| 2025-03-02 | Panel | Nullcon |
Cyber Fusion Center: The Command Center for Integrated Cyber Defense
| Avkash Kathiriya, Mathan Babu Kasilingam, Yogi Kapur | #security-monitoring#network-defense#threat-modeling+3 |
| 2025-03-01 | Panel | Nullcon |
AI in SecOps: Enhancing Incident Response with Intelligence
| Mrudul Uchil, Parag Deodhar, Felix Mohan | #ai-security#ai#machine-learning+3 |
| 2024-10-23 | Talk | Blackhat |
Guardians of the OAuth Galaxy: Defending Your Organization from OAuth Application Attacks
| Shruti Ranjit, Mangatas Tondang | #blueteam#oauth#application-pentesting+4 |
| 2024-04-18 | Tool demo | Blackhat |
Catching adversaries on Azure - Deception on Cloud
| Subhash Popuri | #azure#cloud-workload-protection#cloud-pentesting+4 |
| 2024-04-18 | Tool demo | Blackhat |
Mantis - Asset Discovery at Scale
| Ankur Bhargava, Prateek Thakare, Saddam Hussain | #asset-inventory#architecture#devsecops+1 |
| 2023-09-24 | Panel | Nullcon |
ADVERSARY SIMULATION AND INCIDENT RESPONSE IMPACT
| Shomiron Das Gupta, Yogi Kapur, Manish Tiwari | #incident-management#incident-detection#forensics+3 |
| 2023-09-23 | Talk | Nullcon |
Journey in setting up OT SOC
| Ramandeep Singh Walia | #soc#ics-security#threat-detection+1 |
| 2023-08-07 | Talk | C0c0n |
Tackling Advanced Threat Landscape with MDR - Best Practices
| Vijayakumar K M | #incident-management#threat-hunting#security-monitoring+1 |
| 2023-08-06 | Talk | C0c0n |
Cybersecurity in the Era of AI
| Suvin Mullaseril | #ai#ai-security#deep-learning+4 |
| 2023-08-06 | Talk | C0c0n |
Subduing Adversaries with Information Superiority
| Antony K M | #threat-hunting#security-monitoring#threat-detection+2 |
| 2022-12-07 | Tool demo | Blackhat |
h0neytr4p - How to catch the external threat actors with an easy to configure Honeypot.
| Subhash Popuri | #honeypot#ids#ips+3 |
| 2022-09-24 | Talk | C0c0n |
Need for Advanced SOC
| Vijayakumar K M | #soc#security-monitoring#security-analytics+2 |
| 2022-09-23 | Talk | C0c0n |
Bridging the gap between Security and Operations
| Sujay Rajashekar Gundagatti | #devsecops#architecture#threat-detection+2 |
| 2022-09-08 | Talk | Nullcon |
Handling A Bug Bounty program From A Blue Team Perspective
| Ashwath Kumar, Ankit Anurag | #blueteam#cloud-monitoring#cloud-pentesting+4 |
| 2022-09-06 | Panel | Nullcon |
Does your SOC sucks?
| Krishna Pandey, Shweta Kshirsagar, Vivek Gopalan, Yogi Kapur | #security-training#incident-management#alert-fatigue+3 |
| 2021-11-13 | Talk | C0c0n |
Introducing Free & Open Elastic Limitless XDR
| Ravindra Ramnani | #threat-detection#security-monitoring#architecture |
| 2021-11-13 | Talk | C0c0n |
Machine learning to detect Chia mining
| Varun Kohli | #threat-detection#threat-hunting#malware-detection+2 |
| 2021-11-13 | Talk | C0c0n |
Mature Your Threat Hunting Program
| Neha Dhyani | #threat-hunting#threat-detection#threat-modeling+2 |
| 2021-11-12 | Panel | C0c0n |
Stopping Breaches with CrowdStrike
| Sandeep Rao | #endpoint-protection#incident-management#security-monitoring+2 |
| 2021-11-04 | Talk | Ekoparty |
DIAL: Did I just alert Lambda? A centralized security misconfiguration detection system
| Saransh Rana, Divyanshu Mehta, Harsh Varagiya | #aws#security-monitoring#iam+1 |
| 2020-03-06 | Tool demo | Nullcon |
Omniscient
| Pramod Rana | #reconnaissance#blueteam#network-monitoring+4 |
| 2019-11-01 | Talk | Appsecdayaustralia |
Protecting the Damned: Deploying Insecure Applications at Scale
| Vivek Ramachandran | #blueteam#container-security#docker+3 |
| 2019-09-27 | Talk | C0c0n |
Advanced Persistent Threat and counter measures
| A a Gafoor | #blueteam#apt#network-defense+4 |
| 2019-09-27 | Talk | C0c0n |
Building a cloud security monitoring and auditing framework
| Nirali Shah, Prasoon Dwivedi | #blueteam#cloud-monitoring#cloud-pentesting+4 |
| 2019-09-27 | Talk | C0c0n |
Demystifying HealthCare Security
| Ajay Pratap Singh | #blueteam#data-protection#identity-theft+4 |
| 2019-09-27 | Talk | C0c0n |
Doing SecOps for the Cloud using Cloud Native Services
| Akash Mahajan | #blueteam#cloud-workload-protection#container-security+3 |
| 2019-08-08 | Tool demo | Blackhat |
RWDD: Remote Web Deface Detection Tool
| K v Prashant, Ade Yoseman Putra | #blueteam#application-pentesting#security-monitoring+1 |
| 2019-05-21 | Talk | Phdays |
Active defense using Honeypots v2
| Rahul Binjve | #blueteam#honeypot#network-defense+4 |
| 2019-03-28 | Tool demo | Blackhat |
RTS: Real Time Scrapper
| Naveen Rudrappa | #blueteam#application-pentesting#security-monitoring+4 |
| 2019-03-02 | Panel | Nullcon |
Actionable Intelligence and Cyber Security
| Durga Dube, M v Sheshadri, Rahul Sasi, Shrikant Shitole, Alan White | #data-analytics#incident-management#security-analytics+4 |
| 2018-11-02 | Talk | Hitbsecconf |
Defending The Enterprise in 2018
| Saumil Shah | #blueteam#security-strategy#threat-modeling+3 |
| 2018-10-19 | Talk | Appsecdayaustralia |
Continuous Integration and Delivery with Docker Containers
| Vasant Kumar | #docker#blueteam#container-security+4 |
| 2018-10-05 | Talk | C0c0n |
Defending Healthcare Base
| Jiggyasu Sharma | #blueteam#incident-management#security-monitoring+4 |
| 2018-10-05 | Talk | C0c0n |
Privacy And Data Protection: Stakeholders’ Perspectives
| Rahul Sharma | #blueteam#data-protection#gdpr+4 |
| 2018-08-11 | Tool demo | Defcon |
Local Sheriff
| Konark Modi | #reconnaissance#blueteam#data-leak+4 |
| 2018-03-03 | Panel | Nullcon |
Next generation cyber SOC
| K K Mookhey, Mathan Babu Kasilingam, Hidayath Khan, Shivkumar Pandey, Michael Smith | #security-analytics#security-monitoring#cloud-workload-protection+4 |
| 2014-08-22 | Talk | C0c0n |
Idle Machines doing Bounty Hunting (Behind your Back)
| Mrityunjay Gautam | #bug-hunting#red-teaming#automated-scanning+3 |
| 2014-02-14 | Talk | Nullcon |
Multi-value W-Fi What the Heck is it
| Abhijeet Ghosh | #wifi#blueteam#network-defense+1 |
| 2013-11-07 | Talk | Groundzerosummit |
Advanced security for advanced threats
| Kartik Shahani | #blueteam#security-strategy#threat-modeling+4 |
| 2012-12-01 | Talk | Clubhack |
Real Time Event Recording System, the tool for Digital Forensics Investigation
| Madhav Limaye | #digital-forensics#endpoint-protection#endpoint-hardening+4 |
| 2012-08-03 | Talk | C0c0n |
Building Security Incident Detection & Handling Capabilities in Enterprises
| Sunil Varkey | #blueteam#incident-detection#security-strategy+4 |
| 2011-10-07 | Talk | C0c0n |
Network Security- Modern Mechanism for Intrusion Detection and avoidance in a P2P Network
| Bala Kumar S, Mohamed Emraanullah | #blueteam#intrusion-detection#ids+3 |
| 2010-02-25 | Talk | Nullcon |
Malware Detection Tool for Websites: A Proof-Of-Concept
| Anant Kochhar | #blueteam#malware-detection#application-pentesting+3 |
| 2009-08-06 | Talk | C0c0n |
Know Your Enemy, and Yourself: Demystifying Threat Modelin
| Meera Subbarao | #blueteam#security-strategy#threat-modeling+4 |
| 2009-08-06 | Talk | C0c0n |
Management & Security of Large Scale Storage Devices
| Prashant Dinde | #blueteam#data-protection#security-strategy+2 |
| 2009-08-06 | Talk | C0c0n |
Microsoft Security Strategies
| Binoy VC | #blueteam#security-strategy#azure+4 |
| 2008-12-06 | Talk | Clubhack |
Immune IT: Moving from Security to Immunity
| Ajit Hatti | #blueteam#security-strategy#security-monitoring+4 |