c0c0n 2021 Agenda
10 - 13, November
10-Nov-2021 (DAY 1), TRACK 1
10-Nov-2021 (DAY 1), TRACK 2
Most of the Web Application pen testers perform vulnerability analysis from Blackbox perspective, such approach cannot guarantee complete coverage of the vulnerabilities in the applications. It is very much important to acquire knowledge on Whitebox strategies. This workshop would be beneficial for people who would like to initiate secure code review or secure code development careers in the Java web application area.
There will be 4 sessions. In the first session, people would be developing an insecure application using servlets, JSP, JDBC and MySQL. In the second and third sessions, participants would be finding and exploiting all the top10 vulnerabilities. In the final session, participants would be writing a secure code to transform the existing insecure application to a secure application.
11:15 IST - 11.30 IST
Tea Break
13:00 IST - 14.00 IST
Lunch Break
15:45 IST - 16.00 IST
Tea Break
10-Nov-2021 (DAY 1), TRACK 3
10-Nov-2021 (DAY 1), TRACK 4
11-Nov-2021 (DAY 2), TRACK 1
10:00 IST - 12.00 IST
Coding Security Best Practices
By Viraj Gandhi , Sr Staff Product Security Engineer, SailPoint
11-Nov-2021 (DAY 2), TRACK 2
The objective of the workshop is to provide the audience about the basic understanding of Offensive and Defensive team fundamentals, different tools and technologies used and real time threat detection.
13:00 IST - 14.00 IST
Lunch Break
The objective of the workshop is to provide the audience about the basic understanding of Offensive and Defensive team fundamentals, different tools and technologies used and real time threat detection.
11-Nov-2021 (DAY 2), TRACK 4
12-Nov-2021 (DAY 3), TRACK 1
09:45 IST - 10.15 IST
INAUGURATION CEREMONY
Welcome Note & Journey of c0c0n
The General has a vast operational experience, having served across a wide spectrum of combat and conflict situations. He has commanded an Infantry Battalion along the Line of Actual Control in the Eastern Sector and a Rashtriya Rifles Sector in the Kashmir Valley. Soon thereafter, he went on to Command a Multinational Brigade in a Chapter VII Mission in the Democratic Republic of Congo (DRC). He was assigned to Command an Infantry Division along the Line of Control in Jammu and Kashmir and was Corps Commander in the North-East. As an Army Commander, he was responsible to oversee operations in the Desert sector, along the Western front.
General Rawat has held several important instructional and staff appointments. These include instructional tenures at the Indian Military Academy (Dehradun) and at the Junior Command Wing as the Senior Instructor. He was the General Staff Officer at Military Operations Directorate, the Colonel and later Deputy Military Secretary in the Military Secretary's Branch, the Major General General Staff of the Eastern Theatre and was also the Vice Chief of the Army Staff. The General was the Chief of the Army Staff from 31 Dec 2016 to 31 Dec 2019.
A graduate of the Defence Services Staff College (Wellington) and the Command and General Staff Course, Fort Leavenworth (USA). He has attended the Higher Command Course at Mhow and is a graduate of the National Defence College, New Delhi. Academically inclined, the General has authored several articles on National Security and Military Leadership which have been published in various Journals and Publications. He also holds two diplomas in Management and in Computer Studies. The General was awarded the 'Doctorate of Philosophy' (Ph.D) for his research on 'Military Media Strategic Studies' by the Chaudhary Charan Singh University, Meerut.
For the distinguished service rendered and valour displayed over the span of over 42 years of his entire service career, General Bipin Rawat has been conferred several Presidential Awards which include the PVSM, UYSM, AVSM, YSM, SM and the VSM. Besides these, he has been awarded the Chief of Army Staff Commendation on two occasions as also the Army Commander's Commendation. While serving with the UN in Congo, he was twice awarded the Force Commander's Commendation.
General Bipin Rawat was appointed India's first Chief of Defence Staff on 31 Dec 2019.
10:30 IST - 11.30 IST
[Panel] Regulating Social Media Platforms : Should it be done in Democratic Societies ?
By J Sam Daniel Stalin , Senior Television Journalist and News Anchor,
Apar Gupta , Executive Director, Internet Freedom Foundation
Dinesh O Bareja , Cyber Security Specialist & V-CISO,
Adv. (Dr.) Prashant Mali , President,Cyber Law Consulting, (Advocates & Attorneys)
Jiten Jain , Director, Voyager Infosec
13:00 IST - 13.50 IST
Lunch Break
KEY NOTE ADDRESS
Resume & Career Clinic encourages students, professionals, individuals looking forward to shift their jobs; to build a strong work profile in their respective fields. Writing a Strong Curriculum Vitae (CV) is a crucial step in every individual’s search for the right internship, job, or career. Since 2018, Nullcon has been organizing Resume & Career Clinics to help advance security professional careers. It is a space where renowned experts provide one-on-one guidance to individuals on how to improvise their resumes to make them presentable and successful by unlocking their true potential.
12-Nov-2021 (DAY 3), TRACK 2
AutoSec Village
AutoSec Village
AutoSec Village
13:30 IST - 14.00 IST
Lunch Break
AutoSec Village
AutoSec Village
12-Nov-2021 (DAY 3), TRACK 3
13:15 IST - 14.00 IST
Lunch Break
12-Nov-2021 (DAY 3), TRACK 4
Adversary Village Keynote
The modern cybersecurity landscape is an escalating arms race between attackers and defenders - attackers are constantly researching and building new techniques and tools while defenders try to identify, detect, and respond to them. Using automation tools that emulate attacker methodologies, defenders can perform simple, repeatable attacks to drive their detection engineering efforts, security validation tasks, and ultimately improve processes. This entry level class will take students through the basics of setting up and using Operator to perform basic adversary emulation tasks and investigate how that can be used to create a continuous defensive evaluation process.
Read More17:00 IST18:00 IST
Break
We all know that adversary emulation is about executing real-world TTPs to assess and improve cybersecurity. But how do we actually implement authentic TTPs, while also balancing ubiquitous project constraints such as time, budget, staff expertise, and more? This presentation will discuss how the MITRE Engenuity ATT&CK Evaluations team implements authentic adversary TTPs while balancing real-world project constraints.
13-Nov-2021 (DAY 4), TRACK 1

10:00 IST - 10.15 IST
KEYNOTE ADDRESS
By Dr. Kailasavadivoo Sivan , Chairman,Indian Space Research Organisation, Secretary DOS

10:15 IST - 10.25 IST
KEYNOTE ADDRESS
By Dr. Mohamed Al-Kuwaiti , Head of cyber Security, United Arab Emirates Government

10:25 IST - 10.30 IST
KEYNOTE ADDRESS
By H.E.Tomasz Zaleski , Chairman,Royal office of HH Sheikh Ahmed Bin, Faisal Al Qassimi, UAE

10:30 IST - 11.30 IST
Cyber Attacks & National Critical Infrastructure
By William Hagestad II, LTCOL, USMC Retired , A Simple Author, Red Dragon 1949

11:30 IST - 12.00 IST
Decoding new age hackers and Criminal Investigation
By Amit Dubey , Cyber Crime Investigator,

12:00 IST - 13.00 IST
[PANEL] - Human errors & system misconfigurations- We can handle it!
By Tal Catran [Panel Moderator] , Accelerators Guru & cyber security expert,
Amb. Dunston Pereira , Chief Operating Officer,The Royal Office of H. H Sheikh , Ahmed Bin Faisal Al Qassimi
Amit Dubey , Cyber Crime Investigator,
Angel Redoble , Chairman and Founding President,,Philippine Inst. of Cyber Security Professionals, Chairman, MVP Group Cyber Security Council
Maninder Singh , Chairman,National Council on Skill Development & Entrepreneurship, ASSOCHAM
Tulika Pandey , Director Cyber Security,Ministry of Electronics & Information Technology, Govt of India
13:00 IST - 14.00 IST
Lunch Break

14:00 IST - 14.30 IST
Building Global Cyber Security Company Out of India: Key Lessons Learnt During My Entrepreneurship Journey
By Bikash Barai , Co-founder, FireCompass

14:30 IST - 15.00 IST
Changing Cyber Security Paradigm & Cyber Tsunami
By Sunil Varkey , Vice President - Global Financial Services, Forescout Technologies Inc.

15:00 IST - 15.30 IST
Opportunities and risks of AI for busines as Digital Transformation accelerates
By John Durcan , Senior Digital,Transformation Specialist, Enterprise Ireland

15:30 IST - 16.00 IST
Emerging trends in cyber crimes : Investigation tools & techniques
By Prof. Triveni Singh, IPS , Superintendent of Police,Cyber Crimes, Uttar Pradesh Police

16:00 IST - 16.30 IST
Enhancing An Multi-Factor Authentication (MFA) through Behavioural Biometrics
By Kiran Kumar P.G. , Head of Security Advisory, Digital 14, UAE
16:30 IST - 17.00 IST
CLOSING CEREMONY
13-Nov-2021 (DAY 4), TRACK 2

10:30 IST - 11.00 IST
Public Signal Collection for ICS/OT/IOT
By Ryan Sherstobitoff , Vice President,Threat Research & Intelligence, SecurityScorecard

11:00 IST - 12.00 IST
A look into cyber-espionage activities targeting critical infrastructure in India
By Kurt Baumgartner , Principal Security Researcher,Kaspersky, GReAT, United States
Saurabh Sharma , Senior Security Researcher, Kaspersky

12:00 IST - 12.30 IST
Case study - E-crime group targeting mobile users.
By Rahul Sasi , Founder, CloudSEK

12:30 IST - 13.00 IST
Introducing Free & Open Elastic Limitless XDR
By Ravindra Ramnani , Senior Solutions Architect, Elastic
13:00 IST - 14.00 IST
Lunch Break

14:00 IST - 14.30 IST
Cyber Warfare & Securing Critical Infrastructures
By Dr. Faruk Kazi , Professor & Dean R&D, VJTI Mumbai

14:30 IST - 15.00 IST
Machine learning to detect Chia mining
By Varun Kohli , Lead Security Engineer - Machine Learning, Google

15:00 IST - 15.30 IST
Server-side javascript Injection
By Kavisha Sheth , Security Analyst, Appsecco

15:30 IST - 16:00 IST
Securing OT in O&G Industry
By George Eapen , Group Chief Information Officer, Petrofac

16:00 IST - 16:30 IST
ICS Cyber Security- Not a One size-fit all Solution
By Daniel Ehrenreich , Industrial Cyber Security Consultat, Secure communications and Control Experts
16:30 IST - 17.00 IST
CLOSING CEREMONY
13-Nov-2021 (DAY 4), TRACK 3
10:30 IST - 11.00 IST
New way of looking at the hidden mysteries in the code
By Vandana Verma Sehgal , Security Relations Leader,Snyk, India

11:00 IST - 11.30 IST
Mature Your Threat Hunting Program
By Neha Dhyani , Senior Security Consultant,VMware Carbon Black, India

11:30 IST - 12.00 IST
Exploiting 2A(Authentication and Authorization) Vulnerabilities of Web Application
By Gayatri Nayak , Associate Consultant,Synopsys, India

12:00 IST - 12.30 IST
Cloud Threat landscape
By Gunjan Chhillar , Corporate Sales Engineer,Crowdstrike, India

12:30 IST - 13.00 IST
Connecting the dots between customers and security teams
By Shruthi Kamath , Customer Success Manager, Appsecco

13:00 IST - 13.15 IST
Who is the child? How can we help? On child sexual exploitation material and our responsibility.
By Cecilia WALLIN , Former Criminal Intelligence Officer,Specialist advisor child sexual exploitation material, INTERPOL CRIMES AGAINST CHILDREN

13:15 IST - 13.30 IST
Cybersecurity in the era of Resilience - A walk through people, process and technology
By Babitha BP , Chief Information Security Officer, CSB Bank Ltd
13:30 IST - 14.00 IST
Break
16:30 IST - 17.00 IST
CLOSING CEREMONY
13-Nov-2021 (DAY 4), TRACK 4

10:30 IST11:00 IST
Case Study - Cyber Heist in a Bank and Recovery of Systems and Money
By Prashant Choudhary , Partner, Cybersecurity EY

11:00 IST11:30 IST
Post pandemic Transformation - A CISO's perspective
By Sridhar Govardhan , Industry expert, Mentor,,Faculty in, Specialized Training Institutes and University

11:30 IST12:00 IST
Zero Trust & Micro-segmentation
By Suresh Menon , Managing Partner, Leonis Consultancy LLP

12:10 IST12:40 IST
Third Party Risk Management
By Dr. Mahesh Kalyanaraman , Associate Vice President, Risk & Compliance, HCL Technologies Limited
12:30 IST14:30 IST
Break
This talk will be discussing Light Basin activity cluster which is consistently targeting telecom networks. This talk will be based on research done by Crowd Strike Team. The talk will explain how a team of threat actors targeted telecom network and how did lateral movement using GTP protocols.
As the attacker's are upping the ante by conducting sophisticated cyber attacks, defenders need to keep pace to defend their organizations and protect their crown-jewels from such advanced attackers. In this presentation, we will be looking at discussing how organizations can ramp up the defenses by emulating the adversaries by integrating basic "Red, Blue and Purple" team techniques to fortify their security posture.