Speakers

Conference Speakers

Inaugural Ceremony

Meenakshi Lekhi

Member of Parliament, Lok Sabha, Delhi
Meenakshi Lekhi
About Meenakshi Lekhi

Meenakashi Lekhi is a Member of Parliament from the New Delhi Parliamentary constituency. She enrolled with the Bar Council of Delhi in 1990, and started practicing at the Supreme Court of India, Delhi High Court, other courts, tribunals and forums in Delhi and other parts of the country. She has argued a wide variety of matters, such as bails, revisions, trials, appeals, criminal writs, murder references, Prevention of Corruption Act/Official Secrets Act/Customs Act/FERA prosecutions, Domestic Violence and Family Law dispute. Lekhi has been part of the Drafting Committees for bills like “Women Reservation Bill” and “Problem of Sexual Harassment at Workplace”. She has been in National Commission for Women (NCW)’s special committee, Chairperson of Special Task Force on Women Empowerment, Vice Chairperson of JPM, Blind School, New Delhi & Jt. Secretary Blind Relief Association.

Inaugural Ceremony

Swamini Krishnamrita Prana

Mata Amritanandamayi Math
Swamini Krishnamrita Prana
About Swamini Krishnamrita Prana

Swamini Krishnamrita Prana is a senior most disciple of world renowned humanitarian, Mata Amritanandamayi Devi. Swamini plays an integral role in several humanitarian initiatives of the Mata Amritanandamayi Math. She is the author of several books(some of which can be found here), and a speaker at several international conferences.

Inaugural Ceremony

Eric Falt

Director & UNESCO Representative, Bhutan, India, Maldives and Sri Lanka
Eric Falt
About Eric Falt

Since May 2018, Mr. Eric Falt has served as the Director and UNESCO Representative for the UNESCO New Delhi Office, which covers Bangladesh, Bhutan, India, Nepal, the Maldives and Sri Lanka. Mr. Falt previously served as Assistant Director-General for External Relations and Public Information at the Paris Headquarters of UNESCO, with the rank of Assistant Secretary-General of the UN. He oversaw the work of the organization in the political field and guided UNESCO’s communications and public information efforts. Prior to this, he served as Director of the Outreach Division at the United Nations Department of Public Information in New York, and as the Director of Communications for the United Nations Environment Programme (UNEP), at its headquarters in Nairobi. In the past, Mr. Falt was also posted for the United Nations in Pakistan, Iraq, Haiti and Cambodia.

Keynote

Neeta Verma

Director General, National Informatics Centre
Neeta Verma
About Neeta Verma

Dr. Neeta Verma is the Director General of National Informatics Centre, a premier Technology organization of the Government of India. With a career spanning over three and a half decades, she has been instrumental in implementing high impact digital initiatives across the country. In her current role as DG NIC, she is spearheading the Digital Transformation agenda of the government through development of Digital Platforms for various initiatives of the Government in different sectors of development.

Keynote

Ratnaboli Ghorai Dinda

Deputy Director General(Scientist-G), National Informatics Centre
Ratnaboli Ghorai Dinda
About Ratnaboli Ghorai Dinda

Ms. Ratnaboli Ghorai Dinda, has spent more than 30 years in Information Technology and more than 15 years in Cybersecurity. She has played a key role in provisioning Cyber Security for the National Informatics Centre or NIC, a premier institution of the Government of India, providing infrastructure and technology support to enable the delivery of government IT services. She specializes in Application Security and is currently Deputy Director General and CISO of the National Informatics Centre.

Panel Discussion: Cybercrime and Pathways Ahead

Dave Chatterjee

Associate Professor, The University of Georgia
Dave Chatterjee
About Dave Chatterjee

Dr. Chatterjee’s interest and expertise lies in the various facets of information technology management, with current focus on cybersecurity and enterprise digitization. He delivers talks around the world, conduct webinars and workshops, give expert interviews, and moderate CXO panels on cybersecurity, emerging technology trends, and other enterprise IT governance and value management issues. It is a passion and mission of mine to connect with all types of audience and engage in a thought-provoking and reflective discussion.

Keynote

Rinki Sethi

Vice President & CISO, Twitter
Rinki Sethi
About Rinki Sethi

Rinki Sethi is a vice president and the Chief Information Security Officer at Twitter Inc. She was earlier a Information Security Executive at IBM from 2018 to 2019. She has also worked with companies like Walmart, Intuit, Ebay and others as a CISO and security expert. She also serves as an advisor to several startups, including LevelOps, Authomize, and Cybersecurity organizations, like Women in Cybersecurity. She was recognized by CSO Magazine & Executive Women's Forum with the "One to Watch" award, and in 2010, lead a team at eBay to receive the "Information Security Team of the Year" by SC Magazine.

From Technologist to Board Room: A cybersecurity journey

Sanju Misra

VP & CISO, Alnylam Pharmaceuticals
Sanju Misra
About Sanju Misra

Sanju fell into the cybersecurity field 25 years ago. Her subject matter expertise in security engineering, security analysis then team leader helped to launch her into chief information security officer roles at General Electric Treasury, Praxair and Linde. The skills she gained as a technologist aren’t the same skills required to present to board rooms and have a seat at the table with business leaders.

Talk Overview

In her session, Sanju will review her 25 year long career path along with a few stories. She hopes to leave you with her learnings and open up the conversation to your questions.

Threat Modeling

Sung Lee

Staff Security Architect, VMware
Sung Lee
About Sung Lee

Sung joined VMware in 2020 as a security architect. She developed an interest in security in the early 2000s, while she was leading a research team in the area of Pervasive Computing, a predecessor of Internet of Things. Prior to joining VMware, she served in various roles at several companies, including product development, R&D, standards development, and defining product and business strategy. She received B.S., M.S., and Ph.D. degrees in Computer Science from the University of Maryland, College Park

Talk Overview

In this talk, you will learn why Threat Modeling (TM) is important, what TM is (what it can prevent and what it cannot), and how TM fits into the overall Product Development Lifecycle and Secure Development Lifecycle. This talk will also introduce various threat modeling methodologies.

Inaugural Session

Krishnashree Achuthan

Dean PG Programs, Amrita University
Krishnashree Achuthan
About Krishnashree Achuthan

Dr. Krishnashree is an ardent researcher with multi-disciplinary interests, and holds a PhD degree from Clarkson University, NY, USA. Her areas of interest in Cybersecurity & governance, Mathematical Modeling of Systems, Cybersecurity policy, IoT Security, Public Safety, Innovation, Educational Technologies & Entrepreneurship. She also leads research teams focused on enhancement of laboratory education through virtual laboratories. She holds 33 US patents, and has published over 50 publications in Journals & Conferences. She has played an active role in several strategic initiatives for Government of India and served as the Principal Investigator.

Panel Discussion: Cybercrime and Pathways Ahead

Anyesh Roy

DCP/Cyber Crime, Delhi Police, Ministry of Home Affairs
Anyesh Roy
About Anyesh Roy

Anyesh Roy has worked for 13 years in the field of law enforcement in Delhi Police and Andaman & Nicobar Police. He heads the Cyber Crime Unit(CyPAD) of Delhi Police. He also handles the functioning of National Cyber Forensic Lab as part of Indian Cybercrime Coordination Centre. He has undertaken various initiatives for:

  • Detection and prevention of cyber offences in the jurisdiction of Delhi.
  • Training and capacity building of the Investigating Officers of Delhi Police in the field of cyber investigation.
  • Intensive cyber safety awareness campaigns among the common public, esp. among the vulnerable sections.

CTFs and cybersecurity research

Tiffany Bao

Assistant Professor, Arizona State University
Tiffany Bao
About Tiffany Bao

Tiffany Bao is an Assistant Professor at Arizona State University. Her research interests are aspects of software security, including techniques, measurements, and strategies to discover, assess, and defend software vulnerabilities. Tiffany Bao received her Ph.D. at Carnegie Mellon University advised by Prof. David Brumley.

Talk Overview

In this talk, Tiffany Bao will share her experience of CTF and introduce the CTF-related research, cyber autonomy in software security. The idea of cyber autonomy emerges due to the large scale of software programs in daily practice. While security researchers have been pursuing automated vulnerability detection and remediation techniques to scale beyond the limitations of human hackers, the human bottleneck (and human fallibility) remains in the higher-level strategy of what to do with automatically identified vulnerabilities, automatically created exploits, and automatically generated patches. Removing the bottlenecks requires not only automatic techniques but also intelligent decision makings, which we call autonomy, a further step of automation in software security. In this talk, I will delve into the challenges in cyber autonomy, introducing our recent work and discussing the future steps that mature cyber autonomy into real-world practice.

Cyber Event - How to treat it right?

Liora Itkin

Head of Cybersecurity Department (of SOC and DFIR teams), Israel Ministry of Defense
Liora Itkin
About Liora Itkin

Leading a Cybersecurity Defense Department:
✔️ SOC team
✔️ Digital Forensics Investigators and Incident Response team
Skilled in the areas of in cyber attacks, malware analysis, threat hunting, cyber analysis, networking and system.

Talk Overview

We will talk about how to treat cyber event from the view of SOC and Digital Forensics Investigators team. What do we investigate? How to react when we know it’s not false positive event? What evidences do we have and what do we want to investigate?

Panel Discussion: Cybercrime and Pathways Ahead

Evelyn Kilel

Co-Founder, SheHacksKe
Evelyn Kilel
About Evelyn Kilel

Evelyn Kilel, a computer scientist and cybersecurity analyst at Ernst and Young is one of the co-founders of Shehacks KE. She Hacks Kenya is an all-female community that was founded in 2016, through the efforts of Patricia Rotich with the assistance of Safaricom’s women in technology.

Secure Software

Sarvjeet Kaur

Sc'G', Defence Research and Development Organization (DRDO)
Sarvjeet Kaur
About Sarvjeet Kaur

Ms Sarvjeet Kaur is heading the Software Security Testing Lab of Scientific Analysis Group(SAG), DRDO, a premier research organization for Defence in the country. She has been working in the area Cybersecurity for last 8 years.

Talk Overview

Secure Software is software which continues to work as intended by the developer, even in the presence of an adversary. Software Security is still not a mature field worldwide though significant efforts have been made in this direction in the last one decade. Software developers as well as testers are applying piecemeal solutions to achieve security but they are definitely not sufficient.
Developers apply various measures in the software to provide Confidentiality, Integrity, Authentication and other security services. Any compromise to these makes the software insecure. Software Security Assessment at its most basic level analyzes the applied security measures for their sufficiency, correctness and non-bypassability. It tries to identify presence of any malicious functionality in the software. It also checks for the presence of vulnerabilities which an adversary might be able to exploit.
In this talk, a glimpse of holistic view towards Software Security Assessment would be presented. Further, additional challenges in evaluating AI-based solutions would be enumerated.

Quantum safe solutions for cybersecurity

Anindita Banerjee

Quantum Research Head and VP, QuNu Labs Pvt Ltd.
Anindita Banerjee
About Anindita Banerjee

Dr Anindita Banerjee received her PhD from Jaypee Institute of Information Technology (JIIT), Noida. During her PhD, she was visiting scholar at University of Calgary and University of Brunswick Canada. She was Assistant Prof. in Women College of Engineering, Durgapur. Later she joined as Research Associate in Bose Institute, Kolkata, where she spearheaded the group leading to successful demonstration of single photon experiment in 2016. She was awarded CSIR Pool Officer in 2016. She has published about 20 Journal publications. She has co-authored a book on Optical quantum computation and quantum communication published in SPIE Spotlight Series. At present she is working as Quantum Research Head and VP at QuNu Labs Pvt Ltd.
The company focuses on quantum safe solutions for cybersecurity. She is associated with QNU from 2017. She has led the scientific R&D at Qnu Labs and demonstrated fibre based DPS Quantum Key Distribution in 2019. She has contributed in developing India’s first Quantum Technology Product in Quantum Key Distribution and Quantum random number generator. She and her team has demonstrated India’s first Quantum secure communication and data transfer using DPS QKD at 50 km distance using underground fiber.
Apart from her academics she is Alankar in Indian Classical Dance and performed nationally and internationally under Kadamb production of Padmashree Kumudini Lakhia.

Cybersecurity in the OT enviroment

Luisa Montealegre

OT Cybersecurity Specialist, Siemens
Luisa Montealegre
About Luisa Montealegre

Luisa Montealegre is an OT Cybersecurity Specialist at Siemens. With Mechanical engineering as a background and international experience working in cybersecurity in the USA, Latin America, and Europe, she works developing the OT cybersecurity services for Siemens factories around the world. Her main goal is to achieve secure and certification ready factories with resilient environments. She holds a master’s degree in cybersecurity systems from Lleida University.

Talk Overview

In this talk, Luisa Montealegre will share her career path and how she, as a female mechanical engineer from Costa Rica, ended up being a cybersecurity specialist in Europe. She will also share her experience in the Operational Technology(OT) environment and the challenges of cybersecurity in this field.

Keynote

Marion Marschalek

Senior Security Engineer, Founder, BlackHoodie
Marion Marschalek
About Marion Marschalek

Marion Marschalek is a Cyphort researcher and one of the top reverse engineers of government malware around. Recently uncovered French government surveillance malware.

Preventing cyber attacks together - The Power of Collaboration

Karine Ben-Simhon

VP, Cyber Intelligence Center and TLV Innovation, Citi, Israel
Karine Ben-Simhon
About Karine Ben-Simhon

Mrs. Ben-Simhon is currently leading the Intelligence partnerships and Innovation at Citi Bank's Cyber Intelligence Center and TLV Innovation lab. Karine is a senior cybersecurity manager, with vast experience and understanding of the cyber warfare ecosystem at corporate and National levels. Before joining Citi, Karine established and managed the Operational Cooperation unit of the Israel National Cyber Directorate. She began her career at the Israel Security agency as a threat intelligence analyst, and continued her journey working for both private and public sector dealing with various activities related to homeland security. Karine is an 8200 Intelligence Unit veteran and holds a M.A in Defense & Intelligence studies from the Bar-Ilan University, and a Political Sciences B.A diploma from the Tel-Aviv University.

Talk Overview

Cybersecurity is a global issue which demands a global approach and international collaboration. Cyber threat actors operate across national borders, and in the past few years, targeted public & private sectors worldwide. During this session we will see how global partnerships were crucial in preventing fraud and cyber incidents, why sharing_is_caring and how a small network of women can make a big impact.

Kick-start to Secure Software Development

Arya M Sankar

Security Researcher, Siemens
Arya M Sankar
About Arya M Sankar

As a Security Researcher at Siemens she is currently into Secure Software Development (R&D) and Cybersecurity Analyst roles. She is focusing on Application security with keen interest in Secure Software Development and Secure Coding. She has prior experience in Penetration Testing, Malware Analysis and Vulnerability Assessments. Pursued Masters in Cybersecurity Systems & Networks with Bachelors in Computer Science Engineering.

Talk Overview

We read, write and understand Code!
There is a popular misconception that anyone who code can develop a secure and reliable software. Developers can build a working software, but not always secured, reliable and an efficient one. Who would buy that? If someone does, for how long would it serve!

This talk would focus on Secure Software Development. Take you through the overall software development architecture, an active check on the frequent mistakes and regular misunderstandings in software development, followed by an in-depth understanding of each stage with a quick glance into the adversary entry points. Finally, introducing secure coding a vast domain which plays an important role in Secure Software Development.

This session might provide a better perspective to the Developers, Testers and Security enthusiasts about the systems and techniques in place as well their relevance.

Closing Ceremony

Micha Weis

CyberSecurity advisor, Ministry of Finance
Micha Weis
About Micha Weis

Micha Weis has vast experience in cybersecurity and Information Security, FinTech, innovation, and regulation. All in the military, finance and government sectors - Integrating cybersecurity technologies, innovation, and FinTech on a national level - Managing the Israeli National Financial CERT – the Cyber and Finance Continuity Center - Supply chain guidance on cybersecurity, business continuity, risk management, and cyber resilience - Coordination with the National Cyber Directorate, financial sector regulators and business continuity instructors (in the energy, communication, transportation, and civil defense sectors) - Strategizing and defining the Cybersecurity architecture perception, cloud services, policies, and guidance for enterprise organizations, while supporting the implementation of decision-makers - Developing risk assessment processes, sectorial situation reports, cross-sectoral information sharing infrastructure methods and more

Privacy Preserving Data Analysis

Mina Sheikhalishahi

Security Researcher, Eindhoven University of Technology
Mina Sheikhalishahi
About Mina Sheikhalishahi

Mina Sheikhalishahireceived her Ph.D. in Computer Science at Laval University, Canada, in 2016,with a Ph.D. thesis on "Spam Campaign Detection, Analysis and Formalization". She joined the "Security Group" at Institute forInformatics and Telematics of CNR, Italy as postdoc in 2016. She visited the Security Group at Delft University in 2018. Currently, she is a post-doc researcher in the Security Group at Eindhoven University of Technology. Her research is mainly focused on privacy preserving data analysis.

Talk Overview

Information sharing brings mutual benefit for governments, military services, corporates, financial organizations, health centers, individuals, and even competitors. This benefit is resulted from the additional intelligence that is inferred through collaborative data analysis. Such an intelligence can be used to improve revenues, e.g. through best practice sharing, market basket analysis, preventing loss coming from brand-new potential cyber-threats, analysis of medical data. Independently from the final goal, information sharing brings issues and drawbacks related to information privacy. Shared information might be sensitive, potentially harming the privacy of physical persons, such as employee records for business applications, or patient records for medical ones. In this talk, we discuss the privacy issues in data sharing and we present the solutions for some specific scenarios in this regard.

Techniques and Tooling with Flare-on'20

Sreelakshmi Panangatt

Security Engineer, VMware
Sreelakshmi Panangatt
About Sreelakshmi Panangatt

Sreelakshmi is a security Engineer working for VMware product security team. Her responsibilities include vulnerability assessment and attack surface analysis. She is one of the winners of flare-on 2020. She holds a master’s degree in cybersecurity systems from Amrita University and Vrije University, Amsterdam. More about her works can be found at https://sreelakshmip.wordpress.com.

Talk Overview

Flare-on is famous CTF style challenge conducted by FireEye where the main focus is on reverse engineering variety of formats including windows and Linux. In this talk, we will discuss how to approach flare-on, what all are the tools and techniques that will help in understanding and solving the challenges and walkthrough of some of the interesting challenges of flare-on 2020.

Welcome Note

Sreepriya Chalakkal

Security Analyst, Siemens ProductCERT
Sreepriya Chalakkal
About Sreepriya Chalakkal

Sreepriya is a Security Analyst at Siemens ProductCERT, where she focuses on vulnerability handling and incident response. Previously she worked as a pentester at Ernw GmbH, Germany, in the mobile security team. She enjoys playing with security challenges in applications, networks and binaries. She is mentor of TeamShakti, a women CTF team from India. Also, core organiser of ShaktiCon, a women only security conference. Also serves as a board member of BlackHoodie. Completed masters from Technical University of Berlin and University of Trento with major Computer Security and Privacy in March 2017.

Talk Overview

Sreepriya will deliver the welcome note for ShaktiCon. She will provide a glimpse into how the idea of ShaktiCon came about, what has been achieved so far and what our goals and aspirations are.

Introduction to Fuzzing

Allison Marie Naaktgeboren

Researcher, Portland State University
Allison Marie Naaktgeboren
About Allison Marie Naaktgeboren

Allison Marie Naaktgeboren is a cybersecurity doctoral researcher (fancyspeak for PhD student) and a semi-retired senior software engineer. Her current research focuses on fuzzing. She has a Bachelor’s Degree in Computer Science from Carnegie Mellon University. She has previously written (and regretted) code at Signal Sciences, Mozilla, Amazon, Cisco, FactSet Research Systems, and the Biorobotics Laboratory. She run the Portland State Security Club & CTF team and an all women’s CTF team in Portland. She is part of the WomenWhoCode PDX and OWASP PDX leadership teams.

So you want to try your hand at machine learning for security…

Bhavna Soman

ML Security Researcher, Microsoft
Bhavna Soman
About Bhavna Soman

Bhavna Soman is a Senior Security Research Lead working for the Microsoft Defender Research Team. In her day job, she develops Machine Learning models to classify malware in real time. In the past she worked in the field of Threat Intelligence and loves to play with Natural Language processing algorithms. Bhavna holds a master's degree in Computer Security from Georgia Tech and is also a trainer for Malware Reverse Engineering with Blackhoodie.

Talk Overview

Security expertise is scarce. Machine learning and AI can help defenders scale and provide protection from attackers. This talk will cover real case studies of what applications of ML in security look like and the major challenges in implementing them. We will discuss the challenges of translating cutting edge ML research into different aspects of security (AV, IDS, TI etc). If you are interested in dipping your toes in this powerful domain, we will share tools and resources to get started.

A pragmatic approach on software security

Priti Shrivastav

Former General Manager Software Security, Intel Corporation
Priti Shrivastav
About Priti Shrivastav

Former General Manager Software Security at Intel corporation. Nine years managed security of all the software products in the area of operating systems, cloud services, developers tools, performance libraries, AI SDKs, graphics software, compilers, and many security solutions at Intel. Prior to working on security Priti Shrivastav managed various products like compilers, binary translation software, parallel advisor and other important products and services at Intel. She has MS in Computer Science from Ohio University, US and MS in Math/CS from IIT Delhi, India. She is passionate about promoting women in cybersecurity to reach their professional goals.

Internet of Drones Security

Mehrnoosh Monshizadeh

Cybersecurity Specialist, Nokia Bell Labs
Mehrnoosh Monshizadeh
About Mehrnoosh Monshizadeh

Mehrnoosh is working at Nokia Bell Labs research department as Cybersecurity Specialist. Her research area includes utilizing and optimizing artificial intelligence for IoT security, Drone/Robot security, Digital Health security and cloud security (SDN/NFV). She has been working previously on development of LTE core network and Lawful Interception.

Talk Overview

With an increased data rate, lower latency and high reliability, 5G network is becoming the key technology serving Internet of Things (IoT) and subsequently Internet of Drones (IoD) connectivity. Connected Unmanned Aerial Vehicles (UAVs) or drones would be widely deployed by government entities as well private enterprises for various applications namely smart city, transportation, industry and digital health. Some of these applications carry critical missions such as military, public safety, mobility, energy and emergency services, where an anomaly in the original function means the difference between life and death. Therefore, a secure architecture and communication is a major consideration for the entities that provide mentioned services.

Firmware Security - An Introduction

Priyadharshini Krishnan

Engineering Manager, American Megatrends International LLC
Priyadharshini Krishnan
About Priyadharshini Krishnan

Priyadharshini is an Engineering manager working for AMI’s Security Services and Solutions group. She currently leads a team that mainly focuses on software and firmware security solutions. Prior to this, she has been working on developing tools and applications that enable firmware development and debugging. She holds a bachelor’s degree in Computer Science and Engineering from Madras university.

Talk Overview

This talk will be centered around firmware security. We will look at the attacks on firmware, and the need for firmware security. We will also look at first steps in implementing firmware security and AMI's contributions towards firmware security solutions.

Recon to Software Supply Chain Attack

Komal Armarkar

Security Analyst, CrowdStrike
Komal Armarkar
About Komal Armarkar

Komal Armarkar is currently working as Security Analyst in Spotlight vulnerability management team at CrowdStrike. In her overall experience of 7 years, she has worked in various fields like policy compliance, Linux system administration and application security. She has a keen interest in vulnerability analysis and research, application security.

Talk Overview

As our society is becoming more and more technologically reliant, the importance of cybersecurity is on rise. A single cyber-attack can cause heavy damages to businesses. Organisations today face unprecedented number of attacks that begin even before any software is ever made. Supply chain attacks can damage organisations, individual departments, or entire industries by targeting and attacking insecure elements of the software supply chain. A software supply chain attack infiltrates software life cycle by leveraging open source components to inject malicious code in order to compromise software systems further down the chain.

The presentation will discuss how simple recon techniques like JavaScript recon, GitHub recon, social engineering can lead to highly damaging software supply chain attacks and measures to protect against them.

The target audience for this talk would be anybody who is currently working or who has just started in cybersecurity field or anybody who wants to learn something new.

Evolution of Endpoint Detection and Response(EDR)

Aarti Gupta

Director Engineering, CrowdStrike
Aarti Gupta
About Aarti Gupta

Aarti is a Director of Engineering at CrowdStrike, she is currently working on a next-gen cloud-based security product. Previously, she was Director of Engineering at Qualys and was responsible for building out Qualys’s Security Analytics platform. Aarti has extensive experience with building web scale systems, having previously worked for Amazon and Hotstar.

Talk Overview

In this talk, Aarti looks at the evolution of EDR technology over the years and how the cloud has been leveraged to improve upon the fidelity of traditional EDR systems.

Panel Discussion: Cybercrime and Pathways

Sundari Nanda

CVO & Special Commissioner(Vigilance), Delhi Police
Sundari Nanda
About Sundari Nanda

Sundari Nanda has served with Delhi, Goa and Arunachal Pradesh Police. she has been on deputation with the Central Bureau of Investigation for seven years and also served as Commandant, 2nd Battalion of Arunachal Armed Police, deployed along with the terrorist infested border of Assam.

Cyber Initiatives launched:

  • She established the Cyber Crime Investigation Cell of CBI in the year 2000, which was the first in India
  • As DCP (Crime against Women) Cell of the Delhi Police for a short stint in 1995, she registered the first case in India on incest, which brought this hitherto cupboard issue into the open.
  • As the Secretary of the Delhi Police Recruitment Board during 1997, she was the first to completely computerize the recruitment.

Talk Overview

The panel discussion will be about the most prevalent cyber crime today in India, and the policies that are being designed to tackle them. Sundari will moderate the panel discussion. She will be joined by other esteemed guests.

Cybersecurity of Embedded Networks in Heavy Vehicles

Indrakshi Ray

Professor, Computer Science Department, Colorado State University
Indrakshi Ray
About Indrakshi Ray

Dr. Indrakshi Ray is a Professor in the Computer Science Department at Colorado State University. She is the Director of Colorado Center for Cybersecurity at Colorado State University. She is also the Site Director of NSF IUCRC Center for Cybersecurity Analytics and Automation. Dr. Ray has been a visiting faculty at Air Force Research Laboratory, Naval Research Laboratory, and at INRIA, Rocquencourt, France. She obtained her Ph.D. in Information Technology from George Mason University.

Dr. Ray's research interests include software assurance, data analytics and security. She has published almost two hundred technical papers in refereed journals and conference proceedings with the support from agencies including Air Force Research Laboratory, Air Force Office of Scientific Research, National Institute of Health, National Institute of Standards and Technology, National Science Foundation, the United States Department of Agriculture, and industries from the US, Norway, and Japan.

Dr. Ray is on the editorial board of IEEE Transactions on Services Computing, International Journal of Information Security, Computer Standards and Interfaces, and Associate Editor of IEEE Security & Privacy. She was a member of the editorial board of IEEE Transactions on Dependable and Secure Computing. She serves on the program committees of various prestigious conferences and has chaired many of them. Dr. Ray is a senior member of the IEEE and a senior member of the ACM. Dr. Ray is also active in endeavors trying to increase minority participation in Computer Science.

Talk Overview

Trucks play a very role important role in driving the nation's economy, moving more than 70% of all the freights transported in the US by weight. Any event that grounds all trucks even for a few days, have severe consequences, including food shortages, hospitals exhausting their oxygen supplies, and gas stations running out of fuel. While we have not yet faced such a situation, the way modern heavy vehicles are designed, this increasingly looks like a distinct possibility. Modern day trucks are equipped with numerous sensors, embedded controllers, communication networks, and electro-mechanical systems that work in tandem to improve their performance, efficiency, safety, connectivity, and user-experience. However, they also bring up serious cyber threats to the truck's operation.

In this talk, we discuss cybersecurity in the context of modern day trucks and heavy vehicles. We discuss vulnerabilities our group has identified that span across all modern day heavy vehicles and allow a hacker to access the embedded controller network of a truck to cause different types of attacks including ones that cause a truck to not be able to start or stop. We present some approaches for detecting attacks in real-time and show how we can distinguish them from safety-critical events. We have developed reporting tools and techniques that can aid the heavy vehicle drivers in near real-time to make informed decisions in the event of a cyber attack. We conclude by discussing some of our future research directions in heavy vehicle security.

Understanding Bluetooth security.

Renu D S

Penetration Test Engineer, Schneider-Electric
Renu D S
About Renu D S
Renu D S is a Penetration Test Engineer at Schneider-Electric with an overall experience of 2.5 years mainly focusing on embedded, wireless and web security.",

Decoding the Cybersecurity Career Path

Sabna Sainudeen

President, (Women in CyberSecurity) WiCyS India
Sabna Sainudeen
About Sabna Sainudeen

Sabna Sainudeen is a Senior cybersecurity professional with exceptional skills and experience into mobile, cloud and IoT security. She is currently associated with Schneider Electric and is responsible for addressing security of IoT products including Industrial Control Systems and Home automation products. She is an Edison Expert @ Schneider Electric (Title given to selected senior level experts for their outstanding contribution in area of expertise). Sabna is the President of Women in Cybersecurity (WiCyS) India and through leading this community, she thrives to bid the gender gap that exist in Cybersecurity, with a mission to recruit, retain, and promote women in cybersecurity in India. Sabna is also a core member of WISE(Women in Schneider Electric).She is part of various communities and initiatives within and outside her organization.

Talk Overview

The cybersecurity skill shortage is getting worse and the industry is in huge demand for skilled cybersecurity professionals. But on the other hand industries still find it challenging to recruit right talents for their open position due to shortage of skilled professionals for a particular job profile. One of the reason for this is that cybersecurity aspirants and graduates are not sure on how to start their career in this industry. These young aspirants are so overwhelmed with lot of resources, online courses and blogs, that they feel lack of focus or clarity in their career goals. Many kinds of job roles are available within cybersecurity and many aspirants don't have a visibility on what these roles are all about and hence not able to judge whether a particular role is right fit for them or not. This talk covers an overview on how to start a career in cybersecurity, different roles and career option available in cybersecurity . This talk would also cover on certain aspects on how to advance in this career from Entry level to Senior Level.

Achieving Excellence in Cybersecurity

Asha Poluru

Head HR, Sophos, India
Asha Poluru
About Asha Poluru

Asha Poluru is a seasoned HR leader at Sophos, India with 20+ years of expertise in the industry.

Talk Overview

In her talk, Asha will shed light on the different kinds of profiles in the field of cybersecurity, what type of skills are required for them, and how to develop these skills.

A Few Thoughts on Authenticated Encryption

Lakshmy K.V.

Assistant Professor, Amrita University
Lakshmy K.V.
About Lakshmy K.V.

Dr. Lakshmy K. V. obtained her PhD (Cryptographic Boolean fuinctions) from Amrita Vishwa Vidyapeetham. Currently, She is working as Assistant Professor at TIFAC-CORE in Cybersecurity, Amrita Vishwa Vidyapeetham, Coimbatore. Her research interests are Cryptography, Cryptanalysis, Cryptogaphic Protocols and Abstract algebra.

Talk Overview

In this talk we discuss about the need for authenticated encryption and the current state of art in the design and analysis of AE Schemes.

Covert delivery mechanisms

Amritha P.P.

Assistant Professor, Amrita University
Amritha P.P.
About Amritha P.P.

Dr. Amritha P.P obtained her Ph.D (Steganalysis) from Amrita Vishwa Vidyapeetham. Currently, She is an Assistant Professor at TIFAC-CORE in Cybersecurity, Amrita Vishwa Vidyapeetham, Coimbatore. Her research interests are Steganography, Steganalysis, Watermarking, Software obfuscation and machine learning in cybersecurity.

Talk Overview

Secure communication methods using steganography, watermarking and also network protocols for covert communication will be discussed in this talk. Obfuscation is a defense against various reverse engineering techniques. Software obfuscation translates software into a semantically equivalent one that is hard for attackers to analyze. Some obfuscation techniques will be introduced in this talk.

Pre-Conference Speakers

Cybersecurity for IOT/ICS

Jhilmil Kochar

Managing Director, CrowdStrike, Pune, India
Register Now
Friday, 2nd April - 20:00 IST
Jhilmil Kochar
About Jhilmil Kochar

Jhilmil has been serving as the Managing Director, CrowdStrike India for the past 4 years. She set up the India team from scratch and has been delivering security products for IT security operations. She comes armed with 25+ years of technology leadership experience in domains spanning Cybersecurity, Telecom and Networking, Semiconductor and IOT, Gaming and Multimedia. Earlier she led the India center for WMS Gaming, a Scientific Games company. Prior to that she has worked as in various engineering leadership roles at McAfee and Conexant Systems.

Talk Overview

In this talk, you will learn about the challenges faced around cybersecurity in IOT, with special focus on ICS environment. The talk will also cover recent trends in the threat landscape and a wholistic approach towards a more secure manufacturing environment.

mail@shakticon.com
© Team Shakti 2020 - 2021. All Rights Reserved.