VULNCON

2026
Conference: 12th & 13th June 2026
NIMHANS Convention Centre, Bengaluru
00
Days
00
Hours
00
Minutes
00
Seconds

ABOUT US

Vulncon is India’s fastest-growing technical cybersecurity conference, focused on core research, offensive security, and practical innovation.

In an evolving threat landscape, we emphasize deep technical knowledge, real-world case studies, and meaningful industry dialogue. Our platform brings together researchers, practitioners, and security leaders to exchange insights that directly address current security challenges.

Our Vision

To advance the technical foundations of cybersecurity with a strong focus on offensive security in a rapidly changing threat environment.

Our Mission

To bridge the gap between security leaders and practitioners by fostering collaboration, knowledge sharing, and actionable research.

Vulncon is designed to strengthen the security community through substance, clarity, and technical depth.

Logo

Our Speakers

TECHNICAL SPEAKERS

CXO SPEAKERS

#C-001
Abhisek Datta

Abhisek Datta

Founder, CTO

@ SafeDep

#C-002
Ankur Bhargava

Ankur Bhargava

Head of Product Security

@ PhonePe

#C-003
Arati Avhad

Arati Avhad

Director, Security Engineering (India Site Lead)

@ Uber

#C-004
Dheeraj Yadav

Dheeraj Yadav

CISO

@ Mitigata

#C-005
Dr. Vishal Saraswat

Dr. Vishal Saraswat

Head, Research and Innovation, Cybersecurity Practice

@ Bosch Global Software Technologies Private Limited (Bosch BGSW)

#C-006
Kuldeep Tomar

Kuldeep Tomar

CISO

@ Bigbasket

#C-007
Navdeep Aggarwal

Navdeep Aggarwal

Product Security Leader

@ GE Healthcare

#C-008
Praveen Parihar

Praveen Parihar

CISO

@ Razorpay

#C-009
Sandesh Mysore Anand

Sandesh Mysore Anand

Co-Founder

@ Seezo

#C-010
Sowmya N Swamy

Sowmya N Swamy

Vice President

@ WellsFargo Solutions Limited

#C-011
Sudhakar Singh

Sudhakar Singh

VP, Head of Responsible AI

@ SAP Labs

#C-012
Sulabh Jain

Sulabh Jain

Head of Application Security - Asia/Pacific

@ Amazon

#C-013
Syed Shahrukh Ahmad

Syed Shahrukh Ahmad

Co-Founder

@ CloudSEK

#C-014
Vijayakumar C

Vijayakumar C

Vice President & CISO

@ NSE Clearing Ltd

#C-015
Vishal Kalro

Vishal Kalro

CISO & DPO

@ Quantiphi

#C-016
Yuvaraj Govindarajulu

Yuvaraj Govindarajulu

AVP - Product Engineering, Head of Research- AI Security

@ Protectt.ai

Event Timeline

timeline

Workshops

Whack-a-Clue: Chasing Timestamps across the World

Modern threat actors don't rely on a single persistence mechanism — they weaponize time itself.

From autorun entries and scheduled tasks to registry-based triggers, Git hooks, IoT callbacks, and logic-driven execution chains, sophisticated malware quietly spreads across heterogeneous environments and activates under carefully crafted conditions.

These artefacts surface across laptops, servers, mobile devices, embedded systems, and cloud-connected infrastructure, leaving investigators with the difficult task of reconstructing a coherent chain of infection from fragmented evidence.

This workshop explores how investigators can automatically correlate and reconstruct those events by building a lightweight forensic timeline engine in Go.

What Participants Will Build

Participants will implement a lightweight, cross-platform forensic tooling pipeline capable of:

  • Parsing artefacts from multiple operating systems
  • Normalizing heterogeneous timestamp formats
  • Correlating events into a unified timeline
  • Visualizing infection chains and propagation paths
  • Producing investigative timelines without relying on commercial DFIR suites

Who Should Attend

DFIR practitioners
Malware analysts
Incident responders
Threat hunters
Security researchers
Go developers exploring security tooling

Learning Objectives

Understand why Go is ideal for forensic tooling
Identify persistence artefacts
Normalize cross-platform timestamps
Construct forensic timelines
Handle timeline inconsistencies
Reconstruct infection chains

Workshop Flow

01

Kickoff & Motivation

Timeline reconstruction in DFIR and how malware leverages time-based execution.

02

Go for Forensics

Go fundamentals, static binaries, concurrency, and filesystem handling.

03

Infection Chain Fundamentals

Persistence artefacts, propagation techniques, and investigative indicators.

04

Timestamp Parsing & Correlation

Normalizing formats, sorting events, and generating timelines.

05

Real-World Caveats

Clock skew, timezone inconsistencies, and anti-forensic behaviour.

06

Hands-On Case Study

Reconstructing a simulated multi-device infection chain using Go tooling.

Wrap-Up & Discussion

Discussion around extending the tooling, integrating it into DFIR workflows, and handling real-world investigative challenges.

Participants are encouraged to continue evolving the prototype into custom forensic pipelines tailored to their own environments.

By Dr. Gaurav Gogia
Read More
vulncon
Dr. Gaurav Gogia
Sr. Software Engineer II @ Fujitsu Research

The Agentic Kill Chain: Live Exploitation and Forensic Response for AI Agents in 2026

In January 2026, Microsoft did something the security community had quietly been waiting for: it assigned CVE-2026-21520 to an indirect prompt injection in Copilot Studio. It was the first time a major vendor formally tracked a prompt injection in an agentic platform as a CVE — a watershed moment that signaled prompt injection is no longer a research curiosity but a vulnerability class your incident response team must now own.

The problem: nobody has written the IR playbook for it.

This 2-hour hands-on workshop walks security practitioners through the full lifecycle of an AI agent compromise — from the attacker's perspective and from the defender's. We exploit CVE-2026-2256 live on stage against a vulnerable MS-Agent deployment, demonstrating how attacker-controlled content in a single document can pivot through an LLM's tool-calling logic into arbitrary shell command execution as the agent's host process.

We then flip the perspective: given log data from a compromised agent, how do you reconstruct what happened? What evidence must be preserved? How do you attribute an action when the "user" is non-deterministic? When can you trust the agent again?

Drawing on BlackPerl DFIR's incident response work, we present a structured playbook covering the six gaps in current AI agent telemetry, an evidence preservation checklist for agentic incidents, and a containment workflow that does not destroy forensic state.

Attendees leave with a working understanding of the agentic attack surface, a hands-on reproduction of two real 2026 CVEs, and a practical IR framework they can adapt for their own AI deployments.

This is the talk we wish existed when our first agent compromise engagement landed on our desk.

What Participants Will Experience

Participants will work through a complete AI-agent compromise lifecycle including:

  • Live exploitation of vulnerable AI agent deployments
  • Prompt injection and tool-calling manipulation techniques
  • Agent telemetry analysis and forensic reconstruction
  • Incident response workflows for AI systems
  • Evidence preservation and containment procedures
  • Detection engineering strategies for agentic environments

Who Should Attend

Incident responders
SOC analysts
DFIR practitioners
Detection engineers
AI security researchers
Threat hunters
Blue teamers
Security architects

Learning Objectives

Understand AI agent attack surfaces
Analyze prompt injection chains
Investigate tool-calling abuse
Reconstruct agent execution flows
Preserve forensic evidence in AI systems
Perform AI-agent incident response
Identify telemetry blind spots
Design detection strategies for agentic systems

Session Timeline

01

Module 1 — The Watershed

Framing the problem. Why January 15, 2026 was the moment AI agent security became an enterprise IR discipline. Walkthrough of CVE-2026-21520 and the architectural confused-deputy problem at the heart of the agent vulnerability class. Introduction of OWASP ASI01 (Agent Goal Hijack) and the lethal-trifecta model.

No demo in this module — this is the conceptual scaffold for the rest of the session.

02

Module 2 — Anatomy of an Agent Exploit: CVE-2026-2256 Live

Hands-on reproduction of CVE-2026-2256 against a vulnerable MS-Agent v1.5.2 deployment running in a sandboxed container. We walk the attack chain in five stages:

  1. Initial influence: attacker-controlled content delivered via a document the agent is asked to summarise.
  2. Tool selection manipulation: content crafted to push the agent's planning loop into selecting the Shell tool.
  3. Parameter injection: how the agent constructs a shell command string containing attacker text without ever recognising it as a command.
  4. Execution: arbitrary command runs as the agent process.
  5. Post-exploitation: persistence via workspace state modification, lateral movement to cloud metadata endpoints, supply-chain impact through poisoned artifacts.

Attendees following along reproduce the chain in their own container.

03

Module 3 — Break + Audience Q&A

15-minute structured break. Attendees who hit lab issues get one-on-one help. Open questions on Modules 1–2 answered.

04

Module 4 — The IR Reality Check: What You Cannot See

We take the compromised lab from Module 2 and ask: now what? Walkthrough of the six telemetry gaps that block effective incident response in current agent deployments:

  1. Prompt provenance: which content in the context window came from which source?
  2. Tool invocation justification: why did the agent decide to call this tool?
  3. Model state at decision time: what was in memory, what was retrieved from RAG, what was in conversation history?
  4. Tool output handling: was the result shown to the user truthfully, or summarised in a way that hid an action?
  5. Session boundary integrity: did instructions from a previous session persist into this one?
  6. Side-channel actions: did the agent take an action that left evidence only outside the agent's own logs?

For each gap, we show the corresponding artifact in the compromised lab, what is captured today, and what is missing.

05

Module 5 — The BlackPerl AI-Agent DFIR Playbook

The constructive half of the talk. We present a structured playbook covering:

  1. Evidence preservation: the seven-item checklist for snapshotting agent state at incident detection — full conversation history, system prompt, tool registry, RAG retrievals, model and version, environment variables, and external resource fetches.
  2. Containment without forensic destruction: how to halt an agent in a way that preserves volatile state, including memory dumping techniques for in-process agent runtimes.
  3. Attribution decision tree: distinguishing prompt injection from model error from legitimate-but-misjudged action using log triangulation.
  4. Root cause reconstruction: mapping a confirmed malicious action backwards through tool calls, retrievals, and prompts to identify the injection vector.
  5. Recovery and trust restoration: what must be rotated, what must be replayed, what must be redesigned before the agent returns to production.

The playbook is delivered as a single-page reference card distributed to all attendees.

06

Module 6 — Detection Engineering Forward + Closing Q&A

Five-minute close: three concrete detection engineering recommendations for SOC teams running agents in production today. Q&A continues offline at the BlackPerl table in the village area.

Wrap-Up & Discussion

Participants leave with a practical understanding of the AI-agent attack surface, incident response workflows, and evidence preservation requirements for modern agentic environments.

The session concludes with actionable guidance for detection engineering, AI security operations, and enterprise readiness for autonomous systems.

By Arpit Kumar
Read More
vulncon
Arpit Kumar
Sr. Security Engineer @ BlackPerl DFIR

Our Sponsors

Building together, growing together

Government Innovation Partner

VULNCON 2026 Pitch-A-Thon

Pitch-A-Thon Startups

Discovering the next wave of cybersecurity innovation

Strategic Partners

Partners in Strategic Security

Community Partners

Strengthening the Security Community

Industry Conference Allies

Uniting industry voices for stronger security

Get Your Tickets

Choose the perfect pass for your cybersecurity journey at Vulncon 2026

Student Pass [Normal Sale]

student
3,199+ GST

What's Included

  • 2-Days Conference Access
  • Workshop / Village Access
  • Lunch & High Tea
  • Attendee Goodies
  • CXO Panels

Individual Pass [Normal Sale]

individual
3,899+ GST

What's Included

  • 2-Days Conference Access
  • Workshop / Village Access
  • Lunch & High Tea
  • Attendee Goodies
  • CXO Panels

Corporate Pass [Normal Sale]

corporate
6,599+ GST

What's Included

  • 2-Days Conference Access
  • Workshop / Village Access
  • Lunch & High Tea
  • Attendee Goodies
  • Network Cocktail Party
  • CXO Panels

All prices are exclusive of GST. Limited seats available. Book early to save more! 🚀

Max Value Combo

Training + Conference = Big Savings

Enhance your Vulncon conference by adding a hands-on training by our strategic partner Byt3con Trainings. When you book them together, you unlock a heavily discounted rate on your conference ticket.

1. Byt3con Trainings (3-Day)Value: ₹32,999
2. Reduced Conference PassLocks in Savings 👉
Register Combo Pass
Training venue is separate from conference. Kindly check the Byt3con Trainings page for training details .

Student Pass

3-Day Training + Conference Pass

UPTO 20% OFF
Special Combo Total
30,90036,198
+ 18% GST

Individual Pass

3-Day Training + Conference Pass

UPTO 20% OFF
Special Combo Total
31,50036,898
+ 18% GST

Corporate Pass

3-Day Training + Conference Pass

UPTO 20% OFF
Special Combo Total
34,10039,598
+ 18% GST

Bytes

Donavan Cheah

Donavan Cheah

Sr Cybersecurity Consultant @ Thales

Ashwin Pandian

Ashwin Pandian

Associate Vice President @ Z47

Navaneethan M

Navaneethan M

Chairman, CXOCywayz

Kamal Sharma

Kamal Sharma

Co-Founder @ AuthenticOne

Syed Shahrukh

Syed Shahrukh

Co-Founder @ CloudSEK

Ashwini Siddhi

Ashwini Siddhi

Women Tech Leader

Muslim Koser

Muslim Koser

Vice President, Engineering - EASM @ Fortinet

Event Gallery

Featured Gallery Image
Gallery Image 2
Gallery Image 3
Gallery Image 4
Gallery Image 5
Gallery Image Small 1
Gallery Image Small 2
Gallery Image Small 3
Gallery Image Small 4
Gallery Image Large
After Movie

Watch Vulncon 2025 Aftermovie