annual - All Articles - CISO Platform2024-03-29T07:41:20Zhttps://www.cisoplatform.com/profiles/blogs/feed/tag/annual(Free PPTs) Top Talks @ SACON - 2020 !https://www.cisoplatform.com/profiles/blogs/free-ppts-top-talks-sacon-20202020-03-03T11:00:00.000Z2020-03-03T11:00:00.000Zprithahttps://www.cisoplatform.com/members/pritha<div><p>Get free access to the presentations by <span>Gregory Pickett </span>, <span>Nandan Nilekani</span>, <span>Andrea Marcelli</span>, <span>James Stanger</span>, <span>Jim Hietala</span>, <span>Shivangi Nadkarni</span>, <span>Monojit Choudhury</span>, <span>Srinivas Poosarla</span> & more. SACON is one of the largest Security Architecture Conferences in APAC region. With over 600+ participants, this was the 7th edition of SACON and here are a few highlights we wanted to share with you. It was held on 21-22nd Feb, Bangalore, India. All sessions were workshop style with 3-4 hours or 6-8 hours of hands on training.</p>
<p><a href="{{#staticFileLink}}8669830882,original{{/staticFileLink}}" target="_blank"><img src="{{#staticFileLink}}8669830882,original{{/staticFileLink}}" width="570" height="299" class="align-center" alt="8669830882?profile=original" /></a></p>
<p style="text-align:left;">We had with us Top Security Industry Leaders who helped SACON with great content. For more details & to pre-register for next year visit: <a href="http://sacon.io/" target="_blank">sacon.io</a></p>
<p style="text-align:left;"></p>
<p style="text-align:left;"></p>
<p style="text-align:left;"><span class="font-size-6" style="font-size:18pt;">01.</span> <span style="font-size:18pt;"><span class="font-size-6">Adventures in SDN Security </span>(Gregory Pickett)</span></p>
<p style="text-align:left;"><span style="font-size:10pt;"><span>This session is b</span></span><span>ased on a recent talk of mine on SDN and 5G, this will be a deep dive into the Software Defined Network (SDN) side of things. We will hit SDN and hit it hard. After a rundown of recent work in SD-WAN, I will return to where it all started with the Software Defined Data Center (SDDC). Briefly reviewing my previous work with open source controllers and white box switches, we will take a look at my recent work with Cisco’s APIC and Big Switch Network’s Big Switch Fabric. This will be a deeply technical talk where we will cover the risks, the threats, and the attacks useful against SDN. Most importantly, we will talk about how to secure it. Because if your network isn’t safe, neither are you.</span></p>
<p><iframe src="//www.slideshare.net/slideshow/embed_code/key/qfJL4wiaNqzyAS" width="595" height="485" frameborder="0" allowfullscreen=""></iframe>
</p>
<div style="margin-bottom:5px;"><strong><a href="//www.slideshare.net/cisoplatform7/sacon-2020-adventures-in-sdn-security" title="(SACON 2020) Adventures In SDN Security" target="_blank">(SACON 2020) Adventures In SDN Security</a></strong> from <strong><a href="https://www.slideshare.net/cisoplatform7" target="_blank">Priyanka Aash</a></strong></div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"><p style="text-align:center;"><span style="font-size:14pt;"><strong><a href="https://www.sacon.io/" target="_blank">>> Pre-Register for SACON 2021</a></strong></span></p>
<a href="https://www.sacon.io/" target="_blank"><img src="{{#staticFileLink}}8669830694,original{{/staticFileLink}}" width="414" class="align-center" alt="8669830694?profile=original" /></a></div>
<div style="margin-bottom:5px;"> </div>
<div style="margin-bottom:5px;"> </div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"><br /> <br /><p><span><span class="font-size-6" style="font-size:18pt;">02.</span> <span style="font-size:18pt;">Windows Malware 101: Reverse Engineering and Signature Generation<span class="font-size-6"> </span>(Andrea Marcelli)</span></span></p>
<p><span>This session is about workshop which cover some key topics of Windows malware reverse engineering, starting from the basics of the Windows executable file format up to the modern techniques and FOSS services to analyze malware samples at scale. Finally, it will cover the basics of malware signatures, and it will present a tool, YaYaGenPE, to automatically generate them. During the workshop, Python notebooks and other FOSS tools will be used to show an interactive analysis of some recent Windows malware samples.</span></p>
</div>
<div style="margin-bottom:5px;"><strong><Speaker will share modified version of slide post online session with attendees><a href="https://www.slideshare.net/cisoplatform7" target="_blank"></a></strong></div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"><p style="text-align:center;"><span style="font-size:14pt;"><strong><a href="https://www.sacon.io/" target="_blank">>> Pre-Register for SACON 2021</a></strong></span></p>
<strong><a href="https://www.sacon.io/" target="_blank"><img src="{{#staticFileLink}}8669830694,original{{/staticFileLink}}" width="414" class="align-center" alt="8669830694?profile=original" /></a></strong></div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"> </div>
<div style="margin-bottom:5px;"> </div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"><br /> <br /><p><span style="font-size:14pt;">03.</span><span style="font-size:14pt;"> </span><span style="font-size:18pt;">Zero Trust Architecture: From Hype to Reality<span class="font-size-6"> </span>(Jim Hietala)</span></p>
<p><span style="font-size:10pt;">This session is understanding about </span>Zero Trust Architecture and strategies to secure corporate assets. ZTA may allow us to create more enduring security architectures, with less entropy vs. today's security architectures. However, lack of enabling standards is causing confusion about what ZTA is and vendor hype isn't helping either. This session will describe the current state of ZTA, and standards initiatives that may help bring clarity and reduce barriers to adoption.</p>
</div>
<p><iframe src="//www.slideshare.net/slideshow/embed_code/key/IkgXiT9bLmJh76" width="595" height="485" frameborder="0" allowfullscreen=""></iframe>
</p>
<div style="margin-bottom:5px;"><strong><a href="//www.slideshare.net/cisoplatform7/sacon-jim-hietala-zero-trust-architecture-from-hype-to-reality" title="(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality" target="_blank">(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality</a></strong> from <strong><a href="https://www.slideshare.net/cisoplatform7" target="_blank">Priyanka Aash</a></strong></div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"><div><p style="text-align:center;"><span style="font-size:14pt;"><strong><a href="https://www.sacon.io/" target="_blank">>> Pre-Register for SACON 2021</a></strong></span></p>
<strong><a href="https://www.sacon.io/" target="_blank"><img src="{{#staticFileLink}}8669830694,original{{/staticFileLink}}" width="414" class="align-center" alt="8669830694?profile=original" /></a></strong></div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"> </div>
<div style="margin-bottom:5px;"> </div>
<div style="margin-bottom:5px;"><br /> <br /><div><span style="font-size:14pt;">04.</span> <span style="font-size:18pt;">Surfing today’s emerging tech: A policy-based approach (Dr. James Stanger)</span></div>
<div><p><span>This session talk focuses on managing cybersecurity issues that surround today’s implementations of emerging technology, including shadow IT</span></p>
<p><iframe src="//www.slideshare.net/slideshow/embed_code/key/JPoigfraeVyGDH" width="595" height="485" frameborder="0" allowfullscreen=""></iframe>
</p>
</div>
</div>
<div style="margin-bottom:5px;"><strong><a href="//www.slideshare.net/cisoplatform7/sacon-dr-james-stanger-surfing-todays-emerging-tech-a-policybased-approach" title="(SACON) Dr. James Stanger - Surfing today’s emerging tech: A policy-based approach" target="_blank">(SACON) Dr. James Stanger - Surfing today’s emerging tech: A policy-based approach</a></strong> from <strong><a href="https://www.slideshare.net/cisoplatform7" target="_blank">Priyanka Aash</a></strong></div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"><p style="text-align:center;"><span style="font-size:14pt;"><strong><a href="https://www.sacon.io/" target="_blank">>> Pre-Register for SACON 2021</a></strong></span></p>
<strong><a href="https://www.sacon.io/" target="_blank"><img src="{{#staticFileLink}}8669830694,original{{/staticFileLink}}" width="414" class="align-center" alt="8669830694?profile=original" /></a></strong></div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"> </div>
<div style="margin-bottom:5px;"> </div>
<div style="margin-bottom:5px;"></div>
<br />
<div style="margin-bottom:5px;"><span style="font-size:14pt;">05.</span><strong><span> </span></strong><span style="font-size:18pt;">Identity Payments and Data Empowerment (Nandan Nilekani)</span></div>
<div style="margin-bottom:5px;">This session is about Identity Payments and Data Empowerment Addressing Different challenges, Solving the Challenges, Payment challenges, Data Sharing and Privacy Challenges. <br /> Putting in perspective: Innovation in digital age.</div>
<p><iframe src="//www.slideshare.net/slideshow/embed_code/key/FJ5qwj7oFBzn1U" width="595" height="485" frameborder="0" allowfullscreen=""></iframe>
</p>
<div style="margin-bottom:5px;"><strong><a href="//www.slideshare.net/cisoplatform7/sacon-nandan-nilekani-identity-payments-and-data-empowerment" title="(SACON) Nandan Nilekani - Identity Payments and Data Empowerment " target="_blank">(SACON) Nandan Nilekani - Identity Payments and Data Empowerment </a></strong> from <strong><a href="https://www.slideshare.net/cisoplatform7" target="_blank">Priyanka Aash</a></strong></div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"><p style="text-align:center;"><span style="font-size:14pt;"><strong><a href="https://www.sacon.io/" target="_blank">>> Pre-Register for SACON 2021</a></strong></span></p>
<strong><a href="https://www.sacon.io/" target="_blank"><img src="{{#staticFileLink}}8669830694,original{{/staticFileLink}}" width="414" class="align-center" alt="8669830694?profile=original" /></a></strong></div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"></div>
</div>
<div style="margin-bottom:5px;"> </div>
<div style="margin-bottom:5px;"><br /> <br /><div style="margin-bottom:5px;"><span style="font-size:18pt;"><span style="font-size:14pt;">06</span>. Evolution Of AI : Past, Present, Future (<span>Dr. Monojit Choudhury)</span></span></div>
<div style="margin-bottom:5px;">This session is about AI and how AI revolutionized almost every aspect of human lives - from healthcare to agriculture, and from fashion to political campaigns. There is a lot of excitement as well as fear around the future promises of AI. Yet, speculations abound that we are soon going to hit the third AI winter. In this talk, I will try to address some these questions and speculations. I will use examples from the domain of Natural language processing (NLP) - allegedly one of the hardest areas of AI - to illustrate what we have achieved, what are the promises offered by the recent advances in deep learning and why there are certain problems that are too difficult for any of the current approaches to handle. I will also highlight the non-AI aspects of AI system building (aka data creation and engineering) which are the unsung foundations of most practical AI systems.</div>
<p><iframe src="//www.slideshare.net/slideshow/embed_code/key/ka5WVWmGQnYIUs" width="595" height="485" frameborder="0" allowfullscreen=""></iframe>
</p>
<div style="margin-bottom:5px;"><strong><a href="//www.slideshare.net/cisoplatform7/sacon-dr-monojit-choudhury-evolution-of-ai-past-present-future" title="(SACON) Dr. Monojit Choudhury - Evolution Of AI : Past, Present, Future" target="_blank">(SACON) Dr. Monojit Choudhury - Evolution Of AI : Past, Present, Future</a></strong> from <strong><a href="https://www.slideshare.net/cisoplatform7" target="_blank">Priyanka Aash</a></strong></div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"><p style="text-align:center;"><span style="font-size:14pt;"><strong><a href="https://www.sacon.io/" target="_blank">>> Pre-Register for SACON 2021</a></strong></span></p>
<strong><a href="https://www.sacon.io/" target="_blank"><img src="{{#staticFileLink}}8669830694,original{{/staticFileLink}}" width="414" class="align-center" alt="8669830694?profile=original" /></a></strong></div>
<div style="margin-bottom:5px;"></div>
</div>
<div style="margin-bottom:5px;"> </div>
<div style="margin-bottom:5px;"><br /> <br /><div style="margin-bottom:5px;"><span style="font-size:14pt;">07.</span><strong><span> </span></strong><span style="font-size:18pt;">Attack vectors of Kubernetes infra. Are we on right path of securing it? (Anand Tapikar)</span></div>
<div style="margin-bottom:5px;"><p>This session is about understanding Kubernetes(K8s). Kubernetes is an open-source system for automating deployment, scaling, and management of containerized applications. K8s groups containers that make up an application into logical units for easy management and discovery. It was originally designed by Google and is now maintained by the Cloud Native Computing Foundation. As organizations accelerate their adoption of containers and container orchestrators, they will need to take necessary steps to protect such a critical part of their compute infrastructure.</p>
<p>How this topic is relevant 1 out of 5 organization going for container installation Container security attack vectors are rising Recently major vulnerability discovered in containers and got good media attention Duration (Mentioned on sacon.io, if not as per program committee call).</p>
</div>
<p><iframe src="//www.slideshare.net/slideshow/embed_code/key/4E4YIzVwGc6LHa" width="595" height="485" frameborder="0" allowfullscreen=""></iframe>
</p>
<div style="margin-bottom:5px;"><strong><a href="//www.slideshare.net/cisoplatform7/attack-vectors-of-kubernetes-infra-are-we-on-right-path-of-securing-it" title="(SACON) Anand Tapikar - Attack vectors of Kubernetes infra. Are we on right path of securing it?" target="_blank">(SACON) Anand Tapikar - Attack vectors of Kubernetes infra. Are we on right path of securing it?</a></strong> from <strong><a href="https://www.slideshare.net/cisoplatform7" target="_blank">Priyanka Aash</a></strong></div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"><div><p style="text-align:center;"><span style="font-size:14pt;"><strong><a href="https://www.sacon.io/" target="_blank">>> Pre-Register for SACON 2021</a></strong></span></p>
<strong><a href="https://www.sacon.io/" target="_blank"><img src="{{#staticFileLink}}8669830694,original{{/staticFileLink}}" width="414" class="align-center" alt="8669830694?profile=original" /></a></strong></div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"><div style="margin-bottom:5px;"> </div>
<div style="margin-bottom:5px;"> </div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"><div><span style="font-size:14pt;">08.</span> <span style="font-size:18pt;">Hacking and Securing Kubernetes and Dockers in Cloud - Hands-on (Apoorv Raj Saxena)</span></div>
<div>This sessison is based on recent research of mine this will be a Hands-on demonstration of Docker and Kubernetes exploitation and a deep dive on how to achieve remote code execution through low hanging fruits of docker and Kubernetes.</div>
</div>
<p><iframe src="//www.slideshare.net/slideshow/embed_code/key/3tVCKAo7chXmla" width="595" height="485" frameborder="0" allowfullscreen=""></iframe>
</p>
<div style="margin-bottom:5px;"><strong><a href="//www.slideshare.net/cisoplatform7/sacon-apoorv-raj-saxena-hacking-and-securing-kubernetes-and-dockers-in-cloud-handson" title="(SACON) Apoorv Raj Saxena - Hacking and Securing Kubernetes and Dockers in Cloud - Hands-on" target="_blank">(SACON) Apoorv Raj Saxena - Hacking and Securing Kubernetes and Dockers in Cloud - Hands-on</a></strong> from <strong><a href="https://www.slideshare.net/cisoplatform7" target="_blank">Priyanka Aash</a></strong></div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"><div><p style="text-align:center;"><span><span style="font-size:14pt;"><strong><a href="https://www.sacon.io/" target="_blank">>> Pre-Register for SACON</a></strong> <a href="https://www.sacon.io/" target="_blank">2021</a></span><a href="https://www.sacon.io/" target="_blank"></a></span></p>
<br /> <strong><a href="https://www.sacon.io/" target="_blank"><img src="{{#staticFileLink}}8669830694,original{{/staticFileLink}}" width="414" class="align-center" alt="8669830694?profile=original" /></a></strong></div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"> </div>
<div style="margin-bottom:5px;"> </div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"><div><span style="font-size:14pt;">09. </span><span style="font-size:18pt;">On The Wings of Time: Past, Present and Future of Radio Communication (Harshit Agrawal)</span></div>
<div>This session is about Radio Communication. Recent years have seen a flood of novel wireless exploits, from vulnerable medical devices to hacked OT devices, with exploitation moving beyond 802.11 and into more obscure standard and proprietary protocols. While other non-WiFi RF protocols remain a mystery to many security practitioners, exploiting them is easier than one might think. Today, cyber threats have grown not just in its depth (more sophisticated) but also in its breadth (expanded scope). It has grown from threats in Enterprise IT systems to Operation Technologies (OT) and Industrial Control Systems (ICS).</div>
</div>
<p><iframe src="//www.slideshare.net/slideshow/embed_code/key/A1uw4t4IXAWZcl" width="595" height="485" frameborder="0" allowfullscreen=""></iframe>
</p>
<div style="margin-bottom:5px;"><strong><a href="//www.slideshare.net/cisoplatform7/sacon-harshit-agrawal-on-the-wings-of-time-past-present-and-future-of-radio-communication" title="(SACON) Harshit Agrawal - On The Wings of Time: Past, Present and Future of Radio Communication" target="_blank">(SACON) Harshit Agrawal - On The Wings of Time: Past, Present and Future of Radio Communication</a></strong> from <strong><a href="https://www.slideshare.net/cisoplatform7" target="_blank">Priyanka Aash</a></strong></div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"><div><p style="text-align:center;"><span><span style="font-size:14pt;"><strong><a href="https://www.sacon.io/" target="_blank">>> Pre-Register for SACON</a></strong> <a href="https://www.sacon.io/" target="_blank">2021</a></span><a href="https://www.sacon.io/" target="_blank"></a></span></p>
<strong><a href="https://www.sacon.io/" target="_blank"><img src="{{#staticFileLink}}8669830694,original{{/staticFileLink}}" width="414" class="align-center" alt="8669830694?profile=original" /></a></strong></div>
</div>
</div>
</div>
</div>
</div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"> </div>
<div style="margin-bottom:5px;"> </div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"><span style="font-size:14pt;">10. </span> <span style="font-size:18pt;">How does an attacker know everything about your organization? - Know the Unknowns (Nilanjan, Jitendra chauhan & Abhisek Datta)</span></div>
<div style="margin-bottom:5px;">This session is understanding about know the unknowns. It is possible to create a comprehensive attack surface of any organizations just with open data available on the public internet It is possible to search vulnerable targets and compromise the targets. The organizations can be compromised without any RCE vulnerability. It is possible to create inhouse team to continuously monitor your attack surface and fix flaws before attackers find them.</div>
<p><iframe src="//www.slideshare.net/slideshow/embed_code/key/b8rhnfXZhJNoLQ" width="595" height="485" frameborder="0" allowfullscreen=""></iframe>
</p>
<div style="margin-bottom:5px;"><strong><a href="//www.slideshare.net/cisoplatform7/sacon-nilanjan-jitendra-chauhan-abhisek-datta-how-does-an-attacker-know-everything-about-your-organization-know-the-unknowns" title="(SACON) Nilanjan, Jitendra chauhan & Abhisek Datta - How does an attacker know everything about your organization? - Know the Unknowns" target="_blank">(SACON) Nilanjan, Jitendra chauhan & Abhisek Datta - How does an attacker know everything about your organization? - Know the Unknowns</a></strong> from <strong><a href="https://www.slideshare.net/cisoplatform7" target="_blank">Priyanka Aash</a></strong></div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"><div><div><div><div><div><div><p style="text-align:center;"><span><span style="font-size:14pt;"><strong><a href="https://www.sacon.io/" target="_blank">>> Pre-Register for SACON</a> </strong><a href="https://www.sacon.io/" target="_blank">2021</a></span><a href="https://www.sacon.io/" target="_blank"></a></span></p>
<strong><a href="https://www.sacon.io/" target="_blank"><img src="{{#staticFileLink}}8669830694,original{{/staticFileLink}}" width="414" class="align-center" alt="8669830694?profile=original" /></a></strong></div>
</div>
</div>
</div>
</div>
</div>
</div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"> </div>
<div style="margin-bottom:5px;"> </div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"><span style="font-size:14pt;">11.</span><span style="font-size:18pt;"><span style="font-size:14pt;"> </span>Quantum safe Networks (M T Karunakaran)</span></div>
<div style="margin-bottom:5px;">This session is about Quantum Safe Networks. Quantum computers are becoming a reality.<br /> The classical key distrbution algorithms,based oncomputational complexity are under threat.</div>
<p><iframe src="//www.slideshare.net/slideshow/embed_code/key/KejM39pEfAocIQ" width="595" height="485" frameborder="0" allowfullscreen=""></iframe>
</p>
<div style="margin-bottom:5px;"><strong><a href="//www.slideshare.net/cisoplatform7/sacon-m-t-karunakaran-quantum-safe-networks" title="(SACON) M T Karunakaran - Quantum safe Networks" target="_blank">(SACON) M T Karunakaran - Quantum safe Networks</a></strong> from <strong><a href="https://www.slideshare.net/cisoplatform7" target="_blank">Priyanka Aash</a></strong></div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"><div><div><div><div><div><div><div><p style="text-align:center;"><span><span style="font-size:14pt;"><strong><a href="https://www.sacon.io/" target="_blank">>> Pre-Register for SACON</a> </strong><a href="https://www.sacon.io/" target="_blank">2021</a></span><a href="https://www.sacon.io/" target="_blank"></a></span></p>
<strong><a href="https://www.sacon.io/" target="_blank"><img src="{{#staticFileLink}}8669830694,original{{/staticFileLink}}" width="414" class="align-center" alt="8669830694?profile=original" /></a></strong></div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"> </div>
<div style="margin-bottom:5px;"> </div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"><span style="font-size:14pt;">12.</span> <span style="font-size:18pt;">Practical Exploitation of IoT Networks and Ecosystems workshop (Nitin Lakshmanan & Sanjay V)</span></div>
<div style="margin-bottom:5px;">The session is about understanding IoT Networks and Ecosystems. Internet of Things (IoT) market today is defined by product manufacturers pushing a broad spectrum of computing devices out to the hands of consumers at an ever-increasing pace, and connecting them to the Internet. They are in a rush to hit the market shelves before their competitors and they often marginalize security. In this workshop, we offer hands-on training for pentesting and hardening IoT ecosystems, with special focus on popular communication protocols such as Zigbee, Bluetooth & BLE, as well as Device - Mobile - Cloud security topics. Students will learn about weaknesses in consumer IoT devices (wearables) paired with mobile ecosystems (Android & iOS) — how information theft is scarily easy, and what steps can be taken to harden these designs.We conclude with defensive security best practices and next generation SDLC for the products of tomorrow.</div>
<div style="margin-bottom:5px;"><iframe src="//www.slideshare.net/slideshow/embed_code/key/bYiuyqMDki0imi" width="595" height="485" frameborder="0" allowfullscreen=""></iframe>
<div style="margin-bottom:5px;"><strong><a href="//www.slideshare.net/cisoplatform7/sacon-2020-practical-exploitation-of-iot-networks-and-ecosystems-workshop" title="(SACON 2020) Practical Exploitation of IoT Networks and Ecosystems workshop" target="_blank">(SACON 2020) Practical Exploitation of IoT Networks and Ecosystems workshop</a></strong> from <strong><a href="https://www.slideshare.net/cisoplatform7" target="_blank">Priyanka Aash</a></strong></div>
</div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;text-align:center;"><span style="font-size:14pt;"><strong><a href="https://www.sacon.io/" target="_blank">>> Pre-Register for SACON</a> <a href="https://www.sacon.io/" target="_blank">2021</a></strong></span></div>
<div style="margin-bottom:5px;"><strong><a href="https://www.sacon.io/" target="_blank"><img src="{{#staticFileLink}}8669830694,original{{/staticFileLink}}" width="414" class="align-center" alt="8669830694?profile=original" /></a></strong></div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"> </div>
<div style="margin-bottom:5px;"> </div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"><span style="font-size:14pt;">13.</span> <span style="font-size:18pt;">Metron & Blitz, Building and scaling your own Open Source SIEM & SOAR (Pradyumn Nand & Mrinal Pande)</span></div>
<div style="margin-bottom:5px;">The session is about SIEM & SOAR. Open Source technologies are being widely adopted to help SOC / DevSecOps teams in day to day operations. We'll be showcasing how we've built our SIEM using Apache Metron with a custom SOAR layer - Blitz over it to alert and respond to threats in real time. We'll deep dive into the architecture of both platforms and demonstrate various use cases covering cloud infra, endpoint devices, outbound traffic and perimeter security threats. We'll also present how to automate remediation to alerts and scale the setup for orchestration and threat hunting.</div>
<p><iframe src="//www.slideshare.net/slideshow/embed_code/key/xRIo7jtWzcTB2T" width="595" height="485" frameborder="0" allowfullscreen=""></iframe>
</p>
<div style="margin-bottom:5px;"><strong><a href="//www.slideshare.net/cisoplatform7/sacon-pradyumn-nand-mrinal-pande-metron-blitz-building-and-scaling-your-own-open-source-siem-soar" title="(SACON) Pradyumn Nand & Mrinal Pande - Metron & Blitz, Building and scaling your own Open Source SIEM & SOAR" target="_blank">(SACON) Pradyumn Nand & Mrinal Pande - Metron & Blitz, Building and scaling your own Open Source SIEM & SOAR</a></strong> from <strong><a href="https://www.slideshare.net/cisoplatform7" target="_blank">Priyanka Aash</a></strong></div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"><div style="text-align:center;"><span style="font-size:14pt;"><strong><a href="https://www.sacon.io/" target="_blank">>> Pre-Register for SACON</a> <a href="https://www.sacon.io/" target="_blank">2021</a></strong></span></div>
<div><strong><a href="https://www.sacon.io/" target="_blank"><img src="{{#staticFileLink}}8669830694,original{{/staticFileLink}}" width="414" class="align-center" alt="8669830694?profile=original" /></a></strong></div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"> </div>
<div style="margin-bottom:5px;"> </div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"><div><span style="font-size:14pt;">14.</span> <span style="font-size:18pt;">DevSecOps Tools and Beyond (<span>Satish Sreenivasaiah)</span></span></div>
<div>This session will provide details on the usage of OSS tools to secure your dev and ops lifecycle. It covers tools used in application, host and network security assessments for both monolithic and Microservices based architectures. The session also covers usage of OSS tools for runtime application self-protection. Apart from tools in development phase, the session provides insights on building secure design into the product via threat modeling tool.</div>
<iframe src="//www.slideshare.net/slideshow/embed_code/key/EcbuI0okYt1IUv" width="595" height="485" frameborder="0" allowfullscreen=""></iframe>
<div style="margin-bottom:5px;"><strong><a href="//www.slideshare.net/cisoplatform7/sacon-satish-sreenivasaiah-devsecops-tools-and-beyond-229315275" title="(SACON) Satish Sreenivasaiah - DevSecOps Tools and Beyond" target="_blank">(SACON) Satish Sreenivasaiah - DevSecOps Tools and Beyond</a></strong> from <strong><a href="https://www.slideshare.net/cisoplatform7" target="_blank">Priyanka Aash</a></strong></div>
</div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"><div style="text-align:center;"><span style="font-size:14pt;"><strong><a href="https://www.sacon.io/" target="_blank">>> Pre-Register for SACON</a> <a href="https://www.sacon.io/" target="_blank">2021</a></strong></span></div>
<div><strong><a href="https://www.sacon.io/" target="_blank"><img src="{{#staticFileLink}}8669830694,original{{/staticFileLink}}" width="414" class="align-center" alt="8669830694?profile=original" /></a></strong></div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"> </div>
<div style="margin-bottom:5px;"> </div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"><div><span style="font-size:14pt;">15.</span> <span style="font-size:18pt;">An introduction to Data Privacy (Shivangi Nadkarni & Sandeep Rao)</span></div>
<div>This session is about Introduction to Data Privacy. Data Privacy & Personal Data Protection has become a key driver today in dialogues involving data. India is at the cusp of getting its own law in place - one of the last few countries in the world to do so. However, the reality on the ground is that few people really understand what Data Privacy is all about. It is often confused with Data Security. This session seeks to de-mystify Data Privacy, giving an overview of the domain and how it is different from Data Security.</div>
</div>
<p><iframe src="//www.slideshare.net/slideshow/embed_code/key/6BvIplKV7sYMQ2" width="595" height="485" frameborder="0" allowfullscreen=""></iframe>
</p>
<div style="margin-bottom:5px;"><strong><a href="//www.slideshare.net/cisoplatform7/sacon-shivangi-nadkarni-sandeep-rao-an-introduction-to-data-privacy" title="(SACON) Shivangi Nadkarni & Sandeep Rao - An introduction to Data Privacy" target="_blank">(SACON) Shivangi Nadkarni & Sandeep Rao - An introduction to Data Privacy</a></strong> from <strong><a href="https://www.slideshare.net/cisoplatform7" target="_blank">Priyanka Aash</a></strong></div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"><div style="text-align:center;"><span style="font-size:14pt;"><strong><a href="https://www.sacon.io/" target="_blank">>> Pre-Register for SACON</a> <a href="https://www.sacon.io/" target="_blank">2021</a></strong></span></div>
<div><strong><a href="https://www.sacon.io/" target="_blank"><img src="{{#staticFileLink}}8669830694,original{{/staticFileLink}}" width="414" class="align-center" alt="8669830694?profile=original" /></a></strong></div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"> </div>
<div style="margin-bottom:5px;"> </div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"><div><span style="font-size:18pt;"><span style="font-size:14pt;">16.</span> Personal Data Discovery & Mapping - Challenges faced, Methodologies & Tools employed (Ramkumar Narayanan)</span></div>
<div>This session is about how to implement any privacy program in any organization - big or small - the foundational step is to understand what Personal Data an organization deals with, where it lies, how it flows (within & outside the organization), who does what with that data, what are the underlying assets involved, etc. Without this foundation, the organization cannot build the necessary controls required to implement and manage Privacy. However, this is not an easy probem to address. This session does a deep dive into the challenges faced, the methodologies used and tools that can be employed to build AND sustain an organization's data map.</div>
<iframe src="//www.slideshare.net/slideshow/embed_code/key/17gKp9eNO9Pceh" width="595" height="485" frameborder="0" allowfullscreen=""></iframe>
<div style="margin-bottom:5px;"><strong><a href="//www.slideshare.net/cisoplatform7/sacon-ramkumar-narayanan-personal-data-discovery-mapping-challenges-faced-methodologies-tools-employed-229314974" title="(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges faced, Methodologies & Tools employed" target="_blank">(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges faced, Methodologies & Tools employed</a></strong> from <strong><a href="https://www.slideshare.net/cisoplatform7" target="_blank">Priyanka Aash</a></strong></div>
</div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"><div style="text-align:center;"><span style="font-size:14pt;"><strong><a href="https://www.sacon.io/" target="_blank">>> Pre-Register for SACON</a> <a href="https://www.sacon.io/" target="_blank">2021</a></strong></span></div>
<div><strong><a href="https://www.sacon.io/" target="_blank"><img src="{{#staticFileLink}}8669830694,original{{/staticFileLink}}" width="414" class="align-center" alt="8669830694?profile=original" /></a></strong></div>
</div>
</div>
</div>
</div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"> </div>
<div style="margin-bottom:5px;"> </div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"><span style="font-size:14pt;">17. </span> <span style="font-size:18pt;">India's Personal Data Protection Bill - an overview (Aaron kamath)</span></div>
<div style="margin-bottom:5px;">This Session is to understand an overview about India's Personal Data Protection Bill. India's Personal Data Protection Bill (PDPB) has been in the news for a while now. One of the most awaited legislations around the world, the bill has intoduced many new ideas which are different from other legislations like the EU GDPR,etc. The bill has also raised many controversies and debates both in India and globally. This session focuses on what the India PDPB is all about.</div>
<p><iframe src="//www.slideshare.net/slideshow/embed_code/key/jsLoZAy9rv9ZmR" width="595" height="485" frameborder="0" allowfullscreen=""></iframe>
</p>
<div style="margin-bottom:5px;"><strong><a href="//www.slideshare.net/cisoplatform7/saocn-aaron-kamath-indias-personal-data-protection-bill-an-overview" title="(SAOCN) Aaron kamath - India's Personal Data Protection Bill - an overview" target="_blank">(SAOCN) Aaron kamath - India's Personal Data Protection Bill - an overview</a></strong> from <strong><a href="https://www.slideshare.net/cisoplatform7" target="_blank">Priyanka Aash</a></strong></div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"><div style="text-align:center;"><span style="font-size:14pt;"><strong><a href="https://www.sacon.io/" target="_blank">>> Pre-Register for SACON</a> <a href="https://www.sacon.io/" target="_blank">2021</a></strong></span></div>
<div><strong><a href="https://www.sacon.io/" target="_blank"><img src="{{#staticFileLink}}8669830694,original{{/staticFileLink}}" width="414" class="align-center" alt="8669830694?profile=original" /></a></strong></div>
</div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"> </div>
<div style="margin-bottom:5px;"> </div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"><span style="font-size:14pt;">18.</span> <span style="font-size:18pt;">Implementing a Privacy Program in a large Conglomerate: Challenges & Learnings (Gauri Vishwas)</span></div>
<div style="margin-bottom:5px;">This session is to understand what the various applicable Privacy laws & standards require an organization to do and another thing to actually implement a program to deliver on this requirement within the organization. Data Privacy programs cut across almost all functions & teams in an organization - all of whom need to work in sync to 'make it all happen'. When it is a large conglomerate spanning multiple countries and entities, this challenge is further amplified. This session discusses these real life issues and challenges.</div>
<p><iframe src="//www.slideshare.net/slideshow/embed_code/key/2ikYYU9qK0421E" width="595" height="485" frameborder="0" allowfullscreen=""></iframe>
</p>
<div style="margin-bottom:5px;"><strong><a href="//www.slideshare.net/cisoplatform7/sacon-gauri-vishwas-implementing-a-privacy-program-in-a-large-conglomerate-challenges-learnings-229294198" title="(SACON) Gauri Vishwas - Implementing a Privacy Program in a large Conglomerate: Challenges & Learnings" target="_blank">(SACON) Gauri Vishwas - Implementing a Privacy Program in a large Conglomerate: Challenges & Learnings</a></strong> from <strong><a href="https://www.slideshare.net/cisoplatform7" target="_blank">Priyanka Aash</a></strong></div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"><div style="text-align:center;"><span style="font-size:14pt;"><strong><a href="https://www.sacon.io/" target="_blank">>> Pre-Register for SACON</a> <a href="https://www.sacon.io/" target="_blank">2021</a></strong></span></div>
<div><strong><a href="https://www.sacon.io/" target="_blank"><img src="{{#staticFileLink}}8669830694,original{{/staticFileLink}}" width="414" class="align-center" alt="8669830694?profile=original" /></a></strong></div>
</div>
<div style="margin-bottom:5px;"> </div>
<div style="margin-bottom:5px;"> </div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"><span style="font-size:14pt;">19.</span> <span style="font-size:18pt;">Implementing a Privacy Program in an SME Organization: Challenges & Learnings (Apurva Mankad)</span></div>
<div style="margin-bottom:5px;">This session Most discuss around Privacy & its implementation focus on large organizations. However, small organizations also need to implement Data Privacy. And their challenges are very different. Small Teams, limited budgets & other constraints are a reality. This session has the founder & CEO of one such organization share his experience & learnings.</div>
<p><iframe src="//www.slideshare.net/slideshow/embed_code/key/5iWDfjI7yfX8KN" width="595" height="485" frameborder="0" allowfullscreen=""></iframe>
</p>
<div style="margin-bottom:5px;"><strong><a href="//www.slideshare.net/cisoplatform7/sacon-apurva-mankad-implementing-a-privacy-program-in-an-sme-organization-challenges-learnings" title="(SACON) Apurva Mankad - Implementing a Privacy Program in an SME Organization: Challenges & Learnings" target="_blank">(SACON) Apurva Mankad - Implementing a Privacy Program in an SME Organization: Challenges & Learnings</a></strong> from <strong><a href="https://www.slideshare.net/cisoplatform7" target="_blank">Priyanka Aash</a></strong></div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"><div style="text-align:center;"><span style="font-size:14pt;"><strong><a href="https://www.sacon.io/" target="_blank">>> Pre-Register for SACON</a> <a href="https://www.sacon.io/" target="_blank">2021</a></strong></span><br /> <strong><a href="https://www.sacon.io/" target="_blank"><img src="{{#staticFileLink}}8669830694,original{{/staticFileLink}}" width="414" class="align-center" alt="8669830694?profile=original" /></a></strong></div>
</div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"> </div>
<div style="margin-bottom:5px;"> </div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"><span style="font-size:14pt;">20.</span> <span style="font-size:18pt;">Challenges & Approach (Srinivas Poosarla)</span></div>
<div style="margin-bottom:5px;">This session is about challenges and approach of 27001 to 27701. ISO 27701 is a new standard for privacy protection, built as an extension to ISO 27001 & 27002. Released as recently as August of 2019, organizations and practitioners are still trying to understand the standard and its intricacies & implications. Infosys is the first Indian company to have been 27701 certified - a result of a long-running Privacy Program with a team having the necessary expertise and experience of many years in the domain. In this session, the Infosys Chief Privacy Officer shares their journey and offers key insights and learnings to organizations on their paths to achieving 27701</div>
<p><iframe src="//www.slideshare.net/slideshow/embed_code/key/99QfpX7A02ymEy" width="595" height="485" frameborder="0" allowfullscreen=""></iframe>
</p>
<div style="margin-bottom:5px;"><strong><a href="//www.slideshare.net/cisoplatform7/sacon-srinivas-posarala-challenges-approach" title="(SACON) Srinivas posarala - Challenges & Approach" target="_blank">(SACON) Srinivas posarala - Challenges & Approach</a></strong> from <strong><a href="https://www.slideshare.net/cisoplatform7" target="_blank">Priyanka Aash</a></strong></div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"><div><div style="text-align:center;"><span style="font-size:14pt;"><strong><a href="https://www.sacon.io/" target="_blank">>> Pre-Register for SACON</a> <a href="https://www.sacon.io/" target="_blank">2021</a></strong></span><br /> <strong><a href="https://www.sacon.io/" target="_blank"><img src="{{#staticFileLink}}8669830694,original{{/staticFileLink}}" width="414" class="align-center" alt="8669830694?profile=original" /></a></strong></div>
</div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"> </div>
<div style="margin-bottom:5px;"> </div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"><span style="font-size:14pt;">21.</span> <span style="font-size:18pt;">Privacy in Technology: Kickstart of the Hackathon (Sameer Anja)</span></div>
<div style="margin-bottom:5px;"><p>This session is to understand privacy in technology. Just like in the case of Security, building Privacy at the design stage itself ensures privacy gets baked into the specific application/ process/ initiative. There is a formal Privacy By Design (PbD) framework available and it has been incorporated into several laws & regulations as well. To actually implement PbD into specific applications needs the translation and application of this framework and its principles into specific, detailed, step by step guidelines/ standards. This Hackathon endeavours to do exactly that</p>
<p></p>
</div>
</div>
<p><iframe src="//www.slideshare.net/slideshow/embed_code/key/4s552DXEw7zVRO" width="595" height="485" frameborder="0" allowfullscreen=""></iframe>
</p>
<div style="margin-bottom:5px;"><strong><a href="//www.slideshare.net/cisoplatform7/sacon-sameer-anja-privacy-in-technology-kickstart-of-the-hackathon" title="(SACON) Sameer anja - Privacy in Technology: Kickstart of the Hackathon" target="_blank">(SACON) Sameer anja - Privacy in Technology: Kickstart of the Hackathon</a></strong> from <strong><a href="https://www.slideshare.net/cisoplatform7" target="_blank">Priyanka Aash</a></strong></div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"><div style="text-align:center;"><span style="font-size:14pt;"><strong><a href="https://www.sacon.io/" target="_blank">>> Pre-Register for SACON</a> <a href="https://www.sacon.io/" target="_blank">2021</a></strong></span></div>
<div><strong><a href="https://www.sacon.io/" target="_blank"><img src="{{#staticFileLink}}8669830694,original{{/staticFileLink}}" width="414" class="align-center" alt="8669830694?profile=original" /></a></strong></div>
</div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"> </div>
<div style="margin-bottom:5px;"> </div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"><span style="font-size:14pt;">22. </span> <span style="font-size:18pt;">A scalable, control-based, developer-centric Threat Modelling for secure software development (Dr. Soumya Maity & Lokesh Balu)</span></div>
<div style="margin-bottom:5px;">This session is about Threat Modelling for secure software development.A comprehensive application threat model demands specialized skills and expertise which might be difficult to avail considering the increasing resource gap in software security market. Making a scalable threat model framework is difficult even for big enterprises. Even the tools that help to manage the threat modeling process have limitations. In this talk, we will present control-based threat modeling to explore the possibilities of moving from a traditional threat-library based threat model to a more developer-centric threat model and how this paradigm change may add value towards developing secure software.</div>
<p><iframe src="//www.slideshare.net/slideshow/embed_code/key/Ao01x9z6IlVDLN" width="595" height="485" frameborder="0" allowfullscreen=""></iframe>
</p>
<div style="margin-bottom:5px;"><strong><a href="//www.slideshare.net/cisoplatform7/sacon-dr-soumya-maity-lokesh-balu-a-scalable-controlbased-developercentric-threat-modeling-for-secure-software-development" title="(SACON) Dr. Soumya Maity & Lokesh Balu - A scalable, control-based, developer-centric Threat Modeling for secure software development" target="_blank">(SACON) Dr. Soumya Maity & Lokesh Balu - A scalable, control-based, developer-centric Threat Modeling for secure software development</a></strong> from <strong><a href="https://www.slideshare.net/cisoplatform7" target="_blank">Priyanka Aash</a></strong></div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"><div style="text-align:center;"><span style="font-size:14pt;"><strong><a href="https://www.sacon.io/" target="_blank">>> Pre-Register for SACON</a> <a href="https://www.sacon.io/" target="_blank">2021</a></strong></span></div>
<div><strong><a href="https://www.sacon.io/" target="_blank"><img src="{{#staticFileLink}}8669830694,original{{/staticFileLink}}" width="414" class="align-center" alt="8669830694?profile=original" /></a></strong></div>
</div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"> </div>
<div style="margin-bottom:5px;"> </div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"><span style="font-size:14pt;">23.</span> <span style="font-size:18pt;">The Power of APIs – API Economy Trends & Market Drivers, Security Risks and Mitigation Strategies (Suhas Desai)</span></div>
<div style="margin-bottom:5px;">The session will focus on delivering the key trends in APIs, API Management Platform technologies and how it is driving the API economy. We will also discuss the key drivers for digital transformation initiatives which include wide acceptance of APIs in Industry 4.0, Connected Devices, Cloud and Payments industry. Next, we will talk about the top 10 security risks in APIs, API Management Platforms, APIs integrations with cloud platforms, IoT/OT devices integrations with third-party applications. Lastly, we will uncover the need for implementing the API security governance framework and how to measure the API security programme’ s success through this governance framework.</div>
<p><iframe src="//www.slideshare.net/slideshow/embed_code/key/vovjiRx5G6H9F0" width="595" height="485" frameborder="0" allowfullscreen=""></iframe>
</p>
<div style="margin-bottom:5px;"><strong><a href="//www.slideshare.net/cisoplatform7/sacon-suhas-desai-the-power-of-apis-api-economy-trends-market-drivers-security-risks-and-mitigation-strategies" title="(SACON) Suhas Desai - The Power of APIs – API Economy Trends & Market Drivers, Security Risks and Mitigation Strategies" target="_blank">(SACON) Suhas Desai - The Power of APIs – API Economy Trends & Market Drivers, Security Risks and Mitigation Strategies</a></strong> from <strong><a href="https://www.slideshare.net/cisoplatform7" target="_blank">Priyanka Aash</a></strong></div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"><div style="text-align:center;"><span style="font-size:14pt;"><strong><a href="https://www.sacon.io/" target="_blank">>> Pre-Register for SACON</a> <a href="https://www.sacon.io/" target="_blank">2021</a></strong></span></div>
<div><strong><a href="https://www.sacon.io/" target="_blank"><img src="{{#staticFileLink}}8669830694,original{{/staticFileLink}}" width="414" class="align-center" alt="8669830694?profile=original" /></a></strong></div>
</div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"> </div>
<div style="margin-bottom:5px;"> </div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"><span style="font-size:18pt;"><span style="font-size:14pt;">24.</span> Living In A World of Zero Trust (Vandana Verma)</span></div>
<div style="margin-bottom:5px;"><p>This session is about Zero Trust and has of now everything is moving to cloud, all the applications are accessible from anywhere and everywhere. However, No one wants their private information to be compromised and openly available for the world. We have been taking so many precautions, however breaches continue to happen. How should we fix this?</p>
<p>Organisations have been talking about Zero Trust lately and this has become a buzzword. The talk will explore Zero Trust beyond the buzzword and describe what exactly is Zero Trust and why it is so important to keep organisations safe. How can we implement or deploy Zero Trust in an organisation while keeping the current and future state of an organization in mind. What should be the business model to move any organisation towards Zero Trust Architecture and what all policies need to be implemented to achieve the same.</p>
<p>In the end, certain recommendations will be shared with the participants as a takeaway from my own experiences while working towards implementing the Zero Trust.</p>
</div>
<p><iframe src="//www.slideshare.net/slideshow/embed_code/key/rQuXG3nJR3n92" width="595" height="485" frameborder="0" allowfullscreen=""></iframe>
</p>
<div style="margin-bottom:5px;"><strong><a href="//www.slideshare.net/cisoplatform7/sacon-vandana-verma-living-in-a-world-of-zero-trust" title="(SACON) Vandana Verma - Living In A World of Zero Trust" target="_blank">(SACON) Vandana Verma - Living In A World of Zero Trust</a></strong> from <strong><a href="https://www.slideshare.net/cisoplatform7" target="_blank">Priyanka Aash</a></strong></div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"><div style="text-align:center;"><span style="font-size:14pt;"><strong><a href="https://www.sacon.io/" target="_blank">>> Pre-Register for SACON</a> <a href="https://www.sacon.io/" target="_blank">2021</a></strong></span></div>
<div><strong><a href="https://www.sacon.io/" target="_blank"><img src="{{#staticFileLink}}8669830694,original{{/staticFileLink}}" width="414" class="align-center" alt="8669830694?profile=original" /></a></strong></div>
</div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"> </div>
<div style="margin-bottom:5px;"> </div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"><p><span style="font-size:14pt;">25.</span> <span style="font-size:18pt;">Practical Threat Hunting - Developing and Running a Successful Threat Hunting Program (Wasim Halani & Arpan Raval)</span></p>
<p>The workshop is intended to demonstrate how to develop and run a threat-hunting program in an organization. It starts with understand the concepts of threat-hunting and how it fits into an organization’s BlueTeam. The workshop will cover hands-on sessions on running a structure and unstructured hunt using different log sources commonly available in an IT environment.</p>
</div>
<p><iframe src="//www.slideshare.net/slideshow/embed_code/key/iEUnnqCDxHYCdp" width="595" height="485" frameborder="0" allowfullscreen=""></iframe>
</p>
<div style="margin-bottom:5px;"><strong><a href="//www.slideshare.net/cisoplatform7/sacon-wasim-halani-arpan-raval-practical-threat-hunting-developing-and-running-a-successful-threat-hunting-program" title="(SACON) Wasim Halani & Arpan Raval - Practical Threat Hunting - Developing and Running a Successful Threat Hunting Program" target="_blank">(SACON) Wasim Halani & Arpan Raval - Practical Threat Hunting - Developing and Running a Successful Threat Hunting Program</a></strong> from <strong><a href="https://www.slideshare.net/cisoplatform7" target="_blank">Priyanka Aash</a></strong></div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"><div style="text-align:center;"><span style="font-size:14pt;"><strong><a href="https://www.sacon.io/" target="_blank">>> Pre-Register for SACON</a> <a href="https://www.sacon.io/" target="_blank">2021</a></strong></span></div>
<div><strong><a href="https://www.sacon.io/" target="_blank"><img src="{{#staticFileLink}}8669830694,original{{/staticFileLink}}" width="414" class="align-center" alt="8669830694?profile=original" /></a></strong></div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"> </div>
<div style="margin-bottom:5px;"> </div>
<div style="margin-bottom:5px;"> </div>
<div style="margin-bottom:5px;"> </div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"></div>
<div style="margin-bottom:5px;"></div>
<div><div><span style="font-size:24pt;"><strong>Some other sessions conducted at SACON (no presentation) : </strong></span></div>
<div><ul>
<li>Darkweb workshop (Rohit Srivastwa & Muslim Koser) <a href="https://www.cisoplatform.com/profiles/blogs/exploring-darkweb-for-threat-intelligence-sacon-may-2018" target="_blank">Old Reference Link</a></li>
<li>Web hacking using Cyber Range (Satish S)</li>
<li>Leadership - the power of influence (Haragopal Mangipudi)</li>
<li>Cybercrime Response - Legal & Technical perspectives (<span class="zw-portion">Venkatesh<span class="zw-space"> </span>Murthy<span class="zw-space"> </span>K)</span></li>
<li><span class="zw-portion">Ensuring Effective AWS Security on a Budget (Vikas Yadav & Bhowmik Shah)</span></li>
</ul>
<p><span class="zw-portion">In case any speaker chooses to send more presentations, we will upload those here</span></p>
<p></p>
<p></p>
<p></p>
<p><span style="font-size:24pt;"><strong><span class="zw-portion">Photo Link</span></strong></span></p>
<ul>
<li><span style="font-size:12pt;">SACON 2020 Album <a href="https://www.facebook.com/Cisoplatform/photos/?tab=album&album_id=2821267391250561" target="_blank">Click Here</a> (Medium Resolution)</span><br /> Use this to share on social media easily. Tag @cisoplatform</li>
<li><span style="font-size:12pt;">SACON 2020 Downloadable Pics <a href="https://drive.google.com/drive/folders/1uKwLyqf_xfkjvRTXEnlkd3CpZMH9r8WU?usp=sharing" target="_blank">Click Here</a> (High Resolution).</span> <br /> Sign in with google account. Right click and download file needed</li>
<li><span style="font-size:12pt;">Annual Summit Album link - </span><a href="https://www.facebook.com/Cisoplatform/photos/?tab=album&album_id=2821258874584746" target="_blank"><span style="font-size:12pt;">Click Here</span><br /> <br /></a></li>
<li><span style="font-size:12pt;">Here's the CISO Platform 100 Recognition Photo Album Link - </span><a href="https://www.facebook.com/Cisoplatform/photos/?tab=album&album_id=2821271177916849" target="_blank"><span style="font-size:12pt;">Click Here</span><br /> <br /></a></li>
<li><span style="font-size:12pt;">Please upload any good event picture we missed and you took (Community Folder) - <a href="https://drive.google.com/drive/folders/1GCj5BHv8bJnR_KbUY5Xoo4Ld5hqivBoS?usp=sharing" target="_blank">Click Here</a></span><br /> Sign in with google account and drag drop your photograph files</li>
</ul>
<p></p>
<p></p>
<p></p>
</div>
</div>
</div></div>