No filter set
Show sessions with reference (Presentation or Video)
Query

Date Topic Speaker Resources
2015-07-25 Meet Bangalore Demystifying Mobile Top 10 - M8 Shivang Desai
2015-07-25 Humla Chennai Introduction Balasubramaniam Natarajan
2015-07-18 Meet Dharamshala Cyber Security Trends and Advanced Persistent Threats Nitish Chandan
2015-07-18 Meet Dharamshala Network Forensics tenzin chokden
2015-07-18 Meet Dharamshala Terminology in Cyber Security and News Bytes prabhuS
2015-07-18 Humla Mumbai Mastering Nmap Script Engine Sanoop Thomas
2015-07-11 Meet Chennai IoT Security Surendranath Reddy
2015-07-11 Meet Chennai Web Security Series Raghavendran Gopal
2015-07-11 Meet Chennai Mobile Forensics Kala Baskar
2015-07-11 Meet Chennai Social Engineering Toolkit Shravankumar M
2015-07-11 Meet Mumbai System Z Cryptographic Services Pooja Upadhyay
2015-07-11 Meet Mumbai Windows ShellBag Forensics D.M.Reddy
2015-07-11 Meet Mumbai CAPTCHA decoding techniques Sagar Popat
2015-07-11 Meet Mumbai Security News Bytes tejas joshi
2015-07-04 Meet Kolkata OWASP VA Audit Mechanism Surajeet Ghosh
2015-07-04 Meet Kolkata New Age Red Teaming - Enterprise Infilteration Shritam Bhowmick
2015-07-04 Meet Kolkata IoT Fundamentals & it's Risks Sukanya Mandal
2015-07-04 Meet Kolkata IoT Risk Abstract Amiya Dutta
2015-07-04 Meet Pune Cycript for Security Testing on iOS / Mac App Tapan Thaker
2015-07-04 Meet Pune Malware analysis - Discussion for beginners. Krishs
2015-07-04 Meet Pune News Bytes Ganesh Kadam
2015-07-04 Humla Bangalore Android Humla Abhinav Sejpal
2015-06-27 Humla Bangalore Advanced Android App Exploitation Ajin
2015-06-27 Humla Bangalore Advanced Android App Exploitation Sachinraj Shetty
2015-06-20 Meet Bangalore Discussion on Social Engineering Manasdeep
2015-06-20 Meet Delhi NCR So you know all about XSS? Vaibhav Gupta
2015-06-20 Meet Dharamshala WordPress Security James Walker
2015-06-20 Meet Bangalore SAML Single Sign-On (SSO) Service Tamilvanan
2015-06-20 Meet Delhi NCR FIDO U2F Protocol Ather Ali
2015-06-20 Meet Delhi NCR Internet of Things - Threats, Risks and Vulnerabilities Sanjay Kumar
2015-06-20 Meet Dharamshala Network Forensics tenzin chokden
2015-06-20 Meet Bangalore Threat Intelligence (demo) Jai
2015-06-20 Meet Delhi NCR New Bytes null/OWASP Delhi Team
2015-06-20 Meet Dharamshala SSL Certificates Murtuja Bharmal
2015-06-20 Meet Bangalore Venom Demo Akash Mahajan
2015-06-20 Meet Bangalore Owasp Mobile Top 10 - M7 & M8 Shivang Desai
2015-06-13 Meet Chennai Mobile security Series- Part 1 PradeepKumar P
2015-06-13 Meet Chennai Incident Response Naveen Kumar Venugopal
2015-06-13 Meet Chennai Buffer Overflow Arjun Basnet
2015-06-13 Meet Chennai Cloud Security Devaraj Munuswamy
2015-06-13 Meet Mumbai ISMS Implementation Approach Janak
2015-06-13 Meet Mumbai Digital Banking Hacks - II Rajan Chheda
2015-06-13 Meet Mumbai Digital Banking Hacks Avkash K
2015-06-13 Meet Pune Python for Tweeter Monitoring: Look beyond the tweets Ajit
2015-06-13 Meet Mumbai Security News Bytes tejas joshi
2015-06-13 Meet Pune PCI DSS Raakhi Radhakrishnan
2015-06-13 Meet Pune Security News Bytes Sumedh Bhalerao
2015-06-06 Humla Chennai 6. Securing from evils(Level-05) vengatesh
2015-06-06 Humla Chennai 5. Aftermath (Level-04) vengatesh
2015-06-06 Humla Chennai 4. Entering into the machine(Level-03) vengatesh