🧪 Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Security Monitoring

Focus Area: 🛡️ Security Operations & Defense
47
Total Entries
64
Contributors

Top Contributors

Yogi Kapur(3) Mathan Babu Kasilingam(2) Subhash Popuri(2) Vijayakumar K M(2) A a Gafoor(1)

All Entries (47 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-03-02PanelNullcon Cyber Fusion Center: The Command Center for Integrated Cyber Defense Avkash Kathiriya, Mathan Babu Kasilingam, Yogi Kapur#security-monitoring#network-defense#threat-modeling+3
2025-03-01PanelNullcon AI in SecOps: Enhancing Incident Response with Intelligence Mrudul Uchil, Parag Deodhar, Felix Mohan#ai-security#ai#machine-learning+3
2024-10-23TalkBlackhat Guardians of the OAuth Galaxy: Defending Your Organization from OAuth Application Attacks Presentation Video Shruti Ranjit, Mangatas Tondang#blueteam#oauth#application-pentesting+4
2024-04-18Tool demoBlackhat Catching adversaries on Azure - Deception on Cloud Source Code Subhash Popuri#azure#cloud-workload-protection#cloud-pentesting+4
2024-04-18Tool demoBlackhat Mantis - Asset Discovery at Scale Source Code Ankur Bhargava, Prateek Thakare, Saddam Hussain#asset-inventory#architecture#devsecops+1
2023-09-24PanelNullcon ADVERSARY SIMULATION AND INCIDENT RESPONSE IMPACT Shomiron Das Gupta, Yogi Kapur, Manish Tiwari#incident-management#incident-detection#forensics+3
2023-09-23TalkNullcon Journey in setting up OT SOC Presentation Ramandeep Singh Walia#soc#ics-security#threat-detection+1
2023-08-07TalkC0c0n Tackling Advanced Threat Landscape with MDR - Best Practices Video Vijayakumar K M#incident-management#threat-hunting#security-monitoring+1
2023-08-06TalkC0c0n Cybersecurity in the Era of AI Video Suvin Mullaseril#ai#ai-security#deep-learning+4
2023-08-06TalkC0c0n Subduing Adversaries with Information Superiority Video Antony K M#threat-hunting#security-monitoring#threat-detection+2
2022-12-07Tool demoBlackhat h0neytr4p - How to catch the external threat actors with an easy to configure Honeypot. Source Code Subhash Popuri#honeypot#ids#ips+3
2022-09-24TalkC0c0n Need for Advanced SOC Vijayakumar K M#soc#security-monitoring#security-analytics+2
2022-09-23TalkC0c0n Bridging the gap between Security and Operations Sujay Rajashekar Gundagatti#devsecops#architecture#threat-detection+2
2022-09-08TalkNullcon Handling A Bug Bounty program From A Blue Team Perspective Presentation Video Ashwath Kumar, Ankit Anurag#blueteam#cloud-monitoring#cloud-pentesting+4
2022-09-06PanelNullcon Does your SOC sucks? Video Krishna Pandey, Shweta Kshirsagar, Vivek Gopalan, Yogi Kapur#security-training#incident-management#alert-fatigue+3
2021-11-13TalkC0c0n Introducing Free & Open Elastic Limitless XDR Ravindra Ramnani#threat-detection#security-monitoring#architecture
2021-11-13TalkC0c0n Machine learning to detect Chia mining Varun Kohli#threat-detection#threat-hunting#malware-detection+2
2021-11-13TalkC0c0n Mature Your Threat Hunting Program Neha Dhyani#threat-hunting#threat-detection#threat-modeling+2
2021-11-12PanelC0c0n Stopping Breaches with CrowdStrike Sandeep Rao#endpoint-protection#incident-management#security-monitoring+2
2021-11-04TalkEkoparty DIAL: Did I just alert Lambda? A centralized security misconfiguration detection system Source Code Video Saransh Rana, Divyanshu Mehta, Harsh Varagiya#aws#security-monitoring#iam+1
2020-03-06Tool demoNullcon Omniscient Source Code Pramod Rana#reconnaissance#blueteam#network-monitoring+4
2019-11-01TalkAppsecdayaustralia Protecting the Damned: Deploying Insecure Applications at Scale Video Vivek Ramachandran#blueteam#container-security#docker+3
2019-09-27TalkC0c0n Advanced Persistent Threat and counter measures A a Gafoor#blueteam#apt#network-defense+4
2019-09-27TalkC0c0n Building a cloud security monitoring and auditing framework Nirali Shah, Prasoon Dwivedi#blueteam#cloud-monitoring#cloud-pentesting+4
2019-09-27TalkC0c0n Demystifying HealthCare Security Ajay Pratap Singh#blueteam#data-protection#identity-theft+4
2019-09-27TalkC0c0n Doing SecOps for the Cloud using Cloud Native Services Akash Mahajan#blueteam#cloud-workload-protection#container-security+3
2019-08-08Tool demoBlackhat RWDD: Remote Web Deface Detection Tool Source Code Video K v Prashant, Ade Yoseman Putra#blueteam#application-pentesting#security-monitoring+1
2019-05-21TalkPhdays Active defense using Honeypots v2 Presentation Rahul Binjve#blueteam#honeypot#network-defense+4
2019-03-28Tool demoBlackhat RTS: Real Time Scrapper Source Code Naveen Rudrappa#blueteam#application-pentesting#security-monitoring+4
2019-03-02PanelNullcon Actionable Intelligence and Cyber Security Video Durga Dube, M v Sheshadri, Rahul Sasi, Shrikant Shitole, Alan White#data-analytics#incident-management#security-analytics+4
2018-11-02TalkHitbsecconf Defending The Enterprise in 2018 Saumil Shah#blueteam#security-strategy#threat-modeling+3
2018-10-19TalkAppsecdayaustralia Continuous Integration and Delivery with Docker Containers Video Vasant Kumar#docker#blueteam#container-security+4
2018-10-05TalkC0c0n Defending Healthcare Base Jiggyasu Sharma#blueteam#incident-management#security-monitoring+4
2018-10-05TalkC0c0n Privacy And Data Protection: Stakeholders’ Perspectives Rahul Sharma#blueteam#data-protection#gdpr+4
2018-08-11Tool demoDefcon Local Sheriff Source Code Konark Modi#reconnaissance#blueteam#data-leak+4
2018-03-03PanelNullcon Next generation cyber SOC Video K K Mookhey, Mathan Babu Kasilingam, Hidayath Khan, Shivkumar Pandey, Michael Smith#security-analytics#security-monitoring#cloud-workload-protection+4
2014-08-22TalkC0c0n Idle Machines doing Bounty Hunting (Behind your Back) Mrityunjay Gautam#bug-hunting#red-teaming#automated-scanning+3
2014-02-14TalkNullcon Multi-value W-Fi What the Heck is it Video Abhijeet Ghosh#wifi#blueteam#network-defense+1
2013-11-07TalkGroundzerosummit Advanced security for advanced threats Kartik Shahani#blueteam#security-strategy#threat-modeling+4
2012-12-01TalkClubhack Real Time Event Recording System, the tool for Digital Forensics Investigation Presentation Video Madhav Limaye#digital-forensics#endpoint-protection#endpoint-hardening+4
2012-08-03TalkC0c0n Building Security Incident Detection & Handling Capabilities in Enterprises Sunil Varkey#blueteam#incident-detection#security-strategy+4
2011-10-07TalkC0c0n Network Security- Modern Mechanism for Intrusion Detection and avoidance in a P2P Network Bala Kumar S, Mohamed Emraanullah#blueteam#intrusion-detection#ids+3
2010-02-25TalkNullcon Malware Detection Tool for Websites: A Proof-Of-Concept Presentation Anant Kochhar#blueteam#malware-detection#application-pentesting+3
2009-08-06TalkC0c0n Know Your Enemy, and Yourself: Demystifying Threat Modelin Meera Subbarao#blueteam#security-strategy#threat-modeling+4
2009-08-06TalkC0c0n Management & Security of Large Scale Storage Devices Prashant Dinde#blueteam#data-protection#security-strategy+2
2009-08-06TalkC0c0n Microsoft Security Strategies Binoy VC#blueteam#security-strategy#azure+4
2008-12-06TalkClubhack Immune IT: Moving from Security to Immunity Presentation Ajit Hatti#blueteam#security-strategy#security-monitoring+4