Why security summit?
RedTeam Summit is Malabar's first cybersecurity event that brings together numerous industry leaders under one roof to discuss, debate and establish future cyber security strategy.
Benefits for the attendeesMeet the doyens
Listen and learn from those making the decisions at the forefront of cybersecurity.
Develop your network
Expand your professional network with the entire cybersecurity matrix including policy makers, the public and private sectors, technology providers, consultants and suppliers.
Engage and reconnect with the industry throughout a day of interactive discussions with keynote speakers at the stage and get best-practice solutions at the RedTeam Summit.
Gain practical understanding
Get inspired by those sharing practical cybersecurity methods and techniques that you can take back and implement in your routine straight away.
Cybersecurity and Hacking Conference
09:45 - 10:30
Unavailability of critical infrastructures (e.g., electrical power, transportation) can have economic impact far beyond the systems sustaining direct and physical damage. These effects could negatively impact the local, regional, national, or possibly global economy. Our expert panelists will share their views and insights on Securing, Testing and Global Policies on Critical Infrastructure Security.
Dinesh O Bareja
11:30 - 12:15
A business doesn’t need to be a Fortune 500 company to get targeted by cybercriminals. Not being serious about cybersecurity is reason enough. Last year’s cyber threat statistics discovered that almost 50 percent of small businesses experienced a cyberattack and nearly 60 percent of the SME victims closed their doors permanently in less than six months. Let’s hear from Cyber Security Specialist who have 20+ years of experience Consulting Cybersecurity Compliances and advisor for Government and Private Companies across geographies.
Dinesh O Bareja
01:45 - 02:30
Entrepreneurs, investors, and policymakers are increasingly interested in blockchain technology because of its potential to transform the way businesses communicate and interact with their customers. One of blockchain’s benefits is its inherent resiliency to cyber-attack. Blockchain’s unique structure provides cybersecurity capabilities not present in traditional ledgers and other legacy technologies. Let’s hear from Blockchain Enterprise Architect on new age blockchain solutions for Cybersecurity.
02:30 - 03:15
Security code review is the process of auditing the source code for an application to verify that the proper security controls are present, that they work as intended, and that they have been invoked in all the right places. Learn more on Source code review and recommendations
03:30 - 04:15
Dark Web is the part of the internet that isn't cataloged by search engines. The Dark Web specifically is where most of the illegal and disturbing stuff takes place its a huge marketplace for criminals and is said to generate at least $500,000 per day. Let’s explore into the secrets of Dark Web.
Adarsh SV Nair
04:30 - 05:00
The buffer overflow has long been a feature of the computer security landscape. In fact the first self-propagating Internet worm—1988's Morris Worm—used a buffer overflow in the Unix finger daemon to spread from machine to machine. Twenty-seven years later, buffer overflows remain a source for attacking cyber systems. Learn more on Buffer Overflow attacks and simulations.
05:00 - 5:45
The best way to mitigate Web application flaws is to prevent them in the first place. Learn “how” with Web application security guidelines for developers session from RedTeam’s Appsec Engineers.