

Antara Mane
SecureNexus Vertical Lead
Mumbai, India
Actions
Antara is a dedicated cybersecurity professional with extensive expertise in Governance, Risk, and Compliance (GRC), ASM, CSPM, SCA, Threat Intelligence, Threat Modeling, and Profiling, Infrastructure Security, Cloud Security, Azure DevOps, Secure Code Review, Web Application Security, and Code-Assisted Penetration Testing. As a seasoned Pen-Tester, Red Teamer, Trainer, Speaker, and Researcher, Antara leads a proficient team of 17+ professionals, fostering a culture of continuous learning. She has deep experience in Vulnerability Assessments and Penetration Testing (VAPT) across web, network, cloud, and mobile applications, ensuring robust security measures. Her expertise spans system and network security, log analysis, intrusion detection technologies, risk-based security management and a deep understanding of TCP/IP, firewalls, routers, and network protocols. Beyond technical skills, Antara has a strong knowledge
of Cyber Law, Data Privacy, and Compliance with frameworks like ISO 27001:2013, PCI DSS, HIPAA,
FFIEC, NIST, SOX, and SOC reporting with significant experience in managing risks and compliance in areas
of Data Privacy, Cyber Maturity, IT Internal Audit, and Vendor Risk Assessment. She is well-versed in
Infrastructure Security best practices, ensuring compliance and risk mitigation strategies align with
industry standards. Antara champions continuously learn and foster a culture of knowledge enrichment
among her team members. Adaptable to emerging technologies, Antara possesses a keen aptitude for
learning and remains abreast of the latest advancements in her field. Antara's exceptional
communication, decision-making, and critical thinking skills are complemented by her firm belief in the value
of her creative talents as a valuable asset to any organization.
Area of Expertise
Topics
Attack Surface Monitoring - Safeguarding Digital Landscapes via AI
This session presents the importance and methods of attack surface monitoring in modern cybersecurity. It defines attack surfaces as potential entry points for unauthorized access and explores monitoring tools like vulnerability scanners and threat intelligence feeds. Emphasizing the need for real-time visibility and automation, the paper underscores the benefits of proactive monitoring for threat detection and incident response. It concludes by advocating for the integration of attack surface monitoring into comprehensive cybersecurity strategies to effectively mitigate risks.
Autonomous Attack Surface Mapper & Risk Hardener: Explainable AI for Cyber Resilience
Today’s enterprise environments are complex, dynamic, and under constant threat. The attack surface expands every hour as new cloud services, containers, APIs, remote devices, and user accounts come online. Most security tools still rely on fragmented visibility, static scans, and noisy alert systems.
This session introduces an AI-powered platform that reimagines security using real-time telemetry, threat intelligence, and explainable AI. The platform continuously maps your live attack surface, analyzes risks using continuously updated threat feeds, and self-hardens your environment based on clear, explainable priorities.
Think of it as Google Maps + Waze + AutoPilot — but for cybersecurity.
Slide 1: Title Slide
Title: Autonomous Attack Surface Mapper & Risk Hardener
Subtitle: With Explainable Threat Intelligence
Slide 2: The Modern Enterprise Threat Landscape
- Dynamic environments (Cloud, APIs, Containers)
- Siloed visibility, alert fatigue, manual remediation
Slide 3: Real-World Analogy
- The chaotic smart city vs security chaos
- 50 alarms ringing, no context
Slide 4: Our Solution Overview
- Autonomous Mapper + Explainable Risk Engine + Auto Hardener
- Built for dynamic infra, not static scans
Slide 5: Architecture Diagram
- Live telemetry, threat ingestion, explainable ML, remediation loop
Slide 6: Use Case Walkthrough
- Cloud exposure fix
- Identity-based risk remediation
Slide 7: Results
- Faster MTTD/MTTR
- Reduced analyst fatigue
- Compliance-ready audit logs
Slide 8: Blockchain Integration (Optional)
- Immutable logs for risk/fix validation
- Threat intel consensus & provenance
Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.
Jump to top