VULNCON

2026
Conference: 12th & 13th June 2026
NIMHANS Convention Centre, Bengaluru
00
Days
00
Hours
00
Minutes
00
Seconds

ABOUT US

Vulncon is India’s fastest-growing technical cybersecurity conference, focused on core research, offensive security, and practical innovation.

In an evolving threat landscape, we emphasize deep technical knowledge, real-world case studies, and meaningful industry dialogue. Our platform brings together researchers, practitioners, and security leaders to exchange insights that directly address current security challenges.

Our Vision

To advance the technical foundations of cybersecurity with a strong focus on offensive security in a rapidly changing threat environment.

Our Mission

To bridge the gap between security leaders and practitioners by fostering collaboration, knowledge sharing, and actionable research.

Vulncon is designed to strengthen the security community through substance, clarity, and technical depth.

Logo

Our Speakers

TECHNICAL SPEAKERS

KEYNOTE
#K-001
Ruben Boonen

Ruben Boonen

Mobile Security Researcher

KEYNOTE
#K-002
Harriet Farlow

Harriet Farlow

CEO/Founder

Mileva Security Labs

#S-001
Riyaz Walikar

Riyaz Walikar

Chief Hacker

Appsecco

#S-002
Rushikesh D. Nandedkar

Rushikesh D. Nandedkar

Principle Threat Intelligence Analyst

#S-003
Hitesh Duseja

Hitesh Duseja

Security Researcher

AlteredSecurity

#S-004
Vishal Raj

Vishal Raj

Security Researcher

AlteredSecurity

#S-005
Ananda Krishna

Ananda Krishna

Senior Red Team Engineer

CyberProof

#S-006
Nischay Hegde

Nischay Hegde

Malware Detection Researcher

SentinelOne

#S-007
Harish Ravichandra

Harish Ravichandra

Vulnerability Engineer

Zoho

#S-008
Manish Kishan Tanwar

Manish Kishan Tanwar

Security Consultant

MDSec

#S-009
Rajat Singh

Rajat Singh

Senior Security Consultant

KPMG

#S-010
Arun Krishnan

Arun Krishnan

Security Researcher

Scapia

ARSENAL SPEAKERS

UNIT · ARSENAL
#A-001
Abhijeet K

Abhijeet K

Security Researcher

Cyberwarefare Labs

UNIT · ARSENAL
#A-002
Vikramaditya Narayan

Vikramaditya Narayan

Creator

Precogly

UNIT · ARSENAL
#A-003
Astitva Verma

Astitva Verma

Lead Security Engineer

OutSystems

CXO SPEAKERS

#C-001
Abhisek Datta

Abhisek Datta

Founder, CTO

@ SafeDep

#C-002
Ankur Bhargava

Ankur Bhargava

Head of Product Security

@ PhonePe

#C-003
Arati Avhad

Arati Avhad

Director, Security Engineering (India Site Lead)

@ Uber

#C-004
Dheeraj Yadav

Dheeraj Yadav

CISO

@ Mitigata

#C-005
Dr. Vishal Saraswat

Dr. Vishal Saraswat

Head, Research and Innovation, Cybersecurity Practice

@ Bosch Global Software Technologies Private Limited (Bosch BGSW)

#C-006
Kuldeep Tomar

Kuldeep Tomar

CISO

@ Bigbasket

#C-007
Navdeep Aggarwal

Navdeep Aggarwal

Product Security Leader

@ GE Healthcare

#C-008
Praveen Parihar

Praveen Parihar

CISO

@ Razorpay

#C-009
Sandesh Mysore Anand

Sandesh Mysore Anand

Co-Founder

@ Seezo

#C-010
Sowmya N Swamy

Sowmya N Swamy

Vice President

@ WellsFargo Solutions Limited

#C-011
Sudhakar Singh

Sudhakar Singh

VP, Head of Responsible AI

@ SAP Labs

#C-012
Sulabh Jain

Sulabh Jain

Head of Application Security - Asia/Pacific

@ Amazon

#C-013
Syed Shahrukh Ahmad

Syed Shahrukh Ahmad

Co-Founder

@ CloudSEK

#C-014
Vijayakumar C

Vijayakumar C

Vice President & CISO

@ NSE Clearing Ltd

#C-015
Vishal Kalro

Vishal Kalro

CISO & DPO

@ Quantiphi

#C-016
Yuvaraj Govindarajulu

Yuvaraj Govindarajulu

AVP - Product Engineering, Head of Research- AI Security

@ Protectt.ai

Event Timeline

timeline

Workshops

Whack-a-Clue: Chasing Timestamps across the World

Modern threat actors don’t rely on a single persistence mechanism — they weaponize time itself.

From autorun entries and scheduled tasks to registry-based triggers, Git hooks, IoT callbacks, and logic-driven execution chains, sophisticated malware quietly spreads across heterogeneous environments and activates under carefully crafted conditions.

These artefacts surface across laptops, servers, mobile devices, embedded systems, and cloud-connected infrastructure, leaving investigators with the difficult task of reconstructing a coherent chain of infection from fragmented evidence.

This workshop explores how investigators can automatically correlate and reconstruct those events by building a lightweight forensic timeline engine in Go.

What Participants Will Build

Participants will implement a lightweight, cross-platform forensic tooling pipeline capable of:

  • Parsing artefacts from multiple operating systems
  • Normalizing heterogeneous timestamp formats
  • Correlating events into a unified timeline
  • Visualizing infection chains and propagation paths
  • Producing investigative timelines without relying on commercial DFIR suites

Who Should Attend

DFIR practitioners
Malware analysts
Incident responders
Threat hunters
Security researchers
Go developers exploring security tooling

Learning Objectives

Understand why Go is ideal for forensic tooling
Identify persistence artefacts
Normalize cross-platform timestamps
Construct forensic timelines
Handle timeline inconsistencies
Reconstruct infection chains

Workshop Flow

01

Kickoff & Motivation

Timeline reconstruction in DFIR and how malware leverages time-based execution.

02

Go for Forensics

Go fundamentals, static binaries, concurrency, and filesystem handling.

03

Infection Chain Fundamentals

Persistence artefacts, propagation techniques, and investigative indicators.

04

Timestamp Parsing & Correlation

Normalizing formats, sorting events, and generating timelines.

05

Real-World Caveats

Clock skew, timezone inconsistencies, and anti-forensic behaviour.

06

Hands-On Case Study

Reconstructing a simulated multi-device infection chain using Go tooling.

Wrap-Up & Discussion

Discussion around extending the tooling, integrating it into DFIR workflows, and handling real-world investigative challenges.

Participants are encouraged to continue evolving the prototype into custom forensic pipelines tailored to their own environments.

By Dr. Gaurav Gogia
Read More
vulncon
Dr. Gaurav Gogia
Sr. Software Engineer II @ Fujitsu Research

Our Sponsors

Building together, growing together

Government Innovation Partner

VULNCON 2026 Pitch-A-Thon

Pitch-A-Thon Startups

Discovering the next wave of cybersecurity innovation

Strategic Partners

Partners in Strategic Security

Community Partners

Strengthening the Security Community

Industry Conference Allies

Uniting industry voices for stronger security

Get Your Tickets

Choose the perfect pass for your cybersecurity journey at Vulncon 2026

Student Pass [Normal Sale]

student
3,199+ GST

What's Included

  • 2-Days Conference Access
  • Workshop / Village Access
  • Lunch & High Tea
  • Attendee Goodies
  • CXO Panels

Individual Pass [Normal Sale]

individual
3,899+ GST

What's Included

  • 2-Days Conference Access
  • Workshop / Village Access
  • Lunch & High Tea
  • Attendee Goodies
  • CXO Panels

Corporate Pass [Normal Sale]

corporate
6,599+ GST

What's Included

  • 2-Days Conference Access
  • Workshop / Village Access
  • Lunch & High Tea
  • Attendee Goodies
  • Network Cocktail Party
  • CXO Panels

All prices are exclusive of GST. Limited seats available. Book early to save more! 🚀

Max Value Combo

Training + Conference = Big Savings

Enhance your Vulncon conference by adding a hands-on training by our strategic partner Byt3con Trainings. When you book them together, you unlock a heavily discounted rate on your conference ticket.

1. Byt3con Trainings (3-Day)Value: ₹32,999
2. Reduced Conference PassLocks in Savings 👉
Register Combo Pass
Training venue is separate from conference. Kindly check the Byt3con Trainings page for training details .

Student Pass

3-Day Training + Conference Pass

UPTO 20% OFF
Special Combo Total
30,90036,198
+ 18% GST

Individual Pass

3-Day Training + Conference Pass

UPTO 20% OFF
Special Combo Total
31,50036,898
+ 18% GST

Corporate Pass

3-Day Training + Conference Pass

UPTO 20% OFF
Special Combo Total
34,10039,598
+ 18% GST

Bytes

Donavan Cheah

Donavan Cheah

Sr Cybersecurity Consultant @ Thales

Ashwin Pandian

Ashwin Pandian

Associate Vice President @ Z47

Navaneethan M

Navaneethan M

Chairman, CXOCywayz

Kamal Sharma

Kamal Sharma

Co-Founder @ AuthenticOne

Syed Shahrukh

Syed Shahrukh

Co-Founder @ CloudSEK

Ashwini Siddhi

Ashwini Siddhi

Women Tech Leader

Muslim Koser

Muslim Koser

Vice President, Engineering - EASM @ Fortinet

Event Gallery

Featured Gallery Image
Gallery Image 2
Gallery Image 3
Gallery Image 4
Gallery Image 5
Gallery Image Small 1
Gallery Image Small 2
Gallery Image Small 3
Gallery Image Small 4
Gallery Image Large
After Movie

Watch Vulncon 2025 Aftermovie