🧪 Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Security Analytics

Focus Area: 🛡️ Security Operations & Defense
46
Total Entries
58
Contributors

Top Contributors

Saumil Shah(4) Pramod Rana(3) Rahul Binjve(3) Bhadreshkumar Patel(2) Harish Ramadoss(2)

All Entries (46 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-04-04Tool demoBlackhat SHIVA Spampot: Actionable Spam and Phishing Intelligence Source Code Rahul Binjve, Viren Kapadia#honeypot#network-monitoring#incident-management+1
2025-03-01PanelNullcon AI in SecOps: Enhancing Incident Response with Intelligence Mrudul Uchil, Parag Deodhar, Felix Mohan#ai-security#ai#machine-learning+3
2024-12-11TalkBlackhat The CVSS Deception: How We’ve Been Misled on Vulnerability Severity Presentation Ankur Sand#blueteam#security-strategy#threat-modeling+1
2024-10-23Tool demoBlackhat eBPFShield: Unleashing the Power of eBPF for OS Kernel Exploitation and Security Source Code Sagar Bhure#blueteam#machine-learning#endpoint-protection+2
2024-04-18Tool demoBlackhat eBPFShield: Unleashing the Power of eBPF for OS Kernel Exploitation and Security Source Code Sagar Bhure#blueteam#machine-learning#security-analytics+3
2022-09-24TalkC0c0n Need for Advanced SOC Vijayakumar K M#soc#security-monitoring#security-analytics+2
2022-09-08TalkNullcon Handling A Bug Bounty program From A Blue Team Perspective Presentation Video Ashwath Kumar, Ankit Anurag#blueteam#cloud-monitoring#cloud-pentesting+4
2022-09-08TalkNullcon vPrioritizer: Art of Risk Prioritization Presentation Pramod Rana#vulnerability-assessment#security-development-lifecycle#risk-management+3
2022-09-06PanelNullcon Does your SOC sucks? Video Krishna Pandey, Shweta Kshirsagar, Vivek Gopalan, Yogi Kapur#security-training#incident-management#alert-fatigue+3
2021-11-13TalkC0c0n Machine learning to detect Chia mining Varun Kohli#threat-detection#threat-hunting#malware-detection+2
2021-11-11Tool demoBlackhat DejaVu ++ Source Code Bhadreshkumar Patel, Harish Ramadoss#blueteam#cloud-access-security-broker#cloud-compliance+4
2020-11-21TalkAppsecindonesia Threat Defense: Defending the ATT&CK with TTP’s Avkash Kathiriya#blueteam#threat-hunting#security-analytics
2020-08-05Tool demoBlackhat vPrioritizer: Learn to say NO to almost every vulnerability (art of risk prioritisation…) Source Code Pramod Rana#risk-analysis#blueteam#security-strategy+4
2020-03-06TalkNullcon Automated Classification of Web-Application Attacks for Intrusion Detection Aneet Kumar Dutta#intrusion-detection#machine-learning#application-pentesting+3
2020-03-06Tool demoNullcon F.R.I.D.A.Y Source Code Shyam Sundar Ramaswami#blueteam#dynamic-analysis#sandbox+2
2020-03-06Tool demoNullcon Omniscient Source Code Pramod Rana#reconnaissance#blueteam#network-monitoring+4
2019-12-04Tool demoBlackhat RTTM: Real Time Threat Monitoring Tool Source Code Naveen Rudrappa, Murali Krishna Segu#blueteam#network-monitoring#security-analytics+2
2019-09-27TalkC0c0n Building a cloud security monitoring and auditing framework Nirali Shah, Prasoon Dwivedi#blueteam#cloud-monitoring#cloud-pentesting+4
2019-09-23TalkRootcon Hunting Threats with Wireshark Plugins Presentation Video Nishant Sharma, Jeswin Mathai, Shivam Bathla#blueteam#network-monitoring#security-analytics+2
2019-09-13Talk44con The CISO’s Dilemma Presentation Video Saumil Shah#blueteam#security-strategy#threat-modeling+4
2019-05-21TalkPhdays Active defense using Honeypots v2 Presentation Rahul Binjve#blueteam#honeypot#network-defense+4
2019-03-02PanelNullcon Actionable Intelligence and Cyber Security Video Durga Dube, M v Sheshadri, Rahul Sasi, Shrikant Shitole, Alan White#data-analytics#incident-management#security-analytics+4
2018-11-02TalkHitbsecconf Defending The Enterprise in 2018 Saumil Shah#blueteam#security-strategy#threat-modeling+3
2018-10-05TalkC0c0n Predictive policing using Big Data analytics. Tarun Wig#blueteam#data-analytics#data-protection+3
2018-10-05TalkC0c0n Privacy And Data Protection: Stakeholders’ Perspectives Rahul Sharma#blueteam#data-protection#gdpr+4
2018-08-10TalkDefcon Building visualisation platforms for OSINT data using open source solutions Video Bharath Kumar, Madhu Akula#security-analytics#threat-hunting#osint+3
2018-08-09TalkBlackhat Protecting the Protector, Hardening Machine Learning Defenses Against Adversarial Attacks Presentation Video Jugal Parikh, Randy Treit, Holly Stewart#blueteam#ai-security#machine-learning+4
2018-08-08Tool demoBlackhat DejaVu: An Open Source Deception Framework Source Code Bhadreshkumar Patel, Harish Ramadoss#blueteam#network-defense#honeypot+4
2018-03-15TalkTroopers Defending Microsoft Environments at Scale Presentation Vineet Bhatia#blueteam#windows#azure+4
2018-03-03PanelNullcon Next generation cyber SOC Video K K Mookhey, Mathan Babu Kasilingam, Hidayath Khan, Shivkumar Pandey, Michael Smith#security-analytics#security-monitoring#cloud-workload-protection+4
2017-08-18TalkC0c0n Hunting Botnets with Analytics Shomiron Das Gupta#botnet#blueteam#security-analytics+2
2017-08-18TalkC0c0n 10 Things I Hate About Your Honeypots or How to Setup Honeypots That Work Rahul Binjve#honeypot#blueteam#network-monitoring+3
2017-08-18TalkC0c0n Cyber Security Threat Management – Model it, Collect Intelligence and Hunt them! Illyas Kooliyankal#blueteam#cyber-crime#intelligence-sharing+3
2016-10-19TalkHacklu 2016: The Infosec Crossroads Presentation Saumil Shah#philosophy#security-strategy#incident-management+3
2016-09-14Talk44con 2016: The Infosec Crossroads Presentation Video Saumil Shah#blueteam#security-strategy#threat-modeling+4
2016-03-11TalkNullcon Real-time Ingestion of security telemetry data into Hadoop distributed system to respond to 0-day Presentation Pallav Jakhotiya, Vipul Sawant#secure-development#blueteam#data-analytics+3
2015-08-06TalkBlackhat Harnessing Intelligence from Malware Repositories Presentation Video Arun Lakhotia, Vivek Notani#blueteam#security-analytics#malware-research+2
2014-08-22TalkC0c0n Piracy Tracker Vargheese Babu#blueteam#network-monitoring#security-analytics+3
2013-09-27TalkC0c0n The Art and Science of Anamoly based Vulnerability Detection Lavakumar Kuppan#blueteam#security-analytics#automated-scanning+2
2013-03-01TalkNullcon Sensitive Campus Security with Network Video Aravind Sitaraman#blueteam#network-monitoring#security-strategy+4
2012-08-03TalkC0c0n Building Security Incident Detection & Handling Capabilities in Enterprises Sunil Varkey#blueteam#incident-detection#security-strategy+4
2011-09-06TalkSecuritybyte Using Data Analytics for Incident Response Presentation Samir Saklikar#incident-management#data-analytics#security-analytics+3
2010-02-25TalkNullcon Botnet mitigation, monitoring and management. Presentation Harshad Patil#botnet#blueteam#malware-detection+4
2009-11-17TalkSecuritybyte Threat Modeling Presentation Varun Sharma#threat-modeling#blueteam#security-strategy+4
2009-08-06TalkC0c0n Microsoft Security Strategies Binoy VC#blueteam#security-strategy#azure+4
2008-12-06TalkClubhack Immune IT: Moving from Security to Immunity Presentation Ajit Hatti#blueteam#security-strategy#security-monitoring+4