Past Speakers of THM

Thank You

Viral Parmar

Information Warfare

Santosh Khadsare

Digital Forensics Present & Future

Rakshit Tandon

Cyber Security Present & Future

Brijesh Singh

Cyber Crimes in Times of COVID19

Pavan Duggal

Cyber Laws Present & Future

Adv. (Dr.) Karnika Seth

Data Protection and Privacy Issues

Adv. (Dr.) Prashant Mali

Cyber Law in Times of COVID19

Nilay Mistry

Volatile Memory Forensics

Prince Boonila

Balakot Strike Image Analysis

Col. Binoj Koshy

Cyber Criminology in Pandemic Scenario

Dinesh Bareja

Data Security

Sai Satish

Securing data using encryption

Jayesh Thakur

SOC Implementation

Falgun Rathod

Threat Hunting

Smit Shah

Iot Security

Vismit Rakhecha

Menka- The FrameWork

Sujit A

OSINT

Anurag Srivastava

Thick Client Application Security

Jiggaysu Sharma

Buffer Overflow

Atul Singh

Android Pentesting

Jay Patel

XXE Everywhere

Rishi Kant

Introduction to SSDLC

Subhajit Saha

Approach for Finding Critical Vulnerabilities

Ashish Kunwar

Approach for Finding Critical Vulnerabilities

Shrey Shah

Bug Bounty

Mahendra Purabia

Hacking MI Bands

Abhilasha Vyas

Malware Analysis & Detection

Dhaval Ramani

Ransomware Analysis

Sumit Rajput

Design Security

Rushi Adhia

VPN A Secure Network

Maulik Bhesdadiya

Malware Analysis Using Open Soure

Mehul Patel

Intro to Modern Identity

Tanmay Dikshit

Cyber Security - Case Studies

Anvee Malviya

Safe Cyber Streets

Lucky Narayani

Threat Hunting

Dharmin Suthar

Banking Fraud

Ashu Gautam

Security in IOMT

Bela Shrimali

Data Security with Blockchain

Manisha Mehta

Biometric Authentication

Vishwa Kotecha

Data Security in Cloud Computing

Kunal Mehta

Steps Towards Data Security

Pratik Dabhi

How to Get Started with Bug Bounty

Vanshit Malhotra

AI in Cyber Security

Vishal Dave

Why DLP is Need of the Hour

Hiteishi Diwanji

Apps that Steal Data

Meha Shah

Predection of Ransomeware Intrustion

Dyvik Chhena

Data Security in E- Commerce

Sakshi Gagre

Cyber Secuirty Tips & Tricks