πŸ”₯ 2025

  • Shadows in the Chain: When Dev Dependencies Turn Against You – Pune (April 2025)
    Presented a live demo of transitive dependency attacks and strategies for detection and prevention.
  • When AI Writes Your Threat Model: Guarding Against Semantic Drift – Rootconf 2025 (Bangalore)
    Showcased the risks of semantic drift in GenAI-based threat modeling, and how subtle changes can derail security decisions.
  • The Misery of Overpermissive Roles in Snowflake – Virtual Talk, Pune
    Deep dive into real-world abuse cases and how to fix broken RBAC models in data platforms.
  • Building AI-Resilient Security Architecture – Bengaluru (Feb 2025)
    Covered GenAI risks in product pipelines and mitigation patterns for developers and security architects.
  • Red Teaming LLMs: Prompt Injection to Jailbreaks – Bangalore
    Hands-on workshop with real-world exploit chains using open-source GenAI APIs.
  • Securing SaaS with Data-Aware Threat Modeling – Privacy Mode Roundtable
    Practical session on aligning privacy engineering and threat modeling for SaaS architectures.

πŸ” 2024

  • Cloud-Native Security for the AI Era – Virtual Talk (Oct 2024)
    Discussed evolving threat models in multi-cloud GenAI platforms.
  • Snowflake and Veza: Supercharge Security with Delightful GovernanceSnowflake Summit 2024, San Francisco
  • Classify, Tag and Protect: A Holistic Approach to Data Governance in Snowflake HorizonSnowflake World Tour, Delhi
  • AI Governance and Security Best Practices with Snowflake HorizonSNOWFLAKE WORLD TOUR, Bangalore
  • Understanding AI Drift and Security Automation Triggers – Pune
    Showed how AI-generated threat models can misalign over time without architectural checkpoints.

πŸ’₯ 2023

  • Securing Generative AI: Playbooks for Red, Blue, and Builders
    Covered threat surfaces and governance for GenAI integration in enterprise applications.
  • Security Meetup CyberFrat – Strengthening Defenses: The Power and Necessity of AI in Cybersecurity
  • Zero Trust in Cloud Identity: What Works and What’s Just Hype – Virtual Talk
    Highlighted misconceptions and implementation strategies for Zero Trust in IAM.

πŸ“¦ 2022

  • Building SaaS Security Using Snowflake – Data Who (Snowflake) – Pune
  • Bake The Cake – Finding Abuse in Use Cases – Internal Talk – Pune
  • Modern Threat Modeling for Agile Teams – Pune
    Practical examples of incremental threat modeling using visual tooling.
  • When Compliance Fails: Learning from Data Breach Investigations
    Tied real incidents to root cause failures in compliance-driven security programs.

πŸ“Š 2021

  • AI vs AI: Defending Against Adversarial ML Attacks – Online
    Discussed poisoning, evasion, and model inversion attacks on ML pipelines.
  • Hunting for Hidden Admins in Cloud Data Platforms – Virtual Talk
    Technical walkthrough of nested roles and misuse patterns in modern data architectures.

πŸŽ™ 2019–2020 (Pre-COVID / Virtual Mix)

  • Security Observability for DevOps – null Hyderabad
    Tools and practices for runtime behavior tracking in CI/CD pipelines.
  • From FOMO to 2FA: Behavioral Security for the Modern User – DeveloperWeek Virtual
    Fun, storytelling-driven talk on UX-aware security nudges.
  • Cybersecurity in the COVID Crisis: What Broke and What Worked – InfoSec Remote Meetup
    Roundtable on ransomware spikes, healthcare breaches, and pandemic-fueled threats.

🎀 2014–2018 (Early Career Highlights)

  • A Strategic Path from Secure Code Reviews to Threat Modeling (101) – Bangalore (null)
  • How to Start with Bug Bounties the Right Way – Chennai
    Tactical session for college students and early-career professionals.
  • Why Devs Hate Security (And What We Can Do About It) – Community Tech Talks
    Engaging talk with analogies and developer-first empathy-driven security strategies.
  • OWASP Top 10 in Practice – Cigital Intern Talk
    Internal session for onboarding new developers into secure coding practices.
  • Cybersecurity Club Workshop Series – College Events (Various)
    Ran 6+ awareness sessions, including capture-the-flag simulations and ethical hacking basics.