< NULLCON 2025 - GOA />

Conference Speakers

KEYNOTE SPEAKER

Samir Saran
Daniel Cuthbert
Fueling the Future: Building Robust Engines for a Secure Digital World
All Speakers
Technical Speakers
CXO Speakers
iOS and macOS Track
BountyCraft Track
Winja Track
Developer Track
Workshop and Villages
Abhisek Datta
Co-Founder SafeDep
Surfing the Wild Wild West of Open Source Software Supply Chain Risks
Learn more
Adam Laurie
Chief Product Security Officer ALPITRONIC
Adam Laurie
Akhil Mahendra
Engineering Leader - Security Engineering CRED
Hritik Vijay
Security Engineer CRED
Yadhu Krishna M
Security Engineer CRED
Securing the chains: Building defensive layers for software supply chains
Learn more
Akshay Jain
Security Engineer PhonePe
Bharath Kumar
Security Engineer PhonePe
Instrumenting the Unknown: Leveraging Frida for Binary Analysis on Linux
Learn more
Alla Vamsi Krishna
Project Assistant Indian Institute of Science, Bengaluru
Kandi Abhishek Reddy
Security Researcher Team bi0s
Kernel Conquest: Breaking Boundaries and Demystifying Kernel SU for Root Access in Azure Cloud Shell
Learn more
Amey Gat
Principal Threat Researcher Fortinet
Namrata Godhanbhai Brahmkshatriya
Lead Cybersecurity Engineer Supremology
Pick, Tinker, Learn: Demystifying Locks for Physical Security
Learn more
Andras Tevesz
Senior Vulnerability Researcher CUJO AI
How to Teach Threading to a Dolphin
Learn more
Anto Joseph
Principal Security Engineer Eigen Labs
The Future is Trustless: How zkVMS and zkTLS Transform Bug Bounties
Learn more
Arshid Shyam Kumar
Technical Expert Siemens
Chinmay Krishna R
Junior-year Integrated Master’s Student IIIT-Bangalore
Building Glitch-Resistant Firmware: Practical Software Countermeasures for Hardware glitch attacks
Learn more
Asuka Nakajima
Senior Security Research Engineer Elastic
Windows Keylogger Detection: Targeting Past and Present Keylogging Techniques
Learn more
Avkash Kathiriya
Sr. VP of Research and Innovation Cyware
Avkash Kathiriya
Bhargav Rathod
Security Analyst Salesforce
MacOS Lockdown Mode: A Forensic Deep Dive
Learn more
Burgess Cooper
Deputy Cybersecurity Leader and Partner, EY
Converging IT and OT Security: Unified strategies for protection, detection and response.
Cameron Vincent
Security Engineer Microsoft
Google Give Me Vulnz
Learn more
Cassie Crossley
VP, Supply Chain Security Schneider Electric
Enterprise Readiness for Supply Chain Attacks
Daniel Schmidt
Security Consultant Security Research Labs
Kevin Valerio
Security Engineer Security Research Labs
Fuzzing Rust Smart Contracts: Writing A Bug Printer Engine From Scratch
Learn more
Dennis Giese
Security Researcher Independant
How Ecovacs robots got hacked and what we can learn
Learn more
Devesh Bhatt
Senior Security Manager Adobe
Thiruraghavan Madhugiri Seshadri
Director Security Adobe
Devesh & Thiruraghavan
Learn more
Dr. Shailendra Fuloria
CISO Nagarro
Converging IT and OT security: Unified strategies for protection, detection, and response
Drishti Jain
International Tech Speaker
Satellite Communications: Analyzing and Protecting Space-Based Assets
Learn more
Eugene Lim
Lead Cybersecurity Engineer - Open Government Products
Guilt by Association: Pwning Millions of Smart Weighing Machines with API and Hardware Hacking
Learn more
Felix Mohan
CEO CISO Cybersecurity
AI in SecOps: Enhancing Incident Response with Intelligence
Gayatri Sunil Relekar
Student VIT, Pune
Prateek Singh
Lead OT Cybersecurity - APAC Eaton
Bridging the Gap: Enhancing OT Security with an Affordable Testbed
Learn more
Gene Golovinsky
VP Application Security, ServiceNow
From Code to Defense: Why Developers Are the New Security Leaders
Hilal Lone
CISO Razorpay
From Code to Defense: Why Developers Are the New Security Leaders
Karan Sajnani
Founder RUDRA Cybersecurity
Radio Hacking Workshop
Learn more
Kartik Lalan
Security Architect PIC
eKYC Crisis: Securing the Lockers
Learn more
Ketan Vyas
Global Head - Software Security TCS
Modernizing Security Architecture: Platforms or Best-of-Breed, What Works Best?
Krishan Dev
Head of Information Security IIB
Krishan Dev
Krishna Pandey
Senior Director, Cybersecurity Xerox
Krishna Pandey
Kuldeep Singh
Addl. GM (IT) NTPC
Kuldeep Singh
Kumar Ashwin
Technical Manager, Research & Consulting Redhunt Labs
Hidden in Plain Sight: Large-Scale Exposure of Orphaned Commits on Major Git Platforms
Learn more
Lars Fröder
Security Researcher Cellebrite Labs
State of iOS Jailbreaking in 2025
Learn more
Maor Abutbul
Vulnerability Researcher CyberArk Labs
Your Identity is Mine: Techniques and Insights from OS Identity Providers Research
Learn more
Mathan Kasilingam
CTSO & Data Privacy Officer Vi Ltd
Mathan Kasilingam
Matthias Frielingsdorf
Co-Founder & VP of Research iVerify
Predator Malware: Trust Broken at the Core
Learn more
Michael Hendrickx
Principal Security Research Manager Microsoft
Project Dusseldorf: finding out-of-band vulnerabilities at cloud scale
Learn more
Mrudul Uchil
VP Cybersecurity India Visa
AI in SecOps: Enhancing Incident Response with Intelligence
Parag Deodhar
Managing Director Accenture India
AI in SecOps: Enhancing Incident Response with Intelligence
Prajal Kulkarni
CISO Groww
Modernizing Security Architecture: Platforms or Best-of-Breed, What Works Best?
Rishi Rajpal
Global VP Security Concentrix
Rishi Rajpal
Rohit Sharma
CISO Adani Power
Converging IT and OT security: Unified strategies for protection, detection, and response
Sachin Burman
JS. Tech. NTRO
Converging IT and OT security: Unified strategies for protection, detection, and response
Sachin Jain
Chief Engineer, R&D Stryker
Sachin Jain
Sandeep Singh
Director, Security Strategy, and Operations HackerOne
MLOps Under Attack: Threat Modeling Modern AI Systems
Learn more
Sanjay Bahl
DG CERT-In
Enterprise Readiness for Supply Chain Attacks
Sebastian Neef
PHD candidate Technical University of Berlin
What the PHUZZ?! Finding 0-days in PHP Apps with Coverage-guided Fuzzing
Learn more
Tijme Gommers
Offensive Cyber Security ABN AMRO Bank
The hidden ART of rolling shellcode decryption
Learn more
Vaibhav Gupta
Founder & CTO Appfend
From Code to Defense: Why Developers Are the New Security Leaders
Vaibhav Lakhani
Cyber Security Consultant Kroll Global Solutions LLP
Drawing parallels between iOS and macOS Pentesting with DVMA
Learn more
Vikas Goyal
VP IT Security FIS
From Code to Defense: Why Developers Are the New Security Leaders
Wietze Beukema
Independent Research
Will It Run? Fooling EDRs with command lines using empirical data
Learn more
William Robinet
CTO Conostix Luxembourg
Trapped by the CLI
Learn more
Wojciech Regula
Principal Security Consultant SecuRing
Broken isolation - draining your credentials from popular macOS password managers
Learn more
Yashodhan Vivek Mandke
Research Scholar MIT-WPU
Reversing Large Deep learning AI Models
Learn more
Yask Sharma
CISO Indian Oil
Converging IT and OT security: Unified strategies for protection, detection, and response