Talk Title and Speaker |
Videos |
Reverse Engineering Conti Ransomware by Nikhil Rathor Date: 09 Apr 2021 Time: 04:00 PM IST | |
The Achilles heel of a threat actor: Is there any? by Shyam Sundar Ramaswami Date: 26 Feb 2021 Time: 04:00 PM IST | |
Enterprise Security Architecture. Is it time for a booster shot? by Niraj Shukla Date: 19 Feb 2021 Time: 04:00 PM IST | |
Defensive Programming x FinTech by Merab Tato Kutalia Date: 05 Feb 2021 Time: 04:00 PM IST | |
Machine learning for Intrusion Attempt Detections by Varun Kohli Date: 22 Jan 2021 Time: 04:00 PM IST | |
Extract data from damaged Android mobile device. Version: 7.X.X by Teplinsky Maxim Igorevich, Dmitry Semeninov Igorevich & Savchenko Pavel Viktorovich Date: 21 Jan 2021 Time: 03:00 PM IST | |
Exploiting Android Messengers with WebRTC by Natalie Silvanovich Date: 07 Jan 2021 Time: 11:30 AM IST | |
Hacking Modern Desktop apps with XSS and RCE by Abraham Aranguren Date: 23 Oct 2020 Time: 04:00 PM IST | |
Rapid Threat Model Prototyping; threat modeling for Agile and DevOps by Geoffrey Hill Date: 16 Oct 2020 Time: 04:00 PM IST | |
CXO Panel Discussion: Critical Steps Involved In Protecting the Large Scale Infrastructure by Moderator: Eric Eifert
Panelists: Manish Tiwari, Eman Al Awadhi Date: 14 Sep 2020 Time: 03:00 PM IST | |
Operationalizing Threat Intelligence for Collective Defense by Avkash Kathiriya Date: 28 Aug 2020 Time: 04:00 PM IST | |
Medical Malware on Android by Axelle Apvrille Date: 21 Aug 2020 Time: 04:00 PM IST | |
The Great (Sandbox) Escape by Vikas Singh Date: 10 Aug 2020 Time: 04:00 PM IST | |
In(security) of smart energy meters – A hardware security perspective by Sulthan Alaudeen Date: 30 Jul 2020 Time: 12:00 PM IST | |
Pushing Private Communication Forward: Engineering at Signal by Jim O’Leary Date: 25 Jul 2020 Time: 09:00 PM IST | |
Security Compliance in the ICS environment by Krishna S Tadimeti Date: 24 Jul 2020 Time: 04:00 PM IST | |
Cyber Insurance: What makes a good fit for you by Ken Pfeil Date: 17 Jul 2020 Time: 04:00 PM IST | |
Assessing the security posture of ICS infrastructure using ISA 62443 standard by Chinkle Umrania and Neeraj Thakur Date: 15 Jul 2020 Time: 04:00 PM IST | |
Securing ICS-SCADA Systems by Dr. Faruk Kazi Date: 04 Jul 2020 Time: 12:00 PM IST | |
Robust Website Fingerprinting Through the Cache Occupancy Channel by Anatoly Shusterman Date: 01 Jul 2020 Time: 04:00 PM IST | |
Building a Security Platform with Elastic Stack: Part 1 by Aravind Putrevu Date: 20 Jun 2020 Time: 12:00 PM IST | |
Securing Microservices at API Gateway using Cloud Native Solutions by Abhisek Datta Date: 06 Jun 2020 Time: 12:00 PM IST | |
Secrets Management using Hashicorp Vault by Rohit Salecha Date: 30 May 2020 Time: 12:00 PM IST | |
HackIM CTF: Do's & Don'ts by Sudhakar Verma Date: 30 Jan 2020 Time: 03:00 PM IST | |
Application Security for developers: A Holistic Approach by Rohit Salecha Date: 16 May 2019 Time: 03:00 PM IST | |
DDoS Mitigation by Anshul Saxena Date: 14 Feb 2019 Time: 03:00 PM IST | |
Guide on setting up IoT testing lab by Arun Magesh Date: 27 Dec 2018 Time: 03:00 PM IST | |
Secure Code Development by Martijn Bogaard Date: 13 Dec 2018 Time: 03:00 PM IST | |
Side-channel Attacks by Stjepan Picek Date: 06 Dec 2018 Time: 03:00 PM IST | |