🧪 Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Security Training

Focus Area: 📚 Security Awareness
122
Total Entries
145
Contributors

Top Contributors

Sunil Varkey(5) Rahul Sasi(4) Vandana Verma Sehgal(4) Anup Narayanan(3) Aseem Jakhar(3)

All Entries (122 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-08-07Tool demoBlackhat Q-TIP (QR Code Threat Inspection Platform) Rushikesh D Nandedkar#incident-management#web-security#architecture+1
2025-08-06PanelBlackhat Hacking the Status Quo: Tales From Leading Women in Cybersecurity Vandana Verma Sehgal#security-training#cybersecurity-education#security-strategy
2025-04-03Tool demoBlackhat CompartIoT Source Code Sreesankar S, Aditya Krishna Vinod, Season Cherian#microcontrollers#hardware-embedded#firmware-analysis+2
2024-11-16TalkC0c0n The subtle art of checkmating CISOs Sunil Varkey#risk-management#architecture#security-governance+2
2024-11-15TalkC0c0n CISO’s take on BYOAI Venugopal Parameswara#risk-management#security-governance#security-compliance+3
2024-08-09TalkDefcon Reflections on a Decade in Bug Bounties: Experiences and Major Takeaways Video Nikhil Shrivastava#bug-hunting#bug-bounty#security-training+3
2023-09-28TalkHackinparis How to have visibility and security OF CICD ecosystem Pramod Rana#cicd-security#devsecops#architecture+4
2023-08-10TalkBlackhat Does Public Disclosure of Vulnerabilities Affect Hacker Participation in Bug Bounty Programs? Presentation Amit Deokar#bug-hunting#incident-management#security-strategy+4
2023-08-09TalkBlackhat Diversity Microtalks: Perspectives on Creating Change Presentation Aastha Sahni#security-training#risk-management#security-governance
2023-08-07TalkC0c0n Citizen Mobile Security: Responsibilities, Accountability, and Impacts Satyendra Verma#security-training#risk-management#compliance-governance
2023-08-07TalkC0c0n ESOC Trinetra Project Pankaj Kumar Dalela#security-governance#risk-management#security-training
2023-08-07PanelC0c0n Evolving Threat Landscape: Strategies for Adapting and Innovating in Cybersecurity Vikas Arora, Sanjay Singh, Baidyanath Kumar, Saurabh Gugnani, Gokulavan Jayaraman, Vijay Nair#security-strategy#threat-modeling#security-training+3
2023-08-07PanelC0c0n Frictionless Security…Experience Simplified. Video A Shiju Rawther, Maya R Nair, Suresh Sharma, Himanshu Das#security-training#human-factor#behavior-change+3
2023-08-07TalkC0c0n Generative AI and Cyber Crimes Video Brijesh Singh#security-training#risk-management#threat-hunting
2023-08-06TalkC0c0n AI in Cyber Security and Crime Prevention Vishal Salvi#ai#ai-security#deep-learning+3
2023-08-06TalkC0c0n Developments in Deep Fake detection Tapas Saini#architecture#security-training#reverse-engineering
2023-08-06TalkC0c0n Insider Threats - Best Practices and Common Pitfalls Video Georgie Kurien#insider-threats#risk-management#security-training+1
2023-05-12TalkBlackhat Engaging the Next Generation of Cybersecurity Professionals: The Power of Security Zines Video Rohit Sehgal#digital-learning#security-training#cybersecurity-education+1
2023-05-11Tool demoBlackhat KernelGoat Source Code Shivankar Madaan#kernel#secure-development#security-training
2023-04-21TalkHitb Sec Conf LOCKNOTE:THE HAND THAT STRIKES, ALSO BLOCKS Presentation Video Saumil Shah#architecture#risk-management#security-training+1
2023-03-09PanelNullcon Elements of a Successful Security Strategy: A Comprehensive Approach Video Sheetal Joseph#security-strategy#security-testing#secure-development+4
2022-12-08Tool demoBlackhat Industrial Control Systems: Capture the Train! Dhruv Sharan#ctf#ics-security#plc-security+3
2022-09-24TalkC0c0n BEC, still the sure shot trap Georgie Kurien#social-engineering#security-assessment#security-training
2022-09-24TalkC0c0n Building Smart, Resilient and Sustainable Cyber Eco System Navin Kumar Singh#risk-management#cybersecurity-strategy#architecture+4
2022-09-24TalkC0c0n OSINT Tools and Techniques Brijesh Singh#threat-hunting#intelligence-sharing#security-training
2022-09-24TalkC0c0n Power of Narratives in Cyber Security Sunil Varkey#security-training#cybersecurity-education#human-factor+2
2022-09-24PanelC0c0n Ransom Trends in India Pardhasaradhi Ch, Srikanta Prasad, Jacxine Fernandez, Diwakar Sheoran#ransomware#data-loss-prevention#incident-management+2
2022-09-24TalkC0c0n Weaponising Social Media for Psychological Operations A a Gafoor#social-engineering#security-training#threat-hunting+1
2022-09-23TalkC0c0n Ransomware: Prevention, Early Detection and Response Babitha Bp#ransomware#incident-management#malware-prevention+2
2022-09-06PanelNullcon Does your SOC sucks? Video Krishna Pandey, Shweta Kshirsagar, Vivek Gopalan, Yogi Kapur#security-training#incident-management#alert-fatigue+3
2022-08-25TalkHitb Sec Conf Building An Army Of Bots By Hijacking A Unicorn’s Twitter Handle Presentation Video Rahul Sasi, Vishal Singh#social-engineering#security-assessment#botnet+1
2022-08-13PanelDefcon Who doesn’t like a little Spice? Emulation Maturity, Team Culture and TTPs Niru Ragupathy#security-development-lifecycle#security-tools#incident-management+2
2022-08-11TalkThe Diana Initiative Connecting Dots Between Security Teams & Customer Expectations Shruthi Kamath#security-governance#risk-management#architecture+2
2022-08-11TalkThe Diana Initiative The Real Cost of Free: What you need to know before downloading a free app Ruchira Pokhriyal#app-security#data-protection#security-training+1
2022-07-23TalkMay Contain Hackers How would a real life social media be like? Aditi Bhatnagar#data-protection#security-training#risk-management+3
2022-05-18PanelPhdays Challenges for cybersecurity conferences. Part II Aseem Jakhar#security-training#cybersecurity-strategy#threat-modeling+3
2021-11-13TalkC0c0n Case study - E-crime group targeting mobile users Rahul Sasi#incident-management#mobile-hacking#phishing+4
2021-11-13TalkC0c0n Connecting the dots between customers and security teams Shruthi Kamath#incident-management#security-training#devsecops+1
2021-11-13TalkC0c0n Crisis Capitalization in a Pandemic Greeshma M R#risk-management#incident-management#security-training+2
2021-11-13TalkC0c0n Cybersecurity in the era of Resilience - A walk through people, process and technology Babitha B P#risk-management#cyber-resilience#architecture+3
2021-11-13PanelC0c0n Human errors & system misconfigurations- We can handle it! Amit Dubey, Maninder Singh, Tulika Pandey#human-factor#security-training#phishing+1
2021-11-13TalkC0c0n Post pandemic Transformation - A CISO’s perspective Sridhar Govardhan#risk-management#security-governance#security-compliance+3
2021-11-12TalkC0c0n “Let’s Go Phishing”: Discerning the insidious nature of Social Engineering Ruchira Pokhriyal, Shashi Karhail#social-engineering#security-assessment#security-training
2021-11-12PanelC0c0n Diversity and Inclusion Aarushi Koolwal, Hussaina Begum, Nehal Mehta, Shivani Sharma#security-training#behavior-change#cybersecurity-education+3
2021-11-12TalkC0c0n Executive Presence….a cardinal of the cyber rostrum Bishakha Jain#security-training#architecture#security-governance
2021-11-12TalkC0c0n Regulating Social Media Platforms : Should it be done in Democratic Societies ? J Sam Daniel Stalin, Apar Gupta, Dinesh O Bareja, Prashant Mali, Jiten Jain#security-compliance#security-governance#risk-management+3
2021-11-12TalkC0c0n The evolving nature of cyber community Aastha Sahni#security-training#risk-management#cybersecurity-education
2021-11-12TalkC0c0n Understanding the Psychology Behind Threats - adding Twists to your Turns Saman Fatima#threat-modeling#security-training#human-factor+1
2021-08-08PanelDefcon Resilient cyber space: The role of hacker and security communities Video Manu Zacharia, Aseem Jakhar, Abhijith B R#security-training#threat-modeling#incident-management+3
2021-08-06TalkDefcon Adversary village Kick-off Video Abhijith B R#red-teaming#ethical-hacking#vulnerability-assessment+2
2020-11-21TalkApp Sec Indonesia The caveats of the unseen: Crouching exposure, Hidden Misconfiguration Ashwin Vamshi#architecture#devsecops#risk-management+1
2020-10-09TalkShell Con How I Created My Clone Using AI - Next-Gen Social Engineering Video Tamaghna Basu#ai#social-engineering#ai-security+4
2020-10-02Tool demoBlackhat Phishing Simulation Assessment Source Code Jyoti Raval#phishing#blueteam#social-engineering+3
2020-10-01TalkBlackhat Making an Impact from India to the Rest of the World by Building and Nurturing Women Infosec Community Presentation Video Vandana Verma Sehgal#security-training#cybersecurity-education
2020-09-18TalkC0c0n Herd Immunity, in the Cyber World Sunil Varkey#security-training#risk-management#architecture
2020-09-18TalkC0c0n Cyber Security Shifts During COVID-19 Video Sunil Kanchi#risk-management#security-training#compliance-governance+1
2020-08-07PanelDefcon D0 N0 H4RM: A Healthcare Security Conversation Video Vidha Murthy#data-protection#identity-management#security-training+3
2020-08-06Tool demoBlackhat Dynamic Labs: Windows & Active Directory Exploitation Source Code Rohan Durve#windows#active-directory#security-training
2020-08-06TalkBlackhat Making an Impact from India to the Rest of the World by Building and Nurturing Women Infosec Community Presentation Video Vandana Verma Sehgal#security-training#cybersecurity-strategy
2020-03-06PanelNullcon Complication in security practices Video Himanshu Das, Neelu Tripathy, Kushal Das, Ankur Bhargava, Vaibhav Gupta#security-training#human-factor#behavior-change+3
2020-03-06Tool demoNullcon Phishing Simulation Source Code Jyoti Raval#phishing#blueteam#security-training+2
2020-03-06PanelNullcon Securing the Human Factor Video Rahul Neel Mani, Phoram Mehta, Burgess Cooper, Manish Tiwari, Venkatesh Subramaniam#human-factor#security-training#social-engineering+3
2019-09-27TalkC0c0n A Day in the Life of a CISO Sridhar Govardhan#security-compliance#security-governance#risk-management+2
2019-09-27TalkC0c0n Demystifying HealthCare Security Ajay Pratap Singh#blueteam#data-protection#identity-theft+4
2019-09-27TalkC0c0n Practical Approach to Cyber Security for financial institutions Georgie Kurien#financial-institutions#secure-development#risk-management+2
2019-09-27PanelC0c0n Shouldn’t Organization disclose breaches - The need for a shared platform Video Sunil Varkey, Jacxine Fernandez, Rahul Sasi, K K Chaudhary#data-leak#data-protection#security-testing+4
2019-09-13Talk44 Con One Person Army – Playbook on how to be the first Security Engineer at a company Video Kashish Mittal#devsecops#application-hardening#secure-development+4
2019-09-12KeynoteGlobal App Sec Making a Change, One at a time - Diversity: More than just Gender Vandana Verma Sehgal#security-training#human-factor
2019-08-08TalkDefcon Phishing in the cloud era Presentation Ashwin Vamshi, Abhinav Singh#phishing#api-security#web-security+2
2019-05-21TalkPhdays How to fail in hardware hacking Presentation Arun Magesh#red-teaming#embedded-systems#firmware-analysis+1
2019-03-01PanelNullcon Breached? – Here is how I responded! Video Muslim Koser, Mrudul Uchil, Sachin Burman, Venkata Satish Guttula, Vijay K Verma#incident-management#digital-forensics#forensics+1
2019-02-28TalkNullcon Dirty use of USSD Codes Ravishankar Borgaonkar#ussd#red-teaming#social-engineering+3
2018-10-05TalkC0c0n How can we use machine learning to prevent Frauds and password breaches Tamaghna Basu#machine-learning#blueteam#ai-security+4
2018-10-05TalkC0c0n Privacy And Data Protection: Stakeholders’ Perspectives Rahul Sharma#blueteam#data-protection#gdpr+4
2018-10-05TalkC0c0n Resiliency Focus alongside Digital Disruption Lince Lawrence#architecture#risk-management#security-training+2
2018-10-05TalkC0c0n Taking cyber security to the board room Amit Pradhan#risk-management#security-compliance#security-governance+2
2018-03-02PanelNullcon Should all ciso promote hall of fame” within their organizations Video Shomiron Das Gupta, Hariprasad Chede, Keyur Desai, Subramanian Kumaraswamy#security-training#behavior-change#zero-day+1
2018-03-02PanelNullcon Should all ciso promote hall of fame” within their organizations Video Burgess Cooper, Durga Dube#security-training#cybersecurity-strategy#bug-bounty+1
2017-08-18TalkC0c0n Phishing threats to customers and mitigation Bhavin Bhansali#phishing#anti-phishing#social-engineering+2
2017-08-18TalkC0c0n Call Centre Frauds Parry Aftab#social-engineering#security-training#risk-management+1
2017-08-18TalkC0c0n Challenges in Digital Banking Biju K#security-training#security-governance#risk-management
2017-08-18TalkC0c0n Moving from Cybersecurity Awareness to Cybersecurity Competence Anup Narayanan#cybersecurity-education#cybersecurity-training#security-training+3
2017-08-18TalkC0c0n OSINT and Privacy Rohit Srivastwa#osint#data-leak#surveillance+4
2017-07-26TalkBlackhat Wire Me Through Machine Learning Presentation Video Ankit Singh, Vijay Thaware#machine-learning#red-teaming#ai-security+3
2016-10-19TalkHacklu 2016: The Infosec Crossroads Presentation Saumil Shah#philosophy#security-strategy#incident-management+3
2016-09-14Talk44 Con 2016: The Infosec Crossroads Presentation Video Saumil Shah#blueteam#security-strategy#threat-modeling+4
2016-08-19TalkC0c0n Evading Corporate Security – You’re as secure as the weakest link Prajwal Panchmahalkar#red-teaming#employee-education#social-engineering+3
2016-08-19TalkC0c0n The Art of Social Hacking Gaurav Trivedi, Rugved Mehta#reconnaissance#social-engineering#phishing+4
2015-09-24TalkApp Sec Usa Encouraging Diversity and Advancing Cybersecurity Education Shruthi Kamath#cybersecurity-education#security-training#risk-management+1
2015-08-01TalkC0c0n S3curi7y at 36K feet Rugved Mehta, Gaurav Trivedi#aws#azure#gcp+3
2015-02-07PanelNullcon Startup panel – Make in India Aseem Jakhar, Radha Shelat, Sumit D Chowdhury, Shomiron Das Gupta, Sastry Tumuluri, Shiju Sathyadevan#security-strategy#cybersecurity-framework#business-resilience+4
2015-02-06PanelNullcon Why CISO should promote more of such technical events - pros and cons, benefits etc Burgess Cooper, Maya Viswanathan, Sanjay Burman, Sridharan Sankaran#security-training#cybersecurity-strategy#security-management
2014-09-16TalkDeepsec Advanced Powershell Threat – Lethal Client Side Attacks Presentation Video Nikhil Mittal#powershell#red-teaming#endpoint-protection+4
2014-08-22TalkC0c0n APT: Case Study of attackers targeting public tendering Rahul Sasi#red-teaming#apt#attack-surface+4
2013-11-07TalkGround Zero Summit Setting the Data Center on fire Ajit Hatti#red-teaming#incident-management#security-training+1
2013-09-27TalkC0c0n Disclosing Vulnerabilities: The Bug Bounty Style Nikhil Prabhakar#red-teaming#bug-bounty#ethical-hacking+3
2013-09-27TalkC0c0n Hello CISO! How to make end-users LIKE and FOLLOW “Brand Infosec”? Anup Narayanan#security-training#cybersecurity-education#security-governance+3
2013-08-15TalkUsenix Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness Presentation Whitepaper Devdatta Akhawe#web-security#security-training#architecture+2
2013-03-01TalkNullcon Bug Bounty Hunter’s confession Presentation Amol Naik#bug-hunting#security-training#ethical-hacking+3
2012-12-01TalkClubhack The difference between the “Reality” and “Feeling” of Security: Information Security and the Human Being Presentation Video Thomas Kurian Ambattu#security-training#human-factor#risk-management+2
2012-09-26TalkNullcon Nullcon_delhi_2012 Presentation Source Code Prasanna Kanagasabai#ethical-hacking#social-engineering#security-training+1
2012-08-03TalkC0c0n A model to reduce information security risks due to human error Presentation Anup Narayanan#security-training#behavior-change#risk-management
2012-08-03TalkC0c0n Building Security Incident Detection & Handling Capabilities in Enterprises Sunil Varkey#blueteam#incident-detection#security-strategy+4
2012-08-03TalkC0c0n Layer 8 Exploitation: A threat to National Security Aakash Goel#social-engineering#security-assessment#security-training+1
2012-08-03TalkC0c0n The Weakest Link - Reinforcing the Human Element Sandeep Godbole#security-training#human-factor#cybersecurity-education+3
2011-12-04TalkClubhack Exploit the Exploit Kits Presentation Dhruv Soi#red-teaming#exploit-kit#malware-distribution+4
2011-11-17TalkDeepsec Behavioral Security: 10 steps forward 5 steps backward Video Sourabh Satish#security-training#behavioral-change#risk-management+2
2011-09-07TalkSecuritybyte Social Web & Privacy – An evolving world Bala Sathiamurthy, Aridaman Tripathi#data-protection#api-security#security-compliance+2
2011-09-06TalkSecuritybyte Security Threats on Social Networks Presentation Nithya Raman#social-engineering#web-security#security-training+1
2011-03-15TalkNullcon Information Warfare Ñ The Indian Perspective Alok Vijayant#cybersecurity-strategy#risk-management#security-training+1
2010-11-25TalkDeepsec Developers are from Mars, Compliance Auditors are from Venus Video Neelay S Shah#security-compliance#security-governance#risk-management+4
2010-08-01TalkC0c0n Hackers’ EcoSystem in India Rohit Srivastwa#security-assessment#security-training#risk-management
2010-02-25TalkNullcon Malware Detection Tool for Websites: A Proof-Of-Concept Presentation Anant Kochhar#blueteam#malware-detection#application-pentesting+3
2009-11-17TalkSecuritybyte Threat Modeling Presentation Varun Sharma#threat-modeling#blueteam#security-strategy+4
2009-11-17TalkSecuritybyte Usability and Privacy in Security Presentation Ponnurangam Kumaraguru#data-protection#architecture#security-training+2
2009-08-06TalkC0c0n Cyber Victimisation K Jaishankar#cybersecurity-education#security-training#risk-management+1
2009-08-06TalkC0c0n Information Warfare A a Gafoor, Vinayak Mishra#threat-hunting#threat-modeling#security-training+2
2009-08-06TalkC0c0n Know Your Enemy, and Yourself: Demystifying Threat Modelin Meera Subbarao#blueteam#security-strategy#threat-modeling+4
2008-12-06TalkClubhack Immune IT: Moving from Security to Immunity Presentation Ajit Hatti#blueteam#security-strategy#security-monitoring+4
2008-08-06TalkBlackhat Bad Sushi: Beating Phishers at Their Own Game Presentation Video Nitesh Dhanjani#phishing#blueteam#network-forensics+2
2007-08-02TalkBlackhat The Evolution Of Phishing To Organized Crime Video Rohyt Belani#social-engineering#phishing#threat-modeling+2
2005-09-29TalkHitb Sec Conf Trends in Real World Attacks: A Compilation of Case Studies Video Rohyt Belani#red-teaming#application-pentesting#application-hardening+4