- Dr Amar Prasad Reddy
- Blak Dayz
- Elena Feld
- Maor Shwartz
- Dinesh O Bareja
- Rakshit Tandon
- Santosh Khadsare
- Dr Faisal Abdullah
- Anuj Agarwal
- Luiz Vieira
- Nipun Jaswal
- Neo Sec
- Rizwan Shaikh
- Hemanth Joseph
- Deepak Kumar
- Milan Singh Thakur
- Hitesh Malviya
- Manoj Chaudhary
- Vismit Rakhecha
- Shivam Saluja
- Ishwar Prasad S
- Atul Kumar
- Niranjan Reddy
- Rhyme Upadhayaya
Dr Amar Prasad Reddy is Director – General, National Cyber Safety and Security Standards, Chairman of Recruitment Analysis Council & Founder Member of Justice Mohan Children’s University.
Derek Watson (Blak Dayz) is Coordinator of DE CON and a security professional from United States of America.
Elena Feldman is a senior trainer in network security and advanced networking. She has 7-years experience in Telecom core networking. Since 2011 Elena is the head of CSIRT operational departament at Ural Federal Region, private cybercrime investigator and forensic expert in law. She is currently Assistant Professor at Chelyabinsk State University, Russia
Topic: Mobile Threat Defense in Telecom Providers
Maor Shwartz has been interested in the field of security since childhood, doing network analysis, forensics, dark web intelligence gathering, social engineering, etc. Maor has served 7 years in the Israeli army as a decorated officer. Maor loves extreme sports (motorcycles / hiking / diving etc), and the most extreme sports of all League of Legends and breaking stuff hardware to understand how it works.
Topic: Why today's security researchers cannot just publish vulnerabilities?
Dinesh O Bareja is COO-Open Security Alliance, Microsoft MVP, CISA, CISM, ITIL. Cyber Insurance, Enterprise Security Strategy & Risk, Govt Policy, Awareness. Dinesh has over 23 years work and business experience across varied domains and has been in the technology domain since the past 15 years. His expertise and present work is in security strategy, architecture design and operations in areas like Banking, IPR, Cyber Security and Cybercrime, Critical Infrastructure among others. He is associated with the Cyber Defence Research Center (Jharkhand Police) as Cyber Surveillance Advisor and also leads the Indian Honeynet Project. In his commercial avatar he is an Infosec consultant for specialty services in DLP, SOC, SIEM, GRC, ISMS etc. You can find him blogging, writing or speaking, or on twitter, flckr, facebook linked in and you may not have to search too hard !
Rakshit Tandon is Director of A&R Info Security Solutions Pvt. Ltd and Consultant – Internet and Mobile Association of India. He is also Advisor- Cyber Crime Unit, Uttar Pradesh Police, Agra & Cyber Crime Cell, Gurgaon, Haryana Police.
Topic: Safe Surfing
Santosh Khadsare is Cyber Forensics Investigator-Govt of India, Information Warfare & Cyber Law Enthusiast. 14 years plus of service having rich experience in Cyber Security, Information Warfare, Technology Management, HRM/HRD, Training & Development, Personnel Management and General Administration. Specialization in network security , ethical hacking, Penetration testing and cyber forensics.Cyber security and Cyber Security Audit. He was Instructor for Cyber Security in Kenya for 3 months.
Topic: Cloud Forensics
Dr Faisal Abdullah is a multi-disciplinary educator and an information security specialist. As the Chair of the Management Information Systems Department at Lewis University, he has been instrumental in bringing innovative changes to the department and attracting students to cutting-edge careers in information technology and cybersecurity. His teaching philosophy puts students in the forefront and he designs courses that enable his students to learn "hands-on" career-oriented skills in cybersecurity and technology. He is an expert speaker on topics relating to information assurance, computer forensics, cybersecurity governance and risk management. He has conducted cyber-risk assessments, investigated corporate cybercrimes and has expert knowledge of quantitative, qualitative and hybrid risk assessment procedures and disaster recovery planning. He is bilingual in Business and Technology and has the ability to communicate effectively with decision makers, cybersecurity experts and users.
Topic: How to Calculate the Cost of a Cybersecurity Incident?
Anuj Agarwal is Chairman of Centre for Research on Cyber Crime & Cyber Law. First Implementer and Trainer of Microsoft Dynamics-AX and NAV ERP in Indian sub-continent. He is Consultant, Trainer & Public Speaker for large projects on E-Commerce, E-governance, ERP & Electronics / Digital Technologies. He is also a Cyber Crime Investigation, Cyber Security Training and Consulting,Cyber Law, IT Security Audit, IT Policy.
Nipun Jaswal is an accomplished infosec author and a passionate cyber security researcher with an experience of 7+ years in the cyber security industry. He is the Author of "Mastering Metasploit" Edition First, Second and Co-Author to the Chinese edition of the book. He is best known for Exploit writing, Application Security, Signals and Wireless Hacking, Social Engineering and for developing surveillance based solutions for law enforcement agencies worldwide. Nipun has delivered over 100+ guest sessions and workshops promoting web application security and exploitation throughout India and worldwide. Nipun was acknowledged by various security companies like Offensive Security, Rapid7, AT&T etc. for finding vulnerabilities.
Topic: Breaking the Myths of WLan Forensics
Hitesh Malviya is an acclaimed personality for his pronounced work in the realms of information security, start-up development and Digital Identity. His fields of expertise include Blockchain, Information Security, Agile Product development and Start-ups. His last startup Digital Gorkha has been acquired by a leading real estate group. He has penned down more than 10 research papers on themed on a wide spectrum of topics such as credit card security, cloud computing security and web application security. His work has been recognized and appreciated by defence ministry of South Africa in past. He has compiled his articles on Blockchain technology and its Use-cases on itsblockchain.com
Topic: How Blockchain will defend IOT?
Luiz Vieira is Rio de Janeiro, Brazil OWASP Chapter Leader. Security specialist, and working with Audit, Penetration Testing and Computer Forensics. Currently developing projects in the area of Fraud Investigation and Forensics Technologies and is instructor of information security in HackProofing Labs. Has published several articles on websites and electronic magazines. Taught a variety of training for armed forces (Navy, Air Force and Army), public (Fed prosecutors, TRE, TJ) and civilian police (Investigation Division of High Tech Crime). Presented lectures at various conferences and events of information security and free software such as You Shot The Sheriff, OWASP Day, LinuxCon, CNASI, FISL, VOLDay, BSides.
Topic: Bypassing AV Technology
Rizwan Shaikh is a prominent Information Security Researcher and Cyber Crime Consultant with more than 7 years of experience in the meadow of Ethical Hacking, Information Security and Cyber Law. He is a well recognized name in the Cyber World and with an experience of more than 7 years, he has been conducting Ethical Hacking training and providing Information Security services across the globe. He is widely sought after Speaker on Cyber Security and Cyber Law and has been invited by many corporates and leading institutions of India including IIT's and NIT's for conducting workshops, seminars, boot-camps and trainings on Ethical Hacking and Information Security. He has trained more than 10000 individuals in Colleges, Corporates and Government Departments. He has trained employees of some of the most prestigious clients like Accenture, Wipro, Capgemini, Trend Micro, TCS, HCL and many others. His area of expertise includes Vulnerability Assessment, Information Security Audits, Penetration Testing, Source Code Reviews, Computer Forensics, Ethical Hacking, Cyber Law, etc.
Hemanth Joseph is Founder of 0SecCon-An infosec conference. he is also a Bug Bounty Hunter and listed Got listed in Microsoft, Dropmyemail, Google, Yahoo, Twitter, Barracuda, AT&T Security and many more acknowledgment Lists. He is also Author of: SQL In - The Beginners Guide, Web Exploitation - The Beginners Guide, SQL In - The Beginners Guide & Web Exploitation - The Beginners Guide.
Basil Arackal is the CTO of LmntrX Tech, a Python Programmer, Who has dipped his toes in everything from Web development to Hybrid Apps, Android & most recently iOS development. For the past two years, has been doing services in Mobile Application Development, as well as training.
Topic: QRL Jacking
Deepak Kumar is a renowned Digital Forensics Expert. Having 5+ Experience in Digital Forensics & IT-Security. He is Certified Cyber Security Expert, CEH : Certified Ethical Hacker, CHFI : Certified Hacking Forensic Investigator, ECSA : EC-Council Certified Security Analyst, Certified Computer Forensic From Gujarat Forensic Sciences University (GFSU), Certified Operational Security (OPSEC) for Control Systems and Certified Cyber-Security for Industrial Control Systems. He has individually assisted cases on Cyber Crime and Forensics like Phishing, Data Theft, Credit Card Fraud, Email Hacking, Cyber Pornography, Facebook image morphing, Fake ID & identity theft etc.
Topic: Digital Forensics
Milan Sigh Thakur is a Security Researcher and OWASP AppSec India Leader. He is currently Leading the OWASP Mobile Security Guide Development project. Also he is Author for DSCI (Data Security Council of India) security blogs, Trainer at OWASP Academy and currently working with Aujas Networks. He has also been spoken at various security conferences such as DEFCON Lucknow, OWASP AppSecs, Cyber Square Summit etc.
Topic: Redefining Mobile Security
Manoj Chaudhary is Head of Department-Centre for Robotics and Artificial Intelligence at Amity University and Director of Rivoyat Pvt. Ltd. He is also Founder of Freedom to innovate.
Topic: IoT Secured future or Destroyer
Vismit Rakhecha is Founder of The Hacker Samachar and a well recognised name in the Cyber World and with an experience of more than 5 +years, he has been conducting Ethical Hacking training and providing Information Security services across the globe. Currently working with pristine Infosolutions as "Security Analyst". He has presented white paper in HCON, OWASP, CSA, etc. Vismit is also Author of two books (An hour before CCNA, Ground Zero 1.0).
Topic: Digital Mafia-Decrypted
Shivam Saluja is Founder of BaseZap - a web hosting compnay and a security professional. He is also member of national technical committee at National Cyber Defence Research Centre. Shivam is also listed in various Hall of Fames for finding critical bugs.
Topic: Cloud & Website Hosting Security
Ishwar Prasad S is Founder of Necurity Solutions-A cyber security company and a Certified Ethical Hacker and Cyber Security Expert. He is Known for finding the most critical Vulnerability in eBay which Allowed the hackers to purchase anything for one rupee. He is listed in many hall of fame such as Bitcasa, eBay, Shopify, Eset, Jumplead and many. Recently appreciated by more than 20+ companies forreporting vulnerabilities in their system and have been awarded Hall Of Fame and Bounties. He recently appointed by Tamilnadu police department for doing Vulnerability assessment and Penetration testing on Tamilnadu police official servers and websites. Shopify and Uber recently awarded him bounty for reporting a severe vulnerability in their system.
Topic: Bug Bounty Hunting(Hacker's Approach)
Ajay Kumar is Deep Web Security Researcher, Python programmer, web application penetration tester. From past 4 months Ajay is researching on deep web security, coded a tool called "BULL" to crawl deep web sites. He found his own own way to deface or hack deep web sites (.onion). R right now he is in research of deanonymising I2P users.
Topic: Top Deep Web-What to do, what not to do?
Niranjan Reddy carries an experience of more than 12 years in the field of Networking & IT Security and has executed numerous critical run-away projects in India & Abroad. He has acquired many international certifications like CEI, CEH, CHFI,ECSA,LPT,EDRP,CISSP, ISO-27000:2013 Lead Auditor etc. Niranjan has also executed various prestigious projects like CERT-India,Center For Information Security Secure Lab at Pune University Campus and has conducted various IT security training’s for many Corporate & Law Enforcement Agencies. He is actively involved with Maharashtra Police in assisting & solving cyber crime cases.
Topic: Insider Threats-Cybersecurity Need of the Hour
Rhyme Upadhayaya is a self-taught enthusiast with Information Security as the arena. Her skills and trainings reflect her interest with Malware Analysis and Techniques as well as Cryptography and she is keen on learning new technologies as well, a rapid and adaptive learner with interest in almost every domain the Security Engineering has to offer her.
Topic: Behavioral classification of Ransomware: Decrypting the deadliest Malware the world ever encountered.