+91 91524 45255
30+ CONFERENCE TALKS
15+ COUNTRIES
16+ YEARS SPEAKING

SPEAKING TIMELINE

2026

Identity Theft Protection and Biometric Security

2026
Identity Shield Conference India

Advanced techniques for digital identity management, focusing on biometric security solutions and comprehensive identity theft protection strategies in modern cybersecurity landscapes.

Identity Security Biometrics Digital Identity
2025

Capture The Flag Competition Strategies

March 25-26, 2025
HICAthon 1.0 Symbiosis Skills and Professional University

Expert session on advanced CTF competition strategies, ethical hacking methodologies, and practical cybersecurity challenges for students and enthusiasts.

CTF Ethical Hacking Competition

Community-Driven Security Research

2025
Security BSides Bangalore Bangalore, India

Technical talks and workshops on cutting-edge security research, featuring hands-on workshops and community collaboration in cybersecurity.

Community Research Workshop

AI Security and Next-Generation Threat Intelligence

2025
Nasscom Cybersecurity Summit India

Industry leadership presentation on AI security challenges, cloud protection strategies, and emerging threat intelligence solutions for enterprise security.

AI Security Threat Intelligence Cloud Security

Security BSides Ahmedabad Workshop

2025
Security BSides Ahmedabad Ahmedabad, India

Community-driven security conference featuring technical talks, hands-on workshops, and collaborative security research sessions.

Community Workshop Research
2024

Latest Security Trends and Innovations

2024
Annual Information Security Summit India

Keynote presentation on emerging cybersecurity trends, innovative security solutions, and industry best practices for modern threat landscapes.

Keynote Security Trends Innovation

Community-Driven Security Research

2024
Security BSides Bangalore Bangalore, India

Technical talks and workshops on cutting-edge security research, featuring hands-on workshops and community collaboration in cybersecurity.

Community Research Workshop

Web Application Security and Penetration Testing

2024
Certified Application Penetration Testing Professional Bangalore, India

Comprehensive training on web application security methodologies, penetration testing techniques, and mobile security assessment frameworks.

Web Security Pentesting Mobile Security

Higher Institute Campus Ambassadors Initiative

2024
Higher Institute Campus Ambassadors Summit India

Expert sessions and panel discussions with industry leaders on academic-industry collaboration and cybersecurity education initiatives.

Academic Education Leadership

Academic-Industry Security Collaboration

2024
MIT Information Security Initiative India

Research presentations on security innovations, expert panels on academic-industry collaboration, and emerging cybersecurity education frameworks.

Academic Research MIT

Network Security and Cryptography

2024
MIT Cybersecurity Conference India

Hands-on workshop covering network security protocols, cryptography implementations, and practical cybersecurity deployment strategies.

Network Security Cryptography Workshop

Enterprise Security Strategies and Policy

2024
Nasscom Cybersecurity Summit India

Industry leadership summit featuring policy discussions, enterprise security strategies, and emerging technology trends in cybersecurity.

Enterprise Policy Strategy

Advanced Cybersecurity Training

2024
Advanced Cybersecurity Workshop India

Comprehensive hands-on training covering penetration testing, incident response, and security operations center best practices.

Training Pentesting SOC

Cybersecurity Excellence Recognition

2024
Cybersecurity Awards Ceremony India

Recognition ceremony honoring excellence in cybersecurity achievements, innovations, and contributions to the security community.

Awards Excellence Recognition
2023

Vulnerability Research and Security Tools

2023
NullCon Security Conference India

Community security conference featuring cutting-edge vulnerability research, security tools showcase, and collaborative learning sessions with industry experts.

Vulnerability Research Security Tools Community
2020

Red Team Operations and Advanced Tactics

2020
HITB CyberWeek Red Team Village Virtual

Advanced red team operations, tactics, techniques, and procedures for enterprise penetration testing and security assessment methodologies.

Red Teaming Pentesting Advanced Tactics

Red Team Village Community Workshop

2020
Red Team Village Virtual

Community-driven workshop focusing on red team methodologies, collaborative security research, and practical penetration testing techniques.

Red Team Community Workshop

Red Team Security Summit

2020
Red Team Security Summit Virtual

Premier summit dedicated to red team operations, security research, and advanced penetration testing strategies for modern threat landscapes.

Red Teaming Security Research Summit

ECU Penetration Testing

November 18, 2020
HITB Security Conference Hong Kong

Addressing security weaknesses in vehicle industries requires specific skillset in cybersecurity as well as attack mitigation. This talk shows how to mitigate vehicle cybersecurity attacks against CANBUS and LIN protocol over ECU and FMS.

Automotive ECU CANBUS

ALL Village - ICS Village

2020
OWASP Seaside USA

Hands-on practical session covering industrial control systems testing, PLC security assessment, and SCADA system vulnerability research in the ALL Village ICS section.

ICS SCADA PLC ALL Village

ALL Village - IoT Village

2020
OWASP Seaside USA

Comprehensive IoT security training covering embedded device testing, smart home vulnerabilities, and wireless communication security in the ALL Village IoT section.

IoT Embedded Wireless ALL Village

ALL Village - CAR Hacking Village

2020
OWASP Seaside USA

Automotive security workshop featuring CAN bus analysis, ECU penetration testing, and vehicle network security assessment in the ALL Village CAR Hacking section.

Automotive CAR Hacking CAN Bus ALL Village

Making Anomaly Detection System for Vehicles - CANbus and LIN

January 15, 2020
Technical Workshop Online

Deep dive into creating anomaly detection systems for vehicle communication protocols, focusing on CANbus and LIN protocols to identify and prevent automotive cyber attacks.

Automotive CANbus LIN ADS
2019

REVERSING AND THE EXPLOITATION OF VEHICLE (CAR HACKING)

2019
c0c0n Kerala, India

With vehicles now connected through V2X technologies, new third-party systems like fleet management tools and diagnostic toolsets are emerging but remain vulnerable. This course offers hands-on experience with real cars for testing component security.

Automotive Car Hacking V2X

Making Anomaly Detection System for Vehicles (Automotive Hacking)

2019
Rootcon Manila, Philippines

Advanced techniques for implementing anomaly detection systems in automotive environments, with practical demonstrations and real-world case studies.

Automotive ADS Machine Learning

CAR Hacking

2019
Defcamp Romania

In the Car Hacking Village, participants gained hands-on experience with automotive technologies, tackled realistic CTF challenges, and learned basic attack vectors for vehicle security.

Automotive Car Hacking CTF

Hacking ICS devices for Fun

2019
Defcamp Romania

New-generation malware and attacks increasingly target ICS, causing significant financial and human losses. This talk demonstrated vulnerabilities in third-party devices and well-known PLCs.

ICS SCADA PLC

GnuRadio101

2019
x33fcon Poland

Introduction to GNU Radio for software-defined radio applications, covering the basics of signal processing, RF analysis, and wireless security research.

SDR GNU Radio RF

Practical ICS Hacking Master Class

2019
x33fcon Poland

Comprehensive training on Industrial Control Systems hacking, covering methodologies for conducting penetration testing of commercial hardware devices such as PLCs and simulators.

ICS Training Pentesting
2018

Backdooring DVR/NVR devices

2018
Defcamp Romania

Embedded devices, IoT, connected devices are growing very fast as their demand increases. Due to huge demand in market, they lack in security prospect. There are many ways to attack such devices especially in DVR/NVR devices.

IoT Backdoors Hardware

DARWIN: Real World Use Cases for Covert Wireless

2018
BlackHat USA Las Vegas, USA

Arsenal Talk presenting DARWIN framework for covert wireless communications and real-world use cases in penetration testing and security research.

Wireless Covert BlackHat
2017

ICS Village Speaker

2017
Multiple Conferences Various Locations

ICS village speaker at Nullcon 2017, c0c0n X 2017, BsidesDelhi 2017, and Defcamp 2017. Focused on penetration testing methodologies for commercial hardware devices such as PLCs.

ICS PLC Multiple

EXPERTISE AREAS

Automotive Security

ECU penetration testing, CAN/LIN protocol analysis, and vehicle cybersecurity

ICS/SCADA Security

Industrial control systems, PLC security, and critical infrastructure protection

Hardware Security

Firmware analysis, JTAG debugging, SPI flashing, and embedded systems

Wireless Security

RF analysis, SDR, BLE security, and covert communications