| 2025-08-07 | Tool demo | Blackhat |
Q-TIP (QR Code Threat Inspection Platform)
| Rushikesh D Nandedkar | incident-responseweb-securityvulnerability-management+2 |
| 2025-08-06 | Tool demo | Blackhat |
ROP ROCKET: Advanced Framework for Return-Oriented Programming
| Shiva Shashank | reverse-engineeringexploitationpentesting+3 |
| 2025-08-06 | Talk | Blackhat |
The 5G Titanic
| Altaf Shaik | network-pentestingnetwork-architecturevulnerability-management+1 |
| 2025-08-06 | Tool demo | Blackhat |
ThreatShield - The Intelligent way of Threat Modelling
| Ashwin Shenoi, Satyam Nagpal, Sayooj B Kumar | threat_modelingsecurity-architecturedevsecops+1 |
| 2025-04-30 | Talk | Rsac |
Got Supply Pain? A Real-World Approach to Supply Chain SDL
| Mohit Arora | secure-developmentdevsecopsvulnerability-management+5 |
| 2025-04-29 | Talk | Rsac |
It’s Always Risky in IT: Frontline Stories and Strategic Insights
| Rohit Bansal | risk-managementsecurity-architecturesecurity-awareness+2 |
| 2025-04-29 | Talk | Rsac |
RAG-NAROK: What Poorly-Built RAGs Can Do to Data Security
| Akash Mukherjee | secure-developmentdevsecopsdata-protection+2 |
| 2025-03-02 | Talk | Nullcon |
Cyber Security from Telco lens
| Sanjeev Dhallam | network-architecturenetwork-hardeningnetwork-monitoring+2 |
| 2025-03-02 | Talk | Nullcon |
eKYC Crisis: Securing the Lockers
| Kartik Lalan | risk-managementvulnerability-managementsecurity-architecture |
| 2025-03-02 | Talk | Nullcon |
Hidden in Plain Sight: Large-Scale Exposure of Orphaned Commits on Major Git Platforms
| Kumar Ashwin | vulnerability-managementsecure-codingdevsecops+1 |
| 2024-11-28 | Talk | Blackhat |
From Breach to Blueprint: Building a Resilient Future
| Amit Ghodekar | incident-responsevulnerability-managementpentesting+3 |
| 2024-11-28 | Talk | Blackhat |
Harnessing Language Models for Detection of Evasive Malicious Email Attachments
| Abhishek Singh, Kalpesh Mantri | security-architecturesecurity-information-event-management |
| 2024-11-28 | Talk | Blackhat |
Time to Redefine Cybersecurity - Adding T - Trust as new Tenant to “CIA” and make it “I-ACT
| Lalit Ahluwalia | risk-managementsecurity-architecturesecurity-governance+1 |
| 2024-11-27 | Talk | Blackhat |
The Future of Cybersecurity: Addressing New Threats with Groundbreaking Strategies
| Mahesh Babu Kanigiri | risk-managementvulnerability-managementsecurity-architecture+2 |
| 2024-11-26 | Talk | Blackhat |
Cyber Security & Resiliency: a perspective with emerging technologies and Innovation
| Atul Kumar | cybersecurity-strategiesrisk-managementcyber-resilience+2 |
| 2024-11-26 | Talk | Blackhat |
The Double Edge Sword - Cybersecurity & AI
| Karmendra Kohli | security-architecturerisk-managementdevsecops+1 |
| 2024-11-16 | Talk | C0c0n |
The subtle art of checkmating CISOs
| Sunil Varkey | risk-managementsecurity-architecturesecurity-governance+3 |
| 2024-11-15 | Talk | C0c0n |
CISO’s take on BYOAI
| Venugopal Parameswara | risk-managementsecurity-governancecompliance+4 |
| 2024-08-14 | Talk | Usenix |
Shesha: Multi-head Microarchitectural Leakage Discovery in new-generation Intel Processors
| Anirban Chakraborty, Nimish Mishra, Debdeep Mukhopadhyay | reverse-engineeringvulnerability-managementsecurity-architecture+1 |
| 2024-05-07 | Talk | Rsac |
A Proven Approach on Automated Security Architectural Pattern Validation
| Sunil Arora | security-architecturedevsecopsvulnerability-management+2 |
| 2024-04-19 | Talk | Blackhat |
China’s Military Cyber Operations: Has the Strategic Support Force Come of Age?
| Pukhraj Singh | industrial-control-systems-securityrisk-managementsecurity-architecture |
| 2024-04-19 | Talk | Blackhat |
Faults in Our Bus: Novel Bus Fault Attack to Break Trusted Execution Environments in Embedded Systems
| Anirban Chakraborty, Nimish Mishra, Debdeep Mukhopadhyay | embedded-securityfirmware-analysisvulnerability-management+2 |
| 2024-04-18 | Tool demo | Blackhat |
Mantis - Asset Discovery at Scale
| Ankur Bhargava, Prateek Thakare, Saddam Hussain | asset-inventoryvulnerability-managementsecurity-architecture+3 |
| 2024-03-21 | Talk | Can Sec West |
Rolling in the Dough: How Microsoft Identified and Remidiated a Baker’s Dozen of Security Threats in the Windows DNS Server
| Arif Hussain | vulnerability-managementpentestingsecurity-architecture+1 |
| 2023-11-17 | Talk | Deepsec |
Nostalgic Memory – Remembering All the Wins and Losses for Protecting Memory Corruption
| Shubham Dubey | vulnerability-managementreverse-engineeringexploitation+1 |
| 2023-09-28 | Talk | Hackinparis |
How to have visibility and security OF CICD ecosystem
| Pramod Rana | cicd-securitydevsecopsvulnerability-management+6 |
| 2023-08-12 | Talk | Defcon |
Getting More Bang for your Buck:Appsec on a Limited Budget
| Vandana Verma Sehgal, Viraj Gandhi | secure-developmentdevsecopsrisk-management+3 |
| 2023-08-07 | Talk | C0c0n |
Homomorphic Encryption - Myth to Reality
| Anish Koshy | encryptionsecurity-architectureprivacy+2 |
| 2023-08-07 | Talk | C0c0n |
Trust Resiliency - A Lesson Learned from Russia Ukraine War
| Ajit Hatti | incident-responsesecurity-architecturerisk-management+2 |
| 2023-08-07 | Talk | C0c0n |
Uncovering Azure’s Silent Threats: A Story of Cloud Vulnerabilities
| Nitesh Surana | azurecloud-vulnerabilitiescloud-pentesting+2 |
| 2023-08-06 | Talk | C0c0n |
CBDC and future of Finance
| Sunil Raveendran | blockchain-securitydigital_currencydecentralized-systems+3 |
| 2023-08-06 | Talk | C0c0n |
Developments in Deep Fake detection
| Tapas Saini | security-architecturesecurity-awarenessreverse-engineering+1 |
| 2023-08-06 | Talk | C0c0n |
Expanding capability horizons : Homelabs and beyond
| Anant Shrivastava | pentestingnetwork-pentestingsecurity-architecture+1 |
| 2023-08-06 | Talk | C0c0n |
Influence of Artificial Intelligence in GRC Space
| Mahesh Kalyanaraman | governancerisk-managementcompliance+3 |
| 2023-08-06 | Talk | C0c0n |
Subduing Adversaries with Information Superiority
| Antony K M | threat-huntingsecurity-monitoringthreat-detection+2 |
| 2023-08-06 | Talk | C0c0n |
Survivability in the Cyber World
| Sunil Varkey | incident-responserisk-managementsecurity-architecture |
| 2023-08-06 | Talk | C0c0n |
The new way to be secure
| Sakshi Bhutani | secure-developmentdevsecopssoftware-security+3 |
| 2023-04-26 | Talk | Rsac |
Designing Product Security for a Brighter Smile and a Healthier Tomorrow
| Lokesh Pidawekar | secure-developmentdevsecopssoftware-security+2 |
| 2023-04-26 | Talk | Rsac |
Is Increasing Security Maturity And Decreasing Operational Load Possible?
| Rohit Dhamankar | Automationrisk-managementsecurity-architecture+2 |
| 2023-04-21 | Talk | Hitb Sec Conf |
LOCKNOTE:THE HAND THAT STRIKES, ALSO BLOCKS
| Saumil Shah | security-architecturerisk-managementsecurity-awareness+2 |
| 2022-09-28 | Talk | Rootcon |
Gazing into the Crystal Ball - The Fog of Cyberwarfare Escalations
| Harshit Agrawal | industrial-control-systems-securitysecurity-architecturerisk-management+1 |
| 2022-09-24 | Talk | C0c0n |
Building Smart, Resilient and Sustainable Cyber Eco System
| Navin Kumar Singh | risk-managementcybersecurity-strategiessecurity-architecture+4 |
| 2022-09-24 | Talk | C0c0n |
Cyber Defence and Role of private players - public private partnership
| Jasbir Singh Solanki | security-governancerisk-managementcompliance+2 |
| 2022-09-24 | Talk | C0c0n |
Know Your Organization? : Mapping Entities in Google Workspace
| Manish Gupta, Yash Bharadwaj | gcpidentity-managementaccess-management+2 |
| 2022-09-24 | Talk | C0c0n |
Web3 Security - Security in MetaVerse, and the new world of web3
| Rohit Srivastwa | blockchain-securityweb3decentralized-systems+3 |
| 2022-09-23 | Talk | C0c0n |
Battle of 300 Crore - how they lost it and got most of it back
| Prashant Choudhary | incident-responsevulnerability-managementrisk-management+1 |
| 2022-09-23 | Talk | C0c0n |
Bridging the gap between Security and Operations
| Sujay Rajashekar Gundagatti | devsecopssecurity-architecturethreat-detection+3 |
| 2022-09-23 | Talk | C0c0n |
Building a Safer and Innovative Digital Ecosystem
| Vijay Pamarathi | secure-developmentdevsecopssoftware-security+2 |
| 2022-09-23 | Talk | C0c0n |
Collaborative efforts for safe digital banking
| Biju K | secure-developmentrisk-managementsecurity-architecture |
| 2022-09-23 | Talk | C0c0n |
Cybersecurity for Manufacturing
| Santhosh Srinivasan | industrial-control-systems-securityics-securitycontrol-systems+4 |
| 2022-09-23 | Talk | C0c0n |
Maximizing ROI on cyber security investments: Do you think Adversary Simulation OR Purple teaming holds the key?
| Abhijith B R | risk-managementsecurity-architecturedevsecops |
| 2022-09-23 | Talk | C0c0n |
Rolling out Central Bank Digital Currency - Technical Design Considerations
| Sunil Raveendran | blockchain-securitysecurity-architecturecompliance-governance+2 |
| 2022-09-23 | Talk | C0c0n |
Technological Reliance for Resilience
| Tulika Pandey | risk-managementcyber-resiliencesecurity-architecture+2 |
| 2022-08-14 | Talk | Defcon |
Tales from the trenches - why organizations struggle to get even the basics of OT asset visibility & detection right
| Vivek Ponnada | industrial-control-systems-securityvulnerability-managementrisk-management+2 |
| 2022-08-11 | Talk | The Diana Initiative |
Connecting Dots Between Security Teams & Customer Expectations
| Shruthi Kamath | security-governancerisk-managementsecurity-architecture+2 |
| 2021-11-13 | Talk | C0c0n |
Changing Cyber Security Paradigm & Cyber Tsunami
| Sunil Varkey | cybersecurity-strategiesthreat-landscaperisk-management+4 |
| 2021-11-13 | Talk | C0c0n |
Cyber Warfare & Securing Critical Infrastructures
| Faruk Kazi | critical-infrastructureindustrial-control-systems-securityincident-response+1 |
| 2021-11-13 | Talk | C0c0n |
Cybersecurity in the era of Resilience - A walk through people, process and technology
| Babitha B P | risk-managementcyber-resiliencesecurity-architecture+3 |
| 2021-11-13 | Talk | C0c0n |
Enhancing An Multi-Factor Authentication (MFA) through Behavioural Biometrics
| Kiran Kumar Pg | authenticationmfasecurity-architecture |
| 2021-11-13 | Talk | C0c0n |
Introducing Free & Open Elastic Limitless XDR
| Ravindra Ramnani | threat-detectionsecurity-monitoringvulnerability-management+1 |
| 2021-11-13 | Talk | C0c0n |
Need for Zero Trust in Banking
| Biju K | zero-trustrisk-managementsecurity-architecture+1 |
| 2021-11-13 | Talk | C0c0n |
Post pandemic Transformation - A CISO’s perspective
| Sridhar Govardhan | risk-managementsecurity-governancecompliance+4 |
| 2021-11-13 | Talk | C0c0n |
Zero Trust & Micro-segmentation
| Suresh Menon | segmentationzero-trustnetwork-architecture+1 |
| 2021-11-12 | Talk | C0c0n |
Enterprise Governance and Risk Management
| Arathy Nair, Muskan Mangla | compliancegovernancerisk-management+2 |
| 2021-11-12 | Talk | C0c0n |
Executive Presence….a cardinal of the cyber rostrum
| Bishakha Jain | security-awarenesssecurity-architecturesecurity-governance |
| 2021-11-12 | Talk | C0c0n |
Post Covid CISOs - Disappearing trusted boundaries and Innovative CyberSecurity Approaches
| Illyas Kooliyankal | risk-managementsecurity-architecturesecurity-governance+1 |
| 2021-11-12 | Talk | C0c0n |
Regulating Social Media Platforms : Should it be done in Democratic Societies ?
| J Sam Daniel Stalin, Apar Gupta, Dinesh O Bareja, Prashant Mali, Jiten Jain | compliancegovernancerisk-management+4 |
| 2021-10-13 | Talk | Rootcon |
The Kill Chain: Future of Cyber in Defense
| Harshit Agrawal | security-architectureindustrial-control-systems-securityrisk-management |
| 2021-08-26 | Talk | Hitb Sec Conf |
Gazing Ahead: What Modern RF Combat Looks Like in the Next Decade
| Harshit Agrawal | industrial-control-systems-securitysecurity-architecturevulnerability-management+1 |
| 2021-08-07 | Talk | Defcon |
The Curious Case of Knowing the Unknown
| Vandana Verma Sehgal | threat-huntingthreat_modelingsecurity-architecture+2 |
| 2021-08-06 | Talk | Defcon |
Defending IoT in the Future of High-Tech Warfare
| Harshit Agrawal | vulnerability-managementiot-pentestingsecurity-architecture+1 |
| 2020-11-21 | Talk | App Sec Indonesia |
The caveats of the unseen: Crouching exposure, Hidden Misconfiguration
| Ashwin Vamshi | vulnerability-managementsecurity-architecturedevsecops+2 |
| 2020-09-18 | Talk | C0c0n |
Herd Immunity, in the Cyber World
| Sunil Varkey | security-awarenessrisk-managementvulnerability-management+1 |
| 2020-09-18 | Talk | C0c0n |
Coping with Digital Transformation - A CISO perspective
| Maya R Nair | risk-managementsecurity-governancesecurity-architecture+3 |
| 2020-09-18 | Talk | C0c0n |
Demystifying Zero Trust - A Real world
| Sandeep Variyam | zero-trustsecurity-architecturesecurity-governance+1 |
| 2020-08-21 | Talk | The Diana Initiative |
Trust, No Trust or Zero Trust - Myth Demystifying
| Vandana Verma Sehgal | zero-trustsecurity-architecturecompliance+2 |
| 2019-11-09 | Talk | Toor Con |
100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans
| Jatin Kataria | reverse-engineeringhardware-reverse-engineeringvulnerability-management+3 |
| 2019-09-27 | Talk | C0c0n |
A Day in the Life of a CISO
| Sridhar Govardhan | compliancegovernancerisk-management+3 |
| 2019-09-27 | Talk | C0c0n |
CISO Mind Set
| Lopa Mudraa Basuu | risk-managementsecurity-governancecompliance+2 |
| 2019-09-27 | Talk | C0c0n |
Industry 4.0 - Security and Compliance
| Santhosh Srinivasan | industrial-control-systems-securitycompliancegovernance+2 |
| 2019-09-27 | Talk | C0c0n |
Looking a decade ahead: Big data, drones , Robots and cyber security.
| Rahul Sasi | industrial-control-systems-securitysecurity-architecture |
| 2019-09-27 | Talk | C0c0n |
Security @scale for startups
| Shivanath Somanathan | devsecopssecure-developmentsoftware-security+2 |
| 2019-08-09 | Talk | Defcon |
100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans
| Jatin Kataria | reverse-engineeringvulnerability-managementsecurity-architecture+2 |
| 2018-10-05 | Talk | C0c0n |
Blockchains as techno-power structures: towards emergence of P2P Politics
| Sunil Aggarwal | blockchain-securitydecentralized-systemsdecentralised-security+2 |
| 2018-10-05 | Talk | C0c0n |
Cybersecurity Embedded Digital Transformation - The Future
| Sunil Kanchi | embedded-securitysecurity-architectureindustrial-control-systems-security |
| 2018-10-05 | Talk | C0c0n |
Digital Innovation revolution in Kerala Government
| Sunil Varkey | cybersecurity-strategysecurity-architecturerisk-management+2 |
| 2018-10-05 | Talk | C0c0n |
Future of Mobility & Cyber Security
| Suja Chandy | automotive-cybersecurityindustrial-control-systems-securitysecurity-architecture+2 |
| 2018-10-05 | Talk | C0c0n |
Resiliency Focus alongside Digital Disruption
| Lince Lawrence | security-architecturerisk-managementsecurity-awareness+2 |
| 2018-10-05 | Talk | C0c0n |
Taking cyber security to the board room
| Amit Pradhan | risk-managementcompliancegovernance+3 |
| 2018-10-05 | Talk | C0c0n |
Will Artificial Intelligence And Machine Learning Bring More Threats On Cyber Security?
| Roshy John | risk-managementvulnerability-managementsecurity-architecture |
| 2018-10-04 | Talk | Brucon |
Disrupting the Kill Chain
| Vineet Bhatia | incident-responsevulnerability-managementsecurity-architecture |
| 2018-08-16 | Talk | Usenix |
Chipmunk or Pepe? Using Acoustical Analysis to Detect Voice-Channel Fraud at Scale
| Vijay Balasubramaniyan | threat-detectionsecurity-architecture |
| 2018-08-16 | Talk | Usenix |
Man-in-the-Machine: Exploiting Ill-Secured Communication Inside the Computer
| Siddharth Rao | pentestingvulnerability-managementsecurity-architecture+1 |
| 2018-08-09 | Talk | Defcon |
Anonymous rate-limiting in services with Direct Anonymous Attestation
| Konark Modi | privacysecurity-architecture |
| 2018-06-27 | Talk | First |
Securing your in-ear fitness coach: Challenges in hardening next generation wearables
| Sumanth Naropanth, Sunil Kumar | mobile-securitysecure-developmentvulnerability-management+2 |
| 2018-03-13 | Talk | Troopers |
Securing your in-ear fitness coach: Challenges in hardening next generation wearables
| Sumanth Naropanth, Kavya Racharla | mobile-securitysecure-developmentvulnerability-management+2 |
| 2017-08-19 | Talk | C0c0n |
Building Trust for Digital Transactions in India’s COD Culture
| Parry Aftab | secure-developmentrisk-managementsecurity-architecture |
| 2017-08-19 | Talk | C0c0n |
Trust, the foundation of Digital Mastery
| Sunil Varkey | identity-managementauthenticationrisk-management+2 |
| 2017-08-18 | Talk | C0c0n |
Dynamic Binary Instrumentation
| Vivek Arora, Bhaskar Rastogi | dynamic-analysisreverse-engineeringbinary-analysis+1 |
| 2017-08-18 | Talk | C0c0n |
Moving from Cybersecurity Awareness to Cybersecurity Competence
| Anup Narayanan | cybersecurity-educationcybersecurity-trainingsecurity-awareness+3 |
| 2017-08-04 | Talk | Sha |
Attacking OpenSSL using Side-channel Attacks: The RSA case study
| Praveen Vadnala | reverse-engineeringvulnerability-managementsecurity-architecture+1 |
| 2017-03-03 | Talk | Nullcon |
Breach Response - Time to shake up the status quo
| K K Mookhey, Pranesh Prakash, Sahir Hidayatullah, Shobha Jagathpal | incident-responsevulnerability-managementrisk-management+2 |
| 2017-03-03 | Talk | Nullcon |
Securing Critical National Infrastructure
| Shailendra Fuloria, R Sarangapani, Rahul Tongia | critical-infrastructureindustrial-control-systems-securityics-security+4 |
| 2017-01-25 | Talk | Owasp App Sec California |
OCSP Stapling in the Wild
| Devdatta Akhawe | web-securityvulnerability-managementsecurity-architecture+1 |
| 2016-08-19 | Talk | C0c0n |
Kill the password - A new era of authentication
| Tamaghna Basu | authenticationiamsecurity-architecture+1 |
| 2016-08-07 | Talk | Defcon |
Cyber Grand Shellphish
| Aravind Machiry | automated-exploit-detectionreverse-engineeringvulnerability-assessment+1 |
| 2016-03-15 | Talk | Groundzerosummit |
r00tKidz and Hacking
| Triveni Singh | pentestingethical-hackingprivilege-escalation+3 |
| 2015-11-05 | Talk | Ground Zero Summit |
Western Air Command
| B S Singh Deo | network-defensenetwork-monitoringnetwork-pentesting+3 |
| 2015-09-24 | Talk | App Sec Usa |
Continuous Cloud Security Automation
| Rohit Pitke | awsdevsecopsAutomation+2 |
| 2015-08-07 | Talk | Defcon |
Getting into the Trust Store We Trust
| Ajit Hatti | reverse-engineeringsecurity-architecturevulnerability-management |
| 2015-08-01 | Talk | C0c0n |
S3curi7y at 36K feet
| Rugved Mehta, Gaurav Trivedi | awsazuregcp+3 |
| 2015-03-15 | Talk | Defcon |
TECHNICAL TALK-THWARTING THE SURVEILLANCE IN ONLINE COMMUNICATION
| Adhokshaj Mishra | privacysecurity-architecture |
| 2015-01-27 | Talk | Owasp App Sec California |
Anatomy of memory scraping, credit card stealing POS malware
| Amol Sarwate | reverse-engineeringvulnerability-managementincident-response+1 |
| 2014-11-13 | Talk | Ground Zero Summit |
9 Cell Cyber Diplomacy
| Alok Vijayant | security-architecturerisk-managementsecurity-governance |
| 2013-11-20 | Talk | App Sec Usa |
Project Talk: OWASP OpenSAMM Project
| Pravir Chandra | software-securitysecure-developmentdevsecops+4 |
| 2013-09-27 | Talk | C0c0n |
ARM, Thumb and the Finger
| Aseem Jakhar | reverse-engineeringbinary-analysisassembly-analysis+2 |
| 2013-09-27 | Talk | C0c0n |
From Bedroom to Boardroom - Taking your Weekend Infosec Project Global
| Vivek Ramachandran | devsecopssecure-developmentpentesting+2 |
| 2013-08-15 | Talk | Usenix |
Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness
| Devdatta Akhawe | web-securitysecurity-awarenesssecurity-architecture+3 |
| 2013-08-15 | Talk | Usenix |
An Empirical Study of Vulnerability Rewards Programs
| Devdatta Akhawe | vulnerability-managementbug-bountysoftware-security+3 |
| 2012-12-01 | Talk | Clubhack |
The difference between the “Reality” and “Feeling” of Security: Information Security and the Human Being
| Thomas Kurian Ambattu | security-awarenesshuman-factorrisk-management+2 |
| 2012-10-26 | Talk | App Sec Usa |
The 7 Qualities of Highly Secure Software
| Mano Paul | secure-developmentsoftware-securitysecure-coding+3 |
| 2012-08-03 | Talk | C0c0n |
Business Continuity and Risk Management in Turbulent Times
| Venkataram Arabolu | risk-managementbusiness-continuitycompliance+2 |
| 2012-08-03 | Talk | C0c0n |
The Weakest Link - Reinforcing the Human Element
| Sandeep Godbole | security-awarenesshuman-factorcybersecurity-education+4 |
| 2011-11-17 | Talk | Deepsec |
Behavioral Security: 10 steps forward 5 steps backward
| Sourabh Satish | security-awarenessbehavioral-changerisk-management+2 |
| 2011-09-07 | Talk | Securitybyte |
Social Web & Privacy – An evolving world
| Bala Sathiamurthy, Aridaman Tripathi | privacydata-protectionapi-security+3 |
| 2011-09-06 | Talk | Securitybyte |
Enabling Un-trusted Mashups
| Bishan Singh | web-securityxsscsrf+4 |
| 2009-11-17 | Talk | Securitybyte |
Business Continuity Case Study
| Venkataram Arabolu | business-continuityrisk-managementbusiness-resilience+3 |
| 2009-11-17 | Talk | Securitybyte |
Usability and Privacy in Security
| Ponnurangam Kumaraguru | privacydata-protectionsecurity-architecture+3 |
| 2009-08-06 | Talk | C0c0n |
Information Warfare
| A a Gafoor, Vinayak Mishra | threat-huntingthreat_modelingsecurity-awareness+2 |
| 1998-07-29 | Talk | Blackhat |
Security as an enabler for new business opportunities - The Business Value of Security
| Karan Khanna | risk-managementbusiness-continuitycyber-resilience+4 |