Member of Parliament, Govt of India
Meeting the test of privacy: Businesses need to transform
Founder at Thinkst
Making a Dent, Making a Difference and Making a Dollar
Director General at CERT-IN
CISO at Axis Bank
Vice President at Marsh Insurance Brokers
IGP (Cyber) Mumbai Police
Partner Advisory- Ernst & Young LLP
VP & CISO at Bharti Airtel
CISO at Vorwerk Group
Senior VP and CISO of Reliance Industries Ltd.
Partner at Deloitte India
Vice President Technology at Walmart Labs
Head of Information Security Risk at National Bank of Fujairah
Founder at Sentelist ME
Founder, NII Consulting
CIO-Essar Ports & Shipping Head InfoSecurity, Network & Communications-Essar Group
President at ISRA
IGP, Kerala Police
CISO at NPCI
CISO at Idea Cellular
CSO at Schneider Electric
Security CTO at Akamai Technologies
CEO at Reserve Bank Information Technology
Vice President, Global Information Security and IT Compliance for Genpact
Associate VP at NetMagic Solutions
South Asia Editor for Asia Times
CISO at BSE Ltd
VP of Security Architecture at Visa Inc
Head of Information Security at Grab
Vulnerability Management Head for Shell India Pvt.
Head of Security Engg. at Flipkart
CISO at Publicis Group
Senior Director at DSCI
CEO/Co-Founder at ElcomSoft
Student, Assam Don Bosco University
Looting your bank savings using Digital India
Senior Software Engineer, FireEye
DARWIN (A parasite covert wireless network)
REDteam, KPN Telecom
I Boot when U-Boot
Security Researcher
Security through obscurity and fear
Ph.D. student at Kaitiaki Labs and TU Berlin
White-Stingray: Bypassing stingray detectors
Graduate Research Assistant, University of California, Santa Barbara
Unleashing D* on Android Kernel Drivers
Carel - Senior Information Security Officer Philipp - Senior Security Analyst at Compass Security Schweiz AG
Expanding exploitation beyond X86 and Arm, into the realm of Xtensa: A comparative short study
Principal Security Consultant at X41-DSEC GmbH
Smells like Teen Spirit - Internet of Teens
Director of Coriolis Technologies Pvt Ltd
SpotPhish: Zero-Hour Phishing Protection
Telecom Security Specialist at Positive Technologies
Comprehensive hacker techniques in mobile networks
Ph.D. at KU Leuven
KRACKing WPA2 Using Key Reinstallation Attacks
SRE at Microsoft india
Breaking Into Container Orchestrators
Ph.D. Student at UCSB
BootStomp: On the Security of Bootloaders in Mobile Devices
Product Security Engineer at Polycom Research Center
Abusing and Attacking Content Sharing Solutions
Senior Staff Correspondent at The Tribune
Security Analyst at Microsoft
Software Supply Chain Cyberattack
Chief Data Scientist at Acalvio Technologies
A Game between Adversary and AI Scientist
Sr. Security Researcher at Payatu Software Labs
ICS Village
Manager of Application Security Research
Predictable Failures – The cryptographic mistakes you make
Understanding CryptoCurrencies 101
Research and Development Engineer. Quarkslab
Automobile CAN hacking
Head of Trust and Security at Bugcrowd
The Bug Hunter's Methodology Workshop
Member of TOOOL
Lockpick Village
Social Engineering Village
Senior Security Consultant at NotSoSecure
Serialization Vulnerabilities
Director of Internet Democracy Project
Developer at Tor Project
Director of Cybersecurity, Electronic Frontier Foundation
Developer at Open Observatory of Network Interference
OONI: measuring Internet filters and their unexpected impact
Director at The Bachchao Project
Independent Researcher
Information Security Engineer, Google
Great bugs from the Google VRP in 2017
Security Engineer, Google