| 2025-08-07 | Tool demo | Blackhat |
Cloud Offensive Breach and Risk Assessment (COBRA)
| Harsha Koushik, Anand Tiwari | #cloud-pentesting#risk-management#edr |
| 2025-08-06 | Tool demo | Blackhat |
ThreatShield - The Intelligent way of Threat Modelling
| Ashwin Shenoi, Satyam Nagpal, Sayooj B Kumar | #threat-modeling#architecture#devsecops+1 |
| 2025-04-30 | Talk | Rsac |
Got Supply Pain? A Real-World Approach to Supply Chain SDL
| Mohit Arora, Richard Tonry | #secure-development#devsecops#risk-management+4 |
| 2025-04-29 | Talk | Rsac |
It’s Always Risky in IT: Frontline Stories and Strategic Insights
| Gourav Nagar, Rohit Bansal | #risk-management#security-compliance#cyber-resilience+4 |
| 2025-03-02 | Talk | Nullcon |
eKYC Crisis: Securing the Lockers
| Kartik Lalan | #risk-management#architecture#data-leak+4 |
| 2024-11-16 | Talk | C0c0n |
The subtle art of checkmating CISOs
| Sunil Varkey | #risk-management#architecture#security-governance+2 |
| 2024-11-15 | Talk | C0c0n |
CISO’s take on BYOAI
| Venugopal Parameswara | #risk-management#security-governance#security-compliance+3 |
| 2024-05-09 | Talk | Rsac |
The Good, the Bad, and the Bounty: 10 Years of Buying Bugs at Microsoft
| Aanchal Gupta, Katie Moussouris | #bug-bounty#risk-management#security-governance |
| 2024-05-07 | Talk | Rsac |
A Proven Approach on Automated Security Architectural Pattern Validation
| Sunil Arora, Parthasarathi Chakraborty | #architecture#devsecops#risk-management+1 |
| 2024-05-07 | Talk | Rsac |
Anatomy of a Vulnerability Response - A View from the Inside
| Mohit Arora, Richard Tonry | #incident-management#risk-management#compliance-governance |
| 2024-04-19 | Talk | Blackhat |
China’s Military Cyber Operations: Has the Strategic Support Force Come of Age?
| Pukhraj Singh | #ics-security#risk-management#architecture |
| 2023-08-12 | Talk | Defcon |
Getting More Bang for your Buck:Appsec on a Limited Budget
| Vandana Verma Sehgal, Viraj Gandhi | #secure-development#devsecops#risk-management+2 |
| 2023-08-09 | Talk | Blackhat |
Diversity Microtalks: Perspectives on Creating Change
| Aastha Sahni, Andy Ellis, Meghan Jacquot, Sherri Davidoff | #security-training#risk-management#security-governance |
| 2023-08-07 | Talk | C0c0n |
Citizen Mobile Security: Responsibilities, Accountability, and Impacts
| Satyendra Verma | #security-training#risk-management#compliance-governance |
| 2023-08-07 | Talk | C0c0n |
Cyber Threats to Global Financial Systems
| Lince Lawrence | #incident-management#risk-management#cloud-monitoring+4 |
| 2023-08-07 | Talk | C0c0n |
ESOC Trinetra Project
| Pankaj Kumar Dalela | #security-governance#risk-management#security-training |
| 2023-08-07 | Panel | C0c0n |
Evolving Threat Landscape: Strategies for Adapting and Innovating in Cybersecurity
| Vikas Arora, Sanjay Singh, Baidyanath Kumar, Saurabh Gugnani, Gokulavan Jayaraman, Vijay Nair | #security-strategy#threat-modeling#security-training+3 |
| 2023-08-07 | Talk | C0c0n |
Generative AI and Cyber Crimes
| Brijesh Singh | #security-training#risk-management#threat-hunting |
| 2023-08-07 | Talk | C0c0n |
Trust Resiliency - A Lesson Learned from Russia Ukraine War
| Ajit Hatti | #incident-management#architecture#risk-management+1 |
| 2023-08-06 | Talk | C0c0n |
CBDC and future of Finance
| Sunil Raveendran | #digital-currency#decentralized-systems#compliance-governance+2 |
| 2023-08-06 | Talk | C0c0n |
Cryptocurrencies and challenges to Law Enforcement Agencies
| Bhushan Gulabrao Borase | #decentralized-systems#digital-currency#security-compliance+1 |
| 2023-08-06 | Talk | C0c0n |
Cybercrimes Victim Compensation : Legal Remedies and Process
| Nisheeth Dixit | #security-compliance#security-governance#risk-management+1 |
| 2023-08-06 | Talk | C0c0n |
Digital Innovation and its Impact on CIOs, CISOs and DPOs
| Navaneethan M | #security-compliance#security-governance#risk-management+2 |
| 2023-08-06 | Talk | C0c0n |
Emerging crimes and threat landscape in cyber domain and the need for international cooperation
| Kiran Sivakumar | #threat-landscape#threat-modeling#risk-management |
| 2023-08-06 | Talk | C0c0n |
Influence of Artificial Intelligence in GRC Space
| Mahesh Kalyanaraman | #security-governance#risk-management#security-compliance+2 |
| 2023-08-06 | Talk | C0c0n |
Insider Threats - Best Practices and Common Pitfalls
| Georgie Kurien | #insider-threats#risk-management#security-training+1 |
| 2023-08-06 | Talk | C0c0n |
Playing cat and mouse with the Adversary: Sometimes a breach is inevitable
| Abhijith B R | #incident-management#risk-management#security-strategy+1 |
| 2023-08-06 | Talk | C0c0n |
Subduing Adversaries with Information Superiority
| Antony K M | #threat-hunting#security-monitoring#threat-detection+2 |
| 2023-08-06 | Talk | C0c0n |
Survivability in the Cyber World
| Sunil Varkey | #incident-management#risk-management#architecture |
| 2023-04-26 | Talk | Rsac |
Is Increasing Security Maturity And Decreasing Operational Load Possible?
| Rohit Dhamankar | #risk-management#architecture#security-governance+1 |
| 2023-04-21 | Talk | Hitbsecconf |
LOCKNOTE:THE HAND THAT STRIKES, ALSO BLOCKS
| Saumil Shah | #architecture#risk-management#security-training+1 |
| 2022-09-28 | Talk | Rootcon |
Gazing into the Crystal Ball - The Fog of Cyberwarfare Escalations
| Harshit Agrawal | #ics-security#architecture#risk-management |
| 2022-09-24 | Talk | C0c0n |
Building Smart, Resilient and Sustainable Cyber Eco System
| Navin Kumar Singh | #risk-management#cybersecurity-strategy#architecture+4 |
| 2022-09-24 | Talk | C0c0n |
Cyber Defence and Role of private players - public private partnership
| Jasbir Singh Solanki | #security-governance#risk-management#security-compliance+1 |
| 2022-09-24 | Talk | C0c0n |
In production with GRC for cloud
| Mahesh Kalyanaraman | #cloud-compliance#security-governance#risk-management+1 |
| 2022-09-24 | Talk | C0c0n |
Power of Narratives in Cyber Security
| Sunil Varkey | #security-training#cybersecurity-education#human-factor+2 |
| 2022-09-24 | Talk | C0c0n |
Rationalizing Cyber Security Risk in Risk Language
| Anish Koshy | #risk-management#security-governance#cybersecurity-strategy+3 |
| 2022-09-23 | Talk | C0c0n |
Battle of 300 Crore - how they lost it and got most of it back
| Prashant Choudhary | #incident-management#risk-management#architecture |
| 2022-09-23 | Talk | C0c0n |
Collaborative efforts for safe digital banking
| Biju K | #secure-development#risk-management#architecture |
| 2022-09-23 | Talk | C0c0n |
Cybersecurity for Manufacturing
| Santhosh Srinivasan | #ics-security#control-systems#critical-infrastructure+2 |
| 2022-09-23 | Talk | C0c0n |
Maximizing ROI on cyber security investments: Do you think Adversary Simulation OR Purple teaming holds the key?
| Abhijith B R | #risk-management#architecture#devsecops |
| 2022-09-23 | Talk | C0c0n |
Rolling out Central Bank Digital Currency - Technical Design Considerations
| Sunil Raveendran | #architecture#compliance-governance#risk-management+1 |
| 2022-09-23 | Talk | C0c0n |
Startup Ecosystem and Investments in Post Covid Era
| Sunil Kanchi | #risk-management#security-compliance#security-governance+2 |
| 2022-09-23 | Talk | C0c0n |
Technological Reliance for Resilience
| Tulika Pandey | #risk-management#cyber-resilience#architecture+2 |
| 2022-09-08 | Talk | Nullcon |
vPrioritizer: Art of Risk Prioritization
| Pramod Rana | #vulnerability-assessment#security-development-lifecycle#risk-management+3 |
| 2022-08-14 | Talk | Defcon |
Tales from the trenches - why organizations struggle to get even the basics of OT asset visibility & detection right
| Vivek Ponnada | #ics-security#risk-management#architecture+1 |
| 2022-08-11 | Talk | Thedianainitiative |
Connecting Dots Between Security Teams & Customer Expectations
| Shruthi Kamath | #security-governance#risk-management#architecture+2 |
| 2022-08-11 | Talk | Thedianainitiative |
The Real Cost of Free: What you need to know before downloading a free app
| Ruchira Pokhriyal | #app-security#data-protection#security-training+1 |
| 2022-07-23 | Talk | Maycontainhackers |
How would a real life social media be like?
| Aditi Bhatnagar | #data-protection#security-training#risk-management+3 |
| 2021-11-13 | Talk | C0c0n |
Changing Cyber Security Paradigm & Cyber Tsunami
| Sunil Varkey | #cybersecurity-strategy#threat-landscape#risk-management+3 |
| 2021-11-13 | Talk | C0c0n |
Connecting the dots between customers and security teams
| Shruthi Kamath | #incident-management#security-training#devsecops+1 |
| 2021-11-13 | Talk | C0c0n |
Crisis Capitalization in a Pandemic
| Greeshma M R | #risk-management#incident-management#security-training+2 |
| 2021-11-13 | Talk | C0c0n |
Cybersecurity in the era of Resilience - A walk through people, process and technology
| Babitha B P | #risk-management#cyber-resilience#architecture+3 |
| 2021-11-13 | Talk | C0c0n |
Need for Zero Trust in Banking
| Biju K | #zero-trust#risk-management#architecture+1 |
| 2021-11-13 | Talk | C0c0n |
Painting Your Organizations with Shades of Red, Blue & Purple
| Hidayath Khan | #red-teaming#ethical-hacking#threat-modeling+2 |
| 2021-11-13 | Talk | C0c0n |
Post pandemic Transformation - A CISO’s perspective
| Sridhar Govardhan | #risk-management#security-governance#security-compliance+3 |
| 2021-11-13 | Talk | C0c0n |
Third Party Risk Management
| Mahesh Kalyanaraman | #risk-management#compliance-governance#supply-chain+2 |
| 2021-11-12 | Talk | C0c0n |
2021 Supply Chain Attacks Analysis
| Ajit Hatti | #incident-management#risk-management#supply-chain+1 |
| 2021-11-12 | Talk | C0c0n |
Enterprise Governance and Risk Management
| Arathy Nair, Muskan Mangla | #security-compliance#security-governance#risk-management+1 |
| 2021-11-12 | Talk | C0c0n |
Post Covid CISOs - Disappearing trusted boundaries and Innovative CyberSecurity Approaches
| Illyas Kooliyankal | #risk-management#architecture#security-governance+1 |
| 2021-11-12 | Talk | C0c0n |
Regulating Social Media Platforms : Should it be done in Democratic Societies ?
| J Sam Daniel Stalin, Apar Gupta, Dinesh O Bareja, Prashant Mali, Jiten Jain | #security-compliance#security-governance#risk-management+3 |
| 2021-11-12 | Talk | C0c0n |
The evolving nature of cyber community
| Aastha Sahni | #security-training#risk-management#cybersecurity-education |
| 2021-10-13 | Talk | Rootcon |
The Kill Chain: Future of Cyber in Defense
| Harshit Agrawal | #architecture#ics-security#risk-management |
| 2021-08-26 | Talk | Hitbsecconf |
Gazing Ahead: What Modern RF Combat Looks Like in the Next Decade
| Harshit Agrawal | #ics-security#architecture#risk-management |
| 2020-11-21 | Talk | Appsecindonesia |
The caveats of the unseen: Crouching exposure, Hidden Misconfiguration
| Ashwin Vamshi | #architecture#devsecops#risk-management+1 |
| 2020-09-18 | Talk | C0c0n |
Herd Immunity, in the Cyber World
| Sunil Varkey | #security-training#risk-management#architecture |
| 2020-09-18 | Talk | C0c0n |
Coping with Digital Transformation - A CISO perspective
| Maya R Nair | #risk-management#security-governance#architecture+2 |
| 2020-09-18 | Talk | C0c0n |
COVID-19 Cyber impact on financial sector and remote employees
| Amit Dubey, Tal Catran, Yair Feldman | #incident-management#risk-management#cybersecurity-strategy+4 |
| 2020-09-18 | Talk | C0c0n |
Cyber Security Shifts During COVID-19
| Sunil Kanchi | #risk-management#security-training#compliance-governance+1 |
| 2020-08-21 | Talk | Thedianainitiative |
Trust, No Trust or Zero Trust - Myth Demystifying
| Vandana Verma Sehgal | #zero-trust#architecture#security-compliance+2 |
| 2020-03-07 | Panel | Nullcon |
Supply Chain Security In Critical Infrastructure Systems
| Manish Tiwari, Suchit Mishra, Faruk Kazi, Cristofaro Mune | #supply-chain-attack#supply-chain-security#critical-infrastructure+3 |
| 2019-09-28 | Panel | C0c0n |
Align security and risk management strategies with enterprise objectives
| Abdul Karim Vettiyanickal, George Eapen, Ranjeet Rai, Amit Dubey, Biju K, Kanu Pathania | #security-strategy#cybersecurity-framework#cyber-resilience+4 |
| 2019-09-27 | Talk | C0c0n |
A Day in the Life of a CISO
| Sridhar Govardhan | #security-compliance#security-governance#risk-management+2 |
| 2019-09-27 | Talk | C0c0n |
CISO Mind Set
| Lopa Mudraa Basuu | #risk-management#security-governance#security-compliance+1 |
| 2019-09-27 | Panel | C0c0n |
Digital Transformation and Evolving Governance Structure
| A Shiju Rawther, Ajith Balagopal, Balakrishnan A, Sreekumar Balachandran | #cybersecurity-strategy#security-governance#risk-management+2 |
| 2019-09-27 | Talk | C0c0n |
Industry 4.0 - Security and Compliance
| Santhosh Srinivasan | #ics-security#security-compliance#security-governance+2 |
| 2019-09-27 | Talk | C0c0n |
Practical Approach to Cyber Security for financial institutions
| Georgie Kurien | #financial-institutions#secure-development#risk-management+2 |
| 2019-09-27 | Talk | C0c0n |
RANSOMWARE - to pay or not to pay
| Seshaprakash Kusuma Sreenivasa | #ransomware#incident-management#risk-management |
| 2019-03-02 | Panel | Nullcon |
Navigating Risk in the Changing Business and Technology Landscape
| Rahul Neel Mani, Burgess Cooper, Manish Tiwari, Mannan Godil | #risk-management#cybersecurity-strategy#business-resilience+4 |
| 2018-10-15 | Talk | Hacklu |
Come to the dark side! We have radical insurance groups & ransomware
| Ankit Gangwal, Eireann Leverett | #ransomware#risk-management#cyber-insurance+2 |
| 2018-10-05 | Talk | C0c0n |
Adaptive GRC
| Mahesh Kalyanaraman | #security-compliance#security-governance#risk-management |
| 2018-10-05 | Talk | C0c0n |
Dealing with Changing Threat Landscape
| Vijendra Katiyar | #threat-landscape#threat-hunting#risk-management |
| 2018-10-05 | Talk | C0c0n |
Digital Innovation revolution in Kerala Government
| Sunil Varkey | #cybersecurity-strategy#architecture#risk-management+2 |
| 2018-10-05 | Talk | C0c0n |
Future of Mobility & Cyber Security
| Suja Chandy | #automotive-cybersecurity#ics-security#architecture+2 |
| 2018-10-05 | Talk | C0c0n |
Resiliency Focus alongside Digital Disruption
| Lince Lawrence | #architecture#risk-management#security-training+2 |
| 2018-10-05 | Talk | C0c0n |
Taking cyber security to the board room
| Amit Pradhan | #risk-management#security-compliance#security-governance+2 |
| 2018-10-05 | Talk | C0c0n |
Will Artificial Intelligence And Machine Learning Bring More Threats On Cyber Security?
| Roshy John | #risk-management#architecture#ai-security+2 |
| 2018-03-02 | Panel | Nullcon |
Economics of Hacks & Data Breaches Who Pays, Who Secures & Who Wins
| Vinayak Godse, Ashutosh Jain, Bhishma Maheshwari, Manish Tiwari, Suchit Mishra | #data-breach#risk-management#cybersecurity-strategy |
| 2017-08-19 | Talk | C0c0n |
Building Trust for Digital Transactions in India’s COD Culture
| Parry Aftab, Betsy Broder, Sridhara R Sidhu, Mirza Faizan | #secure-development#risk-management#architecture |
| 2017-08-19 | Talk | C0c0n |
The Public Private Partnership - Navigating the Govt
| Saikat Datta | #security-compliance#security-governance#risk-management+1 |
| 2017-08-19 | Talk | C0c0n |
Trust, the foundation of Digital Mastery
| Sunil Varkey | #identity-management#authentication#risk-management+2 |
| 2017-08-18 | Talk | C0c0n |
Call Centre Frauds
| Parry Aftab, Betsy Broder | #social-engineering#security-training#risk-management+1 |
| 2017-08-18 | Talk | C0c0n |
Challenges in Digital Banking
| Biju K | #security-training#security-governance#risk-management |
| 2017-08-18 | Talk | C0c0n |
Moving from Cybersecurity Awareness to Cybersecurity Competence
| Anup Narayanan | #cybersecurity-education#cybersecurity-training#security-training+3 |
| 2017-03-03 | Talk | Nullcon |
Breach Response - Time to shake up the status quo
| K K Mookhey, Pranesh Prakash, Sahir Hidayatullah, Shobha Jagathpal | #incident-management#risk-management#architecture+1 |
| 2017-03-03 | Talk | Nullcon |
Securing Critical National Infrastructure
| Shailendra Fuloria, R Sarangapani, Rahul Tongia, Michael Pyle, Justin Searle | #critical-infrastructure#ics-security#risk-management+3 |
| 2016-08-04 | Talk | Blackhat |
Understanding HL7 2.x Standards Pen Testing and Defending HL7 2.x Messages
| Anirudh Duggal | #ics-security#risk-management#application-pentesting+3 |
| 2015-09-24 | Talk | Appsecusa |
Encouraging Diversity and Advancing Cybersecurity Education
| Shruthi Kamath, Apoorva Giri, Elissa Shevinsky | #cybersecurity-education#security-training#risk-management+1 |
| 2015-03-15 | Talk | Blackhat |
2015 State of Vulnerability Exploits
| Amol Sarwate | #automated-scanning#vulnerability-assessment#risk-management+1 |
| 2015-02-06 | Talk | Nullcon |
Building security and compliance into the software delivery process
| Anubhav Bathla, Dinesh Pillai, S Chandrasekhar, Harish Pillay | #secure-development#devsecops#security-compliance+3 |
| 2014-11-13 | Talk | Groundzerosummit |
9 Cell Cyber Diplomacy
| Alok Vijayant | #architecture#risk-management#security-governance |
| 2014-11-13 | Talk | Groundzerosummit |
Financial Integrity and Cyber Security
| Karnal Singh | #risk-management#security-compliance#security-governance |
| 2014-11-13 | Talk | Groundzerosummit |
Internet Governance
| Anjana Kovacs | #security-governance#security-compliance#risk-management+1 |
| 2013-11-20 | Talk | Appsecusa |
Project Talk: OWASP OpenSAMM Project
| Pravir Chandra, Seba Deleersnyder | #software-security#secure-development#devsecops+4 |
| 2013-09-27 | Talk | C0c0n |
Hello CISO! How to make end-users LIKE and FOLLOW “Brand Infosec”?
| Anup Narayanan | #security-training#cybersecurity-education#security-governance+3 |
| 2013-09-27 | Talk | C0c0n |
Risk and challenges in virtual currencies.
| Harsh Patel, Swatantra Kumar Gupta | #digital-currency#cryptocurrency#decentralized-systems+4 |
| 2013-08-15 | Talk | Usenix |
Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness
| Devdatta Akhawe, Adrienne Felt | #web-security#security-training#architecture+2 |
| 2013-08-15 | Talk | Usenix |
An Empirical Study of Vulnerability Rewards Programs
| Devdatta Akhawe, David Wagner, Matthew Finifter | #bug-bounty#software-security#risk-management+2 |
| 2012-12-01 | Talk | Clubhack |
The difference between the “Reality” and “Feeling” of Security: Information Security and the Human Being
| Thomas Kurian Ambattu | #security-training#human-factor#risk-management+2 |
| 2012-10-26 | Talk | Appsecusa |
The 7 Qualities of Highly Secure Software
| Mano Paul | #secure-development#software-security#secure-coding+3 |
| 2012-08-04 | Talk | C0c0n |
Impact of cyber laws on various stakeholders
| Sagar Rahurkar | #security-compliance#security-governance#regulatory-compliance+1 |
| 2012-08-03 | Talk | C0c0n |
A model to reduce information security risks due to human error
| Anup Narayanan | #security-training#behavior-change#risk-management |
| 2012-08-03 | Talk | C0c0n |
Business Continuity and Risk Management in Turbulent Times
| Venkataram Arabolu | #risk-management#business-continuity#security-compliance+2 |
| 2012-08-03 | Talk | C0c0n |
Gathering security requirements
| K v Prashant, Saleem Ahamed | #security-testing#secure-development#security-development-lifecycle+2 |
| 2012-08-03 | Talk | C0c0n |
The Weakest Link - Reinforcing the Human Element
| Sandeep Godbole | #security-training#human-factor#cybersecurity-education+3 |
| 2011-11-17 | Talk | Deepsec |
Behavioral Security: 10 steps forward 5 steps backward
| Sourabh Satish | #security-training#behavioral-change#risk-management+2 |
| 2011-09-19 | Talk | Brucon |
Step-by-Step for Software Security (that anyone can follow)
| Pravir Chandra | #software-security#secure-development#devsecops+4 |
| 2011-09-06 | Talk | Securitybyte |
Application Security Strategies
| K K Mookhey | #secure-coding#secure-development#web-security+3 |
| 2011-09-06 | Talk | Securitybyte |
Security Threats on Social Networks
| Nithya Raman | #social-engineering#web-security#security-training+1 |
| 2011-03-15 | Talk | Nullcon |
Information Warfare Ñ The Indian Perspective
| Alok Vijayant | #cybersecurity-strategy#risk-management#security-training+1 |
| 2010-11-25 | Talk | Deepsec |
Developers are from Mars, Compliance Auditors are from Venus
| Neelay S Shah | #security-compliance#security-governance#risk-management+4 |
| 2010-08-01 | Talk | C0c0n |
Hackers’ EcoSystem in India
| Rohit Srivastwa | #security-assessment#security-training#risk-management |
| 2010-08-01 | Talk | C0c0n |
Overview of Cyber Legal Systems in India
| Sagar Rahurkar | #cyber-law#cyber-resilience#cybersecurity-strategy+4 |
| 2010-03-15 | Talk | Blackhat |
400 Apps in 40 Days
| Nish Bhalla, Sahba Kazerooni | #risk-management#application-pentesting#attack-surface+1 |
| 2009-11-18 | Talk | Securitybyte |
Risk based Penetration Testing
| K K Mookhey | #security-assessment#risk-management#ethical-hacking+3 |
| 2009-11-17 | Talk | Securitybyte |
Business Case-Risk Management/Compliance at AMITY
| Js Sodhi | #security-compliance#security-governance#risk-management+2 |
| 2009-11-17 | Talk | Securitybyte |
Business Continuity Case Study
| Venkataram Arabolu | #business-continuity#risk-management#business-resilience+3 |
| 2009-11-17 | Talk | Securitybyte |
Threat Modeling
| Varun Sharma | #threat-modeling#blueteam#security-strategy+4 |
| 2009-11-17 | Talk | Securitybyte |
Usability and Privacy in Security
| Ponnurangam Kumaraguru | #data-protection#architecture#security-training+2 |
| 2009-08-06 | Talk | C0c0n |
Cyber Victimisation
| K Jaishankar | #cybersecurity-education#security-training#risk-management+1 |
| 2009-08-06 | Talk | C0c0n |
Information Security Audit
| Venkatapathy Subramaniam | #security-compliance#security-governance#audit+1 |
| 2009-08-06 | Talk | C0c0n |
Information Warfare
| A a Gafoor, Vinayak Mishra | #threat-hunting#threat-modeling#security-training+2 |
| 1998-07-29 | Talk | Blackhat |
Security as an enabler for new business opportunities - The Business Value of Security
| Karan Khanna | #risk-management#business-continuity#cyber-resilience+3 |