Speaker

Shivam Mittal

Shivam Mittal

Digisuraksha of all digital ecosystem

Sonīpat, India

Actions

Hi, I'm Shivam Mittal, a passionate cybersecurity analyst and orange teamer dedicated to ethical hacking and digital security. With hands-on experience in digital forensics, offensive penetration testing, malware analysis, and threat intelligence, I specialize in protecting systems and uncovering vulnerabilities.

I hold certifications like Certified Network Security Practitioner (CNSP), CompTIA Pentest+ and so on

Area of Expertise

  • Arts
  • Information & Communications Technology

Topics

  • Ethical Hacking - OSINT (Open-Source Intelligence) - Threat Hunting - Rubber Ducky - Car Hacking

AI/ML PENTESTING & DEVLOPMENT

I am Shivam Mittal, a cybersecurity analyst and orange teamer specializing in ethical hacking, vulnerability management, web penetration testing, and digital forensics. I have experience working with law enforcement, including an internship at the Gurugram Cyber Police, and I am deeply involved in open-source intelligence (OSINT), threat intelligence, and malware analysis.

I hold multiple cybersecurity certifications, including CNSP, CompTIA Pentest+, Certified Ethical Hacker, SOC Level 1 (TryHackMe), and various EC-Council certifications. I actively participate in Capture The Flag (CTF) challenges and enjoy working on network programming with Python sockets. My work also focuses on ransomware case studies and deepfake detection.

I have engaged in public speaking at Null Ahmedabad, Null Delhi, and IB PG College, sharing insights on cybersecurity trends, incident response, and ethical hacking. Additionally, I am working on diplomatic-style interview questions for CCNA and cybersecurity, aimed at testing critical thinking and communication skills.

I run a Medium blog, where I publish cybersecurity case studies, and manage a YouTube channel, "Digisuraksha Parhari Foundation," which focuses on hacking, VAPT, forensics, and CTFs.

AI/ML OWASP Top 10

The Top 10 AI/ML OWASP vulnerabilities are a list of known vulnerabilities that attackers exploit to breach systems and networks using Artificial Intelligence (AI) or Machine Learning (ML). These vulnerabilities are publicly available and are classified by OWASP (One Way Security Project), a security research organization.

Kubernet Security

Kubernet Security and then latest bugs

Introduction
Understanding Kubernetes Architecture
The Hacker's Toolkit
Attack Surface in Kubernetes
Common Vulnerabilities
Hacker’s Approach to Kubernetes Reconnaissance
Exploitation Techniques
Lateral Movement and Persistence
Defensive Evasion Techniques
Post-Exploitation and Data Exfiltration
Defensive Measures for Ethical Hackers
Future Trends in Kubernetes Security
Resources for Further Learning
Conclusion

Shivam Mittal

Digisuraksha of all digital ecosystem

Sonīpat, India

Actions

Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.

Jump to top