Timeline

A chronological journey through activities and achievements

Professional timeline

Chronological archive of speaking, training, media, awards, writing, panels, podcasts, projects, and community work. Use activity filters on taxonomy pages (for example /activity/talk/) where the theme lists entries by type.


| Article (170) | Talk (111) | Discussion (79) | Recognition (51) | Panel (30) | Training (15) | Curator (11) | Whitepaper (2) |

Icon for article
LinkedIn Post - AI Governance Frameworks: EU AI Act, ISO 42001, NIST AI RMF
(12 Apr 2026)

LinkedIn Post - AI Governance Frameworks: EU AI Act, ISO 42001, NIST AI RMF

Icon for article
LinkedIn Post - OWASP Top 10 for LLM04: Data and Model Poisoning
(12 Apr 2026)

LinkedIn Post - OWASP Top 10 for LLM04: Data and Model Poisoning

Icon for article
LinkedIn profile
(12 Apr 2026)

LinkedIn profile

Icon for curator
OWASP Bangalore - Official LinkedIn Group Notice
(12 Apr 2026)

OWASP Bangalore - Official LinkedIn Group Notice

Icon for article
Sessionize speaker profile
(12 Apr 2026)

Placeholder for Sessionize speaker profile

Icon for article
A Day in the Life of a Security Leader
(06 Apr 2026)

Placeholder for A Day in the Life of a Security Leader

Icon for article
Axios npm Package Compromised
(31 Mar 2026)

Placeholder for Axios npm Package Compromised

Icon for article
Model Context Protocol (MCP) for Beginners
(30 Mar 2026)

Placeholder for Model Context Protocol (MCP) for Beginners

Icon for training
RSAC 2026 - Building Your First Secure Agentic AI Workflow
(26 Mar 2026)

RSAC 2026 - Building Your First Secure Agentic AI Workflow

Icon for recognition
Top 50 Women Leaders in Cybersecurity to Watch in 2026
(08 Mar 2026)

Top 50 Women Leaders in Cybersecurity to Watch in 2026

Icon for panel
ISACA Panel - Cyber Defense in a Hyperconnected World
(06 Mar 2026)

ISACA Panel - Cyber Defense in a Hyperconnected World

Icon for article
RSAC expert profile
(01 Mar 2026)

RSAC expert profile

Icon for recognition
SC Awards Judge 2026
(01 Mar 2026)

SC Awards Judge 2026

Icon for article
Building AI at Scale Requires Governance at Speed
(27 Feb 2026)

Placeholder for Building AI at Scale Requires Governance at Speed

Icon for talk
AI Radar - February 2026 Edition
(01 Feb 2026)

Placeholder for AI Radar - February 2026 Edition

Icon for talk
AI Learning Series #2: Threat Modelling in AI Systems
(31 Jan 2026)

AI Learning Series #2: Threat Modelling in AI Systems

Icon for panel
IdentityShield Summit 2026 - Panel: She Secures the Future: Women Leading the Next Wave of Cyber Resilience
(17 Jan 2026)

IdentityShield Summit 2026 - Panel: She Secures the Future: Women Leading the Next Wave of Cyber Resilience

Icon for article
AI Bill Of Material and Application Security (AppSec)
(13 Jan 2026)

Placeholder for AI Bill Of Material and Application Security (AppSec)

Icon for article
AI Security 101 for AppSec Engineers
(09 Jan 2026)

Placeholder for AI Security 101 for AppSec Engineers

Icon for article
Kickstart your career in GenAI Security
(04 Jan 2026)

Placeholder for Kickstart your career in GenAI Security

Icon for article
Retrieval-Augmented Generation (RAG) Security
(03 Jan 2026)

Placeholder for Retrieval-Augmented Generation (RAG) Security

Icon for article
Learning about Large Language Models (LLMs)
(23 Dec 2025)

Placeholder for Learning about Large Language Models (LLMs)

Icon for article
OWASP Top 10 - Release Candidate
(19 Dec 2025)

Placeholder for OWASP Top 10 - Release Candidate

Icon for recognition
CF100 2025 - Jury Panel
(09 Dec 2025)

CF100 2025 - Jury Panel

Icon for talk
Serverless Toronto 2025 - Securing Model Context Protocol (MCP)
(05 Dec 2025)

Placeholder for Serverless Toronto 2025 - Securing Model Context Protocol (MCP)

Icon for article
OWASP Top 10 LLM 2025
(26 Nov 2025)

Placeholder for OWASP Top 10 LLM 2025

Icon for article
Breaking into InfoSec with Vandana Verma
(19 Nov 2025)

Breaking into InfoSec with Vandana Verma

Icon for article
AppSec in the Age of AI: The Road to AI-DevSecOps
(14 Nov 2025)

Placeholder for AppSec in the Age of AI: The Road to AI-DevSecOps

Icon for talk
EC-Council 2025 - AI-Enhanced DevSecOps: Automating Security from Code to Cloud
(12 Nov 2025)

Placeholder for EC-Council 2025 - AI-Enhanced DevSecOps: Automating Security from Code to Cloud

Icon for talk
SecuritySenses/Snyk — OWASP Top 10: Navigating the New AppSec Landscape in the Age of AI
(12 Nov 2025)

Placeholder for SecuritySenses/Snyk — OWASP Top 10: Navigating the New AppSec Landscape in the Age of AI

Icon for panel
BSides Kerala 2025 - Panel: Building, Nurturing, and Retaining Cybersecurity Talent in the Gen AI Era
(02 Nov 2025)

Placeholder for BSides Kerala 2025 - Panel: Building, Nurturing, and Retaining Cybersecurity Talent in the Gen AI Era

Icon for panel
BSides Kerala 2025 - Panel: Building Resilient Software
(01 Nov 2025)

Placeholder for BSides Kerala 2025 - Panel: Building Resilient Software

Icon for talk
AI Security Summit - Secure AI
(28 Oct 2025)

Icon for talk
Operation: Defend the North 2025 - Vancouver (siberX)
(23 Oct 2025)

Placeholder for Operation: Defend the North 2025 - Vancouver (siberX)

Icon for talk
Operation: Defend the North 2025 - Calgary (siberX)
(20 Oct 2025)

Placeholder for Operation: Defend the North 2025 - Calgary (siberX)

Icon for talk
The Cybersecurity Meetup - Exclusive Charter (siberX)
(01 Oct 2025)

Placeholder for The Cybersecurity Meetup - Exclusive Charter (siberX)

Icon for talk
Snyk Webinar - OWASP Top 10 for LLMs
(18 Sep 2025)

Placeholder for Snyk Webinar - OWASP Top 10 for LLMs

Icon for discussion
Interview with Tanya Janca (SheHacksPurple) at Black Hat
(14 Sep 2025)

Placeholder for Interview with Tanya Janca (SheHacksPurple) at Black Hat

Icon for talk
Vulnerabilities on the Radar - August 2025 Edition
(26 Aug 2025)

Vulnerabilities on the Radar - August 2025 Edition

Icon for panel
Black Hat USA 2025 - Panel: Hacking the Status Quo: Tales From Leading Women in Cybersecurity
(06 Aug 2025)

Placeholder for Black Hat USA 2025 - Panel: Hacking the Status Quo: Tales From Leading Women in Cybersecurity

Icon for talk
OWASP Top 10 for LLMs - PureAI Webcast (Snyk + OWASP)
(01 Aug 2025)

Placeholder for OWASP Top 10 for LLMs - PureAI Webcast (Snyk + OWASP)

Icon for article
Securing Agentic AI Apps using OWASP Securing Agentic Applications Guide v1.0
(29 Jul 2025)

Placeholder for Securing Agentic AI Apps using OWASP Securing Agentic Applications Guide v1.0

Icon for talk
Vulnerabilities on the Radar - July 2025 Edition
(29 Jul 2025)

Placeholder for Vulnerabilities on the Radar - July 2025 Edition

Icon for article
Prompt Injection - OWASP Top 10 LLM
(18 Jul 2025)

Placeholder for Prompt Injection - OWASP Top 10 LLM

Icon for article
The Rise of Agentic AI and What It Means for Us
(07 Jul 2025)

Placeholder for The Rise of Agentic AI and What It Means for Us

Icon for talk
Women in Tech Global Conference 2025 - Implementing Zero Trust in an Organisation to be Uncertainty Ready
(11 Jun 2025)

Placeholder for Women in Tech Global Conference 2025 - Implementing Zero Trust in an Organisation to be Uncertainty Ready

Icon for article
OWASP Spotlight - Project 33 - OWASP FIASSE
(01 Jun 2025)

Icon for recognition
SC Awards Judge 2025
(01 Jun 2025)

SC Awards Judge 2025

Icon for panel
Canadian Women in Cybersecurity 2025 - Comparative Insights into Recruitment Trends Across Canada and Emerging Markets
(14 May 2025)

Canadian Women in Cybersecurity 2025 - Comparative Insights into Recruitment Trends Across Canada and Emerging Markets

Icon for article
Do We Really Need Cybersecurity Certifications? Let’s Break It Down
(05 May 2025)

Placeholder for Do We Really Need Cybersecurity Certifications? Let’s Break It Down

Icon for article
Snyk Blog - My Journey at Black Hat Asia 2025
(15 Apr 2025)

Placeholder for Snyk Blog - My Journey at Black Hat Asia 2025

Icon for article
Black Hat Asia 2025: Reviewer, Speaker, and Community Connector
(07 Apr 2025)

Placeholder for Black Hat Asia 2025: Reviewer, Speaker, and Community Connector

Icon for talk
Black Hat Asia 2025 - Locknote: Highlights & Key Takeaways
(04 Apr 2025)

Placeholder for Black Hat Asia 2025 - Locknote: Highlights & Key Takeaways

Icon for panel
Black Hat Asia 2025 - Panel: AI: Now Smarter Than Hackers, But Still Confused by Cats
(04 Apr 2025)

Placeholder for Black Hat Asia 2025 - Panel: AI: Now Smarter Than Hackers, But Still Confused by Cats

Icon for panel
Black Hat Asia 2025 - Panel: Hacking the Status Quo: Tales from Leading Women in Cybersecurity
(04 Apr 2025)

Placeholder for Black Hat Asia 2025 - Panel: Hacking the Status Quo: Tales from Leading Women in Cybersecurity

Icon for talk
Black Hat Asia 2025 - Cloud Security: Building Connections in the Cloud
(03 Apr 2025)

Black Hat Asia 2025 - Cloud Security: Building Connections in the Cloud

Icon for article
OWASP Spotlight - Project 32 - OWASP AIVSS
(15 Mar 2025)

Icon for article
Times of India - It’s crucial for youngsters to be cyber aware: Experts
(19 Feb 2025)

Times of India - It’s crucial for youngsters to be cyber aware: Experts

Icon for curator
OWASP LLM Security Verification Standard Leadership
(01 Feb 2025)

Placeholder for OWASP LLM Security Verification Standard Leadership

Icon for curator
OWASP MCP Top 10 Leadership
(01 Feb 2025)

Placeholder for OWASP MCP Top 10 Leadership

Icon for curator
OWASP Project Leadership
(01 Feb 2025)

Placeholder for OWASP Project Leadership

Icon for recognition
OWASP Project Leadership and Community Roles
(01 Feb 2025)

Placeholder for OWASP Project Leadership and Community Roles

Icon for article
Do not pass GO: Malicious package alert
(28 Jan 2025)

Placeholder for Do not pass GO: Malicious package alert

Icon for recognition
Chairperson - OWASP Global Board of Directors
(01 Jan 2025)

Placeholder for Chairperson - OWASP Global Board of Directors

Icon for curator
OWASP Compliance Leadership
(01 Jan 2025)

Placeholder for OWASP Compliance Leadership

Icon for curator
President, InfosecGirls
(01 Jan 2025)

Placeholder for President, InfosecGirls

Icon for article
GovInfoSecurity - Artificial Intelligence Looms Large at Black Hat Europe 2024
(13 Dec 2024)

Placeholder for GovInfoSecurity - Artificial Intelligence Looms Large at Black Hat Europe 2024

Icon for talk
Black Hat Europe 2024 - Locknote: Conclusions and Key Takeaways
(12 Dec 2024)

Icon for recognition
Kubecon India 2024 - Program Committee: SOSS Community Day India 2024
(10 Dec 2024)

Kubecon India 2024 - Program Committee: SOSS Community Day India 2024

Icon for talk
Blackhat - AI: Now Smarter Than Hackers, But Still Confused by Cats
(05 Dec 2024)

Blackhat - AI: Now Smarter Than Hackers, But Still Confused by Cats

Icon for curator
OWASP Board Service
(01 Dec 2024)

Placeholder for OWASP Board Service

Icon for article
OWASP Spotlight - Project 31 - OWASP WrongSecrets
(20 Nov 2024)

Icon for article
Cyber Leaders on the Move - Cyber Leadership Institute Feature
(01 Nov 2024)

Placeholder for Cyber Leaders on the Move - Cyber Leadership Institute Feature

Icon for discussion
The BSides Weekly Podcast
(26 Oct 2024)

Icon for talk
Testflix 2024- Defending the unknown using AI and cybersecurity
(06 Oct 2024)

Placeholder for Testflix 2024- Defending the unknown using AI and cybersecurity

Icon for article
Try Hack Me - Application Security Resources
(29 Sep 2024)

Placeholder for Try Hack Me - Application Security Resources

Icon for talk
Cyber Voyage - Cybersecurity Leader Talks with Vandana Verma
(25 Sep 2024)

Cyber Voyage - Cybersecurity Leader Talks with Vandana Verma

Icon for article
Women: Kickstart your Application Security Career
(12 Sep 2024)

Placeholder for Women: Kickstart your Application Security Career

Icon for article
How to integrate ASPM with your application security program
(14 Aug 2024)

Placeholder for How to integrate ASPM with your application security program

Icon for talk
RSA 2024 - The Magic of Application Security Posture Management and its Future Frontier
(04 Aug 2024)

Icon for article
OWASP Spotlight - Project 27 - OWASP LLM
(15 Jun 2024)

Icon for talk
Day of Shecurity India 2024 - Keynote: Securing AI for Future Ready
(30 May 2024)

Icon for talk
Future Tech Summit 2024
(24 May 2024)

Placeholder for Future Tech Summit 2024

Icon for recognition
SC Awards Judge 2024
(14 May 2024)

SC Awards Judge 2024

Icon for recognition
One of the Top 100 Cyber Security Influencers
(12 May 2024)

One of the Top 100 Cyber Security Influencers

Icon for discussion
Day in the Life of a Food Giant CISO
(18 Apr 2024)

Icon for article
Exploiting HTTP/2 CONTINUATION frames for DoS attacks
(10 Apr 2024)

Placeholder for Exploiting HTTP/2 CONTINUATION frames for DoS attacks

Icon for article
Let’s Chat Open Source Security
(27 Mar 2024)

Placeholder for Let's Chat Open Source Security

Icon for recognition
The Cyber Express - Top 100 Women in Cybersecurity
(21 Mar 2024)

The Cyber Express - Top 100 Women in Cybersecurity

Icon for article
Raspberry Pi 5 - Single Board Computer
(05 Feb 2024)

Placeholder for Raspberry Pi 5 - Single Board Computer

Icon for article
MacBook Pro 14-inch M3 (2023)
(20 Jan 2024)

Placeholder for MacBook Pro 14-inch M3 (2023)

Icon for recognition
Aspiring CXO Award 2024
(12 Jan 2024)

Aspiring CXO Award 2024

Icon for article
OWASP Spotlight - Project 30 - OWASP Developer Guide
(02 Jan 2024)

Icon for article
Gadgets & Devices
(01 Jan 2024)

Placeholder for Gadgets & Devices

Icon for article
Interests
(01 Jan 2024)

Placeholder for Interests

Icon for curator
OWASP Podcast
(01 Jan 2024)

OWASP Podcast

Icon for curator
OWASP Spotlight Series Leadership
(01 Jan 2024)

OWASP Spotlight Series Leadership

Icon for article
Implementing DevSecOps Practices
(22 Dec 2023)

Implementing DevSecOps Practices

Icon for article
BBC World - Women in cybersecurity
(18 Dec 2023)

BBC World - Women in cybersecurity

Icon for talk
Black Hat Europe 2023 - Locknote: Conclusions and Key Takeaways from Day 2
(07 Dec 2023)

Icon for talk
Blackhat MEA 2023 - From Vulnerability to Viability: Tackling Supply Chain Challenges Head-On
(16 Nov 2023)

Placeholder for Blackhat MEA 2023 - From Vulnerability to Viability: Tackling Supply Chain Challenges Head-On

Icon for talk
Blackhat MEA 2023 - Trust the Process: Optimizing Open Source Security with OWASP Frameworks
(16 Nov 2023)

Placeholder for Blackhat MEA 2023 - Trust the Process: Optimizing Open Source Security with OWASP Frameworks

Icon for panel
Paving the Way: Balancing Standards, Regulations, Ownership, and Accountability
(16 Nov 2023)

Paving the Way: Balancing Standards, Regulations, Ownership, and Accountability

Icon for article
OWASP Spotlight - Project 29 - OWASP Domain Protect
(11 Oct 2023)

Icon for article
OWASP Spotlight - Project 28 - OWASP OpenCRE
(14 Sep 2023)

Icon for discussion
Episode 74: How Curiosity Empowered OWASP Global Chair Vandana Verma
(12 Sep 2023)

Placeholder for Episode 74: How Curiosity Empowered OWASP Global Chair Vandana Verma

Icon for recognition
Winner - Cyber Security Leader of the Year Award 2023
(10 Sep 2023)

Winner - Cyber Security Leader of the Year Award 2023

Icon for article
YubiKey 5 NFC - Hardware Security Key
(10 Sep 2023)

Placeholder for YubiKey 5 NFC - Hardware Security Key

Icon for article
Does GitOps enhance application security?
(21 Aug 2023)

Placeholder for Does GitOps enhance application security?

Icon for talk
Defcon - AppSec Village 2023
(12 Aug 2023)

Placeholder for Defcon - AppSec Village 2023

Icon for talk
RSA 2023 - Proactive Defense: Advanced Threat Modeling for Robust Cybersecurity
(01 Aug 2023)

Icon for talk
OWASP NewZealand 2023 - Keynote - Tracing the Journey of Web Application Security from Past to Future
(06 Jul 2023)

Placeholder for OWASP NewZealand 2023 - Keynote -  Tracing the Journey of Web Application Security from Past to Future

Icon for article
Research with Snyk and Redhunt Labs: Scanning the top 1000 orgs on GitHub
(22 Jun 2023)

Placeholder for Research with Snyk and Redhunt Labs: Scanning the top 1000 orgs on GitHub

Icon for whitepaper
Research with Snyk and Redhunt Labs: Scanning the top 1000 orgs on GitHub
(22 Jun 2023)

Placeholder for Research with Snyk and Redhunt Labs: Scanning the top 1000 orgs on GitHub

Icon for article
Ethical hacking techniques
(05 Jun 2023)

Placeholder for Ethical hacking techniques

Icon for article
Ethical Hacking: Top Tools
(01 Jun 2023)

Placeholder for Ethical Hacking: Top Tools

Icon for article
Unlocking the power of multi-cloud security
(25 Apr 2023)

Placeholder for Unlocking the power of multi-cloud security

Icon for article
OWASP Spotlight - Project 26 - OWASP SamuraiWTF
(22 Mar 2023)

Icon for article
Securing the digital future: Reviewing the Biden-Harris administration’s National Cybersecurity Strategy
(20 Mar 2023)

Placeholder for Securing the digital future: Reviewing the Biden-Harris administration's National Cybersecurity Strategy

Icon for talk
Stress-Free AWS Security for Devs and Ops - Snyk’s Top 10 Vulnerabilities that Developers Need to Know
(08 Mar 2023)

Stress-Free AWS Security for Devs and Ops - Snyk's Top 10 Vulnerabilities that Developers Need to Know

Icon for recognition
Risky Women - Women to Watch
(01 Mar 2023)

Risky Women - Women to Watch

Icon for talk
The Most In-Demand Entry-Level Cybersecurity Skills for 2023 and Beyond
(28 Feb 2023)

The Most In-Demand Entry-Level Cybersecurity Skills for 2023 and Beyond

Icon for whitepaper
White Paper - Ransomware State of Mind: How to Better Protect Your Business
(20 Jan 2023)

White Paper - Ransomware State of Mind: How to Better Protect Your Business

Icon for article
Supply chain security incident at CircleCI: Rotate your secrets
(07 Jan 2023)

Placeholder for Supply chain security incident at CircleCI: Rotate your secrets

Icon for article
SC Media - Contributor Profile
(01 Jan 2023)

Placeholder for SC Media - Contributor Profile

Icon for talk
Cutting AppSec to the Core: What You Need to Know
(11 Nov 2022)

Placeholder for Cutting AppSec to the Core: What You Need to Know

Icon for article
Key points from Google and Accenture’s ransomware white paper
(07 Nov 2022)

Placeholder for Key points from Google and Accenture's ransomware white paper

Icon for discussion
A day in the life of a CISO: Chris Hughes of Aquia
(04 Nov 2022)

Icon for article
Update: OpenSSL high severity vulnerabilities
(03 Nov 2022)

Placeholder for Update: OpenSSL high severity vulnerabilities

Icon for article
New OpenSSL critical vulnerability: What you need to know
(31 Oct 2022)

Placeholder for New OpenSSL critical vulnerability: What you need to know

Icon for article
Looking back at Black Hat USA 2022
(21 Sep 2022)

Placeholder for Looking back at Black Hat USA 2022

Icon for talk
Secure Software Summit 2022 - New Way of Envisioning Security in the Dependencies
(15 Sep 2022)

Placeholder for Secure Software Summit 2022 - New Way of Envisioning Security in the Dependencies

Icon for discussion
ITSP Magazine - Meet the InfosecGirls
(08 Sep 2022)

Placeholder for ITSP Magazine - Meet the InfosecGirls

Icon for talk
OWASP 2022 Virtual AppSec APAC - Keynote Speaker
(31 Aug 2022)

OWASP 2022 Virtual AppSec APAC - Keynote Speaker

Icon for panel
Defcon 2022 - Agility Broke AppSec. Now It’s Going to Fix It
(12 Aug 2022)

Defcon 2022 - Agility Broke AppSec. Now It’s Going to Fix It

Icon for article
OWASP Spotlight - Project 25 - OWASP Juice Shop
(27 Jul 2022)

Icon for article
OWASP Spotlight - Project 24 - OWASP Security Headers Project
(16 Jul 2022)

Icon for talk
Apidays 2022 — API Security
(27 Jun 2022)

Placeholder for Apidays 2022 — API Security

Icon for talk
React Summit 2022 - New Way of Envisioning Security in the Dependencies
(17 Jun 2022)

Placeholder for React Summit 2022 - New Way of Envisioning Security in the Dependencies

Icon for discussion
ESG - Women in Cybersecurity Interview
(15 Jun 2022)

Placeholder for ESG - Women in Cybersecurity Interview

Icon for recognition
IFSEC Global Influencers in Security 2022
(15 Jun 2022)

IFSEC Global Influencers in Security 2022

Icon for talk
The Female Quotient at RSA Conference 2022 - Hacking for Good
(08 Jun 2022)

The Female Quotient at RSA Conference 2022 - Hacking for Good

Icon for talk
RSA Conference 2022 - Continuous Security - Integrating Pipeline Security
(07 Jun 2022)

Icon for recognition
40 under 40 in Cybersecurity 2022
(01 Jun 2022)

40 under 40 in Cybersecurity 2022

Icon for article
Interview: Women in Cyber and Open Source Security — Cyber Protection Magazine
(01 Jun 2022)

Placeholder for Interview: Women in Cyber and Open Source Security — Cyber Protection Magazine

Icon for article
Redgate 100 - Most Influential in the Database Community 2022
(01 Jun 2022)

Redgate 100 - Most Influential in the Database Community 2022

Icon for panel
AppSecCon 2022 - Hiring Application Security Professionals
(19 May 2022)

AppSecCon 2022 - Hiring Application Security Professionals

Icon for panel
AppSecCon 2022 - The Purple Book of Software Security
(19 May 2022)

AppSecCon 2022 - The Purple Book of Software Security

Icon for discussion
SE Radio 514: OWASP Top 10
(19 May 2022)

Placeholder for SE Radio 514: OWASP Top 10

Icon for article
Lenovo ThinkPad T480 - Business Laptop
(15 May 2022)

Placeholder for Lenovo ThinkPad T480 - Business Laptop

Icon for talk
Black Hat Asia 2022 - Locknote: Highlights & Key Takeaways
(12 May 2022)

Placeholder for Black Hat Asia 2022 - Locknote: Highlights & Key Takeaways

Icon for talk
WeAreDevelopers 2022 - Walking into the Era of Supply Chain Risks
(29 Apr 2022)

Placeholder for WeAreDevelopers 2022 - Walking into the Era of Supply Chain Risks

Icon for recognition
People Choice Award - Inteligenca
(12 Apr 2022)

People Choice Award - Inteligenca

Icon for article
Interview with ESG-global by Techtarget
(31 Mar 2022)

Icon for article
Women in Cybersecurity
(31 Mar 2022)

Placeholder for Women in Cybersecurity

Icon for article
How Snyk helps satisfy White House cybersecurity recommendations
(23 Mar 2022)

Placeholder for How Snyk helps satisfy White House cybersecurity recommendations

Icon for discussion
A Day in the Life of a Service Company CISO - Caroline Wong
(10 Mar 2022)

Icon for article
Business Standard - MIT Centre for Future Skills Excellence celebrates International Women’s Day
(10 Mar 2022)

Business Standard - MIT Centre for Future Skills Excellence celebrates International Women’s Day

Icon for panel
Women in Cybersecurity | Beyond Borders 2022 - Growing Your Network: Local Presence, Global Reach
(08 Mar 2022)

Women in Cybersecurity | Beyond Borders 2022 - Growing Your Network: Local Presence, Global Reach

Icon for article
Cyber Leadership Institute - Cyber Leaders on the Move: Vandana Verma
(01 Mar 2022)

Cyber Leadership Institute - Cyber Leaders on the Move: Vandana Verma

Icon for recognition
SC Awards Judge 2022
(01 Mar 2022)

Placeholder for SC Awards Judge 2022

Icon for discussion
A Day in the Life of a Fintech CISO - Chris Russell
(31 Jan 2022)

Icon for talk
WeAreDevelopers 2022 - Stranger Danger: Your Java Attack Surface Just Got Bigger
(26 Jan 2022)

Placeholder for WeAreDevelopers 2022 - Stranger Danger: Your Java Attack Surface Just Got Bigger

Icon for discussion
A Day in the Life of a Field CISO - Steve Kinman
(19 Jan 2022)

Icon for recognition
Indian Achievers’ Award - Community Enablement
(15 Jan 2022)

Indian Achievers' Award - Community Enablement

Icon for discussion
Cyber Security & Cloud Podcast — Baby Stepping in Cyber - Cyberkids (S03E03)
(01 Jan 2022)

Placeholder for Cyber Security & Cloud Podcast — Baby Stepping in Cyber - Cyberkids (S03E03)

Icon for article
Della Leaders Club — Member, Pune Chapter
(01 Jan 2022)

Placeholder for Della Leaders Club — Member, Pune Chapter

Icon for recognition
Redgate 100 - Most Influential in the Database Community 2022
(01 Jan 2022)

Redgate 100 - Most Influential in the Database Community 2022

Icon for article
Security Challenges in FinTech — Wallarm Researcher Corner
(01 Jan 2022)

Placeholder for Security Challenges in FinTech — Wallarm Researcher Corner

Icon for article
ISRM — Vandana Verma Re-Elected for OWASP Foundation Global Board
(15 Dec 2021)

Placeholder for ISRM — Vandana Verma Re-Elected for OWASP Foundation Global Board

Icon for discussion
Episode 15 - Abbas Kudrati
(10 Dec 2021)

Icon for article
OWASP Spotlight - Project 23 - OWASP VulnerableApp
(01 Dec 2021)

Icon for panel
Evolving with The New Norm​
(29 Nov 2021)

Evolving with The New Norm​

Icon for discussion
Episode 14 - Jaya Baloo
(25 Nov 2021)

Icon for discussion
Episode 13 - Sashank Dara
(10 Nov 2021)

Icon for article
OWASP Spotlight - Project 22 - OWASP THREAT DRAGON
(02 Nov 2021)

Icon for discussion
Episode 12 - Vimal Mani
(25 Oct 2021)

Icon for recognition
EWF Women of Influence Awards 2021 - Public Sector & Academic
(21 Oct 2021)

EWF Women of Influence Awards 2021 - Public Sector & Academic

Icon for discussion
Application Security Weekly #236
(18 Oct 2021)

Icon for article
OWASP Spotlight - Project 21 - OWASP CycloneDX
(18 Oct 2021)

Icon for article
Security Career Advice with Guy Podjarny
(17 Oct 2021)

Security Career Advice with Guy Podjarny

Icon for talk
ROOTCON 15 - The Curious case of knowing the unknown
(14 Oct 2021)

Icon for discussion
Episode 11 - Dr. Reem Faraj AlShammari
(10 Oct 2021)

Icon for talk
BSides Singapore 2021 - Finding the unknown before it finds you
(29 Sep 2021)

Icon for discussion
Episode 10 - Jothi Dugar
(25 Sep 2021)

Icon for panel
OWASP 20th Anniversary 2021 - Building Diversity into AppSec
(24 Sep 2021)

Placeholder for OWASP 20th Anniversary 2021 - Building Diversity into AppSec

Icon for article
OWASP Spotlight - Project 20 - OWASP Security Pin
(20 Sep 2021)

Icon for discussion
Episode 9 - Derly G
(10 Sep 2021)

Icon for talk
Cocon 2021 - New way of looking at the hidden mysteries in the code
(06 Sep 2021)

Placeholder for Cocon 2021 - New way of looking at the hidden mysteries in the code

Icon for article
I Had My Own Share Of Struggles But Learnt How To Survive And Stand Strong — Eat My News
(01 Sep 2021)

Placeholder for I Had My Own Share Of Struggles But Learnt How To Survive And Stand Strong — Eat My News

Icon for recognition
Cyber Security Awards
(27 Aug 2021)

Cyber Security Awards

Icon for discussion
Episode 8 - Magda Chelly
(25 Aug 2021)

Icon for discussion
Episode 7 - Rohit Srivastwa
(10 Aug 2021)

Icon for talk
Defcon - AppSec Village 2021
(07 Aug 2021)

Placeholder for Defcon - AppSec Village 2021

Icon for discussion
Episode 6 - Aisling MacRunnels & Ronald Ulko
(30 Jul 2021)

Icon for recognition
IFSEC Global Influencers in Security and Fire 2021
(21 Jul 2021)

IFSEC Global Influencers in Security and Fire 2021

Icon for article
Pivoting from Different Field to Infosec - Hindi - Prabh Nair
(21 Jul 2021)

Icon for discussion
Episode 5 - Upendra Mardikar
(19 Jul 2021)

Icon for article
OWASP Spotlight - Project 19 - OWASP Application Security Verification standard (ASVS)
(18 Jul 2021)

Icon for discussion
Episode 4 - Abeer Khedr
(09 Jul 2021)

Icon for article
Bugbounty vs CTF in Hindi with Prabh Nair
(07 Jul 2021)

Icon for discussion
Episode 3 - Preetam Sirur
(30 Jun 2021)

Icon for article
How to Get Into Infosec - Hindi - Prabh Nair
(23 Jun 2021)

Icon for discussion
Episode 2 - Lakshmi Hanspal
(17 Jun 2021)

Icon for discussion
Episode 1 - Sarb Sembhi
(10 Jun 2021)

Icon for article
How to Teach Information Security to 10 Year Old - Prabh Nair
(09 Jun 2021)

Icon for discussion
Focus Hive Podcast — Learn from the Leaders: Vandana Verma, OWASP Board
(05 Jun 2021)

Placeholder for Focus Hive Podcast — Learn from the Leaders: Vandana Verma, OWASP Board

Icon for article
OWASP Spotlight - Project 18 - OWASP DSOMM
(03 Jun 2021)

Icon for article
ISRM — Vandana Verma Named as Risky Woman to Watch
(01 Jun 2021)

Placeholder for ISRM — Vandana Verma Named as Risky Woman to Watch

Icon for recognition
Top 25 Women Leaders in Cybersecurity 2021
(01 Jun 2021)

Placeholder for Top 25 Women Leaders in Cybersecurity 2021

Icon for article
A Day In The Life Of a SOC Manager - Avinash Shet
(26 May 2021)

Icon for article
OWASP Spotlight - Project 17 - Education and Training Committee
(22 May 2021)

Icon for talk
AISA Webinar: Shifting left in application security
(19 May 2021)

AISA Webinar: Shifting left in application security

Icon for talk
RSA Conference 2021 - Let’s Talk, Open-Source Application Security
(19 May 2021)

RSA Conference 2021 - Let's Talk, Open-Source Application Security

Icon for article
Consumer identities in Modern Digital World (CIAM)
(17 May 2021)

Placeholder for Consumer identities in Modern Digital World (CIAM)

Icon for article
What It Takes To Be a SOC Analyst - Avinash Shet
(12 May 2021)

Icon for talk
Black Hat Asia 2021 - Opening Note: Highlights & Key Takeaways
(07 May 2021)

Placeholder for Black Hat Asia 2021 - Opening Note: Highlights & Key Takeaways

Icon for article
Defining KPIs in SOC
(28 Apr 2021)

Icon for article
OWASP Spotlight - Project 16 - Cornucopia
(27 Apr 2021)

Icon for article
OWASP Spotlight - Project 15 - Dependency Track
(18 Apr 2021)

Icon for panel
EC Council 2021 - Women in Cybersecurity: For Women. By Women.
(16 Apr 2021)

Icon for recognition
Black Hat Review Board — Asia & Europe
(15 Apr 2021)

Black Hat Review Board — Asia & Europe

Icon for article
Getting into Cloud Security with Lalit
(14 Apr 2021)

Icon for article
OWASP Spotlight - Project 14 - Secure Coding Dojo
(12 Apr 2021)

Icon for article
OWASP Spotlight - Project 13 - Mobile Security Testing Guide
(04 Apr 2021)

Icon for article
Breaking Into InfoSec - A Day in the Life of a Security Consultant
(31 Mar 2021)

Icon for recognition
7th Annual DynamicCISO Excellence Award Resilient CISO
(26 Mar 2021)

7th Annual DynamicCISO Excellence Award Resilient CISO

Icon for talk
EC-Council 2021 - Zero Trust and You: How to Build the Best Security Model for Your Business
(23 Mar 2021)

EC-Council 2021 - Zero Trust and You: How to Build the Best Security Model for Your Business

Icon for talk
Breaking The Barriers: Women in Infosec - Episode 6
(18 Mar 2021)

Breaking The Barriers: Women in Infosec - Episode 6

Icon for article
Breaking into Web App Pen-testing - Gabrielle
(17 Mar 2021)

Icon for discussion
The Secure Developer Ep.55 - Diversity In DevSec And Cloud Security
(15 Mar 2021)

The Secure Developer Ep.55 - Diversity In DevSec And Cloud Security

Icon for recognition
CQ 100: Meet The Dynamic Women Changing The Face Of Indian Cyberspace
(08 Mar 2021)

CQ 100: Meet The Dynamic Women Changing The Face Of Indian Cyberspace

Icon for talk
Keynote speaker for Cyber Security Warriors Club Opening
(07 Mar 2021)

Keynote speaker for Cyber Security Warriors Club Opening

Icon for talk
Keynote: Careers in AppSec: Lead with Grit
(07 Mar 2021)

Keynote: Careers in AppSec: Lead with Grit

Icon for panel
RSA 2021 - Nicole Perlroth, Sam King & Vandana Verma discuss Industry Leadership for International Women’s Day
(07 Mar 2021)

Icon for article
Interview with CISO MAG
(05 Mar 2021)

Placeholder for Interview with CISO MAG

Icon for article
Celebrate ‘You’ - Be relentless, fearless, voice out!
(04 Mar 2021)

Celebrate ‘You’ - Be relentless, fearless, voice out!

Icon for article
Breaking into Offensive Security - Phillip Wiley
(03 Mar 2021)

Icon for recognition
SC Awards Judge 2021
(01 Mar 2021)

SC Awards Judge 2021

Icon for article
OWASP Spotlight - Project 12 - Zed Attack Proxy (ZAP)
(27 Feb 2021)

Icon for talk
Grace Hopper Celebration 2021 - India
(26 Feb 2021)

Grace Hopper Celebration 2021 - India

Icon for talk
Keynote: Digital Week: Effective AppSec Program w/ Open Source (OWASP) Projects
(26 Feb 2021)

Keynote: Digital Week: Effective AppSec Program w/ Open Source (OWASP) Projects

Icon for talk
Bridge the gap between AI/ML and Cyber Security
(20 Feb 2021)

Icon for training
Security Testing Workshop 2021 for CSQA
(20 Feb 2021)

Security Testing Workshop 2021 for CSQA

Icon for article
Pivoting Career in Cybersecurity - Vickie Li
(17 Feb 2021)

Icon for recognition
Beyond Borders Advisory Board Member - SiberX
(15 Feb 2021)

Beyond Borders Advisory Board Member - SiberX

Icon for recognition
EC-Council Advisory Board for CND
(15 Feb 2021)

EC-Council Advisory Board for CND

Icon for panel
ISRM 2021 - Global Roundtable hosted by the ISRM Women in Security Sisterhood group.
(12 Feb 2021)

ISRM 2021 - Global Roundtable hosted by the ISRM Women in Security Sisterhood group.

Icon for article
2021 LENS INTO CYBERSECURITY TRENDS
(11 Feb 2021)

2021 LENS INTO CYBERSECURITY TRENDS

Icon for talk
Student Session: Social Media safety
(11 Feb 2021)

Student Session: Social Media safety

Icon for article
Breaking into Web App Hacking - Farah Hawa
(03 Feb 2021)

Icon for panel
Panel on Application Security Testing
(28 Jan 2021)

Icon for article
INSPIRE 20 Leadership Podcast
(25 Jan 2021)

INSPIRE 20 Leadership Podcast

Icon for discussion
Inspire 20 - Vandana Verma
(23 Jan 2021)

Placeholder for Inspire 20 - Vandana Verma

Icon for article
Cyber Talk with Jay Hira
(20 Jan 2021)

Icon for panel
IIT Kanpur Delhi Chapter 2021 - Discussion on Cyberthreats and Darkweb scare
(16 Jan 2021)

IIT Kanpur Delhi Chapter 2021 - Discussion on Cyberthreats and Darkweb scare

Icon for talk
Student Session: Cyber Ethics and Privacy
(16 Jan 2021)

Student Session: Cyber Ethics and Privacy

Icon for article
Cyber Security 2021 Prediction
(15 Jan 2021)

Placeholder for Cyber Security 2021 Prediction

Icon for article
OWASP Spotlight - Project 11 - Nettacker
(15 Jan 2021)

Icon for talk
Society for Data Science: Spice of Data Analytics in Cyber Security
(15 Jan 2021)

Society for Data Science: Spice of Data Analytics in Cyber Security

Icon for article
Breaking into DevSecOps with Clint Gibler
(06 Jan 2021)

Icon for article
OWASP Spotlight - Project 10 - Top10
(05 Jan 2021)

Icon for recognition
Initiative Star Contributor Award - Issued by IBM
(01 Jan 2021)

 Initiative Star Contributor Award - Issued by IBM

Icon for recognition
AppSec Influencer of 2020 Award
(01 Jan 2021)

AppSec Influencer of 2020 Award

Icon for recognition
Most Recognized Women in Cybersecurity — CXO Junction
(01 Jan 2021)

Placeholder for Most Recognized Women in Cybersecurity — CXO Junction

Icon for talk
Building an AppSec Program with Open Source
(31 Dec 2020)

Placeholder for Building an AppSec Program with Open Source

Icon for article
OWASP Spotlight - Project 9 - Software Assurance Maturity Model (SAMM)
(26 Dec 2020)

Icon for article
Breaking Into Vulnerability Assessment - Chintan Gurjar
(16 Dec 2020)

Icon for article
OWASP Spotlight - Project 8 - Proactive Controls
(13 Dec 2020)

Icon for panel
TechJS Summit 2020 - How Owasp can help Security Teams - Guides and Testing Tools
(09 Dec 2020)

Icon for article
OWASP Spotlight - Project 7 - Security Knowledge Framework
(06 Dec 2020)

Icon for talk
Keynote: DevSecOps Days London - 2020
(04 Dec 2020)

Placeholder for Keynote: DevSecOps Days London - 2020

Icon for article
Breaking into Threat Modeling with Adam Shostack
(02 Dec 2020)

Icon for article
Broadening the diversity aperture
(26 Nov 2020)

Placeholder for Broadening the diversity aperture

Icon for article
Featured in TimesofIndia
(25 Nov 2020)

Placeholder for Featured in TimesofIndia

Icon for article
OWASP Spotlight - Project 6 - PyTM
(24 Nov 2020)

Icon for talk
Cyber Crime against Women: Precautions and Strategies
(23 Nov 2020)

Cyber Crime against Women: Precautions and Strategies

Icon for article
Human Factor Security Interview with Vandana Verma
(20 Nov 2020)

Icon for article
Breaking into Cloud Security with Ashish Rajan
(18 Nov 2020)

Icon for talk
DevSecOps for RazorPay
(18 Nov 2020)

DevSecOps for RazorPay

Icon for talk
Times Techies Webinars
(18 Nov 2020)

Placeholder for Times Techies Webinars

Icon for talk
Cybersecurity Career Conference 2020
(15 Nov 2020)

Placeholder for Cybersecurity Career Conference 2020

Icon for article
OWASP Spotlight - Project 5 - SecurityRAT
(14 Nov 2020)

Icon for discussion
All Day DevOps - AppSec with OWASP
(12 Nov 2020)

Placeholder for All Day DevOps - AppSec with OWASP

Icon for article
OWASP Spotlight - Project 4 - Cheat Sheet Series
(07 Nov 2020)

Icon for article
Breaking into Red Teaming with Abhijith BR
(04 Nov 2020)

Icon for article
OWASP Spotlight - Project 3 - Core Rule Set (CRS)
(31 Oct 2020)

Icon for article
Inspiring Leaders at IBM India
(28 Oct 2020)

Placeholder for Inspiring Leaders at IBM India

Icon for article
Epic Women in Cyber — Vandana Verma
(27 Oct 2020)

Placeholder for Epic Women in Cyber — Vandana Verma

Icon for recognition
SC Media - Women in IT Security - Advocates Award - 2020
(26 Oct 2020)

SC Media - Women in IT Security - Advocates Award - 2020

Icon for talk
ROOTCON: Zero Trust in the era of cloud - 2020
(25 Oct 2020)

Icon for talk
UPES University - Application Security: Past, Present, and Future
(24 Oct 2020)

UPES University - Application Security: Past, Present, and Future

Icon for article
Breaking into Bug Bounty Hunting with Nikhil Srivastava
(21 Oct 2020)

Icon for article
OWASP Spotlight - Project 2 - Dependency Check
(21 Oct 2020)

Icon for training
Global AppSec 2020
(19 Oct 2020)

Global AppSec 2020

Icon for article
Integration Reciepe : IBM IGI with IBM Security Verify
(11 Oct 2020)

Integration Reciepe : IBM IGI with IBM Security Verify

Icon for article
OWASP Spotlight - Project 1 - Web Security Testing Guide
(10 Oct 2020)

Icon for article
Breaking into Security/Developer Relations - Developersteve
(07 Oct 2020)

Icon for talk
Black Hat Asia 2020
(01 Oct 2020)

Icon for article
Interview with Cybersecurity Magazine
(25 Sep 2020)

Placeholder for Interview with Cybersecurity Magazine

Icon for talk
DevOps India Summit 2020 - Kickstarting DevSecOps with OpenSource Tools
(25 Sep 2020)

Icon for panel
CSA Summit 2020 - Impact of COVID-19 on Cloud Adoption & Security
(24 Sep 2020)

CSA Summit 2020 - Impact of COVID-19 on Cloud Adoption & Security

Icon for talk
IAM in eCommerce - Deal or No Deal
(24 Sep 2020)

IAM in eCommerce - Deal or No Deal

Icon for article
Burnout In BugBounty in Hindi - Prabh Nair
(23 Sep 2020)

Icon for talk
STEM FOR GIRLS
(13 Sep 2020)

Icon for recognition
Winner - Cyber Security Woman of the Year Award 2020
(10 Sep 2020)

Winner - Cyber Security Woman of the Year Award 2020

Icon for article
Recruiting Trends with Jaskaran Kohli
(09 Sep 2020)

Icon for discussion
Cyber Security & Cloud Podcast — AppSec & Diversity Talk (S01E08)
(01 Sep 2020)

Placeholder for Cyber Security & Cloud Podcast — AppSec & Diversity Talk (S01E08)

Icon for recognition
Top 100 Women in Cybersecurity 2020 — Technology Magazine
(01 Sep 2020)

Placeholder for Top 100 Women in Cybersecurity 2020 — Technology Magazine

Icon for panel
CSA UK: Cloud Security and Identity and Access management
(29 Aug 2020)

CSA UK: Cloud Security and Identity and Access management

Icon for panel
Day of Security 2021: Lunch Panel Founders’ Discussion: Being an Ally
(29 Aug 2020)

Icon for panel
Empowering tips on Online Safety for Working Women
(29 Aug 2020)

Empowering tips on Online Safety for Working Women

Icon for recognition
Judge and Jury for Top 20 Indian Women Influencers in Security 2020
(28 Aug 2020)

Placeholder for Judge and Jury for Top 20 Indian Women Influencers in Security 2020

Icon for recognition
Judge and Jury for Top 20 Indian Women Influencers in Security 2020
(27 Aug 2020)

Judge and Jury for Top 20 Indian Women Influencers in Security 2020

Icon for article
Breaking into Application Security with Rob Cuddy
(26 Aug 2020)

Icon for panel
Indo-Pacific Series 2020 - National Cybersecurity Strategy - Indo-Pacific Series - Episode 2
(25 Aug 2020)

Indo-Pacific Series 2020 - National Cybersecurity Strategy - Indo-Pacific Series - Episode 2

Icon for talk
Diana Initiative 2020 - Trust, No Trust or Zero Trust - Myth Demystifying
(21 Aug 2020)

Placeholder for Diana Initiative 2020 - Trust, No Trust or Zero Trust - Myth Demystifying

Icon for article
Running an AppSec Program with Open Source (OWASP) Projects
(14 Aug 2020)

Placeholder for Running an AppSec Program with Open Source (OWASP) Projects

Icon for article
How to be an InfoSec Speaker
(12 Aug 2020)

Icon for discussion
How to be an InfoSec Speaker - Vandana Verma
(12 Aug 2020)

Icon for recognition
27 Influential Penetration Testers’ around the world
(10 Aug 2020)

27 Influential Penetration Testers’ around the world

Icon for talk
Defcon - AppSec Village 2020
(09 Aug 2020)

Icon for talk
Defcon - Red Team Village 2020: Zero Trust
(07 Aug 2020)

Icon for talk
Black Hat USA 2020
(06 Aug 2020)

Icon for article
Interview with Dark Reading
(05 Aug 2020)

Placeholder for Interview with Dark Reading

Icon for article
Passionate guide for the web application security journey
(05 Aug 2020)

Placeholder for Passionate guide for the web application security journey

Icon for talk
How to run an Appsec program with open source tools (OWASP)
(04 Aug 2020)

How to run an Appsec program with open source tools (OWASP)

Icon for recognition
Top 100 Women in Cybersecurity 2020 — Cyber Defense Awards
(04 Aug 2020)

Placeholder for Top 100 Women in Cybersecurity 2020 — Cyber Defense Awards

Icon for article
Getting into Cyber
(29 Jul 2020)

Icon for discussion
Getting into Cyber
(29 Jul 2020)

Icon for discussion
Male Allies in Cybersecurity - Vandana Verma
(29 Jul 2020)

Icon for talk
Applying OWASP Web Security Testing Guide
(26 Jul 2020)

Icon for article
Interview with PortSwigger
(16 Jul 2020)

Placeholder for Interview with PortSwigger

Icon for panel
IIT Kanpur 2020 - Zero Trust - A vision for Securing Cloud Delivered Business
(13 Jul 2020)

IIT Kanpur 2020 - Zero Trust - A vision for Securing Cloud Delivered Business

Icon for discussion
Cloud Security Myths with Vandana Verma
(24 Jun 2020)

Icon for talk
CII Karnataka Cybersecurity Digital Conference 2020
(20 Jun 2020)

Placeholder for CII Karnataka Cybersecurity Digital Conference 2020

Icon for article
Cyber Security Basics
(15 Jun 2020)

Icon for article
Zero Trust:Trust no one, Verify everyone
(15 Jun 2020)

Zero Trust:Trust no one, Verify everyone

Icon for talk
Open Security Summit
(12 Jun 2020)

Icon for talk
OWASP Sendai 2020 - DevSecOps Deep Dive
(12 Jun 2020)

Placeholder for OWASP Sendai 2020 - DevSecOps Deep Dive

Icon for talk
Women Tech Network Global Conference: Implementing Zero Trust in an organisation to be uncertainty Ready
(10 Jun 2020)

Icon for talk
Vuneraility Assessment for Enterprises
(07 Jun 2020)

Vuneraility Assessment for Enterprises

Icon for recognition
Top 10 Influential Indian Women in Cybersecurity
(01 Jun 2020)

Placeholder for Top 10 Influential Indian Women in Cybersecurity

Icon for discussion
TestGuild Security Podcast — Cloud Security Myths with Vandana Verma
(29 May 2020)

Placeholder for TestGuild Security Podcast — Cloud Security Myths with Vandana Verma

Icon for talk
CyberDay4Girls 2020
(28 May 2020)

Placeholder for CyberDay4Girls 2020

Icon for article
Times of India - Bug report: The female hackers keeping your WFH systems safe
(26 May 2020)

Times of India - Bug report: The female hackers keeping your WFH systems safe

Icon for article
Times of India - Bug report: The female hackers keeping your work from home systems safe
(25 May 2020)

Times of India - Bug report: The female hackers keeping your work from home systems safe

Icon for discussion
Cloud Security Podcast - Cloud Security and Infosec Girls
(15 May 2020)

Cloud Security Podcast - Cloud Security and Infosec Girls

Icon for article
Republic World — Expert Quote: Significant Increase in Cybercrime Against Women During Lockdown
(15 May 2020)

Placeholder for Republic World — Expert Quote: Significant Increase in Cybercrime Against Women During Lockdown

Icon for article
Security Approaches Post Lockdown
(14 May 2020)

Security Approaches Post Lockdown

Icon for article
Hindustan Times - Significant increase in cybercrime against women during lockdown: Experts
(03 May 2020)

Hindustan Times - Significant increase in cybercrime against women during lockdown: Experts

Icon for article
Business Standard - Significant increase in cybercrime against women during lockdown: Experts
(01 May 2020)

Business Standard - Significant increase in cybercrime against women during lockdown: Experts

Icon for article
ETCISO - Significant increase in cybercrime against women during lockdown: Experts
(01 May 2020)

ETCISO - Significant increase in cybercrime against women during lockdown: Experts

Icon for article
NDTV - Significant increase in cyber crimes against women during lockdown: Experts
(01 May 2020)

NDTV - Significant increase in cyber crimes against women during lockdown: Experts

Icon for article
Un-desireable. Un-imaginable. Un-thinkable. We still have the capacity to out beat the threats to your privacy.
(01 May 2020)

Un-desireable. Un-imaginable. Un-thinkable. We still have the capacity to out beat the threats to your privacy.

Icon for talk
OWASP Suffolk: Living In A World of Zero Trust
(25 Apr 2020)

Placeholder for OWASP Suffolk: Living In A World of Zero Trust

Icon for talk
Sarcon 2020
(25 Apr 2020)

Placeholder for Sarcon 2020

Icon for panel
How to start a Career in AppSec
(18 Apr 2020)

How to start a Career in AppSec

Icon for talk
SHe CISO IWD 2020 Webinar - Zero trust , why and why not?
(23 Mar 2020)

Icon for talk
Fast, Accurate, Agile Security Testing​
(18 Mar 2020)

Placeholder for Fast, Accurate, Agile Security Testing​

Icon for article
My Manifestation of InfoSec Speaking
(17 Mar 2020)

My Manifestation of InfoSec Speaking

Icon for article
My Exhilarating InfoSec Journey
(10 Mar 2020)

My Exhilarating InfoSec Journey

Icon for recognition
16 Women Paving the Way in AppSec
(08 Mar 2020)

16 Women Paving the Way in AppSec

Icon for article
Interview with CISO MAG
(08 Mar 2020)

Placeholder for Interview with CISO MAG

Icon for training
OWASP Seasides 2020
(04 Mar 2020)

OWASP Seasides 2020

Icon for talk
OWASP Seasides 2020 - Goa
(28 Feb 2020)

Placeholder for OWASP Seasides 2020 - Goa

Icon for article
A colloquy with Vandana Verma by Sr.Reflectionist Bishakha Jain
(27 Feb 2020)

Placeholder for A colloquy with Vandana Verma by Sr.Reflectionist Bishakha Jain

Icon for training
AppSec California 2020
(23 Jan 2020)

AppSec California 2020

Icon for panel
Appsec California 2020: Diversity by Design
(23 Jan 2020)

Icon for talk
AppSec California 2020
(22 Jan 2020)

AppSec California 2020

Icon for talk
DevSecOps - Virtually Testing
(08 Jan 2020)

Icon for talk
SACON 2020
(08 Jan 2020)

Placeholder for SACON 2020

Icon for recognition
247 Women in Cybersecurity to Follow — Cybersecurity Ventures
(01 Jan 2020)

Placeholder for 247 Women in Cybersecurity to Follow — Cybersecurity Ventures

Icon for article
A Colloquy with Vandana Verma — Reflections Magazine (SCIT)
(01 Jan 2020)

Placeholder for A Colloquy with Vandana Verma — Reflections Magazine (SCIT)

Icon for article
ETCISO - Security Summit Virtual
(01 Jan 2020)

ETCISO - Security Summit Virtual

Icon for talk
Cybersecurity Mentoring Monday
(24 Nov 2019)

Christ University

Icon for talk
Cybersecurity Mentoring Monday
(24 Nov 2019)

Icon for talk
Security Guild 2019
(15 Nov 2019)

Placeholder for Security Guild 2019

Icon for recognition
Top Women in Cybersecurity in India — Instasafe
(26 Oct 2019)

Placeholder for Top Women in Cybersecurity in India — Instasafe

Icon for recognition
52 Influential Cyber Security Bloggers and Speakers by Peerlyst
(03 Oct 2019)

Placeholder for 52 Influential Cyber Security Bloggers and Speakers by Peerlyst

Icon for training
Workshop on Web Application Security at c0c0n 2019
(29 Sep 2019)

Workshop on Web Application Security at c0c0n 2019

Icon for talk
Keynote: Diversity And Inclusion - Not Just A Gender Gap - Vandana Verma
(12 Sep 2019)

Placeholder for Keynote: Diversity And Inclusion - Not Just A Gender Gap - Vandana Verma

Icon for training
Global AppSec DC 2019
(11 Sep 2019)

Global AppSec DC 2019

Icon for article
Interview with ITSP Magazine
(10 Sep 2019)

Placeholder for Interview with ITSP Magazine

Icon for recognition
Winner - Cyber Security Woman Supporter of the Year Award 2019 - Woman CyberJutsu
(08 Sep 2019)

Winner - Cyber Security Woman Supporter of the Year Award 2019 - Woman CyberJutsu

Icon for talk
Shifting the DevSecOps Culture, Taking away the sugar piece and giving the pile to ants : Defcon - AppSec Village 2019
(11 Aug 2019)

Placeholder for Shifting the DevSecOps Culture, Taking away the sugar piece and giving the pile to ants : Defcon - AppSec Village 2019

Icon for talk
BSides Las Vegas 2019
(06 Aug 2019)

Placeholder for BSides Las Vegas 2019

Icon for talk
DevSecCon: Cloud Security and the Myths Around it
(18 Jul 2019)

Icon for recognition
IFSEC Global Influencers in Security and Fire 2019
(14 Jun 2019)

IFSEC Global Influencers in Security and Fire 2019

Icon for training
Global AppSec Tel Aviv 2019
(28 May 2019)

Global AppSec Tel Aviv 2019

Icon for talk
Global AppSec Tel Aviv 2019 - Trainer: Introduction to Web Application Hacking
(28 May 2019)

Placeholder for Global AppSec Tel Aviv 2019 - Trainer: Introduction to Web Application Hacking

Icon for training
Kids Village at c0c0n_2017
(28 May 2019)

Kids Village at c0c0n_2017

Icon for article
Bug Bounty World Interviews Vandana Verma
(11 May 2019)

Icon for article
Rise of Cyber Woman
(11 May 2019)

Rise of Cyber Woman

Icon for article
HackInterview with Vandana
(11 Mar 2019)

Placeholder for HackInterview with Vandana

Icon for talk
Nullcon 2019
(01 Mar 2019)

Placeholder for Nullcon 2019

Icon for training
OWASP Seasides 2019
(27 Feb 2019)

OWASP Seasides 2019

Icon for talk
AppSec California 2019
(23 Jan 2019)

AppSec California 2019

Icon for training
AppSec California 2019
(22 Jan 2019)

AppSec California 2019

Icon for training
BSides Delhi 2018 - Attacking Web Applications Using Burp Suite
(26 Oct 2018)

BSides Delhi 2018 - Attacking Web Applications Using Burp Suite

Icon for talk
BSides Delhi 2018
(20 Oct 2018)

Placeholder for BSides Delhi 2018

Icon for training
AppSec USA 2018
(10 Oct 2018)

AppSec USA 2018

Icon for recognition
Information Security Award Judge — Women Cyberjutsu Awards 2018
(01 Sep 2018)

Placeholder for Information Security Award Judge — Women Cyberjutsu Awards 2018

Icon for talk
OWASP Dependency Check
(24 Jul 2018)

Placeholder for OWASP Dependency Check

Icon for talk
SHeSecures: Managing Security Operations in Cloud
(20 Jul 2018)

SHeSecures: Managing Security Operations in Cloud

Icon for talk
OWASP AppSec Europe 2018
(05 Jul 2018)

OWASP AppSec Europe 2018

Icon for recognition
Manager Choice Award - IBM
(12 Jun 2018)

Manager Choice Award - IBM

Icon for training
Nullcon 2018
(01 Mar 2018)

Nullcon 2018

Icon for talk
Managing Security Operations in the Cloud
(17 Oct 2017)

Managing Security Operations in the Cloud

Icon for talk
c0c0n 2017 - Kerala Police Cybersecurity Conference
(15 Sep 2017)

Placeholder for c0c0n 2017 - Kerala Police Cybersecurity Conference

Icon for panel
Women Roundtable hosted by Target
(14 Jul 2017)

Women Roundtable hosted by Target

Icon for recognition
Winja CTF Winner — Nullcon 2015
(06 Feb 2015)

Placeholder for Winja CTF Winner — Nullcon 2015

Icon for recognition
Achievements & Credentials
(01 Jan 2000)

Placeholder for Achievements & Credentials

Icon for recognition
Awards Judge or Jury
(01 Jan 2000)

Placeholder for Awards Judge or Jury

Icon for article
BLOG POSTS
(01 Jan 2000)

Placeholder for BLOG POSTS

Icon for article
Books Authored
(01 Jan 2000)

Placeholder for Books Authored

Icon for curator
Community Leadership
(01 Jan 2000)

Placeholder for Community Leadership

Icon for talk
Conference Talks
(01 Jan 2000)

Placeholder for Conference Talks

Icon for article
Home Labs
(01 Jan 2000)

Placeholder for Home Labs

Icon for talk
Keynotes & Locknotes
(01 Jan 2000)

Placeholder for Keynotes & Locknotes

Icon for curator
Leadership & Impact
(01 Jan 2000)

Placeholder for Leadership & Impact

Icon for article
Learning & Resources
(01 Jan 2000)

Placeholder for Learning & Resources

Icon for article
Media & Stories
(01 Jan 2000)

Placeholder for Media & Stories

Icon for article
Open Source
(01 Jan 2000)

Placeholder for Open Source

Icon for discussion
Podcast
(01 Jan 2000)

Placeholder for Podcast

Icon for talk
Speaking & Appearances
(01 Jan 2000)

Placeholder for Speaking & Appearances

Icon for training
Trainings
(01 Jan 2000)

Placeholder for Trainings

Icon for article
Work With Vandana
(01 Jan 2000)

Placeholder for Work With Vandana