| 2025-08-06 | Panel | Blackhat |
Hacking the Status Quo: Tales From Leading Women in Cybersecurity
| Vandana Verma Sehgal | #security-training#cybersecurity-education#security-strategy |
| 2025-04-29 | Talk | Rsac |
It’s Always Risky in IT: Frontline Stories and Strategic Insights
| Gourav Nagar, Rohit Bansal | #risk-management#security-compliance#cyber-resilience+4 |
| 2025-04-04 | Panel | Blackhat |
Locknote: Highlights & Key Takeaways from Black Hat Asia 2025
| Vandana Verma Sehgal | #security-strategy#cybersecurity-framework#digital-learning+1 |
| 2025-03-02 | Panel | Nullcon |
How can organisations protect themselves against Advanced Cyber Threats
| Bithal Bhardwaj, Vishal Salvi | #security-strategy#incident-management#phishing+1 |
| 2025-03-02 | Panel | Nullcon |
Modernizing Security Architecture: Platforms or Best-of-Breed, What Works Best?
| Ketan Vyas, Prajal Kulkarni, Satyavathi Divadari, Srihari Kotni | #security-strategy#threat-modeling#zero-trust+3 |
| 2025-03-01 | Panel | Nullcon |
Converging IT and OT Security: Unified strategies for protection, detection and response
| Burgess Cooper, Kuldeep Singh, Shailendra Fuloria, Rohit Sharma, Sachin Burman, Yask Sharma | #ics-security#cloud-workload-protection#security-strategy+1 |
| 2025-03-01 | Panel | Nullcon |
Cyber Tech 2030: The Next Chapter in AI, Zero Trust & Offensive Defense
| Ajit Hatti, Varun Singla | #ai-security#zero-trust#ai+3 |
| 2025-03-01 | Panel | Nullcon |
Navigating Data Protection in the age of globalisation
| Saikat Datta, Krishan Dev | #data-protection#gdpr#data-governance+4 |
| 2024-12-12 | Panel | Blackhat |
Locknote: Conclusions and Key Takeaways from Black Hat Europe 2024
| Vandana Verma Sehgal | #security-strategy#cybersecurity-framework#cyber-resilience+2 |
| 2024-12-11 | Talk | Blackhat |
The CVSS Deception: How We’ve Been Misled on Vulnerability Severity
| Ankur Sand | #blueteam#security-strategy#threat-modeling+1 |
| 2024-11-16 | Talk | C0c0n |
Old Bugs, New Tricks: How N-Day Vulnerabilities Are Fueling Today’s Threat Landscape
| Dharani Sanjaiy | #bug-hunting#exploit-delivery#security-strategy+1 |
| 2024-11-16 | Panel | C0c0n |
When Falcon Strikes Back: The Defender’s Dilemma
| Burgess Cooper, Shivkumar Pandey, A Shiju Rawther, Padnya Manwar, Kishan Kendre | #incident-management#security-strategy#threat-modeling+2 |
| 2024-11-15 | Talk | C0c0n |
GenAI and Autonomous Security in the Age of Zero Trust
| Philip Varughese Vayarakunnil | #ai#ai-security#zero-trust+2 |
| 2024-11-15 | Panel | C0c0n |
Intelligence led security
| Midhun Babu, Sameer Ratolikar, M v Sheshadri, A Shiju Rawther, Maya R Nair, Balakrishnan A | #security-strategy#data-analytics#ai-security+1 |
| 2024-08-09 | Talk | Defcon |
Reflections on a Decade in Bug Bounties: Experiences and Major Takeaways
| Nikhil Shrivastava | #bug-hunting#bug-bounty#security-training+3 |
| 2024-08-08 | Tool demo | Blackhat |
Active Directory Cyber Deception using Huginn
| Rohan Durve | #active-directory#incident-management#identity-governance+3 |
| 2024-05-08 | Talk | Blackhat |
Cloud and Platform Agnostic Security Posture Management (xSPM)
| Sunil Arora | #cloud-security-posture-management#security-strategy#security-compliance |
| 2024-05-08 | Talk | Rsac |
How to CTF Infra - Beyond the Challenges and Flags
| Jayesh Chauhan | #ctf#cloud-workload-protection#security-strategy+2 |
| 2024-03-12 | Talk | Nullcon |
Secure Web Gateways are dead. What’s next?
| Vivek Ramachandran | #browser-security#application-hardening#security-strategy+2 |
| 2023-09-24 | Panel | Nullcon |
A CYBER-PHYSICAL SYSTEM FOR INDIA WITH SECURITY, PRIVACY, AND EQUITY
| Kunal Korgaonkar, Kapil Jaiswal, Malcolm Dsouza, Manoj Aggarwal, Niraj Sharma | #cyber-physical-systems#security-strategy#data-protection+1 |
| 2023-09-24 | Panel | Nullcon |
ADVERSARY SIMULATION AND INCIDENT RESPONSE IMPACT
| Shomiron Das Gupta, Yogi Kapur, Manish Tiwari | #incident-management#incident-detection#forensics+3 |
| 2023-09-24 | Panel | Nullcon |
C4CII - SECURING USE OF CLOUD IN CRITICAL INFORMATION INFRASTRUCTURE
| Saikat Datta, Akash Mahajan, Varun Singla, Navin Kumar Singh | #cloud-security-posture-management#cloud-workload-protection#critical-infrastructure+3 |
| 2023-09-23 | Panel | Nullcon |
CRITICAL INFORMATION INFRASTRUCTURE(CII) PROTECTION: CHALLENGES AND OPPORTUNITIES- HOW CAN THE NULLCON COMMUNITY CONTRIBUTE
| Saikat Datta, M v Sheshadri, Madhavi Purandare, Mathan Babu Kasilingam, Navin Kumar Singh | #critical-infrastructure#cybersecurity-framework#security-strategy+4 |
| 2023-08-10 | Talk | Blackhat |
Does Public Disclosure of Vulnerabilities Affect Hacker Participation in Bug Bounty Programs?
| Amit Deokar | #bug-hunting#incident-management#security-strategy+4 |
| 2023-08-09 | Talk | Blackhat |
Identifying and Reducing Permission Explosion in AWS: A Graph-Based and Analytical Approach
| Pankaj Moolrajani | #aws#cloud-security-posture-management#cloud-workload-protection+2 |
| 2023-08-07 | Panel | C0c0n |
CII Protection: How can the c0c0n community contribute ?
| Navin Kumar Singh | #security-strategy#open-source-security |
| 2023-08-07 | Talk | C0c0n |
Cyber Threats to Global Financial Systems
| Lince Lawrence | #incident-management#risk-management#cloud-monitoring+4 |
| 2023-08-07 | Panel | C0c0n |
Evolving Threat Landscape: Strategies for Adapting and Innovating in Cybersecurity
| Vikas Arora, Sanjay Singh, Baidyanath Kumar, Saurabh Gugnani, Gokulavan Jayaraman, Vijay Nair | #security-strategy#threat-modeling#security-training+3 |
| 2023-08-06 | Panel | C0c0n |
nGen Cyber Threats - 2024 and Beyond: Embracing Chaos, Taking Charge
| Murli Nambiar, A Shiju Rawther, Jacxine Fernandez, Vishal Salvi, Sridhar Govardhan | #security-strategy#cybersecurity-framework#cyber-resilience+2 |
| 2023-08-06 | Talk | C0c0n |
Playing cat and mouse with the Adversary: Sometimes a breach is inevitable
| Abhijith B R | #incident-management#risk-management#security-strategy+1 |
| 2023-08-06 | Talk | C0c0n |
Securing the Future: Addressing Cybersecurity Challenges in the Age of 5G
| Altaf Shaik | #zero-trust#supply-chain-security#attack-surface+4 |
| 2023-03-09 | Panel | Nullcon |
Elements of a Successful Security Strategy: A Comprehensive Approach
| Sheetal Joseph | #security-strategy#security-testing#secure-development+4 |
| 2022-12-08 | Panel | Blackhat |
Locknote: Conclusions and Key Takeaways from Day 2
| Anant Shrivastava | #security-strategy#threat-modeling#cybersecurity-training+2 |
| 2022-09-24 | Panel | C0c0n |
Data sovereignty - Challenges and the road ahead
| Sanjeev Sharma, Saranga Rajan, A Muralidhar, Jojy Joy | #data-governance#data-protection#gdpr+2 |
| 2022-09-23 | Talk | C0c0n |
Ransomware: Prevention, Early Detection and Response
| Babitha Bp | #ransomware#incident-management#malware-prevention+2 |
| 2022-09-06 | Panel | Nullcon |
Cloud Services for Financial Inclusion: Possibilities & Challenges
| Nandkumar Saravade, Ganesh Ar, Himanshu Das, Navin Kumar Singh | #cloud-compliance#cloud-monitoring#financial-institutions+2 |
| 2022-09-06 | Panel | Nullcon |
Impact of disruptive technologies on CISO’s career & progression
| Burgess Cooper, Sandeep Karan, Jacxine Fernandez, Ravi Kumar, Ankur Bhargava | #security-strategy#cybersecurity-framework#ai-security |
| 2022-09-06 | Panel | Nullcon |
PAM Maturity From Zero Trust To Least Privilege
| Ajay Bongirwar, Charanjit Bhatia, Bala Ramanan | #security-strategy#zero-trust#access-management+2 |
| 2022-09-06 | Panel | Nullcon |
Secure Service Edge (SSE): Challenges & Upsides of Adoption
| Rahul Neel Mani, Anuprita Daga, Rajesh Hemrajani | #cloud-workload-protection#threat-modeling#zero-trust+1 |
| 2022-09-06 | Panel | Nullcon |
Securing India The CERTIn Way
| Saikat Datta, Sanjay Bahl, Ajit Menon, Anuprita Daga | #security-strategy#cybersecurity-framework#incident-management+3 |
| 2022-08-10 | Talk | Blackhat |
The Open Threat Hunting Framework: Enabling Organizations to Build, Operationalize, and Scale Threat Hunting
| Sameer Koranne | #threat-hunting#security-strategy#threat-modeling |
| 2022-05-12 | Panel | Blackhat |
Locknote: Conclusions and Key Takeaways from Black Hat Asia 2022
| Vandana Verma Sehgal | #security-strategy |
| 2022-04-08 | Talk | Nullcon |
Bheem OS - A next-generation reasonably secure OS using Rust MicroVM
| Akram Ansari, Subash Sn | #os#virtual-machine#container-security+3 |
| 2021-11-18 | Talk | Hackinparis |
Is it really an intrusion if you get called in?: Mis-configuration based attacks in AWS
| Kavisha Sheth | #aws#cloud-workload-protection#cloud-pentesting+3 |
| 2021-08-06 | Panel | Defcon |
Adversary simulation, emulation or purple teaming - How would you define it?
| Anant Shrivastava | #security-testing#incident-management#red-teaming+3 |
| 2021-08-05 | Talk | Blackhat |
5G IMSI Catchers Mirage
| Ravishankar Borgaonkar, Altaf Shaik | #ios#android#security-strategy+1 |
| 2021-05-07 | Panel | Blackhat |
Insights and Predictions: What’s Next in InfoSec
| Vandana Verma Sehgal | #security-strategy#cybersecurity-training#cybersecurity-framework+2 |
| 2021-03-06 | Panel | Nullcon |
From Reactive to Proactive - Operationalizing your Threat Intel
| Akshat Jain, Amit Ghodekar, Suhas Desai, Ambuj Bhalla | #data-analytics#cybersecurity-strategy#intelligence-sharing+1 |
| 2021-03-05 | Panel | Nullcon |
CyberPhysical Systems Security - Trends, challenges & opportunities
| Frank Sanjay, Khushwant Pawar, Mayur Mehta, Faruk Kazi | #industrial-control-systems#operational-technology#embedded-systems+3 |
| 2020-10-07 | Talk | Rootcon |
Zero Trust in the Era of Cloud
| Vandana Verma Sehgal | #zero-trust#cloud-workload-protection#security-strategy |
| 2020-09-18 | Talk | C0c0n |
Offensive & Scope Based Recon
| Harsh Bothra | #reconnaissance#network-architecture#security-strategy+1 |
| 2020-09-18 | Talk | C0c0n |
Supercharging your initial foothold in Red Team engagements
| Sachin S Kamath | #red-teaming#ethical-hacking#exploit-delivery+3 |
| 2020-08-06 | Panel | Blackhat |
Locknote: Conclusions and Key Takeaways from Day 2
| Aanchal Gupta | #security-strategy#threat-modeling#cybersecurity-training+2 |
| 2020-08-05 | Tool demo | Blackhat |
vPrioritizer: Learn to say NO to almost every vulnerability (art of risk prioritisation…)
| Pramod Rana | #risk-analysis#blueteam#security-strategy+4 |
| 2020-03-06 | Panel | Nullcon |
Predicting Danger: Building the Ideal Threat Intelligence Model
| Saikat Datta, Sandeep Sharma, Muslim Koser, Shankar Jadhav | #ai-security#machine-learning#nlp+3 |
| 2019-12-04 | Talk | Blackhat |
Bring Your Own Token (BYOT) to Replace the Traditional Smartcards for Strong Authentication and Signing
| Karthik Ramasamy | #blueteam#smartcard#mfa+4 |
| 2019-11-01 | Talk | App Sec Day Australia |
Protecting the Damned: Deploying Insecure Applications at Scale
| Vivek Ramachandran | #blueteam#container-security#docker+3 |
| 2019-09-28 | Panel | C0c0n |
Align security and risk management strategies with enterprise objectives
| Abdul Karim Vettiyanickal, George Eapen, Ranjeet Rai, Amit Dubey, Biju K, Kanu Pathania | #security-strategy#cybersecurity-framework#cyber-resilience+4 |
| 2019-09-28 | Panel | C0c0n |
Implementing Data Protection Frameworks with evolving Technology-Challenges, Opportunities & Solutions
| B R Nath, Jijy Oommen, Maya R Nair, Ajay Porus, Georgie Kurien | #data-protection#data-governance#security-strategy |
| 2019-09-27 | Talk | C0c0n |
Block Chain for Secured Automation
| Sanat Bhat | #blueteam#smart-contracts#decentralised-security+1 |
| 2019-09-27 | Talk | C0c0n |
Defense in Depth for Embedded Systems
| Jiggyasu Sharma | #embedded-systems#blueteam#hardware-embedded+4 |
| 2019-09-27 | Talk | C0c0n |
Looking a decade ahead: Big data, drones , Robots and cyber security.
| Rahul Sasi | #ics-security#architecture#ai-security+2 |
| 2019-08-29 | Keynote | Hitb Sec Conf |
The CISO’s Dilemma
| Saumil Shah | #blueteam#compliance-governance#security-strategy+4 |
| 2019-08-08 | Tool demo | Defcon |
Let’s Map Your Network
| Pramod Rana | #reconnaissance#blueteam#network-monitoring+4 |
| 2019-03-01 | Panel | Nullcon |
Clear and Present Danger: Cyber Wars will Target Critical Infrastructure
| Sourabh Issar, Sachin Burman, Sudarshan Rajagopal, Somenath Kundu | #cyber-war#critical-infrastructure#security-strategy+1 |
| 2018-11-02 | Talk | Hitb Sec Conf |
Defending The Enterprise in 2018
| Saumil Shah | #blueteam#security-strategy#threat-modeling+3 |
| 2018-10-04 | Talk | Brucon |
Disrupting the Kill Chain
| Vineet Bhatia | #incident-management#architecture#windows+3 |
| 2018-08-11 | Talk | Defcon |
Compression Oracle Attacks on VPN Networks
| Ahamed Nafeez | #vpn#network-architecture#application-pentesting+3 |
| 2018-08-09 | Talk | Defcon |
Anonymous rate-limiting in services with Direct Anonymous Attestation
| Konark Modi | #data-protection#architecture#security-strategy+1 |
| 2018-03-03 | Panel | Nullcon |
Managing Cyber Risk in the Connected Environment
| Gaurav Shukla, Ramachandra Hegde, Sudarshan Rajagopal | #security-strategy#threat-modeling#network-monitoring+1 |
| 2017-08-19 | Panel | C0c0n |
Security in Banking - Being one step aheadt
| Sunil Varkey, Rajesh Hemrajani, Biju K, Bhavin Bhansali, B R Nath, V George Antony | #financial-institutions#secure-development#security-strategy |
| 2017-04-13 | Keynote | Hitb Sec Conf |
Redefining Defense
| Saumil Shah | #blueteam#security-strategy#incident-management+2 |
| 2017-03-31 | Talk | Blackhat |
The Seven Axioms of Security
| Saumil Shah | #blueteam#security-strategy#threat-modeling+2 |
| 2017-03-21 | Talk | Troopers |
New attacks in 4G technologies
| Ravishankar Borgaonkar | #4g#attack-surface#threat-modeling+1 |
| 2017-03-04 | Panel | Nullcon |
Cyber-Security Blue-Print for the Future!
| Kapil Awasthi, Mathan Babu Kasilingam, Partha Sengupta, Sumit Malhotra | #security-strategy#threat-modeling#zero-trust |
| 2016-11-04 | Talk | Blackhat |
Detach Me Not - DoS Attacks Against 4G Cellular Users Worldwide from your Desk
| Siddharth Rao, Bhanu Kotte | #dos#red-teaming#ss7+4 |
| 2016-10-19 | Talk | Hacklu |
2016: The Infosec Crossroads
| Saumil Shah | #philosophy#security-strategy#incident-management+3 |
| 2016-09-14 | Talk | 44 Con |
2016: The Infosec Crossroads
| Saumil Shah | #blueteam#security-strategy#threat-modeling+4 |
| 2015-11-05 | Talk | Ground Zero Summit |
Economics of Post Quantum Crypto Systems : Do we really Need it
| Ajit Hatti | #encryption#quantum-computing#security-strategy+1 |
| 2015-02-07 | Panel | Nullcon |
Startup panel – Make in India
| Aseem Jakhar, Radha Shelat, Sumit D Chowdhury, Shomiron Das Gupta, Sastry Tumuluri, Shiju Sathyadevan | #security-strategy#cybersecurity-framework#business-resilience+4 |
| 2014-11-13 | Talk | Ground Zero Summit |
Attacking Cryptography & PKI Implementations
| Ajit Hatti | #encryption#red-teaming#ssl+4 |
| 2014-11-13 | Talk | Ground Zero Summit |
Network Time Protocol in Amplification Inferno
| Sriram Krishnan | #network-pentesting#network-vulnerability-assessment#network-architecture+2 |
| 2014-11-13 | Talk | Ground Zero Summit |
APT protection for the Enterprise
| Deepak Singla | #blueteam#apt#security-strategy |
| 2014-08-22 | Talk | C0c0n |
Cryptocalypse, Heart Bleed : Is our Government Listening?
| Ajit Hatti | #encryption#ssl#cyber-law+3 |
| 2014-08-22 | Talk | C0c0n |
Cryptographic Backdoors: Subverting the RSA
| Adhokshaj Mishra | #encryption#red-teaming#security-strategy+3 |
| 2014-02-14 | Talk | Nullcon |
12 YEARS AND A BAKER’S DOZEN
| Saumil Shah | #philosophy#security-strategy#threat-modeling+3 |
| 2013-11-20 | Panel | App Sec Usa |
Aim-Ready-Fire
| Pravir Chandra | #appsec#secure-development#security-strategy |
| 2013-11-07 | Talk | Ground Zero Summit |
Abusing Google Apps: Google is my command and control center
| Ajin Abraham | #android#red-teaming#cloud-pentesting+4 |
| 2013-11-07 | Talk | Ground Zero Summit |
Advanced security for advanced threats
| Kartik Shahani | #blueteam#security-strategy#threat-modeling+4 |
| 2013-09-27 | Talk | C0c0n |
Disclosing Vulnerabilities: The Bug Bounty Style
| Nikhil Prabhakar | #red-teaming#bug-bounty#ethical-hacking+3 |
| 2013-07-31 | Talk | Blackhat |
LTE booms with vulnerabilities
| Ankit Gupta | #lte#ddos#network-architecture+2 |
| 2013-03-01 | Talk | Nullcon |
Sensitive Campus Security with Network
| Aravind Sitaraman | #blueteam#network-monitoring#security-strategy+4 |
| 2012-12-01 | Talk | Clubhack |
Infrastructure Security
| Sivamurthy Hiremath | #blueteam#security-strategy#threat-modeling+1 |
| 2012-09-05 | Talk | 44 Con |
Why Integrity is left alone and not given TLC (Tender, Love and Care) it deserves?
| Jitender Arora | #data-protection#security-strategy#threat-modeling+3 |
| 2012-08-03 | Talk | C0c0n |
Building Security Incident Detection & Handling Capabilities in Enterprises
| Sunil Varkey | #blueteam#incident-detection#security-strategy+4 |
| 2012-08-03 | Talk | C0c0n |
Contemporary Transcription and Resource Parasitism
| Arpit Patel | #exploitation#firewall#network-monitoring+1 |
| 2012-08-03 | Talk | C0c0n |
Enterprise server security
| Raghav Shandilya | #blueteam#security-tools#network-monitoring+2 |
| 2012-08-03 | Talk | C0c0n |
The Management of Information Security – A Corporate Practitioner’s Perspective
| Pawan Kumar Singh | #cyber-law#security-strategy#data-protection+2 |
| 2012-03-16 | Talk | Blackhat |
IVR Security- Internal Network Attack via Phone Lines
| Rahul Sasi | #red-teaming#ivrs#network-pentesting+3 |
| 2012-02-15 | Talk | Nullcon |
Cyberspace: Global commons or a national asset
| Kamlesh Bajaj | #cyber-law#cybersecurity-framework#incident-management+1 |
| 2012-02-15 | Talk | Nullcon |
Shall we dust Beep? The Geo-strategic realities of Cyberwar
| Pukhraj Singh | #cyber-war#security-strategy#attack-surface |
| 2011-10-08 | Talk | C0c0n |
Stratagemizing Security Against Perpetrators In Cloud Infrastructure
| K S Abhiraj | #blueteam#cloud-security-posture-management#cloud-pentesting+4 |
| 2011-09-19 | Talk | Hacklu |
The travelling hacksmith
| Saumil Shah | #red-teaming#ethical-hacking#exploit-delivery+2 |
| 2011-02-25 | Talk | Nullcon |
Enterprise Paradigm for Controlling Data Leakage
| Deepak Rout | #data-leak#blueteam#data-loss-prevention+3 |
| 2011-02-25 | Talk | Nullcon |
Hacking the Parliament – A classic Social Engineering attack
| Anurag Dhanda | #social-engineering#reconnaissance#security-strategy+2 |
| 2011-02-25 | Talk | Nullcon |
Protect infrastructure or protect information – Lessons from Wikileaks
| Vishal Gupta | #data-leak#blueteam#data-protection+2 |
| 2010-10-29 | Talk | T2 |
Hacking Femtocells
| Ravishankar Borgaonkar | #reverse-engineering#device-security#hardware-embedded+3 |
| 2010-04-21 | Talk | Hitb Sec Conf |
Web Security – Going Nowhere?
| Saumil Shah | #red-teaming#application-hardening#application-pentesting+4 |
| 2010-02-25 | Talk | Nullcon |
Quantum Computing Challenges in the field of security
| Navin Pai | #quantum-computing#security-strategy#threat-modeling+3 |
| 2009-11-18 | Talk | Securitybyte |
Risk based Penetration Testing
| K K Mookhey | #security-assessment#risk-management#ethical-hacking+3 |
| 2009-11-17 | Talk | Securitybyte |
Threat Modeling
| Varun Sharma | #threat-modeling#blueteam#security-strategy+4 |
| 2009-10-28 | Talk | Hacklu |
Ownage 2.0
| Saumil Shah | #red-teaming#ethical-hacking#exploit-delivery+2 |
| 2009-08-06 | Talk | C0c0n |
Know Your Enemy, and Yourself: Demystifying Threat Modelin
| Meera Subbarao | #blueteam#security-strategy#threat-modeling+4 |
| 2009-08-06 | Talk | C0c0n |
Management & Security of Large Scale Storage Devices
| Prashant Dinde | #blueteam#data-protection#security-strategy+2 |
| 2009-08-06 | Talk | C0c0n |
Microsoft Security Strategies
| Binoy VC | #blueteam#security-strategy#azure+4 |
| 2008-12-06 | Talk | Clubhack |
Immune IT: Moving from Security to Immunity
| Ajit Hatti | #blueteam#security-strategy#security-monitoring+4 |
| 2008-08-07 | Talk | Blackhat |
Got Citrix, Hack It!
| Shanit Gupta | #red-teaming#rdp#application-pentesting+1 |
| 2008-03-26 | Talk | Can Sec West |
Vulnerabilities Die Hard
| Kowsik Guruswamy | #red-teaming#ethical-hacking#exploit-delivery+2 |
| 2007-04-18 | Talk | Can Sec West |
Low-Rate Denial-of-Service attacks
| Anil Kumar | #red-teaming#dos#network-defense+2 |
| 2005-07-28 | Talk | Blackhat |
Rapid Threat Modeling
| Akshay Aggarwal | #threat-modeling#red-teaming#security-strategy+4 |