| 2025-04-04 | Tool demo | Blackhat |
SHIVA Spampot: Actionable Spam and Phishing Intelligence
| Rahul Binjve, Viren Kapadia | #honeypot#network-monitoring#incident-management+1 |
| 2025-03-01 | Panel | Nullcon |
AI in SecOps: Enhancing Incident Response with Intelligence
| Mrudul Uchil, Parag Deodhar, Felix Mohan | #ai-security#ai#machine-learning+3 |
| 2024-12-11 | Talk | Blackhat |
The CVSS Deception: How We’ve Been Misled on Vulnerability Severity
| Ankur Sand | #blueteam#security-strategy#threat-modeling+1 |
| 2024-10-23 | Tool demo | Blackhat |
eBPFShield: Unleashing the Power of eBPF for OS Kernel Exploitation and Security
| Sagar Bhure | #blueteam#machine-learning#endpoint-protection+2 |
| 2024-04-18 | Tool demo | Blackhat |
eBPFShield: Unleashing the Power of eBPF for OS Kernel Exploitation and Security
| Sagar Bhure | #blueteam#machine-learning#security-analytics+3 |
| 2022-09-24 | Talk | C0c0n |
Need for Advanced SOC
| Vijayakumar K M | #soc#security-monitoring#security-analytics+2 |
| 2022-09-08 | Talk | Nullcon |
Handling A Bug Bounty program From A Blue Team Perspective
| Ashwath Kumar, Ankit Anurag | #blueteam#cloud-monitoring#cloud-pentesting+4 |
| 2022-09-08 | Talk | Nullcon |
vPrioritizer: Art of Risk Prioritization
| Pramod Rana | #vulnerability-assessment#security-development-lifecycle#risk-management+3 |
| 2022-09-06 | Panel | Nullcon |
Does your SOC sucks?
| Krishna Pandey, Shweta Kshirsagar, Vivek Gopalan, Yogi Kapur | #security-training#incident-management#alert-fatigue+3 |
| 2021-11-13 | Talk | C0c0n |
Machine learning to detect Chia mining
| Varun Kohli | #threat-detection#threat-hunting#malware-detection+2 |
| 2021-11-11 | Tool demo | Blackhat |
DejaVu ++
| Bhadreshkumar Patel, Harish Ramadoss | #blueteam#cloud-access-security-broker#cloud-compliance+4 |
| 2020-11-21 | Talk | Appsecindonesia |
Threat Defense: Defending the ATT&CK with TTP’s
| Avkash Kathiriya | #blueteam#threat-hunting#security-analytics |
| 2020-08-05 | Tool demo | Blackhat |
vPrioritizer: Learn to say NO to almost every vulnerability (art of risk prioritisation…)
| Pramod Rana | #risk-analysis#blueteam#security-strategy+4 |
| 2020-03-06 | Talk | Nullcon |
Automated Classification of Web-Application Attacks for Intrusion Detection
| Aneet Kumar Dutta | #intrusion-detection#machine-learning#application-pentesting+3 |
| 2020-03-06 | Tool demo | Nullcon |
F.R.I.D.A.Y
| Shyam Sundar Ramaswami | #blueteam#dynamic-analysis#sandbox+2 |
| 2020-03-06 | Tool demo | Nullcon |
Omniscient
| Pramod Rana | #reconnaissance#blueteam#network-monitoring+4 |
| 2019-12-04 | Tool demo | Blackhat |
RTTM: Real Time Threat Monitoring Tool
| Naveen Rudrappa, Murali Krishna Segu | #blueteam#network-monitoring#security-analytics+2 |
| 2019-09-27 | Talk | C0c0n |
Building a cloud security monitoring and auditing framework
| Nirali Shah, Prasoon Dwivedi | #blueteam#cloud-monitoring#cloud-pentesting+4 |
| 2019-09-23 | Talk | Rootcon |
Hunting Threats with Wireshark Plugins
| Nishant Sharma, Jeswin Mathai, Shivam Bathla | #blueteam#network-monitoring#security-analytics+2 |
| 2019-09-13 | Talk | 44con |
The CISO’s Dilemma
| Saumil Shah | #blueteam#security-strategy#threat-modeling+4 |
| 2019-05-21 | Talk | Phdays |
Active defense using Honeypots v2
| Rahul Binjve | #blueteam#honeypot#network-defense+4 |
| 2019-03-02 | Panel | Nullcon |
Actionable Intelligence and Cyber Security
| Durga Dube, M v Sheshadri, Rahul Sasi, Shrikant Shitole, Alan White | #data-analytics#incident-management#security-analytics+4 |
| 2018-11-02 | Talk | Hitbsecconf |
Defending The Enterprise in 2018
| Saumil Shah | #blueteam#security-strategy#threat-modeling+3 |
| 2018-10-05 | Talk | C0c0n |
Predictive policing using Big Data analytics.
| Tarun Wig | #blueteam#data-analytics#data-protection+3 |
| 2018-10-05 | Talk | C0c0n |
Privacy And Data Protection: Stakeholders’ Perspectives
| Rahul Sharma | #blueteam#data-protection#gdpr+4 |
| 2018-08-10 | Talk | Defcon |
Building visualisation platforms for OSINT data using open source solutions
| Bharath Kumar, Madhu Akula | #security-analytics#threat-hunting#osint+3 |
| 2018-08-09 | Talk | Blackhat |
Protecting the Protector, Hardening Machine Learning Defenses Against Adversarial Attacks
| Jugal Parikh, Randy Treit, Holly Stewart | #blueteam#ai-security#machine-learning+4 |
| 2018-08-08 | Tool demo | Blackhat |
DejaVu: An Open Source Deception Framework
| Bhadreshkumar Patel, Harish Ramadoss | #blueteam#network-defense#honeypot+4 |
| 2018-03-15 | Talk | Troopers |
Defending Microsoft Environments at Scale
| Vineet Bhatia | #blueteam#windows#azure+4 |
| 2018-03-03 | Panel | Nullcon |
Next generation cyber SOC
| K K Mookhey, Mathan Babu Kasilingam, Hidayath Khan, Shivkumar Pandey, Michael Smith | #security-analytics#security-monitoring#cloud-workload-protection+4 |
| 2017-08-18 | Talk | C0c0n |
Hunting Botnets with Analytics
| Shomiron Das Gupta | #botnet#blueteam#security-analytics+2 |
| 2017-08-18 | Talk | C0c0n |
10 Things I Hate About Your Honeypots or How to Setup Honeypots That Work
| Rahul Binjve | #honeypot#blueteam#network-monitoring+3 |
| 2017-08-18 | Talk | C0c0n |
Cyber Security Threat Management – Model it, Collect Intelligence and Hunt them!
| Illyas Kooliyankal | #blueteam#cyber-crime#intelligence-sharing+3 |
| 2016-10-19 | Talk | Hacklu |
2016: The Infosec Crossroads
| Saumil Shah | #philosophy#security-strategy#incident-management+3 |
| 2016-09-14 | Talk | 44con |
2016: The Infosec Crossroads
| Saumil Shah | #blueteam#security-strategy#threat-modeling+4 |
| 2016-03-11 | Talk | Nullcon |
Real-time Ingestion of security telemetry data into Hadoop distributed system to respond to 0-day
| Pallav Jakhotiya, Vipul Sawant | #secure-development#blueteam#data-analytics+3 |
| 2015-08-06 | Talk | Blackhat |
Harnessing Intelligence from Malware Repositories
| Arun Lakhotia, Vivek Notani | #blueteam#security-analytics#malware-research+2 |
| 2014-08-22 | Talk | C0c0n |
Piracy Tracker
| Vargheese Babu | #blueteam#network-monitoring#security-analytics+3 |
| 2013-09-27 | Talk | C0c0n |
The Art and Science of Anamoly based Vulnerability Detection
| Lavakumar Kuppan | #blueteam#security-analytics#automated-scanning+2 |
| 2013-03-01 | Talk | Nullcon |
Sensitive Campus Security with Network
| Aravind Sitaraman | #blueteam#network-monitoring#security-strategy+4 |
| 2012-08-03 | Talk | C0c0n |
Building Security Incident Detection & Handling Capabilities in Enterprises
| Sunil Varkey | #blueteam#incident-detection#security-strategy+4 |
| 2011-09-06 | Talk | Securitybyte |
Using Data Analytics for Incident Response
| Samir Saklikar | #incident-management#data-analytics#security-analytics+3 |
| 2010-02-25 | Talk | Nullcon |
Botnet mitigation, monitoring and management.
| Harshad Patil | #botnet#blueteam#malware-detection+4 |
| 2009-11-17 | Talk | Securitybyte |
Threat Modeling
| Varun Sharma | #threat-modeling#blueteam#security-strategy+4 |
| 2009-08-06 | Talk | C0c0n |
Microsoft Security Strategies
| Binoy VC | #blueteam#security-strategy#azure+4 |
| 2008-12-06 | Talk | Clubhack |
Immune IT: Moving from Security to Immunity
| Ajit Hatti | #blueteam#security-strategy#security-monitoring+4 |