Grand Hyatt, Kochi, Kerala
Trainings
07-09 Oct, 2025
Conference
10-11 Oct, 2025
support@c0c0n.org
|
(+91)-974-690-6654
Home
Speakers
Speakers - ALL
Speakers - Conference
Speakers - Training
Speakers - LEA
Speakers - CSEA
Speakers - Village
Speakers - Workshop
Schedule
Agenda
10-11, Oct 2025
Tabbed Layout
7-11, Oct 2025
Tabbed Layout
10
th
Oct 2025
Timeline Layout
11
th
Oct 2025
Timeline Layout
Trainings
Windows Kernel Exploitation Foundation & Advanced Training
Multi-Cloud (AWS, Azure & GCP) Security [2025 Edition]
Offensive OSINT
Android Security Primer
Automotive Security: A Hands-On Approach
Mastering Telecom Security: A Hands-on Guide to RAN & Core Network Protection
Hands-on in SIGINT, ELINT, COMINT and Electronic Warfare
StealthOps: Red Team Operations 2025 Edition
HackTheWeb: Pentesting Beyond Basics
Secure Code Audit Exclusive Edition
Hacking Android, iOS and IoT apps by Example
Breaking Smart Kiosks with Windows 11 OS Hardening
Offensive Tradecraft
Villages
Radio Controlled (RC) Engineering Village
Radio Village
AI Village
Telecom Village
Adversary Village
IoT Security Village
Lock Picking Village
Phishing Village
CTF
Dome CTF
c0c0n CTF
LEA CTF
CSEA
VIDTF Training
Hackathon | HacKP
CSEA Track
LEA Track
2 Day Training
LEA Track
LEA CTF
Call For Papers LEA
Exhibition
More...
Giveaway - WINBIG
Students Scholarship
Venue
Speakers
Speakers - ALL
Speakers - Conference
Speakers - Training
Speakers - LEA
Speakers - CSEA
Speakers - Village
Speakers - Workshop
Call For
CFP LEA
Call For Papers Technical Track
CFP Review Board
Call For Villages
Become a Sponsor
Team
Sponsors
Exhibitors
Archives
c0c0n @17 (2024)
c0c0n @16 (2023)
c0c0n 2022
c0c0n 2021
c0c0n 2020
c0c0n XII
c0c0n XI
c0c0n X
c0c0n 2016
c0c0n 2015
c0c0n 2014
c0c0n 2013
c0c0n 2012
c0c0n 2011
c0c0n 2010
c0c0n 2009
Register Now
Contact
Home
Speakers
Speakers - ALL
Speakers - Conference
Speakers - Training
Speakers - LEA
Speakers - CSEA
Speakers - Village
Speakers - Workshop
Schedule
Agenda
10-11, Oct 2025
Tabbed Layout
7-11, Oct 2025
Tabbed Layout
10
th
Oct 2025
Timeline Layout
11
th
Oct 2025
Timeline Layout
Trainings
Windows Kernel Exploitation Foundation & Advanced Training
Multi-Cloud (AWS, Azure & GCP) Security [2025 Edition]
Offensive OSINT
Android Security Primer
Automotive Security: A Hands-On Approach
Mastering Telecom Security: A Hands-on Guide to RAN & Core Network Protection
Hands-on in SIGINT, ELINT, COMINT and Electronic Warfare
StealthOps: Red Team Operations 2025 Edition
HackTheWeb: Pentesting Beyond Basics
Secure Code Audit Exclusive Edition
Hacking Android, iOS and IoT apps by Example
Breaking Smart Kiosks with Windows 11 OS Hardening
Offensive Tradecraft
Villages
Radio Controlled (RC) Engineering Village
Radio Village
AI Village
Telecom Village
Adversary Village
IoT Security Village
Lock Picking Village
Phishing Village
CTF
Dome CTF
c0c0n CTF
LEA CTF
CSEA
VIDTF Training
Hackathon | HacKP
CSEA Track
LEA Track
2 Day Training
LEA Track
LEA CTF
Call For Papers LEA
Exhibition
More...
Giveaway - WINBIG
Students Scholarship
Venue
Speakers
Speakers - ALL
Speakers - Conference
Speakers - Training
Speakers - LEA
Speakers - CSEA
Speakers - Village
Speakers - Workshop
Call For
CFP LEA
Call For Papers Technical Track
CFP Review Board
Call For Villages
Become a Sponsor
Team
Sponsors
Exhibitors
Archives
c0c0n @17 (2024)
c0c0n @16 (2023)
c0c0n 2022
c0c0n 2021
c0c0n 2020
c0c0n XII
c0c0n XI
c0c0n X
c0c0n 2016
c0c0n 2015
c0c0n 2014
c0c0n 2013
c0c0n 2012
c0c0n 2011
c0c0n 2010
c0c0n 2009
Register Now
Contact
Register Online
Agenda
Home
Schedule - Conference Day 2
Schedule
11-October-2025
08:30
09:00
09:30
10:00
10:30
11:00
11:30
12:00
12:30
13:00
13:30
14:00
14:30
15:00
15:30
16:00
16:30
17:00
17:30
18:00
TRACK 1
Management, GRC, Policy, Strategy, Legal
Defending The Future in an Uncertain World: AI, Risk, and Resilience
Algorithmic Anarchy: Decoding Nepal protests and the role of social media platforms.
Silent Sigma: Unraveling Iranian APT’s 0-Day Warfare and Covert C2
A Rant... Period - All cyber security mistakes need not be made by you !
Tea / Coffee Break
Countering the Deep State Narrative: Transparency, Trust, and Cyber Resilience
PANEL
[FIRESIDE CHAT] - Future of Security
Networking Lunch
Cybersecurity Metrics That Matter: From Investment to Impact
PANEL
Tea / Coffee Break
Strengthening Cyber Defence and National Security - A Military Perspective
Closing Note (Keynote) 2 - The future of Cybersecurity
Closing Ceremony
TRACK 2
Technology | Innovation | Research
Keynote (TRACK 1 LIWA HALL)
Data Security in the Cloud: Securing Sensitive Data in Cloud-Native Environments!
Silent Protocols Piercing the Air-Gap: Blind Spots in ICS Security
Tea / Coffee Break
Automation Tactics for Modern Threat Emulation
Not My Fault!: Optimizing Fault Injection with ML
Networking Lunch
The Malware's Messenger: Pwn-Ping-Poll, Abusing Telegram API As A C2
Vietnamese hacking group : A Rising of Information Stealing Campaigns Going Global
Tea / Coffee Break
MOVE TO TRACK 1 FOR KEYNOTE AND CLOSING CEREMONY
TRACK
FINTECH
Keynote (TRACK 1 LIWA HALL)
Privacy by Design: Building Trust While Accelerating Fintech Innovation
PANEL
Tea / Coffee Break
The Business Domain Specialization in Cybersecurity
Beyond Compliance: Why True Data Protection Starts with Privacy By Design
Networking Lunch
Zero Trust in BFSI: Redefining Security Beyond the Perimeter
PANEL
Tea / Coffee Break
MOVE TO TRACK 1 FOR KEYNOTE AND CLOSING CEREMONY
TRACK AI
Artificial Intelligence (AI)
Keynote (TRACK 1 LIWA HALL)
Saving Bug Bounties from AI Slop
LLM Red Teaming: Offensive Security Tactics for Large Language Models
Tea / Coffee Break
DAI-TIRS: An AI-Powered Threat Intelligence and Response System for Securing the Metaverse
AI Governance Master Class
Networking Lunch
Securing AI And ML Use Cases
The Evolving Security Landscape of AI-Generated Code
Tea / Coffee Break
MOVE TO TRACK 1 FOR KEYNOTE AND CLOSING CEREMONY
TRACK Workshop
Workshop
Beyond Logs and Dashboards: Spatial Analysis of Cyber Threats - Session 1
Tea / Coffee Break
Beyond Logs and Dashboards: Spatial Analysis of Cyber Threats - Session 2
Networking Lunch
[AI VILLAGE ] Hands-on session on real-world AI Use Case (by FutureGPT)
Tea / Coffee Break
MOVE TO TRACK 1 FOR KEYNOTE AND CLOSING CEREMONY
TRACK LEA
Law Enforcement Agencies
Keynote (TRACK 1 LIWA HALL)
Unmasking Criminal Networks: A Graph-Based Forensic Approach Using Call Detail Records and Mobile Tower Data
Identifying Illicit Drug Trades on the Dark Web Through Deep Learning and Blockchain Transaction Analysis
Tea / Coffee Break
Exposing the Evolving Tactics, Techniques, and Procedures of Malicious APK Developers: A Law Enforcement Perspective
A Forensic Approach for UAV Analysis: Investigating the DJI Phantom IV Professional
Growing menace of cybercrime in India and the Maharashtra Cyber Security Project
Networking Lunch
Infrastructure Hunt & Cyber Threat Intel Stories - Take aways for future take downs
Tea / Coffee Break
MOVE TO TRACK 1 FOR KEYNOTE AND CLOSING CEREMONY
TRACK CSEA
Child Sexual Exploitation and Abuse
Keynote 1
Keynote 2
Into the Light - Global Index (Part II) (with Q&A)
Project Mercury - Child Rescue Coalition
Youth-Led Session - 'Nothing About Us Without Us'
Online CSEA Offending, Platform use, and Emerging Technologies - Protect Children
Katalyst Presentation
Creating a Country Specific CSEA Child Abuse Image Database (Tanzania)
Safeguarding Children in the Virtual World
Lunch - Carousel: Calls to Action
CSEA in Kerala
Keynote
Field Update – Kelvin Lay & Paul Griffiths: C-TAP & Indian VID Operation Results
Final Closing Remarks
Closing Ceremony (Main Liwa Conference Hall)
TRACK
ROUND TABLE AND MASTER CLASS
Executive Round Table - Navigating Cybersecurity Challenges Securing Enterprises in a Cloud-First, Digital-First [ INVITE ONLY ] () Venue: Nattika)
Networking Lunch
Master Class - Dark web Osint (Venue: Library)
Tea / Coffee Break
Master Class - AI based Report Generation (Venue: Library)
Closing Note (TRACK 1)
Close