DiscoverBreakpoint Security Podcast
Breakpoint Security Podcast
Claim Ownership

Breakpoint Security Podcast

Author: Neelu Tripathy

Subscribed: 9Played: 14
Share

Description

Breakpoint-'Exploring the depths of Defensive Security'. The defensive side of Security is a world in itself with teams achieving amazing feats that involve excellent engineering practices and smart optimisation for scale. This is not talked about enough in the industry. Join me in the br3akp0int podcast as we reflect on the methods and approaches these smart teams use to solve practical challenges in information security and innovate their way into the future. Who is this meant for? : This podcast is for anyone in InfoSec willing to know more about advances in security techniques. This includes security researchers or professionals, product owners, compliance or cloud, AI/ML, threat intel, SecOps automation, Security Leaders, development teams, pentesters and security practitioners. A bit about me: I am a technical security enthusiast and have been dabbling my hands at both offensive and defensive security. I am passionate about growing security communities and have spoken and trained at various security conferences.

58 Episodes
Reverse
TOPIC:From Vulnerability to Value: Harnessing Bug Bounties for Continuous Security Improvement Stop viewing bug bounties as just a headache! We're talking about turning #vulnerabilities into measurable #security value. My guest dives deep into how organizations can strategically shift their perspective: using #crowdsourced security intelligence as a core engine for #continuous improvement. It’s about leveraging these programs to generate critical #threatintelligence and #risk data. Eve...
TOPICFrom Vulnerability to Value: Harnessing Bug Bounties for Continuous Security Improvement Guest: Shobhit Gautam, HackerOne, Staff Security Solutions Architect, HackerOne Shobhit is a Staff Solutions Architect at HackerOne. He has 15+ years of security experience, with extensive expertise in application, cloud, and infrastructure security. He is passionate about building secure solutions and fostering a security-conscious culture. He has experience leading security awareness initiatives, m...
Guest: Saakshar Duggal, Artificial Intelligence Law Expert I Training Corporates on Cyber laws and Cyber Hygiene We talked serious **DPDP Act** compliance in the full episode, but now it's time for the fun stuff! 🚀 I put our expert through the wringer with our rapid-fire round. --- Follow us on LinkedIn: https://www.linkedin.com/company/breakpoint-security-podcast Subscribe for Video on YouTube: Subscribe: https://www.youtube.com/@BreakpointSecurityPodcast?sub_confirmation=1 If you like to se...
Guest: Saakshar Duggal, Artificial Intelligence Law Expert I Training Corporates on Cyber laws and Cyber Hygiene The DPDP Act is here, redefining digital privacy in India. But how does this new law stack up against global standards like GDPR? We're diving deep into the toughest differences and the biggest headache for every business: Consent Management. Beyond specific, informed consent and the constant right to withdraw, we tackle Data Minimization and the ambiguity of Data Retention rules....
The new DPDP Act is officially rewriting the rules for handling personal data in India. It sounds like simple compliance, but the implementation challenges for every data fiduciary are tricky—and getting it wrong could lead to massive fines. Today, we dive into the biggest hurdles, from consent management to fulfilling data principal rights. We guide you through the precise techniques you need to roll out DPDP successfully. Don't risk your organization's future—check out the full episode! G...
Guest: Jay Thoden van Velzen Technical Advisor, Office of the Chief Security Officer SAP Global Security & Cloud Compliance At Breakpoint, we tend to get real about cybersecurity. We often say security's job is to be an enabler for the business. After the myth breaking full episode, here's a light Rapid Fire where Jay shares some of his experiments on chaos engineering and other interesting adventures. -- Follow us on LinkedIn: https://www.linkedin.com/company/breakpoint-security-podcas...
Guest: Jay Thoden van Velzen Technical Advisor, Office of the Chief Security Officer SAP Global Security & Cloud Compliance In this segment, we’re unpacking the biggest myth in security: that strategy is enough. Our guest argues that culture eats strategy for breakfast, and effective security isn’t about more policies, but about deep negotiation and understanding. We’ll discuss how to use tools like security risk management and security engineering not as blockers, but as instruments for...
Guest: Dennis Giese, Independent Security Researcher You've seen the headlines, heard the wild stories, and maybe even panicked about the devices in your own home. "Hackers take control of robot vacuums, yell racial slurs." It sounds insane, but what really happened? Our guest today is one of the researchers who exposed the vulnerabilities behind these shocking incidents. In this segment, we're diving deep into the world of smart home robotics and cyber-physical security. Our guest wi...
Have you ever thought about how an attacker might reverse-engineer an AI model? Our guest today is doing just that, going beyond passwords and keys to unpack the very DNA of deep learning! In this segment, we're diving into the groundbreaking work of reversing large deep learning models. Our guest reveals how it's possible to reverse an AI model's entire mathematical structure, exposing its architecture, critical hyperparameters, and even the internal weights and biases that define its behav...
Ever wonder how zero-day vulnerabilities in your favorite websites get uncovered? Our guest today is diving into a game-changing technique: coverage-guided fuzzing for PHP web apps! Forget slow scanners; we're talking about finding critical bugs before the bad guys do. Guest: Sebastian Neef, PhD at the Technical University of Berlin, at the Chair for Security in Telecommunications In this segment, we explore PHUZZ, an open-source tool that's shaking up web application security testing. Our ...
Imagine an AI agent managing your life. Sounds cool, right? But what if it gets hacked? We're exploring the future of AI agents and the critical need for their security. As the first installment, we share this fun series where we ask our guests to share 'What they would like their Agents to do for them' :) Guest: Dr Angelina Gokhale Senior Data Scientist, Netmonastery Agents have the potential for handling finances, travel, even critical health data. But with that power comes immense risk....
Imagine an AI agent managing your life. Sounds cool, right? But what if it gets hacked? We're exploring the future of AI agents and the critical need for their security. As the first installment, we share this fun series where we ask our guests to share 'What they would like their Agents to do for them' :) Guest: Khushbu Jain Managing Partner, Data Privacy | Ark Legal Agents have the potential for handling finances, travel, even critical health data. But with that power comes immense risk....
Imagine an AI agent managing your life. Sounds cool, right? But what if it gets hacked? We're exploring the future of AI agents and the critical need for their security. As the first installment, we share this fun series where we ask our guests to share 'What they would like their Agents to do for them' :) Guest: Abhishek Datta Co-Founder | SafeDep Agents have the potential for handling finances, travel, even critical health data. But with that power comes immense risk. But that also exten...
Imagine an AI agent managing your life. Sounds cool, right? But what if it gets hacked? We're exploring the future of AI agents and the critical need for their security. As the first installment, we share this fun series where we ask our guests to share 'What they would like their Agents to do for them' :) Guest: Thiruraghavan Madhugiri Director, Security Engg | Adobe Agents have the potential for handling finances, travel, even critical health data. But with that power comes immense risk....
Effective Paper Submission for Beginners Part 03 You've seen the good researchers on stage at the best conferences or your favorite local security conference, dropping knowledge bombs and getting that well-deserved applause. Ever wondered how they got there? It all starts with a killer paper submission! In this brand new video, part of our "CFP series", I'm pulling back the curtain on 'Effective Paper Submission' for security conferences. This isn't just about having a great idea/research; ...
Imagine an AI agent managing your life. Sounds cool, right? But what if it gets hacked? We're exploring the future of AI agents and the critical need for their security. As the first installment, we share this fun series where we ask our guests to share 'What they would like their AI Agents to do for them' :) Guest: Krishna Pandey Senior Director, Cybersecurity | Xerox Agents have the potential for handling finances, travel, even critical health data. But with that power comes immense risk...
Imagine an AI agent managing your life. Sounds cool, right? But what if it gets hacked? We're exploring the future of AI agents and the critical need for their security. As the first installment, we share this fun series where we ask our guests to share 'What they would like their Agents to do for them' :) Guest: Kunal Aggarwal CTO @ RedHunt Labs Agents have the potential for handling finances, travel, even critical health data. But with that power comes immense risk. But that also extends...
Effective Paper Submission for Beginners Part 02 You've seen the good researchers on stage at the best conferences or your favorite local security conference, dropping knowledge bombs and getting that well-deserved applause. Ever wondered how they got there? It all starts with a killer paper submission! In this second episode, part of our "CFP series", I'll share some fun facts about what really makes a submission stand out, what needs to be explained, what depth to go to. In this instal...
Imagine an AI agent managing your life. Sounds cool, right? But what if it gets hacked? We're exploring the future of AI agents and the critical need for their security. In this video from this fun series, we ask our guests to share 'What they would like their Agents to do for them' :) Guest: Devesh Bhatt Cyber Security Leader | Co-Founder BSides Goa Agents have the potential for handling finances, travel, even critical health data. But with that power comes immense risk. But that a...
Imagine an AI agent managing your life. Sounds cool, right? But what if it gets hacked? We're exploring the future of AI agents and the critical need for their security. As the first installment, we share this fun series where we ask our guests to share 'What they would like their Agents to do for them' :) Guest: Anant Shrivastava Founder & Chief Researcher | Cyfinoid Research Private Limited Agents have the potential for handling finances, travel, even critical health data. But with t...
loading
Comments