8:00 |
9:15 |
Registration |
9:30 |
10:00 |
Opening Note |
| | | |
10:00 |
10:45 |
[Keynote] Multiplying Threat Intelligence by John Lambert |
| | | |
10:45 |
11:00 |
Coffee Break |
11:00 |
11:45 |
Hacking Mitsubishi PLC Without Access To Firmware by Anton Dorfman |
| |
Winja CTF |
Live Bug Hunting |
11:45 |
12:30 |
Smashing the State Machine: The True Potential of Web Race Conditions by James Kettle |
[Panel] Inside the Investor's Mind: A fireside chat of Entrepreneur-VC (Aap ki Adalat) |
The Curious Case Of The Rogue SOAR by Jaden Furtado and Mukesh Kumar |
12:30 |
13:00 |
How I hacked your bank account: A detailed look at UPI Security by Nemo |
[Panel] Data Protection Law and its potential implications for the industry |
Lens of Deceit: Unmasking and Altering Camera Sunglasses' Footage by Daniel Schwendner |
13:00 |
14:15 |
Lunch Break |
14:15 |
15:00 |
Securing CI/CD pipelines - Exploring vulnerabilities in Workflows by Siddharth Muralee |
[Panel] Weaponization of AI with special reference to Gen-AI |
|
Winja CTF |
Live Bug Hunting |
15:00 |
15:45 |
Android-SigMorph: Covert communication exploiting android signing schemes Ayan Saha and Achute Sharma |
[Panel] Threat Intel sharing in OT Community and Industry |
15:45 |
16:00 |
Coffee Break |
16:00 |
16:45 |
Uncovering Azure's Silent Threats: A Journey Into Cloud Vulnerabilities by Nitesh Surana |
Journey in setting up OT SOC by Ramandeep Walia |
Critical Information Infrastructure(CII) Protection: Challenges and Opportunities- How can the Nullcon Community Contribute |
Winja CTF |
Live Bug Hunting |
16:45 |
17:30 |
MITM on PSTN -- novel methods for intercepting phone calls by Kirils Solovjovs |
[Panel] Shifting Left with Security and the Evolution of your DevSecOps Team’s Journey to Excellence |
|
19:30 |
22:00 |
[Invite Only] Networking Dinner Party |
END OF DAY 1 |