Past Sessions

Mobile App Attacks, By Example
Presenting Abraham Aranguren (7ASecurity) โ giving his first ever training in the subcontinent. Trainings provided by him have helped thousands of students enhance their skillset. He enlightened participants with real-world examples on Practical Mobile App Attacks.

Cyber Forensics
Cyber forensics mainly focuses on analyzing encrypted data, recovering records and investigating possible security breaches. Learn the ins & outs of the topic from Mr. Sankarraj Subramanian and equip yourself with an unparalleled skillset.

Buffer Overflows
Buffer Overflow occurs when data exceeds the storage capacity of a buffer, potentially corrupting or crashing the system. Join this extensive learning session by Mr. Sanjeev Multani and develop your expertise on this critical vulnerability class.
Call
For
Trainers
Got knowledge worth sharing? CIACON gives you the stage. Join a community of practitioners who are shaping the next generation of cybersecurity professionals โ one session at a time.
Upcoming Sessions
Details will be revealed soon. Stay tuned.
Trainer Name
Security Researcher
[ Advanced Red Team Operations ]
A comprehensive deep-dive into modern red team tactics, adversary simulation, and real-world attack chain construction. Participants will gain hands-on experience with tools and techniques used by elite offensive security teams.
Trainer Name
Malware Analyst
[ Malware Analysis & Reverse Engineering ]
Learn to dissect, analyze, and understand modern malware from static and dynamic perspectives. Covers everything from basic disassembly to advanced unpacking and behavioral analysis in controlled lab environments.
Our Training Ethos
Across all sessions, one principle remains constant: industry-ready security comes from learning directly from practitioners who operate at the front lines.
Our trainers are not career lecturersโthey are builders, investigators, and attackers who bring real-world context into every session. This is how we ensure our conferences and trainings continue to deliver practical, relevant, and future-proof cybersecurity education.


