image description Scroll For Details

Why security summit?

RedTeam Summit is Malabar's first cybersecurity event that brings together numerous industry leaders under one roof to discuss, debate and establish future cyber security strategy.


Benefits for the attendees
Meet the doyens
Listen and learn from those making the decisions at the forefront of cybersecurity.

Develop your network
Expand your professional network with the entire cybersecurity matrix including policy makers, the public and private sectors, technology providers, consultants and suppliers.

Stay ahead
Engage and reconnect with the industry throughout a day of interactive discussions with keynote speakers at the stage and get best-practice solutions at the RedTeam Summit.

Gain practical understanding
Get inspired by those sharing practical cybersecurity methods and techniques that you can take back and implement in your routine straight away.
image description

12

Speakers

01

Day Event

03

Panel Discussion

100

Member Registered


Trained & Passionate Event Speakers

The event will be a platform to interact with the eminent experts in cybersecurity sphere with panel discussions, tech talks by professionals, technical authors and experts around the Country.

kaliraj

S Kaliraj
Mahesh Kumar IPS

Commissioner of Police

Dinesh Bareja

Dinesh Bareja
( Keynote Speaker )

COO - Open Security Alliance

Akash Agarwal

Akash Agarwal
( Keynote Speaker )

Regional Director (IMEA) EC-Council

Suresh Sreenivas

Suresh Sreenivasan
( Keynote Speaker )

Associate Partner - Cybersecurity at EY

Gokul Alex

Gokul Alex
( Keynote Speaker )

Associate Director at PwC

Jaizal Ali
( Keynote Speaker )

Founder and Director at RedTeam

varun

Varun VL
( Keynote Speaker )

Process Control Domain IT Security Advisor at Shell

kala

Dr.Kala Baskar

Director-in-Charge, Centre for Cyber Forensics and Information Security, University of Madras, Chennai

Sreelakshmi

Sreelakshmy

Cyber Security Analyst at EY

Adarsh SV Nair

Adarsh SV Nair

Senior Security Analyst at UST Global

Abdul Ali

Sr. Security Consultant and Chief Instructor at RedTeam

Sumesh

Sumesh

Consultant and Trainer at RedTeam

Mishal

Mishal

Application Security Engineer at RedTeam Cybersecurity Labs LLP

Himanshu Shewale

Ashhar

Application Security Engineer at RedTeam Cybersecurity Labs LLP

Featured Events

Cybersecurity and Hacking Conference

Event Schedule


 

Unavailability of critical infrastructures (e.g., electrical power, transportation) can have economic impact far beyond the systems sustaining direct and physical damage. These effects could negatively impact the local, regional, national, or possibly global economy. Our expert panelists will share their views and insights on Securing, Testing and Global Policies on Critical Infrastructure Security.

A business doesn’t need to be a Fortune 500 company to get targeted by cybercriminals. Not being serious about cybersecurity is reason enough. Last year’s cyber threat statistics discovered that almost 50 percent of small businesses experienced a cyberattack and nearly 60 percent of the SME victims closed their doors permanently in less than six months. Let’s hear from Cyber Security Specialist who have 20+ years of experience Consulting Cybersecurity Compliances and advisor for Government and Private Companies across geographies.

Entrepreneurs, investors, and policymakers are increasingly interested in blockchain technology because of its potential to transform the way businesses communicate and interact with their customers. One of blockchain’s benefits is its inherent resiliency to cyber-attack. Blockchain’s unique structure provides cybersecurity capabilities not present in traditional ledgers and other legacy technologies. Let’s hear from Blockchain Enterprise Architect on new age blockchain solutions for Cybersecurity.

Security code review is the process of auditing the source code for an application to verify that the proper security controls are present, that they work as intended, and that they have been invoked in all the right places. Learn more on Source code review and recommendations

Dark Web is the part of the internet that isn't cataloged by search engines. The Dark Web specifically is where most of the illegal and disturbing stuff takes place its a huge marketplace for criminals and is said to generate at least $500,000 per day. Let’s explore into the secrets of Dark Web.

The buffer overflow has long been a feature of the computer security landscape. In fact the first self-propagating Internet worm—1988's Morris Worm—used a buffer overflow in the Unix finger daemon to spread from machine to machine. Twenty-seven years later, buffer overflows remain a source for attacking cyber systems. Learn more on Buffer Overflow attacks and simulations.

The best way to mitigate Web application flaws is to prevent them in the first place. Learn “how” with Web application security guidelines for developers session from RedTeam’s Appsec Engineers.

Suppoting Partners

We have teamed up with various organizations across india to bring in the brightest minds on this domain.

Knowledge Partner

Community Partners

Pricing & Registration

Student Pass

College ID Verification Required on Arrival

800

01 member can attend

  • 01

    Conference Seats Available

  • Exclusive Entry to Hackathon

  • 01

    Breaks Available

Select Plan

Professionals Pass

For Working Professionals

1200

01 member can attend

  • 01

    Conference Seats Available

  • Exclusive Entry to Hackathon

  • 01

    Breaks Available

Select Plan