| 2025-08-06 | Tool demo | Blackhat |
Damn Vulnerable Browser Extension (DVBE): Unmask the risks of your Browser Supplements
| Abhinav Khanna, Krishna Chaganti | web-securitysecure-codingpentesting+3 |
| 2025-08-06 | Tool demo | Blackhat |
vet: Proactive Guardrails against Malicious OSS using Code Analysis
| Abhisek Datta | static-analysissoftware-securitydevsecops+3 |
| 2025-04-30 | Talk | Rsac |
Got Supply Pain? A Real-World Approach to Supply Chain SDL
| Mohit Arora | secure-developmentdevsecopsvulnerability-management+5 |
| 2025-04-29 | Talk | Rsac |
RAG-NAROK: What Poorly-Built RAGs Can Do to Data Security
| Akash Mukherjee | secure-developmentdevsecopsdata-protection+2 |
| 2025-03-01 | Talk | Nullcon |
The Future is Trustless: How zkVMS and zkTLS Transform Bug Bounties
| Anto Joseph | vulnerability-managementbug-bountysecure-development |
| 2024-11-27 | Tool demo | Blackhat |
Varunastra: Securing the Depths of Docker
| Kunal Aggarwal | container-securitydockerpentesting+3 |
| 2024-06-27 | Talk | Troopers |
The Hidden Dangers Lurking in Your Pocket – Pwning Apple Wallet ecosystem and its apps
| Priyank Nigam | mobile-securitypentestingapi-security+2 |
| 2023-08-12 | Talk | Defcon |
Getting More Bang for your Buck:Appsec on a Limited Budget
| Vandana Verma Sehgal, Viraj Gandhi | secure-developmentdevsecopsrisk-management+3 |
| 2023-08-12 | Tool demo | Defcon |
Open Source API Security for devsecops
| Ankush Jain, Ankita Gupta 1 | api-securitydevsecopsci-cd+3 |
| 2023-08-07 | Talk | C0c0n |
Shifting left blockchain development for safer DApps
| Dhanith Krishna | blockchain-securitysmart-contractssecure-development+3 |
| 2023-08-07 | Talk | C0c0n |
Start Left SDLC Security with Open-Source DevSecOps Tooling
| Aswin Raj, Shruti M G | devsecopssecure-developmentstatic-analysis+3 |
| 2023-08-06 | Talk | C0c0n |
Surviving In Dependency Hell
| Kumar Ashwin | secure-developmentdevsecopsvulnerability-management+1 |
| 2023-08-06 | Talk | C0c0n |
The new way to be secure
| Sakshi Bhutani | secure-developmentdevsecopssoftware-security+3 |
| 2023-04-26 | Talk | Rsac |
Designing Product Security for a Brighter Smile and a Healthier Tomorrow
| Lokesh Pidawekar | secure-developmentdevsecopssoftware-security+2 |
| 2022-09-23 | Talk | C0c0n |
Building a Safer and Innovative Digital Ecosystem
| Vijay Pamarathi | secure-developmentdevsecopssoftware-security+2 |
| 2022-09-23 | Talk | C0c0n |
Collaborative efforts for safe digital banking
| Biju K | secure-developmentrisk-managementsecurity-architecture |
| 2022-09-23 | Talk | C0c0n |
Hyperledger Fabric & Ethereum Apps: Security Deep Dive
| Alex Devassy, Dhanith Krishna | blockchain-securitysmart-contractssolidity+3 |
| 2022-09-23 | Talk | C0c0n |
Securing your APIs for a cloud native future
| Navendu Pottekkat | api-securitysecure-developmentdevsecops |
| 2021-11-13 | Talk | C0c0n |
New way of looking at the hidden mysteries in the code
| Vandana Verma Sehgal | code-reviewstatic-analysisreverse-engineering+2 |
| 2021-08-08 | Talk | Defcon |
AppSec 101: A Journey from Engineer to Hacker
| Arjun Gopalakrishna | secure-codingpentestingethical-hacking+2 |
| 2021-08-05 | Talk | Defcon |
The Bug Hunter’s Recon Methodology
| Tushar Verma | pentestingvulnerability-assessmentapplication-pentesting+1 |
| 2020-08-09 | Talk | Defcon |
Running an appsec program with open source projects
| Vandana Verma Sehgal | owaspsecure-developmentdevsecops+3 |
| 2020-03-06 | Tool demo | Nullcon |
Talisman
| Suhas Vishwanath | opensourcesecure-developmentdevelopment+5 |
| 2019-09-27 | Talk | C0c0n |
autoSource an automated framework for Source Code Review
| Malkit Singh | code-reviewsecure-codingstatic-analysis+3 |
| 2019-09-27 | Talk | C0c0n |
Practical Approach to Cyber Security for financial institutions
| Georgie Kurien | financial-institutionssecure-developmentrisk-management+2 |
| 2019-09-27 | Talk | C0c0n |
Security @scale for startups
| Shivanath Somanathan | devsecopssecure-developmentsoftware-security+2 |
| 2019-09-27 | Talk | C0c0n |
Stepping into Password Less Economy
| Ajit Hatti | authenticationidentity-managementsecure-development+1 |
| 2019-08-11 | Talk | Defcon |
Exploiting and Securing iOS Apps using OWASP iGoat
| Swaroop Yermalkar | mobile-securityios-securityapplication-pentesting+4 |
| 2019-08-11 | Talk | Defcon |
Shifting the DevSecOps Culture, Taking away the sugar piece and giving the pile to ants
| Vandana Verma Sehgal | devsecopssecure-developmentAutomation+4 |
| 2019-02-28 | Talk | Nullcon |
Building Hardened IoT Implementations with LangSec
| Prashant Anantharaman | iotblueteamsecure-development |
| 2018-06-27 | Talk | First |
Securing your in-ear fitness coach: Challenges in hardening next generation wearables
| Sumanth Naropanth, Sunil Kumar | mobile-securitysecure-developmentvulnerability-management+2 |
| 2018-03-13 | Talk | Troopers |
Securing your in-ear fitness coach: Challenges in hardening next generation wearables
| Sumanth Naropanth, Kavya Racharla | mobile-securitysecure-developmentvulnerability-management+2 |
| 2017-08-19 | Talk | C0c0n |
Building Trust for Digital Transactions in India’s COD Culture
| Parry Aftab | secure-developmentrisk-managementsecurity-architecture |
| 2017-06-23 | Talk | Hackinparis |
Injecting Security into Web apps with Runtime Patching and Context Learning
| Ajin Abraham | webblueteamsecure-development+6 |
| 2017-05-23 | Talk | Phdays |
Injecting security into web apps in the runtime
| Ajin Abraham | webblueteamsecure-development+6 |
| 2017-03-03 | Talk | Nullcon |
Injecting Security into Web apps with Runtime Patching and Context Learning
| Ajin Abraham | webblueteamsecure-development+6 |
| 2017-01-25 | Talk | Owasp App Sec California |
DASTProxy: Don’t let your automated security testing program stall on crawlInstead focus on business context
| Kiran Shirali | dynamic-analysisdastdevsecops+3 |
| 2016-10-13 | Talk | App Sec Usa |
When encryption is not enough: Attacking Wearable - Mobile Application communication over BLE
| Sumanth Naropanth, Kavya Racharla | mobile-securityvulnerability-managementreverse-engineering+1 |
| 2016-03-11 | Talk | Nullcon |
Real-time Ingestion of security telemetry data into Hadoop distributed system to respond to 0-day
| Pallav Jakhotiya, Vipul Sawant | hadoopsecure-developmentblueteam |
| 2015-02-06 | Talk | Nullcon |
Building security and compliance into the software delivery process
| Anubhav Bathla, Dinesh Pillai, S Chandrasekhar | secure-developmentdevsecopscompliance+3 |
| 2015-01-27 | Talk | Owasp App Sec California |
The Emperor’s New Password Manager: Security Analysis of Web-based Password Managers
| Devdatta Akhawe | web-securityxsscsrf+3 |
| 2014-08-22 | Talk | C0c0n |
Still Single with a bleeding heart (Tool Release)
| Tamaghna Basu | secure-developmentvulnerability-management |
| 2014-08-21 | Talk | Usenix |
The Emperor’s New Password Manager: Security Analysis of Web-based Password Managers
| Devdatta Akhawe | web-securityxsscsrf+3 |
| 2013-11-20 | Talk | App Sec Usa |
Project Talk: OWASP OpenSAMM Project
| Pravir Chandra | software-securitysecure-developmentdevsecops+4 |
| 2013-09-27 | Talk | C0c0n |
From Bedroom to Boardroom - Taking your Weekend Infosec Project Global
| Vivek Ramachandran | devsecopssecure-developmentpentesting+2 |
| 2013-03-01 | Talk | Nullcon |
Mobile Code mining for discovery and exploits
| Hemil Shah | mobilecode-analysissecure-development+5 |
| 2012-10-26 | Talk | App Sec Usa |
The 7 Qualities of Highly Secure Software
| Mano Paul | secure-developmentsoftware-securitysecure-coding+3 |
| 2012-02-15 | Talk | Nullcon |
Best practices to improve the security grading of your project
| Hemant Khandelwal | blueteamthreat_modelingsecure-development |
| 2011-09-19 | Talk | Brucon |
Step-by-Step for Software Security (that anyone can follow)
| Pravir Chandra | software-securitysecure-developmentdevsecops+4 |
| 2011-09-06 | Talk | Securitybyte |
Application Security Strategies
| K K Mookhey | secure-codingsecure-developmentweb-security+3 |
| 2011-02-25 | Talk | Nullcon |
(secure) SiteHoster – Disable XSS & SQL Injection
| Abhishek Kumar | xsssqliblueteam+2 |
| 2010-11-25 | Talk | Deepsec |
Developers are from Mars, Compliance Auditors are from Venus
| Neelay S Shah | compliancegovernancerisk-management+4 |
| 2009-12-05 | Talk | Clubhack |
Revealing the Secrets: Source Code Disclosure, Techniques and Impacts
| Anant Kochhar | secure-developmentsecure-coding |
| 2009-11-19 | Talk | Deepsec |
Top 10 Security Issues Developers Don’t Know About
| Neelay S Shah | secure-codingdevsecopsvulnerability-management+3 |
| 2009-11-17 | Talk | Securitybyte |
Applications - The new cyber security frontier
| Mano Paul | secure-developmentdevsecopssoftware-security+2 |
| 2009-05-19 | Talk | Syscan |
Securing Applications at Gateway with Web Application Firewalls
| Shreeraj Shah | blueteamwebfootprinting+3 |
| 2009-04-22 | Talk | Hitb Sec Conf |
Application Defense Tactics & Strategies - WAF at the Gateway
| Shreeraj Shah | blueteamwebfootprinting+3 |
| 2008-12-06 | Talk | Clubhack |
Insecure Implementation of Security Best Practices: of hashing, CAPTCHA’s and Caching
| Karmendra Kohli | secure-developmentsecure-codingblueteam+2 |
| 2008-03-27 | Talk | Blackhat |
Iron Chef Black Hat: John Henry Challenge
| Pravir Chandra | ethical-hackingsecure-developmentdevsecops |
| 2003-12-12 | Talk | Hitb Sec Conf |
Defending Web Applications: Strategies, methods and practices
| Shreeraj Shah | webblueteamsecure-coding+2 |