| Hours | Track 1 | Track 2 | Track 3 |
|---|---|---|---|
| 09:45- 10:00 |
OPENING CEREMONY
|
OPENING CEREMONY
|
OPENING CEREMONY
|
| 10:00-10:25 | |||
| 10:25-10:30 |
Shri. Ajit Doval, National Security Advisor
[KEY-NOTE] |
||
| 10:30-10:45 | |||
| 10:45–11:00 |
Bessie Pang, Executive Director, POLCYB
Talk: Success in International Collaboration |
Sean Poris, Director, Product Security, Verizon Media
Talk: Bug Bounty from Paranoids |
|
| 11:00–11:30 |
Santhosh Srinivasan, Sr. Director - Global IT Compliance & IT Services
Talk: Evolution of ransomware threats during COVID -19 and mitigations |
||
| 11:30–11:45 |
Maya R Nair
Talk: Coping with Digital Transformation - A CISO perspective |
Ryan Sherstobitoff
Talk: Inside Hidden Cobra, a look at North Korea’s Cyber Offensive Programs |
|
| 11:45–12:00 | |||
| 12:00–12:20 |
Sandeep Variyam
Talk: Demystifying Zero Trust - A Real world approach |
Pierre François Maillard
Talk: System Management Mode, when your hardware affects your OS |
|
| 12:20–12:30 | |||
| 12:30–12:45 |
Tal Catran
Amit Dubey
Jairam Ramesh
[PANEL DISCUSSION] |
|
|
| 12:45–13:00 | |||
| 13:00–13:15 | |||
| 13:15–14:00 | |||
| 14:00–14:15 |
Parveen Yadav
Narendra Kumar
Talk: Web Application hacking with WebZGround |
VILLAGE KICKOFF SESSION
|
|
| 14:15–14:30 | |||
| 14:30–14:45 | |||
| 14:45–15:00 |
Chloe Messdaghi
Talk: The Burnout Talk |
||
| 15:00–15:15 | |||
| 15:15–15:30 | |||
| 15:30–15:45 |
|
||
| 15:45–16:00 | |||
| 16:00–16:15 |
Kris Gopalkrishnan
[KEY-NOTE] Talk: Data protection and Privacy Data protection and Privacy |
||
| 16:15–16:30 | |||
| 16:30–16:45 |
Ambassador Adam Blackwell
Talk: Terrorism in 2018 and 2019 |
CONTINUED SESSION
Web Application hacking with WebZGround
|
|
| 16:45–17:00 |
Jorge Orchilles
Talk: It’s Not a Vulnerability, It’s a Feature |
||
| 17:00–17:15 |
Neil Walsh (United Nations)
Talk: Cybercrime, Cybersecurity and COVID19: a perfect storm for Organised Crime? |
||
| 17:15–17:30 | |||
| 17:30–17:45 |
Varun Kohli, Lead Strategist - Machine Learning, Google
Talk: Deep Learning for Intrusion Attempt Detection |
|
|
| 17:45–18:00 |
Dan Levy
Talk: Zero trust networks: Opportunities and challenges for red team Ops |
||
| 18:00–18:15 |
|
Hima Bindu Vejella
Talk: All about IOT Forensics |
|
| 18:15–18:30 | |||
| 18:30–18:45 |
|
|
|
| 18:45–19:00 |
Harsh Bothra
Talk: Offensive & Scope Based Recon |
||
| 19:00–19:15 | |||
| 19:15–19:30 | |||
| 19:30–20:00 | |||
| 20:00–20:15 |
Gem George
Sreehari Haridas
Talk: Introducing SniperPhish: A Web-Email Spear Phishing Toolkit |
||
| 20:15–20:30 | |||
| 20:30–20:45 | |||
| 20:45–21:00 |
|
||
| 21:00–21:15 |
Phillip Wylie
Talk: Inside the Mind of a Threat Actor: Beyond Pentesting |
||
| 21:15–21:30 | |||
| 21:30–21:45 | |||
| 21:45–22:00 |
|
||
| 22:00–22:15 |
Sachin S Kamath
Talk: Supercharging your initial foothold in Red Team engagements |
||
| 22:15–22:30 | |||
| 22:30–22:45 | |||
| 22:45–23:00 |
|
||
| 23:00–23:15 |
Carlos Polop Martin
Talk: Awesome Privilege Escalation |
||
| 23:15–23:30 | |||
| 23:30–23:45 | |||
| 23:45–24:00 |
|
||
| 00:00–00:20 |
Abhijith B R
Talk: Closing Notes |
| Hours | Track 1 (DAY-2) | Track 2 (DAY-2) | Track 3 (DAY-2) |
|---|---|---|---|
| 09:00- 09:40 |
BUG BOUNTY
[PANEL DISCUSSION] |
||
| 09:40- 09:45 |
[KEY-NOTE]
Amitabh Kant, CEO, NITI |
||
| 09:45- 10:00 |
Chris Roberts
[KEY-NOTE] |
[KEY-NOTE] |
[KEY-NOTE] |
| 10:00-10:15 | |||
| 10:15-10:30 | |||
| 10:30-10:45 |
S. D. Shibulal
[KEY-NOTE] Infosys co-founder and former CEO |
||
| 10:45–11:00 | |||
| 11:00–11:15 |
Sunil Kanchi, Chief Information Officer and Chief Investment Officer, UST Global
Talk: Cyber Security Shifts During COVID-19 |
Harsh Bothra
Talk: Broken Cryptography & Account Takeover |
|
| 11:15–11:30 |
Tea Break
|
Tea Break
|
|
| 11:30–11:45 |
Sultan Al-Owais
|
||
| 11:45–12:00 |
Ankit Giri
Talk: My top 3 findings in bug Bounty journey | Aiming for high impact issues |
||
| 12:00–12:15 |
Sunil Varkey, Security Professional
Talk: Herd Immunity, in the Cyber World |
||
| 12:15–12:30 | |||
| 12:30–12:45 |
William Egerton, Chief Cyber Officer, Astaara Company Limited (UK)
Talk: The role of Insurance in Cyber Security Risk Management |
Jay Turla
Talk: Preparing for a Car Hacking Program or Bug Bash |
|
| 12:45–13:00 | |||
| 13:00–13:15 |
BREAK
|
||
| 13:15–14:00 |
Madhu Akula
Talk: Kubernetes Goat - Vulnerable by Design Kubernetes Cluster Environment |
WinjaCTF
|
|
| 13:45–14:00 |
Dr Fyodor Yarochkin
Talk: Investigating modern cyber crime infrastructure |
||
| 14:00–14:30 |
Prerak Mittal
Talk: Automation in Bug Bounties to Work Smarter |
||
| 14:30–15:00 |
Rob Bathurst, CTO, Digitalware, Inc.
Talk: Risk Hunting, Finding and fixing risks that matter |
||
| 15:00–15:15 |
Prasoon Gupta
Talk: Automate your Recon with ReconNote |
||
| 15:15–15:30 | |||
| 15:30–16:00 | |||
| 16:00–16:15 |
Ali Alamadi, Chairman - Information Security Awareness (ISA) Committee, UAE
Talk: Cyber Security in the age of Covid 19 |
Munawwar Hussain Shelia
Talk: Reverse Engineering Bare-Metal IoT Firmwares - Moving beyond Linux |
|
| 16:15–16:30 | |||
| 16:30–16:45 | |||
| 16:45–17:00 |
Tamaghna Basu, CTO, neoEYED Inc.
Talk: How I created my clone using AI - next-gen Social Engineering |
Kaustubh Padwad
Talk: Offensive Embedded Exploitation : Getting hands dirty with IOT/Embedded Device Security Testing |
|
| 17:00–17:15 | |||
| 17:15–17:30 | |||
| 17:30–17:45 |
CLOSING CEREMONY
|
CLOSING CEREMONY
|
CLOSING CEREMONY
|
| 17:45–18:00 |


Tal Catran
Amit Dubey
Jairam Ramesh
Baptiste David
Mathilde Venault




























