| 2024-11-28 | Talk | Blackhat |
Time to Redefine Cybersecurity - Adding T - Trust as new Tenant to “CIA” and make it “I-ACT
| Lalit Ahluwalia | risk-managementsecurity-architecturesecurity-governance+1 |
| 2024-11-27 | Talk | Blackhat |
The Future of Cybersecurity: Addressing New Threats with Groundbreaking Strategies
| Mahesh Babu Kanigiri | risk-managementvulnerability-managementsecurity-architecture+2 |
| 2024-11-16 | Talk | C0c0n |
The subtle art of checkmating CISOs
| Sunil Varkey | risk-managementsecurity-architecturesecurity-governance+3 |
| 2024-11-15 | Talk | C0c0n |
CISO’s take on BYOAI
| Venugopal Parameswara | risk-managementsecurity-governancecompliance+4 |
| 2024-05-09 | Talk | Rsac |
The Good, the Bad, and the Bounty: 10 Years of Buying Bugs at Microsoft
| Aanchal Gupta | vulnerability-managementbug-bountyrisk-management+1 |
| 2024-05-07 | Talk | Rsac |
A Proven Approach on Automated Security Architectural Pattern Validation
| Sunil Arora | security-architecturedevsecopsvulnerability-management+2 |
| 2023-08-09 | Talk | Blackhat |
Diversity Microtalks: Perspectives on Creating Change
| Aastha Sahni | security-awarenessrisk-managementsecurity-governance |
| 2023-08-07 | Talk | C0c0n |
ESOC Trinetra Project
| Pankaj Kumar Dalela | security-governancerisk-managementvulnerability-management+1 |
| 2023-08-06 | Talk | C0c0n |
Digital Innovation and its Impact on CIOs, CISOs and DPOs
| Navaneethan M | compliancegovernancerisk-management+4 |
| 2023-08-06 | Talk | C0c0n |
Influence of Artificial Intelligence in GRC Space
| Mahesh Kalyanaraman | governancerisk-managementcompliance+3 |
| 2023-04-26 | Talk | Rsac |
Designing Product Security for a Brighter Smile and a Healthier Tomorrow
| Lokesh Pidawekar | secure-developmentdevsecopssoftware-security+2 |
| 2023-04-26 | Talk | Rsac |
Is Increasing Security Maturity And Decreasing Operational Load Possible?
| Rohit Dhamankar | Automationrisk-managementsecurity-architecture+2 |
| 2022-09-24 | Talk | C0c0n |
Building Smart, Resilient and Sustainable Cyber Eco System
| Navin Kumar Singh | risk-managementcybersecurity-strategiessecurity-architecture+4 |
| 2022-09-24 | Talk | C0c0n |
Cyber Defence and Role of private players - public private partnership
| Jasbir Singh Solanki | security-governancerisk-managementcompliance+2 |
| 2022-09-24 | Talk | C0c0n |
In production with GRC for cloud
| Mahesh Kalyanaraman | cloud-compliancegovernancerisk-management+2 |
| 2022-09-24 | Talk | C0c0n |
Power of Narratives in Cyber Security
| Sunil Varkey | security-awarenesscybersecurity-educationhuman-factor+2 |
| 2022-09-24 | Talk | C0c0n |
Rationalizing Cyber Security Risk in Risk Language
| Anish Koshy | risk-managementgovernancecybersecurity-strategies+4 |
| 2022-09-23 | Talk | C0c0n |
Building a Safer and Innovative Digital Ecosystem
| Vijay Pamarathi | secure-developmentdevsecopssoftware-security+2 |
| 2022-09-23 | Talk | C0c0n |
Technological Reliance for Resilience
| Tulika Pandey | risk-managementcyber-resiliencesecurity-architecture+2 |
| 2022-08-11 | Talk | The Diana Initiative |
Connecting Dots Between Security Teams & Customer Expectations
| Shruthi Kamath | security-governancerisk-managementsecurity-architecture+2 |
| 2021-11-13 | Talk | C0c0n |
Changing Cyber Security Paradigm & Cyber Tsunami
| Sunil Varkey | cybersecurity-strategiesthreat-landscaperisk-management+4 |
| 2021-11-13 | Talk | C0c0n |
Crisis Capitalization in a Pandemic
| Greeshma M R | risk-managementincident-responsesecurity-awareness+3 |
| 2021-11-13 | Talk | C0c0n |
Cybersecurity in the era of Resilience - A walk through people, process and technology
| Babitha B P | risk-managementcyber-resiliencesecurity-architecture+3 |
| 2021-11-13 | Talk | C0c0n |
Need for Zero Trust in Banking
| Biju K | zero-trustrisk-managementsecurity-architecture+1 |
| 2021-11-13 | Talk | C0c0n |
Post pandemic Transformation - A CISO’s perspective
| Sridhar Govardhan | risk-managementsecurity-governancecompliance+4 |
| 2021-11-12 | Talk | C0c0n |
Enterprise Governance and Risk Management
| Arathy Nair, Muskan Mangla | compliancegovernancerisk-management+2 |
| 2021-11-12 | Talk | C0c0n |
Executive Presence….a cardinal of the cyber rostrum
| Bishakha Jain | security-awarenesssecurity-architecturesecurity-governance |
| 2021-11-12 | Talk | C0c0n |
Post Covid CISOs - Disappearing trusted boundaries and Innovative CyberSecurity Approaches
| Illyas Kooliyankal | risk-managementsecurity-architecturesecurity-governance+1 |
| 2021-11-12 | Talk | C0c0n |
Regulating Social Media Platforms : Should it be done in Democratic Societies ?
| J Sam Daniel Stalin, Apar Gupta, Dinesh O Bareja, Prashant Mali, Jiten Jain | compliancegovernancerisk-management+4 |
| 2020-09-18 | Talk | C0c0n |
Coping with Digital Transformation - A CISO perspective
| Maya R Nair | risk-managementsecurity-governancesecurity-architecture+3 |
| 2020-09-18 | Talk | C0c0n |
Demystifying Zero Trust - A Real world
| Sandeep Variyam | zero-trustsecurity-architecturesecurity-governance+1 |
| 2020-08-21 | Talk | The Diana Initiative |
Trust, No Trust or Zero Trust - Myth Demystifying
| Vandana Verma Sehgal | zero-trustsecurity-architecturecompliance+2 |
| 2019-09-27 | Talk | C0c0n |
CISO Mind Set
| Lopa Mudraa Basuu | risk-managementsecurity-governancecompliance+2 |
| 2018-10-05 | Talk | C0c0n |
Adaptive GRC
| Mahesh Kalyanaraman | compliancegovernancerisk-management+1 |
| 2018-10-05 | Talk | C0c0n |
Blockchains as techno-power structures: towards emergence of P2P Politics
| Sunil Aggarwal | blockchain-securitydecentralized-systemsdecentralised-security+2 |
| 2018-10-05 | Talk | C0c0n |
Future of Mobility & Cyber Security
| Suja Chandy | automotive-cybersecurityindustrial-control-systems-securitysecurity-architecture+2 |
| 2018-10-05 | Talk | C0c0n |
Taking cyber security to the board room
| Amit Pradhan | risk-managementcompliancegovernance+3 |
| 2017-08-19 | Talk | C0c0n |
The Public Private Partnership - Navigating the Govt
| Saikat Datta | compliancegovernancerisk-management+3 |
| 2017-08-19 | Talk | C0c0n |
Trust, the foundation of Digital Mastery
| Sunil Varkey | identity-managementauthenticationrisk-management+2 |
| 2017-08-18 | Talk | C0c0n |
Challenges in Digital Banking
| Biju K | security-awarenesssecurity-governancerisk-management |
| 2017-08-18 | Talk | C0c0n |
Moving from Cybersecurity Awareness to Cybersecurity Competence
| Anup Narayanan | cybersecurity-educationcybersecurity-trainingsecurity-awareness+3 |
| 2017-03-03 | Talk | Nullcon |
Securing Critical National Infrastructure
| Shailendra Fuloria, R Sarangapani, Rahul Tongia | critical-infrastructureindustrial-control-systems-securityics-security+4 |
| 2015-09-24 | Talk | App Sec Usa |
Encouraging Diversity and Advancing Cybersecurity Education
| Shruthi Kamath | cybersecurity-educationsecurity-awarenessrisk-management+1 |
| 2014-11-13 | Talk | Ground Zero Summit |
9 Cell Cyber Diplomacy
| Alok Vijayant | security-architecturerisk-managementsecurity-governance |
| 2014-11-13 | Talk | Ground Zero Summit |
Financial Integrity and Cyber Security
| Karnal Singh | risk-managementcompliancesecurity-governance |
| 2014-11-13 | Talk | Ground Zero Summit |
Internet Governance
| Anjana Kovacs | governancecompliancerisk-management+2 |
| 2013-09-27 | Talk | C0c0n |
Hello CISO! How to make end-users LIKE and FOLLOW “Brand Infosec”?
| Anup Narayanan | security-awarenesscybersecurity-educationsecurity-governance+3 |
| 2012-12-01 | Talk | Clubhack |
The difference between the “Reality” and “Feeling” of Security: Information Security and the Human Being
| Thomas Kurian Ambattu | security-awarenesshuman-factorrisk-management+2 |
| 2012-08-04 | Talk | C0c0n |
Impact of cyber laws on various stakeholders
| Sagar Rahurkar | compliancegovernanceregulatory-compliance+2 |
| 2012-03-15 | Talk | C0c0n |
Integrated Dial 100 System for Law Enforcement
| Nandkumar Saravade | security-governancecompliance-governancesecurity-operations |
| 2011-11-17 | Talk | Deepsec |
Behavioral Security: 10 steps forward 5 steps backward
| Sourabh Satish | security-awarenessbehavioral-changerisk-management+2 |
| 2011-09-19 | Talk | Brucon |
Step-by-Step for Software Security (that anyone can follow)
| Pravir Chandra | software-securitysecure-developmentdevsecops+4 |
| 2009-11-17 | Talk | Securitybyte |
Business Continuity Case Study
| Venkataram Arabolu | business-continuityrisk-managementbusiness-resilience+3 |
| 1998-07-29 | Talk | Blackhat |
Security as an enabler for new business opportunities - The Business Value of Security
| Karan Khanna | risk-managementbusiness-continuitycyber-resilience+4 |