Speaker engagements

Knowledge is Power. Knowledge shared is Power Multiplied - Robert Boyce
Narayana is passionate about giving back to the community through technical talks, brownbags and presentations.
2021
Zero Trust Hackathon Enablement Session
5 Oct 2021, IBM Pune lab hackathon
The objective of this talk is to explain the Zero Trust principles, frameworks defined by Forrester, CARTA and NIST,
Google's Beyond Corp and the need to embrace Zero Trust based security posture.
In this session, Narayana described Zero Trust ideas and showed details about a zero trust hackathon entry his
team submitted in a previous hackathon to enable pariticipants of the Pune Lab Hackathon.
GSkit V9 Technical Overview
1 Oct 2021, IBM Brownbag
The objective of this talk is to explain the latest features introduced in GSKit v9 release
In this session, Narayana, Michael and Leigh walk through the cool new features in an upcominng releasse.
Federating your security data searches with STIX-shifter
15-17th Nov 2021 & 16-19th Mar 2021
Australian CyberConference, AISA

With thousands of cybersecurity vendors in the market, enterprises have a huge amount of choices in solutions to acquire
to meet their growing security needs. The multitude of tools a single organisation now deploys, searches and integrates
in order to maintain a secure environment is quickly getting out of control. The Open Cybersecurity Alliance (OCA) is
building an open ecosystem for cybersecurity products to interoperate using projects like STIX-shifter.
In this session, Narayana and Dale Bowie dive into open standards based cybersecurity. Participants will learn about STIX shifter
open source project and methods to search multiple disparate data lakes with a unified query and response language.
Participants will also learn about the steps involved in developing custom integrations for their own data sources.
How patenting became a second nature of our master inventor?
29th Apr 2021, IBM APAC Podcast
In this podcast, Narayana was interviewed by Rajesh Mehta about his journey to becoming a master inventory, favorite patents, intricacies of patenting and advice for new and junior inventors.
2020
IBM Security Strategy and Cloud Pak 4 security (CP4S)
4 Dec 2020, IBM Brownbag
The objective of this talk is to explain the rationale around IBM Security's strategy and how Cloud Pak 4 Security
helps modernise security in a hybrid cloud ecosystem.
In this session, Narayana describes IBM's security strategy and educate the audience on the features of
CP4S platform instance and how to leverage the feature in the lab hackathon. Participants will learn about the available
resources, background, and objectives of the hackathon
An Open standards approach to Cyber Security
20-22 Nov 2020, Digital Defense Hackathon by HackMakers
The objective of this workshop is to educate the participants of digital defence hackathon about available open security
standards and IBM Security APIs.
In this workshop, Narayana and Chris Hockings discuss about open standards approach to security, STIX
language to share Cyber Threat Intelligence (CTI), IBM XForce Exchange threat feed for threat hunting and IBM Security
Verify for digital trust and identity APIs.
Preparing TLS for a Quantum World
22 Oct 2020, IBM Regional Technical Exchange
Quantum computers exploit quantum mechanical phenomena to solve mathematical problems that are difficult for conventional
computers. Large scale quantum computers if built can pose a threat to existing public key crypto-systems. Post Quantum
Cryptographic (PQC) algorithms are thought to be resilient to attacks using Quantum computers.
In this session, Narayana & Michael Gray walk you through the experiments around leveraging PQC algorithms in TLS 1.3 protocol
Attendees will learn about how IBM is experimenting with PQC algorithms in Transport Layer Security protocols (TLS 1.3).
Encryption - Hacker's Enemy or Ally?
15 Oct 2020, IBM Regional Technical Exchange
Once a topic only discussed by security professionals, encryption is now becoming a subject of public discourse as
citizens become more aware of the key role it plays in preserving their privacy. As security practitioners work
to improve the strength and performance of encryption algorithms, hackers using these same improvements to shield
their own actions from spying eyes.
In this session, Narayana, Dale Bowie and Matt Green discuss abouts recent
advances in encryption, how hackers are exploiting this, and the techniques being used by security analysts to protect
against these threats.
Can advances in security protocols offer safer and better user experience?
15 Oct 2020, IBM Regional Technical Exchange
TLS protocols provide a way for two parties to communicate securely designed in a way to prevent eavesdropping, tampering
and message forgery. TLS 1.3 is the latest version of transport security protocol that is simpler, secure and more
efficient than its predecessors. Companies like Netflix are adopting TLS 1.3 to bring safer and faster streaming
experiences to the living room. Do advances in security protocol always imply improved performance? Are there any
drawbacks?
In this session, Narayana and Michael Gray walk you through the key features, benefits and challenges of TLS 1.3 protocol.
Attendees will learn about latest advances in security protocols, and understand why TLS1.3 should be adopted to improve the
security and performance of software products.
Structured Threat Information Expression (STIX)
25 Sep 2020, IBM Brownbag
Structured Threat Information Expression (STIX™) is a language and serialization format used to exchange cyber threat intelligence (CTI)
In this session, Narayana walks you through the language and specification that organisations use to collaborate and
share cyber threat intelligence (CTI) collected from a multitude of disparate tools from multiple vendors.
Attendees will learn about the various threat intelligence terminology, domain objects, relationships, cyber observables and visualisations.
2019
Govhack My City and Hackathon tips
5 Nov 2019, IBM Brownbag
GovHack is an yearly hackathon focussed on open data sets.
In this session, Narayana walks through the solution that was presented at govhack, tips and techniques around
hackathon, how to participate and details about upcoming hackathons.