2021st
2021
-
Nov 25-
Hitbsecconf-
Tool demo-
vAPI: Vulnerable Adversely Programmed Interface-
-
Tushar Kulkarni -
Nov 19-
Hackfest-
Talk-
Hacking with Physics-
Hrishikesh Somchatwar
-
Nov 13-
C0c0n-
Talk-
Zero Trust & Micro-segmentation-
Suresh Menon
-
Nov 13-
C0c0n-
Talk-
Third Party Risk Management-
Mahesh Kalyanaraman
-
Nov 13-
C0c0n-
Talk-
Server-side javascript Injection-
-
Kavisha Sheth -
Nov 13-
C0c0n-
Talk-
Securing OT in O&G Industry-
George Eapen
-
Nov 13-
C0c0n-
Talk-
Post pandemic Transformation - A CISO’s perspective-
Sridhar Govardhan
-
Nov 13-
C0c0n(Adversary Village)-
Talk-
Painting Your Organizations with Shades of Red, Blue & Purple-
-
Hidayath Khan -
Nov 13-
C0c0n-
Talk-
New way of looking at the hidden mysteries in the code-
Vandana Verma Sehgal
-
Nov 13-
C0c0n-
Talk-
Need for Zero Trust in Banking-
Biju K
-
Nov 13-
C0c0n-
Talk-
Mature Your Threat Hunting Program-
Neha Dhyani
-
Nov 13-
C0c0n-
Talk-
Machine learning to detect Chia mining-
Varun Kohli
-
Nov 13-
C0c0n(Adversary Village)-
Talk-
Light Basin - Telecom roaming network attack case study-
-
Akib Sayyed -
Nov 13-
C0c0n-
Talk-
Introducing Free & Open Elastic Limitless XDR-
Ravindra Ramnani
-
Nov 13-
C0c0n-
Panel-
Human errors & system misconfigurations- We can handle it!-
Amit Dubey, Maninder Singh, Tulika Pandey, Tal Catran, Dunston Pereira, Angel Redoble
-
Nov 13-
C0c0n-
Talk-
Exploiting 2A(Authentication and Authorization) Vulnerabilities of Web Application-
Gayatri Nayak
-
Nov 13-
C0c0n-
Talk-
Enhancing An Multi-Factor Authentication (MFA) through Behavioural Biometrics-
Kiran Kumar Pg
-
Nov 13-
C0c0n-
Talk-
Emerging trends in cyber crimes : Investigation tools & techniques-
Triveni Singh
-
Nov 13-
C0c0n-
Talk-
Cybersecurity in the era of Resilience - A walk through people, process and technology-
Babitha B P
-
Nov 13-
C0c0n-
Talk-
Cyber Warfare & Securing Critical Infrastructures-
Faruk Kazi
-
Nov 13-
C0c0n-
Talk-
Crisis Capitalization in a Pandemic-
Greeshma M R
-
Nov 13-
C0c0n-
Talk-
Connecting the dots between customers and security teams-
Shruthi Kamath
-
Nov 13-
C0c0n-
Talk-
Cloud Threat landscape-
Gunjan Chhillar
-
Nov 13-
C0c0n-
Talk-
Changing Cyber Security Paradigm & Cyber Tsunami-
Sunil Varkey
-
Nov 13-
C0c0n-
Talk-
Case study - E-crime group targeting mobile users-
Rahul Sasi
-
Nov 13-
C0c0n-
Talk-
Case Study - Cyber Heist in a Bank and Recovery of Systems and Money-
Prashant Choudhary
-
Nov 13-
C0c0n-
Talk-
Building Global Cyber Security Company Out of India: Key Lessons Learnt During My Entrepreneurship Journey-
Bikash Barai
-
Nov 13-
C0c0n-
Talk-
A look into cyber-espionage activities targeting critical infrastructure in India-
Saurabh Sharma, Kurt Baumgartner
-
Nov 13-
C0c0n-
Talk-
Decoding new age hackers and Criminal Investigation-
Amit Dubey
-
Nov 12-
C0c0n-
Talk-
Understanding the Psychology Behind Threats - adding Twists to your Turns-
Saman Fatima
-
Nov 12-
C0c0n-
Talk-
The evolving nature of cyber community-
Aastha Sahni
-
Nov 12-
C0c0n-
Panel-
Stopping Breaches with CrowdStrike-
Sandeep Rao
-
Nov 12-
C0c0n-
Talk-
Regulating Social Media Platforms : Should it be done in Democratic Societies ?-
J Sam Daniel Stalin, Apar Gupta, Dinesh O Bareja, Prashant Mali, Jiten Jain
-
Nov 12-
C0c0n-
Talk-
Post Covid CISOs - Disappearing trusted boundaries and Innovative CyberSecurity Approaches-
Illyas Kooliyankal
-
Nov 12-
C0c0n-
Talk-
IoT Security Guidelines & Standards-
Yashodhan Vivek Mandke
-
Nov 12-
C0c0n-
Talk-
ICS Security —- A need, a challenge and a new change in Mindset-
Dhruv Gupta
-
Nov 12-
C0c0n-
Talk-
Executive Presence….a cardinal of the cyber rostrum-
Bishakha Jain
-
Nov 12-
C0c0n-
Talk-
Enterprise Governance and Risk Management-
Arathy Nair, Muskan Mangla
-
Nov 12-
C0c0n-
Panel-
Diversity and Inclusion-
Aarushi Koolwal, Hussaina Begum, Nehal Mehta, Shivani Sharma
-
Nov 12-
C0c0n-
Talk-
Dissecting Malicious Software and Analysis-
Shrutirupa Banerjiee
-
Nov 12-
C0c0n-
Talk-
Data Security and Privacy-
Abhilasha Vyas
-
Nov 12-
C0c0n-
Panel-
Cyber Security - Crystal Gazing in to the future-
Burgess Cooper
-
Nov 12-
C0c0n-
Talk-
2021 Supply Chain Attacks Analysis-
Ajit Hatti
-
Nov 12-
C0c0n-
Talk-
“Let’s Go Phishing”: Discerning the insidious nature of Social Engineering-
Ruchira Pokhriyal, Shashi Karhail
-
Nov 11-
Blackhat(Arsenal)-
Tool demo-
vAPI: Vulnerable Adversely Programmed Interface (OWASP API Top 10)-
-
Tushar Kulkarni -
Nov 11-
Blackhat(Arsenal)-
Tool demo-
Kubernetes Goat: Interactive Kubernetes Security Learning Playground-
-
Madhu Akula -
Nov 11-
Blackhat(Arsenal)-
Tool demo-
DejaVu ++-
-
Bhadreshkumar Patel, Harish Ramadoss -
Nov 11-
Blackhat(Arsenal)-
Tool demo-
Damn Vulnerable Bank-
-
Akshansh Jaiswal, Hrushikesh Kakade, Rewanth Tammana -
Nov 10-
Blackhat(Arsenal)-
Tool demo-
Wireshark Forensics Toolkit-
-
Rishikesh Bhide -
Nov 10-
Blackhat(Arsenal)-
Tool demo-
RIoTPot: A Modular Hybrid-Interaction IoT/OT Honeypot-
-
Abhimanyu Rawat, Shreyas Srinivasa, Emmanouil Vasilomanolakis -
Nov 10-
Blackhat(Arsenal)-
Tool demo-
Kubestriker: A Blazing Fast Security Auditing Tool-
-
Vasant Kumar -
Nov 10-
Blackhat(Arsenal)-
Tool demo-
Adhrit: Android Security Suite-
-
Abhishek Jaiswal, Abhishek Jm, Rahul Sani -
Nov 04-
Ekoparty-
Talk-
DIAL: Did I just alert Lambda? A centralized security misconfiguration detection system-
-
Saransh Rana, Divyanshu Mehta, Harsh Varagiya -
Oct 15-
Rootcon-
Talk-
The Curious case of knowing the unknown-
-
Vandana Verma Sehgal -
Oct 13-
Rootcon-
Talk-
The Kill Chain: Future of Cyber in Defense-
-
Harshit Agrawal -
Oct 13-
Rootcon-
Tool demo-
Buzzard : Crafting your post exploitation framework against odds-
-
Aravindha Hariharan, Subhajeet Singha -
Oct 08-
Shellcon-
Keynote-
Keynote - Advanced Application of Adversarial AI for Scenario Based Hacking-
-
Tamaghna Basu -
Aug 27-
Hitbsecconf-
Talk-
Securing Webviews and The Story Behind CVE-2021–21136-
-
Shiv Sahni, Imdadullah Mohammed -
Aug 26-
Hitbsecconf-
Talk-
Gazing Ahead: What Modern RF Combat Looks Like in the Next Decade-
-
Harshit Agrawal -
Aug 08-
Defcon(Ics Village)-
Talk-
Top 20 Secure PLC Coding Practices-
-
Vivek Ponnada, Sarah Fluchs -
Aug 08-
Defcon(Adversary Village)-
Panel-
Resilient cyber space: The role of hacker and security communities-
-
Manu Zacharia, Aseem Jakhar, Abhijith B R, Jay Turla, Omar Santos, Dave Lewis, Dhillon Kannabhiran -
Aug 08-
Defcon(Appsec Village)-
Talk-
AppSec 101: A Journey from Engineer to Hacker-
-
Arjun Gopalakrishna -
Aug 07-
Defcon(Appsec Village)-
Talk-
The Curious Case of Knowing the Unknown-
-
Vandana Verma Sehgal -
Aug 07-
Defcon(Adversary Village)-
Tool demo-
Tenacity- An Adversary Emulation Tool for Persistence-
-
Atul Nair, Harshal Tupsamudre -
Aug 07-
Defcon(Adversary Village)-
Tool demo-
Red Team Credentials Reconnaissance (OLD with a TWIST)-
-
Shantanu Khandelwal -
Aug 06-
Defcon(Iot Village)-
Talk-
Defending IoT in the Future of High-Tech Warfare-
-
Harshit Agrawal -
Aug 06-
Defcon(Adversary Village)-
Talk-
Adversary village Kick-off-
-
Abhijith B R -
Aug 06-
Defcon(Adversary Village)-
Panel-
Adversary simulation, emulation or purple teaming - How would you define it?-
-
Anant Shrivastava, Vincent Yiu, Martin Ingesen, Jean Marie Bourbon, Samuel Kimmons, Joe Vest -
Aug 05-
Blackhat-
Talk-
The Devil is in the GAN: Defending Deep Generative Models Against Adversarial Attacks-
-
Ambrish Rawat, Killian Levacher, Mathieu Sinn -
Aug 05-
Defcon(Recon Village)-
Talk-
The Bug Hunter’s Recon Methodology-
-
Tushar Verma -
Aug 05-
Blackhat-
Talk-
PCIe Device Attacks: Beyond DMA. Exploiting PCIe Switches, Messages and Errors-
-
Hareesh Khattri, Nagaraju N Kodalapura, Nam N Nguyen -
Aug 05-
Blackhat-
Talk-
5G IMSI Catchers Mirage-
-
Ravishankar Borgaonkar, Altaf Shaik -
Aug 04-
Blackhat-
Talk-
Siamese Neural Networks for Detecting Brand Impersonation-
-
Jugal Parikh, Nitin Kumar Goel, Justin Grana, Yuchao Dai -
Aug 04-
Blackhat(Arsenal)-
Tool demo-
ParseAndC: A Universal Parser and Data Visualization Tool for Security Testing-
-
Parbati Kumar Manna -
Aug 04-
Blackhat(Arsenal)-
Tool demo-
Kubestriker: A Blazing Fast Kubernetes Security Auditing Tool-
-
Pralhad Chaskar, Vasant Kumar -
Aug 04-
Blackhat(Arsenal)-
Tool demo-
Joern: An Interactive Shell for Code Analysis-
-
Suchakra Sharma, Vickie Li, Fabian Yamaguchi -
Aug 04-
Blackhat(Arsenal)-
Tool demo-
Counterfit: Attacking Machine Learning in Blackbox Settings-
-
Raja Sekhar Rao Dheekonda, Will Pearce -
Aug 04-
Blackhat(Arsenal)-
Tool demo-
Automated Attack Path Planning and Validation (A2P2V)-
-
Subir Das, Fukutomo Nakanishi, Jason Youzwak, Michael Hylkema, Santoshi Aoki -
Aug 04-
Blackhat(Arsenal)-
Tool demo-
Attack Surface Framework-
-
Prajwal Panchmahalkar, Mauricio Espinosa -
May 07-
Blackhat-
Panel-
Insights and Predictions: What’s Next in InfoSec-
Vandana Verma Sehgal, Neil R. Wyler, Lidia Giuliano, Jeff Wilson, Vitaly Kamluk
-
May 07-
Blackhat(Arsenal)-
Tool demo-
CANalyse: A Vehicle Network Analysis and Attack Tool-
-
Kartheek Lade -
May 06-
Blackhat-
Talk-
Threat Hunting in Active Directory Environment-
-
Anurag Khanna, Thirumalai Natarajan Muthiah -
May 06-
Blackhat(Arsenal)-
Tool demo-
FalconEye: Windows Process Injection Techniques - Catch Them All-
-
Rajiv Kulkarni, Sushant Paithane -
May 06-
Blackhat(Arsenal)-
Tool demo-
Demystifying the State of Kubernetes Cluster Security - The Cloud Native Way-
-
Vasant Kumar, Rupali Dash -
Mar 06-
Nullcon-
Panel-
From Reactive to Proactive - Operationalizing your Threat Intel-
-
Akshat Jain, Amit Ghodekar, Suhas Desai, Ambuj Bhalla -
Mar 06-
Nullcon-
Talk-
Bug hunter adventures-
-
Shreyas Dighe, Yuvraj Dighe -
Mar 05-
Nullcon-
Talk-
Telecom Security Challenges in 5G-
-
Akib Sayyed -
Mar 05-
Nullcon-
Panel-
Tech Startups/Businesses and Infonomics-
-
Sourabh Issar, Burgess Cooper, Joerg Simon -
Mar 05-
Nullcon-
Panel-
CyberPhysical Systems Security - Trends, challenges & opportunities-
-
Frank Sanjay, Khushwant Pawar, Mayur Mehta, Faruk Kazi -
Mar 05-
Nullcon-
Talk-
Arbitrary code execution on RISC-V using fault injection-
-
Praveen Vadnala, Nils Wiersma
↑