Webinars

FROM THE ARCHIVES

Download Collection

macOS Security Features Bypasses by Example by Jonathan Bar Or (JBO)
Date: 07 Feb 2022

hunting <>Android Malware with Importance Of Yara by Shivang DesaiDate: 29 Jan 2022

Impact of log4j by Alvaro Munoz & Joe Slowik
Date: 13 Jan 2022

Red, Purple, and Blue team activity using Azure by Suman Tiwari & Sakaldeep Yadav
Date: 01 Oct 2021

Bhadra framework: Threat modeling for mobile communication systems by Sid Rao
Date: 17 Sep 2021

Technical Breakdown of Magecart - The Digital Bank Robbery by Lavakumar Kuppan
Date: 03 Sep 2021

How Information Warfare Shapes Your World by Shivam Shankar Singh and Anand VenkatanarayananDate: 28 Aug 2021

Ransomware Unlocked by Ashwini Siddhi
Date: 27 Aug 2021

The 'crash' course, a non-programmer's guide to fuzzing by Rushikesh D. Nandedkar
Date: 20 Aug 2021

Charting career paths in Cybersecurity by Bishakha Jain
Date: 06 Aug 2021

Migrate Securely From On Prem to Azure Cloud by Aditya Vasekar
Date: 23 Jul 2021

Dangling Packages leading to RCE by Prasoon Gupta
Date: 16 Jul 2021

Defending enterprise cloud infrastructure : a hacker's perspective by Rashid Feroz
Date: 09 Jul 2021

DevSecOps - Automating Security in DevOps by Jovin Lobo
Date: 11 Jun 2021

The Achilles heel of a threat actor: Is there any? by Shyam Sundar Ramaswami
Date: 26 Feb 2021

Enterprise Security Architecture. Is it time for a booster shot? by Niraj Shukla
Date: 19 Feb 2021

Defensive Programming x FinTech by Merab Tato Kutalia
Date: 05 Feb 2021

Machine learning for Intrusion Attempt Detections by Varun Kohli
Date: 22 Jan 2021

Extract data from damaged Android mobile device. Version: 7.X.X by Teplinsky Maxim Igorevich, Dmitry Semeninov Igorevich & Savchenko Pavel Viktorovich
Date: 21 Jan 2021

Exploiting Android Messengers with WebRTC by Natalie Silvanovich
Date: 07 Jan 2021

Hacking Modern Desktop apps with XSS and RCE by Abraham Aranguren
Date: 23 Oct 2020

Rapid Threat Model Prototyping; threat modeling for Agile and DevOps by Geoffrey Hill
Date: 16 Oct 2020

CXO Panel Discussion: Critical Steps Involved In Protecting the Large Scale Infrastructure by Moderator: Eric Eifert Panelists: Manish Tiwari, Eman Al Awadhi
Date: 14 Sep 2020

Operationalizing Threat Intelligence for Collective Defense by Avkash Kathiriya
Date: 28 Aug 2020

Medical Malware on Android by Axelle Apvrille
Date: 21 Aug 2020

The Great (Sandbox) Escape by Vikas Singh
Date: 10 Aug 2020

In(security) of smart energy meters – A hardware security perspective by Sulthan Alaudeen
Date: 30 Jul 2020

Pushing Private Communication Forward: Engineering at Signal by Jim O’Leary
Date: 25 Jul 2020

Security Compliance in the ICS environment by Krishna S Tadimeti
Date: 24 Jul 2020

Cyber Insurance: What makes a good fit for you by Ken Pfeil
Date: 17 Jul 2020

Assessing the security posture of ICS infrastructure using ISA 62443 standard by Chinkle Umrania and Neeraj Thakur
Date: 15 Jul 2020

Securing ICS-SCADA Systems by Dr. Faruk Kazi
Date: 04 Jul 2020

Robust Website Fingerprinting Through the Cache Occupancy Channel by Anatoly Shusterman
Date: 01 Jul 2020

Building a Security Platform with Elastic Stack: Part 1 by Aravind Putrevu
Date: 20 Jun 2020

Securing Microservices at API Gateway using Cloud Native Solutions by Abhisek Datta
Date: 06 Jun 2020

Secrets Management using Hashicorp Vault by Rohit Salecha
Date: 30 May 2020

HackIM CTF: Do's & Don'ts by Sudhakar Verma
Date: 30 Jan 2020

Application Security for developers: A Holistic Approach by Rohit Salecha
Date: 16 May 2019

DDoS Mitigation by Anshul Saxena
Date: 14 Feb 2019

Guide on setting up IoT testing lab by Arun Magesh
Date: 27 Dec 2018

Secure Code Development by Martijn Bogaard
Date: 13 Dec 2018

Side-channel Attacks by Stjepan Picek
Date: 06 Dec 2018