| 2025-08-07 | Tool demo | Blackhat |
Q-TIP (QR Code Threat Inspection Platform)
| Rushikesh D Nandedkar | #incident-management#web-security#architecture+1 |
| 2025-08-06 | Panel | Blackhat |
Hacking the Status Quo: Tales From Leading Women in Cybersecurity
| Vandana Verma Sehgal | #security-training#cybersecurity-education#security-strategy |
| 2025-04-03 | Tool demo | Blackhat |
CompartIoT
| Sreesankar S, Aditya Krishna Vinod, Season Cherian | #microcontrollers#hardware-embedded#firmware-analysis+2 |
| 2024-11-16 | Talk | C0c0n |
The subtle art of checkmating CISOs
| Sunil Varkey | #risk-management#architecture#security-governance+2 |
| 2024-11-15 | Talk | C0c0n |
CISO’s take on BYOAI
| Venugopal Parameswara | #risk-management#security-governance#security-compliance+3 |
| 2024-08-09 | Talk | Defcon |
Reflections on a Decade in Bug Bounties: Experiences and Major Takeaways
| Nikhil Shrivastava | #bug-hunting#bug-bounty#security-training+3 |
| 2023-09-28 | Talk | Hackinparis |
How to have visibility and security OF CICD ecosystem
| Pramod Rana | #cicd-security#devsecops#architecture+4 |
| 2023-08-10 | Talk | Blackhat |
Does Public Disclosure of Vulnerabilities Affect Hacker Participation in Bug Bounty Programs?
| Amit Deokar | #bug-hunting#incident-management#security-strategy+4 |
| 2023-08-09 | Talk | Blackhat |
Diversity Microtalks: Perspectives on Creating Change
| Aastha Sahni | #security-training#risk-management#security-governance |
| 2023-08-07 | Talk | C0c0n |
Citizen Mobile Security: Responsibilities, Accountability, and Impacts
| Satyendra Verma | #security-training#risk-management#compliance-governance |
| 2023-08-07 | Talk | C0c0n |
ESOC Trinetra Project
| Pankaj Kumar Dalela | #security-governance#risk-management#security-training |
| 2023-08-07 | Panel | C0c0n |
Evolving Threat Landscape: Strategies for Adapting and Innovating in Cybersecurity
| Vikas Arora, Sanjay Singh, Baidyanath Kumar, Saurabh Gugnani, Gokulavan Jayaraman, Vijay Nair | #security-strategy#threat-modeling#security-training+3 |
| 2023-08-07 | Panel | C0c0n |
Frictionless Security…Experience Simplified.
| A Shiju Rawther, Maya R Nair, Suresh Sharma, Himanshu Das | #security-training#human-factor#behavior-change+3 |
| 2023-08-07 | Talk | C0c0n |
Generative AI and Cyber Crimes
| Brijesh Singh | #security-training#risk-management#threat-hunting |
| 2023-08-06 | Talk | C0c0n |
AI in Cyber Security and Crime Prevention
| Vishal Salvi | #ai#ai-security#deep-learning+3 |
| 2023-08-06 | Talk | C0c0n |
Developments in Deep Fake detection
| Tapas Saini | #architecture#security-training#reverse-engineering |
| 2023-08-06 | Talk | C0c0n |
Insider Threats - Best Practices and Common Pitfalls
| Georgie Kurien | #insider-threats#risk-management#security-training+1 |
| 2023-05-12 | Talk | Blackhat |
Engaging the Next Generation of Cybersecurity Professionals: The Power of Security Zines
| Rohit Sehgal | #digital-learning#security-training#cybersecurity-education+1 |
| 2023-05-11 | Tool demo | Blackhat |
KernelGoat
| Shivankar Madaan | #kernel#secure-development#security-training |
| 2023-04-21 | Talk | Hitb Sec Conf |
LOCKNOTE:THE HAND THAT STRIKES, ALSO BLOCKS
| Saumil Shah | #architecture#risk-management#security-training+1 |
| 2023-03-09 | Panel | Nullcon |
Elements of a Successful Security Strategy: A Comprehensive Approach
| Sheetal Joseph | #security-strategy#security-testing#secure-development+4 |
| 2022-12-08 | Tool demo | Blackhat |
Industrial Control Systems: Capture the Train!
| Dhruv Sharan | #ctf#ics-security#plc-security+3 |
| 2022-09-24 | Talk | C0c0n |
BEC, still the sure shot trap
| Georgie Kurien | #social-engineering#security-assessment#security-training |
| 2022-09-24 | Talk | C0c0n |
Building Smart, Resilient and Sustainable Cyber Eco System
| Navin Kumar Singh | #risk-management#cybersecurity-strategy#architecture+4 |
| 2022-09-24 | Talk | C0c0n |
OSINT Tools and Techniques
| Brijesh Singh | #threat-hunting#intelligence-sharing#security-training |
| 2022-09-24 | Talk | C0c0n |
Power of Narratives in Cyber Security
| Sunil Varkey | #security-training#cybersecurity-education#human-factor+2 |
| 2022-09-24 | Panel | C0c0n |
Ransom Trends in India
| Pardhasaradhi Ch, Srikanta Prasad, Jacxine Fernandez, Diwakar Sheoran | #ransomware#data-loss-prevention#incident-management+2 |
| 2022-09-24 | Talk | C0c0n |
Weaponising Social Media for Psychological Operations
| A a Gafoor | #social-engineering#security-training#threat-hunting+1 |
| 2022-09-23 | Talk | C0c0n |
Ransomware: Prevention, Early Detection and Response
| Babitha Bp | #ransomware#incident-management#malware-prevention+2 |
| 2022-09-06 | Panel | Nullcon |
Does your SOC sucks?
| Krishna Pandey, Shweta Kshirsagar, Vivek Gopalan, Yogi Kapur | #security-training#incident-management#alert-fatigue+3 |
| 2022-08-25 | Talk | Hitb Sec Conf |
Building An Army Of Bots By Hijacking A Unicorn’s Twitter Handle
| Rahul Sasi, Vishal Singh | #social-engineering#security-assessment#botnet+1 |
| 2022-08-13 | Panel | Defcon |
Who doesn’t like a little Spice? Emulation Maturity, Team Culture and TTPs
| Niru Ragupathy | #security-development-lifecycle#security-tools#incident-management+2 |
| 2022-08-11 | Talk | The Diana Initiative |
Connecting Dots Between Security Teams & Customer Expectations
| Shruthi Kamath | #security-governance#risk-management#architecture+2 |
| 2022-08-11 | Talk | The Diana Initiative |
The Real Cost of Free: What you need to know before downloading a free app
| Ruchira Pokhriyal | #app-security#data-protection#security-training+1 |
| 2022-07-23 | Talk | May Contain Hackers |
How would a real life social media be like?
| Aditi Bhatnagar | #data-protection#security-training#risk-management+3 |
| 2022-05-18 | Panel | Phdays |
Challenges for cybersecurity conferences. Part II
| Aseem Jakhar | #security-training#cybersecurity-strategy#threat-modeling+3 |
| 2021-11-13 | Talk | C0c0n |
Case study - E-crime group targeting mobile users
| Rahul Sasi | #incident-management#mobile-hacking#phishing+4 |
| 2021-11-13 | Talk | C0c0n |
Connecting the dots between customers and security teams
| Shruthi Kamath | #incident-management#security-training#devsecops+1 |
| 2021-11-13 | Talk | C0c0n |
Crisis Capitalization in a Pandemic
| Greeshma M R | #risk-management#incident-management#security-training+2 |
| 2021-11-13 | Talk | C0c0n |
Cybersecurity in the era of Resilience - A walk through people, process and technology
| Babitha B P | #risk-management#cyber-resilience#architecture+3 |
| 2021-11-13 | Panel | C0c0n |
Human errors & system misconfigurations- We can handle it!
| Amit Dubey, Maninder Singh, Tulika Pandey | #human-factor#security-training#phishing+1 |
| 2021-11-13 | Talk | C0c0n |
Post pandemic Transformation - A CISO’s perspective
| Sridhar Govardhan | #risk-management#security-governance#security-compliance+3 |
| 2021-11-12 | Talk | C0c0n |
“Let’s Go Phishing”: Discerning the insidious nature of Social Engineering
| Ruchira Pokhriyal, Shashi Karhail | #social-engineering#security-assessment#security-training |
| 2021-11-12 | Panel | C0c0n |
Diversity and Inclusion
| Aarushi Koolwal, Hussaina Begum, Nehal Mehta, Shivani Sharma | #security-training#behavior-change#cybersecurity-education+3 |
| 2021-11-12 | Talk | C0c0n |
Executive Presence….a cardinal of the cyber rostrum
| Bishakha Jain | #security-training#architecture#security-governance |
| 2021-11-12 | Talk | C0c0n |
Regulating Social Media Platforms : Should it be done in Democratic Societies ?
| J Sam Daniel Stalin, Apar Gupta, Dinesh O Bareja, Prashant Mali, Jiten Jain | #security-compliance#security-governance#risk-management+3 |
| 2021-11-12 | Talk | C0c0n |
The evolving nature of cyber community
| Aastha Sahni | #security-training#risk-management#cybersecurity-education |
| 2021-11-12 | Talk | C0c0n |
Understanding the Psychology Behind Threats - adding Twists to your Turns
| Saman Fatima | #threat-modeling#security-training#human-factor+1 |
| 2021-08-08 | Panel | Defcon |
Resilient cyber space: The role of hacker and security communities
| Manu Zacharia, Aseem Jakhar, Abhijith B R | #security-training#threat-modeling#incident-management+3 |
| 2021-08-06 | Talk | Defcon |
Adversary village Kick-off
| Abhijith B R | #red-teaming#ethical-hacking#vulnerability-assessment+2 |
| 2020-11-21 | Talk | App Sec Indonesia |
The caveats of the unseen: Crouching exposure, Hidden Misconfiguration
| Ashwin Vamshi | #architecture#devsecops#risk-management+1 |
| 2020-10-09 | Talk | Shell Con |
How I Created My Clone Using AI - Next-Gen Social Engineering
| Tamaghna Basu | #ai#social-engineering#ai-security+4 |
| 2020-10-02 | Tool demo | Blackhat |
Phishing Simulation Assessment
| Jyoti Raval | #phishing#blueteam#social-engineering+3 |
| 2020-10-01 | Talk | Blackhat |
Making an Impact from India to the Rest of the World by Building and Nurturing Women Infosec Community
| Vandana Verma Sehgal | #security-training#cybersecurity-education |
| 2020-09-18 | Talk | C0c0n |
Herd Immunity, in the Cyber World
| Sunil Varkey | #security-training#risk-management#architecture |
| 2020-09-18 | Talk | C0c0n |
Cyber Security Shifts During COVID-19
| Sunil Kanchi | #risk-management#security-training#compliance-governance+1 |
| 2020-08-07 | Panel | Defcon |
D0 N0 H4RM: A Healthcare Security Conversation
| Vidha Murthy | #data-protection#identity-management#security-training+3 |
| 2020-08-06 | Tool demo | Blackhat |
Dynamic Labs: Windows & Active Directory Exploitation
| Rohan Durve | #windows#active-directory#security-training |
| 2020-08-06 | Talk | Blackhat |
Making an Impact from India to the Rest of the World by Building and Nurturing Women Infosec Community
| Vandana Verma Sehgal | #security-training#cybersecurity-strategy |
| 2020-03-06 | Panel | Nullcon |
Complication in security practices
| Himanshu Das, Neelu Tripathy, Kushal Das, Ankur Bhargava, Vaibhav Gupta | #security-training#human-factor#behavior-change+3 |
| 2020-03-06 | Tool demo | Nullcon |
Phishing Simulation
| Jyoti Raval | #phishing#blueteam#security-training+2 |
| 2020-03-06 | Panel | Nullcon |
Securing the Human Factor
| Rahul Neel Mani, Phoram Mehta, Burgess Cooper, Manish Tiwari, Venkatesh Subramaniam | #human-factor#security-training#social-engineering+3 |
| 2019-09-27 | Talk | C0c0n |
A Day in the Life of a CISO
| Sridhar Govardhan | #security-compliance#security-governance#risk-management+2 |
| 2019-09-27 | Talk | C0c0n |
Demystifying HealthCare Security
| Ajay Pratap Singh | #blueteam#data-protection#identity-theft+4 |
| 2019-09-27 | Talk | C0c0n |
Practical Approach to Cyber Security for financial institutions
| Georgie Kurien | #financial-institutions#secure-development#risk-management+2 |
| 2019-09-27 | Panel | C0c0n |
Shouldn’t Organization disclose breaches - The need for a shared platform
| Sunil Varkey, Jacxine Fernandez, Rahul Sasi, K K Chaudhary | #data-leak#data-protection#security-testing+4 |
| 2019-09-13 | Talk | 44 Con |
One Person Army – Playbook on how to be the first Security Engineer at a company
| Kashish Mittal | #devsecops#application-hardening#secure-development+4 |
| 2019-09-12 | Keynote | Global App Sec |
Making a Change, One at a time - Diversity: More than just Gender
| Vandana Verma Sehgal | #security-training#human-factor |
| 2019-08-08 | Talk | Defcon |
Phishing in the cloud era
| Ashwin Vamshi, Abhinav Singh | #phishing#api-security#web-security+2 |
| 2019-05-21 | Talk | Phdays |
How to fail in hardware hacking
| Arun Magesh | #red-teaming#embedded-systems#firmware-analysis+1 |
| 2019-03-01 | Panel | Nullcon |
Breached? – Here is how I responded!
| Muslim Koser, Mrudul Uchil, Sachin Burman, Venkata Satish Guttula, Vijay K Verma | #incident-management#digital-forensics#forensics+1 |
| 2019-02-28 | Talk | Nullcon |
Dirty use of USSD Codes
| Ravishankar Borgaonkar | #ussd#red-teaming#social-engineering+3 |
| 2018-10-05 | Talk | C0c0n |
How can we use machine learning to prevent Frauds and password breaches
| Tamaghna Basu | #machine-learning#blueteam#ai-security+4 |
| 2018-10-05 | Talk | C0c0n |
Privacy And Data Protection: Stakeholders’ Perspectives
| Rahul Sharma | #blueteam#data-protection#gdpr+4 |
| 2018-10-05 | Talk | C0c0n |
Resiliency Focus alongside Digital Disruption
| Lince Lawrence | #architecture#risk-management#security-training+2 |
| 2018-10-05 | Talk | C0c0n |
Taking cyber security to the board room
| Amit Pradhan | #risk-management#security-compliance#security-governance+2 |
| 2018-03-02 | Panel | Nullcon |
Should all ciso promote hall of fame” within their organizations
| Shomiron Das Gupta, Hariprasad Chede, Keyur Desai, Subramanian Kumaraswamy | #security-training#behavior-change#zero-day+1 |
| 2018-03-02 | Panel | Nullcon |
Should all ciso promote hall of fame” within their organizations
| Burgess Cooper, Durga Dube | #security-training#cybersecurity-strategy#bug-bounty+1 |
| 2017-08-18 | Talk | C0c0n |
Phishing threats to customers and mitigation
| Bhavin Bhansali | #phishing#anti-phishing#social-engineering+2 |
| 2017-08-18 | Talk | C0c0n |
Call Centre Frauds
| Parry Aftab | #social-engineering#security-training#risk-management+1 |
| 2017-08-18 | Talk | C0c0n |
Challenges in Digital Banking
| Biju K | #security-training#security-governance#risk-management |
| 2017-08-18 | Talk | C0c0n |
Moving from Cybersecurity Awareness to Cybersecurity Competence
| Anup Narayanan | #cybersecurity-education#cybersecurity-training#security-training+3 |
| 2017-08-18 | Talk | C0c0n |
OSINT and Privacy
| Rohit Srivastwa | #osint#data-leak#surveillance+4 |
| 2017-07-26 | Talk | Blackhat |
Wire Me Through Machine Learning
| Ankit Singh, Vijay Thaware | #machine-learning#red-teaming#ai-security+3 |
| 2016-10-19 | Talk | Hacklu |
2016: The Infosec Crossroads
| Saumil Shah | #philosophy#security-strategy#incident-management+3 |
| 2016-09-14 | Talk | 44 Con |
2016: The Infosec Crossroads
| Saumil Shah | #blueteam#security-strategy#threat-modeling+4 |
| 2016-08-19 | Talk | C0c0n |
Evading Corporate Security – You’re as secure as the weakest link
| Prajwal Panchmahalkar | #red-teaming#employee-education#social-engineering+3 |
| 2016-08-19 | Talk | C0c0n |
The Art of Social Hacking
| Gaurav Trivedi, Rugved Mehta | #reconnaissance#social-engineering#phishing+4 |
| 2015-09-24 | Talk | App Sec Usa |
Encouraging Diversity and Advancing Cybersecurity Education
| Shruthi Kamath | #cybersecurity-education#security-training#risk-management+1 |
| 2015-08-01 | Talk | C0c0n |
S3curi7y at 36K feet
| Rugved Mehta, Gaurav Trivedi | #aws#azure#gcp+3 |
| 2015-02-07 | Panel | Nullcon |
Startup panel – Make in India
| Aseem Jakhar, Radha Shelat, Sumit D Chowdhury, Shomiron Das Gupta, Sastry Tumuluri, Shiju Sathyadevan | #security-strategy#cybersecurity-framework#business-resilience+4 |
| 2015-02-06 | Panel | Nullcon |
Why CISO should promote more of such technical events - pros and cons, benefits etc
| Burgess Cooper, Maya Viswanathan, Sanjay Burman, Sridharan Sankaran | #security-training#cybersecurity-strategy#security-management |
| 2014-09-16 | Talk | Deepsec |
Advanced Powershell Threat – Lethal Client Side Attacks
| Nikhil Mittal | #powershell#red-teaming#endpoint-protection+4 |
| 2014-08-22 | Talk | C0c0n |
APT: Case Study of attackers targeting public tendering
| Rahul Sasi | #red-teaming#apt#attack-surface+4 |
| 2013-11-07 | Talk | Ground Zero Summit |
Setting the Data Center on fire
| Ajit Hatti | #red-teaming#incident-management#security-training+1 |
| 2013-09-27 | Talk | C0c0n |
Disclosing Vulnerabilities: The Bug Bounty Style
| Nikhil Prabhakar | #red-teaming#bug-bounty#ethical-hacking+3 |
| 2013-09-27 | Talk | C0c0n |
Hello CISO! How to make end-users LIKE and FOLLOW “Brand Infosec”?
| Anup Narayanan | #security-training#cybersecurity-education#security-governance+3 |
| 2013-08-15 | Talk | Usenix |
Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness
| Devdatta Akhawe | #web-security#security-training#architecture+2 |
| 2013-03-01 | Talk | Nullcon |
Bug Bounty Hunter’s confession
| Amol Naik | #bug-hunting#security-training#ethical-hacking+3 |
| 2012-12-01 | Talk | Clubhack |
The difference between the “Reality” and “Feeling” of Security: Information Security and the Human Being
| Thomas Kurian Ambattu | #security-training#human-factor#risk-management+2 |
| 2012-09-26 | Talk | Nullcon |
Nullcon_delhi_2012
| Prasanna Kanagasabai | #ethical-hacking#social-engineering#security-training+1 |
| 2012-08-03 | Talk | C0c0n |
A model to reduce information security risks due to human error
| Anup Narayanan | #security-training#behavior-change#risk-management |
| 2012-08-03 | Talk | C0c0n |
Building Security Incident Detection & Handling Capabilities in Enterprises
| Sunil Varkey | #blueteam#incident-detection#security-strategy+4 |
| 2012-08-03 | Talk | C0c0n |
Layer 8 Exploitation: A threat to National Security
| Aakash Goel | #social-engineering#security-assessment#security-training+1 |
| 2012-08-03 | Talk | C0c0n |
The Weakest Link - Reinforcing the Human Element
| Sandeep Godbole | #security-training#human-factor#cybersecurity-education+3 |
| 2011-12-04 | Talk | Clubhack |
Exploit the Exploit Kits
| Dhruv Soi | #red-teaming#exploit-kit#malware-distribution+4 |
| 2011-11-17 | Talk | Deepsec |
Behavioral Security: 10 steps forward 5 steps backward
| Sourabh Satish | #security-training#behavioral-change#risk-management+2 |
| 2011-09-07 | Talk | Securitybyte |
Social Web & Privacy – An evolving world
| Bala Sathiamurthy, Aridaman Tripathi | #data-protection#api-security#security-compliance+2 |
| 2011-09-06 | Talk | Securitybyte |
Security Threats on Social Networks
| Nithya Raman | #social-engineering#web-security#security-training+1 |
| 2011-03-15 | Talk | Nullcon |
Information Warfare Ñ The Indian Perspective
| Alok Vijayant | #cybersecurity-strategy#risk-management#security-training+1 |
| 2010-11-25 | Talk | Deepsec |
Developers are from Mars, Compliance Auditors are from Venus
| Neelay S Shah | #security-compliance#security-governance#risk-management+4 |
| 2010-08-01 | Talk | C0c0n |
Hackers’ EcoSystem in India
| Rohit Srivastwa | #security-assessment#security-training#risk-management |
| 2010-02-25 | Talk | Nullcon |
Malware Detection Tool for Websites: A Proof-Of-Concept
| Anant Kochhar | #blueteam#malware-detection#application-pentesting+3 |
| 2009-11-17 | Talk | Securitybyte |
Threat Modeling
| Varun Sharma | #threat-modeling#blueteam#security-strategy+4 |
| 2009-11-17 | Talk | Securitybyte |
Usability and Privacy in Security
| Ponnurangam Kumaraguru | #data-protection#architecture#security-training+2 |
| 2009-08-06 | Talk | C0c0n |
Cyber Victimisation
| K Jaishankar | #cybersecurity-education#security-training#risk-management+1 |
| 2009-08-06 | Talk | C0c0n |
Information Warfare
| A a Gafoor, Vinayak Mishra | #threat-hunting#threat-modeling#security-training+2 |
| 2009-08-06 | Talk | C0c0n |
Know Your Enemy, and Yourself: Demystifying Threat Modelin
| Meera Subbarao | #blueteam#security-strategy#threat-modeling+4 |
| 2008-12-06 | Talk | Clubhack |
Immune IT: Moving from Security to Immunity
| Ajit Hatti | #blueteam#security-strategy#security-monitoring+4 |
| 2008-08-06 | Talk | Blackhat |
Bad Sushi: Beating Phishers at Their Own Game
| Nitesh Dhanjani | #phishing#blueteam#network-forensics+2 |
| 2007-08-02 | Talk | Blackhat |
The Evolution Of Phishing To Organized Crime
| Rohyt Belani | #social-engineering#phishing#threat-modeling+2 |
| 2005-09-29 | Talk | Hitb Sec Conf |
Trends in Real World Attacks: A Compilation of Case Studies
| Rohyt Belani | #red-teaming#application-pentesting#application-hardening+4 |