Registration + Tea/Coffee
Introduction to THREAT CON
Keynote by Shomiron Das Gupta
Networking Break
Ensure Credential Hygiene And Reduced Risk Of Leakage Across Systems by Avinash Jain
Supply Chain Attacks:- Focused On NPM Attacks by Hassan Khan & Danish Tariq
Lunch Break
Cybersecurity And Supply Chain Risk Management: Best Practices For Procurement by Touhid Shaikh
Tea/Coffee Break
Breaking Barriers: A Deep Dive Into Bypassing Next-Gen 2FA And MFA Security Measures by Shahmeer Amir
The Dark Side Of Large Language Models: Uncovering And Overcoming Of Code Vulnerabilities by Javan Rasokat
Closing/token of love presentation/Prize Distribution/Group Photo Session
Closing Session