Connect with talented speakers from around the world. Search by expertise, topics, or use our advanced filters to find the perfect speaker for your event.
Assistant Professor
Rashtriya Raksha University
Gandhinagar,India
Dr. Akash Thakar is an Assistant Professor at Rashtriya Raksha University (RRU), an Institution of National Importance under the Ministry of Home Affairs, Government of India, where he specializes in Digital Forensics, Incident Response, and Cyber Security Operations. He holds a Ph.D. in Forensic Science and multiple industry certifications, including CEH (Certified Ethical Hacker), CHFI (Computer Hacking Forensic Investigator), and CEI (Certified EC-Council Instructor). He was awarded with best academia instructor award in 2023 by EC-Council.Dr. Thakar has served as a trainer and Red Team Manager in several large-scale national cyber security exercises organized by National Security Council Secretariat, including the Bharat National Cyber Security Exercise (2023, 2024, 2025), SOC RATS, and CII SECEx organized by NCIIPC, Government of India, among others. Across these exercises, he designed and delivered live training modules in Digital Forensics and Incident Response, simulating real-world adversary operations and guiding blue teams through evidence collection, analysis, and remediation.His professional engagements span both offensive and defensive cyber operations, where he focuses on bridging the gap between attacker tactics and forensic detection. Dr. Thakar has contributed to developing training frameworks for national cyber defence initiatives, collaborated with government and academic partners, and frequently delivers talks and workshops on advanced forensic methodologies and detection-driven threat hunting.Dr. Akash Thakar continues to advance cyber education through hands-on, detection-oriented programs that integrate red-teaming insights with forensic science for practical, real-world defense.
Senior Security Compliance and Privacy Analyst
Accorian
Bengaluru
Actively working on leveraging AI to streamline compliance workflows. Passionate about bridging the gap between traditional security models and evolving AI-driven architectures, with a focus on delivering practical, real-world insights to the security community.
Director, Information Security
Roush
Detroit,Michigan
Keynote speaker with a proven track record presenting at premier industry conferences, including Secureworld, ISSA Motor City, RSAC CLF. Served as a Keynote Speaker at SecureWorld Detroit 2025, delivering executive-level insights on cyber risk, AI-driven threats, and enterprise resilience.
Co-Founder & CEO
Barracks
Ahmedabad, India
Satyam Gothi is a full-time bug bounty hunter, co-founder of Barracks, and a member of the elite Synack Red Team (SRT) - Top 200 worldwide - one of the most selective vetted researcher communities in the industry, with a sub-10% acceptance rate globally.Known online as RogueSMG, he is a Null Ahmedabad Champion, part-time Security content creator on YouTube, and a repeat speaker at BSides Ahmedabad - most recently presenting "Client-Side to Critical" at BSides Ahmedabad 0x05. He has spoken at security forums including NullAhm and PrivEscCon, and has been featured in tech talks by organisations including Treebo & HackenProof.At Barracks, he leads the design and execution of cognitive assessment events for Cybersecurity talent recognition & hiring - running structured vulnerability assessment challenges across events like BSides Ahmedabad, BSides Vizag, CyberKavach, IdentityShield Summit, and more.
student
National Forensic Sciences University Delhi Campus (LNJN NICFS)
Delhi, IND
Currently pursuing an M.Sc. in Digital Forensics and Information Security at NFSU, building on a BCA background and a strong interest in cybersecurity, digital forensics, and the role of AI in national security. My academic journey and personal projects have consistently focused on understanding how digital systems function and more importantly, how to secure them. With a foundation in computer applications and practical, problem-solving experience, I’m now exploring deeper domains like threat detection, digital investigations, and intelligence-driven security systems. I’m particularly interested in how AI can be applied to surveillance, decision making, and cyber defense. My goal is to work on projects and research that bridge theoretical knowledge with real-world applications, especially in areas that contribute to critical infrastructure and national security.
Principal Security Architect
Microsoft
Hyderabad,India
Kesav Viswanath Nimmagadda is a Principal Security Assurance Engineer at Microsoft with 14+ years of experience across application security, third‑party software security, and enterprise risk management. He leads large‑scale security governance programs covering the full software lifecycle, including CI/CD security, third‑party risk assurance, M&A security assessments, and enterprise-wide remediation campaigns with executive visibility.At Microsoft, Kesav has been instrumental in building and scaling security assurance for thousands of first‑ and third‑party applications, balancing business criticality with rigorous security controls. He works closely with engineering, procurement, legal, and compliance teams to operationalize policy, manage exceptions, and drive secure outcomes without disrupting the business.Kesav is a frequent industry speaker and presenter at forums such as CanSecWest and FIRECon, where he shares practical insights on securing the third‑party software supply chain and building resilient security programs at scale. He holds a Master’s degree in Computer Networks and Information Security and is passionate about building evidence‑backed, defensible security processes in complex enterprise environments.
Project Assistant
C3iHub
Dehradun, India
Provided Malware Analysis training to 200+ Government Employees over a week.Done my M.Tech degree in cyber security from RRU Gandhinagar.Been part of DRDO (Delhi) for CyberSecurity a projectRed Teamer at NCX '25 and CII-SECEX '25
Security Engineer
Bengaluru
Aarushi Koolwal is a Security Engineer in Risk & Security Engineering at PhonePe, with four years of experience spanning security engineering, risk analysis and threat intelligence.Aarushi is also an active speaker who has presented at leading cybersecurity conferences such as Black Hat MEA, BSides Ahemdabad, BSides Mumbai and c0c0n. She has previously worked with CloudSEK and NotSoSecure
Vice President (VP) of technology for Endpoint & Data Security
miniOrange
Pune
I build and break Identity Systems for a living. With 14 years in Cyber Security, I’ve worked across Identity & Access Management (IAM), Non-Human Identities Security, Endpoint Security, Data security, and Cloud Applications Security focusing on how access really works versus how we think it works.
Security Reseracher
BharatGen, IIT-B
Chandigarh,India
Vishal Chand is a Security Researcher at Zscaler focusing on AI driven cybersecurity and LLM security. He has spoken at Microsoft BlueHat Asia and multiple BSides conferences across India. His work explores real world AI threats, adversarial techniques, and next generation defense strategies.
Chief Mad Scientist
Retired
New York
I am a long-time FSF developer and the current author and developer of many Python bytecode tools and debuggers. This includes a cross-version bytecode disassembler, decompilers, and debuggers for Python.I have been writing open-source software for 3 decades. You may even have some software I wrote on your computer, for example, if you have an open-source media player installed.I have written several debuggers for languages outside of Python, such as ones for Mathematica, bash, and GNU Make. Bits of this code can be found in commercial debuggers.I have worked at:IBM Research,NASA (as a government contractor),a university,a large financial firm,a large news organization (Associated Press),a large survey firm, andfar too many start-up companies, mostly in or near New York
Hardware Security Researcher
Defhawk
Delhi
I like to explore the Internet of Things Security.
Senior Vulnerability Analyst
Mastercard
Pune
Cybersecurity professional working at the intersection of offensive security, vulnerability management, and real world enterprise risk. Experience includes security research, penetration testing, and leading governance initiatives across large scale global environments, with a focus on translating adversarial thinking into practical security improvements and resilient organizational defenses.
Founder
Novus Aegis AI Inc
DallasTexas
AI Security Architect, and Founder of Novus Aegis AI and ReconPro. He specializes in building autonomous, AI-driven Security Operations (AI SOC) platforms that detect, triage, and respond to cyber threats in real time.With over a decade of hands-on experience in cloud security, DevOps, and cyber defense, Chris has designed and secured enterprise-scale infrastructures by embedding security into CI/CD pipelines and infrastructure-as-code. His expertise includes vulnerability management (SCA, SAST, DAST), red teaming, APT simulation, and SOC automation, aligned with frameworks such as NIST, ISO 27001, and SOC 2.He is the creator of “God’s Eye,” an advanced capability within ReconPro that delivers continuous attack surface visibility, adversary simulation, and intelligence-driven security insights. Through Novus Aegis AI, he is advancing autonomous cyber defense using AI agents that proactively hunt threats, reduce alert fatigue, and compress incident response times from hours to seconds.Chris is passionate about shaping the future of cybersecurity through AI-driven defense, offensive security strategy, and building resilient, self-adapting security ecosystems for enterprises globally.
Student/Cybersecurity Researcher
Rashtriya Raksha University
Hanamkonda,India
Jakkaraju Varshith is a student and cybersecurity researcher pursuing an M.Sc in Cybersecurity and Digital Forensics at Rashtriya Raksha University. His work focuses on red-team operations, Windows exploitation, and malware behavior in real-world enterprise environments.He has hands-on experience in exploit development, digital forensics, and AI-driven security automation. Varshith actively builds open-source security tooling, including MCP-based integrations for Volatility memory forensics and IDA Pro binary analysis, helping bridge modern AI assistants with practical security research workflows. His approach combines offensive experimentation with defensive validation, enabling teams to understand attacker tradecraft and improve detection resilience through reproducible, lab-tested methods.
Swiss Re Group Ltd.
Zurich,Switzerland
bio here.
Sr associate cyberops & assurance
american express
Gurugram
While this would be my first conference talk, I have been actively involved in the security community and previously volunteered at BSides Delhi as a moderator. This gave me exposure to how talks are structured and delivered, and how to engage with an audience effectively.In my professional role, I regularly present security risks, audit findings, and control gaps to stakeholders, which has helped me develop clear and structured communication skills. I’m excited to bring these real-world insights to a broader audience.
Founder and CEO
C1PH3R-FSocitey
Delhi
Rahul Thareja is the Founder and Hardware Security Researcher at C1ph3r-Fsociety, where he develops offensive security hardware focused on RF, BLE, Wi-Fi, and embedded system attack surfaces. With a background in robotics engineering and embedded systems, his work centers on building practical hardware tools that help researchers explore wireless vulnerabilities and understand real-world attack scenarios.He actively contributes to the security community by organizing hands-on hardware hacking villages where attendees can interact with custom-built devices demonstrating wireless security concepts. Rahul has also hosted soldering villages that introduce participants to basic electronics assembly and hardware hacking, helping make the hardware side of cybersecurity more accessible to the community.
Security Researcher
CyberWarFare Labs
India
Abhijeet is a security researcher specializing in adversary simulations that mimic advanced threat actors, by crafting multi stage attack chains, from initial foothold to stealthy persistence and data exfiltration. With extensive hands-on experience, he has engineered and executed offensive engagements targeting CI/CD pipelines, Kubernetes clusters, Active Directory environments, cloud infrastructures (AWS, Azure, GCP), and *NIX systems. In his spare time he runs a homelab where he recreates adversary TTPs, toys with new tech, and dissects emerging threats. He’s also an avid reader, enthusiastic foodie, and weekend time home chef.
Senior Consultant
The SecOps Group
Ahmedabad
I’m Ravi Solanki, a CREST-certified penetration tester and cybersecurity consultant with over 5 years of hands-on experience in breaking and securing web applications, APIs, mobile apps, networks, and cloud environments (AWS & Azure). In my current role as a Senior Consultant at The SecOps Group, I’ve worked with global clients across the UK and US, where I’ve identified critical vulnerabilities like SQL injection, authentication bypass, and command injection—helping organizations strengthen their security posture in real-world conditions. I specialize in thinking like an attacker. Instead of just explaining vulnerabilities, I focus on how they actually get exploited and how they can be prevented effectively. My work is deeply aligned with OWASP Top 10, and I actively work across SAST, DAST, and cloud security testing. Beyond testing, I enjoy mentoring, sharing knowledge, and contributing to the security community through research and hands-on learning. I’ve guided junior security professionals, conducted internal training sessions, and continuously explore new attack techniques through CTFs and real-world scenarios. As a speaker, I deliver practical, no-fluff sessions with real attack demos, case studies, and actionable insights—so you don’t just learn security, you understand how to apply it.
CISO and DPO
NeevNaav
Vadodara
Prabhakar Damor is an AI-driven cybersecurity and digital governance leader, specializing in building secure, resilient, and compliant digital ecosystems. He enables organizations to scale AI adoption, cloud transformation, and data protection with a strong foundation of trust and regulatory alignment. With cross-sector experience, he bridges technology, business, and governance to drive future-ready digital transformation.
Director Advanced Threat Hunting Service
CyberProof
Chennai
Niranjan holds over 18 years of experience working in Threat Intelligence , Threat Hunting, Malware reverse engineering and Incident response. He has spoke in different conferences around the world working with SentinelOne, Microsoft, Symantec, McAfee and CyberProof. Many of his research works are cited in Tier 1 media journals like Forbes, Dark Reading, SC Media etc.
Founder
India
Bengaluru
Hello All.! I am Veerababu, better known as Mr-IoT, and the founder of the iotsrg.org community. My passion lies in transforming IoT security knowledge into open-source resources. Over the years, I have worked on developing ICE-Bite hardware microprobing, an IoT pentesting OS, curated lists, and insightful blogs, all aimed at advancing the field of IoT security since 2017. As a keynote speaker at BSides Dehradun, I have also had the privilege of delivering workshops, training sessions, and villages at events like c0c0n, BSides Bangalore, VulnCon, CracCon, and the Null/OWASP Bangalore communities. I have nurtured and grown the iotsrg.org community across platforms such as Reddit, Telegram, and Discord, creating a vibrant and engaging space for sharing knowledge and fostering innovation in IoT security.
Security Analyst 2
Netskope
Bangalore, India
Talks within my organisationTech Talks: I have delivered over 10 internal technical presentations tailored to a wide range of audiences across multiple product development disciplines within my organisation(netskope).Hybrid Engagement: These sessions were conducted through both face-to-face and online formats, allowing me to interact with a significant number of colleagues and refine my ability to communicate complex technical topics to diverse teams.Knowledge Transfer: Beyond formal talks, I have led dedicated mentoring sessions and deep-dive technical walkthroughs to help ramp up team members on specialized security research.External Industry RecognitionBlackHat Europe (Arsenal): I was selected to present my research and open-source tool, IOCTL Hammer, at BlackHat Europe.Expert Engagement: This experience involved presenting to an international audience of cybersecurity experts, where I successfully managed high-traffic live interactions at the Arsenal booth.Communication Mastery: Preparing for and executing this talk helped me hone my skills in articulating the technical value and novelty of my work to an external, expert-level audience.