< NULLCON 2025 - GOA />

Conference Speakers

KEYNOTE SPEAKER

Daniel Cuthbert
Fueling the Future: Building Robust Engines for a Secure Digital World
All Speakers
Technical Speakers
CXO Speakers
iOS and macOS Track
BountyCraft Track
Winja Track
Supply Chain Track
Workshop and Villages
Abhisek Datta
Co-Founder SafeDep
Surfing the Wild Wild West of Open Source Software Supply Chain Risks
Learn more
Adam Laurie
Chief Product Security Officer ALPITRONIC
Tackling Automotive Hardware Vulnerabilities
Ajit Hatti
Null community co-founder, Founder of PureID
Cyber Tech 2030: The Next Chapter in AI, Zero Trust & Offensive Defense
Akhil Mahendra
Engineering Leader - Security Engineering CRED
Hritik Vijay
Security Engineer CRED
Yadhu Krishna M
Security Engineer CRED
Securing the chains: Building defensive layers for software supply chains
Learn more
Akshay Jain
Security Engineer PhonePe
Bharath Kumar
Security Engineer PhonePe
Instrumenting the Unknown: Leveraging Frida for Binary Analysis on Linux
Learn more
Akshay Sharma
Freelance Bug Hunter
Devesh Bhatt
Senior Security Manager Adobe
Krishna Pandey
Senior Director, Cybersecurity Xerox
Thiruraghavan Madhugiri Seshadri
Director Security Adobe
Bug Bounties 2.0: AI, Automation, and the Future of Ethical Hacking
Learn more
Alla Vamsi Krishna
Project Assistant Indian Institute of Science, Bengaluru
Kandi Abhishek Reddy
Security Researcher Team bi0s
Kernel Conquest: Breaking Boundaries and Demystifying Kernel SU for Root Access in Azure Cloud Shell
Learn more
Amey Gat
Principal Threat Researcher Fortinet
Namrata Godhanbhai Brahmkshatriya
Lead Cybersecurity Engineer Supremology
Pick, Tinker, Learn: Demystifying Locks for Physical Security
Learn more
Andras Tevesz
Senior Vulnerability Researcher CUJO AI
How to Teach Threading to a Dolphin
Learn more
Anto Joseph
Principal Security Engineer Eigen Labs
The Future is Trustless: How zkVMS and zkTLS Transform Bug Bounties
Learn more
Arnav Khorana
Regional Sales Leader - Cortex at Palo Alto Networks
AI versus AI : Reimagining Security Operation
Arshid Shyam Kumar
Technical Expert Siemens
Chinmay Krishna R
Junior-year Integrated Master’s Student IIIT-Bangalore
Building Glitch-Resistant Firmware: Practical Software Countermeasures for Hardware glitch attacks
Learn more
Aseem Jakhar
Co-Founder Expliot BV
Tackling Automotive Hardware Vulnerabilities
Asuka Nakajima
Senior Security Research Engineer Elastic
Windows Keylogger Detection: Targeting Past and Present Keylogging Techniques
Learn more
Atul Kumar
Director DSCI
Unlocking India’s Cyber Potential through Strategic Policies, R&D Support, and Robust Public-Private Partnerships
Avkash Kathiriya
Sr. VP of Research and Innovation Cyware
Cyber Fusion Center: The Command Center for Integrated Cyber Defense
Bhargav Rathod
Security Analyst Salesforce
MacOS Lockdown Mode: A Forensic Deep Dive
Learn more
Binu Chacko
Group Director - InfoSec at Walmart Tech India
Binu Chacko
Bithal Bhardwaj
CEO, Gramax, GMR Group
How can organisations protect themselves against Advanced Cyber Threats
Burgess Cooper
Deputy Cybersecurity Leader and Partner, EY
Converging IT and OT Security: Unified strategies for protection, detection and response.
Cameron Vincent
Security Engineer Microsoft
Google Give Me Vulnz
Learn more
Cassie Crossley
VP, Supply Chain Security Schneider Electric
Enterprise Readiness for Supply Chain Attacks
Daniel Schmidt
Security Consultant Security Research Labs
Kevin Valerio
Security Engineer Security Research Labs
Fuzzing Rust Smart Contracts: Writing A Bug Printer Engine From Scratch
Learn more
Dennis Giese
Security Researcher Independant
How Ecovacs robots got hacked and what we can learn
Learn more
Dr. Shailendra Fuloria
CISO Nagarro
Converging IT and OT security: Unified strategies for protection, detection, and response
Drishti Jain
International Tech Speaker
Satellite Communications: Analyzing and Protecting Space-Based Assets
Learn more
Durga Dube
Executive Vice President at RIL
Durga Dube
Eugene Lim
Lead Cybersecurity Engineer - Open Government Products
Guilt by Association: Pwning Millions of Smart Weighing Machines with API and Hardware Hacking
Learn more
Felix Mohan
CEO CISO Cybersecurity
AI in SecOps: Enhancing Incident Response with Intelligence
Gayatri Sunil Relekar
Student VIT, Pune
Prateek Singh
Lead OT Cybersecurity - APAC Eaton
Bridging the Gap: Enhancing OT Security with an Affordable Testbed
Learn more
Gene Golovinsky
VP Application Security, ServiceNow
From Code to Defense: Why Developers Are the New Security Leaders
Hilal Lone
CISO Razorpay
From Code to Defense: Why Developers Are the New Security Leaders
Karan Sajnani
Founder RUDRA Cybersecurity
Jaden Furtado
Security Engineer R.U.D.R.A Cybersecurity Pvt Ltd
Sachin Gowda
Radio Hacking Workshop
Learn more
Kartik Lalan
Security Architect PIC
eKYC Crisis: Securing the Lockers
Learn more
Ketan Vyas
Global Head - Software Security TCS
Modernizing Security Architecture: Platforms or Best-of-Breed, What Works Best?
Krishan Dev
Head of Information Security IIB
Navigating Data Protection in the age of globalisation
Krishna Pandey
Senior Director, Cybersecurity Xerox
Bug Bounties 2.0 : AI, Automation, and the Future of Ethical Hacking
Kuldeep Singh
Addl. GM (IT) NTPC
Converging IT and OT security: Unified strategies for protection, detection, and response
Kumar Ashwin
Technical Manager, Research & Consulting Redhunt Labs
Hidden in Plain Sight: Large-Scale Exposure of Orphaned Commits on Major Git Platforms
Learn more
Lars Fröder
Security Researcher Cellebrite Labs
State of iOS Jailbreaking in 2025
Learn more
Maor Abutbul
Vulnerability Researcher CyberArk Labs
Your Identity is Mine: Techniques and Insights from OS Identity Providers Research
Learn more
Mathan Kasilingam
CTSO & Data Privacy Officer Vi Ltd
Cyber Fusion Center: The Command Center for Integrated Cyber Defense
Matthias Frielingsdorf
Co-Founder & VP of Research iVerify
Predator Malware: Trust Broken at the Core
Learn more
Michael Hendrickx
Principal Security Research Manager Microsoft
Project Dusseldorf: finding out-of-band vulnerabilities at cloud scale
Learn more
Mrudul Uchil
VP Cybersecurity India Visa
AI in SecOps: Enhancing Incident Response with Intelligence
Parag Deodhar
Managing Director Accenture India
AI in SecOps: Enhancing Incident Response with Intelligence
Prajal Kulkarni
CISO Groww
Modernizing Security Architecture: Platforms or Best-of-Breed, What Works Best?
Prithvi Raju Alluri
CISO at Darwinbox
AI versus AI : Reimagining Security Operation
Rahul Neel Mani
Vice President at ISMG
Rahul Neel Mani
Rishi Rajpal
Global VP Security Concentrix
Threat Informed Actional Defence
Rohit Sharma
CISO Adani Power
Converging IT and OT security: Unified strategies for protection, detection, and response
Sachin Burman
JS. Tech. NTRO
Converging IT and OT security: Unified strategies for protection, detection, and response
Sachin Jain
Chief Engineer, R&D Stryker
Tackling Automotive Hardware Vulnerabilities
Saikat Datta
Founder & CEO, DeepStrat
Navigating Data Protection in the age of globalisation
Sandeep Singh
Director, Security Strategy, and Operations HackerOne
MLOps Under Attack: Threat Modeling Modern AI Systems
Learn more
Sanjay Bahl
DG CERT-In
Enterprise Readiness for Supply Chain Attacks
Sanjeev Dhallam
Vice President - Core Network & Security at Bharti Airtel
Cyber Security from Telco lens
Learn more
Satyavathi Divadari
Deputy Chief Information Security Officer at Freshworks
Modernizing Security Architecture: Platforms or Best-of-Breed, What Works Best?
Savita Utreja
Group Coordinator (Cyber Security), MEIT GOI
Unlocking India’s Cyber Potential through Strategic Policies, R&D Support, and Robust Public-Private Partnerships
Sebastian Neef
PHD candidate Technical University of Berlin
What the PHUZZ?! Finding 0-days in PHP Apps with Coverage-guided Fuzzing
Learn more
Srihari Kotni
Chief Information Security Officer Jio Finance
Modernizing Security Architecture: Platforms or Best-of-Breed, What Works Best?
Tijme Gommers
Offensive Cyber Security ABN AMRO Bank
The hidden ART of rolling shellcode decryption
Learn more
Vaibhav Gupta
Founder & CTO Appfend
From Code to Defense: Why Developers Are the New Security Leaders
Vaibhav Lakhani
Cyber Security Consultant Kroll Global Solutions LLP
Drawing parallels between iOS and macOS Pentesting with DVMA
Learn more
Varun Singla
SVP, CISO at Bharti Airtel
Cyber Tech 2030: The Next Chapter in AI, Zero Trust & Offensive Defense
Vikas Goyal
VP IT Security FIS
From Code to Defense: Why Developers Are the New Security Leaders
Vinay Jain
Associate VP Risk Management at ICICI Lombard
AI versus AI : Reimagining Security Operation
Vishal Salvi
CEO, Quickheal
How can organisations protect themselves against Advanced Cyber Threats
Wietze Beukema
Independent Research
Will It Run? Fooling EDRs with command lines using empirical data
Learn more
William Robinet
CTO Conostix Luxembourg
Trapped by the CLI
Learn more
Wojciech Regula
Principal Security Consultant SecuRing
Broken isolation - draining your credentials from popular macOS password managers
Learn more
Yashodhan Vivek Mandke
Research Scholar MIT-WPU
Reversing Large Deep learning AI Models
Learn more
Yask Sharma
CISO Indian Oil
Converging IT and OT security: Unified strategies for protection, detection, and response
Yogi Kapur
Senior Director, Information security operations at Salesforce
Cyber Fusion Center: The Command Center for Integrated Cyber Defense