🧪 Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Security Strategy

Focus Areas: ⚖️ Governance, Risk & Compliance 🏗️ Security Architecture
120
Total Entries
169
Contributors

Top Contributors

Saumil Shah(10) Vandana Verma Sehgal(6) Ajit Hatti(5) Saikat Datta(5) Navin Kumar Singh(4)

All Entries (120 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-08-06PanelBlackhat Hacking the Status Quo: Tales From Leading Women in Cybersecurity Vandana Verma Sehgal#security-training#cybersecurity-education#security-strategy
2025-04-29TalkRsac It’s Always Risky in IT: Frontline Stories and Strategic Insights Gourav Nagar, Rohit Bansal#risk-management#security-compliance#cyber-resilience+4
2025-04-04PanelBlackhat Locknote: Highlights & Key Takeaways from Black Hat Asia 2025 Vandana Verma Sehgal#security-strategy#cybersecurity-framework#digital-learning+1
2025-03-02PanelNullcon How can organisations protect themselves against Advanced Cyber Threats Bithal Bhardwaj, Vishal Salvi#security-strategy#incident-management#phishing+1
2025-03-02PanelNullcon Modernizing Security Architecture: Platforms or Best-of-Breed, What Works Best? Ketan Vyas, Prajal Kulkarni, Satyavathi Divadari, Srihari Kotni#security-strategy#threat-modeling#zero-trust+3
2025-03-01PanelNullcon Converging IT and OT Security: Unified strategies for protection, detection and response Burgess Cooper, Kuldeep Singh, Shailendra Fuloria, Rohit Sharma, Sachin Burman, Yask Sharma#ics-security#cloud-workload-protection#security-strategy+1
2025-03-01PanelNullcon Cyber Tech 2030: The Next Chapter in AI, Zero Trust & Offensive Defense Ajit Hatti, Varun Singla#ai-security#zero-trust#ai+3
2025-03-01PanelNullcon Navigating Data Protection in the age of globalisation Saikat Datta, Krishan Dev#data-protection#gdpr#data-governance+4
2024-12-12PanelBlackhat Locknote: Conclusions and Key Takeaways from Black Hat Europe 2024 Vandana Verma Sehgal#security-strategy#cybersecurity-framework#cyber-resilience+2
2024-12-11TalkBlackhat The CVSS Deception: How We’ve Been Misled on Vulnerability Severity Presentation Ankur Sand#blueteam#security-strategy#threat-modeling+1
2024-11-16TalkC0c0n Old Bugs, New Tricks: How N-Day Vulnerabilities Are Fueling Today’s Threat Landscape Dharani Sanjaiy#bug-hunting#exploit-delivery#security-strategy+1
2024-11-16PanelC0c0n When Falcon Strikes Back: The Defender’s Dilemma Burgess Cooper, Shivkumar Pandey, A Shiju Rawther, Padnya Manwar, Kishan Kendre#incident-management#security-strategy#threat-modeling+2
2024-11-15TalkC0c0n GenAI and Autonomous Security in the Age of Zero Trust Philip Varughese Vayarakunnil#ai#ai-security#zero-trust+2
2024-11-15PanelC0c0n Intelligence led security Midhun Babu, Sameer Ratolikar, M v Sheshadri, A Shiju Rawther, Maya R Nair, Balakrishnan A#security-strategy#data-analytics#ai-security+1
2024-08-09TalkDefcon Reflections on a Decade in Bug Bounties: Experiences and Major Takeaways Video Nikhil Shrivastava#bug-hunting#bug-bounty#security-training+3
2024-08-08Tool demoBlackhat Active Directory Cyber Deception using Huginn Source Code Rohan Durve#active-directory#incident-management#identity-governance+3
2024-05-08TalkBlackhat Cloud and Platform Agnostic Security Posture Management (xSPM) Video Sunil Arora#cloud-security-posture-management#security-strategy#security-compliance
2024-05-08TalkRsac How to CTF Infra - Beyond the Challenges and Flags Presentation Jayesh Chauhan#ctf#cloud-workload-protection#security-strategy+2
2024-03-12TalkNullcon Secure Web Gateways are dead. What’s next? Vivek Ramachandran#browser-security#application-hardening#security-strategy+2
2023-09-24PanelNullcon A CYBER-PHYSICAL SYSTEM FOR INDIA WITH SECURITY, PRIVACY, AND EQUITY Kunal Korgaonkar, Kapil Jaiswal, Malcolm Dsouza, Manoj Aggarwal, Niraj Sharma#cyber-physical-systems#security-strategy#data-protection+1
2023-09-24PanelNullcon ADVERSARY SIMULATION AND INCIDENT RESPONSE IMPACT Shomiron Das Gupta, Yogi Kapur, Manish Tiwari#incident-management#incident-detection#forensics+3
2023-09-24PanelNullcon C4CII - SECURING USE OF CLOUD IN CRITICAL INFORMATION INFRASTRUCTURE Saikat Datta, Akash Mahajan, Varun Singla, Navin Kumar Singh#cloud-security-posture-management#cloud-workload-protection#critical-infrastructure+3
2023-09-23PanelNullcon CRITICAL INFORMATION INFRASTRUCTURE(CII) PROTECTION: CHALLENGES AND OPPORTUNITIES- HOW CAN THE NULLCON COMMUNITY CONTRIBUTE Video Saikat Datta, M v Sheshadri, Madhavi Purandare, Mathan Babu Kasilingam, Navin Kumar Singh#critical-infrastructure#cybersecurity-framework#security-strategy+4
2023-08-10TalkBlackhat Does Public Disclosure of Vulnerabilities Affect Hacker Participation in Bug Bounty Programs? Presentation Amit Deokar#bug-hunting#incident-management#security-strategy+4
2023-08-09TalkBlackhat Identifying and Reducing Permission Explosion in AWS: A Graph-Based and Analytical Approach Presentation Pankaj Moolrajani#aws#cloud-security-posture-management#cloud-workload-protection+2
2023-08-07PanelC0c0n CII Protection: How can the c0c0n community contribute ? Navin Kumar Singh#security-strategy#open-source-security
2023-08-07TalkC0c0n Cyber Threats to Global Financial Systems Video Lince Lawrence#incident-management#risk-management#cloud-monitoring+4
2023-08-07PanelC0c0n Evolving Threat Landscape: Strategies for Adapting and Innovating in Cybersecurity Vikas Arora, Sanjay Singh, Baidyanath Kumar, Saurabh Gugnani, Gokulavan Jayaraman, Vijay Nair#security-strategy#threat-modeling#security-training+3
2023-08-06PanelC0c0n nGen Cyber Threats - 2024 and Beyond: Embracing Chaos, Taking Charge Murli Nambiar, A Shiju Rawther, Jacxine Fernandez, Vishal Salvi, Sridhar Govardhan#security-strategy#cybersecurity-framework#cyber-resilience+2
2023-08-06TalkC0c0n Playing cat and mouse with the Adversary: Sometimes a breach is inevitable Video Abhijith B R#incident-management#risk-management#security-strategy+1
2023-08-06TalkC0c0n Securing the Future: Addressing Cybersecurity Challenges in the Age of 5G Video Altaf Shaik#zero-trust#supply-chain-security#attack-surface+4
2023-03-09PanelNullcon Elements of a Successful Security Strategy: A Comprehensive Approach Video Sheetal Joseph#security-strategy#security-testing#secure-development+4
2022-12-08PanelBlackhat Locknote: Conclusions and Key Takeaways from Day 2 Anant Shrivastava#security-strategy#threat-modeling#cybersecurity-training+2
2022-09-24PanelC0c0n Data sovereignty - Challenges and the road ahead Sanjeev Sharma, Saranga Rajan, A Muralidhar, Jojy Joy#data-governance#data-protection#gdpr+2
2022-09-23TalkC0c0n Ransomware: Prevention, Early Detection and Response Babitha Bp#ransomware#incident-management#malware-prevention+2
2022-09-06PanelNullcon Cloud Services for Financial Inclusion: Possibilities & Challenges Video Nandkumar Saravade, Ganesh Ar, Himanshu Das, Navin Kumar Singh#cloud-compliance#cloud-monitoring#financial-institutions+2
2022-09-06PanelNullcon Impact of disruptive technologies on CISO’s career & progression Video Burgess Cooper, Sandeep Karan, Jacxine Fernandez, Ravi Kumar, Ankur Bhargava#security-strategy#cybersecurity-framework#ai-security
2022-09-06PanelNullcon PAM Maturity From Zero Trust To Least Privilege Video Ajay Bongirwar, Charanjit Bhatia, Bala Ramanan#security-strategy#zero-trust#access-management+2
2022-09-06PanelNullcon Secure Service Edge (SSE): Challenges & Upsides of Adoption Video Rahul Neel Mani, Anuprita Daga, Rajesh Hemrajani#cloud-workload-protection#threat-modeling#zero-trust+1
2022-09-06PanelNullcon Securing India The CERTIn Way Video Saikat Datta, Sanjay Bahl, Ajit Menon, Anuprita Daga#security-strategy#cybersecurity-framework#incident-management+3
2022-08-10TalkBlackhat The Open Threat Hunting Framework: Enabling Organizations to Build, Operationalize, and Scale Threat Hunting Presentation Source Code Sameer Koranne#threat-hunting#security-strategy#threat-modeling
2022-05-12PanelBlackhat Locknote: Conclusions and Key Takeaways from Black Hat Asia 2022 Vandana Verma Sehgal#security-strategy
2022-04-08TalkNullcon Bheem OS - A next-generation reasonably secure OS using Rust MicroVM Video Akram Ansari, Subash Sn#os#virtual-machine#container-security+3
2021-11-18TalkHackinparis Is it really an intrusion if you get called in?: Mis-configuration based attacks in AWS Kavisha Sheth#aws#cloud-workload-protection#cloud-pentesting+3
2021-08-06PanelDefcon Adversary simulation, emulation or purple teaming - How would you define it? Video Anant Shrivastava#security-testing#incident-management#red-teaming+3
2021-08-05TalkBlackhat 5G IMSI Catchers Mirage Presentation Video Ravishankar Borgaonkar, Altaf Shaik#ios#android#security-strategy+1
2021-05-07PanelBlackhat Insights and Predictions: What’s Next in InfoSec Vandana Verma Sehgal#security-strategy#cybersecurity-training#cybersecurity-framework+2
2021-03-06PanelNullcon From Reactive to Proactive - Operationalizing your Threat Intel Video Akshat Jain, Amit Ghodekar, Suhas Desai, Ambuj Bhalla#data-analytics#cybersecurity-strategy#intelligence-sharing+1
2021-03-05PanelNullcon CyberPhysical Systems Security - Trends, challenges & opportunities Video Frank Sanjay, Khushwant Pawar, Mayur Mehta, Faruk Kazi#industrial-control-systems#operational-technology#embedded-systems+3
2020-10-07TalkRootcon Zero Trust in the Era of Cloud Presentation Video Vandana Verma Sehgal#zero-trust#cloud-workload-protection#security-strategy
2020-09-18TalkC0c0n Offensive & Scope Based Recon Video Harsh Bothra#reconnaissance#network-architecture#security-strategy+1
2020-09-18TalkC0c0n Supercharging your initial foothold in Red Team engagements Sachin S Kamath#red-teaming#ethical-hacking#exploit-delivery+3
2020-08-06PanelBlackhat Locknote: Conclusions and Key Takeaways from Day 2 Aanchal Gupta#security-strategy#threat-modeling#cybersecurity-training+2
2020-08-05Tool demoBlackhat vPrioritizer: Learn to say NO to almost every vulnerability (art of risk prioritisation…) Source Code Pramod Rana#risk-analysis#blueteam#security-strategy+4
2020-03-06PanelNullcon Predicting Danger: Building the Ideal Threat Intelligence Model Video Saikat Datta, Sandeep Sharma, Muslim Koser, Shankar Jadhav#ai-security#machine-learning#nlp+3
2019-12-04TalkBlackhat Bring Your Own Token (BYOT) to Replace the Traditional Smartcards for Strong Authentication and Signing Presentation Whitepaper Video Karthik Ramasamy#blueteam#smartcard#mfa+4
2019-11-01TalkApp Sec Day Australia Protecting the Damned: Deploying Insecure Applications at Scale Video Vivek Ramachandran#blueteam#container-security#docker+3
2019-09-28PanelC0c0n Align security and risk management strategies with enterprise objectives Video Abdul Karim Vettiyanickal, George Eapen, Ranjeet Rai, Amit Dubey, Biju K, Kanu Pathania#security-strategy#cybersecurity-framework#cyber-resilience+4
2019-09-28PanelC0c0n Implementing Data Protection Frameworks with evolving Technology-Challenges, Opportunities & Solutions B R Nath, Jijy Oommen, Maya R Nair, Ajay Porus, Georgie Kurien#data-protection#data-governance#security-strategy
2019-09-27TalkC0c0n Block Chain for Secured Automation Sanat Bhat#blueteam#smart-contracts#decentralised-security+1
2019-09-27TalkC0c0n Defense in Depth for Embedded Systems Presentation Jiggyasu Sharma#embedded-systems#blueteam#hardware-embedded+4
2019-09-27TalkC0c0n Looking a decade ahead: Big data, drones , Robots and cyber security. Rahul Sasi#ics-security#architecture#ai-security+2
2019-08-29KeynoteHitb Sec Conf The CISO’s Dilemma Presentation Video Saumil Shah#blueteam#compliance-governance#security-strategy+4
2019-08-08Tool demoDefcon Let’s Map Your Network Source Code Pramod Rana#reconnaissance#blueteam#network-monitoring+4
2019-03-01PanelNullcon Clear and Present Danger: Cyber Wars will Target Critical Infrastructure Video Sourabh Issar, Sachin Burman, Sudarshan Rajagopal, Somenath Kundu#cyber-war#critical-infrastructure#security-strategy+1
2018-11-02TalkHitb Sec Conf Defending The Enterprise in 2018 Saumil Shah#blueteam#security-strategy#threat-modeling+3
2018-10-04TalkBrucon Disrupting the Kill Chain Video Vineet Bhatia#incident-management#architecture#windows+3
2018-08-11TalkDefcon Compression Oracle Attacks on VPN Networks Presentation Ahamed Nafeez#vpn#network-architecture#application-pentesting+3
2018-08-09TalkDefcon Anonymous rate-limiting in services with Direct Anonymous Attestation Presentation Video Konark Modi#data-protection#architecture#security-strategy+1
2018-03-03PanelNullcon Managing Cyber Risk in the Connected Environment Video Gaurav Shukla, Ramachandra Hegde, Sudarshan Rajagopal#security-strategy#threat-modeling#network-monitoring+1
2017-08-19PanelC0c0n Security in Banking - Being one step aheadt Sunil Varkey, Rajesh Hemrajani, Biju K, Bhavin Bhansali, B R Nath, V George Antony#financial-institutions#secure-development#security-strategy
2017-04-13KeynoteHitb Sec Conf Redefining Defense Presentation Video Saumil Shah#blueteam#security-strategy#incident-management+2
2017-03-31TalkBlackhat The Seven Axioms of Security Presentation Video Saumil Shah#blueteam#security-strategy#threat-modeling+2
2017-03-21TalkTroopers New attacks in 4G technologies Ravishankar Borgaonkar#4g#attack-surface#threat-modeling+1
2017-03-04PanelNullcon Cyber-Security Blue-Print for the Future! Kapil Awasthi, Mathan Babu Kasilingam, Partha Sengupta, Sumit Malhotra#security-strategy#threat-modeling#zero-trust
2016-11-04TalkBlackhat Detach Me Not - DoS Attacks Against 4G Cellular Users Worldwide from your Desk Presentation Video Siddharth Rao, Bhanu Kotte#dos#red-teaming#ss7+4
2016-10-19TalkHacklu 2016: The Infosec Crossroads Presentation Saumil Shah#philosophy#security-strategy#incident-management+3
2016-09-14Talk44 Con 2016: The Infosec Crossroads Presentation Video Saumil Shah#blueteam#security-strategy#threat-modeling+4
2015-11-05TalkGround Zero Summit Economics of Post Quantum Crypto Systems : Do we really Need it Ajit Hatti#encryption#quantum-computing#security-strategy+1
2015-02-07PanelNullcon Startup panel – Make in India Aseem Jakhar, Radha Shelat, Sumit D Chowdhury, Shomiron Das Gupta, Sastry Tumuluri, Shiju Sathyadevan#security-strategy#cybersecurity-framework#business-resilience+4
2014-11-13TalkGround Zero Summit Attacking Cryptography & PKI Implementations Ajit Hatti#encryption#red-teaming#ssl+4
2014-11-13TalkGround Zero Summit Network Time Protocol in Amplification Inferno Sriram Krishnan#network-pentesting#network-vulnerability-assessment#network-architecture+2
2014-11-13TalkGround Zero Summit APT protection for the Enterprise Deepak Singla#blueteam#apt#security-strategy
2014-08-22TalkC0c0n Cryptocalypse, Heart Bleed : Is our Government Listening? Ajit Hatti#encryption#ssl#cyber-law+3
2014-08-22TalkC0c0n Cryptographic Backdoors: Subverting the RSA Adhokshaj Mishra#encryption#red-teaming#security-strategy+3
2014-02-14TalkNullcon 12 YEARS AND A BAKER’S DOZEN Presentation Video Saumil Shah#philosophy#security-strategy#threat-modeling+3
2013-11-20PanelApp Sec Usa Aim-Ready-Fire Pravir Chandra#appsec#secure-development#security-strategy
2013-11-07TalkGround Zero Summit Abusing Google Apps: Google is my command and control center Presentation Ajin Abraham#android#red-teaming#cloud-pentesting+4
2013-11-07TalkGround Zero Summit Advanced security for advanced threats Kartik Shahani#blueteam#security-strategy#threat-modeling+4
2013-09-27TalkC0c0n Disclosing Vulnerabilities: The Bug Bounty Style Nikhil Prabhakar#red-teaming#bug-bounty#ethical-hacking+3
2013-07-31TalkBlackhat LTE booms with vulnerabilities Whitepaper Ankit Gupta#lte#ddos#network-architecture+2
2013-03-01TalkNullcon Sensitive Campus Security with Network Video Aravind Sitaraman#blueteam#network-monitoring#security-strategy+4
2012-12-01TalkClubhack Infrastructure Security Presentation Video Sivamurthy Hiremath#blueteam#security-strategy#threat-modeling+1
2012-09-05Talk44 Con Why Integrity is left alone and not given TLC (Tender, Love and Care) it deserves? Video Jitender Arora#data-protection#security-strategy#threat-modeling+3
2012-08-03TalkC0c0n Building Security Incident Detection & Handling Capabilities in Enterprises Sunil Varkey#blueteam#incident-detection#security-strategy+4
2012-08-03TalkC0c0n Contemporary Transcription and Resource Parasitism Arpit Patel#exploitation#firewall#network-monitoring+1
2012-08-03TalkC0c0n Enterprise server security Raghav Shandilya#blueteam#security-tools#network-monitoring+2
2012-08-03TalkC0c0n The Management of Information Security – A Corporate Practitioner’s Perspective Pawan Kumar Singh#cyber-law#security-strategy#data-protection+2
2012-03-16TalkBlackhat IVR Security- Internal Network Attack via Phone Lines Presentation Source Code Video Rahul Sasi#red-teaming#ivrs#network-pentesting+3
2012-02-15TalkNullcon Cyberspace: Global commons or a national asset Kamlesh Bajaj#cyber-law#cybersecurity-framework#incident-management+1
2012-02-15TalkNullcon Shall we dust Beep? The Geo-strategic realities of Cyberwar Presentation Pukhraj Singh#cyber-war#security-strategy#attack-surface
2011-10-08TalkC0c0n Stratagemizing Security Against Perpetrators In Cloud Infrastructure K S Abhiraj#blueteam#cloud-security-posture-management#cloud-pentesting+4
2011-09-19TalkHacklu The travelling hacksmith Saumil Shah#red-teaming#ethical-hacking#exploit-delivery+2
2011-02-25TalkNullcon Enterprise Paradigm for Controlling Data Leakage Presentation Deepak Rout#data-leak#blueteam#data-loss-prevention+3
2011-02-25TalkNullcon Hacking the Parliament – A classic Social Engineering attack Anurag Dhanda#social-engineering#reconnaissance#security-strategy+2
2011-02-25TalkNullcon Protect infrastructure or protect information – Lessons from Wikileaks Presentation Vishal Gupta#data-leak#blueteam#data-protection+2
2010-10-29TalkT2 Hacking Femtocells Ravishankar Borgaonkar#reverse-engineering#device-security#hardware-embedded+3
2010-04-21TalkHitb Sec Conf Web Security – Going Nowhere? Presentation Saumil Shah#red-teaming#application-hardening#application-pentesting+4
2010-02-25TalkNullcon Quantum Computing Challenges in the field of security Whitepaper Navin Pai#quantum-computing#security-strategy#threat-modeling+3
2009-11-18TalkSecuritybyte Risk based Penetration Testing Presentation K K Mookhey#security-assessment#risk-management#ethical-hacking+3
2009-11-17TalkSecuritybyte Threat Modeling Presentation Varun Sharma#threat-modeling#blueteam#security-strategy+4
2009-10-28TalkHacklu Ownage 2.0 Saumil Shah#red-teaming#ethical-hacking#exploit-delivery+2
2009-08-06TalkC0c0n Know Your Enemy, and Yourself: Demystifying Threat Modelin Meera Subbarao#blueteam#security-strategy#threat-modeling+4
2009-08-06TalkC0c0n Management & Security of Large Scale Storage Devices Prashant Dinde#blueteam#data-protection#security-strategy+2
2009-08-06TalkC0c0n Microsoft Security Strategies Binoy VC#blueteam#security-strategy#azure+4
2008-12-06TalkClubhack Immune IT: Moving from Security to Immunity Presentation Ajit Hatti#blueteam#security-strategy#security-monitoring+4
2008-08-07TalkBlackhat Got Citrix, Hack It! Presentation Video Shanit Gupta#red-teaming#rdp#application-pentesting+1
2008-03-26TalkCan Sec West Vulnerabilities Die Hard Kowsik Guruswamy#red-teaming#ethical-hacking#exploit-delivery+2
2007-04-18TalkCan Sec West Low-Rate Denial-of-Service attacks Anil Kumar#red-teaming#dos#network-defense+2
2005-07-28TalkBlackhat Rapid Threat Modeling Presentation Video Akshay Aggarwal#threat-modeling#red-teaming#security-strategy+4