Breakpoint Security Podcast

Neelu Tripathy

Breakpoint-'Exploring the depths of Defensive Security'. The defensive side of Security is a world in itself with teams achieving amazing feats that involve excellent engineering practices and smart optimisation for scale. This is not talked about enough in the industry. Join me in the br3akp0int podcast as we reflect on the methods and approaches these smart teams use to solve practical challenges in information security and innovate their way into the future. Who is this meant for? : This podcast is for anyone in InfoSec willing to know more about advances in security techniques. This includes security researchers or professionals, product owners, compliance or cloud, AI/ML, threat intel, SecOps automation, Security Leaders, development teams, pentesters and security practitioners. A bit about me: I am a technical security enthusiast and have been dabbling my hands at both offensive and defensive security. I am passionate about growing security communities and have spoken and trained at various security conferences.

  1. S04EP05 | Teaser | Bug Bounties Programs

    第 4 季第 6 集預告

    S04EP05 | Teaser | Bug Bounties Programs

    TOPICFrom Vulnerability to Value: Harnessing Bug Bounties for Continuous Security Improvement Guest: Shobhit Gautam, HackerOne, Staff Security Solutions Architect, HackerOne Shobhit is a Staff Solutions Architect at HackerOne. He has 15+ years of security experience, with extensive expertise in application, cloud, and infrastructure security. He is passionate about building secure solutions and fostering a security-conscious culture. He has experience leading security awareness initiatives, mentoring security teams, and responsibly disclosing vulnerabilities and is an active contributor to the security community. This discussion will explore how organizations can strategically leverage bug bounty programs, shifting the perspective from simply finding flaws to actively harnessing crowdsourced security intelligence as a core engine for continuous improvement and measurable security value. We aim to demonstrate how vulnerabilities, when identified and managed effectively through these programs, become critical data points that strengthen defenses over time. -- Follow us on LinkedIn: https://www.linkedin.com/company/breakpoint-security-podcast Subscribe for Video on YouTube: Subscribe: https://www.youtube.com/@BreakpointSecurityPodcast?sub_confirmation=1 If you like to see more like this, please Subscribe to Breakpoint Youtube! Please Share with others in the community. It always means a lot! Follow us on LinkedIn: @breakpoint-security-podcast Audio on Buzzsprout: https://breakpoint.buzzsprout.com Buzz me on Twitter or LinkedIn Connect with me on - Twitter: @NeeluTripathy LinkedIn: @neelutripathy

    2 分鐘
  2. S04EP05 | Teaser | DPDP Act and Compliance

    第 4 季第 5 集預告

    S04EP05 | Teaser | DPDP Act and Compliance

    The new DPDP Act is officially rewriting the rules for handling personal data in India. It sounds like simple compliance, but the implementation challenges for every data fiduciary are tricky—and getting it wrong could lead to massive fines. Today, we dive into the biggest hurdles, from consent management to fulfilling data principal rights. We guide you through the precise techniques you need to roll out DPDP successfully. Don't risk your organization's future—check out the full episode! Guest: Saakshar Duggal, Artificial Intelligence Law Expert I Training Corporates on Cyber laws and Cyber Hygiene Saakshar Duggal is a practicing Advocate in the Delhi High Court and is regarded as an AI law Expert. He is a 19 times TEDx speaker and has been a guest speaker at prominent organizations like the United Nations main office (UN) , Harvard University’s ( (HPAIRx), Defence Research and Development Organisation (DRDO) , All India Institute of Medical Sciences ( AIIMS) , Indian Institute of Technology, Delhi ( IIT) etc. He is dedicated to promoting awareness of legal issues in cyberspace and of upcoming technologies like Artificial Intelligence. --- Follow us on LinkedIn: https://www.linkedin.com/company/breakpoint-security-podcast Subscribe for Video on YouTube: Subscribe: https://www.youtube.com/@BreakpointSecurityPodcast?sub_confirmation=1 If you like to see more like this, please Subscribe to Breakpoint Youtube! Please Share with others in the community. It always means a lot! Follow us on LinkedIn: @breakpoint-security-podcast Audio on Buzzsprout: https://breakpoint.buzzsprout.com Buzz me on Twitter or LinkedIn Connect with me on - Twitter: @NeeluTripathy LinkedIn: @neelutripathy

    2 分鐘
  3. S04EP04 | Culture Eats Security for Breakfast | Jay Thoden van Velzen

    9月19日

    S04EP04 | Culture Eats Security for Breakfast | Jay Thoden van Velzen

    Guest: Jay Thoden van Velzen Technical Advisor, Office of the Chief Security Officer SAP Global Security & Cloud Compliance In this segment, we’re unpacking the biggest myth in security: that strategy is enough. Our guest argues that culture eats strategy for breakfast, and effective security isn’t about more policies, but about deep negotiation and understanding. We’ll discuss how to use tools like security risk management and security engineering not as blockers, but as instruments for genuine collaboration. This is about convincing teams we understand their needs, and together, building a security culture where everyone wins. This is how we move from being a cost center to a true business partner. Recommended reading/viewing, Paper(in this topic) for practitioners Security Chaos Engineering: Sustaining Resilience in Software and Systems, Kelly Shortridge and Aaron Rinehart (2023)Cybersecurity for SAP, Gaurav Singh and Juan Perez-Etchegoyen (2025)-- Follow us on LinkedIn: https://www.linkedin.com/company/breakpoint-security-podcast Audio on Buzzsprout: https://breakpoint.buzzsprout.com If you like to see more like this, please Subscribe to Breakpoint Youtube! Please Share with others in the community. It always means a lot! Follow us on LinkedIn: @breakpoint-security-podcast Audio on Buzzsprout: https://breakpoint.buzzsprout.com Buzz me on Twitter or LinkedIn Connect with me on - Twitter: @NeeluTripathy LinkedIn: @neelutripathy

    48 分鐘
  4. S04EP03 | Dust Busters or Bots? | Dennis Giese

    9月6日

    S04EP03 | Dust Busters or Bots? | Dennis Giese

    Guest:  Dennis Giese, Independent Security Researcher You've seen the headlines, heard the wild stories, and maybe even panicked about the devices in your own home. "Hackers take control of robot vacuums, yell racial slurs." It sounds insane, but what really happened? Our guest today is one of the researchers who exposed the vulnerabilities behind these shocking incidents. In this segment, we're diving deep into the world of smart home robotics and cyber-physical security. Our guest will walk us through their research into popular devices, revealing the types of vulnerabilities that often go undetected for extended periods. We'll get a first-hand account of the timeline of the incidents, clarifying what happened and why. This isn't just about the sensational headlines; it’s a critical look at how to prevent these problems, how to ensure researchers' work isn't misused for malicious purposes, and what unreleased vulnerabilities still exist. This discussion is for anyone who has ever worried about the privacy of their home in an age of constant connectivity. -- Follow us on LinkedIn: https://www.linkedin.com/company/breakpoint-security-podcast Video on YouTube: https://youtu.be/i1AvJm2wYx8 If you like to see more like this, please Subscribe to Breakpoint Youtube! Please Share with others in the community. It always means a lot! Follow us on LinkedIn: @breakpoint-security-podcast Audio on Buzzsprout: https://breakpoint.buzzsprout.com Buzz me on Twitter or LinkedIn Connect with me on - Twitter: @NeeluTripathy LinkedIn: @neelutripathy

    25 分鐘
  5. S04EP02 | Reversing Large Deep Learning Models | Yashodhan Mandke

    8月22日

    S04EP02 | Reversing Large Deep Learning Models | Yashodhan Mandke

    Have you ever thought about how an attacker might reverse-engineer an AI model? Our guest today is doing just that, going beyond passwords and keys to unpack the very DNA of deep learning! In this segment, we're diving into the groundbreaking work of reversing large deep learning models. Our guest reveals how it's possible to reverse an AI model's entire mathematical structure, exposing its architecture, critical hyperparameters, and even the internal weights and biases that define its behavior. We'll explore this new frontier of security research in the context of different model formats and major models like GoogleNet and Llama. This isn't just about finding vulnerabilities; it's about understanding how a malicious actor could exploit the sparsity of a tensor or reverse a tokenizer, fundamentally subverting an AI's core logic. This is next-level threat intelligence, showing us how to defend AI by understanding its deepest secrets. Guest: Yashodhan Mandke, Research Scholar MIT-WPU Yashodhan is a Security Researcher with over 13 years of cutting-edge experience at the intersection of IoT and AI innovation. A tech visionary currently pursuing a doctorate in Satellite and Security, Yashodhan’s academic journey spans M.Tech in Satellite Communication, M.Tech in Signal Processing, and a B.E. in Electronics & Telecommunication. Recommended reading/viewing, Paper(in this topic) for practitioners https://goa2025.nullcon.net/doc/goa-2025/nullcon_2025_rev_dl.pdf -- Follow us on LinkedIn: https://www.linkedin.com/company/breakpoint-security-podcast Audio on Buzzsprout: https://breakpoint.buzzsprout.com If you like to see more like this, please Subscribe to Breakpoint Youtube! Please Share with others in the community. It always means a lot! Follow us on LinkedIn: @breakpoint-security-podcast Audio on Buzzsprout: https://breakpoint.buzzsprout.com Buzz me on Twitter or LinkedIn Connect with me on - Twitter: @NeeluTripathy LinkedIn: @neelutripathy

    25 分鐘

預告片

簡介

Breakpoint-'Exploring the depths of Defensive Security'. The defensive side of Security is a world in itself with teams achieving amazing feats that involve excellent engineering practices and smart optimisation for scale. This is not talked about enough in the industry. Join me in the br3akp0int podcast as we reflect on the methods and approaches these smart teams use to solve practical challenges in information security and innovate their way into the future. Who is this meant for? : This podcast is for anyone in InfoSec willing to know more about advances in security techniques. This includes security researchers or professionals, product owners, compliance or cloud, AI/ML, threat intel, SecOps automation, Security Leaders, development teams, pentesters and security practitioners. A bit about me: I am a technical security enthusiast and have been dabbling my hands at both offensive and defensive security. I am passionate about growing security communities and have spoken and trained at various security conferences.