VULNCON

2026
Conference: 12th & 13th June 2026
NIMHANS Convention Centre, Bengaluru
00
Days
00
Hours
00
Minutes
00
Seconds

ABOUT US

Vulncon is India’s fastest-growing technical cybersecurity conference, focused on core research, offensive security, and practical innovation.

In an evolving threat landscape, we emphasize deep technical knowledge, real-world case studies, and meaningful industry dialogue. Our platform brings together researchers, practitioners, and security leaders to exchange insights that directly address current security challenges.

Our Vision

To advance the technical foundations of cybersecurity with a strong focus on offensive security in a rapidly changing threat environment.

Our Mission

To bridge the gap between security leaders and practitioners by fostering collaboration, knowledge sharing, and actionable research.

Vulncon is designed to strengthen the security community through substance, clarity, and technical depth.

Logo

Our Speakers

TECHNICAL SPEAKERS

KEYNOTE
#K-001
Ruben Boonen

Ruben Boonen

Mobile Security Researcher

KEYNOTE
#K-002
Harriet Farlow

Harriet Farlow

CEO/Founder

Mileva Security Labs

#S-001
Riyaz Walikar

Riyaz Walikar

Chief Hacker

Appsecco

#S-002
Rushikesh D. Nandedkar

Rushikesh D. Nandedkar

Principle Threat Intelligence Analyst

#S-003
Hitesh Duseja

Hitesh Duseja

Security Researcher

AlteredSecurity

#S-004
Vishal Raj

Vishal Raj

Security Researcher

AlteredSecurity

CXO SPEAKERS

#C-001
Abhisek Datta

Abhisek Datta

Founder, CTO

@ SafeDep

#C-002
Ankur Bhargava

Ankur Bhargava

Head of Product Security

@ PhonePe

#C-003
Arati Avhad

Arati Avhad

Director, Security Engineering (India Site Lead)

@ Uber

#C-004
Dheeraj Yadav

Dheeraj Yadav

CISO

@ Mitigata

#C-005
Dr. Vishal Saraswat

Dr. Vishal Saraswat

Head, Research and Innovation, Cybersecurity Practice

@ Bosch Global Software Technologies Private Limited (Bosch BGSW)

#C-006
Kuldeep Tomar

Kuldeep Tomar

CISO

@ Bigbasket

#C-007
Praveen Parihar

Praveen Parihar

CISO

@ Razorpay

#C-008
Sandesh Mysore Anand

Sandesh Mysore Anand

Co-Founder

@ Seezo

#C-009
Sowmya N Swamy

Sowmya N Swamy

Vice President

@ WellsFargo Solutions Limited

#C-010
Sudhakar Singh

Sudhakar Singh

VP, Head of Responsible AI

@ SAP Labs

#C-011
Sulabh Jain

Sulabh Jain

Head of Application Security - Asia/Pacific

@ Amazon

#C-012
Syed Shahrukh Ahmad

Syed Shahrukh Ahmad

Co-Founder

@ CloudSEK

#C-013
Vijayakumar C

Vijayakumar C

Vice President & CISO

@ NSE Clearing Ltd

#C-014
Vishal Kalro

Vishal Kalro

CISO & DPO

@ Quantiphi

#C-015
Yuvaraj Govindarajulu

Yuvaraj Govindarajulu

AVP - Product Engineering, Head of Research- AI Security

@ Protectt.ai

Event Timeline

timeline

Workshops

Whack-a-Clue: Chasing Timestamps across the World

Threat actors with substantial amounts of funding and technical knowledge prefer building malware that can be spread throughout the network persist itself through autorun configurations, local git hooks, registry configurations, and every other possible time based or logic-based trigger.

Artefacts generated by these malwares are usually found in multiple computers/IoT devices/mobile devices and effectively any other electronic device, the malware is compatible with.

On the flip side, investigators need to reconstruct the chain of events, which means manually going through multiple devices, finding timestamps and eventually plot a timeseries graph.

This workshop will delve into the development of a tool in Go programming language for automatically stitching together artefacts from heterogeneous sources and building a unified chain of events.

Attendees will leave with both conceptual understanding and practical code to extend in their own investigations.

Workshop Details

Modern threat actors don’t rely on a single persistence trick—they weaponize time. From autorun entries and scheduled tasks to registry-based triggers, local Git hooks, IoT callbacks, and logic-based execution chains, well-funded adversaries design malware that quietly propagates across heterogeneous environments and activates under specific temporal conditions.

These artefacts appear scattered across laptops, servers, mobile devices, and embedded systems, leaving investigators with the difficult task of reconstructing a coherent chain of infection.

This workshop tackles that challenge head-on.

Participants will learn how to automatically stitch together artefacts from multiple platforms and formats to build a unified forensic timeline—without depending on commercial suites or heavyweight time-series databases.

Using the Go programming language, attendees will implement a lightweight, cross-platform tool that parses timestamps, normalizes formats, correlates events, and visualizes the infection chain.

The session blends conceptual clarity with hands-on coding, enabling participants to walk away with a working prototype they can extend for real investigations.

Whether you’re a DFIR practitioner, malware analyst, or a Go beginner looking to apply the language to security tooling, this workshop provides a practical, vendor-neutral methodology for reconstructing complex infection chains at scale.

Learning Objectives

By the end of the workshop, participants will be able to:

  • Understand why Go is well-suited for forensic tooling, including its concurrency model, static binaries, and cross-platform compilation.
  • Identify persistence and propagation artefacts commonly left by malware across a distributed environment.
  • Parse and normalize heterogeneous timestamp formats into a unified structure suitable for correlation.
  • Construct a forensic timeline without relying on external time-series databases or commercial DFIR platforms.
  • Apply the methodology to a simulated case study, reconstructing a complete chain of infection from raw artefacts.

Workshop Structure & Flow

  1. Kickoff & Motivation

    Why timeline reconstruction is central to DFIR

    How modern malware uses time-based and logic-based triggers

    What makes infection chains difficult to reconstruct across heterogeneous devices

  2. Go for Forensics — Lightning Primer

    Go essentials: syntax, modules, error handling, static binaries

    Why Go is ideal for forensic tooling (cross-platform, fast, simple)

    Coding: reading directories, parsing files, printing timestamps

  3. Infection Chain Fundamentals

    Walkthrough of a simulated malware infection

    Persistence + propagation artefacts (registry, autoruns, Git hooks, cron, launch agents, etc.)

    Mapping artefacts to timeline-relevant events

  4. Timestamp Parsing & Normalization

    Common timestamp formats across OSes

    Normalizing into a unified structure

    Sorting and correlating artefacts

    Generating a simple timeline (CSV/JSON/ASCII graph)

  5. Real-World Caveats

    Timezones

    Clock skew

    Missing or tampered timestamps

    Anti-forensic behaviours that distort timelines

  6. Hands-On Case Study

    Participants receive a folder of artefacts from a simulated multi-device infection.

    They will:

    Write small Go programs to parse artefacts

    Normalize timestamps

    Stitch events into a chronological chain

    Produce a final annotated timeline

Wrap-Up & Q/A

Discussion of how to extend the tool

Ideas for integrating with existing DFIR workflows

Open questions and participant challenges

By Dr. Gaurav Gogia
Read More
vulncon
Dr. Gaurav Gogia
Sr. Software Engineer II @ Fujitsu Research

Our Sponsors

Building together, growing together

Pitch-A-Thon Startups

Discovering the next wave of cybersecurity innovation

Strategic Partners

Partners in Strategic Security

Community Partners

Strengthening the Security Community

Industry Conference Allies

Uniting industry voices for stronger security

Get Your Tickets

Choose the perfect pass for your cybersecurity journey at Vulncon 2026

Student Pass [Normal Sale]

student
3,199+ GST

What's Included

  • 2-Days Conference Access
  • Workshop / Village Access
  • Lunch & High Tea
  • Attendee Goodies
  • CXO Panels

Individual Pass [Normal Sale]

individual
3,899+ GST

What's Included

  • 2-Days Conference Access
  • Workshop / Village Access
  • Lunch & High Tea
  • Attendee Goodies
  • CXO Panels

Corporate Pass [Normal Sale]

corporate
6,599+ GST

What's Included

  • 2-Days Conference Access
  • Workshop / Village Access
  • Lunch & High Tea
  • Attendee Goodies
  • Network Cocktail Party
  • CXO Panels

All prices are exclusive of GST. Limited seats available. Book early to save more! 🚀

Max Value Combo

Training + Conference = Big Savings

Enhance your Vulncon conference by adding a hands-on training by our strategic partner Byt3con Trainings. When you book them together, you unlock a heavily discounted rate on your conference ticket.

1. Byt3con Trainings (3-Day)Value: ₹32,999
2. Reduced Conference PassLocks in Savings 👉
Register Combo Pass
Training venue is separate from conference. Kindly check the Byt3con Trainings page for training details .

Student Pass

3-Day Training + Conference Pass

UPTO 20% OFF
Special Combo Total
30,90036,198
+ 18% GST

Individual Pass

3-Day Training + Conference Pass

UPTO 20% OFF
Special Combo Total
31,50036,898
+ 18% GST

Corporate Pass

3-Day Training + Conference Pass

UPTO 20% OFF
Special Combo Total
34,10039,598
+ 18% GST

Bytes

Donavan Cheah

Donavan Cheah

Sr Cybersecurity Consultant @ Thales

Ashwin Pandian

Ashwin Pandian

Associate Vice President @ Z47

Navaneethan M

Navaneethan M

Chairman, CXOCywayz

Kamal Sharma

Kamal Sharma

Co-Founder @ AuthenticOne

Syed Shahrukh

Syed Shahrukh

Co-Founder @ CloudSEK

Ashwini Siddhi

Ashwini Siddhi

Women Tech Leader

Muslim Koser

Muslim Koser

Vice President, Engineering - EASM @ Fortinet

Event Gallery

Featured Gallery Image
Gallery Image 2
Gallery Image 3
Gallery Image 4
Gallery Image 5
Gallery Image Small 1
Gallery Image Small 2
Gallery Image Small 3
Gallery Image Small 4
Gallery Image Large
After Movie

Watch Vulncon 2025 Aftermovie