Hours | Track 1 | Track 2 | Track 3 |
---|---|---|---|
09:45- 10:00 |
OPENING CEREMONY
|
OPENING CEREMONY
|
OPENING CEREMONY
|
10:00-10:25 | |||
10:25-10:30 |
![]() Shri. Ajit Doval, National Security Advisor
[KEY-NOTE] |
||
10:30-10:45 | |||
10:45–11:00 |
![]() Bessie Pang, Executive Director, POLCYB
Talk: Success in International Collaboration |
![]() Sean Poris, Director, Product Security, Verizon Media
Talk: Bug Bounty from Paranoids |
|
11:00–11:30 |
![]() Santhosh Srinivasan, Sr. Director - Global IT Compliance & IT Services
Talk: Evolution of ransomware threats during COVID -19 and mitigations |
||
11:30–11:45 |
![]() Maya R Nair
Talk: Coping with Digital Transformation - A CISO perspective |
![]() Ryan Sherstobitoff
Talk: Inside Hidden Cobra, a look at North Korea’s Cyber Offensive Programs |
|
11:45–12:00 | |||
12:00–12:20 |
![]() Sandeep Variyam
Talk: Demystifying Zero Trust - A Real world approach |
![]() Pierre François Maillard
Talk: System Management Mode, when your hardware affects your OS |
|
12:20–12:30 | |||
12:30–12:45 |
![]() ![]() ![]() [PANEL DISCUSSION] |
|
|
12:45–13:00 | |||
13:00–13:15 | |||
13:15–14:00 | |||
14:00–14:15 |
![]() Parveen Yadav
![]() Narendra Kumar
Talk: Web Application hacking with WebZGround |
VILLAGE KICKOFF SESSION
|
|
14:15–14:30 | |||
14:30–14:45 | |||
14:45–15:00 |
![]() Chloe Messdaghi
Talk: The Burnout Talk |
||
15:00–15:15 | |||
15:15–15:30 | |||
15:30–15:45 |
|
||
15:45–16:00 | |||
16:00–16:15 |
![]() Kris Gopalkrishnan
[KEY-NOTE] Talk: Data protection and Privacy Data protection and Privacy |
||
16:15–16:30 | |||
16:30–16:45 |
![]() Ambassador Adam Blackwell
Talk: Terrorism in 2018 and 2019 |
CONTINUED SESSION
Web Application hacking with WebZGround
|
|
16:45–17:00 |
![]() Jorge Orchilles
Talk: It’s Not a Vulnerability, It’s a Feature |
||
17:00–17:15 |
![]() Neil Walsh (United Nations)
Talk: Cybercrime, Cybersecurity and COVID19: a perfect storm for Organised Crime? |
||
17:15–17:30 | |||
17:30–17:45 |
![]() Varun Kohli, Lead Strategist - Machine Learning, Google
Talk: Deep Learning for Intrusion Attempt Detection |
|
|
17:45–18:00 |
![]() Dan Levy
Talk: Zero trust networks: Opportunities and challenges for red team Ops |
||
18:00–18:15 |
|
![]() Hima Bindu Vejella
Talk: All about IOT Forensics |
|
18:15–18:30 | |||
18:30–18:45 |
|
|
|
18:45–19:00 |
![]() Harsh Bothra
Talk: Offensive & Scope Based Recon |
||
19:00–19:15 | |||
19:15–19:30 | |||
19:30–20:00 | |||
20:00–20:15 |
![]() Gem George
![]() Sreehari Haridas
Talk: Introducing SniperPhish: A Web-Email Spear Phishing Toolkit |
||
20:15–20:30 | |||
20:30–20:45 | |||
20:45–21:00 |
|
||
21:00–21:15 |
![]() Phillip Wylie
Talk: Inside the Mind of a Threat Actor: Beyond Pentesting |
||
21:15–21:30 | |||
21:30–21:45 | |||
21:45–22:00 |
|
||
22:00–22:15 |
![]() Sachin S Kamath
Talk: Supercharging your initial foothold in Red Team engagements |
||
22:15–22:30 | |||
22:30–22:45 | |||
22:45–23:00 |
|
||
23:00–23:15 |
![]() Carlos Polop Martin
Talk: Awesome Privilege Escalation |
||
23:15–23:30 | |||
23:30–23:45 | |||
23:45–24:00 |
|
||
00:00–00:20 |
![]() Abhijith B R
Talk: Closing Notes |
Hours | Track 1 (DAY-2) | Track 2 (DAY-2) | Track 3 (DAY-2) |
---|---|---|---|
09:00- 09:40 |
BUG BOUNTY
[PANEL DISCUSSION] |
||
09:40- 09:45 |
![]() [KEY-NOTE]
Amitabh Kant, CEO, NITI |
||
09:45- 10:00 |
![]() Chris Roberts
[KEY-NOTE] |
[KEY-NOTE] |
[KEY-NOTE] |
10:00-10:15 | |||
10:15-10:30 | |||
10:30-10:45 |
![]() S. D. Shibulal
[KEY-NOTE] Infosys co-founder and former CEO |
||
10:45–11:00 | |||
11:00–11:15 |
![]() Sunil Kanchi, Chief Information Officer and Chief Investment Officer, UST Global
Talk: Cyber Security Shifts During COVID-19 |
![]() Harsh Bothra
Talk: Broken Cryptography & Account Takeover |
|
11:15–11:30 |
Tea Break
|
Tea Break
|
|
11:30–11:45 |
![]() Sultan Al-Owais
|
||
11:45–12:00 |
![]() Ankit Giri
Talk: My top 3 findings in bug Bounty journey | Aiming for high impact issues |
||
12:00–12:15 |
![]() Sunil Varkey, Security Professional
Talk: Herd Immunity, in the Cyber World |
||
12:15–12:30 | |||
12:30–12:45 |
![]() William Egerton, Chief Cyber Officer, Astaara Company Limited (UK)
Talk: The role of Insurance in Cyber Security Risk Management |
![]() Jay Turla
Talk: Preparing for a Car Hacking Program or Bug Bash |
|
12:45–13:00 | |||
13:00–13:15 |
BREAK
|
||
13:15–14:00 |
![]() Madhu Akula
Talk: Kubernetes Goat - Vulnerable by Design Kubernetes Cluster Environment |
WinjaCTF
|
|
13:45–14:00 |
![]() Dr Fyodor Yarochkin
Talk: Investigating modern cyber crime infrastructure |
||
14:00–14:30 |
![]() Prerak Mittal
Talk: Automation in Bug Bounties to Work Smarter |
||
14:30–15:00 |
![]() Rob Bathurst, CTO, Digitalware, Inc.
Talk: Risk Hunting, Finding and fixing risks that matter |
||
15:00–15:15 |
![]() Prasoon Gupta
Talk: Automate your Recon with ReconNote |
||
15:15–15:30 | |||
15:30–16:00 | |||
16:00–16:15 |
![]() Ali Alamadi, Chairman - Information Security Awareness (ISA) Committee, UAE
Talk: Cyber Security in the age of Covid 19 |
![]() Munawwar Hussain Shelia
Talk: Reverse Engineering Bare-Metal IoT Firmwares - Moving beyond Linux |
|
16:15–16:30 | |||
16:30–16:45 | |||
16:45–17:00 |
![]() Tamaghna Basu, CTO, neoEYED Inc.
Talk: How I created my clone using AI - next-gen Social Engineering |
![]() Kaustubh Padwad
Talk: Offensive Embedded Exploitation : Getting hands dirty with IOT/Embedded Device Security Testing |
|
17:00–17:15 | |||
17:15–17:30 | |||
17:30–17:45 |
CLOSING CEREMONY
|
CLOSING CEREMONY
|
CLOSING CEREMONY
|
17:45–18:00 |