| 2025-04-29 | Talk | Rsac |
It’s Always Risky in IT: Frontline Stories and Strategic Insights
| Gourav Nagar, Rohit Bansal | #risk-management#security-compliance#cyber-resilience+4 |
| 2024-11-16 | Talk | C0c0n |
The subtle art of checkmating CISOs
| Sunil Varkey | #risk-management#architecture#security-governance+2 |
| 2024-11-15 | Talk | C0c0n |
CISO’s take on BYOAI
| Venugopal Parameswara | #risk-management#security-governance#security-compliance+3 |
| 2024-05-08 | Talk | Blackhat |
Cloud and Platform Agnostic Security Posture Management (xSPM)
| Sunil Arora, Parthasarthi Chakraborty | #cloud-security-posture-management#security-strategy#security-compliance |
| 2024-05-06 | Talk | Rsac |
Headspace’s Privacy Operations Center and Vault
| Shobhit Mehta, Puneet Thapliyal | #data-protection#security-operations-center#security-compliance+1 |
| 2023-08-12 | Talk | Defcon |
Getting More Bang for your Buck:Appsec on a Limited Budget
| Vandana Verma Sehgal, Viraj Gandhi | #secure-development#devsecops#risk-management+2 |
| 2023-08-07 | Talk | C0c0n |
The DPDPA Effect: Jubilation, Twinge and Reticence that followed
| Rahul Sharma | #security-compliance#security-governance#data-protection+1 |
| 2023-08-06 | Talk | C0c0n |
Cryptocurrencies and challenges to Law Enforcement Agencies
| Bhushan Gulabrao Borase | #decentralized-systems#digital-currency#security-compliance+1 |
| 2023-08-06 | Talk | C0c0n |
Cybercrimes Victim Compensation : Legal Remedies and Process
| Nisheeth Dixit | #security-compliance#security-governance#risk-management+1 |
| 2023-08-06 | Talk | C0c0n |
Digital Innovation and its Impact on CIOs, CISOs and DPOs
| Navaneethan M | #security-compliance#security-governance#risk-management+2 |
| 2023-08-06 | Talk | C0c0n |
Influence of Artificial Intelligence in GRC Space
| Mahesh Kalyanaraman | #security-governance#risk-management#security-compliance+2 |
| 2022-09-24 | Talk | C0c0n |
Building Smart, Resilient and Sustainable Cyber Eco System
| Navin Kumar Singh | #risk-management#cybersecurity-strategy#architecture+4 |
| 2022-09-24 | Talk | C0c0n |
Cyber Defence and Role of private players - public private partnership
| Jasbir Singh Solanki | #security-governance#risk-management#security-compliance+1 |
| 2022-09-24 | Talk | C0c0n |
Rationalizing Cyber Security Risk in Risk Language
| Anish Koshy | #risk-management#security-governance#cybersecurity-strategy+3 |
| 2022-09-23 | Talk | C0c0n |
Startup Ecosystem and Investments in Post Covid Era
| Sunil Kanchi | #risk-management#security-compliance#security-governance+2 |
| 2021-11-13 | Talk | C0c0n |
Crisis Capitalization in a Pandemic
| Greeshma M R | #risk-management#incident-management#security-training+2 |
| 2021-11-13 | Talk | C0c0n |
Light Basin - Telecom roaming network attack case study
| Akib Sayyed | #network-pentesting#network-traffic-analysis#gtp+2 |
| 2021-11-13 | Talk | C0c0n |
Post pandemic Transformation - A CISO’s perspective
| Sridhar Govardhan | #risk-management#security-governance#security-compliance+3 |
| 2021-11-12 | Talk | C0c0n |
Data Security and Privacy
| Abhilasha Vyas | #data-protection#encryption#data-loss-prevention+3 |
| 2021-11-12 | Talk | C0c0n |
Enterprise Governance and Risk Management
| Arathy Nair, Muskan Mangla | #security-compliance#security-governance#risk-management+1 |
| 2021-11-12 | Talk | C0c0n |
Regulating Social Media Platforms : Should it be done in Democratic Societies ?
| J Sam Daniel Stalin, Apar Gupta, Dinesh O Bareja, Prashant Mali, Jiten Jain | #security-compliance#security-governance#risk-management+3 |
| 2020-09-18 | Talk | C0c0n |
Coping with Digital Transformation - A CISO perspective
| Maya R Nair | #risk-management#security-governance#architecture+2 |
| 2020-08-21 | Talk | Thedianainitiative |
Trust, No Trust or Zero Trust - Myth Demystifying
| Vandana Verma Sehgal | #zero-trust#architecture#security-compliance+2 |
| 2019-09-27 | Talk | C0c0n |
A Day in the Life of a CISO
| Sridhar Govardhan | #security-compliance#security-governance#risk-management+2 |
| 2019-09-27 | Talk | C0c0n |
CISO Mind Set
| Lopa Mudraa Basuu | #risk-management#security-governance#security-compliance+1 |
| 2019-09-27 | Talk | C0c0n |
Industry 4.0 - Security and Compliance
| Santhosh Srinivasan | #ics-security#security-compliance#security-governance+2 |
| 2019-09-27 | Talk | C0c0n |
Practical Approach to Cyber Security for financial institutions
| Georgie Kurien | #financial-institutions#secure-development#risk-management+2 |
| 2018-10-05 | Talk | C0c0n |
Adaptive GRC
| Mahesh Kalyanaraman | #security-compliance#security-governance#risk-management |
| 2018-10-05 | Talk | C0c0n |
Data management challenge for Privacy compliance
| Maria Bellarmine | #data-protection#security-compliance#data-governance+2 |
| 2018-10-05 | Talk | C0c0n |
Digital Innovation revolution in Kerala Government
| Sunil Varkey | #cybersecurity-strategy#architecture#risk-management+2 |
| 2018-10-05 | Talk | C0c0n |
Taking cyber security to the board room
| Amit Pradhan | #risk-management#security-compliance#security-governance+2 |
| 2017-08-19 | Talk | C0c0n |
The Public Private Partnership - Navigating the Govt
| Saikat Datta | #security-compliance#security-governance#risk-management+1 |
| 2017-03-03 | Talk | Nullcon |
Securing Critical National Infrastructure
| Shailendra Fuloria, R Sarangapani, Rahul Tongia, Michael Pyle, Justin Searle | #critical-infrastructure#ics-security#risk-management+3 |
| 2015-02-06 | Talk | Nullcon |
Building security and compliance into the software delivery process
| Anubhav Bathla, Dinesh Pillai, S Chandrasekhar, Harish Pillay | #secure-development#devsecops#security-compliance+3 |
| 2014-11-13 | Talk | Groundzerosummit |
Financial Integrity and Cyber Security
| Karnal Singh | #risk-management#security-compliance#security-governance |
| 2014-11-13 | Talk | Groundzerosummit |
Internet Governance
| Anjana Kovacs | #security-governance#security-compliance#risk-management+1 |
| 2013-11-20 | Talk | Appsecusa |
Project Talk: OWASP OpenSAMM Project
| Pravir Chandra, Seba Deleersnyder | #software-security#secure-development#devsecops+4 |
| 2013-09-27 | Talk | C0c0n |
Hello CISO! How to make end-users LIKE and FOLLOW “Brand Infosec”?
| Anup Narayanan | #security-training#cybersecurity-education#security-governance+3 |
| 2012-08-04 | Talk | C0c0n |
Impact of cyber laws on various stakeholders
| Sagar Rahurkar | #security-compliance#security-governance#regulatory-compliance+1 |
| 2012-08-03 | Talk | C0c0n |
Business Continuity and Risk Management in Turbulent Times
| Venkataram Arabolu | #risk-management#business-continuity#security-compliance+2 |
| 2011-09-19 | Talk | Brucon |
Step-by-Step for Software Security (that anyone can follow)
| Pravir Chandra | #software-security#secure-development#devsecops+4 |
| 2011-09-07 | Talk | Securitybyte |
Social Web & Privacy – An evolving world
| Bala Sathiamurthy, Aridaman Tripathi | #data-protection#api-security#security-compliance+2 |
| 2010-11-25 | Talk | Deepsec |
Developers are from Mars, Compliance Auditors are from Venus
| Neelay S Shah | #security-compliance#security-governance#risk-management+4 |
| 2009-11-17 | Talk | Securitybyte |
Business Case-Risk Management/Compliance at AMITY
| Js Sodhi | #security-compliance#security-governance#risk-management+2 |
| 2009-08-06 | Talk | C0c0n |
Information Security Audit
| Venkatapathy Subramaniam | #security-compliance#security-governance#audit+1 |
| 1998-07-29 | Talk | Blackhat |
Security as an enabler for new business opportunities - The Business Value of Security
| Karan Khanna | #risk-management#business-continuity#cyber-resilience+3 |