Grand Hyatt, Kochi, Kerala
Trainings
07-09 Oct, 2025
Conference
10-11 Oct, 2025
support@c0c0n.org
|
(+91)-974-690-6654
Home
Speakers
Speakers - ALL
Speakers - Conference
Speakers - Training
Speakers - LEA
Speakers - CSEA
Speakers - Village
Speakers - Workshop
Schedule
Agenda
10-11, Oct 2025
Tabbed Layout
7-11, Oct 2025
Tabbed Layout
10
th
Oct 2025
Timeline Layout
11
th
Oct 2025
Timeline Layout
Trainings
Windows Kernel Exploitation Foundation & Advanced Training
Multi-Cloud (AWS, Azure & GCP) Security [2025 Edition]
Offensive OSINT
Android Security Primer
Automotive Security: A Hands-On Approach
Mastering Telecom Security: A Hands-on Guide to RAN & Core Network Protection
Hands-on in SIGINT, ELINT, COMINT and Electronic Warfare
StealthOps: Red Team Operations 2025 Edition
HackTheWeb: Pentesting Beyond Basics
Secure Code Audit Exclusive Edition
Hacking Android, iOS and IoT apps by Example
Breaking Smart Kiosks with Windows 11 OS Hardening
Offensive Tradecraft
Villages
Radio Controlled (RC) Engineering Village
Radio Village
AI Village
Telecom Village
Adversary Village
IoT Security Village
Lock Picking Village
Phishing Village
CTF
Dome CTF
c0c0n CTF
LEA CTF
CSEA
VIDTF Training
Hackathon | HacKP
CSEA Track
LEA Track
2 Day Training
LEA Track
LEA CTF
Call For Papers LEA
Exhibition
More...
Giveaway - WINBIG
Students Scholarship
Venue
Speakers
Speakers - ALL
Speakers - Conference
Speakers - Training
Speakers - LEA
Speakers - CSEA
Speakers - Village
Speakers - Workshop
Call For
CFP LEA
Call For Papers Technical Track
CFP Review Board
Call For Villages
Become a Sponsor
Team
Sponsors
Exhibitors
Archives
c0c0n @17 (2024)
c0c0n @16 (2023)
c0c0n 2022
c0c0n 2021
c0c0n 2020
c0c0n XII
c0c0n XI
c0c0n X
c0c0n 2016
c0c0n 2015
c0c0n 2014
c0c0n 2013
c0c0n 2012
c0c0n 2011
c0c0n 2010
c0c0n 2009
Register Now
Contact
Home
Speakers
Speakers - ALL
Speakers - Conference
Speakers - Training
Speakers - LEA
Speakers - CSEA
Speakers - Village
Speakers - Workshop
Schedule
Agenda
10-11, Oct 2025
Tabbed Layout
7-11, Oct 2025
Tabbed Layout
10
th
Oct 2025
Timeline Layout
11
th
Oct 2025
Timeline Layout
Trainings
Windows Kernel Exploitation Foundation & Advanced Training
Multi-Cloud (AWS, Azure & GCP) Security [2025 Edition]
Offensive OSINT
Android Security Primer
Automotive Security: A Hands-On Approach
Mastering Telecom Security: A Hands-on Guide to RAN & Core Network Protection
Hands-on in SIGINT, ELINT, COMINT and Electronic Warfare
StealthOps: Red Team Operations 2025 Edition
HackTheWeb: Pentesting Beyond Basics
Secure Code Audit Exclusive Edition
Hacking Android, iOS and IoT apps by Example
Breaking Smart Kiosks with Windows 11 OS Hardening
Offensive Tradecraft
Villages
Radio Controlled (RC) Engineering Village
Radio Village
AI Village
Telecom Village
Adversary Village
IoT Security Village
Lock Picking Village
Phishing Village
CTF
Dome CTF
c0c0n CTF
LEA CTF
CSEA
VIDTF Training
Hackathon | HacKP
CSEA Track
LEA Track
2 Day Training
LEA Track
LEA CTF
Call For Papers LEA
Exhibition
More...
Giveaway - WINBIG
Students Scholarship
Venue
Speakers
Speakers - ALL
Speakers - Conference
Speakers - Training
Speakers - LEA
Speakers - CSEA
Speakers - Village
Speakers - Workshop
Call For
CFP LEA
Call For Papers Technical Track
CFP Review Board
Call For Villages
Become a Sponsor
Team
Sponsors
Exhibitors
Archives
c0c0n @17 (2024)
c0c0n @16 (2023)
c0c0n 2022
c0c0n 2021
c0c0n 2020
c0c0n XII
c0c0n XI
c0c0n X
c0c0n 2016
c0c0n 2015
c0c0n 2014
c0c0n 2013
c0c0n 2012
c0c0n 2011
c0c0n 2010
c0c0n 2009
Register Now
Contact
Register Online
Agenda
Home
Schedule - Conference Day 1
Schedule
10-October-2025
08:30
09:00
09:30
10:00
10:30
11:00
11:30
12:00
12:30
13:00
13:30
14:00
14:30
15:00
15:30
16:00
16:30
17:00
17:30
18:00
TRACK 1
Management, GRC, Policy, Strategy, Legal
Registration
Opening Ceremony & KEYNOTE
Tea/Coffee Break
Cyber Crime : National Response
Passive Radar Using Low Earth Orbit Satellites - Exploiting StarLink as Illumination for Target detection, classification and tracking
Alarm rationalisation for digital cyber OT assets
From Shadows to Sight: Defending Against Adversaries in Plain Sight
Networking Lunch
Cybersecurity and it's importance in Space and Satellite Systems
Sustainable Cybersecurity: (Environmental, Social, and Governance) ESG Meets Infosec
PANEL
Tea / Coffee Break
AI for predictive policing and efficient utilisation of resources
Future of OT Security: AI, Digital Twins, and Predictive Threat Defense
PANEL
Weaponized Intelligence: When AI Goes on the Cyber Offense
If you can't beat them,co-create with them - Isha & Aisha — Human & AI in Harmony
TRACK 2
Technology | Innovation | Research
Registration
Tea/Coffee Break
Breaking into Azure AD via Device Code Phsihing and PRT
12 Digits Sailing on the Fragile Foundation
Weaponizing Go for Mac & Linux
KubeShadow (Advanced Offensive Kubernetes Red-Team Framework)
Networking Lunch
Breaching Windows Server 2025 Datacenter Edition: Kung Fu Scripting Techniques to Bypass Critical Security Layers
A Practical Guide to Red Teaming in Mac Environments
Tea / Coffee Break
Cloud of the Living Dead: A Strategic Armory to Disrupt Non-Human Identities
Whose Passkey is This, Anyway - Stealing Passkeys made Possible
Pre-installation attacks on web installers
TRACK
FINTECH
Registration
Opening Ceremony & KEYNOTE (TRACK 1 - LIWA)
Tea/Coffee Break
Fintech Security & Privacy in the Next Decade: Evolving from Compliance to Competitive Advantage
PANEL
Cyber Resilient Supervision
Why FinTechs should mature from Vulnerability Management to Exposure Management
Networking Lunch
Innovation vs. Risk: Securing Fintech Growth in a Hyper-Connected World
PANEL
AI-Powered Compliance: Transforming Compliance & Risk Management in the Dynamic Regulatory Landscape
Tea / Coffee Break
AI in Fintech: Addressing Bias, Safeguarding Privacy, and Managing Cyber Risk
PANEL
TRACK AI
Artificial Intelligence (AI)
Registration
Opening Ceremony & KEYNOTE (TRACK 1 - LIWA)
Tea/Coffee Break
Red Teaming the LLM Stack: Lessons from Models Under Hallucination
The Agent Had a Plan—So Did I: Top Attacks on OWASP Agentic AI Systems
Kill Chain, Meet Skill Chain: Human + Agentic AI in Modern Cyber Defense
Networking Lunch
Ghosts in Your GitHub Actions and AI's Hunt for Hidden Exploits
Hijacking AI Agents: Attacks, Abuses, and How to Fight Back
Tea / Coffee Break
AI-Driven Cyber-Resilient SCADA Mesh in Open RAN-Enabled Smart Infrastructure
Generative Adversarial Networks for Enhanced Malware Detection
Agents under the Siege: Threat Modeling the Next Generation AI
TRACK LEA
Law Enforcement Agencies
Registration
Opening Ceremony & KEYNOTE (TRACK 1 - LIWA)
Tea/Coffee Break
Understanding Crypto Ecosystem & Intersection with LEAs
The Forgery Files: Exposing Shadows Behind Counterfeit Cash and IDs
Defending the Front Line
Pre-emptive Identification of Unsuspecting Cybercrime Victims: Case Studies and an Automated Tool for Law Enforcement
Networking Lunch
From Pixels to Proof: (Forensic Techniques for Image Authentication and Deepfake Detection)
The silent threat of IMSI-catchers in the age of 5G
Tea / Coffee Break
Tracking network infrastructure behind industrial-scale scams
Bridging OSINT and Digital Forensics to Produce Legally Defensible Admissible Digital Evidence
Cyber Security as an extension of National Security
Piercing the Veil: Investigative Techniques for VPN & Tor Anonymity
Unmasking Hidden Services: A Machine Learning Framework for Tracking and Correlating URL Hopping in Dark Web Marketplaces
TRACK Workshop
Workshop
Registration
Tea/Coffee Break
Practical Threat Modelling
Networking Lunch
Practical Exploitation of Wireless Protocols: Attacking Zigbee Networks with USB-based RF transceivers and Bluetooth LE in IoT Ecosystems - Session 1
Tea / Coffee Break
Practical Exploitation of Wireless Protocols: Attacking Zigbee Networks with USB-based RF transceivers and Bluetooth LE in IoT Ecosystems - Session 2
TRACK CSEA
Child Sexual Exploitation and Abuse
Welcome and inauguration ceremony - Government Announcement - National Strategy, Hackathon awards and Into the Light Index release.
CSEA Track - LIWA 2 (Refreshments will be served throughout the sessions in Liwa 2)
Welcome Address
Opening Remarks
Keynote & Global Launch - Prof. Debi Fry : : Into The Light - Global CSEA Prevalence Data (with Q&A)
HacKP Hackathon Update
Keynote - Early Detection, Monitoring Tools & Investigation Techniques
Lunch - Carousel: Calls to Action
Keynote - Identifying Suspects in CSEA Imagery through Knuckle and Fingernail Bed Biometrics
Child Sexual Abuse Material & AI's Impact on the Sector
The Universal Classification Schema: Strengthening Global Collaboration Against CSEA Online
Tech Industry Response:
PANEL
CSEA Tracking & AI Risks to Children
Legal Focus - AI-Generated CSAM & Indian Law
Online Child Protection at Meta
Closing Remarks & Summary
Dinner & Cultural Event
Close