🧪 Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Security Awareness

68
Total Entries
66
Contributors

Top Contributors

Anup Narayanan(3) Georgie Kurien(3) Shruthi Kamath(3) Sunil Varkey(3) A a Gafoor(2)

All Entries (68 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-08-07Tool demoBlackhat Q-TIP (QR Code Threat Inspection Platform) Rushikesh D Nandedkarincident-responseweb-securityvulnerability-management+2
2025-04-29TalkRsac It’s Always Risky in IT: Frontline Stories and Strategic Insights Rohit Bansalrisk-managementsecurity-architecturesecurity-awareness+2
2024-11-26TalkBlackhat The Double Edge Sword - Cybersecurity & AI Karmendra Kohlisecurity-architecturerisk-managementdevsecops+1
2024-11-16TalkC0c0n The subtle art of checkmating CISOs Sunil Varkeyrisk-managementsecurity-architecturesecurity-governance+3
2024-11-15TalkC0c0n CISO’s take on BYOAI Venugopal Parameswararisk-managementsecurity-governancecompliance+4
2023-09-28TalkHackinparis How to have visibility and security OF CICD ecosystem Pramod Ranacicd-securitydevsecopsvulnerability-management+6
2023-08-09TalkBlackhat Diversity Microtalks: Perspectives on Creating Change Presentation Aastha Sahnisecurity-awarenessrisk-managementsecurity-governance
2023-08-07TalkC0c0n Citizen Mobile Security: Responsibilities, Accountability, and Impacts Satyendra Vermamobile-securitysecurity-awarenessrisk-management+1
2023-08-07TalkC0c0n ESOC Trinetra Project Pankaj Kumar Dalelasecurity-governancerisk-managementvulnerability-management+1
2023-08-07TalkC0c0n Generative AI and Cyber Crimes Video Brijesh Singhmalwaresecurity-awarenessrisk-management+2
2023-08-06TalkC0c0n Developments in Deep Fake detection Tapas Sainisecurity-architecturesecurity-awarenessreverse-engineering+1
2023-08-06TalkC0c0n Insider Threats - Best Practices and Common Pitfalls Video Georgie Kurieninsider-threatsrisk-managementsecurity-awareness+1
2023-04-21TalkHitb Sec Conf LOCKNOTE:THE HAND THAT STRIKES, ALSO BLOCKS Presentation Video Saumil Shahsecurity-architecturerisk-managementsecurity-awareness+2
2022-09-24TalkC0c0n BEC, still the sure shot trap Georgie Kuriensocial-engineeringpentestingsecurity-awareness+1
2022-09-24TalkC0c0n Building Smart, Resilient and Sustainable Cyber Eco System Navin Kumar Singhrisk-managementcybersecurity-strategiessecurity-architecture+4
2022-09-24TalkC0c0n OSINT Tools and Techniques Brijesh Singhthreat-huntingintelligence-sharingsecurity-awareness+1
2022-09-24TalkC0c0n Power of Narratives in Cyber Security Sunil Varkeysecurity-awarenesscybersecurity-educationhuman-factor+2
2022-09-24TalkC0c0n Weaponising Social Media for Psychological Operations A a Gafoorsocial-engineeringsecurity-awarenessthreat-hunting+1
2022-08-25TalkHitb Sec Conf Building An Army Of Bots By Hijacking A Unicorn’s Twitter Handle Presentation Rahul Sasi, Vishal Singhsocial-engineeringpentestingmalware+2
2022-08-11TalkThe Diana Initiative Connecting Dots Between Security Teams & Customer Expectations Shruthi Kamathsecurity-governancerisk-managementsecurity-architecture+2
2022-08-11TalkThe Diana Initiative The Real Cost of Free: What you need to know before downloading a free app Ruchira Pokhriyalmobile-securityapp-securityprivacy+3
2022-07-23TalkMay Contain Hackers How would a real life social media be like? Aditi Bhatnagarprivacydata-protectionsecurity-awareness+4
2021-11-13TalkC0c0n Connecting the dots between customers and security teams Shruthi Kamathincident-responsesecurity-awarenessdevsecops+1
2021-11-13TalkC0c0n Crisis Capitalization in a Pandemic Greeshma M Rrisk-managementincident-responsesecurity-awareness+3
2021-11-13TalkC0c0n Cybersecurity in the era of Resilience - A walk through people, process and technology Babitha B Prisk-managementcyber-resiliencesecurity-architecture+3
2021-11-13TalkC0c0n Post pandemic Transformation - A CISO’s perspective Sridhar Govardhanrisk-managementsecurity-governancecompliance+4
2021-11-12TalkC0c0n “Let’s Go Phishing”: Discerning the insidious nature of Social Engineering Ruchira Pokhriyal, Shashi Karhailsocial-engineeringpentestingsecurity-awareness
2021-11-12TalkC0c0n Executive Presence….a cardinal of the cyber rostrum Bishakha Jainsecurity-awarenesssecurity-architecturesecurity-governance
2021-11-12TalkC0c0n Regulating Social Media Platforms : Should it be done in Democratic Societies ? J Sam Daniel Stalin, Apar Gupta, Dinesh O Bareja, Prashant Mali, Jiten Jaincompliancegovernancerisk-management+4
2021-11-12TalkC0c0n The evolving nature of cyber community Aastha Sahnisecurity-awarenessrisk-managementcybersecurity-education
2021-11-12TalkC0c0n Understanding the Psychology Behind Threats - adding Twists to your Turns Saman Fatimathreat_modelingsecurity-awarenesshuman-factor+1
2021-08-06TalkDefcon Adversary village Kick-off Video Abhijith B Rred-teamingethical-hackingvulnerability-assessment+2
2020-11-21TalkApp Sec Indonesia The caveats of the unseen: Crouching exposure, Hidden Misconfiguration Ashwin Vamshivulnerability-managementsecurity-architecturedevsecops+2
2020-09-18TalkC0c0n Herd Immunity, in the Cyber World Sunil Varkeysecurity-awarenessrisk-managementvulnerability-management+1
2020-09-18TalkC0c0n Cyber Security Shifts During COVID-19 Video Sunil Kanchirisk-managementsecurity-awarenesscompliance-governance+1
2019-11-10TalkToor Con Hot Tub Island Jatin Katariaethical-hackingsecurity-awareness
2019-09-27TalkC0c0n A Day in the Life of a CISO Sridhar Govardhancompliancegovernancerisk-management+3
2019-09-27TalkC0c0n Practical Approach to Cyber Security for financial institutions Georgie Kurienfinancial-institutionssecure-developmentrisk-management+2
2019-08-08TalkDefcon Phishing in the cloud era Presentation Ashwin Vamshi, Abhinav Singhphishingapi-securityweb-security+2
2018-10-05TalkC0c0n Resiliency Focus alongside Digital Disruption Lince Lawrencesecurity-architecturerisk-managementsecurity-awareness+2
2018-10-05TalkC0c0n Taking cyber security to the board room Amit Pradhanrisk-managementcompliancegovernance+3
2017-08-18TalkC0c0n Call Centre Frauds Parry Aftabsocial-engineeringsecurity-awarenessrisk-management+1
2017-08-18TalkC0c0n Challenges in Digital Banking Biju Ksecurity-awarenesssecurity-governancerisk-management
2017-08-18TalkC0c0n Cyber bullying-Screen the Mean Nitin Awade, Surjata Awadesecurity-awarenessincident-responsedigital-forensics
2017-08-18TalkC0c0n Do Students really require Smartphones Pranav a Menonsecurity-awarenesscybersecurity-educationhuman-factor
2017-08-18TalkC0c0n Internet Addiction and Children Teena Josesecurity-awarenesscybersecurity-educationhuman-factor
2017-08-18TalkC0c0n Moving from Cybersecurity Awareness to Cybersecurity Competence Anup Narayanancybersecurity-educationcybersecurity-trainingsecurity-awareness+3
2017-08-18TalkC0c0n Sleep, Screen and Teenagers Natishia Rebecca Chandy, Pulkit Deepak Khatrisecurity-awarenesshuman-factorbehavioral-change+1
2017-08-18TalkC0c0n Social Media and You Parry Aftabsecurity-awarenesssocial-engineeringhuman-factor+1
2017-08-18TalkC0c0n Threats with online gaming and issues with games like Pokemon Riyaz Walikar, Akash Mahajansecurity-awarenessmobile-securityvulnerability-management+1
2015-09-24TalkApp Sec Usa Encouraging Diversity and Advancing Cybersecurity Education Shruthi Kamathcybersecurity-educationsecurity-awarenessrisk-management+1
2015-08-01TalkC0c0n S3curi7y at 36K feet Rugved Mehta, Gaurav Trivediawsazuregcp+3
2013-09-27TalkC0c0n Hello CISO! How to make end-users LIKE and FOLLOW “Brand Infosec”? Anup Narayanansecurity-awarenesscybersecurity-educationsecurity-governance+3
2013-08-15TalkUsenix Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness Presentation Whitepaper Devdatta Akhaweweb-securitysecurity-awarenesssecurity-architecture+3
2012-12-01TalkClubhack The difference between the “Reality” and “Feeling” of Security: Information Security and the Human Being Presentation Video Thomas Kurian Ambattusecurity-awarenesshuman-factorrisk-management+2
2012-08-03TalkC0c0n A model to reduce information security risks due to human error Presentation Anup Narayanansecurity-awarenessbehavior-changerisk-management
2012-08-03TalkC0c0n Layer 8 Exploitation: A threat to National Security Aakash Goelsocial-engineeringpentestingsecurity-awareness+1
2012-08-03TalkC0c0n The Weakest Link - Reinforcing the Human Element Sandeep Godbolesecurity-awarenesshuman-factorcybersecurity-education+4
2011-11-17TalkDeepsec Behavioral Security: 10 steps forward 5 steps backward Video Sourabh Satishsecurity-awarenessbehavioral-changerisk-management+2
2011-09-07TalkSecuritybyte Social Web & Privacy – An evolving world Bala Sathiamurthy, Aridaman Tripathiprivacydata-protectionapi-security+3
2011-09-06TalkSecuritybyte Security Threats on Social Networks Presentation Nithya Ramansocial-engineeringweb-securitysecurity-awareness+2
2011-03-15TalkNullcon Information Warfare Ñ The Indian Perspective Alok Vijayantcybersecurity-strategyrisk-managementsecurity-awareness+1
2010-11-25TalkDeepsec Developers are from Mars, Compliance Auditors are from Venus Video Neelay S Shahcompliancegovernancerisk-management+4
2010-08-01TalkC0c0n Hackers’ EcoSystem in India Rohit Srivastwapentestingsecurity-awarenessrisk-management+1
2009-11-17TalkSecuritybyte Usability and Privacy in Security Presentation Ponnurangam Kumaraguruprivacydata-protectionsecurity-architecture+3
2009-08-06TalkC0c0n Cyber Victimisation K Jaishankarcybersecurity-educationsecurity-awarenessrisk-management+2
2009-08-06TalkC0c0n Information Warfare A a Gafoor, Vinayak Mishrathreat-huntingthreat_modelingsecurity-awareness+2
2007-08-02TalkBlackhat The Evolution Of Phishing To Organized Crime Video Rohyt Belanisocial-engineeringphishingthreat_modeling+2