Intelligence And Machine Learning Bring More Threats On Cyber Security? Roshy John#risk-management#architecture#ai-security+2
2018-03-02PanelNullcon Economics of Hacks & Data Breaches Who Pays, Who Secures & Who Wins Vinayak Godse, Ashutosh Jain, Bhishma Maheshwari, Manish Tiwari, Suchit Mishra#data-breach#risk-management#cybersecurity-strategy
2017-08-19TalkC0c0n Building Trust for Digital Transactions in India’s COD Culture Parry Aftab, Betsy Broder, Sridhara R Sidhu, Mirza Faizan#secure-development#risk-management#architecture
2017-08-19TalkC0c0n The Public Private Partnership - Navigating the Govt Saikat Datta#security-compliance#security-governance#risk-management+1
2017-08-19TalkC0c0n Trust, the foundation of Digital Mastery Sunil Varkey#identity-management#authentication#risk-management+2
2017-08-18TalkC0c0n Call Centre Frauds Parry Aftab, Betsy Broder#social-engineering#security-training#risk-management+1
2017-08-18TalkC0c0n Challenges in Digital Banking Biju K#security-training#security-governance#risk-management
2017-08-18TalkC0c0n Moving from Cybersecurity Awareness to Cybersecurity Competence Anup Narayanan#cybersecurity-education#cybersecurity-training#security-training+3
2017-03-03TalkNullcon Breach Response - Time to shake up the status quo Video K K Mookhey, Pranesh Prakash, Sahir Hidayatullah, Shobha Jagathpal#incident-management#risk-management#architecture+1
2017-03-03TalkNullcon Securing Critical National Infrastructure Video Shailendra Fuloria, R Sarangapani, Rahul Tongia, Michael Pyle, Justin Searle#critical-infrastructure#ics-security#risk-management+3
2016-08-04TalkBlackhat Understanding HL7 2.x Standards Pen Testing and Defending HL7 2.x Messages Video Anirudh Duggal#ics-security#risk-management#application-pentesting+3
2015-09-24TalkAppsecusa Encouraging Diversity and Advancing Cybersecurity Education Shruthi Kamath, Apoorva Giri, Elissa Shevinsky#cybersecurity-education#security-training#risk-management+1
2015-03-15TalkBlackhat 2015 State of Vulnerability Exploits Presentation Video Amol Sarwate#automated-scanning#vulnerability-assessment#risk-management+1
2015-02-06TalkNullcon Building security and compliance into the software delivery process Anubhav Bathla, Dinesh Pillai, S Chandrasekhar, Harish Pillay#secure-development#devsecops#security-compliance+3
2014-11-13TalkGroundzerosummit 9 Cell Cyber Diplomacy Alok Vijayant#architecture#risk-management#security-governance
2014-11-13TalkGroundzerosummit Financial Integrity and Cyber Security Karnal Singh#risk-management#security-compliance#security-governance
2014-11-13TalkGroundzerosummit Internet Governance Anjana Kovacs#security-governance#security-compliance#risk-management+1
2013-11-20TalkAppsecusa Project Talk: OWASP OpenSAMM Project Presentation Pravir Chandra, Seba Deleersnyder#software-security#secure-development#devsecops+4
2013-09-27TalkC0c0n Hello CISO! How to make end-users LIKE and FOLLOW “Brand Infosec”? Anup Narayanan#security-training#cybersecurity-education#security-governance+3
2013-09-27TalkC0c0n Risk and challenges in virtual currencies. Harsh Patel, Swatantra Kumar Gupta#digital-currency#cryptocurrency#decentralized-systems+4
2013-08-15TalkUsenix Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness Presentation Whitepaper Devdatta Akhawe, Adrienne Felt#web-security#security-training#architecture+2
2013-08-15TalkUsenix An Empirical Study of Vulnerability Rewards Programs Presentation Whitepaper Devdatta Akhawe, David Wagner, Matthew Finifter#bug-bounty#software-security#risk-management+2
2012-12-01TalkClubhack The difference between the “Reality” and “Feeling” of Security: Information Security and the Human Being Presentation Video Thomas Kurian Ambattu#security-training#human-factor#risk-management+2
2012-10-26TalkAppsecusa The 7 Qualities of Highly Secure Software Video Mano Paul#secure-development#software-security#secure-coding+3
2012-08-04TalkC0c0n Impact of cyber laws on various stakeholders Sagar Rahurkar#security-compliance#security-governance#regulatory-compliance+1
2012-08-03TalkC0c0n A model to reduce information security risks due to human error Presentation Anup Narayanan#security-training#behavior-change#risk-management
2012-08-03TalkC0c0n Business Continuity and Risk Management in Turbulent Times Venkataram Arabolu#risk-management#business-continuity#security-compliance+2
2012-08-03TalkC0c0n Gathering security requirements K v Prashant, Saleem Ahamed#security-testing#secure-development#security-development-lifecycle+2
2012-08-03TalkC0c0n The Weakest Link - Reinforcing the Human Element Sandeep Godbole#security-training#human-factor#cybersecurity-education+3
2011-11-17TalkDeepsec Behavioral Security: 10 steps forward 5 steps backward Video Sourabh Satish#security-training#behavioral-change#risk-management+2
2011-09-19TalkBrucon Step-by-Step for Software Security (that anyone can follow) Pravir Chandra#software-security#secure-development#devsecops+4
2011-09-06TalkSecuritybyte Application Security Strategies Presentation K K Mookhey#secure-coding#secure-development#web-security+3
2011-09-06TalkSecuritybyte Security Threats on Social Networks Presentation Nithya Raman#social-engineering#web-security#security-training+1
2011-03-15TalkNullcon Information Warfare Ñ The Indian Perspective Alok Vijayant#cybersecurity-strategy#risk-management#security-training+1
2010-11-25TalkDeepsec Developers are from Mars, Compliance Auditors are from Venus Video Neelay S Shah#security-compliance#security-governance#risk-management+4
2010-08-01TalkC0c0n Hackers’ EcoSystem in India Rohit Srivastwa#security-assessment#security-training#risk-management
2010-08-01TalkC0c0n Overview of Cyber Legal Systems in India Sagar Rahurkar#cyber-law#cyber-resilience#cybersecurity-strategy+4
2010-03-15TalkBlackhat 400 Apps in 40 Days Presentation Video Nish Bhalla, Sahba Kazerooni#risk-management#application-pentesting#attack-surface+1
2009-11-18TalkSecuritybyte Risk based Penetration Testing Presentation K K Mookhey#security-assessment#risk-management#ethical-hacking+3
2009-11-17TalkSecuritybyte Business Case-Risk Management/Compliance at AMITY Js Sodhi#security-compliance#security-governance#risk-management+2
2009-11-17TalkSecuritybyte Business Continuity Case Study Venkataram Arabolu#business-continuity#risk-management#business-resilience+3
2009-11-17TalkSecuritybyte Threat Modeling Presentation Varun Sharma#threat-modeling#blueteam#security-strategy+4
2009-11-17TalkSecuritybyte Usability and Privacy in Security Presentation Ponnurangam Kumaraguru#data-protection#architecture#security-training+2
2009-08-06TalkC0c0n Cyber Victimisation K Jaishankar#cybersecurity-education#security-training#risk-management+1
2009-08-06TalkC0c0n Information Security Audit Venkatapathy Subramaniam#security-compliance#security-governance#audit+1
2009-08-06TalkC0c0n Information Warfare A a Gafoor, Vinayak Mishra#threat-hunting#threat-modeling#security-training+2
1998-07-29TalkBlackhat Security as an enabler for new business opportunities - The Business Value of Security Karan Khanna#risk-management#business-continuity#cyber-resilience+3