Grand Hyatt, Kochi, Kerala
Trainings
07-09 Oct, 2025
Conference
10-11 Oct, 2025
support@c0c0n.org
|
(+91)-974-690-6654
Home
Speakers
Speakers - ALL
Speakers - Conference
Speakers - Training
Speakers - LEA
Speakers - CSEA
Speakers - Village
Speakers - Workshop
Schedule
Agenda
7 to 11, Oct 2025
Tabbed Layout
10
th
Oct 2025
Timeline Layout
11
th
Oct 2025
Timeline Layout
Trainings
Windows Kernel Exploitation Foundation & Advanced Training
Multi-Cloud (AWS, Azure & GCP) Security [2025 Edition]
Offensive OSINT
Android Security Primer
Automotive Security: A Hands-On Approach
Mastering Telecom Security: A Hands-on Guide to RAN & Core Network Protection
Hands-on in SIGINT, ELINT, COMINT and Electronic Warfare
StealthOps: Red Team Operations 2025 Edition
HackTheWeb: Pentesting Beyond Basics
Secure Code Audit Exclusive Edition
Hacking Android, iOS and IoT apps by Example
Breaking Smart Kiosks with Windows 11 OS Hardening
Offensive Tradecraft
Villages
Radio Controlled (RC) Engineering Village
Radio Village
AI Village
Telecom Village
Adversary Village
IoT Security Village
Lock Picking Village
Phishing Village
CTF
Dome CTF
c0c0n CTF
LEA CTF
CSEA
VIDTF Training
Hackathon | HacKP
CSEA Track
LEA Track
2 Day Training
LEA Track
LEA CTF
Call For Papers LEA
Exhibition
More...
Giveaway - WINBIG
Students Scholarship
Venue
Speakers
Speakers - ALL
Speakers - Conference
Speakers - Training
Speakers - LEA
Speakers - CSEA
Speakers - Village
Speakers - Workshop
Call For
CFP LEA
Call For Papers Technical Track
CFP Review Board
Call For Villages
Become a Sponsor
Team
Sponsors
Exhibitors
Archives
c0c0n @17 (2024)
c0c0n @16 (2023)
c0c0n 2022
c0c0n 2021
c0c0n 2020
c0c0n XII
c0c0n XI
c0c0n X
c0c0n 2016
c0c0n 2015
c0c0n 2014
c0c0n 2013
c0c0n 2012
c0c0n 2011
c0c0n 2010
c0c0n 2009
Register Now
Contact
Home
Speakers
Speakers - ALL
Speakers - Conference
Speakers - Training
Speakers - LEA
Speakers - CSEA
Speakers - Village
Speakers - Workshop
Schedule
Agenda
7 to 11, Oct 2025
Tabbed Layout
10
th
Oct 2025
Timeline Layout
11
th
Oct 2025
Timeline Layout
Trainings
Windows Kernel Exploitation Foundation & Advanced Training
Multi-Cloud (AWS, Azure & GCP) Security [2025 Edition]
Offensive OSINT
Android Security Primer
Automotive Security: A Hands-On Approach
Mastering Telecom Security: A Hands-on Guide to RAN & Core Network Protection
Hands-on in SIGINT, ELINT, COMINT and Electronic Warfare
StealthOps: Red Team Operations 2025 Edition
HackTheWeb: Pentesting Beyond Basics
Secure Code Audit Exclusive Edition
Hacking Android, iOS and IoT apps by Example
Breaking Smart Kiosks with Windows 11 OS Hardening
Offensive Tradecraft
Villages
Radio Controlled (RC) Engineering Village
Radio Village
AI Village
Telecom Village
Adversary Village
IoT Security Village
Lock Picking Village
Phishing Village
CTF
Dome CTF
c0c0n CTF
LEA CTF
CSEA
VIDTF Training
Hackathon | HacKP
CSEA Track
LEA Track
2 Day Training
LEA Track
LEA CTF
Call For Papers LEA
Exhibition
More...
Giveaway - WINBIG
Students Scholarship
Venue
Speakers
Speakers - ALL
Speakers - Conference
Speakers - Training
Speakers - LEA
Speakers - CSEA
Speakers - Village
Speakers - Workshop
Call For
CFP LEA
Call For Papers Technical Track
CFP Review Board
Call For Villages
Become a Sponsor
Team
Sponsors
Exhibitors
Archives
c0c0n @17 (2024)
c0c0n @16 (2023)
c0c0n 2022
c0c0n 2021
c0c0n 2020
c0c0n XII
c0c0n XI
c0c0n X
c0c0n 2016
c0c0n 2015
c0c0n 2014
c0c0n 2013
c0c0n 2012
c0c0n 2011
c0c0n 2010
c0c0n 2009
Register Now
Contact
Register Online
Agenda
Home
Schedule - Conference Day 2
Schedule
11-October-2025
08:30
09:30
10:00
10:30
11:00
11:30
12:00
12:30
13:00
13:30
14:00
14:30
15:00
15:30
16:00
16:30
17:00
17:30
18:00
TRACK 1
Management, GRC, Policy, Strategy, Legal
[KEY NOTE] Defending The Future in an Uncertain World: AI, Risk, and Resilience
TBA
Tea / Coffee Break
Next-Gen Threat Intelligence Sharing: From Noise to Action
PANEL
PassiveNeuron, a sophisticated campaign targeting government organizations across the globe
TBA
Networking Lunch
Cybersecurity Metrics That Matter: From Investment to Impact1
PANEL
A Rant... Period - All cyber security mistakes need not be made by you !
Tea / Coffee Break
Silent Sigma: Unraveling Iranian APT’s 0-Day Warfare and Covert C2
TBA
Closing Note
TRACK 2
Technology | Innovation | Research
Data Security in the Cloud: Securing Sensitive Data in Cloud-Native Environments!
Tea / Coffee Break
Silent Protocols Piercing the Air-Gap: Blind Spots in ICS Security
Automation Tactics for Modern Threat Emulation
Networking Lunch
Not My Fault!: Optimizing Fault Injection with ML
The Malware's Messenger: Pwn-Ping-Poll, Abusing Telegram API As A C2
Tea / Coffee Break
Vietnamese hacking group : A Rising of Information Stealing Campaigns Going Global
The Malware's Messenger: Pwn-Ping-Poll, Abusing Telegram API As A C2
Closing Note (TRACK 1)
TRACK AI
Artificial Intelligence (AI)
TBA
Tea / Coffee Break
DAI-TIRS: An AI-Powered Threat Intelligence and Response System for Securing the Metaverse
LLM Red Teaming: Offensive Security Tactics for Large Language Models
Networking Lunch
Saving Bug Bounties from AI Slop
AI Governance Master Class
The Evolving Security Landscape of AI-Generated Code
Tea / Coffee Break
Securing AI And ML Use Cases
Closing Note (TRACK 1)
TRACK Workshop
Workshop
Beyond Logs and Dashboards: Spatial Analysis of Cyber Threats - Session 1
Tea / Coffee Break
Beyond Logs and Dashboards: Spatial Analysis of Cyber Threats - Session 2
Networking Lunch
[AI VILLAGE ] Hands-on session on real-world AI Use Case
Tea / Coffee Break
[ AI VILLAGE ] Hands-on session on real-world AI Use Case
Closing Note (TRACK 1)
TRACK LEA
Law Enforcement Agencies
Unmasking Hidden Services: A Machine Learning Framework for Tracking and Correlating URL Hopping in Dark Web Marketplaces
Identifying Illicit Drug Trades on the Dark Web Through Deep Learning and Blockchain Transaction Analysis
Tea / Coffee Break
Exposing the Evolving Tactics, Techniques, and Procedures of Malicious APK Developers: A Law Enforcement Perspective
A Forensic Approach for UAV Analysis: Investigating the DJI Phantom IV Professional
Growing menace of cybercrime in India and the Maharashtra Cyber Security Project
Networking Lunch
Infrastructure Hunt & Cyber Threat Intel Stories - Take aways for future take downs
Unmasking Criminal Networks: A Graph-Based Forensic Approach Using Call Detail Records and Mobile Tower Data
Tea / Coffee Break
TBA
TBA
Closing Note (TRACK 1)
TRACK CSEA
Child Sexual Exploitation and Abuse
Reflections on Day One
Keynote
Into the Light - Global Index (Part II) (with Q&A)
Project Mercury - Child Rescue Coalition
Youth-Led Session - 'Nothing About Us Without Us'
Tea Break - Carousel: Calls to Action
Online CSEA Offending, Platform use, and Emerging Technologies - Protect Children
Katalyst Presentation
Creating a Country Specific CSEA Child Abuse Image Database (Tanzania)
Safeguarding Children in the Virtual World
CSEA in Kerala
Lunch - Carousel: Calls to Action
Government Announcement
Keynote
Tea Break - Carousel: Calls to Action
ield Update – Kelvin Lay & Paul Griffiths: C-TAP & Indian VID Operation Results
Final Closing Remarks
Closing Ceremony & AI Hackathon & Roundtable Awards
TRACK
ROUND TABLE AND MASTER CLASS
[ ROUND TABLE 1 - INVITE ONLY ]
Networking Lunch
[MASTER CLASS] By Cyble
Tea / Coffee Break
[MASTER CLASS] By Recorded Future
Closing Note (TRACK 1)
Close