π₯ 2025
- Shadows in the Chain: When Dev Dependencies Turn Against You β Pune (April 2025)
Presented a live demo of transitive dependency attacks and strategies for detection and prevention.
- When AI Writes Your Threat Model: Guarding Against Semantic Drift β Rootconf 2025 (Bangalore)
Showcased the risks of semantic drift in GenAI-based threat modeling, and how subtle changes can derail security decisions.
- The Misery of Overpermissive Roles in Snowflake – Virtual Talk, Pune
Deep dive into real-world abuse cases and how to fix broken RBAC models in data platforms.
- Building AI-Resilient Security Architecture β Bengaluru (Feb 2025)
Covered GenAI risks in product pipelines and mitigation patterns for developers and security architects.
- Red Teaming LLMs: Prompt Injection to Jailbreaks β Bangalore
Hands-on workshop with real-world exploit chains using open-source GenAI APIs.
- Securing SaaS with Data-Aware Threat Modeling β Privacy Mode Roundtable
Practical session on aligning privacy engineering and threat modeling for SaaS architectures.
π 2024
- Cloud-Native Security for the AI Era β Virtual Talk (Oct 2024)
Discussed evolving threat models in multi-cloud GenAI platforms.
- Snowflake and Veza: Supercharge Security with Delightful Governance – Snowflake Summit 2024, San Francisco
- Classify, Tag and Protect: A Holistic Approach to Data Governance in Snowflake Horizon – Snowflake World Tour, Delhi
- AI Governance and Security Best Practices with Snowflake Horizon –SNOWFLAKE WORLD TOUR, Bangalore
- Understanding AI Drift and Security Automation Triggers – Pune
Showed how AI-generated threat models can misalign over time without architectural checkpoints.
π₯ 2023
- Securing Generative AI: Playbooks for Red, Blue, and Builders –
Covered threat surfaces and governance for GenAI integration in enterprise applications.
- Security Meetup CyberFrat – Strengthening Defenses: The Power and Necessity of AI in Cybersecurity
- Zero Trust in Cloud Identity: What Works and Whatβs Just Hype – Virtual Talk
Highlighted misconceptions and implementation strategies for Zero Trust in IAM.
π¦ 2022
- Building SaaS Security Using Snowflake – Data Who (Snowflake) – Pune
- Bake The Cake – Finding Abuse in Use Cases – Internal Talk – Pune
- Modern Threat Modeling for Agile Teams – Pune
Practical examples of incremental threat modeling using visual tooling.
- When Compliance Fails: Learning from Data Breach Investigations –
Tied real incidents to root cause failures in compliance-driven security programs.
π 2021
- AI vs AI: Defending Against Adversarial ML Attacks – Online
Discussed poisoning, evasion, and model inversion attacks on ML pipelines.
- Hunting for Hidden Admins in Cloud Data Platforms β Virtual Talk
Technical walkthrough of nested roles and misuse patterns in modern data architectures.
π 2019β2020 (Pre-COVID / Virtual Mix)
- Security Observability for DevOps β null Hyderabad
Tools and practices for runtime behavior tracking in CI/CD pipelines.
- From FOMO to 2FA: Behavioral Security for the Modern User β DeveloperWeek Virtual
Fun, storytelling-driven talk on UX-aware security nudges.
- Cybersecurity in the COVID Crisis: What Broke and What Worked β InfoSec Remote Meetup
Roundtable on ransomware spikes, healthcare breaches, and pandemic-fueled threats.
π€ 2014β2018 (Early Career Highlights)
- A Strategic Path from Secure Code Reviews to Threat Modeling (101) – Bangalore (null)
- How to Start with Bug Bounties the Right Way β Chennai
Tactical session for college students and early-career professionals.
- Why Devs Hate Security (And What We Can Do About It) β Community Tech Talks
Engaging talk with analogies and developer-first empathy-driven security strategies.
- OWASP Top 10 in Practice β Cigital Intern Talk
Internal session for onboarding new developers into secure coding practices.
- Cybersecurity Club Workshop Series β College Events (Various)
Ran 6+ awareness sessions, including capture-the-flag simulations and ethical hacking basics.