CyStar

Add Your Heading Text Here

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Filter by Categories
Article
Bootcamp
Ceremony
Hackathon
School
Workshop
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Filter by Categories
Article
Bootcamp
Ceremony
Hackathon
School
Workshop

IITM Cyber Netrik

Offensive Strategies for Defensive Readiness!
Cybersecurity Training for Banking CISOs, CIOs, CTOs and their teams, SOC members, and security practitioners to secure cloud and hybrid environments

In today’s evolving threat landscape, passwords, policies, and passive tools are no longer enough. Cyberattacks are increasingly exploiting cloud identities, automation pipelines, endpoint misconfigurations, and hybrid environments – with devastating consequences.

The Cyber Netrik by IIT Madras is a hands-on, immersive training program designed for senior technology and security leaders in the Banking sector. This is not a classroom lecture – it’s a live-fire simulation environment where you’ll walk through the attacker’s playbook to strengthen your own defense.

Program Structure

Track 1: Practitioners & Technical Teams

For: Security engineers, analysts, SOC teams, red and blue teamers.
What you’ll do:
  • Step into real-world attack simulations with guided offensive & defensive labs.
  • Use industry-grade tools to simulate, detect & respond to threats like Kerberoasting, IAM abuse, token replay, S3 misconfigurations.
  • Learn to think like an attacker, and stop them in their tracks.
Program Length: 2 Day
Program Cost:
  • Hosted at IIT Madras: ₹1,00,000 /-
  • Hosted outside IIT Madras: ₹1,10,000 /-

Track 2: Leadership & Strategic Roles

For: CISOs, CTOs, CIOs, security managers, team leads, and decision-makers.
What you’ll do:
  • Walk through live attack flows with a decision-maker’s lens.
  • Interpret key threat signals from detection dashboards to assess risk in real-time.
  • Prioritize responses, coordinate across teams, and understand business-level impact.
Program Length: 1 Day
Program Cost:
  • Hosted at IIT Madras: ₹70,000 /-
  • Hosted outside IIT Madras: ₹75,000 /-

Program Curriculum

Identity & Credential Threats in Enterprise Environments (Cloud & On-prem)

Abusing Cloud Automation & Platform Services

Endpoint and Enterprise Device Exploitation

Hybrid Identity & Active Directory Attacks

Multi-Factor Authentication Bypass Techniques

Cross-Cloud Attack Paths and Token Replay Techniques

Full Attack Chain Simulation in Azure

Threat Detection and Hunting Across Cloud Platforms

Web Application Vulnerabilities Enabling Cloud Exploits

IAM Role Misuse and Privilege Escalation in AWS

Red Team vs Blue Team Exercise

Hardening and Security Best Practices

Note: The modules listed are indicative and may vary based on time constraints and participant profiles. Facilitators will strive to ensure a high-impact learning experience tailored to the cohort, but may not cover every listed scenario in every session. Modules will be selected to best match the cohort’s background, expertise, and interests and maximize practical learning.

Program Schedule

Track 1 (2-day program)

Practitioners & Technical Teams

Day 1 Day 2
10:00 – 10:30
Welcome & Opening Remarks
09:00 – 10:15
Morning Session I
10:30 – 11:30
Morning Session I
10:15 – 11:30
Morning Session II
11:30 – 11:45
Tea Break
11:30 – 11:45
Tea Break
11:45 – 13:00
Morning Session II
11:45 – 13:00
Morning Session III
13:00 – 14:00
Lunch Break
13:00 – 14:00
Lunch Break
14:00 – 15:30
Afternoon Session I
14:00 – 15:30
Afternoon Session I
15:30 – 15:45
Tea Break
15:30 – 15:45
Tea Break
15:45 – 17:15
Afternoon Session II
15:45 – 17:30
Afternoon Session II
17:15 – 18:00
Q&A
17:30 – 18:00
Feedback & Wrap-Up

Track 2 (1-day program)

Leadership & Strategic Roles

Day 1
10:00 – 10:30
Welcome & Opening Remarks
10:30 – 11:30
Morning Session I
11:30 – 11:45
Tea Break
11:45 – 13:00
Morning Session II
13:00 – 14:00
Lunch Break
14:00 – 15:30
Afternoon Session I
15:30 – 15:45
Tea Break
15:45 – 17:00
Afternoon Session II
17:00 – 17:30
Leadership Roundtable & Wrap-Up

Why Participate?

  • Curated at IIT Madras: Designed using insights from real-world red team operations and cutting-edge cloud security research.
  • Focused on Critical Threats: Emphasizes high-impact, financially motivated attack vectors with special relevance to the banking and financial sector.
  • Two Tracks, One Goal: Whether you are a decision-maker (CISO, CIO, CTO, security manager) or a hands-on practitioner (SOC member, security engineer, red/blue teamer), the program equips you with the right skills and perspectives.
  • Leadership & Technical Depth: Leaders gain the ability to interpret threats, assess business risk, and coordinate responses, while technical teams immerse in realistic attack-defense scenarios using industry-grade tools.
  • Future-Ready Skills: Stay ahead of adversaries by understanding attacker tradecraft and building robust detection and defense strategies across both cloud and on-premise environments.

Requirements and Prerequisites

IIT Madras will provide access to a secure, cloud-hosted Cyber Range environment, including backend infrastructure, guided lab scenarios, and real-world attack simulations.

Participants are required to bring the following:

  • A personal laptop (latest version preferred)
  • Administrative privileges on the device (to allow installation of VPN and any required tools or configurations)
  • Basic familiarity with Windows and Linux environments
  • Mode: Comfort using the command line interface (CLI) on both platforms
  • Google Chrome or Microsoft Edge browser installed
There are no strict prerequisites for this workshop. It is designed for professionals across roles – CISOs, CIOs, CTOs and their teams, SOC members, and security practitioners – in cybersecurity, IT, and risk within the Banking sector. Whether you’re technical or strategic, if you work with digital systems and care about securing them, you’re in the right place.

All you need is an open mind, curiosity, and a willingness to learn and engage with real-world challenges. The hands-on exercises are guided, and no prior offensive security experience is required.

Registration

This is a limited-capacity cohort curated exclusively for leaders and professionals in the banking and financial sector.
  • Track 1 (Practitioners & Technical Teams): November 14 & 15, 2025
    Registration Deadline: November 12, 2025 11:59 PM
  • Track 2 (Leadership & Strategic Roles): December 13, 2025
    Registration Deadline: December 11, 2025 11:59 PM

Both workshops will be held in BKC, Mumbai.
Participants may register through the link below and select their preferred track during the registration process.

Registration will be confirmed via email notification once the program fee is received.

Glimpses from the Inaugural Program

The first Cyber Netrik cohort was successfully hosted at IIT Madras on July 18 & 19, 2025, under the ISEA initiative of MeitY, Government of India and sponsored by IDBI Bank.

A curated group of 15 cybersecurity leaders and practitioners from the Banking sector participated in live-fire simulations, tackling scenarios such as identity exploits, MFA bypass, cloud exploitation, and Red vs Blue Team challenges. The format enabled practical skill-building, peer-to-peer exchange, and leadership-level discussions on SOC operations, regulatory challenges, and threat intelligence integration.

Participating Banks:

The program received positive feedback, with participants praising its real-world relevance, high-fidelity lab environment, and expert-led guidance.
Encouraged by this success, IIT Madras is expanding Cyber Netrik to reach a wider set of leaders and practitioners across the financial sector.

Contact Us

For any questions or clarifications, feel free to reach out to us at info@cystar.iitm.ac.in
Follow us for updates and announcements:

Sponsors

IDBI Bank

Information Security Education and Awareness

MeitY

Scroll to Top