CONFERENCE SPEAKERS
Founder, Cure53
Do we get stuff done? We don’t get stuff done? Or do we? Or will we, maybe? Soon?
Sr. Engineering Manager, Platform Engineering
Country Manager SAARC, Delinea
CSO at Tata Consultancy Services
CISO, Unacademy
Assurance Testing Services Head at Johnson Controls
CISO & Data Privacy Officer, Yes Bank
VP - Research and Innovation at Cyware Labs
AVP – Risk & Compliance - Microland Ltd
Partner – Deputy Cyber Leader | EY
Program Manager Cyber Security CoE, Bata Group
Director General, CERT-IN
CISO, ICICI Bank
Director- IT Security & Compliance, Publicis Groupe
CISO, CRED
VP – Information Security | Bangalore International Airport Ltd.
Senior Director of Engineering, IoT Ecosystems at Espressif Systems
Director of Eng. Threat & Vulnerability Management | Salesforce
CISO, Teleperformance, India
CISO & Data Privacy Officer, Vodafone Idea Limited
Vice President and Chief Product Security Officer, Honeywell
India Site Head & Senior Director, Cybersecurity at Visa
Former Founding CEO, ReBIT and Strategic Adviser, Deepstrat
Director General, NCIIPC
Cyber Security Manager, IKEA
Founding Director of Grey Head Media & VP of Community Engagement & Editorial, ISMG
CISO, Paytm Payments Bank
Program Manager (Android Security) | Google
Sr. Principal Engineer - Stryker Global Technology Center
Designated & Founding Partner, DeepStrat | Strategic Adviser to Nullcon and The Dialogue
Head – Cybersecurity - IT Systems & Processes | L&T Technology Services Ltd
IT Head, SBI Mutual Fund
Sr. Manager, Head of Cyber Defence | Myntra Designs Pvt. Ltd
CC Manager Security & Compliance - Shell India
CISO, NXP Semi-conductors BV
CISO, Bharti Airtel
Founder & Chief Marketing Officer, IndusFace
Vice President, Products - Indusface
Sr. Director, Security Operations | Salesforce
Service Workers VS Corporate Firewalls
A Kernel Hacker Meets Fuchsia OS
Hacking 5G Is No Rocket Science
Scale hacking to secure your cloud and beyond
Hacking Fintech Crime: Realities and Possibilities in India
Hack The Bridge
Software-Defined Snort With Barnyard & Pulled Pork For NIDPS
Unearthing Malicious And Other “Risky” Open-Source Packages Using Packj
A New Secret Stash For Fileless Malware
Do PDF Tools Conform To The Specification?
A UEFI firmware bootkit in the wild
Mind The Gap - The Linux Ecosystem Kernel Patch Gap
ElectroVolt: Pwning Popular Desktop Apps While Uncovering New Attack Surface On Electron
Hacking Android Foreground Services Escalation Of Privileges
Honey, I Just Put The Hospital On A Ventilator! - DICOM And Its Pitfalls
Into The Dark - Switching Off Renewable Power From Everywhere
Elevating The TrustZone To Achieve A Powerful Android Kernel Exploit
The Different Faces Of macOS Malware: Detecting Anomalies In A Poisoned Apple
Jailbreaking iOS in the post-apocalyptic era
c0ntextomy - Let's Debug Together
0-Day Up Your Sleeve - Attacking macOS Environments
Handling A Bug Bounty program From A Blue Team Perspective
Hack the Source: Securing Open Source Software – One bug at a time
Pushing Security Left By Mutating Byte Code
Raining CVEs On WordPress Plugins With Semgrep
Automate Your Whatsapp Chats
Web3.0 - Smart Contracts Could Be Leaky
Peeling Back The Onion: Taking Security Onion Into Battle
Building Security Applications On Smart Cards
Deep Dive: Red Team Test Operations
One SMALI Step For Man, One Giant Step For Researchers
Ticketing 101: Making Sure Your Documentation Is As Good As Your Findings
vPrioritizer: Art of Risk Prioritization
Vajra - Your Weapon To Cloud
ZaaS: [OWASP] ZAP As A Service - Continous Security For 20K+ APIs