Breakpoint Security Podcast

Neelu Tripathy

Breakpoint-'Exploring the depths of Defensive Security'. The defensive side of Security is a world in itself with teams achieving amazing feats that involve excellent engineering practices and smart optimisation for scale. This is not talked about enough in the industry. Join me in the br3akp0int podcast as we reflect on the methods and approaches these smart teams use to solve practical challenges in information security and innovate their way into the future. Who is this meant for? : This podcast is for anyone in InfoSec willing to know more about advances in security techniques. This includes security researchers or professionals, product owners, compliance or cloud, AI/ML, threat intel, SecOps automation, Security Leaders, development teams, pentesters and security practitioners. A bit about me: I am a technical security enthusiast and have been dabbling my hands at both offensive and defensive security. I am passionate about growing security communities and have spoken and trained at various security conferences.

  1. S04EP06 | Bug Bounty Programs | Shobhit Gautam

    -1 J

    S04EP06 | Bug Bounty Programs | Shobhit Gautam

    TOPIC:From Vulnerability to Value: Harnessing Bug Bounties for Continuous Security Improvement Stop viewing bug bounties as just a headache! We're talking about turning #vulnerabilities into measurable #security value. My guest dives deep into how organizations can strategically shift their perspective: using #crowdsourced security intelligence as a core engine for #continuous improvement. It’s about leveraging these programs to generate critical #threatintelligence and #risk  data. Every reported flaw isn't a failure, but a data point that actively strengthens your #defence-in-depth strategy over time. We'll show you how to move from reactive flaw-finding to proactive security harnessing the power of the crowd. Recommended reading/viewing for practitioners: Shobhit’s interview with Pulse2: https://pulse2.com/hackerone-profile-shobhit-gautam-interview/Return on Mitigation: https://www.hackerone.com/info/return-mitigation-calculatorBug Bounty Podcast: https://www.criticalthinkingpodcast.io/about/Getting Started: https://www.bugbountyhunter.com/getting-started/  -- Follow us on LinkedIn: https://www.linkedin.com/company/breakpoint-security-podcast Subscribe for Video on YouTube: Subscribe: https://www.youtube.com/@BreakpointSecurityPodcast?sub_confirmation=1 If you like to see more like this, please Subscribe to Breakpoint Youtube! Please Share with others in the community. It always means a lot! Follow us on LinkedIn: @breakpoint-security-podcast Audio on Buzzsprout: https://breakpoint.buzzsprout.com Buzz me on Twitter or LinkedIn Connect with me on - Twitter: @NeeluTripathy LinkedIn: @neelutripathy

    54 min
  2. S04EP05 | Teaser | Bug Bounties Programs

    BANDE-ANNONCE DE L’ÉPISODE 6, SAISON 4

    S04EP05 | Teaser | Bug Bounties Programs

    TOPICFrom Vulnerability to Value: Harnessing Bug Bounties for Continuous Security Improvement Guest: Shobhit Gautam, HackerOne, Staff Security Solutions Architect, HackerOne Shobhit is a Staff Solutions Architect at HackerOne. He has 15+ years of security experience, with extensive expertise in application, cloud, and infrastructure security. He is passionate about building secure solutions and fostering a security-conscious culture. He has experience leading security awareness initiatives, mentoring security teams, and responsibly disclosing vulnerabilities and is an active contributor to the security community. This discussion will explore how organizations can strategically leverage bug bounty programs, shifting the perspective from simply finding flaws to actively harnessing crowdsourced security intelligence as a core engine for continuous improvement and measurable security value. We aim to demonstrate how vulnerabilities, when identified and managed effectively through these programs, become critical data points that strengthen defenses over time. -- Follow us on LinkedIn: https://www.linkedin.com/company/breakpoint-security-podcast Subscribe for Video on YouTube: Subscribe: https://www.youtube.com/@BreakpointSecurityPodcast?sub_confirmation=1 If you like to see more like this, please Subscribe to Breakpoint Youtube! Please Share with others in the community. It always means a lot! Follow us on LinkedIn: @breakpoint-security-podcast Audio on Buzzsprout: https://breakpoint.buzzsprout.com Buzz me on Twitter or LinkedIn Connect with me on - Twitter: @NeeluTripathy LinkedIn: @neelutripathy

    2 min
  3. S04EP05 | Teaser | DPDP Act and Compliance

    BANDE-ANNONCE DE L’ÉPISODE 5, SAISON 4

    S04EP05 | Teaser | DPDP Act and Compliance

    The new DPDP Act is officially rewriting the rules for handling personal data in India. It sounds like simple compliance, but the implementation challenges for every data fiduciary are tricky—and getting it wrong could lead to massive fines. Today, we dive into the biggest hurdles, from consent management to fulfilling data principal rights. We guide you through the precise techniques you need to roll out DPDP successfully. Don't risk your organization's future—check out the full episode! Guest: Saakshar Duggal, Artificial Intelligence Law Expert I Training Corporates on Cyber laws and Cyber Hygiene Saakshar Duggal is a practicing Advocate in the Delhi High Court and is regarded as an AI law Expert. He is a 19 times TEDx speaker and has been a guest speaker at prominent organizations like the United Nations main office (UN) , Harvard University’s ( (HPAIRx), Defence Research and Development Organisation (DRDO) , All India Institute of Medical Sciences ( AIIMS) , Indian Institute of Technology, Delhi ( IIT) etc. He is dedicated to promoting awareness of legal issues in cyberspace and of upcoming technologies like Artificial Intelligence. --- Follow us on LinkedIn: https://www.linkedin.com/company/breakpoint-security-podcast Subscribe for Video on YouTube: Subscribe: https://www.youtube.com/@BreakpointSecurityPodcast?sub_confirmation=1 If you like to see more like this, please Subscribe to Breakpoint Youtube! Please Share with others in the community. It always means a lot! Follow us on LinkedIn: @breakpoint-security-podcast Audio on Buzzsprout: https://breakpoint.buzzsprout.com Buzz me on Twitter or LinkedIn Connect with me on - Twitter: @NeeluTripathy LinkedIn: @neelutripathy

    2 min
  4. S04EP04 | Culture Eats Security for Breakfast | Jay Thoden van Velzen

    19 SEPT.

    S04EP04 | Culture Eats Security for Breakfast | Jay Thoden van Velzen

    Guest: Jay Thoden van Velzen Technical Advisor, Office of the Chief Security Officer SAP Global Security & Cloud Compliance In this segment, we’re unpacking the biggest myth in security: that strategy is enough. Our guest argues that culture eats strategy for breakfast, and effective security isn’t about more policies, but about deep negotiation and understanding. We’ll discuss how to use tools like security risk management and security engineering not as blockers, but as instruments for genuine collaboration. This is about convincing teams we understand their needs, and together, building a security culture where everyone wins. This is how we move from being a cost center to a true business partner. Recommended reading/viewing, Paper(in this topic) for practitioners Security Chaos Engineering: Sustaining Resilience in Software and Systems, Kelly Shortridge and Aaron Rinehart (2023)Cybersecurity for SAP, Gaurav Singh and Juan Perez-Etchegoyen (2025)-- Follow us on LinkedIn: https://www.linkedin.com/company/breakpoint-security-podcast Audio on Buzzsprout: https://breakpoint.buzzsprout.com If you like to see more like this, please Subscribe to Breakpoint Youtube! Please Share with others in the community. It always means a lot! Follow us on LinkedIn: @breakpoint-security-podcast Audio on Buzzsprout: https://breakpoint.buzzsprout.com Buzz me on Twitter or LinkedIn Connect with me on - Twitter: @NeeluTripathy LinkedIn: @neelutripathy

    48 min
  5. S04EP03 | Dust Busters or Bots? | Dennis Giese

    6 SEPT.

    S04EP03 | Dust Busters or Bots? | Dennis Giese

    Guest:  Dennis Giese, Independent Security Researcher You've seen the headlines, heard the wild stories, and maybe even panicked about the devices in your own home. "Hackers take control of robot vacuums, yell racial slurs." It sounds insane, but what really happened? Our guest today is one of the researchers who exposed the vulnerabilities behind these shocking incidents. In this segment, we're diving deep into the world of smart home robotics and cyber-physical security. Our guest will walk us through their research into popular devices, revealing the types of vulnerabilities that often go undetected for extended periods. We'll get a first-hand account of the timeline of the incidents, clarifying what happened and why. This isn't just about the sensational headlines; it’s a critical look at how to prevent these problems, how to ensure researchers' work isn't misused for malicious purposes, and what unreleased vulnerabilities still exist. This discussion is for anyone who has ever worried about the privacy of their home in an age of constant connectivity. -- Follow us on LinkedIn: https://www.linkedin.com/company/breakpoint-security-podcast Video on YouTube: https://youtu.be/i1AvJm2wYx8 If you like to see more like this, please Subscribe to Breakpoint Youtube! Please Share with others in the community. It always means a lot! Follow us on LinkedIn: @breakpoint-security-podcast Audio on Buzzsprout: https://breakpoint.buzzsprout.com Buzz me on Twitter or LinkedIn Connect with me on - Twitter: @NeeluTripathy LinkedIn: @neelutripathy

    25 min

Bande-annonce

À propos

Breakpoint-'Exploring the depths of Defensive Security'. The defensive side of Security is a world in itself with teams achieving amazing feats that involve excellent engineering practices and smart optimisation for scale. This is not talked about enough in the industry. Join me in the br3akp0int podcast as we reflect on the methods and approaches these smart teams use to solve practical challenges in information security and innovate their way into the future. Who is this meant for? : This podcast is for anyone in InfoSec willing to know more about advances in security techniques. This includes security researchers or professionals, product owners, compliance or cloud, AI/ML, threat intel, SecOps automation, Security Leaders, development teams, pentesters and security practitioners. A bit about me: I am a technical security enthusiast and have been dabbling my hands at both offensive and defensive security. I am passionate about growing security communities and have spoken and trained at various security conferences.