Monish Alur Gowdru
cybermeow
The Chaining of Vulnerabilities session is essential for anyone serious about understanding real-world security threats. Attackers rarely rely on a single flaw - instead, attackers combine multiple low or medium-risk issues to breach systems and exfiltrate data. This session will reveal how these chains are built, and how overlooked weaknesses can lead to full system compromise. With practical case studies, attack flow breakdowns, and defense strategies, you’ll gain critical insight into offensive thinking and how to build more resilient systems. Whether you're a developer, security engineer, or red teamer, this session will sharpen your knowledge about how subtle flaws can be linked into powerful exploit chains.
Monish Alur Gowdru
Security Consultant, Black Duck
Monish Alur Gowdru is dedicated to securing applications end-to-end, with over 5 years of experience in application security, software development, and secure code review. His passion for finding security gaps in applications sparked a deeper interest in learning to build applications, driving him to build the skills needed to secure systems from the ground up. This journey led him to earn a Master’s degree in Computer Science with a specialization in Information Assurance, along with hands-on experience as a Software Engineer. While this is his first time speaking at a conference, he’s an active contributor to local security communities and a mentor to those starting their careers in the field.
LinkedIn: https://www.linkedin.com/in/ag-monish/ Email Address: monish.alurgowdru@gmail.com
cybermeow
Security Engineer at Amazon
Meet Apoorwa Joshi – Security Engineer, Code Whisperer & Threat Tamer at Amazon. With over 6 years in the trenches of application and cloud security at scale, she currently brings her talents to helping teams think like attackers before the attackers do. Armed with a Master’s degree, a knack for demystifying technical complexity, Apoorwa specializes in "shifting left" Based in Austin, Texas, Apoorwa is part of a new wave of security professionals. Though this is her first time on the conference stage, she’s no stranger to leading conversations that matter from mentoring junior engineers to influencing cross-team architecture decisions. When she’s not taming threats or refactoring risk, she enjoys playing ping pong and spending time with her cat.
Ask her about: threat modeling, secure architecture, DevSecOps, or how to sneak security into sprint planning without getting side-eyes.