SPEAKERS


Keynote Speakers

Line



Leigh-Anne Galloway

Security Researcher

Leigh-Anne Galloway is a Security Researcher who specializes in application and payment security. Leigh-Anne started her career in incident response, leading investigations into payment card data breaches. Which tais where she discovered her passion for payment technologies. She has presented and authored research on ATM security, application security and payment technology vulnerabilities. Having previously spoken at DevSecCon, BSides, Hacktivity, 8dot8, OWASP, Troopers and Black Hat USA. She loves her cat, 8-bit music and Frida Kahlo She believes we can all bring a little bit of magic to the world



Adam Laurie

Global Associate Partner and Lead Hardware Hacker, IBM X-Force Red

Adam Laurie aka rfidiot aka Major Malfunction is an old school hacker who's been breaking things since before PCs and the Internet were a thing. His speciality is hardware / embedded reverse engineering in general, and low level OTA protocols and crypto in particular. He has spoken over the years on Bluetooth,RFID/NFC, Magstripe, Zigbee, DVB-T/S and many other subjects. He has been DEF CON Quartermasterfor over 20 years and runs the London DC chapter DC4420. In his spare time he likes to hack stuff.




Talk Speakers

Line



Ashutosh Ahelleya

Team bi0s

Talk Title: Security Analysis of end-to-end encryption in chat applications

Read More

Umang Raghuvanshi

Security Researcher, Secfence

Talk Title: The Art of WebKit Exploitation

Read More

Vicky Ray

Principal Researcher, Unit 42 - Palo Alto Networks

Talk Title: The Magic of Tracking APT Campaigns Using Data Science

Read More

Ashwin Vamshi

Security Researcher, Netskope

Talk Title: Phishing in the cloud era

Read More

Vladimir Dashchenko

Kaspersky Lab ICS CERT

Talk Title: Schrödinger 0-day in SCADA

Read More

Sergey Temnikov

Kaspersky Lab ICS CERT

Talk Title: Schrödinger 0-day in SCADA

Read More

Joerg Simon

Division Director - Security & Audit Service, audius GmbH

Talk Title: OpRisk, the new old security challenge

Read More

Vaidik Kapoor

VP of Technology, Grofers

Talk Title: Scaling Security

Read More

Ravinder Verma

Security Consultant, IBM X-Force Red

Talk Title: Comprehensive approach to Anonymity

Read More

Piyush Raj

Independent Security Researcher

Talk Title: Server fingerprinting: How I broke most famous recon tools and made the script kiddies sad

Read More

Mohammad Wasim

VP - Cloud & DevOps COE, PublicisSapient

Talk Title: DevSecOps – a headwind or tailwind

Read More

Riddhi Shree

Application Security Analyst, Appsecco

Talk Title: VyAPI - The Cloud Based Vulnerable Android App

Read More

Workshop Speakers

Line



Amit Kumar Khandelwal

Security Researcher, Adobe

Workshop Title: Instrumenting Security Automation in CI/CD

Read More

Gineesh George

Security Researcher, Adobe

Workshop Title: Instrumenting Security Automation in CI/CD

Read More

Abhisek Datta

Head of Technology, Appsecco

Workshop Title: Software Vulnerability Discovery using Static Analysisand Fuzzing

Read More

Ashfaq Ansari

Security Researcher

Workshop Title: Software Vulnerability Discovery using Static Analysis and Fuzzing

Read More

Adam Laurie

Global Associate Partner and Lead Hardware Hacker, IBM X-Force Red

Workshop Title: Building a GEN2 UHF RFID Reader with SDR

Read More

Shruti Dixit

Team Shakti

Workshop Title: Intro to Dark Arts: Getting Started with CTFs

Read More

Neelam Singh Gurjar

Team Shakti

Workshop Title: Intro to Dark Arts: Getting Started with CTFs

Read More

Village Speakers

Line



Arun Mane

Founder and Director, Amynasec Labs

Village Title: Car Hacking Village

Read More

Nikhil Bogam

Functional Safety and Cyber Security Supervisor, Lear Corporation

Village Title: Car hacking Village

Read More

Hrishikesh Somchatwar

Amynasec Labs

Village Title: Car Hacking Village

Read More

Kartheek Lade

Amynasec Labs

Village Title: Car Hacking Village

Read More