🧪 Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Security Architecture

130
Total Entries
134
Contributors

Top Contributors

Sunil Varkey(6) Harshit Agrawal(4) Devdatta Akhawe(3) Vandana Verma Sehgal(3) Ajit Hatti(2)

All Entries (130 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-08-07Tool demoBlackhat Q-TIP (QR Code Threat Inspection Platform) Rushikesh D Nandedkarincident-responseweb-securityvulnerability-management+2
2025-08-06Tool demoBlackhat ROP ROCKET: Advanced Framework for Return-Oriented Programming Source Code Shiva Shashankreverse-engineeringexploitationpentesting+3
2025-08-06TalkBlackhat The 5G Titanic Altaf Shaiknetwork-pentestingnetwork-architecturevulnerability-management+1
2025-08-06Tool demoBlackhat ThreatShield - The Intelligent way of Threat Modelling Ashwin Shenoi, Satyam Nagpal, Sayooj B Kumarthreat_modelingsecurity-architecturedevsecops+1
2025-04-30TalkRsac Got Supply Pain? A Real-World Approach to Supply Chain SDL Mohit Arorasecure-developmentdevsecopsvulnerability-management+5
2025-04-29TalkRsac It’s Always Risky in IT: Frontline Stories and Strategic Insights Rohit Bansalrisk-managementsecurity-architecturesecurity-awareness+2
2025-04-29TalkRsac RAG-NAROK: What Poorly-Built RAGs Can Do to Data Security Akash Mukherjeesecure-developmentdevsecopsdata-protection+2
2025-03-02TalkNullcon Cyber Security from Telco lens Sanjeev Dhallamnetwork-architecturenetwork-hardeningnetwork-monitoring+2
2025-03-02TalkNullcon eKYC Crisis: Securing the Lockers Kartik Lalanrisk-managementvulnerability-managementsecurity-architecture
2025-03-02TalkNullcon Hidden in Plain Sight: Large-Scale Exposure of Orphaned Commits on Major Git Platforms Kumar Ashwinvulnerability-managementsecure-codingdevsecops+1
2024-11-28TalkBlackhat From Breach to Blueprint: Building a Resilient Future Amit Ghodekarincident-responsevulnerability-managementpentesting+3
2024-11-28TalkBlackhat Harnessing Language Models for Detection of Evasive Malicious Email Attachments Abhishek Singh, Kalpesh Mantrisecurity-architecturesecurity-information-event-management
2024-11-28TalkBlackhat Time to Redefine Cybersecurity - Adding T - Trust as new Tenant to “CIA” and make it “I-ACT Lalit Ahluwaliarisk-managementsecurity-architecturesecurity-governance+1
2024-11-27TalkBlackhat The Future of Cybersecurity: Addressing New Threats with Groundbreaking Strategies Mahesh Babu Kanigiririsk-managementvulnerability-managementsecurity-architecture+2
2024-11-26TalkBlackhat Cyber Security & Resiliency: a perspective with emerging technologies and Innovation Atul Kumarcybersecurity-strategiesrisk-managementcyber-resilience+2
2024-11-26TalkBlackhat The Double Edge Sword - Cybersecurity & AI Karmendra Kohlisecurity-architecturerisk-managementdevsecops+1
2024-11-16TalkC0c0n The subtle art of checkmating CISOs Sunil Varkeyrisk-managementsecurity-architecturesecurity-governance+3
2024-11-15TalkC0c0n CISO’s take on BYOAI Venugopal Parameswararisk-managementsecurity-governancecompliance+4
2024-08-14TalkUsenix Shesha: Multi-head Microarchitectural Leakage Discovery in new-generation Intel Processors Presentation Whitepaper Video Anirban Chakraborty, Nimish Mishra, Debdeep Mukhopadhyayreverse-engineeringvulnerability-managementsecurity-architecture+1
2024-05-07TalkRsac A Proven Approach on Automated Security Architectural Pattern Validation Video Sunil Arorasecurity-architecturedevsecopsvulnerability-management+2
2024-04-19TalkBlackhat China’s Military Cyber Operations: Has the Strategic Support Force Come of Age? Presentation Pukhraj Singhindustrial-control-systems-securityrisk-managementsecurity-architecture
2024-04-19TalkBlackhat Faults in Our Bus: Novel Bus Fault Attack to Break Trusted Execution Environments in Embedded Systems Presentation Anirban Chakraborty, Nimish Mishra, Debdeep Mukhopadhyayembedded-securityfirmware-analysisvulnerability-management+2
2024-04-18Tool demoBlackhat Mantis - Asset Discovery at Scale Source Code Ankur Bhargava, Prateek Thakare, Saddam Hussainasset-inventoryvulnerability-managementsecurity-architecture+3
2024-03-21TalkCan Sec West Rolling in the Dough: How Microsoft Identified and Remidiated a Baker’s Dozen of Security Threats in the Windows DNS Server Arif Hussainvulnerability-managementpentestingsecurity-architecture+1
2023-11-17TalkDeepsec Nostalgic Memory – Remembering All the Wins and Losses for Protecting Memory Corruption Shubham Dubeyvulnerability-managementreverse-engineeringexploitation+1
2023-09-28TalkHackinparis How to have visibility and security OF CICD ecosystem Pramod Ranacicd-securitydevsecopsvulnerability-management+6
2023-08-12TalkDefcon Getting More Bang for your Buck:Appsec on a Limited Budget Vandana Verma Sehgal, Viraj Gandhisecure-developmentdevsecopsrisk-management+3
2023-08-07TalkC0c0n Homomorphic Encryption - Myth to Reality Video Anish Koshyencryptionsecurity-architectureprivacy+2
2023-08-07TalkC0c0n Trust Resiliency - A Lesson Learned from Russia Ukraine War Video Ajit Hattiincident-responsesecurity-architecturerisk-management+2
2023-08-07TalkC0c0n Uncovering Azure’s Silent Threats: A Story of Cloud Vulnerabilities Video Nitesh Suranaazurecloud-vulnerabilitiescloud-pentesting+2
2023-08-06TalkC0c0n CBDC and future of Finance Video Sunil Raveendranblockchain-securitydigital_currencydecentralized-systems+3
2023-08-06TalkC0c0n Developments in Deep Fake detection Tapas Sainisecurity-architecturesecurity-awarenessreverse-engineering+1
2023-08-06TalkC0c0n Expanding capability horizons : Homelabs and beyond Video Anant Shrivastavapentestingnetwork-pentestingsecurity-architecture+1
2023-08-06TalkC0c0n Influence of Artificial Intelligence in GRC Space Mahesh Kalyanaramangovernancerisk-managementcompliance+3
2023-08-06TalkC0c0n Subduing Adversaries with Information Superiority Video Antony K Mthreat-huntingsecurity-monitoringthreat-detection+2
2023-08-06TalkC0c0n Survivability in the Cyber World Video Sunil Varkeyincident-responserisk-managementsecurity-architecture
2023-08-06TalkC0c0n The new way to be secure Video Sakshi Bhutanisecure-developmentdevsecopssoftware-security+3
2023-04-26TalkRsac Designing Product Security for a Brighter Smile and a Healthier Tomorrow Presentation Video Lokesh Pidawekarsecure-developmentdevsecopssoftware-security+2
2023-04-26TalkRsac Is Increasing Security Maturity And Decreasing Operational Load Possible? Rohit DhamankarAutomationrisk-managementsecurity-architecture+2
2023-04-21TalkHitb Sec Conf LOCKNOTE:THE HAND THAT STRIKES, ALSO BLOCKS Presentation Video Saumil Shahsecurity-architecturerisk-managementsecurity-awareness+2
2022-09-28TalkRootcon Gazing into the Crystal Ball - The Fog of Cyberwarfare Escalations Harshit Agrawalindustrial-control-systems-securitysecurity-architecturerisk-management+1
2022-09-24TalkC0c0n Building Smart, Resilient and Sustainable Cyber Eco System Navin Kumar Singhrisk-managementcybersecurity-strategiessecurity-architecture+4
2022-09-24TalkC0c0n Cyber Defence and Role of private players - public private partnership Jasbir Singh Solankisecurity-governancerisk-managementcompliance+2
2022-09-24TalkC0c0n Know Your Organization? : Mapping Entities in Google Workspace Manish Gupta, Yash Bharadwajgcpidentity-managementaccess-management+2
2022-09-24TalkC0c0n Web3 Security - Security in MetaVerse, and the new world of web3 Rohit Srivastwablockchain-securityweb3decentralized-systems+3
2022-09-23TalkC0c0n Battle of 300 Crore - how they lost it and got most of it back Prashant Choudharyincident-responsevulnerability-managementrisk-management+1
2022-09-23TalkC0c0n Bridging the gap between Security and Operations Sujay Rajashekar Gundagattidevsecopssecurity-architecturethreat-detection+3
2022-09-23TalkC0c0n Building a Safer and Innovative Digital Ecosystem Vijay Pamarathisecure-developmentdevsecopssoftware-security+2
2022-09-23TalkC0c0n Collaborative efforts for safe digital banking Biju Ksecure-developmentrisk-managementsecurity-architecture
2022-09-23TalkC0c0n Cybersecurity for Manufacturing Santhosh Srinivasanindustrial-control-systems-securityics-securitycontrol-systems+4
2022-09-23TalkC0c0n Maximizing ROI on cyber security investments: Do you think Adversary Simulation OR Purple teaming holds the key? Presentation Abhijith B Rrisk-managementsecurity-architecturedevsecops
2022-09-23TalkC0c0n Rolling out Central Bank Digital Currency - Technical Design Considerations Sunil Raveendranblockchain-securitysecurity-architecturecompliance-governance+2
2022-09-23TalkC0c0n Technological Reliance for Resilience Tulika Pandeyrisk-managementcyber-resiliencesecurity-architecture+2
2022-08-14TalkDefcon Tales from the trenches - why organizations struggle to get even the basics of OT asset visibility & detection right Vivek Ponnadaindustrial-control-systems-securityvulnerability-managementrisk-management+2
2022-08-11TalkThe Diana Initiative Connecting Dots Between Security Teams & Customer Expectations Shruthi Kamathsecurity-governancerisk-managementsecurity-architecture+2
2021-11-13TalkC0c0n Changing Cyber Security Paradigm & Cyber Tsunami Sunil Varkeycybersecurity-strategiesthreat-landscaperisk-management+4
2021-11-13TalkC0c0n Cyber Warfare & Securing Critical Infrastructures Faruk Kazicritical-infrastructureindustrial-control-systems-securityincident-response+1
2021-11-13TalkC0c0n Cybersecurity in the era of Resilience - A walk through people, process and technology Babitha B Prisk-managementcyber-resiliencesecurity-architecture+3
2021-11-13TalkC0c0n Enhancing An Multi-Factor Authentication (MFA) through Behavioural Biometrics Kiran Kumar Pgauthenticationmfasecurity-architecture
2021-11-13TalkC0c0n Introducing Free & Open Elastic Limitless XDR Ravindra Ramnanithreat-detectionsecurity-monitoringvulnerability-management+1
2021-11-13TalkC0c0n Need for Zero Trust in Banking Biju Kzero-trustrisk-managementsecurity-architecture+1
2021-11-13TalkC0c0n Post pandemic Transformation - A CISO’s perspective Sridhar Govardhanrisk-managementsecurity-governancecompliance+4
2021-11-13TalkC0c0n Zero Trust & Micro-segmentation Suresh Menonsegmentationzero-trustnetwork-architecture+1
2021-11-12TalkC0c0n Enterprise Governance and Risk Management Arathy Nair, Muskan Manglacompliancegovernancerisk-management+2
2021-11-12TalkC0c0n Executive Presence….a cardinal of the cyber rostrum Bishakha Jainsecurity-awarenesssecurity-architecturesecurity-governance
2021-11-12TalkC0c0n Post Covid CISOs - Disappearing trusted boundaries and Innovative CyberSecurity Approaches Illyas Kooliyankalrisk-managementsecurity-architecturesecurity-governance+1
2021-11-12TalkC0c0n Regulating Social Media Platforms : Should it be done in Democratic Societies ? J Sam Daniel Stalin, Apar Gupta, Dinesh O Bareja, Prashant Mali, Jiten Jaincompliancegovernancerisk-management+4
2021-10-13TalkRootcon The Kill Chain: Future of Cyber in Defense Video Harshit Agrawalsecurity-architectureindustrial-control-systems-securityrisk-management
2021-08-26TalkHitb Sec Conf Gazing Ahead: What Modern RF Combat Looks Like in the Next Decade Presentation Video Harshit Agrawalindustrial-control-systems-securitysecurity-architecturevulnerability-management+1
2021-08-07TalkDefcon The Curious Case of Knowing the Unknown Video Vandana Verma Sehgalthreat-huntingthreat_modelingsecurity-architecture+2
2021-08-06TalkDefcon Defending IoT in the Future of High-Tech Warfare Video Harshit Agrawalvulnerability-managementiot-pentestingsecurity-architecture+1
2020-11-21TalkApp Sec Indonesia The caveats of the unseen: Crouching exposure, Hidden Misconfiguration Ashwin Vamshivulnerability-managementsecurity-architecturedevsecops+2
2020-09-18TalkC0c0n Herd Immunity, in the Cyber World Sunil Varkeysecurity-awarenessrisk-managementvulnerability-management+1
2020-09-18TalkC0c0n Coping with Digital Transformation - A CISO perspective Video Maya R Nairrisk-managementsecurity-governancesecurity-architecture+3
2020-09-18TalkC0c0n Demystifying Zero Trust - A Real world Video Sandeep Variyamzero-trustsecurity-architecturesecurity-governance+1
2020-08-21TalkThe Diana Initiative Trust, No Trust or Zero Trust - Myth Demystifying Vandana Verma Sehgalzero-trustsecurity-architecturecompliance+2
2019-11-09TalkToor Con 100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans Jatin Katariareverse-engineeringhardware-reverse-engineeringvulnerability-management+3
2019-09-27TalkC0c0n A Day in the Life of a CISO Sridhar Govardhancompliancegovernancerisk-management+3
2019-09-27TalkC0c0n CISO Mind Set Lopa Mudraa Basuurisk-managementsecurity-governancecompliance+2
2019-09-27TalkC0c0n Industry 4.0 - Security and Compliance Santhosh Srinivasanindustrial-control-systems-securitycompliancegovernance+2
2019-09-27TalkC0c0n Looking a decade ahead: Big data, drones , Robots and cyber security. Rahul Sasiindustrial-control-systems-securitysecurity-architecture
2019-09-27TalkC0c0n Security @scale for startups Shivanath Somanathandevsecopssecure-developmentsoftware-security+2
2019-08-09TalkDefcon 100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans Jatin Katariareverse-engineeringvulnerability-managementsecurity-architecture+2
2018-10-05TalkC0c0n Blockchains as techno-power structures: towards emergence of P2P Politics Sunil Aggarwalblockchain-securitydecentralized-systemsdecentralised-security+2
2018-10-05TalkC0c0n Cybersecurity Embedded Digital Transformation - The Future Sunil Kanchiembedded-securitysecurity-architectureindustrial-control-systems-security
2018-10-05TalkC0c0n Digital Innovation revolution in Kerala Government Sunil Varkeycybersecurity-strategysecurity-architecturerisk-management+2
2018-10-05TalkC0c0n Future of Mobility & Cyber Security Suja Chandyautomotive-cybersecurityindustrial-control-systems-securitysecurity-architecture+2
2018-10-05TalkC0c0n Resiliency Focus alongside Digital Disruption Lince Lawrencesecurity-architecturerisk-managementsecurity-awareness+2
2018-10-05TalkC0c0n Taking cyber security to the board room Amit Pradhanrisk-managementcompliancegovernance+3
2018-10-05TalkC0c0n Will Artificial Intelligence And Machine Learning Bring More Threats On Cyber Security? Roshy Johnrisk-managementvulnerability-managementsecurity-architecture
2018-10-04TalkBrucon Disrupting the Kill Chain Video Vineet Bhatiaincident-responsevulnerability-managementsecurity-architecture
2018-08-16TalkUsenix Chipmunk or Pepe? Using Acoustical Analysis to Detect Voice-Channel Fraud at Scale Video Vijay Balasubramaniyanthreat-detectionsecurity-architecture
2018-08-16TalkUsenix Man-in-the-Machine: Exploiting Ill-Secured Communication Inside the Computer Presentation Whitepaper Video Siddharth Raopentestingvulnerability-managementsecurity-architecture+1
2018-08-09TalkDefcon Anonymous rate-limiting in services with Direct Anonymous Attestation Presentation Video Konark Modiprivacysecurity-architecture
2018-06-27TalkFirst Securing your in-ear fitness coach: Challenges in hardening next generation wearables Presentation Sumanth Naropanth, Sunil Kumarmobile-securitysecure-developmentvulnerability-management+2
2018-03-13TalkTroopers Securing your in-ear fitness coach: Challenges in hardening next generation wearables Presentation Video Sumanth Naropanth, Kavya Racharlamobile-securitysecure-developmentvulnerability-management+2
2017-08-19TalkC0c0n Building Trust for Digital Transactions in India’s COD Culture Parry Aftabsecure-developmentrisk-managementsecurity-architecture
2017-08-19TalkC0c0n Trust, the foundation of Digital Mastery Sunil Varkeyidentity-managementauthenticationrisk-management+2
2017-08-18TalkC0c0n Dynamic Binary Instrumentation Vivek Arora, Bhaskar Rastogidynamic-analysisreverse-engineeringbinary-analysis+1
2017-08-18TalkC0c0n Moving from Cybersecurity Awareness to Cybersecurity Competence Anup Narayanancybersecurity-educationcybersecurity-trainingsecurity-awareness+3
2017-08-04TalkSha Attacking OpenSSL using Side-channel Attacks: The RSA case study Whitepaper Praveen Vadnalareverse-engineeringvulnerability-managementsecurity-architecture+1
2017-03-03TalkNullcon Breach Response - Time to shake up the status quo Video K K Mookhey, Pranesh Prakash, Sahir Hidayatullah, Shobha Jagathpalincident-responsevulnerability-managementrisk-management+2
2017-03-03TalkNullcon Securing Critical National Infrastructure Video Shailendra Fuloria, R Sarangapani, Rahul Tongiacritical-infrastructureindustrial-control-systems-securityics-security+4
2017-01-25TalkOwasp App Sec California OCSP Stapling in the Wild Devdatta Akhaweweb-securityvulnerability-managementsecurity-architecture+1
2016-08-19TalkC0c0n Kill the password - A new era of authentication Tamaghna Basuauthenticationiamsecurity-architecture+1
2016-08-07TalkDefcon Cyber Grand Shellphish Video Aravind Machiryautomated-exploit-detectionreverse-engineeringvulnerability-assessment+1
2016-03-15TalkGroundzerosummit r00tKidz and Hacking Triveni Singhpentestingethical-hackingprivilege-escalation+3
2015-11-05TalkGround Zero Summit Western Air Command B S Singh Deonetwork-defensenetwork-monitoringnetwork-pentesting+3
2015-09-24TalkApp Sec Usa Continuous Cloud Security Automation Video Rohit PitkeawsdevsecopsAutomation+2
2015-08-07TalkDefcon Getting into the Trust Store We Trust Ajit Hattireverse-engineeringsecurity-architecturevulnerability-management
2015-08-01TalkC0c0n S3curi7y at 36K feet Rugved Mehta, Gaurav Trivediawsazuregcp+3
2015-03-15TalkDefcon TECHNICAL TALK-THWARTING THE SURVEILLANCE IN ONLINE COMMUNICATION Presentation Adhokshaj Mishraprivacysecurity-architecture
2015-01-27TalkOwasp App Sec California Anatomy of memory scraping, credit card stealing POS malware Video Amol Sarwatereverse-engineeringvulnerability-managementincident-response+1
2014-11-13TalkGround Zero Summit 9 Cell Cyber Diplomacy Alok Vijayantsecurity-architecturerisk-managementsecurity-governance
2013-11-20TalkApp Sec Usa Project Talk: OWASP OpenSAMM Project Pravir Chandrasoftware-securitysecure-developmentdevsecops+4
2013-09-27TalkC0c0n ARM, Thumb and the Finger Aseem Jakharreverse-engineeringbinary-analysisassembly-analysis+2
2013-09-27TalkC0c0n From Bedroom to Boardroom - Taking your Weekend Infosec Project Global Vivek Ramachandrandevsecopssecure-developmentpentesting+2
2013-08-15TalkUsenix Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness Presentation Whitepaper Devdatta Akhaweweb-securitysecurity-awarenesssecurity-architecture+3
2013-08-15TalkUsenix An Empirical Study of Vulnerability Rewards Programs Presentation Whitepaper Devdatta Akhawevulnerability-managementbug-bountysoftware-security+3
2012-12-01TalkClubhack The difference between the “Reality” and “Feeling” of Security: Information Security and the Human Being Presentation Video Thomas Kurian Ambattusecurity-awarenesshuman-factorrisk-management+2
2012-10-26TalkApp Sec Usa The 7 Qualities of Highly Secure Software Video Mano Paulsecure-developmentsoftware-securitysecure-coding+3
2012-08-03TalkC0c0n Business Continuity and Risk Management in Turbulent Times Venkataram Arabolurisk-managementbusiness-continuitycompliance+2
2012-08-03TalkC0c0n The Weakest Link - Reinforcing the Human Element Sandeep Godbolesecurity-awarenesshuman-factorcybersecurity-education+4
2011-11-17TalkDeepsec Behavioral Security: 10 steps forward 5 steps backward Video Sourabh Satishsecurity-awarenessbehavioral-changerisk-management+2
2011-09-07TalkSecuritybyte Social Web & Privacy – An evolving world Bala Sathiamurthy, Aridaman Tripathiprivacydata-protectionapi-security+3
2011-09-06TalkSecuritybyte Enabling Un-trusted Mashups Presentation Bishan Singhweb-securityxsscsrf+4
2009-11-17TalkSecuritybyte Business Continuity Case Study Venkataram Arabolubusiness-continuityrisk-managementbusiness-resilience+3
2009-11-17TalkSecuritybyte Usability and Privacy in Security Presentation Ponnurangam Kumaraguruprivacydata-protectionsecurity-architecture+3
2009-08-06TalkC0c0n Information Warfare A a Gafoor, Vinayak Mishrathreat-huntingthreat_modelingsecurity-awareness+2
1998-07-29TalkBlackhat Security as an enabler for new business opportunities - The Business Value of Security Karan Khannarisk-managementbusiness-continuitycyber-resilience+4