- 
            
  
    Kaarana  Critiques of Aadhaar: what critics see and oversee. Conversation with Reetika Khera, Associate Professor at IIM-AhmedabadHasGeek House, Bangalore
- 
            
  
    MediaNamaMWorkshop: India’s Personal Data Protection Bill: Understand what the Personal Data Protection Bill means for your company and usersHotel Royal Orchid, Domlur, Bangalore
- 
            
  
    Book Club  The Art of Conjuring Alternate Realities The Art of Conjuring Alternate Realities: Politics and Society GenreOnline
- 
            
  
    FragmentsKotlin will displace Java in the Android ecosystem. Survey report on the adoption of Kotlin for Android.Online
- 
            
  
    RootconfRootconf 2019: On infrastructure security, DevOps and distributed systems.NIMHANS Convention Centre, Bangalore
- 
            
  
    Fragments  Securely building apps Securely building apps: How to avoid being affected by solar windsOnline
- 
            
  
    IN/ClojureIIN/Clojure 2020: India's annual Clojure and ClojureScript conference. 14th-15th Feb, 2020. Pune, MH, IN.Novotel Pune Nagar Road, Crimson Hall, Pune
- 
            
  
    Privacy ModePrivacy practices in the Indian technology ecosystem: A 2020 survey of the makers of products and servicesOnline
- 
            
  
    RootconfScalable Data Privacy Engineering: Balancing scale, with privacy and utility is doable.Online
- 
            
  
    Rootconf  Why Data breaches happen and What can we do about it Why Data breaches happen and What can we do about it: Hygiene is hard but limits lasting damageOnline
- 
            
  
    RootconfData Privacy Conference: On building privacy in engineering and product processes.Online
- 
            
  
    Privacy ModePrivacy Mode fellowship programme: Documenting privacy best practices in industryOnline
- 
            
  
    Cashless Consumer  Learning from Payment data breaches Learning from Payment data breaches: As consumers, merchants, fintechs, banks, regulators - payment data breaches has lessons for all of us on how we mitigate / live with them and minimise impact.Online
- 
            
  
    One VoteOne Vote Annual Conference: A conference on technological interventions in electionsOnline
- 
            
  
    RootconfPrivacy as Risk Assessment and Risk Mitigation: Learn how to design organizations that manage riskOnline
- 
            
  
    The Fifth ElephantThe Fifth Elephant 2018: The seventh edition of India's best data conferenceNIMHANS Convention Centre, Bengaluru
- 
            
  
    The Fifth Elephant![Security, Verifiability and the Business of Information Infrastructures]()  Security, Verifiability and the Business of Information Infrastructures: A series about the application of consent and crypto-based principlesOnline
- 
            
  
    Privacy ModeData Brokers and Consequences for Personal Data: Privacy regulations and implementationsOnline
- 
            
  
    MediaNamaMWorkshop: India’s Personal Data Protection Bill: Understand what the Personal Data Protection Bill means for your company and usersThe Claridges (Viceregal Hall), New Delhi
- 
            
  
    RootconfDetecting anomalous network patterns: Using anomaly patterns for improved data security, network monitoring and observability.Online
 
          
        