<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Puneetm</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Puneetm"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Puneetm"/>
		<updated>2026-05-24T23:19:49Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SecurityByte_and_OWASP_Asia_AppSec_Conference_2009&amp;diff=73714</id>
		<title>SecurityByte and OWASP Asia AppSec Conference 2009</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SecurityByte_and_OWASP_Asia_AppSec_Conference_2009&amp;diff=73714"/>
				<updated>2009-11-19T07:24:11Z</updated>
		
		<summary type="html">&lt;p&gt;Puneetm: /* Two Days Conference */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:SB OWASP 2009 banner.gif|center|link=http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009]]&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza] &amp;amp;#124; [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Registrations]&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*&amp;lt;b&amp;gt;Only One Week Left ! Register Online today to grab your seat for India's best Security Conference.&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;Honorable Former President of India, Dr. A.P.J Abdul Kalam to Inaugrate the India Technology Leadership Summit 2009. &amp;lt;/b&amp;gt;This event is an Invitation ONLY event.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Registrations Click Here]''' for more information.&lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
Securitybyte &amp;amp;amp; OWASP are proud to welcome you to the annual international information security conference – Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009, Nov 17th through Nov 20th in Delhi &amp;amp;amp; NCR, India. &lt;br /&gt;
&lt;br /&gt;
This is a landmark event, as both Securitybyte and OWASP join hands to present India’s largest InfoSec event with world renowned and most regarded international speakers. &lt;br /&gt;
&lt;br /&gt;
Securitybye &amp;amp;amp; OWASP AppSec Asia Conference 2009 will be held at [http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza, Gurgaon, NCR, India.] on 17th November through 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Security Researchers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Penetration Testers &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*IT Security Professionals &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
&lt;br /&gt;
==== About  ====&lt;br /&gt;
&lt;br /&gt;
== About Conference  ==&lt;br /&gt;
&lt;br /&gt;
Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel conference talks to be conducted in 3 separate halls for two days i.e . 17th &amp;amp;amp; 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular talk. Conference talks are being delivered by world renowned and most regarded speakers from around the world. &lt;br /&gt;
&lt;br /&gt;
== About Trainings  ==&lt;br /&gt;
&lt;br /&gt;
Two days post-conference are dedicated towards best-of-breed trainings being conducted in association with SANS, ISC2 and other organizations. Trainings tracks have been made available as One-Day tracks and Two-Day tracks scheduled for 19th &amp;amp;amp; 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
==== Registrations  ====&lt;br /&gt;
&lt;br /&gt;
== [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Registration] is now open!  ==&lt;br /&gt;
&lt;br /&gt;
=== You can register [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 here]  ===&lt;br /&gt;
&lt;br /&gt;
*[http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Click Here] for Online Registrations. &lt;br /&gt;
*[http://securitybyte.org/index.php/register.html Click Here] for Offline Registrations.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Please check out our Exclusive Discount Offer, available Starting October 6th - 15th, 2009. &amp;quot;SAVE BIG NOW !&amp;quot;&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''''The below pricing reflects the Standard Registration Prices .''''' &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Two Days of Conference (17th and 18th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.8,500/- INR &lt;br /&gt;
| General Public&lt;br /&gt;
|-&lt;br /&gt;
| Two Days of Conference (17th and 18th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.5,000/- INR &lt;br /&gt;
| Students&lt;br /&gt;
|-&lt;br /&gt;
| Two-Day Training Tracks (19th and 20th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.25,000/- INR&lt;br /&gt;
|-&lt;br /&gt;
| One-Day Training Tracks (19th OR 20th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.12,500/- INR&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;** Service Tax @ 10.3% will be charged extra.&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;ISC2&amp;lt;/b&amp;gt; Members can avail a Special 15% discount on Conference &amp;amp; Training Registration.&lt;br /&gt;
(Please provide your ISC2 Certification ID number to avail the above Discount)&lt;br /&gt;
For Registrations contact us at registrations@securitybyte.org&lt;br /&gt;
== Exclusive Offers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;- Group / Team Discounts available: Kindly contact us at registrations@securitybyte.org&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Special University Student discount&amp;lt;/b&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
- University Students can register for two days of conference for just Rs. 5000 (including taxes)&amp;lt;br&amp;gt;&lt;br /&gt;
- Special 15 % Discounts for Training registration&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Trainings Click here for details on the training courses that are available.]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Who Should Attend Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009: ==&lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Security Researchers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Penetration Testers &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*IT Security Professionals &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;For student discount, attendees must present proof of enrollment when picking up your badge. &lt;br /&gt;
&lt;br /&gt;
==== Schedule  ====&lt;br /&gt;
&lt;br /&gt;
Three parallel conference talks are scheduled for 17th &amp;amp;amp; 18th November 2009 in three different halls. Training tracks have been divided in one-day tracks scheduled for 19th or 20th November 2009 and two-day tracks those are schedule to continue for two days both on 19th &amp;amp;amp; 20th November 2009. Follow the tabs to learn the details on both conference and trainings. &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Conference Click here] to view the '''Conference Schedule''' for 17th &amp;amp;amp; 18th November 2009.&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Trainings Click here] to view '''Training Schedule''' on 19th &amp;amp;amp; 20th November 2009.&lt;br /&gt;
&lt;br /&gt;
==== Conference  ====&lt;br /&gt;
&lt;br /&gt;
== Two Days Conference  ==&lt;br /&gt;
&amp;lt;p&amp;gt;&amp;lt;font face=&amp;quot;Arial&amp;quot; size=&amp;quot;2&amp;quot;&amp;gt;Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel training sessions to be conducted in 3 separate halls for two days i.e . 17th &amp;amp;amp; 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular session. Conference talks are being delivered by world renowned and most regarded speakers from around the world. Below is the conference schedule listing confirmed speakers and talks. Couple of talks are under review by the CFP (Call For Papers) Committee and shall be available as soon as those are confirmed. Event also follows two days of InfoSec trainings to be delivered in association with SANS, ISC2 and other organizations.&amp;lt;/font&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&amp;amp;nbsp;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;table border=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot; style=&amp;quot;border-collapse:&lt;br /&gt;
 collapse;width:100%&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;23&amp;quot; style=&amp;quot;height:17.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;23&amp;quot; style=&amp;quot;height: 17.25pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Where &amp;amp;gt;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 309px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #333399&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 1&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 318px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #3366FF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 2&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 333px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #00CCFF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 3:&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;19&amp;quot; style=&amp;quot;height:14.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;19&amp;quot; style=&amp;quot;height: 14.25pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Who &amp;amp;gt;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 309px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #333399&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Security Researchers &amp;amp;amp; Enthusiasts)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 318px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #3366FF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Security Auditors, Developers, QA, Architects)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 333px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #00CCFF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Leaders, Managers, C&amp;amp;amp;S professionals)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Schedule&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;10&amp;quot; height=&amp;quot;285&amp;quot; width=&amp;quot;24&amp;quot; style=&amp;quot;height: 213.75pt; width: 18pt; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid black; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&lt;br /&gt;
http://www.owasp.org/images/5/59/Day1.gif&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;9:00AM&amp;amp;nbsp;&amp;amp;nbsp; - 10:30AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #DBE5F1&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Keynote Sessions&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;10:30AM - 11:00AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C5BE97&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Tea break &amp;amp;amp; Snacks on Exhibition Floor&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;11:00AM - 12:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		Active Man in the Middle&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Adi Sharabani, IBM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;How To Blackbox Test Almost Anything&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Aviram Jenik, Beyond Security&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;The International State of Cyber Security, Risk &lt;br /&gt;
		reduction in a high threat world&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Howard A. Schmidt, Former Cyber Security Advisor to &lt;br /&gt;
		the White house&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;12:00PM - 1:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Reconsidering Network Defenses or NOT !&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Cedric Blancher, EADS Innovation Works&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Lust 2.0 – Desire for free WiFi and the threat of the &lt;br /&gt;
		Imposter&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Lava Kumar Kuppan, Independent Security Researcher&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Applications - The new cyber security frontier&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Mano Paul, Software Assurance Advisor (ISC)2&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;1:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 2:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FAC090&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Lunch&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;2:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 3:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Exploiting Firefox Extensions&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Roberto Suggi Liverani, Security-Assessment.com&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Threat Modeling&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Varun Sharma, Microsoft Corp.&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Behind the scenes at the Microsoft Security Response &lt;br /&gt;
		Center&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Dave Midturi and Suresh Venkateswaran, Microsoft &lt;br /&gt;
		Security Response Center&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;3:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 4:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;SQL Server Forensics 2.0&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Kevvie Fowler, TELUS &amp;amp;amp; Ringzero&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Nitin Kumar/Vipin Kumar, Independent Security &lt;br /&gt;
		Researchers, Nvlabs&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Business Case-Risk Management/Compliance at leading &lt;br /&gt;
		Education Group at AMITY&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Dr J.S Sodhi, AMITY&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;4:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 4:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Business Continuity Case Study&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Venkataram Arabolu, BSI&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Usability and Privacy in Security&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Ponnurangam Kumaraguru, IIIT&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;4:30 PM&amp;amp;nbsp;&amp;amp;nbsp; - 5:30 PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C5BE97&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Tea break &amp;amp;amp; Snacks on Exhibition Floor&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;15&amp;quot; style=&amp;quot;height:11.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;15&amp;quot; style=&amp;quot;height: 11.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;7:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 10:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #DBE5F1&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;India Technology Leadership Summit 2009 (Exclusive by invitation only) -&amp;amp;quot; Information Security Concerns for Offshoring&amp;amp;quot;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;8&amp;quot; style=&amp;quot;height: 6.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;10&amp;quot; height=&amp;quot;8&amp;quot; style=&amp;quot;height: 6.0pt; width: 1070px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: white&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;23&amp;quot; style=&amp;quot;height:17.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;23&amp;quot; style=&amp;quot;height: 17.25pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Where &amp;amp;gt;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 309px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #333399&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 1&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 318px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #3366FF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 2&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 333px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #00CCFF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 3:&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;19&amp;quot; style=&amp;quot;height:14.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;19&amp;quot; style=&amp;quot;height: 14.25pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Who &amp;amp;gt;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 309px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #333399&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Security Researchers &amp;amp;amp; Enthusiasts)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 318px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #3366FF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Security Auditors, Developers, QA, Architects)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 333px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #00CCFF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Leaders, Managers, C&amp;amp;amp;S professionals)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Schedule&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;10&amp;quot; height=&amp;quot;257&amp;quot; width=&amp;quot;24&amp;quot; style=&amp;quot;height: 192.75pt; width: 18pt; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&lt;br /&gt;
		http://www.owasp.org/images/7/73/Day2.gif&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;9:00AM&amp;amp;nbsp;&amp;amp;nbsp; - 10:00AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #DBE5F1&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Round Table with Speakers / Industry Panel - &amp;amp;quot;Security Today &amp;amp;amp; Tomorrow'&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;10:00AM - 10:30AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C5BE97&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Tea break &amp;amp;amp; Snacks on Exhibition Floor&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;32&amp;quot; style=&amp;quot;height:24.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;32&amp;quot; style=&amp;quot;height: 24.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;10:30AM - 11:30AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Ten Things Web Developers Still Aren't Doing&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Frank Kim, ThinkSec Consulting&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;SANS Dshield Webhoneypot Project&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Jason Lam, Independent Security Researcher&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Critical Infrastructure Security “Danger Without &lt;br /&gt;
		borders”&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;John Bumgarner, US Cyber Consequence Unit (USCCU)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;32&amp;quot; style=&amp;quot;height:24.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;32&amp;quot; style=&amp;quot;height: 24.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;11:30AM - 12:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Cloud Hacking – Distributed Attack &amp;amp;amp; Exploit Platform&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Shreeraj Shah, Blueinfy Solutions&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Testing JSON Applications For Security Holes&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Aviram Jenik, Beyond Security&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Critical Infrastructure Security “Danger Without &lt;br /&gt;
		borders”&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;John Bumgarner, US Cyber Consequence Unit (USCCU)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;12:30PM&amp;amp;nbsp; - 1:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FAC090&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Lunch&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;1:30PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 2:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;All Your Packets Belong to Us - Attacking Backbone &lt;br /&gt;
		Technologies&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Daniel Mende, Security Researcher, ERNW&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Risk based Penetration Testing&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;K. K. Mookhey, Founder &amp;amp;amp; Principal Consultant, NII &lt;br /&gt;
		Consulting&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Wi-Fi security: the good, the bad and the ugly&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Cedric Blancher, EADS Innovation Works&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;32&amp;quot; style=&amp;quot;height:24.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;32&amp;quot; style=&amp;quot;height: 24.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;2:30PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 3:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Xprobe3 - What's New? Going Application Level&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Fyodor Yarochkin, Armorize&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;OWASP SAMM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Pravir Chandra, OWASP&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Do you wanna Play a Game Game theory and Cyberwar&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Bryan K. Fite, HackSecKlahn&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;3:30PM-4:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C5BE97&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Tea break &amp;amp;amp; Snacks on Exhibition Floor&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;32&amp;quot; style=&amp;quot;height:24.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;32&amp;quot; style=&amp;quot;height: 24.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;4:00 PM&amp;amp;nbsp;&amp;amp;nbsp; - 5:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Rumbling Infections – Web Malware Ontology&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Aditya K. Sood, COSEINC&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;Hacking Oracle From Web&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Sid, Independent Security Researcher&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Connected Information Security Framework&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Anil Kumar Chintala, Microsoft&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;5:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 5:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #DBE5F1&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Closing Remarks by Organizing Committee&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Trainings  ====&lt;br /&gt;
&lt;br /&gt;
== Two Day Trainings  ==&lt;br /&gt;
&lt;br /&gt;
Two days post-conference are dedicated towards best-of-breed trainings being conducted in association with SANS, ISC2 and other organizations. Trainings tracks have been made available as One-Day tracks and Two-Day tracks scheduled for 19th &amp;amp;amp; 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 1 - 19th Nov, 2009'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 2 - 20th Nov, 2009'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course ID''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course Duration''' &lt;br /&gt;
(# of Days) &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course Title''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Instructor''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course ID''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course Duration''' &lt;br /&gt;
(# of Days) &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course Title''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Instructor'''&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;30&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''One Day Training Tracks'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DHSO''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Oracle_Hacking_and_security ORACLE Hacking &amp;amp;amp; Security]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Sumit Sidharth,[[Image:Sb logo.png|center|78x50px|link=http://www.securitybyte.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DAWH''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Advanced_Web_Hacking Advanced Web Hacking -Securing AJAX, RIA &amp;amp;amp; SOA]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Shreeraj Shah [[Image:Blueinfy logo.png|center|link=http://www.blueinfy.com]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DAFT'''&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Advanced_Forensic_Techniques Advanced Forensics Techniques]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Dr. Chandrasekhar Umapathy,[[Image:Sb logo.png|center|78x50px|link=http://www.securitybyte.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DIAT'''&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/InDepth_Assessment_Techniques In-depth Assessment Techniques: Design, Code, and Runtime]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Fydor Yarochkin, &lt;br /&gt;
&lt;br /&gt;
[[Image:Logo_Armorize.JPG‎|center|93x31px|link=http://www.armorize.com]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;30&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Two Day Training Tracks'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DNST''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Building_Advanced_Network_Security_tools Building advanced Network Security Tools]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Daniel Mende,[[Image:Ernw logo.png|center]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DNST''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Building_Advanced_Network_Security_tools Building advanced Network Security Tools]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Daniel Mende,[[Image:Ernw logo.png|center]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DCBC''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/ISC2_CSSLP_CBK_Bootcamp (ISC)2 CSSLP CBK Boot camp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Mano Paul,[[Image:Isc logo.png|center|78x50px|link=http://www.isc2.org]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DCBC''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/ISC2_CSSLP_CBK_Bootcamp (ISC)2 CSSLP CBK Boot camp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Mano Paul,[[Image:Isc logo.png|center|78x50px|link=http://www.isc2.org]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSCJ / SANS Course ID&amp;amp;nbsp;: DEV530''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_Essential_Secure_Coding_Java_JEE_GSSP Essential Secure Coding in Java / JEE]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSCJ / SANS Course ID&amp;amp;nbsp;: DEV530''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_Essential_Secure_Coding_Java_JEE_GSSP Essential Secure Coding in Java / JEE]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DWPT / SANS Course ID&amp;amp;nbsp;: DEV538''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_WebApp_Pentesting_handsOn_immersion Web Application Pen Testing Hands-On Immersion]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DWPT / SANS Course ID&amp;amp;nbsp;: DEV538''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_WebApp_Pentesting_handsOn_immersion Web Application Pen Testing Hands-On Immersion]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSAB / SANS Course ID&amp;amp;nbsp;: AUD429''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_IT_Security_Audit_Bootcamp IT Security Audit Essentials Bootcamp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSAB / SANS Course ID&amp;amp;nbsp;: AUD429''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_IT_Security_Audit_Bootcamp IT Security Audit Essentials Bootcamp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Venue  ====&lt;br /&gt;
&lt;br /&gt;
Four Days Event is planned out at: &lt;br /&gt;
&lt;br /&gt;
[http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza,]&amp;lt;br&amp;gt;Site - 2, Sector - 29, &amp;lt;br&amp;gt;Gurgaon-122001 (National Capital Region), India&amp;lt;br&amp;gt;Hotel Front Desk: 91-124-4534000&amp;lt;br&amp;gt;Hotel Fax: 91-124-4304800&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
http://www.owasp.org/images/e/e2/Sponsor1.JPG&lt;br /&gt;
http://www.owasp.org/images/a/a6/Sponsor2.JPG&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
==== Hotel &amp;amp; Travel  ====&lt;br /&gt;
&lt;br /&gt;
== Hotel Stay &amp;amp; Travel Information  ==&lt;br /&gt;
&lt;br /&gt;
To help our valued delegates with Hotel and Travel services, we have negotiated with some of the best and Budget Category Guest houses in Gurgaon that are located within a radius of 3 - 4 Kms from the venue.&lt;br /&gt;
&lt;br /&gt;
Limited cheaper accommodation is available near the venue hotel in budget hotels/apartments area. The tariff of these hotels ranges from Rs.2000 onwards per room night (inclusive of Room Rent, Breakfast and Luxury Tax).  Interested delegates / students can send a formal request for the desired accommodations and dates to our official travel agent.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;OFFICIAL TRAVEL AGENT&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dreamz conference Management Pvt.Ltd&amp;lt;/b&amp;gt; will look after your hotel accommodation in Gurgaon and New Delhi, pre &amp;amp; post conference tours / travel needs in India for delegates and visitors independently. If you wish to go for sightseeing tour within New Delhi and around it to places like Agra, Jaipur, Rajasthan etc. However, we would encourage you to make early bookings which will be done on “first – come - first service” basis and let us know of your interest, since that would ultimately work in your favour. Early reservation is strongly recommended as November being a high demand period for hotels in Gurgaon.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
For further details please contact:&lt;br /&gt;
&lt;br /&gt;
DREAMZ CONFERENCE MANAGEMENT PVT.LTD&lt;br /&gt;
&lt;br /&gt;
406, Ansal’s Majestic Tower, Vikas Puri, New Delhi – 110018&lt;br /&gt;
&lt;br /&gt;
Tel: 91 – 11 – 41586401, 402, Fax: 91 – 11 – 41586400&lt;br /&gt;
&lt;br /&gt;
Email: info@dreamztravel.net / dreamztravelindia@yahoo.com&lt;br /&gt;
&lt;br /&gt;
Website: www.dreamztravel.net&lt;br /&gt;
&lt;br /&gt;
Contact Person: Jitin Batra ( +91 9810558569 )&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==== Capture the Flag  ====&lt;br /&gt;
&lt;br /&gt;
== HackHunt 2009  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;India's foremost Hacking Challenge &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Your Shot to the Title of India's best hacker along with Prize money of more than &amp;lt;b&amp;gt;Rs 150,000&amp;lt;/b&amp;gt; up for grabs!&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Search for India’s Best Ethical Hacker &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
HackHunt is India’s leading hacking competition and aims at awarding the best ethical hackers in the country. The competition is brought to you by Appin Security Group, a leading Information Security and Ethical Hacking Company and Securitybyte, a global Information Security Conference Company. &lt;br /&gt;
&lt;br /&gt;
The competition will be conducted in 3 phases. The 1st two rounds will be online and the 3rd and final round will take place at“Securitybyte &amp;amp; OWASP Appsec Asia 2009” on November 17, 2009at Crowne Plaza, Gurgaon. &lt;br /&gt;
&lt;br /&gt;
Level 1 – Knowledge Check&lt;br /&gt;
All the participants will be answering a quiz and based on the score top 10% will be shortlisted to 2nd round.&lt;br /&gt;
&lt;br /&gt;
Level 2 – Skill Check&lt;br /&gt;
This stage will require an attacker to get to the final FLAG file which he/she would need to register for the event.&lt;br /&gt;
&lt;br /&gt;
Level 3 – Final Round&lt;br /&gt;
This stage will require the attackers to exploit a pre-announced SSID which has WPA (or wpa 2).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To participate and for more details visit website :- http://www.hackerscouncil.org/&lt;br /&gt;
&lt;br /&gt;
== PacketWars  ==&lt;br /&gt;
&amp;lt;b&amp;gt;First time in India brought to you by Securitybyte! &amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;                                              &lt;br /&gt;
About PacketWars&lt;br /&gt;
&lt;br /&gt;
PacketWars is an intense, real-time information warfare simulation. Unlike other “capture the flag” games, the battlegrounds featured in PacketWars use the same software and hardware you would encounter in the real world.&lt;br /&gt;
&lt;br /&gt;
PacketWars is designed to operate like a sport. Think Formula One Racing meets professional golf with a dash of Ultimate Fighting thrown in for good measure. Serious fun!&lt;br /&gt;
&lt;br /&gt;
Visit http://packetwars.com/ for more details.&lt;br /&gt;
How To Play?&lt;br /&gt;
&lt;br /&gt;
PacketWars is a Sport like nothing you have ever experienced! Games known as “BATTLES” pit individual players and teams against each other in a race to achieve defined objectives.&lt;br /&gt;
&lt;br /&gt;
The rules of engagement are simple:&lt;br /&gt;
- Illegal activity of any kind is prohibited&lt;br /&gt;
- Protect yourself at all times&lt;br /&gt;
- Battles are designed to be of a low, medium or high difficulty level based on the battle objectives and battle duration&lt;br /&gt;
- Primary, Secondary and Tertiary objectives are defined and assigned points based on difficulty&lt;br /&gt;
- Battles have time limits and other defined constraints&lt;br /&gt;
- Constraints are sometimes known to the combatants and other times are not&lt;br /&gt;
- Anything that is not expressly prohibited is allowed&lt;br /&gt;
- Points are awarded for FLARE&lt;br /&gt;
&lt;br /&gt;
Equipment Needed:&lt;br /&gt;
- Most combants use a notebook and a BackTrack CD however you are only limited by your imagination and bank account&lt;br /&gt;
- You need a battle field and a PacketMaster…Oh yeah, skillz come in handy also!How To Play&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b.How can I participate?&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
PacketWars to be held at the Hotel Crowne Plaza, Gurgaon on Nov 17 &amp;amp; Nov 18, 2009. Participation is FREE! Schedule will be announced soon.&lt;br /&gt;
&lt;br /&gt;
== WebWar III  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;About&amp;lt;/b&amp;gt;&lt;br /&gt;
Hackers attack, coders defend, when you get them together you end up with Web War III. WWIII is designed to put your Web Application attack and defense skills to the test.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Teams&amp;lt;/b&amp;gt;&lt;br /&gt;
Each team consists of two players, an attacker and a defender. The attacker would be capable of identifying Web Application Vulnerabilities (OWASP Top 10). The defender would be capable of writing secure Java code.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Game Format&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The game has two stages:&lt;br /&gt;
&lt;br /&gt;
Stage 1:&lt;br /&gt;
Each team is given a VM Ware image containing a web server hosting a vulnerable web application. During this stage each team identifies the vulnerabilities in their application.&lt;br /&gt;
They try to fix the identified vulnerabilities by making code changes.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Stage 2:&lt;br /&gt;
The IP addresses of the Web Server's of all the teams is announced.&lt;br /&gt;
Each team looks for vulnerabilities in the Web Applications of the other teams.&lt;br /&gt;
Vulnerabilities found on the opponents' application get positive points.&lt;br /&gt;
Vulnerabilities found by the opponents on your application get negative points.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Team with the highest points at the end of Stage 2 wins.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Tools and Equipments&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Each team should bring their own laptop with VM Ware installed.&lt;br /&gt;
The attacker can use any tools they bring.&lt;br /&gt;
The applications come with ESAPI to help the defenders fix the code quicker.&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
==== Leadership Summit 2009  ====&lt;br /&gt;
&amp;lt;b&amp;gt;India's top technology thought leaders coming together to discuss &amp;quot;Security concerns in off-shoring&amp;quot;&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Honored Guests&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
-Honorable Former President of India, Dr. A.P.J Abdul Kalam to inaugrate the Leadership Summit 2009.&amp;lt;br&amp;gt;&lt;br /&gt;
-Prof. Howard A. Schmidt(Advisor, NIST; Former Vice Chair - President’s Critical Infrastructure Board; Former Special Advisor – Cyberspace Security for White House)&amp;lt;br&amp;gt;&lt;br /&gt;
-Mr. Hord Tipton, Executive Director (ISC)2&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;About the Event&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
An elite gathering of 200 technology leaders, decision makers &amp;amp; InfoSec experts from leading service providers, government agencies and various industry verticals.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Two hours of panel discussions between three panels of 12 distinguished industry experts representing outsourcing companies, service providers and the regulatory bodies.  Panel discussions will be followed by networking dinner &amp;amp; cocktails.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Prof Howard A. Schmidt (Advisor, NIST; Former Vice Chair - President’s Critical Infrastructure Board; Former Special Advisor – Cyberspace Security for White House) will facilitate the panel discussions. Thought leaders participating in the panel discussions are:&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Outsourcing Organizations&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Raghavendra Vaidya, CIO - GE Capital India&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. CRN Vairavelu, VP - Ford Technology Services India&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Pankaj Agrawal, CISO - Aircel Limited&amp;lt;br&amp;gt;&lt;br /&gt;
TBD&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Service Providers&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Terry Thomas, Partner - Ernst &amp;amp; Young&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Debashis Ghosh, Head (LS&amp;amp;H ISU) - Tata Consultancy Services&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Sunil Gujral, EVP &amp;amp; CTO - Quatrro&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Sunil Goyal, COO - Sopra group&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Regulatory Bodies&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Dr. Kamlesh Bajaj, CEO - DSCI (a NASSCOM initiative)&amp;lt;br&amp;gt;&lt;br /&gt;
Dr. Gulshan Rai, Director - CERT-in&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Hord Tipton, Executive Director - ISC2 (ex CIO, US Department of Interior)&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Vakul Sharma, Lawyer - Supreme Court&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The event is exclusive to industry leaders and is by private invitation only. If you are interested in attending the event, please email your business card to info@securitybyte.org This e-mail address is being protected from spambots.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Venue - Hotel Crowne Plaza, Gurgaon | Timings - 5:30PM - 9:00PM&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
Please contact [http://www.owasp.org/index.php/Category:India#OWASP_India_Co-Chairs Chair - OWASP India] for sponsorship opportunities. &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Category:India Category: OWASP India]&lt;/div&gt;</summary>
		<author><name>Puneetm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SecurityByte_and_OWASP_Asia_AppSec_Conference_2009&amp;diff=73368</id>
		<title>SecurityByte and OWASP Asia AppSec Conference 2009</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SecurityByte_and_OWASP_Asia_AppSec_Conference_2009&amp;diff=73368"/>
				<updated>2009-11-14T09:12:13Z</updated>
		
		<summary type="html">&lt;p&gt;Puneetm: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:SB OWASP 2009 banner.gif|center|link=http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009]]&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza] &amp;amp;#124; [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Registrations]&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*&amp;lt;b&amp;gt;Only One Week Left ! Register Online today to grab your seat for India's best Security Conference.&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;Honorable Former President of India, Dr. A.P.J Abdul Kalam to Inaugrate the India Technology Leadership Summit 2009. &amp;lt;/b&amp;gt;This event is an Invitation ONLY event.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Registrations Click Here]''' for more information.&lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
Securitybyte &amp;amp;amp; OWASP are proud to welcome you to the annual international information security conference – Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009, Nov 17th through Nov 20th in Delhi &amp;amp;amp; NCR, India. &lt;br /&gt;
&lt;br /&gt;
This is a landmark event, as both Securitybyte and OWASP join hands to present India’s largest InfoSec event with world renowned and most regarded international speakers. &lt;br /&gt;
&lt;br /&gt;
Securitybye &amp;amp;amp; OWASP AppSec Asia Conference 2009 will be held at [http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza, Gurgaon, NCR, India.] on 17th November through 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Security Researchers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Penetration Testers &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*IT Security Professionals &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
&lt;br /&gt;
==== About  ====&lt;br /&gt;
&lt;br /&gt;
== About Conference  ==&lt;br /&gt;
&lt;br /&gt;
Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel conference talks to be conducted in 3 separate halls for two days i.e . 17th &amp;amp;amp; 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular talk. Conference talks are being delivered by world renowned and most regarded speakers from around the world. &lt;br /&gt;
&lt;br /&gt;
== About Trainings  ==&lt;br /&gt;
&lt;br /&gt;
Two days post-conference are dedicated towards best-of-breed trainings being conducted in association with SANS, ISC2 and other organizations. Trainings tracks have been made available as One-Day tracks and Two-Day tracks scheduled for 19th &amp;amp;amp; 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
==== Registrations  ====&lt;br /&gt;
&lt;br /&gt;
== [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Registration] is now open!  ==&lt;br /&gt;
&lt;br /&gt;
=== You can register [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 here]  ===&lt;br /&gt;
&lt;br /&gt;
*[http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Click Here] for Online Registrations. &lt;br /&gt;
*[http://securitybyte.org/index.php/register.html Click Here] for Offline Registrations.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Please check out our Exclusive Discount Offer, available Starting October 6th - 15th, 2009. &amp;quot;SAVE BIG NOW !&amp;quot;&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''''The below pricing reflects the Standard Registration Prices .''''' &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Two Days of Conference (17th and 18th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.8,500/- INR &lt;br /&gt;
| General Public&lt;br /&gt;
|-&lt;br /&gt;
| Two Days of Conference (17th and 18th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.5,000/- INR &lt;br /&gt;
| Students&lt;br /&gt;
|-&lt;br /&gt;
| Two-Day Training Tracks (19th and 20th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.25,000/- INR&lt;br /&gt;
|-&lt;br /&gt;
| One-Day Training Tracks (19th OR 20th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.12,500/- INR&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;** Service Tax @ 10.3% will be charged extra.&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;ISC2&amp;lt;/b&amp;gt; Members can avail a Special 15% discount on Conference &amp;amp; Training Registration.&lt;br /&gt;
(Please provide your ISC2 Certification ID number to avail the above Discount)&lt;br /&gt;
For Registrations contact us at registrations@securitybyte.org&lt;br /&gt;
== Exclusive Offers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;- Group / Team Discounts available: Kindly contact us at registrations@securitybyte.org&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Special University Student discount&amp;lt;/b&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
- University Students can register for two days of conference for just Rs. 5000 (including taxes)&amp;lt;br&amp;gt;&lt;br /&gt;
- Special 15 % Discounts for Training registration&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Trainings Click here for details on the training courses that are available.]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Who Should Attend Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009: ==&lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Security Researchers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Penetration Testers &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*IT Security Professionals &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;For student discount, attendees must present proof of enrollment when picking up your badge. &lt;br /&gt;
&lt;br /&gt;
==== Schedule  ====&lt;br /&gt;
&lt;br /&gt;
Three parallel conference talks are scheduled for 17th &amp;amp;amp; 18th November 2009 in three different halls. Training tracks have been divided in one-day tracks scheduled for 19th or 20th November 2009 and two-day tracks those are schedule to continue for two days both on 19th &amp;amp;amp; 20th November 2009. Follow the tabs to learn the details on both conference and trainings. &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Conference Click here] to view the '''Conference Schedule''' for 17th &amp;amp;amp; 18th November 2009.&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Trainings Click here] to view '''Training Schedule''' on 19th &amp;amp;amp; 20th November 2009.&lt;br /&gt;
&lt;br /&gt;
==== Conference  ====&lt;br /&gt;
&lt;br /&gt;
== Two Days Conference  ==&lt;br /&gt;
&amp;lt;p&amp;gt;&amp;lt;font face=&amp;quot;Arial&amp;quot; size=&amp;quot;2&amp;quot;&amp;gt;Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel training sessions to be conducted in 3 separate halls for two days i.e . 17th &amp;amp;amp; 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular session. Conference talks are being delivered by world renowned and most regarded speakers from around the world. Below is the conference schedule listing confirmed speakers and talks. Couple of talks are under review by the CFP (Call For Papers) Committee and shall be available as soon as those are confirmed. Event also follows two days of InfoSec trainings to be delivered in association with SANS, ISC2 and other organizations.&amp;lt;/font&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&amp;amp;nbsp;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;table border=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot; style=&amp;quot;border-collapse:&lt;br /&gt;
 collapse;width:100%&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;23&amp;quot; style=&amp;quot;height:17.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;23&amp;quot; style=&amp;quot;height: 17.25pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Where &amp;amp;gt;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 309px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #333399&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 1&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 318px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #3366FF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 2&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 333px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #00CCFF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 3:&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;19&amp;quot; style=&amp;quot;height:14.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;19&amp;quot; style=&amp;quot;height: 14.25pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Who &amp;amp;gt;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 309px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #333399&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Security Researchers &amp;amp;amp; Enthusiasts)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 318px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #3366FF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Security Auditors, Developers, QA, Architects)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 333px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #00CCFF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Leaders, Managers, C&amp;amp;amp;S professionals)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Schedule&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;10&amp;quot; height=&amp;quot;285&amp;quot; width=&amp;quot;24&amp;quot; style=&amp;quot;height: 213.75pt; width: 18pt; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid black; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&lt;br /&gt;
http://www.owasp.org/images/5/59/Day1.gif&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;9:00AM&amp;amp;nbsp;&amp;amp;nbsp; - 10:30AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #DBE5F1&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Keynote Sessions&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;10:30AM - 11:00AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C5BE97&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Tea break &amp;amp;amp; Snacks on Exhibition Floor&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;11:00AM - 12:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		Active Man in the Middle&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Adi Sharabani, IBM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;How To Blackbox Test Almost Anything&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Aviram Jenik, Beyond Security&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;The International State of Cyber Security, Risk &lt;br /&gt;
		reduction in a high threat world&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Howard A. Schmidt, Former Cyber Security Advisor to &lt;br /&gt;
		the White house&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;12:00PM - 1:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Reconsidering Network Defenses or NOT !&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Cedric Blancher, EADS Innovation Works&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Lust 2.0 – Desire for free WiFi and the threat of the &lt;br /&gt;
		Imposter&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Lava Kumar Kuppan, Independent Security Researcher&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Applications - The new cyber security frontier&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Mano Paul, Software Assurance Advisor (ISC)2&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;1:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 2:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FAC090&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Lunch&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;2:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 3:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Exploiting Firefox Extensions&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Roberto Suggi Liverani, Security-Assessment.com&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Threat Modeling&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Varun Sharma, Microsoft Corp.&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Behind the scenes at the Microsoft Security Response &lt;br /&gt;
		Center&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Dave Midturi and Suresh Venkateswaran, Microsoft &lt;br /&gt;
		Security Response Center&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;3:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 4:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;SQL Server Forensics 2.0&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Kevvie Fowler, TELUS &amp;amp;amp; Ringzero&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Nitin Kumar/Vipin Kumar, Independent Security &lt;br /&gt;
		Researchers, Nvlabs&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Business Case-Risk Management/Compliance at leading &lt;br /&gt;
		Education Group at AMITY&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Dr J.S Sodhi, AMITY&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;4:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 4:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Business Continuity Case Study&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Venkataram Arabolu, BSI&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Usability and Privacy in Security&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Ponnurangam Kumaraguru, IIIT&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;4:30 PM&amp;amp;nbsp;&amp;amp;nbsp; - 5:30 PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C5BE97&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Tea break &amp;amp;amp; Snacks on Exhibition Floor&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;15&amp;quot; style=&amp;quot;height:11.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;15&amp;quot; style=&amp;quot;height: 11.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;7:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 10:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #DBE5F1&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;India Technology Leadership Summit 2009 (Exclusive by invitation only) -&amp;amp;quot; Information Security Concerns for Offshoring&amp;amp;quot;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;8&amp;quot; style=&amp;quot;height: 6.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;10&amp;quot; height=&amp;quot;8&amp;quot; style=&amp;quot;height: 6.0pt; width: 1070px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: white&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;23&amp;quot; style=&amp;quot;height:17.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;23&amp;quot; style=&amp;quot;height: 17.25pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Where &amp;amp;gt;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 309px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #333399&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 1&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 318px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #3366FF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 2&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 333px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #00CCFF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 3:&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;19&amp;quot; style=&amp;quot;height:14.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;19&amp;quot; style=&amp;quot;height: 14.25pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Who &amp;amp;gt;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 309px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #333399&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Security Researchers &amp;amp;amp; Enthusiasts)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 318px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #3366FF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Security Auditors, Developers, QA, Architects)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 333px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #00CCFF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Leaders, Managers, C&amp;amp;amp;S professionals)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Schedule&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;10&amp;quot; height=&amp;quot;257&amp;quot; width=&amp;quot;24&amp;quot; style=&amp;quot;height: 192.75pt; width: 18pt; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&lt;br /&gt;
		http://www.owasp.org/images/7/73/Day2.gif&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;9:00AM&amp;amp;nbsp;&amp;amp;nbsp; - 10:00AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #DBE5F1&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Round Table with Speakers / Industry Panel - &amp;amp;quot;Security Today &amp;amp;amp; Tomorrow'&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;10:00AM - 10:30AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C5BE97&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Tea break &amp;amp;amp; Snacks on Exhibition Floor&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;32&amp;quot; style=&amp;quot;height:24.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;32&amp;quot; style=&amp;quot;height: 24.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;10:30AM - 11:30AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Ten Things Web Developers Still Aren't Doing&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Frank Kim, ThinkSec Consulting&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;SANS Dshield Webhoneypot Project&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Jason Lam, Independent Security Researcher&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Critical Infrastructure Security “Danger Without &lt;br /&gt;
		borders”&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;John Bumgarner, US Cyber Consequence Unit (USCCU)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;32&amp;quot; style=&amp;quot;height:24.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;32&amp;quot; style=&amp;quot;height: 24.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;11:30AM - 12:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Cloud Hacking – Distributed Attack &amp;amp;amp; Exploit Platform&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Shreeraj Shah, Blueinfy Solutions&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Testing JSON Applications For Security Holes&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Aviram Jenik, Beyond Security&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Critical Infrastructure Security “Danger Without &lt;br /&gt;
		borders”&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;John Bumgarner, US Cyber Consequence Unit (USCCU)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;12:30PM&amp;amp;nbsp; - 1:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FAC090&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Lunch&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;1:30PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 2:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;All Your Packets Belong to Us - Attacking Backbone &lt;br /&gt;
		Technologies&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Daniel Mende, Security Researcher, ERNW&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Risk based Penetration Testing&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;K. K. Mookhey, Founder &amp;amp;amp; Principal Consultant, NII &lt;br /&gt;
		Consulting&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Wi-Fi security: the good, the bad and the ugly&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Cedric Blancher, EADS Innovation Works&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;32&amp;quot; style=&amp;quot;height:24.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;32&amp;quot; style=&amp;quot;height: 24.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;2:30PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 3:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Xprobe3 - What's New? Going Application Level&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Fyodor Yarochkin, Guard-info&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;OWASP SAMM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Pravir Chandra, OWASP&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Do you wanna Play a Game Game theory and Cyberwar&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Bryan K. Fite, HackSecKlahn&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;3:30PM-4:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C5BE97&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Tea break &amp;amp;amp; Snacks on Exhibition Floor&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;32&amp;quot; style=&amp;quot;height:24.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;32&amp;quot; style=&amp;quot;height: 24.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;4:00 PM&amp;amp;nbsp;&amp;amp;nbsp; - 5:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Rumbling Infections – Web Malware Ontology&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Aditya K. Sood, COSEINC&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;Hacking Oracle From Web&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Sid, Independent Security Researcher&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Connected Information Security Framework&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Anil Kumar Chintala, Microsoft&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;5:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 5:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #DBE5F1&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Closing Remarks by Organizing Committee&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Trainings  ====&lt;br /&gt;
&lt;br /&gt;
== Two Day Trainings  ==&lt;br /&gt;
&lt;br /&gt;
Two days post-conference are dedicated towards best-of-breed trainings being conducted in association with SANS, ISC2 and other organizations. Trainings tracks have been made available as One-Day tracks and Two-Day tracks scheduled for 19th &amp;amp;amp; 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 1 - 19th Nov, 2009'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 2 - 20th Nov, 2009'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course ID''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course Duration''' &lt;br /&gt;
(# of Days) &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course Title''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Instructor''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course ID''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course Duration''' &lt;br /&gt;
(# of Days) &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course Title''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Instructor'''&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;30&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''One Day Training Tracks'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DHSO''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Oracle_Hacking_and_security ORACLE Hacking &amp;amp;amp; Security]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Sumit Sidharth,[[Image:Sb logo.png|center|78x50px|link=http://www.securitybyte.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DAWH''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Advanced_Web_Hacking Advanced Web Hacking -Securing AJAX, RIA &amp;amp;amp; SOA]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Shreeraj Shah [[Image:Blueinfy logo.png|center|link=http://www.blueinfy.com]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DAFT'''&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Advanced_Forensic_Techniques Advanced Forensics Techniques]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Dr. Chandrasekhar Umapathy,[[Image:Sb logo.png|center|78x50px|link=http://www.securitybyte.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DIAT'''&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/InDepth_Assessment_Techniques In-depth Assessment Techniques: Design, Code, and Runtime]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Fydor Yarochkin, &lt;br /&gt;
&lt;br /&gt;
[[Image:Logo_Armorize.JPG‎|center|93x31px|link=http://www.armorize.com]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;30&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Two Day Training Tracks'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DNST''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Building_Advanced_Network_Security_tools Building advanced Network Security Tools]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Daniel Mende,[[Image:Ernw logo.png|center]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DNST''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Building_Advanced_Network_Security_tools Building advanced Network Security Tools]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Daniel Mende,[[Image:Ernw logo.png|center]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DCBC''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/ISC2_CSSLP_CBK_Bootcamp (ISC)2 CSSLP CBK Boot camp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Mano Paul,[[Image:Isc logo.png|center|78x50px|link=http://www.isc2.org]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DCBC''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/ISC2_CSSLP_CBK_Bootcamp (ISC)2 CSSLP CBK Boot camp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Mano Paul,[[Image:Isc logo.png|center|78x50px|link=http://www.isc2.org]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSCJ / SANS Course ID&amp;amp;nbsp;: DEV530''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_Essential_Secure_Coding_Java_JEE_GSSP Essential Secure Coding in Java / JEE]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSCJ / SANS Course ID&amp;amp;nbsp;: DEV530''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_Essential_Secure_Coding_Java_JEE_GSSP Essential Secure Coding in Java / JEE]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DWPT / SANS Course ID&amp;amp;nbsp;: DEV538''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_WebApp_Pentesting_handsOn_immersion Web Application Pen Testing Hands-On Immersion]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DWPT / SANS Course ID&amp;amp;nbsp;: DEV538''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_WebApp_Pentesting_handsOn_immersion Web Application Pen Testing Hands-On Immersion]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSAB / SANS Course ID&amp;amp;nbsp;: AUD429''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_IT_Security_Audit_Bootcamp IT Security Audit Essentials Bootcamp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSAB / SANS Course ID&amp;amp;nbsp;: AUD429''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_IT_Security_Audit_Bootcamp IT Security Audit Essentials Bootcamp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Venue  ====&lt;br /&gt;
&lt;br /&gt;
Four Days Event is planned out at: &lt;br /&gt;
&lt;br /&gt;
[http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza,]&amp;lt;br&amp;gt;Site - 2, Sector - 29, &amp;lt;br&amp;gt;Gurgaon-122001 (National Capital Region), India&amp;lt;br&amp;gt;Hotel Front Desk: 91-124-4534000&amp;lt;br&amp;gt;Hotel Fax: 91-124-4304800&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
http://www.owasp.org/images/e/e2/Sponsor1.JPG&lt;br /&gt;
http://www.owasp.org/images/a/a6/Sponsor2.JPG&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
==== Hotel &amp;amp; Travel  ====&lt;br /&gt;
&lt;br /&gt;
== Hotel Stay &amp;amp; Travel Information  ==&lt;br /&gt;
&lt;br /&gt;
To help our valued delegates with Hotel and Travel services, we have negotiated with some of the best and Budget Category Guest houses in Gurgaon that are located within a radius of 3 - 4 Kms from the venue.&lt;br /&gt;
&lt;br /&gt;
Limited cheaper accommodation is available near the venue hotel in budget hotels/apartments area. The tariff of these hotels ranges from Rs.2000 onwards per room night (inclusive of Room Rent, Breakfast and Luxury Tax).  Interested delegates / students can send a formal request for the desired accommodations and dates to our official travel agent.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;OFFICIAL TRAVEL AGENT&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dreamz conference Management Pvt.Ltd&amp;lt;/b&amp;gt; will look after your hotel accommodation in Gurgaon and New Delhi, pre &amp;amp; post conference tours / travel needs in India for delegates and visitors independently. If you wish to go for sightseeing tour within New Delhi and around it to places like Agra, Jaipur, Rajasthan etc. However, we would encourage you to make early bookings which will be done on “first – come - first service” basis and let us know of your interest, since that would ultimately work in your favour. Early reservation is strongly recommended as November being a high demand period for hotels in Gurgaon.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
For further details please contact:&lt;br /&gt;
&lt;br /&gt;
DREAMZ CONFERENCE MANAGEMENT PVT.LTD&lt;br /&gt;
&lt;br /&gt;
406, Ansal’s Majestic Tower, Vikas Puri, New Delhi – 110018&lt;br /&gt;
&lt;br /&gt;
Tel: 91 – 11 – 41586401, 402, Fax: 91 – 11 – 41586400&lt;br /&gt;
&lt;br /&gt;
Email: info@dreamztravel.net / dreamztravelindia@yahoo.com&lt;br /&gt;
&lt;br /&gt;
Website: www.dreamztravel.net&lt;br /&gt;
&lt;br /&gt;
Contact Person: Jitin Batra ( +91 9810558569 )&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==== Capture the Flag  ====&lt;br /&gt;
&lt;br /&gt;
== HackHunt 2009  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;India's foremost Hacking Challenge &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Your Shot to the Title of India's best hacker along with Prize money of more than &amp;lt;b&amp;gt;Rs 150,000&amp;lt;/b&amp;gt; up for grabs!&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Search for India’s Best Ethical Hacker &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
HackHunt is India’s leading hacking competition and aims at awarding the best ethical hackers in the country. The competition is brought to you by Appin Security Group, a leading Information Security and Ethical Hacking Company and Securitybyte, a global Information Security Conference Company. &lt;br /&gt;
&lt;br /&gt;
The competition will be conducted in 3 phases. The 1st two rounds will be online and the 3rd and final round will take place at“Securitybyte &amp;amp; OWASP Appsec Asia 2009” on November 17, 2009at Crowne Plaza, Gurgaon. &lt;br /&gt;
&lt;br /&gt;
Level 1 – Knowledge Check&lt;br /&gt;
All the participants will be answering a quiz and based on the score top 10% will be shortlisted to 2nd round.&lt;br /&gt;
&lt;br /&gt;
Level 2 – Skill Check&lt;br /&gt;
This stage will require an attacker to get to the final FLAG file which he/she would need to register for the event.&lt;br /&gt;
&lt;br /&gt;
Level 3 – Final Round&lt;br /&gt;
This stage will require the attackers to exploit a pre-announced SSID which has WPA (or wpa 2).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To participate and for more details visit website :- http://www.hackerscouncil.org/&lt;br /&gt;
&lt;br /&gt;
== PacketWars  ==&lt;br /&gt;
&amp;lt;b&amp;gt;First time in India brought to you by Securitybyte! &amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;                                              &lt;br /&gt;
About PacketWars&lt;br /&gt;
&lt;br /&gt;
PacketWars is an intense, real-time information warfare simulation. Unlike other “capture the flag” games, the battlegrounds featured in PacketWars use the same software and hardware you would encounter in the real world.&lt;br /&gt;
&lt;br /&gt;
PacketWars is designed to operate like a sport. Think Formula One Racing meets professional golf with a dash of Ultimate Fighting thrown in for good measure. Serious fun!&lt;br /&gt;
&lt;br /&gt;
Visit http://packetwars.com/ for more details.&lt;br /&gt;
How To Play?&lt;br /&gt;
&lt;br /&gt;
PacketWars is a Sport like nothing you have ever experienced! Games known as “BATTLES” pit individual players and teams against each other in a race to achieve defined objectives.&lt;br /&gt;
&lt;br /&gt;
The rules of engagement are simple:&lt;br /&gt;
- Illegal activity of any kind is prohibited&lt;br /&gt;
- Protect yourself at all times&lt;br /&gt;
- Battles are designed to be of a low, medium or high difficulty level based on the battle objectives and battle duration&lt;br /&gt;
- Primary, Secondary and Tertiary objectives are defined and assigned points based on difficulty&lt;br /&gt;
- Battles have time limits and other defined constraints&lt;br /&gt;
- Constraints are sometimes known to the combatants and other times are not&lt;br /&gt;
- Anything that is not expressly prohibited is allowed&lt;br /&gt;
- Points are awarded for FLARE&lt;br /&gt;
&lt;br /&gt;
Equipment Needed:&lt;br /&gt;
- Most combants use a notebook and a BackTrack CD however you are only limited by your imagination and bank account&lt;br /&gt;
- You need a battle field and a PacketMaster…Oh yeah, skillz come in handy also!How To Play&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b.How can I participate?&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
PacketWars to be held at the Hotel Crowne Plaza, Gurgaon on Nov 17 &amp;amp; Nov 18, 2009. Participation is FREE! Schedule will be announced soon.&lt;br /&gt;
&lt;br /&gt;
== WebWar III  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;About&amp;lt;/b&amp;gt;&lt;br /&gt;
Hackers attack, coders defend, when you get them together you end up with Web War III. WWIII is designed to put your Web Application attack and defense skills to the test.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Teams&amp;lt;/b&amp;gt;&lt;br /&gt;
Each team consists of two players, an attacker and a defender. The attacker would be capable of identifying Web Application Vulnerabilities (OWASP Top 10). The defender would be capable of writing secure Java code.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Game Format&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The game has two stages:&lt;br /&gt;
&lt;br /&gt;
Stage 1:&lt;br /&gt;
Each team is given a VM Ware image containing a web server hosting a vulnerable web application. During this stage each team identifies the vulnerabilities in their application.&lt;br /&gt;
They try to fix the identified vulnerabilities by making code changes.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Stage 2:&lt;br /&gt;
The IP addresses of the Web Server's of all the teams is announced.&lt;br /&gt;
Each team looks for vulnerabilities in the Web Applications of the other teams.&lt;br /&gt;
Vulnerabilities found on the opponents' application get positive points.&lt;br /&gt;
Vulnerabilities found by the opponents on your application get negative points.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Team with the highest points at the end of Stage 2 wins.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Tools and Equipments&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Each team should bring their own laptop with VM Ware installed.&lt;br /&gt;
The attacker can use any tools they bring.&lt;br /&gt;
The applications come with ESAPI to help the defenders fix the code quicker.&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
==== Leadership Summit 2009  ====&lt;br /&gt;
&amp;lt;b&amp;gt;India's top technology thought leaders coming together to discuss &amp;quot;Security concerns in off-shoring&amp;quot;&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Honored Guests&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
-Honorable Former President of India, Dr. A.P.J Abdul Kalam to inaugrate the Leadership Summit 2009.&amp;lt;br&amp;gt;&lt;br /&gt;
-Prof. Howard A. Schmidt(Advisor, NIST; Former Vice Chair - President’s Critical Infrastructure Board; Former Special Advisor – Cyberspace Security for White House)&amp;lt;br&amp;gt;&lt;br /&gt;
-Mr. Hord Tipton, Executive Director (ISC)2&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;About the Event&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
An elite gathering of 200 technology leaders, decision makers &amp;amp; InfoSec experts from leading service providers, government agencies and various industry verticals.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Two hours of panel discussions between three panels of 12 distinguished industry experts representing outsourcing companies, service providers and the regulatory bodies.  Panel discussions will be followed by networking dinner &amp;amp; cocktails.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Prof Howard A. Schmidt (Advisor, NIST; Former Vice Chair - President’s Critical Infrastructure Board; Former Special Advisor – Cyberspace Security for White House) will facilitate the panel discussions. Thought leaders participating in the panel discussions are:&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Outsourcing Organizations&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Raghavendra Vaidya, CIO - GE Capital India&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. CRN Vairavelu, VP - Ford Technology Services India&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Pankaj Agrawal, CISO - Aircel Limited&amp;lt;br&amp;gt;&lt;br /&gt;
TBD&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Service Providers&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Terry Thomas, Partner - Ernst &amp;amp; Young&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Debashis Ghosh, Head (LS&amp;amp;H ISU) - Tata Consultancy Services&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Sunil Gujral, EVP &amp;amp; CTO - Quatrro&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Sunil Goyal, COO - Sopra group&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Regulatory Bodies&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Dr. Kamlesh Bajaj, CEO - DSCI (a NASSCOM initiative)&amp;lt;br&amp;gt;&lt;br /&gt;
Dr. Gulshan Rai, Director - CERT-in&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Hord Tipton, Executive Director - ISC2 (ex CIO, US Department of Interior)&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Vakul Sharma, Lawyer - Supreme Court&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The event is exclusive to industry leaders and is by private invitation only. If you are interested in attending the event, please email your business card to info@securitybyte.org This e-mail address is being protected from spambots.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Venue - Hotel Crowne Plaza, Gurgaon | Timings - 5:30PM - 9:00PM&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
Please contact [http://www.owasp.org/index.php/Category:India#OWASP_India_Co-Chairs Chair - OWASP India] for sponsorship opportunities. &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Category:India Category: OWASP India]&lt;/div&gt;</summary>
		<author><name>Puneetm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Sponsor2.JPG&amp;diff=73367</id>
		<title>File:Sponsor2.JPG</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Sponsor2.JPG&amp;diff=73367"/>
				<updated>2009-11-14T09:08:35Z</updated>
		
		<summary type="html">&lt;p&gt;Puneetm: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Puneetm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Sponsor1.JPG&amp;diff=73366</id>
		<title>File:Sponsor1.JPG</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Sponsor1.JPG&amp;diff=73366"/>
				<updated>2009-11-14T09:08:11Z</updated>
		
		<summary type="html">&lt;p&gt;Puneetm: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Puneetm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SecurityByte_and_OWASP_Asia_AppSec_Conference_2009&amp;diff=73365</id>
		<title>SecurityByte and OWASP Asia AppSec Conference 2009</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SecurityByte_and_OWASP_Asia_AppSec_Conference_2009&amp;diff=73365"/>
				<updated>2009-11-14T07:18:18Z</updated>
		
		<summary type="html">&lt;p&gt;Puneetm: /* Two Days Conference */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:SB OWASP 2009 banner.gif|center|link=http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009]]&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza] &amp;amp;#124; [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Registrations]&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*&amp;lt;b&amp;gt;Only One Week Left ! Register Online today to grab your seat for India's best Security Conference.&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;Honorable Former President of India, Dr. A.P.J Abdul Kalam to Inaugrate the India Technology Leadership Summit 2009. &amp;lt;/b&amp;gt;This event is an Invitation ONLY event.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Registrations Click Here]''' for more information.&lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
Securitybyte &amp;amp;amp; OWASP are proud to welcome you to the annual international information security conference – Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009, Nov 17th through Nov 20th in Delhi &amp;amp;amp; NCR, India. &lt;br /&gt;
&lt;br /&gt;
This is a landmark event, as both Securitybyte and OWASP join hands to present India’s largest InfoSec event with world renowned and most regarded international speakers. &lt;br /&gt;
&lt;br /&gt;
Securitybye &amp;amp;amp; OWASP AppSec Asia Conference 2009 will be held at [http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza, Gurgaon, NCR, India.] on 17th November through 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Security Researchers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Penetration Testers &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*IT Security Professionals &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
&lt;br /&gt;
==== About  ====&lt;br /&gt;
&lt;br /&gt;
== About Conference  ==&lt;br /&gt;
&lt;br /&gt;
Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel conference talks to be conducted in 3 separate halls for two days i.e . 17th &amp;amp;amp; 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular talk. Conference talks are being delivered by world renowned and most regarded speakers from around the world. &lt;br /&gt;
&lt;br /&gt;
== About Trainings  ==&lt;br /&gt;
&lt;br /&gt;
Two days post-conference are dedicated towards best-of-breed trainings being conducted in association with SANS, ISC2 and other organizations. Trainings tracks have been made available as One-Day tracks and Two-Day tracks scheduled for 19th &amp;amp;amp; 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
==== Registrations  ====&lt;br /&gt;
&lt;br /&gt;
== [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Registration] is now open!  ==&lt;br /&gt;
&lt;br /&gt;
=== You can register [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 here]  ===&lt;br /&gt;
&lt;br /&gt;
*[http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Click Here] for Online Registrations. &lt;br /&gt;
*[http://securitybyte.org/index.php/register.html Click Here] for Offline Registrations.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Please check out our Exclusive Discount Offer, available Starting October 6th - 15th, 2009. &amp;quot;SAVE BIG NOW !&amp;quot;&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''''The below pricing reflects the Standard Registration Prices .''''' &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Two Days of Conference (17th and 18th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.8,500/- INR &lt;br /&gt;
| General Public&lt;br /&gt;
|-&lt;br /&gt;
| Two Days of Conference (17th and 18th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.5,000/- INR &lt;br /&gt;
| Students&lt;br /&gt;
|-&lt;br /&gt;
| Two-Day Training Tracks (19th and 20th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.25,000/- INR&lt;br /&gt;
|-&lt;br /&gt;
| One-Day Training Tracks (19th OR 20th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.12,500/- INR&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;** Service Tax @ 10.3% will be charged extra.&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;ISC2&amp;lt;/b&amp;gt; Members can avail a Special 15% discount on Conference &amp;amp; Training Registration.&lt;br /&gt;
(Please provide your ISC2 Certification ID number to avail the above Discount)&lt;br /&gt;
For Registrations contact us at registrations@securitybyte.org&lt;br /&gt;
== Exclusive Offers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;- Group / Team Discounts available: Kindly contact us at registrations@securitybyte.org&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Special University Student discount&amp;lt;/b&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
- University Students can register for two days of conference for just Rs. 5000 (including taxes)&amp;lt;br&amp;gt;&lt;br /&gt;
- Special 15 % Discounts for Training registration&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Trainings Click here for details on the training courses that are available.]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Who Should Attend Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009: ==&lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Security Researchers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Penetration Testers &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*IT Security Professionals &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;For student discount, attendees must present proof of enrollment when picking up your badge. &lt;br /&gt;
&lt;br /&gt;
==== Schedule  ====&lt;br /&gt;
&lt;br /&gt;
Three parallel conference talks are scheduled for 17th &amp;amp;amp; 18th November 2009 in three different halls. Training tracks have been divided in one-day tracks scheduled for 19th or 20th November 2009 and two-day tracks those are schedule to continue for two days both on 19th &amp;amp;amp; 20th November 2009. Follow the tabs to learn the details on both conference and trainings. &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Conference Click here] to view the '''Conference Schedule''' for 17th &amp;amp;amp; 18th November 2009.&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Trainings Click here] to view '''Training Schedule''' on 19th &amp;amp;amp; 20th November 2009.&lt;br /&gt;
&lt;br /&gt;
==== Conference  ====&lt;br /&gt;
&lt;br /&gt;
== Two Days Conference  ==&lt;br /&gt;
&amp;lt;p&amp;gt;&amp;lt;font face=&amp;quot;Arial&amp;quot; size=&amp;quot;2&amp;quot;&amp;gt;Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel training sessions to be conducted in 3 separate halls for two days i.e . 17th &amp;amp;amp; 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular session. Conference talks are being delivered by world renowned and most regarded speakers from around the world. Below is the conference schedule listing confirmed speakers and talks. Couple of talks are under review by the CFP (Call For Papers) Committee and shall be available as soon as those are confirmed. Event also follows two days of InfoSec trainings to be delivered in association with SANS, ISC2 and other organizations.&amp;lt;/font&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&amp;amp;nbsp;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;table border=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot; style=&amp;quot;border-collapse:&lt;br /&gt;
 collapse;width:100%&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;23&amp;quot; style=&amp;quot;height:17.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;23&amp;quot; style=&amp;quot;height: 17.25pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Where &amp;amp;gt;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 309px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #333399&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 1&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 318px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #3366FF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 2&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 333px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #00CCFF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 3:&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;19&amp;quot; style=&amp;quot;height:14.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;19&amp;quot; style=&amp;quot;height: 14.25pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Who &amp;amp;gt;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 309px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #333399&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Security Researchers &amp;amp;amp; Enthusiasts)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 318px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #3366FF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Security Auditors, Developers, QA, Architects)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 333px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #00CCFF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Leaders, Managers, C&amp;amp;amp;S professionals)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Schedule&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;10&amp;quot; height=&amp;quot;285&amp;quot; width=&amp;quot;24&amp;quot; style=&amp;quot;height: 213.75pt; width: 18pt; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid black; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&lt;br /&gt;
http://www.owasp.org/images/5/59/Day1.gif&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;9:00AM&amp;amp;nbsp;&amp;amp;nbsp; - 10:30AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #DBE5F1&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Keynote Sessions&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;10:30AM - 11:00AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C5BE97&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Tea break &amp;amp;amp; Snacks on Exhibition Floor&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;11:00AM - 12:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		Active Man in the Middle&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Adi Sharabani, IBM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;How To Blackbox Test Almost Anything&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Aviram Jenik, Beyond Security&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;The International State of Cyber Security, Risk &lt;br /&gt;
		reduction in a high threat world&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Howard A. Schmidt, Former Cyber Security Advisor to &lt;br /&gt;
		the White house&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;12:00PM - 1:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Reconsidering Network Defenses or NOT !&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Cedric Blancher, EADS Innovation Works&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Lust 2.0 – Desire for free WiFi and the threat of the &lt;br /&gt;
		Imposter&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Lava Kumar Kuppan, Independent Security Researcher&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Applications - The new cyber security frontier&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Mano Paul, Software Assurance Advisor (ISC)2&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;1:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 2:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FAC090&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Lunch&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;2:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 3:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Exploiting Firefox Extensions&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Roberto Suggi Liverani, Security-Assessment.com&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Threat Modeling&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Varun Sharma, Microsoft Corp.&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Behind the scenes at the Microsoft Security Response &lt;br /&gt;
		Center&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Dave Midturi and Suresh Venkateswaran, Microsoft &lt;br /&gt;
		Security Response Center&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;3:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 4:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;SQL Server Forensics 2.0&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Kevvie Fowler, TELUS &amp;amp;amp; Ringzero&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Nitin Kumar/Vipin Kumar, Independent Security &lt;br /&gt;
		Researchers, Nvlabs&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Business Case-Risk Management/Compliance at leading &lt;br /&gt;
		Education Group at AMITY&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Dr J.S Sodhi, AMITY&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;4:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 4:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Business Continuity Case Study&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Venkataram Arabolu, BSI&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Usability and Privacy in Security&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Ponnurangam Kumaraguru, IIIT&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;4:30 PM&amp;amp;nbsp;&amp;amp;nbsp; - 5:30 PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C5BE97&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Tea break &amp;amp;amp; Snacks on Exhibition Floor&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;15&amp;quot; style=&amp;quot;height:11.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;15&amp;quot; style=&amp;quot;height: 11.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;7:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 10:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #DBE5F1&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;India Technology Leadership Summit 2009 (Exclusive by invitation only) -&amp;amp;quot; Information Security Concerns for Offshoring&amp;amp;quot;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;8&amp;quot; style=&amp;quot;height: 6.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;10&amp;quot; height=&amp;quot;8&amp;quot; style=&amp;quot;height: 6.0pt; width: 1070px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: white&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;23&amp;quot; style=&amp;quot;height:17.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;23&amp;quot; style=&amp;quot;height: 17.25pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Where &amp;amp;gt;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 309px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #333399&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 1&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 318px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #3366FF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 2&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 333px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #00CCFF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 3:&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;19&amp;quot; style=&amp;quot;height:14.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;19&amp;quot; style=&amp;quot;height: 14.25pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Who &amp;amp;gt;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 309px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #333399&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Security Researchers &amp;amp;amp; Enthusiasts)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 318px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #3366FF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Security Auditors, Developers, QA, Architects)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 333px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #00CCFF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Leaders, Managers, C&amp;amp;amp;S professionals)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Schedule&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;10&amp;quot; height=&amp;quot;257&amp;quot; width=&amp;quot;24&amp;quot; style=&amp;quot;height: 192.75pt; width: 18pt; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&lt;br /&gt;
		http://www.owasp.org/images/7/73/Day2.gif&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;9:00AM&amp;amp;nbsp;&amp;amp;nbsp; - 10:00AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #DBE5F1&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Round Table with Speakers / Industry Panel - &amp;amp;quot;Security Today &amp;amp;amp; Tomorrow'&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;10:00AM - 10:30AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C5BE97&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Tea break &amp;amp;amp; Snacks on Exhibition Floor&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;32&amp;quot; style=&amp;quot;height:24.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;32&amp;quot; style=&amp;quot;height: 24.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;10:30AM - 11:30AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Ten Things Web Developers Still Aren't Doing&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Frank Kim, ThinkSec Consulting&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;SANS Dshield Webhoneypot Project&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Jason Lam, Independent Security Researcher&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Critical Infrastructure Security “Danger Without &lt;br /&gt;
		borders”&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;John Bumgarner, US Cyber Consequence Unit (USCCU)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;32&amp;quot; style=&amp;quot;height:24.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;32&amp;quot; style=&amp;quot;height: 24.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;11:30AM - 12:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Cloud Hacking – Distributed Attack &amp;amp;amp; Exploit Platform&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Shreeraj Shah, Blueinfy Solutions&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Testing JSON Applications For Security Holes&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Aviram Jenik, Beyond Security&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Critical Infrastructure Security “Danger Without &lt;br /&gt;
		borders”&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;John Bumgarner, US Cyber Consequence Unit (USCCU)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;12:30PM&amp;amp;nbsp; - 1:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FAC090&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Lunch&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;1:30PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 2:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;All Your Packets Belong to Us - Attacking Backbone &lt;br /&gt;
		Technologies&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Daniel Mende, Security Researcher, ERNW&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Risk based Penetration Testing&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;K. K. Mookhey, Founder &amp;amp;amp; Principal Consultant, NII &lt;br /&gt;
		Consulting&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Wi-Fi security: the good, the bad and the ugly&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Cedric Blancher, EADS Innovation Works&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;32&amp;quot; style=&amp;quot;height:24.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;32&amp;quot; style=&amp;quot;height: 24.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;2:30PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 3:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Xprobe3 - What's New? Going Application Level&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Fyodor Yarochkin, Guard-info&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;OWASP SAMM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Pravir Chandra, OWASP&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Do you wanna Play a Game Game theory and Cyberwar&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Bryan K. Fite, HackSecKlahn&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;3:30PM-4:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C5BE97&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Tea break &amp;amp;amp; Snacks on Exhibition Floor&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;32&amp;quot; style=&amp;quot;height:24.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;32&amp;quot; style=&amp;quot;height: 24.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;4:00 PM&amp;amp;nbsp;&amp;amp;nbsp; - 5:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Rumbling Infections – Web Malware Ontology&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Aditya K. Sood, COSEINC&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;Hacking Oracle From Web&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Sid, Independent Security Researcher&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Connected Information Security Framework&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Anil Kumar Chintala, Microsoft&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;5:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 5:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #DBE5F1&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Closing Remarks by Organizing Committee&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Trainings  ====&lt;br /&gt;
&lt;br /&gt;
== Two Day Trainings  ==&lt;br /&gt;
&lt;br /&gt;
Two days post-conference are dedicated towards best-of-breed trainings being conducted in association with SANS, ISC2 and other organizations. Trainings tracks have been made available as One-Day tracks and Two-Day tracks scheduled for 19th &amp;amp;amp; 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 1 - 19th Nov, 2009'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 2 - 20th Nov, 2009'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course ID''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course Duration''' &lt;br /&gt;
(# of Days) &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course Title''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Instructor''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course ID''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course Duration''' &lt;br /&gt;
(# of Days) &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course Title''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Instructor'''&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;30&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''One Day Training Tracks'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DHSO''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Oracle_Hacking_and_security ORACLE Hacking &amp;amp;amp; Security]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Sumit Sidharth,[[Image:Sb logo.png|center|78x50px|link=http://www.securitybyte.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DAWH''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Advanced_Web_Hacking Advanced Web Hacking -Securing AJAX, RIA &amp;amp;amp; SOA]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Shreeraj Shah [[Image:Blueinfy logo.png|center|link=http://www.blueinfy.com]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DAFT'''&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Advanced_Forensic_Techniques Advanced Forensics Techniques]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Dr. Chandrasekhar Umapathy,[[Image:Sb logo.png|center|78x50px|link=http://www.securitybyte.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DIAT'''&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/InDepth_Assessment_Techniques In-depth Assessment Techniques: Design, Code, and Runtime]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Fydor Yarochkin, &lt;br /&gt;
&lt;br /&gt;
[[Image:Logo_Armorize.JPG‎|center|93x31px|link=http://www.armorize.com]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;30&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Two Day Training Tracks'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DNST''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Building_Advanced_Network_Security_tools Building advanced Network Security Tools]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Daniel Mende,[[Image:Ernw logo.png|center]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DNST''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Building_Advanced_Network_Security_tools Building advanced Network Security Tools]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Daniel Mende,[[Image:Ernw logo.png|center]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DCBC''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/ISC2_CSSLP_CBK_Bootcamp (ISC)2 CSSLP CBK Boot camp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Mano Paul,[[Image:Isc logo.png|center|78x50px|link=http://www.isc2.org]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DCBC''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/ISC2_CSSLP_CBK_Bootcamp (ISC)2 CSSLP CBK Boot camp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Mano Paul,[[Image:Isc logo.png|center|78x50px|link=http://www.isc2.org]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSCJ / SANS Course ID&amp;amp;nbsp;: DEV530''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_Essential_Secure_Coding_Java_JEE_GSSP Essential Secure Coding in Java / JEE]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSCJ / SANS Course ID&amp;amp;nbsp;: DEV530''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_Essential_Secure_Coding_Java_JEE_GSSP Essential Secure Coding in Java / JEE]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DWPT / SANS Course ID&amp;amp;nbsp;: DEV538''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_WebApp_Pentesting_handsOn_immersion Web Application Pen Testing Hands-On Immersion]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DWPT / SANS Course ID&amp;amp;nbsp;: DEV538''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_WebApp_Pentesting_handsOn_immersion Web Application Pen Testing Hands-On Immersion]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSAB / SANS Course ID&amp;amp;nbsp;: AUD429''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_IT_Security_Audit_Bootcamp IT Security Audit Essentials Bootcamp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSAB / SANS Course ID&amp;amp;nbsp;: AUD429''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_IT_Security_Audit_Bootcamp IT Security Audit Essentials Bootcamp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Venue  ====&lt;br /&gt;
&lt;br /&gt;
Four Days Event is planned out at: &lt;br /&gt;
&lt;br /&gt;
[http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza,]&amp;lt;br&amp;gt;Site - 2, Sector - 29, &amp;lt;br&amp;gt;Gurgaon-122001 (National Capital Region), India&amp;lt;br&amp;gt;Hotel Front Desk: 91-124-4534000&amp;lt;br&amp;gt;Hotel Fax: 91-124-4304800&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | '''Co-Sponsor &amp;quot;Leadership Summit 2009&amp;quot;'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | '''CTF&amp;amp;nbsp;(Capture The Flag) Sponsor'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | '''Education &amp;amp;nbsp;Partner'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:20th green stacked.png|center|ISC2|link=http://www.isc2.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
| [[Image:Appin.jpg|center|link=http://www.appinsecurity.com]]&amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
| [[Image:BRIP-Logo.jpg|center|link=http://www.brip.co.in]]&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
[[Image:Beyond-logo_large.jpg|Left|link=http://www.www.beyondsecurity.com]]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;b&amp;gt;Innovation &amp;amp;nbsp;Partner&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
[[Image:IBM.gif|Left|link=http://www.www.ibm.com]]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Associate Sponsors'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;90&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Media Partners'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Supporters'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Torridn.jpg|center|link=http://www.torridnetworks.com]] &lt;br /&gt;
| [[Image:SSecurity_india_small.gif‎ |center|link=http://www.searchsecurity.in]]&lt;br /&gt;
| [[Image:HITB.jpg|center|link=http://conference.hitb.org]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:SecurityCompass.JPG|center|link=http://www.securitycompass.com]] &lt;br /&gt;
| [[Image:HNS-web.jpg|center|link=http://www.net-security.org]] &lt;br /&gt;
| [[Image:Sector.jpg|center|link=http://www.sector.ca]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Logo_Armorize.JPG|center|link=http://www.armorize.com]] &amp;lt;br&amp;gt;‎ &lt;br /&gt;
| [[Image:Infosecurity.jpg|center|link=http://www.infosecuritymagz.com]] &amp;lt;br&amp;gt;&lt;br /&gt;
| [[Image:Clubhack.gif|center]]&amp;lt;br&amp;gt;[[Image:Eventavenue Logo.jpg|center|link=https://www.eventavenue.com]]&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:eads.jpg|center|link=http://www.eads.com]]&amp;lt;br&amp;gt;&lt;br /&gt;
| [[Image:Itmagz.jpg|center]]&amp;amp;nbsp;[[Image:Electronicsf.jpg|center|link=http://www.electronicsforu.com]] &lt;br /&gt;
| [[Image:Crowne plaza.jpg|center|link=http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;b&amp;gt;Knowledge &amp;amp;nbsp;Partner&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
[[Image:BSI.gif|Left|link=http://www.www.bsigroup.co.in]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
[[Image:OISSG-small.jpg‎|Left|link=http://www.www.bsigroup.co.in]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
==== Hotel &amp;amp; Travel  ====&lt;br /&gt;
&lt;br /&gt;
== Hotel Stay &amp;amp; Travel Information  ==&lt;br /&gt;
&lt;br /&gt;
To help our valued delegates with Hotel and Travel services, we have negotiated with some of the best and Budget Category Guest houses in Gurgaon that are located within a radius of 3 - 4 Kms from the venue.&lt;br /&gt;
&lt;br /&gt;
Limited cheaper accommodation is available near the venue hotel in budget hotels/apartments area. The tariff of these hotels ranges from Rs.2000 onwards per room night (inclusive of Room Rent, Breakfast and Luxury Tax).  Interested delegates / students can send a formal request for the desired accommodations and dates to our official travel agent.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;OFFICIAL TRAVEL AGENT&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dreamz conference Management Pvt.Ltd&amp;lt;/b&amp;gt; will look after your hotel accommodation in Gurgaon and New Delhi, pre &amp;amp; post conference tours / travel needs in India for delegates and visitors independently. If you wish to go for sightseeing tour within New Delhi and around it to places like Agra, Jaipur, Rajasthan etc. However, we would encourage you to make early bookings which will be done on “first – come - first service” basis and let us know of your interest, since that would ultimately work in your favour. Early reservation is strongly recommended as November being a high demand period for hotels in Gurgaon.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
For further details please contact:&lt;br /&gt;
&lt;br /&gt;
DREAMZ CONFERENCE MANAGEMENT PVT.LTD&lt;br /&gt;
&lt;br /&gt;
406, Ansal’s Majestic Tower, Vikas Puri, New Delhi – 110018&lt;br /&gt;
&lt;br /&gt;
Tel: 91 – 11 – 41586401, 402, Fax: 91 – 11 – 41586400&lt;br /&gt;
&lt;br /&gt;
Email: info@dreamztravel.net / dreamztravelindia@yahoo.com&lt;br /&gt;
&lt;br /&gt;
Website: www.dreamztravel.net&lt;br /&gt;
&lt;br /&gt;
Contact Person: Jitin Batra ( +91 9810558569 )&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==== Capture the Flag  ====&lt;br /&gt;
&lt;br /&gt;
== HackHunt 2009  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;India's foremost Hacking Challenge &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Your Shot to the Title of India's best hacker along with Prize money of more than &amp;lt;b&amp;gt;Rs 150,000&amp;lt;/b&amp;gt; up for grabs!&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Search for India’s Best Ethical Hacker &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
HackHunt is India’s leading hacking competition and aims at awarding the best ethical hackers in the country. The competition is brought to you by Appin Security Group, a leading Information Security and Ethical Hacking Company and Securitybyte, a global Information Security Conference Company. &lt;br /&gt;
&lt;br /&gt;
The competition will be conducted in 3 phases. The 1st two rounds will be online and the 3rd and final round will take place at“Securitybyte &amp;amp; OWASP Appsec Asia 2009” on November 17, 2009at Crowne Plaza, Gurgaon. &lt;br /&gt;
&lt;br /&gt;
Level 1 – Knowledge Check&lt;br /&gt;
All the participants will be answering a quiz and based on the score top 10% will be shortlisted to 2nd round.&lt;br /&gt;
&lt;br /&gt;
Level 2 – Skill Check&lt;br /&gt;
This stage will require an attacker to get to the final FLAG file which he/she would need to register for the event.&lt;br /&gt;
&lt;br /&gt;
Level 3 – Final Round&lt;br /&gt;
This stage will require the attackers to exploit a pre-announced SSID which has WPA (or wpa 2).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To participate and for more details visit website :- http://www.hackerscouncil.org/&lt;br /&gt;
&lt;br /&gt;
== PacketWars  ==&lt;br /&gt;
&amp;lt;b&amp;gt;First time in India brought to you by Securitybyte! &amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;                                              &lt;br /&gt;
About PacketWars&lt;br /&gt;
&lt;br /&gt;
PacketWars is an intense, real-time information warfare simulation. Unlike other “capture the flag” games, the battlegrounds featured in PacketWars use the same software and hardware you would encounter in the real world.&lt;br /&gt;
&lt;br /&gt;
PacketWars is designed to operate like a sport. Think Formula One Racing meets professional golf with a dash of Ultimate Fighting thrown in for good measure. Serious fun!&lt;br /&gt;
&lt;br /&gt;
Visit http://packetwars.com/ for more details.&lt;br /&gt;
How To Play?&lt;br /&gt;
&lt;br /&gt;
PacketWars is a Sport like nothing you have ever experienced! Games known as “BATTLES” pit individual players and teams against each other in a race to achieve defined objectives.&lt;br /&gt;
&lt;br /&gt;
The rules of engagement are simple:&lt;br /&gt;
- Illegal activity of any kind is prohibited&lt;br /&gt;
- Protect yourself at all times&lt;br /&gt;
- Battles are designed to be of a low, medium or high difficulty level based on the battle objectives and battle duration&lt;br /&gt;
- Primary, Secondary and Tertiary objectives are defined and assigned points based on difficulty&lt;br /&gt;
- Battles have time limits and other defined constraints&lt;br /&gt;
- Constraints are sometimes known to the combatants and other times are not&lt;br /&gt;
- Anything that is not expressly prohibited is allowed&lt;br /&gt;
- Points are awarded for FLARE&lt;br /&gt;
&lt;br /&gt;
Equipment Needed:&lt;br /&gt;
- Most combants use a notebook and a BackTrack CD however you are only limited by your imagination and bank account&lt;br /&gt;
- You need a battle field and a PacketMaster…Oh yeah, skillz come in handy also!How To Play&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b.How can I participate?&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
PacketWars to be held at the Hotel Crowne Plaza, Gurgaon on Nov 17 &amp;amp; Nov 18, 2009. Participation is FREE! Schedule will be announced soon.&lt;br /&gt;
&lt;br /&gt;
== WebWar III  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;About&amp;lt;/b&amp;gt;&lt;br /&gt;
Hackers attack, coders defend, when you get them together you end up with Web War III. WWIII is designed to put your Web Application attack and defense skills to the test.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Teams&amp;lt;/b&amp;gt;&lt;br /&gt;
Each team consists of two players, an attacker and a defender. The attacker would be capable of identifying Web Application Vulnerabilities (OWASP Top 10). The defender would be capable of writing secure Java code.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Game Format&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The game has two stages:&lt;br /&gt;
&lt;br /&gt;
Stage 1:&lt;br /&gt;
Each team is given a VM Ware image containing a web server hosting a vulnerable web application. During this stage each team identifies the vulnerabilities in their application.&lt;br /&gt;
They try to fix the identified vulnerabilities by making code changes.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Stage 2:&lt;br /&gt;
The IP addresses of the Web Server's of all the teams is announced.&lt;br /&gt;
Each team looks for vulnerabilities in the Web Applications of the other teams.&lt;br /&gt;
Vulnerabilities found on the opponents' application get positive points.&lt;br /&gt;
Vulnerabilities found by the opponents on your application get negative points.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Team with the highest points at the end of Stage 2 wins.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Tools and Equipments&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Each team should bring their own laptop with VM Ware installed.&lt;br /&gt;
The attacker can use any tools they bring.&lt;br /&gt;
The applications come with ESAPI to help the defenders fix the code quicker.&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
==== Leadership Summit 2009  ====&lt;br /&gt;
&amp;lt;b&amp;gt;India's top technology thought leaders coming together to discuss &amp;quot;Security concerns in off-shoring&amp;quot;&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Honored Guests&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
-Honorable Former President of India, Dr. A.P.J Abdul Kalam to inaugrate the Leadership Summit 2009.&amp;lt;br&amp;gt;&lt;br /&gt;
-Prof. Howard A. Schmidt(Advisor, NIST; Former Vice Chair - President’s Critical Infrastructure Board; Former Special Advisor – Cyberspace Security for White House)&amp;lt;br&amp;gt;&lt;br /&gt;
-Mr. Hord Tipton, Executive Director (ISC)2&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;About the Event&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
An elite gathering of 200 technology leaders, decision makers &amp;amp; InfoSec experts from leading service providers, government agencies and various industry verticals.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Two hours of panel discussions between three panels of 12 distinguished industry experts representing outsourcing companies, service providers and the regulatory bodies.  Panel discussions will be followed by networking dinner &amp;amp; cocktails.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Prof Howard A. Schmidt (Advisor, NIST; Former Vice Chair - President’s Critical Infrastructure Board; Former Special Advisor – Cyberspace Security for White House) will facilitate the panel discussions. Thought leaders participating in the panel discussions are:&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Outsourcing Organizations&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Raghavendra Vaidya, CIO - GE Capital India&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. CRN Vairavelu, VP - Ford Technology Services India&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Pankaj Agrawal, CISO - Aircel Limited&amp;lt;br&amp;gt;&lt;br /&gt;
TBD&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Service Providers&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Terry Thomas, Partner - Ernst &amp;amp; Young&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Debashis Ghosh, Head (LS&amp;amp;H ISU) - Tata Consultancy Services&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Sunil Gujral, EVP &amp;amp; CTO - Quatrro&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Sunil Goyal, COO - Sopra group&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Regulatory Bodies&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Dr. Kamlesh Bajaj, CEO - DSCI (a NASSCOM initiative)&amp;lt;br&amp;gt;&lt;br /&gt;
Dr. Gulshan Rai, Director - CERT-in&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Hord Tipton, Executive Director - ISC2 (ex CIO, US Department of Interior)&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Vakul Sharma, Lawyer - Supreme Court&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The event is exclusive to industry leaders and is by private invitation only. If you are interested in attending the event, please email your business card to info@securitybyte.org This e-mail address is being protected from spambots.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Venue - Hotel Crowne Plaza, Gurgaon | Timings - 5:30PM - 9:00PM&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
Please contact [http://www.owasp.org/index.php/Category:India#OWASP_India_Co-Chairs Chair - OWASP India] for sponsorship opportunities. &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Category:India Category: OWASP India]&lt;/div&gt;</summary>
		<author><name>Puneetm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SecurityByte_and_OWASP_Asia_AppSec_Conference_2009&amp;diff=73364</id>
		<title>SecurityByte and OWASP Asia AppSec Conference 2009</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SecurityByte_and_OWASP_Asia_AppSec_Conference_2009&amp;diff=73364"/>
				<updated>2009-11-14T07:16:17Z</updated>
		
		<summary type="html">&lt;p&gt;Puneetm: /* Two Days Conference */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:SB OWASP 2009 banner.gif|center|link=http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009]]&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza] &amp;amp;#124; [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Registrations]&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*&amp;lt;b&amp;gt;Only One Week Left ! Register Online today to grab your seat for India's best Security Conference.&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;Honorable Former President of India, Dr. A.P.J Abdul Kalam to Inaugrate the India Technology Leadership Summit 2009. &amp;lt;/b&amp;gt;This event is an Invitation ONLY event.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Registrations Click Here]''' for more information.&lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
Securitybyte &amp;amp;amp; OWASP are proud to welcome you to the annual international information security conference – Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009, Nov 17th through Nov 20th in Delhi &amp;amp;amp; NCR, India. &lt;br /&gt;
&lt;br /&gt;
This is a landmark event, as both Securitybyte and OWASP join hands to present India’s largest InfoSec event with world renowned and most regarded international speakers. &lt;br /&gt;
&lt;br /&gt;
Securitybye &amp;amp;amp; OWASP AppSec Asia Conference 2009 will be held at [http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza, Gurgaon, NCR, India.] on 17th November through 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Security Researchers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Penetration Testers &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*IT Security Professionals &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
&lt;br /&gt;
==== About  ====&lt;br /&gt;
&lt;br /&gt;
== About Conference  ==&lt;br /&gt;
&lt;br /&gt;
Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel conference talks to be conducted in 3 separate halls for two days i.e . 17th &amp;amp;amp; 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular talk. Conference talks are being delivered by world renowned and most regarded speakers from around the world. &lt;br /&gt;
&lt;br /&gt;
== About Trainings  ==&lt;br /&gt;
&lt;br /&gt;
Two days post-conference are dedicated towards best-of-breed trainings being conducted in association with SANS, ISC2 and other organizations. Trainings tracks have been made available as One-Day tracks and Two-Day tracks scheduled for 19th &amp;amp;amp; 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
==== Registrations  ====&lt;br /&gt;
&lt;br /&gt;
== [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Registration] is now open!  ==&lt;br /&gt;
&lt;br /&gt;
=== You can register [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 here]  ===&lt;br /&gt;
&lt;br /&gt;
*[http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Click Here] for Online Registrations. &lt;br /&gt;
*[http://securitybyte.org/index.php/register.html Click Here] for Offline Registrations.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Please check out our Exclusive Discount Offer, available Starting October 6th - 15th, 2009. &amp;quot;SAVE BIG NOW !&amp;quot;&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''''The below pricing reflects the Standard Registration Prices .''''' &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Two Days of Conference (17th and 18th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.8,500/- INR &lt;br /&gt;
| General Public&lt;br /&gt;
|-&lt;br /&gt;
| Two Days of Conference (17th and 18th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.5,000/- INR &lt;br /&gt;
| Students&lt;br /&gt;
|-&lt;br /&gt;
| Two-Day Training Tracks (19th and 20th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.25,000/- INR&lt;br /&gt;
|-&lt;br /&gt;
| One-Day Training Tracks (19th OR 20th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.12,500/- INR&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;** Service Tax @ 10.3% will be charged extra.&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;ISC2&amp;lt;/b&amp;gt; Members can avail a Special 15% discount on Conference &amp;amp; Training Registration.&lt;br /&gt;
(Please provide your ISC2 Certification ID number to avail the above Discount)&lt;br /&gt;
For Registrations contact us at registrations@securitybyte.org&lt;br /&gt;
== Exclusive Offers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;- Group / Team Discounts available: Kindly contact us at registrations@securitybyte.org&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Special University Student discount&amp;lt;/b&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
- University Students can register for two days of conference for just Rs. 5000 (including taxes)&amp;lt;br&amp;gt;&lt;br /&gt;
- Special 15 % Discounts for Training registration&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Trainings Click here for details on the training courses that are available.]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Who Should Attend Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009: ==&lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Security Researchers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Penetration Testers &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*IT Security Professionals &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;For student discount, attendees must present proof of enrollment when picking up your badge. &lt;br /&gt;
&lt;br /&gt;
==== Schedule  ====&lt;br /&gt;
&lt;br /&gt;
Three parallel conference talks are scheduled for 17th &amp;amp;amp; 18th November 2009 in three different halls. Training tracks have been divided in one-day tracks scheduled for 19th or 20th November 2009 and two-day tracks those are schedule to continue for two days both on 19th &amp;amp;amp; 20th November 2009. Follow the tabs to learn the details on both conference and trainings. &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Conference Click here] to view the '''Conference Schedule''' for 17th &amp;amp;amp; 18th November 2009.&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Trainings Click here] to view '''Training Schedule''' on 19th &amp;amp;amp; 20th November 2009.&lt;br /&gt;
&lt;br /&gt;
==== Conference  ====&lt;br /&gt;
&lt;br /&gt;
== Two Days Conference  ==&lt;br /&gt;
&amp;lt;p&amp;gt;&amp;lt;font face=&amp;quot;Arial&amp;quot; size=&amp;quot;2&amp;quot;&amp;gt;Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel training sessions to be conducted in 3 separate halls for two days i.e . 17th &amp;amp;amp; 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular session. Conference talks are being delivered by world renowned and most regarded speakers from around the world. Below is the conference schedule listing confirmed speakers and talks. Couple of talks are under review by the CFP (Call For Papers) Committee and shall be available as soon as those are confirmed. Event also follows two days of InfoSec trainings to be delivered in association with SANS, ISC2 and other organizations.&amp;lt;/font&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&amp;amp;nbsp;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;table border=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot; style=&amp;quot;border-collapse:&lt;br /&gt;
 collapse;width:100%&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;23&amp;quot; style=&amp;quot;height:17.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;23&amp;quot; style=&amp;quot;height: 17.25pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Where &amp;amp;gt;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 309px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #333399&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 1&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 318px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #3366FF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 2&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 333px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #00CCFF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 3:&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;19&amp;quot; style=&amp;quot;height:14.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;19&amp;quot; style=&amp;quot;height: 14.25pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Who &amp;amp;gt;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 309px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #333399&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Security Researchers &amp;amp;amp; Enthusiasts)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 318px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #3366FF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Security Auditors, Developers, QA, Architects)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 333px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #00CCFF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Leaders, Managers, C&amp;amp;amp;S professionals)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Schedule&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;10&amp;quot; height=&amp;quot;285&amp;quot; width=&amp;quot;24&amp;quot; style=&amp;quot;height: 213.75pt; width: 18pt; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid black; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&lt;br /&gt;
http://www.owasp.org/images/5/59/Day1.gif&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;9:00AM&amp;amp;nbsp;&amp;amp;nbsp; - 10:30AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #DBE5F1&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Keynote Sessions&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;10:30AM - 11:00AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C5BE97&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Tea break &amp;amp;amp; Snacks on Exhibition Floor&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;11:00AM - 12:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		Active Man in the Middle&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Adi Sharabani, IBM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;How To Blackbox Test Almost Anything&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Aviram Jenik, Beyond Security&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;The International State of Cyber Security, Risk &lt;br /&gt;
		reduction in a high threat world&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Howard A. Schmidt, Former Cyber Security Advisor to &lt;br /&gt;
		the White house&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;12:00PM - 1:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Reconsidering Network Defenses or NOT !&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Cedric Blancher, EADS Innovation Works&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Lust 2.0 – Desire for free WiFi and the threat of the &lt;br /&gt;
		Imposter&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Lava Kumar Kuppan, Independent Security Researcher&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Applications - The new cyber security frontier&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Mano Paul, Software Assurance Advisor (ISC)2&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;1:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 2:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FAC090&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Lunch&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;2:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 3:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Exploiting Firefox Extensions&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Roberto Suggi Liverani, Security-Assessment.com&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Threat Modeling&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Varun Sharma, Microsoft Corp.&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Behind the scenes at the Microsoft Security Response &lt;br /&gt;
		Center&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Dave Midturi and Suresh Venkateswaran, Microsoft &lt;br /&gt;
		Security Response Center&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;3:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 4:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;SQL Server Forensics 2.0&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Kevvie Fowler, TELUS &amp;amp;amp; Ringzero&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Nitin Kumar/Vipin Kumar, Independent Security &lt;br /&gt;
		Researchers, Nvlabs&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Business Case-Risk Management/Compliance at leading &lt;br /&gt;
		Education Group at AMITY&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Dr J.S Sodhi, AMITY&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;4:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 4:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Business Continuity Case Study&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Venkataram Arabolu, BSI&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Usability and Privacy in Security&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Ponnurangam Kumaraguru, IIIT&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;4:30 PM&amp;amp;nbsp;&amp;amp;nbsp; - 5:30 PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C5BE97&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Tea break &amp;amp;amp; Snacks on Exhibition Floor&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;15&amp;quot; style=&amp;quot;height:11.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;15&amp;quot; style=&amp;quot;height: 11.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;7:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 10:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #DBE5F1&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;India Technology Leadership Summit 2009 (Exclusive by &lt;br /&gt;
		invitation only) -&amp;amp;quot; Information Security Concerns for Offshoring&amp;amp;quot;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;8&amp;quot; style=&amp;quot;height: 6.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;10&amp;quot; height=&amp;quot;8&amp;quot; style=&amp;quot;height: 6.0pt; width: 1070px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: white&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;23&amp;quot; style=&amp;quot;height:17.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;23&amp;quot; style=&amp;quot;height: 17.25pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Where &amp;amp;gt;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 309px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #333399&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 1&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 318px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #3366FF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 2&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 333px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #00CCFF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 3:&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;19&amp;quot; style=&amp;quot;height:14.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;19&amp;quot; style=&amp;quot;height: 14.25pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Who &amp;amp;gt;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 309px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #333399&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Security Researchers &amp;amp;amp; Enthusiasts)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 318px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #3366FF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Security Auditors, Developers, QA, Architects)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 333px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #00CCFF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Leaders, Managers, C&amp;amp;amp;S professionals)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Schedule&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;10&amp;quot; height=&amp;quot;257&amp;quot; width=&amp;quot;24&amp;quot; style=&amp;quot;height: 192.75pt; width: 18pt; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&lt;br /&gt;
		http://www.owasp.org/images/7/73/Day2.gif&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;9:00AM&amp;amp;nbsp;&amp;amp;nbsp; - 10:00AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #DBE5F1&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Round Table with Speakers / Industry Panel - &lt;br /&gt;
		&amp;amp;quot;Security Today &amp;amp;amp; Tomorrow'&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;10:00AM - 10:30AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C5BE97&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Tea break &amp;amp;amp; Snacks on Exhibition Floor&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;32&amp;quot; style=&amp;quot;height:24.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;32&amp;quot; style=&amp;quot;height: 24.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;10:30AM - 11:30AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Ten Things Web Developers Still Aren't Doing&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Frank Kim, ThinkSec Consulting&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;SANS Dshield Webhoneypot Project&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Jason Lam, Independent Security Researcher&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Critical Infrastructure Security “Danger Without &lt;br /&gt;
		borders”&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;John Bumgarner, US Cyber Consequence Unit (USCCU)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;32&amp;quot; style=&amp;quot;height:24.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;32&amp;quot; style=&amp;quot;height: 24.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;11:30AM - 12:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Cloud Hacking – Distributed Attack &amp;amp;amp; Exploit Platform&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Shreeraj Shah, Blueinfy Solutions&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Testing JSON Applications For Security Holes&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Aviram Jenik, Beyond Security&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Critical Infrastructure Security “Danger Without &lt;br /&gt;
		borders”&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;John Bumgarner, US Cyber Consequence Unit (USCCU)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;12:30PM&amp;amp;nbsp; - 1:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FAC090&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Lunch&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;1:30PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 2:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;All Your Packets Belong to Us - Attacking Backbone &lt;br /&gt;
		Technologies&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Daniel Mende, Security Researcher, ERNW&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Risk based Penetration Testing&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;K. K. Mookhey, Founder &amp;amp;amp; Principal Consultant, NII &lt;br /&gt;
		Consulting&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Wi-Fi security: the good, the bad and the ugly&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Cedric Blancher, EADS Innovation Works&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;32&amp;quot; style=&amp;quot;height:24.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;32&amp;quot; style=&amp;quot;height: 24.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;2:30PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 3:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Xprobe3 - What's New? Going Application Level&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Fyodor Yarochkin, Guard-info&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;OWASP SAMM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Pravir Chandra, OWASP&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Do you wanna Play a Game Game theory and Cyberwar&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Bryan K. Fite, HackSecKlahn&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;3:30PM-4:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C5BE97&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Tea break &amp;amp;amp; Snacks on Exhibition Floor&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;32&amp;quot; style=&amp;quot;height:24.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;32&amp;quot; style=&amp;quot;height: 24.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;4:00 PM&amp;amp;nbsp;&amp;amp;nbsp; - 5:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Rumbling Infections – Web Malware Ontology&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Aditya K. Sood, COSEINC&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;Hacking Oracle From Web&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Sid, Independent Security Researcher&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Connected Information Security Framework&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Anil Kumar Chintala, Microsoft&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;5:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 5:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #DBE5F1&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Closing Remarks by Organizing Committee&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Trainings  ====&lt;br /&gt;
&lt;br /&gt;
== Two Day Trainings  ==&lt;br /&gt;
&lt;br /&gt;
Two days post-conference are dedicated towards best-of-breed trainings being conducted in association with SANS, ISC2 and other organizations. Trainings tracks have been made available as One-Day tracks and Two-Day tracks scheduled for 19th &amp;amp;amp; 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 1 - 19th Nov, 2009'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 2 - 20th Nov, 2009'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course ID''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course Duration''' &lt;br /&gt;
(# of Days) &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course Title''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Instructor''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course ID''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course Duration''' &lt;br /&gt;
(# of Days) &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course Title''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Instructor'''&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;30&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''One Day Training Tracks'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DHSO''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Oracle_Hacking_and_security ORACLE Hacking &amp;amp;amp; Security]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Sumit Sidharth,[[Image:Sb logo.png|center|78x50px|link=http://www.securitybyte.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DAWH''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Advanced_Web_Hacking Advanced Web Hacking -Securing AJAX, RIA &amp;amp;amp; SOA]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Shreeraj Shah [[Image:Blueinfy logo.png|center|link=http://www.blueinfy.com]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DAFT'''&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Advanced_Forensic_Techniques Advanced Forensics Techniques]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Dr. Chandrasekhar Umapathy,[[Image:Sb logo.png|center|78x50px|link=http://www.securitybyte.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DIAT'''&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/InDepth_Assessment_Techniques In-depth Assessment Techniques: Design, Code, and Runtime]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Fydor Yarochkin, &lt;br /&gt;
&lt;br /&gt;
[[Image:Logo_Armorize.JPG‎|center|93x31px|link=http://www.armorize.com]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;30&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Two Day Training Tracks'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DNST''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Building_Advanced_Network_Security_tools Building advanced Network Security Tools]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Daniel Mende,[[Image:Ernw logo.png|center]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DNST''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Building_Advanced_Network_Security_tools Building advanced Network Security Tools]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Daniel Mende,[[Image:Ernw logo.png|center]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DCBC''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/ISC2_CSSLP_CBK_Bootcamp (ISC)2 CSSLP CBK Boot camp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Mano Paul,[[Image:Isc logo.png|center|78x50px|link=http://www.isc2.org]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DCBC''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/ISC2_CSSLP_CBK_Bootcamp (ISC)2 CSSLP CBK Boot camp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Mano Paul,[[Image:Isc logo.png|center|78x50px|link=http://www.isc2.org]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSCJ / SANS Course ID&amp;amp;nbsp;: DEV530''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_Essential_Secure_Coding_Java_JEE_GSSP Essential Secure Coding in Java / JEE]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSCJ / SANS Course ID&amp;amp;nbsp;: DEV530''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_Essential_Secure_Coding_Java_JEE_GSSP Essential Secure Coding in Java / JEE]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DWPT / SANS Course ID&amp;amp;nbsp;: DEV538''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_WebApp_Pentesting_handsOn_immersion Web Application Pen Testing Hands-On Immersion]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DWPT / SANS Course ID&amp;amp;nbsp;: DEV538''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_WebApp_Pentesting_handsOn_immersion Web Application Pen Testing Hands-On Immersion]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSAB / SANS Course ID&amp;amp;nbsp;: AUD429''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_IT_Security_Audit_Bootcamp IT Security Audit Essentials Bootcamp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSAB / SANS Course ID&amp;amp;nbsp;: AUD429''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_IT_Security_Audit_Bootcamp IT Security Audit Essentials Bootcamp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Venue  ====&lt;br /&gt;
&lt;br /&gt;
Four Days Event is planned out at: &lt;br /&gt;
&lt;br /&gt;
[http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza,]&amp;lt;br&amp;gt;Site - 2, Sector - 29, &amp;lt;br&amp;gt;Gurgaon-122001 (National Capital Region), India&amp;lt;br&amp;gt;Hotel Front Desk: 91-124-4534000&amp;lt;br&amp;gt;Hotel Fax: 91-124-4304800&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | '''Co-Sponsor &amp;quot;Leadership Summit 2009&amp;quot;'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | '''CTF&amp;amp;nbsp;(Capture The Flag) Sponsor'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | '''Education &amp;amp;nbsp;Partner'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:20th green stacked.png|center|ISC2|link=http://www.isc2.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
| [[Image:Appin.jpg|center|link=http://www.appinsecurity.com]]&amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
| [[Image:BRIP-Logo.jpg|center|link=http://www.brip.co.in]]&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
[[Image:Beyond-logo_large.jpg|Left|link=http://www.www.beyondsecurity.com]]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;b&amp;gt;Innovation &amp;amp;nbsp;Partner&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
[[Image:IBM.gif|Left|link=http://www.www.ibm.com]]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Associate Sponsors'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;90&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Media Partners'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Supporters'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Torridn.jpg|center|link=http://www.torridnetworks.com]] &lt;br /&gt;
| [[Image:SSecurity_india_small.gif‎ |center|link=http://www.searchsecurity.in]]&lt;br /&gt;
| [[Image:HITB.jpg|center|link=http://conference.hitb.org]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:SecurityCompass.JPG|center|link=http://www.securitycompass.com]] &lt;br /&gt;
| [[Image:HNS-web.jpg|center|link=http://www.net-security.org]] &lt;br /&gt;
| [[Image:Sector.jpg|center|link=http://www.sector.ca]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Logo_Armorize.JPG|center|link=http://www.armorize.com]] &amp;lt;br&amp;gt;‎ &lt;br /&gt;
| [[Image:Infosecurity.jpg|center|link=http://www.infosecuritymagz.com]] &amp;lt;br&amp;gt;&lt;br /&gt;
| [[Image:Clubhack.gif|center]]&amp;lt;br&amp;gt;[[Image:Eventavenue Logo.jpg|center|link=https://www.eventavenue.com]]&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:eads.jpg|center|link=http://www.eads.com]]&amp;lt;br&amp;gt;&lt;br /&gt;
| [[Image:Itmagz.jpg|center]]&amp;amp;nbsp;[[Image:Electronicsf.jpg|center|link=http://www.electronicsforu.com]] &lt;br /&gt;
| [[Image:Crowne plaza.jpg|center|link=http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;b&amp;gt;Knowledge &amp;amp;nbsp;Partner&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
[[Image:BSI.gif|Left|link=http://www.www.bsigroup.co.in]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
[[Image:OISSG-small.jpg‎|Left|link=http://www.www.bsigroup.co.in]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
==== Hotel &amp;amp; Travel  ====&lt;br /&gt;
&lt;br /&gt;
== Hotel Stay &amp;amp; Travel Information  ==&lt;br /&gt;
&lt;br /&gt;
To help our valued delegates with Hotel and Travel services, we have negotiated with some of the best and Budget Category Guest houses in Gurgaon that are located within a radius of 3 - 4 Kms from the venue.&lt;br /&gt;
&lt;br /&gt;
Limited cheaper accommodation is available near the venue hotel in budget hotels/apartments area. The tariff of these hotels ranges from Rs.2000 onwards per room night (inclusive of Room Rent, Breakfast and Luxury Tax).  Interested delegates / students can send a formal request for the desired accommodations and dates to our official travel agent.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;OFFICIAL TRAVEL AGENT&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dreamz conference Management Pvt.Ltd&amp;lt;/b&amp;gt; will look after your hotel accommodation in Gurgaon and New Delhi, pre &amp;amp; post conference tours / travel needs in India for delegates and visitors independently. If you wish to go for sightseeing tour within New Delhi and around it to places like Agra, Jaipur, Rajasthan etc. However, we would encourage you to make early bookings which will be done on “first – come - first service” basis and let us know of your interest, since that would ultimately work in your favour. Early reservation is strongly recommended as November being a high demand period for hotels in Gurgaon.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
For further details please contact:&lt;br /&gt;
&lt;br /&gt;
DREAMZ CONFERENCE MANAGEMENT PVT.LTD&lt;br /&gt;
&lt;br /&gt;
406, Ansal’s Majestic Tower, Vikas Puri, New Delhi – 110018&lt;br /&gt;
&lt;br /&gt;
Tel: 91 – 11 – 41586401, 402, Fax: 91 – 11 – 41586400&lt;br /&gt;
&lt;br /&gt;
Email: info@dreamztravel.net / dreamztravelindia@yahoo.com&lt;br /&gt;
&lt;br /&gt;
Website: www.dreamztravel.net&lt;br /&gt;
&lt;br /&gt;
Contact Person: Jitin Batra ( +91 9810558569 )&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==== Capture the Flag  ====&lt;br /&gt;
&lt;br /&gt;
== HackHunt 2009  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;India's foremost Hacking Challenge &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Your Shot to the Title of India's best hacker along with Prize money of more than &amp;lt;b&amp;gt;Rs 150,000&amp;lt;/b&amp;gt; up for grabs!&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Search for India’s Best Ethical Hacker &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
HackHunt is India’s leading hacking competition and aims at awarding the best ethical hackers in the country. The competition is brought to you by Appin Security Group, a leading Information Security and Ethical Hacking Company and Securitybyte, a global Information Security Conference Company. &lt;br /&gt;
&lt;br /&gt;
The competition will be conducted in 3 phases. The 1st two rounds will be online and the 3rd and final round will take place at“Securitybyte &amp;amp; OWASP Appsec Asia 2009” on November 17, 2009at Crowne Plaza, Gurgaon. &lt;br /&gt;
&lt;br /&gt;
Level 1 – Knowledge Check&lt;br /&gt;
All the participants will be answering a quiz and based on the score top 10% will be shortlisted to 2nd round.&lt;br /&gt;
&lt;br /&gt;
Level 2 – Skill Check&lt;br /&gt;
This stage will require an attacker to get to the final FLAG file which he/she would need to register for the event.&lt;br /&gt;
&lt;br /&gt;
Level 3 – Final Round&lt;br /&gt;
This stage will require the attackers to exploit a pre-announced SSID which has WPA (or wpa 2).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To participate and for more details visit website :- http://www.hackerscouncil.org/&lt;br /&gt;
&lt;br /&gt;
== PacketWars  ==&lt;br /&gt;
&amp;lt;b&amp;gt;First time in India brought to you by Securitybyte! &amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;                                              &lt;br /&gt;
About PacketWars&lt;br /&gt;
&lt;br /&gt;
PacketWars is an intense, real-time information warfare simulation. Unlike other “capture the flag” games, the battlegrounds featured in PacketWars use the same software and hardware you would encounter in the real world.&lt;br /&gt;
&lt;br /&gt;
PacketWars is designed to operate like a sport. Think Formula One Racing meets professional golf with a dash of Ultimate Fighting thrown in for good measure. Serious fun!&lt;br /&gt;
&lt;br /&gt;
Visit http://packetwars.com/ for more details.&lt;br /&gt;
How To Play?&lt;br /&gt;
&lt;br /&gt;
PacketWars is a Sport like nothing you have ever experienced! Games known as “BATTLES” pit individual players and teams against each other in a race to achieve defined objectives.&lt;br /&gt;
&lt;br /&gt;
The rules of engagement are simple:&lt;br /&gt;
- Illegal activity of any kind is prohibited&lt;br /&gt;
- Protect yourself at all times&lt;br /&gt;
- Battles are designed to be of a low, medium or high difficulty level based on the battle objectives and battle duration&lt;br /&gt;
- Primary, Secondary and Tertiary objectives are defined and assigned points based on difficulty&lt;br /&gt;
- Battles have time limits and other defined constraints&lt;br /&gt;
- Constraints are sometimes known to the combatants and other times are not&lt;br /&gt;
- Anything that is not expressly prohibited is allowed&lt;br /&gt;
- Points are awarded for FLARE&lt;br /&gt;
&lt;br /&gt;
Equipment Needed:&lt;br /&gt;
- Most combants use a notebook and a BackTrack CD however you are only limited by your imagination and bank account&lt;br /&gt;
- You need a battle field and a PacketMaster…Oh yeah, skillz come in handy also!How To Play&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b.How can I participate?&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
PacketWars to be held at the Hotel Crowne Plaza, Gurgaon on Nov 17 &amp;amp; Nov 18, 2009. Participation is FREE! Schedule will be announced soon.&lt;br /&gt;
&lt;br /&gt;
== WebWar III  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;About&amp;lt;/b&amp;gt;&lt;br /&gt;
Hackers attack, coders defend, when you get them together you end up with Web War III. WWIII is designed to put your Web Application attack and defense skills to the test.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Teams&amp;lt;/b&amp;gt;&lt;br /&gt;
Each team consists of two players, an attacker and a defender. The attacker would be capable of identifying Web Application Vulnerabilities (OWASP Top 10). The defender would be capable of writing secure Java code.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Game Format&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The game has two stages:&lt;br /&gt;
&lt;br /&gt;
Stage 1:&lt;br /&gt;
Each team is given a VM Ware image containing a web server hosting a vulnerable web application. During this stage each team identifies the vulnerabilities in their application.&lt;br /&gt;
They try to fix the identified vulnerabilities by making code changes.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Stage 2:&lt;br /&gt;
The IP addresses of the Web Server's of all the teams is announced.&lt;br /&gt;
Each team looks for vulnerabilities in the Web Applications of the other teams.&lt;br /&gt;
Vulnerabilities found on the opponents' application get positive points.&lt;br /&gt;
Vulnerabilities found by the opponents on your application get negative points.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Team with the highest points at the end of Stage 2 wins.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Tools and Equipments&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Each team should bring their own laptop with VM Ware installed.&lt;br /&gt;
The attacker can use any tools they bring.&lt;br /&gt;
The applications come with ESAPI to help the defenders fix the code quicker.&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
==== Leadership Summit 2009  ====&lt;br /&gt;
&amp;lt;b&amp;gt;India's top technology thought leaders coming together to discuss &amp;quot;Security concerns in off-shoring&amp;quot;&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Honored Guests&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
-Honorable Former President of India, Dr. A.P.J Abdul Kalam to inaugrate the Leadership Summit 2009.&amp;lt;br&amp;gt;&lt;br /&gt;
-Prof. Howard A. Schmidt(Advisor, NIST; Former Vice Chair - President’s Critical Infrastructure Board; Former Special Advisor – Cyberspace Security for White House)&amp;lt;br&amp;gt;&lt;br /&gt;
-Mr. Hord Tipton, Executive Director (ISC)2&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;About the Event&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
An elite gathering of 200 technology leaders, decision makers &amp;amp; InfoSec experts from leading service providers, government agencies and various industry verticals.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Two hours of panel discussions between three panels of 12 distinguished industry experts representing outsourcing companies, service providers and the regulatory bodies.  Panel discussions will be followed by networking dinner &amp;amp; cocktails.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Prof Howard A. Schmidt (Advisor, NIST; Former Vice Chair - President’s Critical Infrastructure Board; Former Special Advisor – Cyberspace Security for White House) will facilitate the panel discussions. Thought leaders participating in the panel discussions are:&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Outsourcing Organizations&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Raghavendra Vaidya, CIO - GE Capital India&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. CRN Vairavelu, VP - Ford Technology Services India&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Pankaj Agrawal, CISO - Aircel Limited&amp;lt;br&amp;gt;&lt;br /&gt;
TBD&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Service Providers&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Terry Thomas, Partner - Ernst &amp;amp; Young&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Debashis Ghosh, Head (LS&amp;amp;H ISU) - Tata Consultancy Services&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Sunil Gujral, EVP &amp;amp; CTO - Quatrro&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Sunil Goyal, COO - Sopra group&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Regulatory Bodies&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Dr. Kamlesh Bajaj, CEO - DSCI (a NASSCOM initiative)&amp;lt;br&amp;gt;&lt;br /&gt;
Dr. Gulshan Rai, Director - CERT-in&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Hord Tipton, Executive Director - ISC2 (ex CIO, US Department of Interior)&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Vakul Sharma, Lawyer - Supreme Court&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The event is exclusive to industry leaders and is by private invitation only. If you are interested in attending the event, please email your business card to info@securitybyte.org This e-mail address is being protected from spambots.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Venue - Hotel Crowne Plaza, Gurgaon | Timings - 5:30PM - 9:00PM&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
Please contact [http://www.owasp.org/index.php/Category:India#OWASP_India_Co-Chairs Chair - OWASP India] for sponsorship opportunities. &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Category:India Category: OWASP India]&lt;/div&gt;</summary>
		<author><name>Puneetm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SecurityByte_and_OWASP_Asia_AppSec_Conference_2009&amp;diff=73363</id>
		<title>SecurityByte and OWASP Asia AppSec Conference 2009</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SecurityByte_and_OWASP_Asia_AppSec_Conference_2009&amp;diff=73363"/>
				<updated>2009-11-14T07:08:29Z</updated>
		
		<summary type="html">&lt;p&gt;Puneetm: /* Two Days Conference */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:SB OWASP 2009 banner.gif|center|link=http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009]]&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza] &amp;amp;#124; [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Registrations]&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*&amp;lt;b&amp;gt;Only One Week Left ! Register Online today to grab your seat for India's best Security Conference.&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;Honorable Former President of India, Dr. A.P.J Abdul Kalam to Inaugrate the India Technology Leadership Summit 2009. &amp;lt;/b&amp;gt;This event is an Invitation ONLY event.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Registrations Click Here]''' for more information.&lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
Securitybyte &amp;amp;amp; OWASP are proud to welcome you to the annual international information security conference – Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009, Nov 17th through Nov 20th in Delhi &amp;amp;amp; NCR, India. &lt;br /&gt;
&lt;br /&gt;
This is a landmark event, as both Securitybyte and OWASP join hands to present India’s largest InfoSec event with world renowned and most regarded international speakers. &lt;br /&gt;
&lt;br /&gt;
Securitybye &amp;amp;amp; OWASP AppSec Asia Conference 2009 will be held at [http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza, Gurgaon, NCR, India.] on 17th November through 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Security Researchers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Penetration Testers &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*IT Security Professionals &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
&lt;br /&gt;
==== About  ====&lt;br /&gt;
&lt;br /&gt;
== About Conference  ==&lt;br /&gt;
&lt;br /&gt;
Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel conference talks to be conducted in 3 separate halls for two days i.e . 17th &amp;amp;amp; 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular talk. Conference talks are being delivered by world renowned and most regarded speakers from around the world. &lt;br /&gt;
&lt;br /&gt;
== About Trainings  ==&lt;br /&gt;
&lt;br /&gt;
Two days post-conference are dedicated towards best-of-breed trainings being conducted in association with SANS, ISC2 and other organizations. Trainings tracks have been made available as One-Day tracks and Two-Day tracks scheduled for 19th &amp;amp;amp; 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
==== Registrations  ====&lt;br /&gt;
&lt;br /&gt;
== [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Registration] is now open!  ==&lt;br /&gt;
&lt;br /&gt;
=== You can register [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 here]  ===&lt;br /&gt;
&lt;br /&gt;
*[http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Click Here] for Online Registrations. &lt;br /&gt;
*[http://securitybyte.org/index.php/register.html Click Here] for Offline Registrations.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Please check out our Exclusive Discount Offer, available Starting October 6th - 15th, 2009. &amp;quot;SAVE BIG NOW !&amp;quot;&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''''The below pricing reflects the Standard Registration Prices .''''' &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Two Days of Conference (17th and 18th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.8,500/- INR &lt;br /&gt;
| General Public&lt;br /&gt;
|-&lt;br /&gt;
| Two Days of Conference (17th and 18th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.5,000/- INR &lt;br /&gt;
| Students&lt;br /&gt;
|-&lt;br /&gt;
| Two-Day Training Tracks (19th and 20th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.25,000/- INR&lt;br /&gt;
|-&lt;br /&gt;
| One-Day Training Tracks (19th OR 20th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.12,500/- INR&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;** Service Tax @ 10.3% will be charged extra.&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;ISC2&amp;lt;/b&amp;gt; Members can avail a Special 15% discount on Conference &amp;amp; Training Registration.&lt;br /&gt;
(Please provide your ISC2 Certification ID number to avail the above Discount)&lt;br /&gt;
For Registrations contact us at registrations@securitybyte.org&lt;br /&gt;
== Exclusive Offers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;- Group / Team Discounts available: Kindly contact us at registrations@securitybyte.org&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Special University Student discount&amp;lt;/b&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
- University Students can register for two days of conference for just Rs. 5000 (including taxes)&amp;lt;br&amp;gt;&lt;br /&gt;
- Special 15 % Discounts for Training registration&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Trainings Click here for details on the training courses that are available.]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Who Should Attend Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009: ==&lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Security Researchers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Penetration Testers &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*IT Security Professionals &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;For student discount, attendees must present proof of enrollment when picking up your badge. &lt;br /&gt;
&lt;br /&gt;
==== Schedule  ====&lt;br /&gt;
&lt;br /&gt;
Three parallel conference talks are scheduled for 17th &amp;amp;amp; 18th November 2009 in three different halls. Training tracks have been divided in one-day tracks scheduled for 19th or 20th November 2009 and two-day tracks those are schedule to continue for two days both on 19th &amp;amp;amp; 20th November 2009. Follow the tabs to learn the details on both conference and trainings. &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Conference Click here] to view the '''Conference Schedule''' for 17th &amp;amp;amp; 18th November 2009.&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Trainings Click here] to view '''Training Schedule''' on 19th &amp;amp;amp; 20th November 2009.&lt;br /&gt;
&lt;br /&gt;
==== Conference  ====&lt;br /&gt;
&lt;br /&gt;
== Two Days Conference  ==&lt;br /&gt;
&amp;lt;p&amp;gt;&amp;lt;font face=&amp;quot;Arial&amp;quot; size=&amp;quot;2&amp;quot;&amp;gt;Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel training sessions to be conducted in 3 separate halls for two days i.e . 17th &amp;amp;amp; 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular session. Conference talks are being delivered by world renowned and most regarded speakers from around the world. Below is the conference schedule listing confirmed speakers and talks. Couple of talks are under review by the CFP (Call For Papers) Committee and shall be available as soon as those are confirmed. Event also follows two days of InfoSec trainings to be delivered in association with SANS, ISC2 and other organizations.&amp;lt;/font&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&amp;amp;nbsp;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;table border=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot; style=&amp;quot;border-collapse:&lt;br /&gt;
 collapse;width:100%&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;23&amp;quot; style=&amp;quot;height:17.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;23&amp;quot; style=&amp;quot;height: 17.25pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Where &amp;amp;gt;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 309px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #333399&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 1&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 318px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #3366FF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 2&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 333px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #00CCFF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 3:&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;19&amp;quot; style=&amp;quot;height:14.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;19&amp;quot; style=&amp;quot;height: 14.25pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Who &amp;amp;gt;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 309px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #333399&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Security Researchers &amp;amp;amp; Enthusiasts)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 318px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #3366FF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Security Auditors, Developers, QA, Architects)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 333px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #00CCFF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Leaders, Managers, C&amp;amp;amp;S professionals)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Schedule&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;10&amp;quot; height=&amp;quot;285&amp;quot; width=&amp;quot;24&amp;quot; style=&amp;quot;height: 213.75pt; width: 18pt; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid black; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;img border=&amp;quot;0&amp;quot; src=&amp;quot;/images/7/73/Day1.gif&amp;quot; width=&amp;quot;25&amp;quot; height=&amp;quot;271&amp;quot;&amp;gt; &amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;9:00AM&amp;amp;nbsp;&amp;amp;nbsp; - 10:30AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #DBE5F1&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Keynote Sessions&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;10:30AM - 11:00AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C5BE97&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Tea break &amp;amp;amp; Snacks on Exhibition Floor&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;11:00AM - 12:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		Active Man in the Middle&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Adi Sharabani, IBM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;How To Blackbox Test Almost Anything&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Aviram Jenik, Beyond Security&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;The International State of Cyber Security, Risk &lt;br /&gt;
		reduction in a high threat world&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Howard A. Schmidt, Former Cyber Security Advisor to &lt;br /&gt;
		the White house&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;12:00PM - 1:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Reconsidering Network Defenses or NOT !&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Cedric Blancher, EADS Innovation Works&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Lust 2.0 – Desire for free WiFi and the threat of the &lt;br /&gt;
		Imposter&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Lava Kumar Kuppan, Independent Security Researcher&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Applications - The new cyber security frontier&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Mano Paul, Software Assurance Advisor (ISC)2&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;1:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 2:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FAC090&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Lunch&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;2:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 3:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Exploiting Firefox Extensions&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Roberto Suggi Liverani, Security-Assessment.com&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Threat Modeling&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Varun Sharma, Microsoft Corp.&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Behind the scenes at the Microsoft Security Response &lt;br /&gt;
		Center&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Dave Midturi and Suresh Venkateswaran, Microsoft &lt;br /&gt;
		Security Response Center&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;3:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 4:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;SQL Server Forensics 2.0&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Kevvie Fowler, TELUS &amp;amp;amp; Ringzero&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Nitin Kumar/Vipin Kumar, Independent Security &lt;br /&gt;
		Researchers, Nvlabs&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Business Case-Risk Management/Compliance at leading &lt;br /&gt;
		Education Group at AMITY&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Dr J.S Sodhi, AMITY&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;4:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 4:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Business Continuity Case Study&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Venkataram Arabolu, BSI&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Usability and Privacy in Security&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Ponnurangam Kumaraguru, IIIT&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;4:30 PM&amp;amp;nbsp;&amp;amp;nbsp; - 5:30 PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C5BE97&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Tea break &amp;amp;amp; Snacks on Exhibition Floor&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;15&amp;quot; style=&amp;quot;height:11.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;15&amp;quot; style=&amp;quot;height: 11.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;7:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 10:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #DBE5F1&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;India Technology Leadership Summit 2009 (Exclusive by &lt;br /&gt;
		invitation only) -&amp;amp;quot; Information Security Concerns for Offshoring&amp;amp;quot;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;8&amp;quot; style=&amp;quot;height: 6.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;10&amp;quot; height=&amp;quot;8&amp;quot; style=&amp;quot;height: 6.0pt; width: 1070px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: white&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;23&amp;quot; style=&amp;quot;height:17.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;23&amp;quot; style=&amp;quot;height: 17.25pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Where &amp;amp;gt;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 309px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #333399&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 1&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 318px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #3366FF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 2&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 333px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #00CCFF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 3:&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;19&amp;quot; style=&amp;quot;height:14.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;19&amp;quot; style=&amp;quot;height: 14.25pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Who &amp;amp;gt;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 309px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #333399&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Security Researchers &amp;amp;amp; Enthusiasts)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 318px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #3366FF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Security Auditors, Developers, QA, Architects)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 333px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #00CCFF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Leaders, Managers, C&amp;amp;amp;S professionals)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Schedule&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;10&amp;quot; height=&amp;quot;257&amp;quot; width=&amp;quot;24&amp;quot; style=&amp;quot;height: 192.75pt; width: 18pt; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&lt;br /&gt;
		http://www.owasp.org/images/7/73/Day2.gif&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;9:00AM&amp;amp;nbsp;&amp;amp;nbsp; - 10:00AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #DBE5F1&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Round Table with Speakers / Industry Panel - &lt;br /&gt;
		&amp;amp;quot;Security Today &amp;amp;amp; Tomorrow'&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;10:00AM - 10:30AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C5BE97&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Tea break &amp;amp;amp; Snacks on Exhibition Floor&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;32&amp;quot; style=&amp;quot;height:24.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;32&amp;quot; style=&amp;quot;height: 24.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;10:30AM - 11:30AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Ten Things Web Developers Still Aren't Doing&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Frank Kim, ThinkSec Consulting&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;SANS Dshield Webhoneypot Project&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Jason Lam, Independent Security Researcher&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Critical Infrastructure Security “Danger Without &lt;br /&gt;
		borders”&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;John Bumgarner, US Cyber Consequence Unit (USCCU)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;32&amp;quot; style=&amp;quot;height:24.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;32&amp;quot; style=&amp;quot;height: 24.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;11:30AM - 12:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Cloud Hacking – Distributed Attack &amp;amp;amp; Exploit Platform&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Shreeraj Shah, Blueinfy Solutions&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Testing JSON Applications For Security Holes&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Aviram Jenik, Beyond Security&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Critical Infrastructure Security “Danger Without &lt;br /&gt;
		borders”&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;John Bumgarner, US Cyber Consequence Unit (USCCU)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;12:30PM&amp;amp;nbsp; - 1:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FAC090&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Lunch&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;1:30PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 2:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;All Your Packets Belong to Us - Attacking Backbone &lt;br /&gt;
		Technologies&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Daniel Mende, Security Researcher, ERNW&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Risk based Penetration Testing&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;K. K. Mookhey, Founder &amp;amp;amp; Principal Consultant, NII &lt;br /&gt;
		Consulting&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Wi-Fi security: the good, the bad and the ugly&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Cedric Blancher, EADS Innovation Works&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;32&amp;quot; style=&amp;quot;height:24.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;32&amp;quot; style=&amp;quot;height: 24.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;2:30PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 3:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Xprobe3 - What's New? Going Application Level&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Fyodor Yarochkin, Guard-info&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;OWASP SAMM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Pravir Chandra, OWASP&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Do you wanna Play a Game Game theory and Cyberwar&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Bryan K. Fite, HackSecKlahn&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;3:30PM-4:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C5BE97&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Tea break &amp;amp;amp; Snacks on Exhibition Floor&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;32&amp;quot; style=&amp;quot;height:24.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;32&amp;quot; style=&amp;quot;height: 24.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;4:00 PM&amp;amp;nbsp;&amp;amp;nbsp; - 5:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Rumbling Infections – Web Malware Ontology&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Aditya K. Sood, COSEINC&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;Hacking Oracle From Web&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Sid, Independent Security Researcher&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Connected Information Security Framework&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Anil Kumar Chintala, Microsoft&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;5:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 5:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #DBE5F1&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Closing Remarks by Organizing Committee&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Trainings  ====&lt;br /&gt;
&lt;br /&gt;
== Two Day Trainings  ==&lt;br /&gt;
&lt;br /&gt;
Two days post-conference are dedicated towards best-of-breed trainings being conducted in association with SANS, ISC2 and other organizations. Trainings tracks have been made available as One-Day tracks and Two-Day tracks scheduled for 19th &amp;amp;amp; 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 1 - 19th Nov, 2009'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 2 - 20th Nov, 2009'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course ID''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course Duration''' &lt;br /&gt;
(# of Days) &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course Title''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Instructor''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course ID''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course Duration''' &lt;br /&gt;
(# of Days) &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course Title''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Instructor'''&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;30&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''One Day Training Tracks'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DHSO''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Oracle_Hacking_and_security ORACLE Hacking &amp;amp;amp; Security]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Sumit Sidharth,[[Image:Sb logo.png|center|78x50px|link=http://www.securitybyte.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DAWH''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Advanced_Web_Hacking Advanced Web Hacking -Securing AJAX, RIA &amp;amp;amp; SOA]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Shreeraj Shah [[Image:Blueinfy logo.png|center|link=http://www.blueinfy.com]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DAFT'''&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Advanced_Forensic_Techniques Advanced Forensics Techniques]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Dr. Chandrasekhar Umapathy,[[Image:Sb logo.png|center|78x50px|link=http://www.securitybyte.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DIAT'''&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/InDepth_Assessment_Techniques In-depth Assessment Techniques: Design, Code, and Runtime]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Fydor Yarochkin, &lt;br /&gt;
&lt;br /&gt;
[[Image:Logo_Armorize.JPG‎|center|93x31px|link=http://www.armorize.com]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;30&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Two Day Training Tracks'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DNST''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Building_Advanced_Network_Security_tools Building advanced Network Security Tools]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Daniel Mende,[[Image:Ernw logo.png|center]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DNST''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Building_Advanced_Network_Security_tools Building advanced Network Security Tools]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Daniel Mende,[[Image:Ernw logo.png|center]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DCBC''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/ISC2_CSSLP_CBK_Bootcamp (ISC)2 CSSLP CBK Boot camp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Mano Paul,[[Image:Isc logo.png|center|78x50px|link=http://www.isc2.org]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DCBC''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/ISC2_CSSLP_CBK_Bootcamp (ISC)2 CSSLP CBK Boot camp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Mano Paul,[[Image:Isc logo.png|center|78x50px|link=http://www.isc2.org]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSCJ / SANS Course ID&amp;amp;nbsp;: DEV530''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_Essential_Secure_Coding_Java_JEE_GSSP Essential Secure Coding in Java / JEE]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSCJ / SANS Course ID&amp;amp;nbsp;: DEV530''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_Essential_Secure_Coding_Java_JEE_GSSP Essential Secure Coding in Java / JEE]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DWPT / SANS Course ID&amp;amp;nbsp;: DEV538''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_WebApp_Pentesting_handsOn_immersion Web Application Pen Testing Hands-On Immersion]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DWPT / SANS Course ID&amp;amp;nbsp;: DEV538''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_WebApp_Pentesting_handsOn_immersion Web Application Pen Testing Hands-On Immersion]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSAB / SANS Course ID&amp;amp;nbsp;: AUD429''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_IT_Security_Audit_Bootcamp IT Security Audit Essentials Bootcamp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSAB / SANS Course ID&amp;amp;nbsp;: AUD429''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_IT_Security_Audit_Bootcamp IT Security Audit Essentials Bootcamp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Venue  ====&lt;br /&gt;
&lt;br /&gt;
Four Days Event is planned out at: &lt;br /&gt;
&lt;br /&gt;
[http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza,]&amp;lt;br&amp;gt;Site - 2, Sector - 29, &amp;lt;br&amp;gt;Gurgaon-122001 (National Capital Region), India&amp;lt;br&amp;gt;Hotel Front Desk: 91-124-4534000&amp;lt;br&amp;gt;Hotel Fax: 91-124-4304800&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | '''Co-Sponsor &amp;quot;Leadership Summit 2009&amp;quot;'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | '''CTF&amp;amp;nbsp;(Capture The Flag) Sponsor'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | '''Education &amp;amp;nbsp;Partner'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:20th green stacked.png|center|ISC2|link=http://www.isc2.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
| [[Image:Appin.jpg|center|link=http://www.appinsecurity.com]]&amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
| [[Image:BRIP-Logo.jpg|center|link=http://www.brip.co.in]]&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
[[Image:Beyond-logo_large.jpg|Left|link=http://www.www.beyondsecurity.com]]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;b&amp;gt;Innovation &amp;amp;nbsp;Partner&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
[[Image:IBM.gif|Left|link=http://www.www.ibm.com]]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Associate Sponsors'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;90&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Media Partners'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Supporters'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Torridn.jpg|center|link=http://www.torridnetworks.com]] &lt;br /&gt;
| [[Image:SSecurity_india_small.gif‎ |center|link=http://www.searchsecurity.in]]&lt;br /&gt;
| [[Image:HITB.jpg|center|link=http://conference.hitb.org]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:SecurityCompass.JPG|center|link=http://www.securitycompass.com]] &lt;br /&gt;
| [[Image:HNS-web.jpg|center|link=http://www.net-security.org]] &lt;br /&gt;
| [[Image:Sector.jpg|center|link=http://www.sector.ca]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Logo_Armorize.JPG|center|link=http://www.armorize.com]] &amp;lt;br&amp;gt;‎ &lt;br /&gt;
| [[Image:Infosecurity.jpg|center|link=http://www.infosecuritymagz.com]] &amp;lt;br&amp;gt;&lt;br /&gt;
| [[Image:Clubhack.gif|center]]&amp;lt;br&amp;gt;[[Image:Eventavenue Logo.jpg|center|link=https://www.eventavenue.com]]&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:eads.jpg|center|link=http://www.eads.com]]&amp;lt;br&amp;gt;&lt;br /&gt;
| [[Image:Itmagz.jpg|center]]&amp;amp;nbsp;[[Image:Electronicsf.jpg|center|link=http://www.electronicsforu.com]] &lt;br /&gt;
| [[Image:Crowne plaza.jpg|center|link=http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;b&amp;gt;Knowledge &amp;amp;nbsp;Partner&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
[[Image:BSI.gif|Left|link=http://www.www.bsigroup.co.in]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
[[Image:OISSG-small.jpg‎|Left|link=http://www.www.bsigroup.co.in]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
==== Hotel &amp;amp; Travel  ====&lt;br /&gt;
&lt;br /&gt;
== Hotel Stay &amp;amp; Travel Information  ==&lt;br /&gt;
&lt;br /&gt;
To help our valued delegates with Hotel and Travel services, we have negotiated with some of the best and Budget Category Guest houses in Gurgaon that are located within a radius of 3 - 4 Kms from the venue.&lt;br /&gt;
&lt;br /&gt;
Limited cheaper accommodation is available near the venue hotel in budget hotels/apartments area. The tariff of these hotels ranges from Rs.2000 onwards per room night (inclusive of Room Rent, Breakfast and Luxury Tax).  Interested delegates / students can send a formal request for the desired accommodations and dates to our official travel agent.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;OFFICIAL TRAVEL AGENT&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dreamz conference Management Pvt.Ltd&amp;lt;/b&amp;gt; will look after your hotel accommodation in Gurgaon and New Delhi, pre &amp;amp; post conference tours / travel needs in India for delegates and visitors independently. If you wish to go for sightseeing tour within New Delhi and around it to places like Agra, Jaipur, Rajasthan etc. However, we would encourage you to make early bookings which will be done on “first – come - first service” basis and let us know of your interest, since that would ultimately work in your favour. Early reservation is strongly recommended as November being a high demand period for hotels in Gurgaon.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
For further details please contact:&lt;br /&gt;
&lt;br /&gt;
DREAMZ CONFERENCE MANAGEMENT PVT.LTD&lt;br /&gt;
&lt;br /&gt;
406, Ansal’s Majestic Tower, Vikas Puri, New Delhi – 110018&lt;br /&gt;
&lt;br /&gt;
Tel: 91 – 11 – 41586401, 402, Fax: 91 – 11 – 41586400&lt;br /&gt;
&lt;br /&gt;
Email: info@dreamztravel.net / dreamztravelindia@yahoo.com&lt;br /&gt;
&lt;br /&gt;
Website: www.dreamztravel.net&lt;br /&gt;
&lt;br /&gt;
Contact Person: Jitin Batra ( +91 9810558569 )&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==== Capture the Flag  ====&lt;br /&gt;
&lt;br /&gt;
== HackHunt 2009  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;India's foremost Hacking Challenge &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Your Shot to the Title of India's best hacker along with Prize money of more than &amp;lt;b&amp;gt;Rs 150,000&amp;lt;/b&amp;gt; up for grabs!&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Search for India’s Best Ethical Hacker &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
HackHunt is India’s leading hacking competition and aims at awarding the best ethical hackers in the country. The competition is brought to you by Appin Security Group, a leading Information Security and Ethical Hacking Company and Securitybyte, a global Information Security Conference Company. &lt;br /&gt;
&lt;br /&gt;
The competition will be conducted in 3 phases. The 1st two rounds will be online and the 3rd and final round will take place at“Securitybyte &amp;amp; OWASP Appsec Asia 2009” on November 17, 2009at Crowne Plaza, Gurgaon. &lt;br /&gt;
&lt;br /&gt;
Level 1 – Knowledge Check&lt;br /&gt;
All the participants will be answering a quiz and based on the score top 10% will be shortlisted to 2nd round.&lt;br /&gt;
&lt;br /&gt;
Level 2 – Skill Check&lt;br /&gt;
This stage will require an attacker to get to the final FLAG file which he/she would need to register for the event.&lt;br /&gt;
&lt;br /&gt;
Level 3 – Final Round&lt;br /&gt;
This stage will require the attackers to exploit a pre-announced SSID which has WPA (or wpa 2).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To participate and for more details visit website :- http://www.hackerscouncil.org/&lt;br /&gt;
&lt;br /&gt;
== PacketWars  ==&lt;br /&gt;
&amp;lt;b&amp;gt;First time in India brought to you by Securitybyte! &amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;                                              &lt;br /&gt;
About PacketWars&lt;br /&gt;
&lt;br /&gt;
PacketWars is an intense, real-time information warfare simulation. Unlike other “capture the flag” games, the battlegrounds featured in PacketWars use the same software and hardware you would encounter in the real world.&lt;br /&gt;
&lt;br /&gt;
PacketWars is designed to operate like a sport. Think Formula One Racing meets professional golf with a dash of Ultimate Fighting thrown in for good measure. Serious fun!&lt;br /&gt;
&lt;br /&gt;
Visit http://packetwars.com/ for more details.&lt;br /&gt;
How To Play?&lt;br /&gt;
&lt;br /&gt;
PacketWars is a Sport like nothing you have ever experienced! Games known as “BATTLES” pit individual players and teams against each other in a race to achieve defined objectives.&lt;br /&gt;
&lt;br /&gt;
The rules of engagement are simple:&lt;br /&gt;
- Illegal activity of any kind is prohibited&lt;br /&gt;
- Protect yourself at all times&lt;br /&gt;
- Battles are designed to be of a low, medium or high difficulty level based on the battle objectives and battle duration&lt;br /&gt;
- Primary, Secondary and Tertiary objectives are defined and assigned points based on difficulty&lt;br /&gt;
- Battles have time limits and other defined constraints&lt;br /&gt;
- Constraints are sometimes known to the combatants and other times are not&lt;br /&gt;
- Anything that is not expressly prohibited is allowed&lt;br /&gt;
- Points are awarded for FLARE&lt;br /&gt;
&lt;br /&gt;
Equipment Needed:&lt;br /&gt;
- Most combants use a notebook and a BackTrack CD however you are only limited by your imagination and bank account&lt;br /&gt;
- You need a battle field and a PacketMaster…Oh yeah, skillz come in handy also!How To Play&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b.How can I participate?&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
PacketWars to be held at the Hotel Crowne Plaza, Gurgaon on Nov 17 &amp;amp; Nov 18, 2009. Participation is FREE! Schedule will be announced soon.&lt;br /&gt;
&lt;br /&gt;
== WebWar III  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;About&amp;lt;/b&amp;gt;&lt;br /&gt;
Hackers attack, coders defend, when you get them together you end up with Web War III. WWIII is designed to put your Web Application attack and defense skills to the test.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Teams&amp;lt;/b&amp;gt;&lt;br /&gt;
Each team consists of two players, an attacker and a defender. The attacker would be capable of identifying Web Application Vulnerabilities (OWASP Top 10). The defender would be capable of writing secure Java code.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Game Format&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The game has two stages:&lt;br /&gt;
&lt;br /&gt;
Stage 1:&lt;br /&gt;
Each team is given a VM Ware image containing a web server hosting a vulnerable web application. During this stage each team identifies the vulnerabilities in their application.&lt;br /&gt;
They try to fix the identified vulnerabilities by making code changes.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Stage 2:&lt;br /&gt;
The IP addresses of the Web Server's of all the teams is announced.&lt;br /&gt;
Each team looks for vulnerabilities in the Web Applications of the other teams.&lt;br /&gt;
Vulnerabilities found on the opponents' application get positive points.&lt;br /&gt;
Vulnerabilities found by the opponents on your application get negative points.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Team with the highest points at the end of Stage 2 wins.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Tools and Equipments&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Each team should bring their own laptop with VM Ware installed.&lt;br /&gt;
The attacker can use any tools they bring.&lt;br /&gt;
The applications come with ESAPI to help the defenders fix the code quicker.&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
==== Leadership Summit 2009  ====&lt;br /&gt;
&amp;lt;b&amp;gt;India's top technology thought leaders coming together to discuss &amp;quot;Security concerns in off-shoring&amp;quot;&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Honored Guests&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
-Honorable Former President of India, Dr. A.P.J Abdul Kalam to inaugrate the Leadership Summit 2009.&amp;lt;br&amp;gt;&lt;br /&gt;
-Prof. Howard A. Schmidt(Advisor, NIST; Former Vice Chair - President’s Critical Infrastructure Board; Former Special Advisor – Cyberspace Security for White House)&amp;lt;br&amp;gt;&lt;br /&gt;
-Mr. Hord Tipton, Executive Director (ISC)2&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;About the Event&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
An elite gathering of 200 technology leaders, decision makers &amp;amp; InfoSec experts from leading service providers, government agencies and various industry verticals.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Two hours of panel discussions between three panels of 12 distinguished industry experts representing outsourcing companies, service providers and the regulatory bodies.  Panel discussions will be followed by networking dinner &amp;amp; cocktails.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Prof Howard A. Schmidt (Advisor, NIST; Former Vice Chair - President’s Critical Infrastructure Board; Former Special Advisor – Cyberspace Security for White House) will facilitate the panel discussions. Thought leaders participating in the panel discussions are:&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Outsourcing Organizations&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Raghavendra Vaidya, CIO - GE Capital India&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. CRN Vairavelu, VP - Ford Technology Services India&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Pankaj Agrawal, CISO - Aircel Limited&amp;lt;br&amp;gt;&lt;br /&gt;
TBD&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Service Providers&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Terry Thomas, Partner - Ernst &amp;amp; Young&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Debashis Ghosh, Head (LS&amp;amp;H ISU) - Tata Consultancy Services&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Sunil Gujral, EVP &amp;amp; CTO - Quatrro&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Sunil Goyal, COO - Sopra group&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Regulatory Bodies&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Dr. Kamlesh Bajaj, CEO - DSCI (a NASSCOM initiative)&amp;lt;br&amp;gt;&lt;br /&gt;
Dr. Gulshan Rai, Director - CERT-in&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Hord Tipton, Executive Director - ISC2 (ex CIO, US Department of Interior)&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Vakul Sharma, Lawyer - Supreme Court&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The event is exclusive to industry leaders and is by private invitation only. If you are interested in attending the event, please email your business card to info@securitybyte.org This e-mail address is being protected from spambots.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Venue - Hotel Crowne Plaza, Gurgaon | Timings - 5:30PM - 9:00PM&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
Please contact [http://www.owasp.org/index.php/Category:India#OWASP_India_Co-Chairs Chair - OWASP India] for sponsorship opportunities. &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Category:India Category: OWASP India]&lt;/div&gt;</summary>
		<author><name>Puneetm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Day2.gif&amp;diff=73362</id>
		<title>File:Day2.gif</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Day2.gif&amp;diff=73362"/>
				<updated>2009-11-14T07:01:02Z</updated>
		
		<summary type="html">&lt;p&gt;Puneetm: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Puneetm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Day1.gif&amp;diff=73361</id>
		<title>File:Day1.gif</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Day1.gif&amp;diff=73361"/>
				<updated>2009-11-14T07:00:49Z</updated>
		
		<summary type="html">&lt;p&gt;Puneetm: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Puneetm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SecurityByte_and_OWASP_Asia_AppSec_Conference_2009&amp;diff=73360</id>
		<title>SecurityByte and OWASP Asia AppSec Conference 2009</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SecurityByte_and_OWASP_Asia_AppSec_Conference_2009&amp;diff=73360"/>
				<updated>2009-11-14T06:59:42Z</updated>
		
		<summary type="html">&lt;p&gt;Puneetm: /* Two Days Conference */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:SB OWASP 2009 banner.gif|center|link=http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009]]&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza] &amp;amp;#124; [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Registrations]&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*&amp;lt;b&amp;gt;Only One Week Left ! Register Online today to grab your seat for India's best Security Conference.&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;Honorable Former President of India, Dr. A.P.J Abdul Kalam to Inaugrate the India Technology Leadership Summit 2009. &amp;lt;/b&amp;gt;This event is an Invitation ONLY event.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Registrations Click Here]''' for more information.&lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
Securitybyte &amp;amp;amp; OWASP are proud to welcome you to the annual international information security conference – Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009, Nov 17th through Nov 20th in Delhi &amp;amp;amp; NCR, India. &lt;br /&gt;
&lt;br /&gt;
This is a landmark event, as both Securitybyte and OWASP join hands to present India’s largest InfoSec event with world renowned and most regarded international speakers. &lt;br /&gt;
&lt;br /&gt;
Securitybye &amp;amp;amp; OWASP AppSec Asia Conference 2009 will be held at [http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza, Gurgaon, NCR, India.] on 17th November through 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Security Researchers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Penetration Testers &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*IT Security Professionals &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
&lt;br /&gt;
==== About  ====&lt;br /&gt;
&lt;br /&gt;
== About Conference  ==&lt;br /&gt;
&lt;br /&gt;
Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel conference talks to be conducted in 3 separate halls for two days i.e . 17th &amp;amp;amp; 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular talk. Conference talks are being delivered by world renowned and most regarded speakers from around the world. &lt;br /&gt;
&lt;br /&gt;
== About Trainings  ==&lt;br /&gt;
&lt;br /&gt;
Two days post-conference are dedicated towards best-of-breed trainings being conducted in association with SANS, ISC2 and other organizations. Trainings tracks have been made available as One-Day tracks and Two-Day tracks scheduled for 19th &amp;amp;amp; 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
==== Registrations  ====&lt;br /&gt;
&lt;br /&gt;
== [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Registration] is now open!  ==&lt;br /&gt;
&lt;br /&gt;
=== You can register [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 here]  ===&lt;br /&gt;
&lt;br /&gt;
*[http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Click Here] for Online Registrations. &lt;br /&gt;
*[http://securitybyte.org/index.php/register.html Click Here] for Offline Registrations.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Please check out our Exclusive Discount Offer, available Starting October 6th - 15th, 2009. &amp;quot;SAVE BIG NOW !&amp;quot;&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''''The below pricing reflects the Standard Registration Prices .''''' &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Two Days of Conference (17th and 18th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.8,500/- INR &lt;br /&gt;
| General Public&lt;br /&gt;
|-&lt;br /&gt;
| Two Days of Conference (17th and 18th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.5,000/- INR &lt;br /&gt;
| Students&lt;br /&gt;
|-&lt;br /&gt;
| Two-Day Training Tracks (19th and 20th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.25,000/- INR&lt;br /&gt;
|-&lt;br /&gt;
| One-Day Training Tracks (19th OR 20th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.12,500/- INR&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;** Service Tax @ 10.3% will be charged extra.&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;ISC2&amp;lt;/b&amp;gt; Members can avail a Special 15% discount on Conference &amp;amp; Training Registration.&lt;br /&gt;
(Please provide your ISC2 Certification ID number to avail the above Discount)&lt;br /&gt;
For Registrations contact us at registrations@securitybyte.org&lt;br /&gt;
== Exclusive Offers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;- Group / Team Discounts available: Kindly contact us at registrations@securitybyte.org&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Special University Student discount&amp;lt;/b&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
- University Students can register for two days of conference for just Rs. 5000 (including taxes)&amp;lt;br&amp;gt;&lt;br /&gt;
- Special 15 % Discounts for Training registration&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Trainings Click here for details on the training courses that are available.]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Who Should Attend Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009: ==&lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Security Researchers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Penetration Testers &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*IT Security Professionals &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;For student discount, attendees must present proof of enrollment when picking up your badge. &lt;br /&gt;
&lt;br /&gt;
==== Schedule  ====&lt;br /&gt;
&lt;br /&gt;
Three parallel conference talks are scheduled for 17th &amp;amp;amp; 18th November 2009 in three different halls. Training tracks have been divided in one-day tracks scheduled for 19th or 20th November 2009 and two-day tracks those are schedule to continue for two days both on 19th &amp;amp;amp; 20th November 2009. Follow the tabs to learn the details on both conference and trainings. &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Conference Click here] to view the '''Conference Schedule''' for 17th &amp;amp;amp; 18th November 2009.&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Trainings Click here] to view '''Training Schedule''' on 19th &amp;amp;amp; 20th November 2009.&lt;br /&gt;
&lt;br /&gt;
==== Conference  ====&lt;br /&gt;
&lt;br /&gt;
== Two Days Conference  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;&amp;lt;font face=&amp;quot;Arial&amp;quot; size=&amp;quot;2&amp;quot;&amp;gt;Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel training sessions to be conducted in 3 separate halls for two days i.e . 17th &amp;amp;amp; 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular session. Conference talks are being delivered by world renowned and most regarded speakers from around the world. Below is the conference schedule listing confirmed speakers and talks. Couple of talks are under review by the CFP (Call For Papers) Committee and shall be available as soon as those are confirmed. Event also follows two days of InfoSec trainings to be delivered in association with SANS, ISC2 and other organizations.&amp;lt;/font&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;&amp;amp;nbsp;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;table border=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot; style=&amp;quot;border-collapse:&lt;br /&gt;
 collapse;width:100%&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;23&amp;quot; style=&amp;quot;height:17.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;23&amp;quot; style=&amp;quot;height: 17.25pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Where &amp;amp;gt;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 309px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #333399&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 1&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 318px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #3366FF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 2&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 333px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #00CCFF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 3:&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;19&amp;quot; style=&amp;quot;height:14.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;19&amp;quot; style=&amp;quot;height: 14.25pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Who &amp;amp;gt;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 309px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #333399&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Security Researchers &amp;amp;amp; Enthusiasts)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 318px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #3366FF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Security Auditors, Developers, QA, Architects)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 333px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #00CCFF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Leaders, Managers, C&amp;amp;amp;S professionals)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Schedule&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;10&amp;quot; height=&amp;quot;285&amp;quot; width=&amp;quot;24&amp;quot; style=&amp;quot;height: 213.75pt; width: 18pt; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid black; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;9:00AM&amp;amp;nbsp;&amp;amp;nbsp; - 10:30AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #DBE5F1&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Keynote Sessions&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;10:30AM - 11:00AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C5BE97&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Tea break &amp;amp;amp; Snacks on Exhibition Floor&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;11:00AM - 12:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		Active Man in the Middle&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Adi Sharabani, IBM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;How To Blackbox Test Almost Anything&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Aviram Jenik, Beyond Security&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;The International State of Cyber Security, Risk &lt;br /&gt;
		reduction in a high threat world&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Howard A. Schmidt, Former Cyber Security Advisor to &lt;br /&gt;
		the White house&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;12:00PM - 1:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Reconsidering Network Defenses or NOT !&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Cedric Blancher, EADS Innovation Works&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Lust 2.0 – Desire for free WiFi and the threat of the &lt;br /&gt;
		Imposter&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Lava Kumar Kuppan, Independent Security Researcher&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Applications - The new cyber security frontier&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Mano Paul, Software Assurance Advisor (ISC)2&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;1:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 2:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FAC090&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Lunch&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;2:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 3:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Exploiting Firefox Extensions&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Roberto Suggi Liverani, Security-Assessment.com&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Threat Modeling&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Varun Sharma, Microsoft Corp.&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Behind the scenes at the Microsoft Security Response &lt;br /&gt;
		Center&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Dave Midturi and Suresh Venkateswaran, Microsoft &lt;br /&gt;
		Security Response Center&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;3:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 4:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;SQL Server Forensics 2.0&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Kevvie Fowler, TELUS &amp;amp;amp; Ringzero&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Nitin Kumar/Vipin Kumar, Independent Security &lt;br /&gt;
		Researchers, Nvlabs&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Business Case-Risk Management/Compliance at leading &lt;br /&gt;
		Education Group at AMITY&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Dr J.S Sodhi, AMITY&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;4:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 4:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Business Continuity Case Study&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Venkataram Arabolu, BSI&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Usability and Privacy in Security&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Ponnurangam Kumaraguru, IIIT&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;4:30 PM&amp;amp;nbsp;&amp;amp;nbsp; - 5:30 PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C5BE97&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Tea break &amp;amp;amp; Snacks on Exhibition Floor&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;15&amp;quot; style=&amp;quot;height:11.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;15&amp;quot; style=&amp;quot;height: 11.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;7:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 10:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #DBE5F1&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;India Technology Leadership Summit 2009 (Exclusive by invitation only) -&amp;amp;quot; Information Security Concerns for Offshoring&amp;amp;quot;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;8&amp;quot; style=&amp;quot;height: 6.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;10&amp;quot; height=&amp;quot;8&amp;quot; style=&amp;quot;height: 6.0pt; width: 1070px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: white&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;23&amp;quot; style=&amp;quot;height:17.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;23&amp;quot; style=&amp;quot;height: 17.25pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Where &amp;amp;gt;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 309px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #333399&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 1&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 318px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #3366FF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 2&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 333px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #00CCFF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 3:&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;19&amp;quot; style=&amp;quot;height:14.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;19&amp;quot; style=&amp;quot;height: 14.25pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Who &amp;amp;gt;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 309px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #333399&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Security Researchers &amp;amp;amp; Enthusiasts)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 318px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #3366FF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Security Auditors, Developers, QA, Architects)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 333px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #00CCFF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Leaders, Managers, C&amp;amp;amp;S professionals)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Schedule&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;10&amp;quot; height=&amp;quot;257&amp;quot; width=&amp;quot;24&amp;quot; style=&amp;quot;height: 192.75pt; width: 18pt; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;9:00AM&amp;amp;nbsp;&amp;amp;nbsp; - 10:00AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #DBE5F1&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Round Table with Speakers / Industry Panel - Security Today &amp;amp;amp; Tomorrow'&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;10:00AM - 10:30AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C5BE97&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Tea break &amp;amp;amp; Snacks on Exhibition Floor&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;32&amp;quot; style=&amp;quot;height:24.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;32&amp;quot; style=&amp;quot;height: 24.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;10:30AM - 11:30AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Ten Things Web Developers Still Aren't Doing&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Frank Kim, ThinkSec Consulting&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;SANS Dshield Webhoneypot Project&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Jason Lam, Independent Security Researcher&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Critical Infrastructure Security “Danger Without &lt;br /&gt;
		borders”&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;John Bumgarner, US Cyber Consequence Unit (USCCU)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;32&amp;quot; style=&amp;quot;height:24.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;32&amp;quot; style=&amp;quot;height: 24.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;11:30AM - 12:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Cloud Hacking – Distributed Attack &amp;amp;amp; Exploit Platform&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Shreeraj Shah, Blueinfy Solutions&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Testing JSON Applications For Security Holes&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Aviram Jenik, Beyond Security&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Critical Infrastructure Security “Danger Without &lt;br /&gt;
		borders”&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;John Bumgarner, US Cyber Consequence Unit (USCCU)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;12:30PM&amp;amp;nbsp; - 1:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FAC090&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Lunch&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;1:30PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 2:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;All Your Packets Belong to Us - Attacking Backbone &lt;br /&gt;
		Technologies&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Daniel Mende, Security Researcher, ERNW&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Risk based Penetration Testing&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;K. K. Mookhey, Founder &amp;amp;amp; Principal Consultant, NII &lt;br /&gt;
		Consulting&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Wi-Fi security: the good, the bad and the ugly&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Cedric Blancher, EADS Innovation Works&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;32&amp;quot; style=&amp;quot;height:24.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;32&amp;quot; style=&amp;quot;height: 24.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;2:30PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 3:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Xprobe3 - What's New? Going Application Level&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Fyodor Yarochkin, Guard-info&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;OWASP SAMM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Pravir Chandra, OWASP&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Do you wanna Play a Game Game theory and Cyberwar&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Bryan K. Fite, HackSecKlahn&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;3:30PM-4:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C5BE97&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Tea break &amp;amp;amp; Snacks on Exhibition Floor&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;32&amp;quot; style=&amp;quot;height:24.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;32&amp;quot; style=&amp;quot;height: 24.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;4:00 PM&amp;amp;nbsp;&amp;amp;nbsp; - 5:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Rumbling Infections – Web Malware Ontology&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Aditya K. Sood, COSEINC&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;Hacking Oracle From Web&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Sid, Independent Security Researcher&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Connected Information Security Framework&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Anil Kumar Chintala, Microsoft&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;5:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 5:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #DBE5F1&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Closing Remarks by Organizing Committee&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Trainings  ====&lt;br /&gt;
&lt;br /&gt;
== Two Day Trainings  ==&lt;br /&gt;
&lt;br /&gt;
Two days post-conference are dedicated towards best-of-breed trainings being conducted in association with SANS, ISC2 and other organizations. Trainings tracks have been made available as One-Day tracks and Two-Day tracks scheduled for 19th &amp;amp;amp; 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 1 - 19th Nov, 2009'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 2 - 20th Nov, 2009'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course ID''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course Duration''' &lt;br /&gt;
(# of Days) &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course Title''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Instructor''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course ID''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course Duration''' &lt;br /&gt;
(# of Days) &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course Title''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Instructor'''&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;30&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''One Day Training Tracks'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DHSO''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Oracle_Hacking_and_security ORACLE Hacking &amp;amp;amp; Security]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Sumit Sidharth,[[Image:Sb logo.png|center|78x50px|link=http://www.securitybyte.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DAWH''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Advanced_Web_Hacking Advanced Web Hacking -Securing AJAX, RIA &amp;amp;amp; SOA]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Shreeraj Shah [[Image:Blueinfy logo.png|center|link=http://www.blueinfy.com]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DAFT'''&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Advanced_Forensic_Techniques Advanced Forensics Techniques]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Dr. Chandrasekhar Umapathy,[[Image:Sb logo.png|center|78x50px|link=http://www.securitybyte.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DIAT'''&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/InDepth_Assessment_Techniques In-depth Assessment Techniques: Design, Code, and Runtime]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Fydor Yarochkin, &lt;br /&gt;
&lt;br /&gt;
[[Image:Logo_Armorize.JPG‎|center|93x31px|link=http://www.armorize.com]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;30&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Two Day Training Tracks'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DNST''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Building_Advanced_Network_Security_tools Building advanced Network Security Tools]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Daniel Mende,[[Image:Ernw logo.png|center]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DNST''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Building_Advanced_Network_Security_tools Building advanced Network Security Tools]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Daniel Mende,[[Image:Ernw logo.png|center]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DCBC''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/ISC2_CSSLP_CBK_Bootcamp (ISC)2 CSSLP CBK Boot camp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Mano Paul,[[Image:Isc logo.png|center|78x50px|link=http://www.isc2.org]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DCBC''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/ISC2_CSSLP_CBK_Bootcamp (ISC)2 CSSLP CBK Boot camp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Mano Paul,[[Image:Isc logo.png|center|78x50px|link=http://www.isc2.org]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSCJ / SANS Course ID&amp;amp;nbsp;: DEV530''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_Essential_Secure_Coding_Java_JEE_GSSP Essential Secure Coding in Java / JEE]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSCJ / SANS Course ID&amp;amp;nbsp;: DEV530''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_Essential_Secure_Coding_Java_JEE_GSSP Essential Secure Coding in Java / JEE]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DWPT / SANS Course ID&amp;amp;nbsp;: DEV538''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_WebApp_Pentesting_handsOn_immersion Web Application Pen Testing Hands-On Immersion]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DWPT / SANS Course ID&amp;amp;nbsp;: DEV538''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_WebApp_Pentesting_handsOn_immersion Web Application Pen Testing Hands-On Immersion]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSAB / SANS Course ID&amp;amp;nbsp;: AUD429''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_IT_Security_Audit_Bootcamp IT Security Audit Essentials Bootcamp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSAB / SANS Course ID&amp;amp;nbsp;: AUD429''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_IT_Security_Audit_Bootcamp IT Security Audit Essentials Bootcamp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Venue  ====&lt;br /&gt;
&lt;br /&gt;
Four Days Event is planned out at: &lt;br /&gt;
&lt;br /&gt;
[http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza,]&amp;lt;br&amp;gt;Site - 2, Sector - 29, &amp;lt;br&amp;gt;Gurgaon-122001 (National Capital Region), India&amp;lt;br&amp;gt;Hotel Front Desk: 91-124-4534000&amp;lt;br&amp;gt;Hotel Fax: 91-124-4304800&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | '''Co-Sponsor &amp;quot;Leadership Summit 2009&amp;quot;'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | '''CTF&amp;amp;nbsp;(Capture The Flag) Sponsor'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | '''Education &amp;amp;nbsp;Partner'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:20th green stacked.png|center|ISC2|link=http://www.isc2.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
| [[Image:Appin.jpg|center|link=http://www.appinsecurity.com]]&amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
| [[Image:BRIP-Logo.jpg|center|link=http://www.brip.co.in]]&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
[[Image:Beyond-logo_large.jpg|Left|link=http://www.www.beyondsecurity.com]]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;b&amp;gt;Innovation &amp;amp;nbsp;Partner&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
[[Image:IBM.gif|Left|link=http://www.www.ibm.com]]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Associate Sponsors'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;90&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Media Partners'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Supporters'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Torridn.jpg|center|link=http://www.torridnetworks.com]] &lt;br /&gt;
| [[Image:SSecurity_india_small.gif‎ |center|link=http://www.searchsecurity.in]]&lt;br /&gt;
| [[Image:HITB.jpg|center|link=http://conference.hitb.org]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:SecurityCompass.JPG|center|link=http://www.securitycompass.com]] &lt;br /&gt;
| [[Image:HNS-web.jpg|center|link=http://www.net-security.org]] &lt;br /&gt;
| [[Image:Sector.jpg|center|link=http://www.sector.ca]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Logo_Armorize.JPG|center|link=http://www.armorize.com]] &amp;lt;br&amp;gt;‎ &lt;br /&gt;
| [[Image:Infosecurity.jpg|center|link=http://www.infosecuritymagz.com]] &amp;lt;br&amp;gt;&lt;br /&gt;
| [[Image:Clubhack.gif|center]]&amp;lt;br&amp;gt;[[Image:Eventavenue Logo.jpg|center|link=https://www.eventavenue.com]]&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:eads.jpg|center|link=http://www.eads.com]]&amp;lt;br&amp;gt;&lt;br /&gt;
| [[Image:Itmagz.jpg|center]]&amp;amp;nbsp;[[Image:Electronicsf.jpg|center|link=http://www.electronicsforu.com]] &lt;br /&gt;
| [[Image:Crowne plaza.jpg|center|link=http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;b&amp;gt;Knowledge &amp;amp;nbsp;Partner&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
[[Image:BSI.gif|Left|link=http://www.www.bsigroup.co.in]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
[[Image:OISSG-small.jpg‎|Left|link=http://www.www.bsigroup.co.in]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
==== Hotel &amp;amp; Travel  ====&lt;br /&gt;
&lt;br /&gt;
== Hotel Stay &amp;amp; Travel Information  ==&lt;br /&gt;
&lt;br /&gt;
To help our valued delegates with Hotel and Travel services, we have negotiated with some of the best and Budget Category Guest houses in Gurgaon that are located within a radius of 3 - 4 Kms from the venue.&lt;br /&gt;
&lt;br /&gt;
Limited cheaper accommodation is available near the venue hotel in budget hotels/apartments area. The tariff of these hotels ranges from Rs.2000 onwards per room night (inclusive of Room Rent, Breakfast and Luxury Tax).  Interested delegates / students can send a formal request for the desired accommodations and dates to our official travel agent.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;OFFICIAL TRAVEL AGENT&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dreamz conference Management Pvt.Ltd&amp;lt;/b&amp;gt; will look after your hotel accommodation in Gurgaon and New Delhi, pre &amp;amp; post conference tours / travel needs in India for delegates and visitors independently. If you wish to go for sightseeing tour within New Delhi and around it to places like Agra, Jaipur, Rajasthan etc. However, we would encourage you to make early bookings which will be done on “first – come - first service” basis and let us know of your interest, since that would ultimately work in your favour. Early reservation is strongly recommended as November being a high demand period for hotels in Gurgaon.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
For further details please contact:&lt;br /&gt;
&lt;br /&gt;
DREAMZ CONFERENCE MANAGEMENT PVT.LTD&lt;br /&gt;
&lt;br /&gt;
406, Ansal’s Majestic Tower, Vikas Puri, New Delhi – 110018&lt;br /&gt;
&lt;br /&gt;
Tel: 91 – 11 – 41586401, 402, Fax: 91 – 11 – 41586400&lt;br /&gt;
&lt;br /&gt;
Email: info@dreamztravel.net / dreamztravelindia@yahoo.com&lt;br /&gt;
&lt;br /&gt;
Website: www.dreamztravel.net&lt;br /&gt;
&lt;br /&gt;
Contact Person: Jitin Batra ( +91 9810558569 )&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==== Capture the Flag  ====&lt;br /&gt;
&lt;br /&gt;
== HackHunt 2009  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;India's foremost Hacking Challenge &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Your Shot to the Title of India's best hacker along with Prize money of more than &amp;lt;b&amp;gt;Rs 150,000&amp;lt;/b&amp;gt; up for grabs!&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Search for India’s Best Ethical Hacker &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
HackHunt is India’s leading hacking competition and aims at awarding the best ethical hackers in the country. The competition is brought to you by Appin Security Group, a leading Information Security and Ethical Hacking Company and Securitybyte, a global Information Security Conference Company. &lt;br /&gt;
&lt;br /&gt;
The competition will be conducted in 3 phases. The 1st two rounds will be online and the 3rd and final round will take place at“Securitybyte &amp;amp; OWASP Appsec Asia 2009” on November 17, 2009at Crowne Plaza, Gurgaon. &lt;br /&gt;
&lt;br /&gt;
Level 1 – Knowledge Check&lt;br /&gt;
All the participants will be answering a quiz and based on the score top 10% will be shortlisted to 2nd round.&lt;br /&gt;
&lt;br /&gt;
Level 2 – Skill Check&lt;br /&gt;
This stage will require an attacker to get to the final FLAG file which he/she would need to register for the event.&lt;br /&gt;
&lt;br /&gt;
Level 3 – Final Round&lt;br /&gt;
This stage will require the attackers to exploit a pre-announced SSID which has WPA (or wpa 2).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To participate and for more details visit website :- http://www.hackerscouncil.org/&lt;br /&gt;
&lt;br /&gt;
== PacketWars  ==&lt;br /&gt;
&amp;lt;b&amp;gt;First time in India brought to you by Securitybyte! &amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;                                              &lt;br /&gt;
About PacketWars&lt;br /&gt;
&lt;br /&gt;
PacketWars is an intense, real-time information warfare simulation. Unlike other “capture the flag” games, the battlegrounds featured in PacketWars use the same software and hardware you would encounter in the real world.&lt;br /&gt;
&lt;br /&gt;
PacketWars is designed to operate like a sport. Think Formula One Racing meets professional golf with a dash of Ultimate Fighting thrown in for good measure. Serious fun!&lt;br /&gt;
&lt;br /&gt;
Visit http://packetwars.com/ for more details.&lt;br /&gt;
How To Play?&lt;br /&gt;
&lt;br /&gt;
PacketWars is a Sport like nothing you have ever experienced! Games known as “BATTLES” pit individual players and teams against each other in a race to achieve defined objectives.&lt;br /&gt;
&lt;br /&gt;
The rules of engagement are simple:&lt;br /&gt;
- Illegal activity of any kind is prohibited&lt;br /&gt;
- Protect yourself at all times&lt;br /&gt;
- Battles are designed to be of a low, medium or high difficulty level based on the battle objectives and battle duration&lt;br /&gt;
- Primary, Secondary and Tertiary objectives are defined and assigned points based on difficulty&lt;br /&gt;
- Battles have time limits and other defined constraints&lt;br /&gt;
- Constraints are sometimes known to the combatants and other times are not&lt;br /&gt;
- Anything that is not expressly prohibited is allowed&lt;br /&gt;
- Points are awarded for FLARE&lt;br /&gt;
&lt;br /&gt;
Equipment Needed:&lt;br /&gt;
- Most combants use a notebook and a BackTrack CD however you are only limited by your imagination and bank account&lt;br /&gt;
- You need a battle field and a PacketMaster…Oh yeah, skillz come in handy also!How To Play&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b.How can I participate?&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
PacketWars to be held at the Hotel Crowne Plaza, Gurgaon on Nov 17 &amp;amp; Nov 18, 2009. Participation is FREE! Schedule will be announced soon.&lt;br /&gt;
&lt;br /&gt;
== WebWar III  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;About&amp;lt;/b&amp;gt;&lt;br /&gt;
Hackers attack, coders defend, when you get them together you end up with Web War III. WWIII is designed to put your Web Application attack and defense skills to the test.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Teams&amp;lt;/b&amp;gt;&lt;br /&gt;
Each team consists of two players, an attacker and a defender. The attacker would be capable of identifying Web Application Vulnerabilities (OWASP Top 10). The defender would be capable of writing secure Java code.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Game Format&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The game has two stages:&lt;br /&gt;
&lt;br /&gt;
Stage 1:&lt;br /&gt;
Each team is given a VM Ware image containing a web server hosting a vulnerable web application. During this stage each team identifies the vulnerabilities in their application.&lt;br /&gt;
They try to fix the identified vulnerabilities by making code changes.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Stage 2:&lt;br /&gt;
The IP addresses of the Web Server's of all the teams is announced.&lt;br /&gt;
Each team looks for vulnerabilities in the Web Applications of the other teams.&lt;br /&gt;
Vulnerabilities found on the opponents' application get positive points.&lt;br /&gt;
Vulnerabilities found by the opponents on your application get negative points.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Team with the highest points at the end of Stage 2 wins.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Tools and Equipments&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Each team should bring their own laptop with VM Ware installed.&lt;br /&gt;
The attacker can use any tools they bring.&lt;br /&gt;
The applications come with ESAPI to help the defenders fix the code quicker.&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
==== Leadership Summit 2009  ====&lt;br /&gt;
&amp;lt;b&amp;gt;India's top technology thought leaders coming together to discuss &amp;quot;Security concerns in off-shoring&amp;quot;&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Honored Guests&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
-Honorable Former President of India, Dr. A.P.J Abdul Kalam to inaugrate the Leadership Summit 2009.&amp;lt;br&amp;gt;&lt;br /&gt;
-Prof. Howard A. Schmidt(Advisor, NIST; Former Vice Chair - President’s Critical Infrastructure Board; Former Special Advisor – Cyberspace Security for White House)&amp;lt;br&amp;gt;&lt;br /&gt;
-Mr. Hord Tipton, Executive Director (ISC)2&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;About the Event&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
An elite gathering of 200 technology leaders, decision makers &amp;amp; InfoSec experts from leading service providers, government agencies and various industry verticals.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Two hours of panel discussions between three panels of 12 distinguished industry experts representing outsourcing companies, service providers and the regulatory bodies.  Panel discussions will be followed by networking dinner &amp;amp; cocktails.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Prof Howard A. Schmidt (Advisor, NIST; Former Vice Chair - President’s Critical Infrastructure Board; Former Special Advisor – Cyberspace Security for White House) will facilitate the panel discussions. Thought leaders participating in the panel discussions are:&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Outsourcing Organizations&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Raghavendra Vaidya, CIO - GE Capital India&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. CRN Vairavelu, VP - Ford Technology Services India&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Pankaj Agrawal, CISO - Aircel Limited&amp;lt;br&amp;gt;&lt;br /&gt;
TBD&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Service Providers&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Terry Thomas, Partner - Ernst &amp;amp; Young&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Debashis Ghosh, Head (LS&amp;amp;H ISU) - Tata Consultancy Services&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Sunil Gujral, EVP &amp;amp; CTO - Quatrro&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Sunil Goyal, COO - Sopra group&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Regulatory Bodies&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Dr. Kamlesh Bajaj, CEO - DSCI (a NASSCOM initiative)&amp;lt;br&amp;gt;&lt;br /&gt;
Dr. Gulshan Rai, Director - CERT-in&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Hord Tipton, Executive Director - ISC2 (ex CIO, US Department of Interior)&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Vakul Sharma, Lawyer - Supreme Court&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The event is exclusive to industry leaders and is by private invitation only. If you are interested in attending the event, please email your business card to info@securitybyte.org This e-mail address is being protected from spambots.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Venue - Hotel Crowne Plaza, Gurgaon | Timings - 5:30PM - 9:00PM&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
Please contact [http://www.owasp.org/index.php/Category:India#OWASP_India_Co-Chairs Chair - OWASP India] for sponsorship opportunities. &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Category:India Category: OWASP India]&lt;/div&gt;</summary>
		<author><name>Puneetm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SecurityByte_and_OWASP_Asia_AppSec_Conference_2009&amp;diff=73189</id>
		<title>SecurityByte and OWASP Asia AppSec Conference 2009</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SecurityByte_and_OWASP_Asia_AppSec_Conference_2009&amp;diff=73189"/>
				<updated>2009-11-13T15:19:28Z</updated>
		
		<summary type="html">&lt;p&gt;Puneetm: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:SB OWASP 2009 banner.gif|center|link=http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009]]&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza] &amp;amp;#124; [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Registrations]&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*&amp;lt;b&amp;gt;Only One Week Left ! Register Online today to grab your seat for India's best Security Conference.&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;Honorable Former President of India, Dr. A.P.J Abdul Kalam to Inaugrate the India Technology Leadership Summit 2009. &amp;lt;/b&amp;gt;This event is an Invitation ONLY event.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Registrations Click Here]''' for more information.&lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
Securitybyte &amp;amp;amp; OWASP are proud to welcome you to the annual international information security conference – Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009, Nov 17th through Nov 20th in Delhi &amp;amp;amp; NCR, India. &lt;br /&gt;
&lt;br /&gt;
This is a landmark event, as both Securitybyte and OWASP join hands to present India’s largest InfoSec event with world renowned and most regarded international speakers. &lt;br /&gt;
&lt;br /&gt;
Securitybye &amp;amp;amp; OWASP AppSec Asia Conference 2009 will be held at [http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza, Gurgaon, NCR, India.] on 17th November through 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Security Researchers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Penetration Testers &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*IT Security Professionals &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
&lt;br /&gt;
==== About  ====&lt;br /&gt;
&lt;br /&gt;
== About Conference  ==&lt;br /&gt;
&lt;br /&gt;
Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel conference talks to be conducted in 3 separate halls for two days i.e . 17th &amp;amp;amp; 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular talk. Conference talks are being delivered by world renowned and most regarded speakers from around the world. &lt;br /&gt;
&lt;br /&gt;
== About Trainings  ==&lt;br /&gt;
&lt;br /&gt;
Two days post-conference are dedicated towards best-of-breed trainings being conducted in association with SANS, ISC2 and other organizations. Trainings tracks have been made available as One-Day tracks and Two-Day tracks scheduled for 19th &amp;amp;amp; 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
==== Registrations  ====&lt;br /&gt;
&lt;br /&gt;
== [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Registration] is now open!  ==&lt;br /&gt;
&lt;br /&gt;
=== You can register [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 here]  ===&lt;br /&gt;
&lt;br /&gt;
*[http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Click Here] for Online Registrations. &lt;br /&gt;
*[http://securitybyte.org/index.php/register.html Click Here] for Offline Registrations.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Please check out our Exclusive Discount Offer, available Starting October 6th - 15th, 2009. &amp;quot;SAVE BIG NOW !&amp;quot;&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''''The below pricing reflects the Standard Registration Prices .''''' &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Two Days of Conference (17th and 18th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.8,500/- INR &lt;br /&gt;
| General Public&lt;br /&gt;
|-&lt;br /&gt;
| Two Days of Conference (17th and 18th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.5,000/- INR &lt;br /&gt;
| Students&lt;br /&gt;
|-&lt;br /&gt;
| Two-Day Training Tracks (19th and 20th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.25,000/- INR&lt;br /&gt;
|-&lt;br /&gt;
| One-Day Training Tracks (19th OR 20th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.12,500/- INR&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;** Service Tax @ 10.3% will be charged extra.&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;ISC2&amp;lt;/b&amp;gt; Members can avail a Special 15% discount on Conference &amp;amp; Training Registration.&lt;br /&gt;
(Please provide your ISC2 Certification ID number to avail the above Discount)&lt;br /&gt;
For Registrations contact us at registrations@securitybyte.org&lt;br /&gt;
== Exclusive Offers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;- Group / Team Discounts available: Kindly contact us at registrations@securitybyte.org&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Special University Student discount&amp;lt;/b&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
- University Students can register for two days of conference for just Rs. 5000 (including taxes)&amp;lt;br&amp;gt;&lt;br /&gt;
- Special 15 % Discounts for Training registration&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Trainings Click here for details on the training courses that are available.]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Who Should Attend Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009: ==&lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Security Researchers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Penetration Testers &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*IT Security Professionals &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;For student discount, attendees must present proof of enrollment when picking up your badge. &lt;br /&gt;
&lt;br /&gt;
==== Schedule  ====&lt;br /&gt;
&lt;br /&gt;
Three parallel conference talks are scheduled for 17th &amp;amp;amp; 18th November 2009 in three different halls. Training tracks have been divided in one-day tracks scheduled for 19th or 20th November 2009 and two-day tracks those are schedule to continue for two days both on 19th &amp;amp;amp; 20th November 2009. Follow the tabs to learn the details on both conference and trainings. &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Conference Click here] to view the '''Conference Schedule''' for 17th &amp;amp;amp; 18th November 2009.&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Trainings Click here] to view '''Training Schedule''' on 19th &amp;amp;amp; 20th November 2009.&lt;br /&gt;
&lt;br /&gt;
==== Conference  ====&lt;br /&gt;
&lt;br /&gt;
== Two Days Conference  ==&lt;br /&gt;
&lt;br /&gt;
Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel conference talks to be conducted in 3 separate halls for two days i.e . 17th &amp;amp;amp; 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular talk. Conference talks are being delivered by world renowned and most regarded speakers from around the world. Below is the detailed schedule for the two days of conference.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 1 - 17th Nov, 2009'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Where&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - I''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - II''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - III'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Who&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Researchers &amp;amp;amp; Enthusiasts)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Auditors, Developers, QA teams, Architects)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Leaders, Managers, C&amp;amp;amp;S professionals)'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 8:00 AM - 9:00 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Registrations'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Schedule''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 9:00 AM - 10:30 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Keynote'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:30 AM - 11:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea Break'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 11:00 AM - 12:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | How To Blackbox Test Almost Anything&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Aviram Jenik, Beyond Security&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | The International State of Cyber Security, Risk reduction in a high threat world&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Prof. Howard A. Schmidt, Former Cyber Security Advisor to the White house&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:00 PM - 1:00 PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Client Side Hacks&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Dino Covotsos &amp;amp; Charleton Smith, Telspace Systems&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Risk Based Penetration testing&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | K. K. Mookhey, Founder &amp;amp;amp; Principal Consultant, NII Consulting&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Applications, the source for CyberThreats&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Mano Paul,Software Assurance Advisor,(ISC)2&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 1:00PM - 2:00PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Lunch'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 2:00 PM - 3:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Exploiting Firefox Extensions&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Roberto Suggi Liverani, Security-Assessment.com&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Threat Modeling&amp;lt;br&amp;gt;&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Varun Sharma,Microsoft India&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Enterprise Application Security Program&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 3:00 PM - 4:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | SQL Server Forensics 2.0&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Kevvie Fowler, TELUS &amp;amp;amp; Ringzero&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | OWASP SAMM&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Pravir Chandra, Director of Strategic Services,&amp;lt;br&amp;gt;Fortify&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Business Case - Risk Management/Compliance at leading Education Group AMITY (Rapid Fire: 30 Min talk)&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Dr. JS Sodhi, CIO, AMITY Group&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 4:00 PM - 5:00 PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Ownage 2.0 - How to own the World&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Saumil Shah, NetSquare Solutions&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | &amp;quot;Do you want to play a Game&amp;quot; - Game theory and Cyberwar&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Bryan K. Fite, HackSecKlahn&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Usability and Privacy in Security&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Dr. Ponnurangam Kumaraguru, Asst. Professor - IIIT (Rapid Fire : 30 Min talk)&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 5:00 PM - 6:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea and Snacks on the Exhibition floor'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 7:00 PM - 10:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''CXO Event (Exclusive by invitation only) - Information Security Concerns for Offshoring'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 2 - 18th Nov, 2009'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Where&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - I''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - II''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - III'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Who&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Researchers &amp;amp;amp; Enthusiasts)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Auditors, Developers, QA teams, Architects)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Leaders, Managers, C&amp;amp;amp;S professionals)'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 8:00 AM - 9:00 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Registrations'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 9:00 AM - 10:00 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Round Table with Speakers / Industry Panel - &amp;quot;Security Today &amp;amp; Tomorrow''''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:00 AM - 10:30 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea Break'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Schedule''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:30 AM - 11:30&amp;amp;nbsp;AM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | All your Packets belong to us&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Daniel Mende, Security Researcher, ERNW&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | SANS Dshield Webhoneypot Project&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Jason Lam, Independent Security Researcher&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Critical Infrastructure Security “Danger Without borders” &amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | John Bumgarner, US Cyber Consequence Unit (USCCU)&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 11:30 AM - 12:30 PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Hacking Oracle From Web&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Sid, Independent Security Researcher&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Testing JSON Applications For Security Holes&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Aviram Jenik, Beyond Security&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Critical Infrastructure Security “Danger Without borders” &amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | John Bumgarner, US Cyber Consequence Unit (USCCU)&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:30PM - 1:30PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Lunch'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 1:30 PM&amp;amp;nbsp;- 2:30 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Lust 2.0 – Desire for free WiFi and the threat of the Imposter &amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Lava Kumar Kuppan, Independent Security Researcher&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Cloud Hacking - Distributed Attacks &amp;amp; Exploits&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Shreeraj Shah, Blueinfy Solutions&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Cedric Blancher, EADS Innovation Works&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 2:30 PM - 3:30&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Xprobe3 - What's New? Going Application Level&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Fyodor Yarochkin, Armorize&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Nitin Kumar/Vipin Kumar, Independent Security Researchers, NVlabs&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Behind the Scenes at Microsoft Security Response Center&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Dave Midturi,MSRC, Microsoft Corp.&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 3:30PM - 4:00PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea Break'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 4:00 PM - 5:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 5:00 PM - 6:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Closing Keynotes - &amp;quot;OWASP &amp;amp; Securitybyte&amp;quot;'''&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Trainings  ====&lt;br /&gt;
&lt;br /&gt;
== Two Day Trainings  ==&lt;br /&gt;
&lt;br /&gt;
Two days post-conference are dedicated towards best-of-breed trainings being conducted in association with SANS, ISC2 and other organizations. Trainings tracks have been made available as One-Day tracks and Two-Day tracks scheduled for 19th &amp;amp;amp; 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 1 - 19th Nov, 2009'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 2 - 20th Nov, 2009'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course ID''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course Duration''' &lt;br /&gt;
(# of Days) &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course Title''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Instructor''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course ID''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course Duration''' &lt;br /&gt;
(# of Days) &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course Title''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Instructor'''&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;30&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''One Day Training Tracks'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DHSO''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Oracle_Hacking_and_security ORACLE Hacking &amp;amp;amp; Security]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Sumit Sidharth,[[Image:Sb logo.png|center|78x50px|link=http://www.securitybyte.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DAWH''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Advanced_Web_Hacking Advanced Web Hacking -Securing AJAX, RIA &amp;amp;amp; SOA]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Shreeraj Shah [[Image:Blueinfy logo.png|center|link=http://www.blueinfy.com]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DAFT'''&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Advanced_Forensic_Techniques Advanced Forensics Techniques]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Dr. Chandrasekhar Umapathy,[[Image:Sb logo.png|center|78x50px|link=http://www.securitybyte.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DIAT'''&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/InDepth_Assessment_Techniques In-depth Assessment Techniques: Design, Code, and Runtime]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Fydor Yarochkin, &lt;br /&gt;
&lt;br /&gt;
[[Image:Logo_Armorize.JPG‎|center|93x31px|link=http://www.armorize.com]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;30&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Two Day Training Tracks'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DNST''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Building_Advanced_Network_Security_tools Building advanced Network Security Tools]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Daniel Mende,[[Image:Ernw logo.png|center]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DNST''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Building_Advanced_Network_Security_tools Building advanced Network Security Tools]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Daniel Mende,[[Image:Ernw logo.png|center]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DCBC''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/ISC2_CSSLP_CBK_Bootcamp (ISC)2 CSSLP CBK Boot camp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Mano Paul,[[Image:Isc logo.png|center|78x50px|link=http://www.isc2.org]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DCBC''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/ISC2_CSSLP_CBK_Bootcamp (ISC)2 CSSLP CBK Boot camp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Mano Paul,[[Image:Isc logo.png|center|78x50px|link=http://www.isc2.org]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSCJ / SANS Course ID&amp;amp;nbsp;: DEV530''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_Essential_Secure_Coding_Java_JEE_GSSP Essential Secure Coding in Java / JEE]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSCJ / SANS Course ID&amp;amp;nbsp;: DEV530''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_Essential_Secure_Coding_Java_JEE_GSSP Essential Secure Coding in Java / JEE]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DWPT / SANS Course ID&amp;amp;nbsp;: DEV538''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_WebApp_Pentesting_handsOn_immersion Web Application Pen Testing Hands-On Immersion]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DWPT / SANS Course ID&amp;amp;nbsp;: DEV538''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_WebApp_Pentesting_handsOn_immersion Web Application Pen Testing Hands-On Immersion]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSAB / SANS Course ID&amp;amp;nbsp;: AUD429''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_IT_Security_Audit_Bootcamp IT Security Audit Essentials Bootcamp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSAB / SANS Course ID&amp;amp;nbsp;: AUD429''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_IT_Security_Audit_Bootcamp IT Security Audit Essentials Bootcamp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Venue  ====&lt;br /&gt;
&lt;br /&gt;
Four Days Event is planned out at: &lt;br /&gt;
&lt;br /&gt;
[http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza,]&amp;lt;br&amp;gt;Site - 2, Sector - 29, &amp;lt;br&amp;gt;Gurgaon-122001 (National Capital Region), India&amp;lt;br&amp;gt;Hotel Front Desk: 91-124-4534000&amp;lt;br&amp;gt;Hotel Fax: 91-124-4304800&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | '''Co-Sponsor &amp;quot;Leadership Summit 2009&amp;quot;'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | '''CTF&amp;amp;nbsp;(Capture The Flag) Sponsor'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | '''Education &amp;amp;nbsp;Partner'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:20th green stacked.png|center|ISC2|link=http://www.isc2.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
| [[Image:Appin.jpg|center|link=http://www.appinsecurity.com]]&amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
| [[Image:BRIP-Logo.jpg|center|link=http://www.brip.co.in]]&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
[[Image:Beyond-logo_large.jpg|Left|link=http://www.www.beyondsecurity.com]]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;b&amp;gt;Innovation &amp;amp;nbsp;Partner&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
[[Image:IBM.gif|Left|link=http://www.www.ibm.com]]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Associate Sponsors'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;90&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Media Partners'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Supporters'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Torridn.jpg|center|link=http://www.torridnetworks.com]] &lt;br /&gt;
| [[Image:SSecurity_india_small.gif‎ |center|link=http://www.searchsecurity.in]]&lt;br /&gt;
| [[Image:HITB.jpg|center|link=http://conference.hitb.org]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:SecurityCompass.JPG|center|link=http://www.securitycompass.com]] &lt;br /&gt;
| [[Image:HNS-web.jpg|center|link=http://www.net-security.org]] &lt;br /&gt;
| [[Image:Sector.jpg|center|link=http://www.sector.ca]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Logo_Armorize.JPG|center|link=http://www.armorize.com]] &amp;lt;br&amp;gt;‎ &lt;br /&gt;
| [[Image:Infosecurity.jpg|center|link=http://www.infosecuritymagz.com]] &amp;lt;br&amp;gt;&lt;br /&gt;
| [[Image:Clubhack.gif|center]]&amp;lt;br&amp;gt;[[Image:Eventavenue Logo.jpg|center|link=https://www.eventavenue.com]]&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:eads.jpg|center|link=http://www.eads.com]]&amp;lt;br&amp;gt;&lt;br /&gt;
| [[Image:Itmagz.jpg|center]]&amp;amp;nbsp;[[Image:Electronicsf.jpg|center|link=http://www.electronicsforu.com]] &lt;br /&gt;
| [[Image:Crowne plaza.jpg|center|link=http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;b&amp;gt;Knowledge &amp;amp;nbsp;Partner&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
[[Image:BSI.gif|Left|link=http://www.www.bsigroup.co.in]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
[[Image:OISSG-small.jpg‎|Left|link=http://www.www.bsigroup.co.in]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
==== Hotel &amp;amp; Travel  ====&lt;br /&gt;
&lt;br /&gt;
== Hotel Stay &amp;amp; Travel Information  ==&lt;br /&gt;
&lt;br /&gt;
To help our valued delegates with Hotel and Travel services, we have negotiated with some of the best and Budget Category Guest houses in Gurgaon that are located within a radius of 3 - 4 Kms from the venue.&lt;br /&gt;
&lt;br /&gt;
Limited cheaper accommodation is available near the venue hotel in budget hotels/apartments area. The tariff of these hotels ranges from Rs.2000 onwards per room night (inclusive of Room Rent, Breakfast and Luxury Tax).  Interested delegates / students can send a formal request for the desired accommodations and dates to our official travel agent.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;OFFICIAL TRAVEL AGENT&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dreamz conference Management Pvt.Ltd&amp;lt;/b&amp;gt; will look after your hotel accommodation in Gurgaon and New Delhi, pre &amp;amp; post conference tours / travel needs in India for delegates and visitors independently. If you wish to go for sightseeing tour within New Delhi and around it to places like Agra, Jaipur, Rajasthan etc. However, we would encourage you to make early bookings which will be done on “first – come - first service” basis and let us know of your interest, since that would ultimately work in your favour. Early reservation is strongly recommended as November being a high demand period for hotels in Gurgaon.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
For further details please contact:&lt;br /&gt;
&lt;br /&gt;
DREAMZ CONFERENCE MANAGEMENT PVT.LTD&lt;br /&gt;
&lt;br /&gt;
406, Ansal’s Majestic Tower, Vikas Puri, New Delhi – 110018&lt;br /&gt;
&lt;br /&gt;
Tel: 91 – 11 – 41586401, 402, Fax: 91 – 11 – 41586400&lt;br /&gt;
&lt;br /&gt;
Email: info@dreamztravel.net / dreamztravelindia@yahoo.com&lt;br /&gt;
&lt;br /&gt;
Website: www.dreamztravel.net&lt;br /&gt;
&lt;br /&gt;
Contact Person: Jitin Batra ( +91 9810558569 )&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==== Capture the Flag  ====&lt;br /&gt;
&lt;br /&gt;
== HackHunt 2009  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;India's foremost Hacking Challenge &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Your Shot to the Title of India's best hacker along with Prize money of more than &amp;lt;b&amp;gt;Rs 150,000&amp;lt;/b&amp;gt; up for grabs!&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Search for India’s Best Ethical Hacker &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
HackHunt is India’s leading hacking competition and aims at awarding the best ethical hackers in the country. The competition is brought to you by Appin Security Group, a leading Information Security and Ethical Hacking Company and Securitybyte, a global Information Security Conference Company. &lt;br /&gt;
&lt;br /&gt;
The competition will be conducted in 3 phases. The 1st two rounds will be online and the 3rd and final round will take place at“Securitybyte &amp;amp; OWASP Appsec Asia 2009” on November 17, 2009at Crowne Plaza, Gurgaon. &lt;br /&gt;
&lt;br /&gt;
Level 1 – Knowledge Check&lt;br /&gt;
All the participants will be answering a quiz and based on the score top 10% will be shortlisted to 2nd round.&lt;br /&gt;
&lt;br /&gt;
Level 2 – Skill Check&lt;br /&gt;
This stage will require an attacker to get to the final FLAG file which he/she would need to register for the event.&lt;br /&gt;
&lt;br /&gt;
Level 3 – Final Round&lt;br /&gt;
This stage will require the attackers to exploit a pre-announced SSID which has WPA (or wpa 2).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To participate and for more details visit website :- http://www.hackerscouncil.org/&lt;br /&gt;
&lt;br /&gt;
== PacketWars  ==&lt;br /&gt;
&amp;lt;b&amp;gt;First time in India brought to you by Securitybyte! &amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;                                              &lt;br /&gt;
About PacketWars&lt;br /&gt;
&lt;br /&gt;
PacketWars is an intense, real-time information warfare simulation. Unlike other “capture the flag” games, the battlegrounds featured in PacketWars use the same software and hardware you would encounter in the real world.&lt;br /&gt;
&lt;br /&gt;
PacketWars is designed to operate like a sport. Think Formula One Racing meets professional golf with a dash of Ultimate Fighting thrown in for good measure. Serious fun!&lt;br /&gt;
&lt;br /&gt;
Visit http://packetwars.com/ for more details.&lt;br /&gt;
How To Play?&lt;br /&gt;
&lt;br /&gt;
PacketWars is a Sport like nothing you have ever experienced! Games known as “BATTLES” pit individual players and teams against each other in a race to achieve defined objectives.&lt;br /&gt;
&lt;br /&gt;
The rules of engagement are simple:&lt;br /&gt;
- Illegal activity of any kind is prohibited&lt;br /&gt;
- Protect yourself at all times&lt;br /&gt;
- Battles are designed to be of a low, medium or high difficulty level based on the battle objectives and battle duration&lt;br /&gt;
- Primary, Secondary and Tertiary objectives are defined and assigned points based on difficulty&lt;br /&gt;
- Battles have time limits and other defined constraints&lt;br /&gt;
- Constraints are sometimes known to the combatants and other times are not&lt;br /&gt;
- Anything that is not expressly prohibited is allowed&lt;br /&gt;
- Points are awarded for FLARE&lt;br /&gt;
&lt;br /&gt;
Equipment Needed:&lt;br /&gt;
- Most combants use a notebook and a BackTrack CD however you are only limited by your imagination and bank account&lt;br /&gt;
- You need a battle field and a PacketMaster…Oh yeah, skillz come in handy also!How To Play&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b.How can I participate?&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
PacketWars to be held at the Hotel Crowne Plaza, Gurgaon on Nov 17 &amp;amp; Nov 18, 2009. Participation is FREE! Schedule will be announced soon.&lt;br /&gt;
&lt;br /&gt;
== WebWar III  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;About&amp;lt;/b&amp;gt;&lt;br /&gt;
Hackers attack, coders defend, when you get them together you end up with Web War III. WWIII is designed to put your Web Application attack and defense skills to the test.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Teams&amp;lt;/b&amp;gt;&lt;br /&gt;
Each team consists of two players, an attacker and a defender. The attacker would be capable of identifying Web Application Vulnerabilities (OWASP Top 10). The defender would be capable of writing secure Java code.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Game Format&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The game has two stages:&lt;br /&gt;
&lt;br /&gt;
Stage 1:&lt;br /&gt;
Each team is given a VM Ware image containing a web server hosting a vulnerable web application. During this stage each team identifies the vulnerabilities in their application.&lt;br /&gt;
They try to fix the identified vulnerabilities by making code changes.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Stage 2:&lt;br /&gt;
The IP addresses of the Web Server's of all the teams is announced.&lt;br /&gt;
Each team looks for vulnerabilities in the Web Applications of the other teams.&lt;br /&gt;
Vulnerabilities found on the opponents' application get positive points.&lt;br /&gt;
Vulnerabilities found by the opponents on your application get negative points.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Team with the highest points at the end of Stage 2 wins.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Tools and Equipments&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Each team should bring their own laptop with VM Ware installed.&lt;br /&gt;
The attacker can use any tools they bring.&lt;br /&gt;
The applications come with ESAPI to help the defenders fix the code quicker.&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
==== Leadership Summit 2009  ====&lt;br /&gt;
&amp;lt;b&amp;gt;India's top technology thought leaders coming together to discuss &amp;quot;Security concerns in off-shoring&amp;quot;&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Honored Guests&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
-Honorable Former President of India, Dr. A.P.J Abdul Kalam to inaugrate the Leadership Summit 2009.&amp;lt;br&amp;gt;&lt;br /&gt;
-Prof. Howard A. Schmidt(Advisor, NIST; Former Vice Chair - President’s Critical Infrastructure Board; Former Special Advisor – Cyberspace Security for White House)&amp;lt;br&amp;gt;&lt;br /&gt;
-Mr. Hord Tipton, Executive Director (ISC)2&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;About the Event&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
An elite gathering of 200 technology leaders, decision makers &amp;amp; InfoSec experts from leading service providers, government agencies and various industry verticals.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Two hours of panel discussions between three panels of 12 distinguished industry experts representing outsourcing companies, service providers and the regulatory bodies.  Panel discussions will be followed by networking dinner &amp;amp; cocktails.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Prof Howard A. Schmidt (Advisor, NIST; Former Vice Chair - President’s Critical Infrastructure Board; Former Special Advisor – Cyberspace Security for White House) will facilitate the panel discussions. Thought leaders participating in the panel discussions are:&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Outsourcing Organizations&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Raghavendra Vaidya, CIO - GE Capital India&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. CRN Vairavelu, VP - Ford Technology Services India&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Pankaj Agrawal, CISO - Aircel Limited&amp;lt;br&amp;gt;&lt;br /&gt;
TBD&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Service Providers&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Terry Thomas, Partner - Ernst &amp;amp; Young&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Debashis Ghosh, Head (LS&amp;amp;H ISU) - Tata Consultancy Services&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Sunil Gujral, EVP &amp;amp; CTO - Quatrro&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Sunil Goyal, COO - Sopra group&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Regulatory Bodies&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Dr. Kamlesh Bajaj, CEO - DSCI (a NASSCOM initiative)&amp;lt;br&amp;gt;&lt;br /&gt;
Dr. Gulshan Rai, Director - CERT-in&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Hord Tipton, Executive Director - ISC2 (ex CIO, US Department of Interior)&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Vakul Sharma, Lawyer - Supreme Court&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The event is exclusive to industry leaders and is by private invitation only. If you are interested in attending the event, please email your business card to info@securitybyte.org This e-mail address is being protected from spambots.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Venue - Hotel Crowne Plaza, Gurgaon | Timings - 5:30PM - 9:00PM&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
Please contact [http://www.owasp.org/index.php/Category:India#OWASP_India_Co-Chairs Chair - OWASP India] for sponsorship opportunities. &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Category:India Category: OWASP India]&lt;/div&gt;</summary>
		<author><name>Puneetm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OISSG-small.jpg&amp;diff=73187</id>
		<title>File:OISSG-small.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OISSG-small.jpg&amp;diff=73187"/>
				<updated>2009-11-13T15:04:20Z</updated>
		
		<summary type="html">&lt;p&gt;Puneetm: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Puneetm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Hakin9-small.JPG&amp;diff=73186</id>
		<title>File:Hakin9-small.JPG</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Hakin9-small.JPG&amp;diff=73186"/>
				<updated>2009-11-13T14:47:43Z</updated>
		
		<summary type="html">&lt;p&gt;Puneetm: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Puneetm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SecurityByte_and_OWASP_Asia_AppSec_Conference_2009&amp;diff=73185</id>
		<title>SecurityByte and OWASP Asia AppSec Conference 2009</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SecurityByte_and_OWASP_Asia_AppSec_Conference_2009&amp;diff=73185"/>
				<updated>2009-11-13T14:16:14Z</updated>
		
		<summary type="html">&lt;p&gt;Puneetm: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:SB OWASP 2009 banner.gif|center|link=http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009]]&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza] &amp;amp;#124; [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Registrations]&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*&amp;lt;b&amp;gt;Only One Week Left ! Register Online today to grab your seat for India's best Security Conference.&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;Honorable Former President of India, Dr. A.P.J Abdul Kalam to Inaugrate the India Technology Leadership Summit 2009. &amp;lt;/b&amp;gt;This event is an Invitation ONLY event.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Registrations Click Here]''' for more information.&lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
Securitybyte &amp;amp;amp; OWASP are proud to welcome you to the annual international information security conference – Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009, Nov 17th through Nov 20th in Delhi &amp;amp;amp; NCR, India. &lt;br /&gt;
&lt;br /&gt;
This is a landmark event, as both Securitybyte and OWASP join hands to present India’s largest InfoSec event with world renowned and most regarded international speakers. &lt;br /&gt;
&lt;br /&gt;
Securitybye &amp;amp;amp; OWASP AppSec Asia Conference 2009 will be held at [http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza, Gurgaon, NCR, India.] on 17th November through 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Security Researchers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Penetration Testers &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*IT Security Professionals &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
&lt;br /&gt;
==== About  ====&lt;br /&gt;
&lt;br /&gt;
== About Conference  ==&lt;br /&gt;
&lt;br /&gt;
Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel conference talks to be conducted in 3 separate halls for two days i.e . 17th &amp;amp;amp; 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular talk. Conference talks are being delivered by world renowned and most regarded speakers from around the world. &lt;br /&gt;
&lt;br /&gt;
== About Trainings  ==&lt;br /&gt;
&lt;br /&gt;
Two days post-conference are dedicated towards best-of-breed trainings being conducted in association with SANS, ISC2 and other organizations. Trainings tracks have been made available as One-Day tracks and Two-Day tracks scheduled for 19th &amp;amp;amp; 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
==== Registrations  ====&lt;br /&gt;
&lt;br /&gt;
== [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Registration] is now open!  ==&lt;br /&gt;
&lt;br /&gt;
=== You can register [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 here]  ===&lt;br /&gt;
&lt;br /&gt;
*[http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Click Here] for Online Registrations. &lt;br /&gt;
*[http://securitybyte.org/index.php/register.html Click Here] for Offline Registrations.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Please check out our Exclusive Discount Offer, available Starting October 6th - 15th, 2009. &amp;quot;SAVE BIG NOW !&amp;quot;&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''''The below pricing reflects the Standard Registration Prices .''''' &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Two Days of Conference (17th and 18th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.8,500/- INR &lt;br /&gt;
| General Public&lt;br /&gt;
|-&lt;br /&gt;
| Two Days of Conference (17th and 18th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.5,000/- INR &lt;br /&gt;
| Students&lt;br /&gt;
|-&lt;br /&gt;
| Two-Day Training Tracks (19th and 20th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.25,000/- INR&lt;br /&gt;
|-&lt;br /&gt;
| One-Day Training Tracks (19th OR 20th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.12,500/- INR&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;** Service Tax @ 10.3% will be charged extra.&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;ISC2&amp;lt;/b&amp;gt; Members can avail a Special 15% discount on Conference &amp;amp; Training Registration.&lt;br /&gt;
(Please provide your ISC2 Certification ID number to avail the above Discount)&lt;br /&gt;
For Registrations contact us at registrations@securitybyte.org&lt;br /&gt;
== Exclusive Offers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;- Group / Team Discounts available: Kindly contact us at registrations@securitybyte.org&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Special University Student discount&amp;lt;/b&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
- University Students can register for two days of conference for just Rs. 5000 (including taxes)&amp;lt;br&amp;gt;&lt;br /&gt;
- Special 15 % Discounts for Training registration&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Trainings Click here for details on the training courses that are available.]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Who Should Attend Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009: ==&lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Security Researchers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Penetration Testers &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*IT Security Professionals &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;For student discount, attendees must present proof of enrollment when picking up your badge. &lt;br /&gt;
&lt;br /&gt;
==== Schedule  ====&lt;br /&gt;
&lt;br /&gt;
Three parallel conference talks are scheduled for 17th &amp;amp;amp; 18th November 2009 in three different halls. Training tracks have been divided in one-day tracks scheduled for 19th or 20th November 2009 and two-day tracks those are schedule to continue for two days both on 19th &amp;amp;amp; 20th November 2009. Follow the tabs to learn the details on both conference and trainings. &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Conference Click here] to view the '''Conference Schedule''' for 17th &amp;amp;amp; 18th November 2009.&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Trainings Click here] to view '''Training Schedule''' on 19th &amp;amp;amp; 20th November 2009.&lt;br /&gt;
&lt;br /&gt;
==== Conference  ====&lt;br /&gt;
&lt;br /&gt;
== Two Days Conference  ==&lt;br /&gt;
&lt;br /&gt;
Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel conference talks to be conducted in 3 separate halls for two days i.e . 17th &amp;amp;amp; 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular talk. Conference talks are being delivered by world renowned and most regarded speakers from around the world. Below is the detailed schedule for the two days of conference.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 1 - 17th Nov, 2009'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Where&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - I''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - II''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - III'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Who&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Researchers &amp;amp;amp; Enthusiasts)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Auditors, Developers, QA teams, Architects)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Leaders, Managers, C&amp;amp;amp;S professionals)'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 8:00 AM - 9:00 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Registrations'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Schedule''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 9:00 AM - 10:30 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Keynote'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:30 AM - 11:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea Break'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 11:00 AM - 12:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | How To Blackbox Test Almost Anything&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Aviram Jenik, Beyond Security&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | The International State of Cyber Security, Risk reduction in a high threat world&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Prof. Howard A. Schmidt, Former Cyber Security Advisor to the White house&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:00 PM - 1:00 PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Client Side Hacks&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Dino Covotsos &amp;amp; Charleton Smith, Telspace Systems&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Risk Based Penetration testing&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | K. K. Mookhey, Founder &amp;amp;amp; Principal Consultant, NII Consulting&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Applications, the source for CyberThreats&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Mano Paul,Software Assurance Advisor,(ISC)2&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 1:00PM - 2:00PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Lunch'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 2:00 PM - 3:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Exploiting Firefox Extensions&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Roberto Suggi Liverani, Security-Assessment.com&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Threat Modeling&amp;lt;br&amp;gt;&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Varun Sharma,Microsoft India&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Enterprise Application Security Program&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 3:00 PM - 4:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | SQL Server Forensics 2.0&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Kevvie Fowler, TELUS &amp;amp;amp; Ringzero&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | OWASP SAMM&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Pravir Chandra, Director of Strategic Services,&amp;lt;br&amp;gt;Fortify&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Business Case - Risk Management/Compliance at leading Education Group AMITY (Rapid Fire: 30 Min talk)&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Dr. JS Sodhi, CIO, AMITY Group&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 4:00 PM - 5:00 PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Ownage 2.0 - How to own the World&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Saumil Shah, NetSquare Solutions&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | &amp;quot;Do you want to play a Game&amp;quot; - Game theory and Cyberwar&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Bryan K. Fite, HackSecKlahn&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Usability and Privacy in Security&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Dr. Ponnurangam Kumaraguru, Asst. Professor - IIIT (Rapid Fire : 30 Min talk)&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 5:00 PM - 6:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea and Snacks on the Exhibition floor'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 7:00 PM - 10:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''CXO Event (Exclusive by invitation only) - Information Security Concerns for Offshoring'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 2 - 18th Nov, 2009'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Where&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - I''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - II''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - III'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Who&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Researchers &amp;amp;amp; Enthusiasts)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Auditors, Developers, QA teams, Architects)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Leaders, Managers, C&amp;amp;amp;S professionals)'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 8:00 AM - 9:00 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Registrations'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 9:00 AM - 10:00 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Round Table with Speakers / Industry Panel - &amp;quot;Security Today &amp;amp; Tomorrow''''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:00 AM - 10:30 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea Break'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Schedule''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:30 AM - 11:30&amp;amp;nbsp;AM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | All your Packets belong to us&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Daniel Mende, Security Researcher, ERNW&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | SANS Dshield Webhoneypot Project&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Jason Lam, Independent Security Researcher&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Critical Infrastructure Security “Danger Without borders” &amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | John Bumgarner, US Cyber Consequence Unit (USCCU)&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 11:30 AM - 12:30 PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Hacking Oracle From Web&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Sid, Independent Security Researcher&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Testing JSON Applications For Security Holes&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Aviram Jenik, Beyond Security&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Critical Infrastructure Security “Danger Without borders” &amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | John Bumgarner, US Cyber Consequence Unit (USCCU)&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:30PM - 1:30PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Lunch'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 1:30 PM&amp;amp;nbsp;- 2:30 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Lust 2.0 – Desire for free WiFi and the threat of the Imposter &amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Lava Kumar Kuppan, Independent Security Researcher&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Cloud Hacking - Distributed Attacks &amp;amp; Exploits&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Shreeraj Shah, Blueinfy Solutions&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Cedric Blancher, EADS Innovation Works&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 2:30 PM - 3:30&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Xprobe3 - What's New? Going Application Level&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Fyodor Yarochkin, Armorize&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Nitin Kumar/Vipin Kumar, Independent Security Researchers, NVlabs&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Behind the Scenes at Microsoft Security Response Center&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Dave Midturi,MSRC, Microsoft Corp.&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 3:30PM - 4:00PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea Break'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 4:00 PM - 5:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 5:00 PM - 6:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Closing Keynotes - &amp;quot;OWASP &amp;amp; Securitybyte&amp;quot;'''&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Trainings  ====&lt;br /&gt;
&lt;br /&gt;
== Two Day Trainings  ==&lt;br /&gt;
&lt;br /&gt;
Two days post-conference are dedicated towards best-of-breed trainings being conducted in association with SANS, ISC2 and other organizations. Trainings tracks have been made available as One-Day tracks and Two-Day tracks scheduled for 19th &amp;amp;amp; 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 1 - 19th Nov, 2009'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 2 - 20th Nov, 2009'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course ID''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course Duration''' &lt;br /&gt;
(# of Days) &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course Title''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Instructor''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course ID''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course Duration''' &lt;br /&gt;
(# of Days) &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course Title''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Instructor'''&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;30&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''One Day Training Tracks'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DHSO''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Oracle_Hacking_and_security ORACLE Hacking &amp;amp;amp; Security]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Sumit Sidharth,[[Image:Sb logo.png|center|78x50px|link=http://www.securitybyte.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DAWH''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Advanced_Web_Hacking Advanced Web Hacking -Securing AJAX, RIA &amp;amp;amp; SOA]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Shreeraj Shah [[Image:Blueinfy logo.png|center|link=http://www.blueinfy.com]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DAFT'''&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Advanced_Forensic_Techniques Advanced Forensics Techniques]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Dr. Chandrasekhar Umapathy,[[Image:Sb logo.png|center|78x50px|link=http://www.securitybyte.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DIAT'''&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/InDepth_Assessment_Techniques In-depth Assessment Techniques: Design, Code, and Runtime]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Fydor Yarochkin, &lt;br /&gt;
&lt;br /&gt;
[[Image:Logo_Armorize.JPG‎|center|93x31px|link=http://www.armorize.com]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;30&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Two Day Training Tracks'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DNST''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Building_Advanced_Network_Security_tools Building advanced Network Security Tools]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Daniel Mende,[[Image:Ernw logo.png|center]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DNST''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Building_Advanced_Network_Security_tools Building advanced Network Security Tools]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Daniel Mende,[[Image:Ernw logo.png|center]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DCBC''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/ISC2_CSSLP_CBK_Bootcamp (ISC)2 CSSLP CBK Boot camp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Mano Paul,[[Image:Isc logo.png|center|78x50px|link=http://www.isc2.org]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DCBC''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/ISC2_CSSLP_CBK_Bootcamp (ISC)2 CSSLP CBK Boot camp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Mano Paul,[[Image:Isc logo.png|center|78x50px|link=http://www.isc2.org]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSCJ / SANS Course ID&amp;amp;nbsp;: DEV530''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_Essential_Secure_Coding_Java_JEE_GSSP Essential Secure Coding in Java / JEE]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSCJ / SANS Course ID&amp;amp;nbsp;: DEV530''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_Essential_Secure_Coding_Java_JEE_GSSP Essential Secure Coding in Java / JEE]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DWPT / SANS Course ID&amp;amp;nbsp;: DEV538''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_WebApp_Pentesting_handsOn_immersion Web Application Pen Testing Hands-On Immersion]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DWPT / SANS Course ID&amp;amp;nbsp;: DEV538''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_WebApp_Pentesting_handsOn_immersion Web Application Pen Testing Hands-On Immersion]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSAB / SANS Course ID&amp;amp;nbsp;: AUD429''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_IT_Security_Audit_Bootcamp IT Security Audit Essentials Bootcamp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSAB / SANS Course ID&amp;amp;nbsp;: AUD429''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_IT_Security_Audit_Bootcamp IT Security Audit Essentials Bootcamp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Venue  ====&lt;br /&gt;
&lt;br /&gt;
Four Days Event is planned out at: &lt;br /&gt;
&lt;br /&gt;
[http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza,]&amp;lt;br&amp;gt;Site - 2, Sector - 29, &amp;lt;br&amp;gt;Gurgaon-122001 (National Capital Region), India&amp;lt;br&amp;gt;Hotel Front Desk: 91-124-4534000&amp;lt;br&amp;gt;Hotel Fax: 91-124-4304800&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | '''Co-Sponsor &amp;quot;Leadership Summit 2009&amp;quot;'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | '''CTF&amp;amp;nbsp;(Capture The Flag) Sponsor'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | '''Education &amp;amp;nbsp;Partner'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:20th green stacked.png|center|ISC2|link=http://www.isc2.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
| [[Image:Appin.jpg|center|link=http://www.appinsecurity.com]]&amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
| [[Image:BRIP-Logo.jpg|center|link=http://www.brip.co.in]]&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
[[Image:Beyond-logo_large.jpg|Left|link=http://www.www.beyondsecurity.com]]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;b&amp;gt;Innovation &amp;amp;nbsp;Partner&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
[[Image:IBM.gif|Left|link=http://www.www.ibm.com]]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Associate Sponsors'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;90&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Media Partners'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Supporters'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Torridn.jpg|center|link=http://www.torridnetworks.com]] &lt;br /&gt;
| [[Image:SSecurity_india_small.gif‎ |center|link=http://www.searchsecurity.in]]&lt;br /&gt;
| [[Image:HITB.jpg|center|link=http://conference.hitb.org]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:SecurityCompass.JPG|center|link=http://www.securitycompass.com]] &lt;br /&gt;
| [[Image:HNS-web.jpg|center|link=http://www.net-security.org]] &lt;br /&gt;
| [[Image:Sector.jpg|center|link=http://www.sector.ca]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Logo_Armorize.JPG|center|link=http://www.armorize.com]] &amp;lt;br&amp;gt;‎ &lt;br /&gt;
| [[Image:Infosecurity.jpg|center|link=http://www.infosecuritymagz.com]] &amp;lt;br&amp;gt;&lt;br /&gt;
| [[Image:Clubhack.gif|center]]&amp;lt;br&amp;gt;[[Image:Eventavenue Logo.jpg|center|link=https://www.eventavenue.com]]&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:eads.jpg|center|link=http://www.eads.com]]&amp;lt;br&amp;gt;&lt;br /&gt;
| [[Image:Itmagz.jpg|center]]&amp;amp;nbsp;[[Image:Electronicsf.jpg|center|link=http://www.electronicsforu.com]] &lt;br /&gt;
| [[Image:Crowne plaza.jpg|center|link=http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;b&amp;gt;Knowledge &amp;amp;nbsp;Partner&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
[[Image:BSI.gif|Left|link=http://www.www.bsigroup.co.in]]&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
==== Hotel &amp;amp; Travel  ====&lt;br /&gt;
&lt;br /&gt;
== Hotel Stay &amp;amp; Travel Information  ==&lt;br /&gt;
&lt;br /&gt;
To help our valued delegates with Hotel and Travel services, we have negotiated with some of the best and Budget Category Guest houses in Gurgaon that are located within a radius of 3 - 4 Kms from the venue.&lt;br /&gt;
&lt;br /&gt;
Limited cheaper accommodation is available near the venue hotel in budget hotels/apartments area. The tariff of these hotels ranges from Rs.2000 onwards per room night (inclusive of Room Rent, Breakfast and Luxury Tax).  Interested delegates / students can send a formal request for the desired accommodations and dates to our official travel agent.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;OFFICIAL TRAVEL AGENT&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dreamz conference Management Pvt.Ltd&amp;lt;/b&amp;gt; will look after your hotel accommodation in Gurgaon and New Delhi, pre &amp;amp; post conference tours / travel needs in India for delegates and visitors independently. If you wish to go for sightseeing tour within New Delhi and around it to places like Agra, Jaipur, Rajasthan etc. However, we would encourage you to make early bookings which will be done on “first – come - first service” basis and let us know of your interest, since that would ultimately work in your favour. Early reservation is strongly recommended as November being a high demand period for hotels in Gurgaon.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
For further details please contact:&lt;br /&gt;
&lt;br /&gt;
DREAMZ CONFERENCE MANAGEMENT PVT.LTD&lt;br /&gt;
&lt;br /&gt;
406, Ansal’s Majestic Tower, Vikas Puri, New Delhi – 110018&lt;br /&gt;
&lt;br /&gt;
Tel: 91 – 11 – 41586401, 402, Fax: 91 – 11 – 41586400&lt;br /&gt;
&lt;br /&gt;
Email: info@dreamztravel.net / dreamztravelindia@yahoo.com&lt;br /&gt;
&lt;br /&gt;
Website: www.dreamztravel.net&lt;br /&gt;
&lt;br /&gt;
Contact Person: Jitin Batra ( +91 9810558569 )&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==== Capture the Flag  ====&lt;br /&gt;
&lt;br /&gt;
== HackHunt 2009  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;India's foremost Hacking Challenge &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Your Shot to the Title of India's best hacker along with Prize money of more than &amp;lt;b&amp;gt;Rs 150,000&amp;lt;/b&amp;gt; up for grabs!&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Search for India’s Best Ethical Hacker &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
HackHunt is India’s leading hacking competition and aims at awarding the best ethical hackers in the country. The competition is brought to you by Appin Security Group, a leading Information Security and Ethical Hacking Company and Securitybyte, a global Information Security Conference Company. &lt;br /&gt;
&lt;br /&gt;
The competition will be conducted in 3 phases. The 1st two rounds will be online and the 3rd and final round will take place at“Securitybyte &amp;amp; OWASP Appsec Asia 2009” on November 17, 2009at Crowne Plaza, Gurgaon. &lt;br /&gt;
&lt;br /&gt;
Level 1 – Knowledge Check&lt;br /&gt;
All the participants will be answering a quiz and based on the score top 10% will be shortlisted to 2nd round.&lt;br /&gt;
&lt;br /&gt;
Level 2 – Skill Check&lt;br /&gt;
This stage will require an attacker to get to the final FLAG file which he/she would need to register for the event.&lt;br /&gt;
&lt;br /&gt;
Level 3 – Final Round&lt;br /&gt;
This stage will require the attackers to exploit a pre-announced SSID which has WPA (or wpa 2).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To participate and for more details visit website :- http://www.hackerscouncil.org/&lt;br /&gt;
&lt;br /&gt;
== PacketWars  ==&lt;br /&gt;
&amp;lt;b&amp;gt;First time in India brought to you by Securitybyte! &amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;                                              &lt;br /&gt;
About PacketWars&lt;br /&gt;
&lt;br /&gt;
PacketWars is an intense, real-time information warfare simulation. Unlike other “capture the flag” games, the battlegrounds featured in PacketWars use the same software and hardware you would encounter in the real world.&lt;br /&gt;
&lt;br /&gt;
PacketWars is designed to operate like a sport. Think Formula One Racing meets professional golf with a dash of Ultimate Fighting thrown in for good measure. Serious fun!&lt;br /&gt;
&lt;br /&gt;
Visit http://packetwars.com/ for more details.&lt;br /&gt;
How To Play?&lt;br /&gt;
&lt;br /&gt;
PacketWars is a Sport like nothing you have ever experienced! Games known as “BATTLES” pit individual players and teams against each other in a race to achieve defined objectives.&lt;br /&gt;
&lt;br /&gt;
The rules of engagement are simple:&lt;br /&gt;
- Illegal activity of any kind is prohibited&lt;br /&gt;
- Protect yourself at all times&lt;br /&gt;
- Battles are designed to be of a low, medium or high difficulty level based on the battle objectives and battle duration&lt;br /&gt;
- Primary, Secondary and Tertiary objectives are defined and assigned points based on difficulty&lt;br /&gt;
- Battles have time limits and other defined constraints&lt;br /&gt;
- Constraints are sometimes known to the combatants and other times are not&lt;br /&gt;
- Anything that is not expressly prohibited is allowed&lt;br /&gt;
- Points are awarded for FLARE&lt;br /&gt;
&lt;br /&gt;
Equipment Needed:&lt;br /&gt;
- Most combants use a notebook and a BackTrack CD however you are only limited by your imagination and bank account&lt;br /&gt;
- You need a battle field and a PacketMaster…Oh yeah, skillz come in handy also!How To Play&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b.How can I participate?&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
PacketWars to be held at the Hotel Crowne Plaza, Gurgaon on Nov 17 &amp;amp; Nov 18, 2009. Participation is FREE! Schedule will be announced soon.&lt;br /&gt;
&lt;br /&gt;
== WebWar III  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;About&amp;lt;/b&amp;gt;&lt;br /&gt;
Hackers attack, coders defend, when you get them together you end up with Web War III. WWIII is designed to put your Web Application attack and defense skills to the test.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Teams&amp;lt;/b&amp;gt;&lt;br /&gt;
Each team consists of two players, an attacker and a defender. The attacker would be capable of identifying Web Application Vulnerabilities (OWASP Top 10). The defender would be capable of writing secure Java code.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Game Format&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The game has two stages:&lt;br /&gt;
&lt;br /&gt;
Stage 1:&lt;br /&gt;
Each team is given a VM Ware image containing a web server hosting a vulnerable web application. During this stage each team identifies the vulnerabilities in their application.&lt;br /&gt;
They try to fix the identified vulnerabilities by making code changes.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Stage 2:&lt;br /&gt;
The IP addresses of the Web Server's of all the teams is announced.&lt;br /&gt;
Each team looks for vulnerabilities in the Web Applications of the other teams.&lt;br /&gt;
Vulnerabilities found on the opponents' application get positive points.&lt;br /&gt;
Vulnerabilities found by the opponents on your application get negative points.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Team with the highest points at the end of Stage 2 wins.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Tools and Equipments&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Each team should bring their own laptop with VM Ware installed.&lt;br /&gt;
The attacker can use any tools they bring.&lt;br /&gt;
The applications come with ESAPI to help the defenders fix the code quicker.&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
==== Leadership Summit 2009  ====&lt;br /&gt;
&amp;lt;b&amp;gt;India's top technology thought leaders coming together to discuss &amp;quot;Security concerns in off-shoring&amp;quot;&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Honored Guests&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
-Honorable Former President of India, Dr. A.P.J Abdul Kalam to inaugrate the Leadership Summit 2009.&amp;lt;br&amp;gt;&lt;br /&gt;
-Prof. Howard A. Schmidt(Advisor, NIST; Former Vice Chair - President’s Critical Infrastructure Board; Former Special Advisor – Cyberspace Security for White House)&amp;lt;br&amp;gt;&lt;br /&gt;
-Mr. Hord Tipton, Executive Director (ISC)2&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;About the Event&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
An elite gathering of 200 technology leaders, decision makers &amp;amp; InfoSec experts from leading service providers, government agencies and various industry verticals.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Two hours of panel discussions between three panels of 12 distinguished industry experts representing outsourcing companies, service providers and the regulatory bodies.  Panel discussions will be followed by networking dinner &amp;amp; cocktails.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Prof Howard A. Schmidt (Advisor, NIST; Former Vice Chair - President’s Critical Infrastructure Board; Former Special Advisor – Cyberspace Security for White House) will facilitate the panel discussions. Thought leaders participating in the panel discussions are:&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Outsourcing Organizations&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Raghavendra Vaidya, CIO - GE Capital India&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. CRN Vairavelu, VP - Ford Technology Services India&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Pankaj Agrawal, CISO - Aircel Limited&amp;lt;br&amp;gt;&lt;br /&gt;
TBD&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Service Providers&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Terry Thomas, Partner - Ernst &amp;amp; Young&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Debashis Ghosh, Head (LS&amp;amp;H ISU) - Tata Consultancy Services&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Sunil Gujral, EVP &amp;amp; CTO - Quatrro&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Sunil Goyal, COO - Sopra group&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Regulatory Bodies&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Dr. Kamlesh Bajaj, CEO - DSCI (a NASSCOM initiative)&amp;lt;br&amp;gt;&lt;br /&gt;
Dr. Gulshan Rai, Director - CERT-in&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Hord Tipton, Executive Director - ISC2 (ex CIO, US Department of Interior)&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Vakul Sharma, Lawyer - Supreme Court&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The event is exclusive to industry leaders and is by private invitation only. If you are interested in attending the event, please email your business card to info@securitybyte.org This e-mail address is being protected from spambots.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Venue - Hotel Crowne Plaza, Gurgaon | Timings - 5:30PM - 9:00PM&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
Please contact [http://www.owasp.org/index.php/Category:India#OWASP_India_Co-Chairs Chair - OWASP India] for sponsorship opportunities. &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Category:India Category: OWASP India]&lt;/div&gt;</summary>
		<author><name>Puneetm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Hakin9.JPG&amp;diff=73184</id>
		<title>File:Hakin9.JPG</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Hakin9.JPG&amp;diff=73184"/>
				<updated>2009-11-13T14:15:28Z</updated>
		
		<summary type="html">&lt;p&gt;Puneetm: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Puneetm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:BSI.gif&amp;diff=73183</id>
		<title>File:BSI.gif</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:BSI.gif&amp;diff=73183"/>
				<updated>2009-11-13T14:07:16Z</updated>
		
		<summary type="html">&lt;p&gt;Puneetm: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Puneetm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:IBM.gif&amp;diff=73181</id>
		<title>File:IBM.gif</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:IBM.gif&amp;diff=73181"/>
				<updated>2009-11-13T13:56:19Z</updated>
		
		<summary type="html">&lt;p&gt;Puneetm: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Puneetm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SecurityByte_and_OWASP_Asia_AppSec_Conference_2009&amp;diff=73180</id>
		<title>SecurityByte and OWASP Asia AppSec Conference 2009</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SecurityByte_and_OWASP_Asia_AppSec_Conference_2009&amp;diff=73180"/>
				<updated>2009-11-13T13:49:55Z</updated>
		
		<summary type="html">&lt;p&gt;Puneetm: /* Two Days Conference */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:SB OWASP 2009 banner.gif|center|link=http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009]]&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza] &amp;amp;#124; [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Registrations]&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*&amp;lt;b&amp;gt;Only One Week Left ! Register Online today to grab your seat for India's best Security Conference.&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;Honorable Former President of India, Dr. A.P.J Abdul Kalam to Inaugrate the India Technology Leadership Summit 2009. &amp;lt;/b&amp;gt;This event is an Invitation ONLY event.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Registrations Click Here]''' for more information.&lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
Securitybyte &amp;amp;amp; OWASP are proud to welcome you to the annual international information security conference – Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009, Nov 17th through Nov 20th in Delhi &amp;amp;amp; NCR, India. &lt;br /&gt;
&lt;br /&gt;
This is a landmark event, as both Securitybyte and OWASP join hands to present India’s largest InfoSec event with world renowned and most regarded international speakers. &lt;br /&gt;
&lt;br /&gt;
Securitybye &amp;amp;amp; OWASP AppSec Asia Conference 2009 will be held at [http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza, Gurgaon, NCR, India.] on 17th November through 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Security Researchers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Penetration Testers &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*IT Security Professionals &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
&lt;br /&gt;
==== About  ====&lt;br /&gt;
&lt;br /&gt;
== About Conference  ==&lt;br /&gt;
&lt;br /&gt;
Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel conference talks to be conducted in 3 separate halls for two days i.e . 17th &amp;amp;amp; 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular talk. Conference talks are being delivered by world renowned and most regarded speakers from around the world. &lt;br /&gt;
&lt;br /&gt;
== About Trainings  ==&lt;br /&gt;
&lt;br /&gt;
Two days post-conference are dedicated towards best-of-breed trainings being conducted in association with SANS, ISC2 and other organizations. Trainings tracks have been made available as One-Day tracks and Two-Day tracks scheduled for 19th &amp;amp;amp; 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
==== Registrations  ====&lt;br /&gt;
&lt;br /&gt;
== [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Registration] is now open!  ==&lt;br /&gt;
&lt;br /&gt;
=== You can register [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 here]  ===&lt;br /&gt;
&lt;br /&gt;
*[http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Click Here] for Online Registrations. &lt;br /&gt;
*[http://securitybyte.org/index.php/register.html Click Here] for Offline Registrations.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Please check out our Exclusive Discount Offer, available Starting October 6th - 15th, 2009. &amp;quot;SAVE BIG NOW !&amp;quot;&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''''The below pricing reflects the Standard Registration Prices .''''' &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Two Days of Conference (17th and 18th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.8,500/- INR &lt;br /&gt;
| General Public&lt;br /&gt;
|-&lt;br /&gt;
| Two Days of Conference (17th and 18th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.5,000/- INR &lt;br /&gt;
| Students&lt;br /&gt;
|-&lt;br /&gt;
| Two-Day Training Tracks (19th and 20th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.25,000/- INR&lt;br /&gt;
|-&lt;br /&gt;
| One-Day Training Tracks (19th OR 20th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.12,500/- INR&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;** Service Tax @ 10.3% will be charged extra.&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;ISC2&amp;lt;/b&amp;gt; Members can avail a Special 15% discount on Conference &amp;amp; Training Registration.&lt;br /&gt;
(Please provide your ISC2 Certification ID number to avail the above Discount)&lt;br /&gt;
For Registrations contact us at registrations@securitybyte.org&lt;br /&gt;
== Exclusive Offers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;- Group / Team Discounts available: Kindly contact us at registrations@securitybyte.org&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Special University Student discount&amp;lt;/b&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
- University Students can register for two days of conference for just Rs. 5000 (including taxes)&amp;lt;br&amp;gt;&lt;br /&gt;
- Special 15 % Discounts for Training registration&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Trainings Click here for details on the training courses that are available.]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Who Should Attend Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009: ==&lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Security Researchers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Penetration Testers &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*IT Security Professionals &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;For student discount, attendees must present proof of enrollment when picking up your badge. &lt;br /&gt;
&lt;br /&gt;
==== Schedule  ====&lt;br /&gt;
&lt;br /&gt;
Three parallel conference talks are scheduled for 17th &amp;amp;amp; 18th November 2009 in three different halls. Training tracks have been divided in one-day tracks scheduled for 19th or 20th November 2009 and two-day tracks those are schedule to continue for two days both on 19th &amp;amp;amp; 20th November 2009. Follow the tabs to learn the details on both conference and trainings. &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Conference Click here] to view the '''Conference Schedule''' for 17th &amp;amp;amp; 18th November 2009.&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Trainings Click here] to view '''Training Schedule''' on 19th &amp;amp;amp; 20th November 2009.&lt;br /&gt;
&lt;br /&gt;
==== Conference  ====&lt;br /&gt;
&lt;br /&gt;
== Two Days Conference  ==&lt;br /&gt;
&lt;br /&gt;
Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel conference talks to be conducted in 3 separate halls for two days i.e . 17th &amp;amp;amp; 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular talk. Conference talks are being delivered by world renowned and most regarded speakers from around the world. Below is the detailed schedule for the two days of conference.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 1 - 17th Nov, 2009'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Where&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - I''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - II''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - III'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Who&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Researchers &amp;amp;amp; Enthusiasts)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Auditors, Developers, QA teams, Architects)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Leaders, Managers, C&amp;amp;amp;S professionals)'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 8:00 AM - 9:00 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Registrations'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Schedule''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 9:00 AM - 10:30 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Keynote'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:30 AM - 11:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea Break'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 11:00 AM - 12:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | How To Blackbox Test Almost Anything&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Aviram Jenik, Beyond Security&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | The International State of Cyber Security, Risk reduction in a high threat world&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Prof. Howard A. Schmidt, Former Cyber Security Advisor to the White house&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:00 PM - 1:00 PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Client Side Hacks&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Dino Covotsos &amp;amp; Charleton Smith, Telspace Systems&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Risk Based Penetration testing&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | K. K. Mookhey, Founder &amp;amp;amp; Principal Consultant, NII Consulting&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Applications, the source for CyberThreats&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Mano Paul,Software Assurance Advisor,(ISC)2&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 1:00PM - 2:00PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Lunch'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 2:00 PM - 3:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Exploiting Firefox Extensions&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Roberto Suggi Liverani, Security-Assessment.com&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Threat Modeling&amp;lt;br&amp;gt;&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Varun Sharma,Microsoft India&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Enterprise Application Security Program&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 3:00 PM - 4:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | SQL Server Forensics 2.0&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Kevvie Fowler, TELUS &amp;amp;amp; Ringzero&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | OWASP SAMM&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Pravir Chandra, Director of Strategic Services,&amp;lt;br&amp;gt;Fortify&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Business Case - Risk Management/Compliance at leading Education Group AMITY (Rapid Fire: 30 Min talk)&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Dr. JS Sodhi, CIO, AMITY Group&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 4:00 PM - 5:00 PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Ownage 2.0 - How to own the World&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Saumil Shah, NetSquare Solutions&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | &amp;quot;Do you want to play a Game&amp;quot; - Game theory and Cyberwar&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Bryan K. Fite, HackSecKlahn&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Usability and Privacy in Security&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Dr. Ponnurangam Kumaraguru, Asst. Professor - IIIT (Rapid Fire : 30 Min talk)&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 5:00 PM - 6:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea and Snacks on the Exhibition floor'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 7:00 PM - 10:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''CXO Event (Exclusive by invitation only) - Information Security Concerns for Offshoring'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 2 - 18th Nov, 2009'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Where&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - I''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - II''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - III'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Who&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Researchers &amp;amp;amp; Enthusiasts)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Auditors, Developers, QA teams, Architects)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Leaders, Managers, C&amp;amp;amp;S professionals)'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 8:00 AM - 9:00 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Registrations'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 9:00 AM - 10:00 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Round Table with Speakers / Industry Panel - &amp;quot;Security Today &amp;amp; Tomorrow''''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:00 AM - 10:30 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea Break'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Schedule''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:30 AM - 11:30&amp;amp;nbsp;AM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | All your Packets belong to us&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Daniel Mende, Security Researcher, ERNW&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | SANS Dshield Webhoneypot Project&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Jason Lam, Independent Security Researcher&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Critical Infrastructure Security “Danger Without borders” &amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | John Bumgarner, US Cyber Consequence Unit (USCCU)&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 11:30 AM - 12:30 PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Hacking Oracle From Web&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Sid, Independent Security Researcher&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Testing JSON Applications For Security Holes&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Aviram Jenik, Beyond Security&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Critical Infrastructure Security “Danger Without borders” &amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | John Bumgarner, US Cyber Consequence Unit (USCCU)&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:30PM - 1:30PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Lunch'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 1:30 PM&amp;amp;nbsp;- 2:30 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Lust 2.0 – Desire for free WiFi and the threat of the Imposter &amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Lava Kumar Kuppan, Independent Security Researcher&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Cloud Hacking - Distributed Attacks &amp;amp; Exploits&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Shreeraj Shah, Blueinfy Solutions&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Cedric Blancher, EADS Innovation Works&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 2:30 PM - 3:30&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Xprobe3 - What's New? Going Application Level&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Fyodor Yarochkin, Armorize&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Nitin Kumar/Vipin Kumar, Independent Security Researchers, NVlabs&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Behind the Scenes at Microsoft Security Response Center&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Dave Midturi,MSRC, Microsoft Corp.&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 3:30PM - 4:00PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea Break'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 4:00 PM - 5:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 5:00 PM - 6:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Closing Keynotes - &amp;quot;OWASP &amp;amp; Securitybyte&amp;quot;'''&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Trainings  ====&lt;br /&gt;
&lt;br /&gt;
== Two Day Trainings  ==&lt;br /&gt;
&lt;br /&gt;
Two days post-conference are dedicated towards best-of-breed trainings being conducted in association with SANS, ISC2 and other organizations. Trainings tracks have been made available as One-Day tracks and Two-Day tracks scheduled for 19th &amp;amp;amp; 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 1 - 19th Nov, 2009'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 2 - 20th Nov, 2009'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course ID''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course Duration''' &lt;br /&gt;
(# of Days) &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course Title''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Instructor''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course ID''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course Duration''' &lt;br /&gt;
(# of Days) &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course Title''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Instructor'''&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;30&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''One Day Training Tracks'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DHSO''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Oracle_Hacking_and_security ORACLE Hacking &amp;amp;amp; Security]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Sumit Sidharth,[[Image:Sb logo.png|center|78x50px|link=http://www.securitybyte.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DAWH''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Advanced_Web_Hacking Advanced Web Hacking -Securing AJAX, RIA &amp;amp;amp; SOA]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Shreeraj Shah [[Image:Blueinfy logo.png|center|link=http://www.blueinfy.com]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DAFT'''&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Advanced_Forensic_Techniques Advanced Forensics Techniques]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Dr. Chandrasekhar Umapathy,[[Image:Sb logo.png|center|78x50px|link=http://www.securitybyte.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DIAT'''&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/InDepth_Assessment_Techniques In-depth Assessment Techniques: Design, Code, and Runtime]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Fydor Yarochkin, &lt;br /&gt;
&lt;br /&gt;
[[Image:Logo_Armorize.JPG‎|center|93x31px|link=http://www.armorize.com]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;30&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Two Day Training Tracks'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DNST''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Building_Advanced_Network_Security_tools Building advanced Network Security Tools]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Daniel Mende,[[Image:Ernw logo.png|center]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DNST''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Building_Advanced_Network_Security_tools Building advanced Network Security Tools]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Daniel Mende,[[Image:Ernw logo.png|center]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DCBC''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/ISC2_CSSLP_CBK_Bootcamp (ISC)2 CSSLP CBK Boot camp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Mano Paul,[[Image:Isc logo.png|center|78x50px|link=http://www.isc2.org]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DCBC''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/ISC2_CSSLP_CBK_Bootcamp (ISC)2 CSSLP CBK Boot camp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Mano Paul,[[Image:Isc logo.png|center|78x50px|link=http://www.isc2.org]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSCJ / SANS Course ID&amp;amp;nbsp;: DEV530''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_Essential_Secure_Coding_Java_JEE_GSSP Essential Secure Coding in Java / JEE]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSCJ / SANS Course ID&amp;amp;nbsp;: DEV530''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_Essential_Secure_Coding_Java_JEE_GSSP Essential Secure Coding in Java / JEE]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DWPT / SANS Course ID&amp;amp;nbsp;: DEV538''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_WebApp_Pentesting_handsOn_immersion Web Application Pen Testing Hands-On Immersion]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DWPT / SANS Course ID&amp;amp;nbsp;: DEV538''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_WebApp_Pentesting_handsOn_immersion Web Application Pen Testing Hands-On Immersion]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSAB / SANS Course ID&amp;amp;nbsp;: AUD429''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_IT_Security_Audit_Bootcamp IT Security Audit Essentials Bootcamp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSAB / SANS Course ID&amp;amp;nbsp;: AUD429''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_IT_Security_Audit_Bootcamp IT Security Audit Essentials Bootcamp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Venue  ====&lt;br /&gt;
&lt;br /&gt;
Four Days Event is planned out at: &lt;br /&gt;
&lt;br /&gt;
[http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza,]&amp;lt;br&amp;gt;Site - 2, Sector - 29, &amp;lt;br&amp;gt;Gurgaon-122001 (National Capital Region), India&amp;lt;br&amp;gt;Hotel Front Desk: 91-124-4534000&amp;lt;br&amp;gt;Hotel Fax: 91-124-4304800&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | '''Co-Sponsor &amp;quot;Leadership Summit 2009&amp;quot;'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | '''CTF&amp;amp;nbsp;(Capture The Flag) Sponsor'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | '''Education &amp;amp;nbsp;Partner'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:20th green stacked.png|center|ISC2|link=http://www.isc2.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
| [[Image:Appin.jpg|center|link=http://www.appinsecurity.com]]&amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
| [[Image:BRIP-Logo.jpg|center|link=http://www.brip.co.in]]&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
| [[Image:Beyond-logo_large.jpg|Left|link=http://www.www.beyondsecurity.com]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Associate Sponsors'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;90&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Media Partners'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Supporters'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Torridn.jpg|center|link=http://www.torridnetworks.com]] &lt;br /&gt;
| [[Image:SSecurity_india_small.gif‎ |center|link=http://www.searchsecurity.in]]&lt;br /&gt;
| [[Image:HITB.jpg|center|link=http://conference.hitb.org]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:SecurityCompass.JPG|center|link=http://www.securitycompass.com]] &lt;br /&gt;
| [[Image:HNS-web.jpg|center|link=http://www.net-security.org]] &lt;br /&gt;
| [[Image:Sector.jpg|center|link=http://www.sector.ca]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Logo_Armorize.JPG|center|link=http://www.armorize.com]] &amp;lt;br&amp;gt;‎ &lt;br /&gt;
| [[Image:Infosecurity.jpg|center|link=http://www.infosecuritymagz.com]] &amp;lt;br&amp;gt;&lt;br /&gt;
| [[Image:Clubhack.gif|center]]&amp;lt;br&amp;gt;[[Image:Eventavenue Logo.jpg|center|link=https://www.eventavenue.com]]&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:eads.jpg|center|link=http://www.eads.com]]&amp;lt;br&amp;gt;&lt;br /&gt;
| [[Image:Itmagz.jpg|center]]&amp;amp;nbsp;[[Image:Electronicsf.jpg|center|link=http://www.electronicsforu.com]] &lt;br /&gt;
| [[Image:Crowne plaza.jpg|center|link=http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
==== Hotel &amp;amp; Travel  ====&lt;br /&gt;
&lt;br /&gt;
== Hotel Stay &amp;amp; Travel Information  ==&lt;br /&gt;
&lt;br /&gt;
To help our valued delegates with Hotel and Travel services, we have negotiated with some of the best and Budget Category Guest houses in Gurgaon that are located within a radius of 3 - 4 Kms from the venue.&lt;br /&gt;
&lt;br /&gt;
Limited cheaper accommodation is available near the venue hotel in budget hotels/apartments area. The tariff of these hotels ranges from Rs.2000 onwards per room night (inclusive of Room Rent, Breakfast and Luxury Tax).  Interested delegates / students can send a formal request for the desired accommodations and dates to our official travel agent.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;OFFICIAL TRAVEL AGENT&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dreamz conference Management Pvt.Ltd&amp;lt;/b&amp;gt; will look after your hotel accommodation in Gurgaon and New Delhi, pre &amp;amp; post conference tours / travel needs in India for delegates and visitors independently. If you wish to go for sightseeing tour within New Delhi and around it to places like Agra, Jaipur, Rajasthan etc. However, we would encourage you to make early bookings which will be done on “first – come - first service” basis and let us know of your interest, since that would ultimately work in your favour. Early reservation is strongly recommended as November being a high demand period for hotels in Gurgaon.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
For further details please contact:&lt;br /&gt;
&lt;br /&gt;
DREAMZ CONFERENCE MANAGEMENT PVT.LTD&lt;br /&gt;
&lt;br /&gt;
406, Ansal’s Majestic Tower, Vikas Puri, New Delhi – 110018&lt;br /&gt;
&lt;br /&gt;
Tel: 91 – 11 – 41586401, 402, Fax: 91 – 11 – 41586400&lt;br /&gt;
&lt;br /&gt;
Email: info@dreamztravel.net / dreamztravelindia@yahoo.com&lt;br /&gt;
&lt;br /&gt;
Website: www.dreamztravel.net&lt;br /&gt;
&lt;br /&gt;
Contact Person: Jitin Batra ( +91 9810558569 )&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==== Capture the Flag  ====&lt;br /&gt;
&lt;br /&gt;
== HackHunt 2009  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;India's foremost Hacking Challenge &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Your Shot to the Title of India's best hacker along with Prize money of more than &amp;lt;b&amp;gt;Rs 150,000&amp;lt;/b&amp;gt; up for grabs!&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Search for India’s Best Ethical Hacker &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
HackHunt is India’s leading hacking competition and aims at awarding the best ethical hackers in the country. The competition is brought to you by Appin Security Group, a leading Information Security and Ethical Hacking Company and Securitybyte, a global Information Security Conference Company. &lt;br /&gt;
&lt;br /&gt;
The competition will be conducted in 3 phases. The 1st two rounds will be online and the 3rd and final round will take place at“Securitybyte &amp;amp; OWASP Appsec Asia 2009” on November 17, 2009at Crowne Plaza, Gurgaon. &lt;br /&gt;
&lt;br /&gt;
Level 1 – Knowledge Check&lt;br /&gt;
All the participants will be answering a quiz and based on the score top 10% will be shortlisted to 2nd round.&lt;br /&gt;
&lt;br /&gt;
Level 2 – Skill Check&lt;br /&gt;
This stage will require an attacker to get to the final FLAG file which he/she would need to register for the event.&lt;br /&gt;
&lt;br /&gt;
Level 3 – Final Round&lt;br /&gt;
This stage will require the attackers to exploit a pre-announced SSID which has WPA (or wpa 2).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To participate and for more details visit website :- http://www.hackerscouncil.org/&lt;br /&gt;
&lt;br /&gt;
== PacketWars  ==&lt;br /&gt;
&amp;lt;b&amp;gt;First time in India brought to you by Securitybyte! &amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;                                              &lt;br /&gt;
About PacketWars&lt;br /&gt;
&lt;br /&gt;
PacketWars is an intense, real-time information warfare simulation. Unlike other “capture the flag” games, the battlegrounds featured in PacketWars use the same software and hardware you would encounter in the real world.&lt;br /&gt;
&lt;br /&gt;
PacketWars is designed to operate like a sport. Think Formula One Racing meets professional golf with a dash of Ultimate Fighting thrown in for good measure. Serious fun!&lt;br /&gt;
&lt;br /&gt;
Visit http://packetwars.com/ for more details.&lt;br /&gt;
How To Play?&lt;br /&gt;
&lt;br /&gt;
PacketWars is a Sport like nothing you have ever experienced! Games known as “BATTLES” pit individual players and teams against each other in a race to achieve defined objectives.&lt;br /&gt;
&lt;br /&gt;
The rules of engagement are simple:&lt;br /&gt;
- Illegal activity of any kind is prohibited&lt;br /&gt;
- Protect yourself at all times&lt;br /&gt;
- Battles are designed to be of a low, medium or high difficulty level based on the battle objectives and battle duration&lt;br /&gt;
- Primary, Secondary and Tertiary objectives are defined and assigned points based on difficulty&lt;br /&gt;
- Battles have time limits and other defined constraints&lt;br /&gt;
- Constraints are sometimes known to the combatants and other times are not&lt;br /&gt;
- Anything that is not expressly prohibited is allowed&lt;br /&gt;
- Points are awarded for FLARE&lt;br /&gt;
&lt;br /&gt;
Equipment Needed:&lt;br /&gt;
- Most combants use a notebook and a BackTrack CD however you are only limited by your imagination and bank account&lt;br /&gt;
- You need a battle field and a PacketMaster…Oh yeah, skillz come in handy also!How To Play&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b.How can I participate?&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
PacketWars to be held at the Hotel Crowne Plaza, Gurgaon on Nov 17 &amp;amp; Nov 18, 2009. Participation is FREE! Schedule will be announced soon.&lt;br /&gt;
&lt;br /&gt;
== WebWar III  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;About&amp;lt;/b&amp;gt;&lt;br /&gt;
Hackers attack, coders defend, when you get them together you end up with Web War III. WWIII is designed to put your Web Application attack and defense skills to the test.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Teams&amp;lt;/b&amp;gt;&lt;br /&gt;
Each team consists of two players, an attacker and a defender. The attacker would be capable of identifying Web Application Vulnerabilities (OWASP Top 10). The defender would be capable of writing secure Java code.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Game Format&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The game has two stages:&lt;br /&gt;
&lt;br /&gt;
Stage 1:&lt;br /&gt;
Each team is given a VM Ware image containing a web server hosting a vulnerable web application. During this stage each team identifies the vulnerabilities in their application.&lt;br /&gt;
They try to fix the identified vulnerabilities by making code changes.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Stage 2:&lt;br /&gt;
The IP addresses of the Web Server's of all the teams is announced.&lt;br /&gt;
Each team looks for vulnerabilities in the Web Applications of the other teams.&lt;br /&gt;
Vulnerabilities found on the opponents' application get positive points.&lt;br /&gt;
Vulnerabilities found by the opponents on your application get negative points.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Team with the highest points at the end of Stage 2 wins.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Tools and Equipments&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Each team should bring their own laptop with VM Ware installed.&lt;br /&gt;
The attacker can use any tools they bring.&lt;br /&gt;
The applications come with ESAPI to help the defenders fix the code quicker.&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
==== Leadership Summit 2009  ====&lt;br /&gt;
&amp;lt;b&amp;gt;India's top technology thought leaders coming together to discuss &amp;quot;Security concerns in off-shoring&amp;quot;&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Honored Guests&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
-Honorable Former President of India, Dr. A.P.J Abdul Kalam to inaugrate the Leadership Summit 2009.&amp;lt;br&amp;gt;&lt;br /&gt;
-Prof. Howard A. Schmidt(Advisor, NIST; Former Vice Chair - President’s Critical Infrastructure Board; Former Special Advisor – Cyberspace Security for White House)&amp;lt;br&amp;gt;&lt;br /&gt;
-Mr. Hord Tipton, Executive Director (ISC)2&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;About the Event&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
An elite gathering of 200 technology leaders, decision makers &amp;amp; InfoSec experts from leading service providers, government agencies and various industry verticals.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Two hours of panel discussions between three panels of 12 distinguished industry experts representing outsourcing companies, service providers and the regulatory bodies.  Panel discussions will be followed by networking dinner &amp;amp; cocktails.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Prof Howard A. Schmidt (Advisor, NIST; Former Vice Chair - President’s Critical Infrastructure Board; Former Special Advisor – Cyberspace Security for White House) will facilitate the panel discussions. Thought leaders participating in the panel discussions are:&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Outsourcing Organizations&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Raghavendra Vaidya, CIO - GE Capital India&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. CRN Vairavelu, VP - Ford Technology Services India&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Pankaj Agrawal, CISO - Aircel Limited&amp;lt;br&amp;gt;&lt;br /&gt;
TBD&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Service Providers&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Terry Thomas, Partner - Ernst &amp;amp; Young&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Debashis Ghosh, Head (LS&amp;amp;H ISU) - Tata Consultancy Services&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Sunil Gujral, EVP &amp;amp; CTO - Quatrro&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Sunil Goyal, COO - Sopra group&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Regulatory Bodies&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Dr. Kamlesh Bajaj, CEO - DSCI (a NASSCOM initiative)&amp;lt;br&amp;gt;&lt;br /&gt;
Dr. Gulshan Rai, Director - CERT-in&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Hord Tipton, Executive Director - ISC2 (ex CIO, US Department of Interior)&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Vakul Sharma, Lawyer - Supreme Court&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The event is exclusive to industry leaders and is by private invitation only. If you are interested in attending the event, please email your business card to info@securitybyte.org This e-mail address is being protected from spambots.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Venue - Hotel Crowne Plaza, Gurgaon | Timings - 5:30PM - 9:00PM&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
Please contact [http://www.owasp.org/index.php/Category:India#OWASP_India_Co-Chairs Chair - OWASP India] for sponsorship opportunities. &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Category:India Category: OWASP India]&lt;/div&gt;</summary>
		<author><name>Puneetm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SecurityByte_and_OWASP_Asia_AppSec_Conference_2009&amp;diff=73176</id>
		<title>SecurityByte and OWASP Asia AppSec Conference 2009</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SecurityByte_and_OWASP_Asia_AppSec_Conference_2009&amp;diff=73176"/>
				<updated>2009-11-13T11:13:09Z</updated>
		
		<summary type="html">&lt;p&gt;Puneetm: /* Two Days Conference */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Two Days Conference  ==&lt;br /&gt;
&lt;br /&gt;
Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel conference talks to be conducted in 3 separate halls for two days i.e . 17th &amp;amp;amp; 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular talk. Conference talks are being delivered by world renowned and most regarded speakers from around the world. Below is the detailed schedule for the two days of conference.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;&amp;lt;font face=&amp;quot;Arial&amp;quot; size=&amp;quot;2&amp;quot;&amp;gt;Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel training sessions to be conducted in 3 separate halls for two days i.e . 17th &amp;amp;amp; 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular session. Conference talks are being delivered by world renowned and most regarded speakers from around the world. Below is the conference schedule listing confirmed speakers and talks. Couple of talks are under review by the CFP (Call For Papers) Committee and shall be available as soon as those are confirmed. Event also follows two days of InfoSec trainings to be delivered in association with SANS, ISC2 and other organizations.&amp;lt;/font&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&amp;lt;font face=&amp;quot;Arial&amp;quot; size=&amp;quot;2&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;/font&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&amp;amp;nbsp;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;table border=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot; style=&amp;quot;border-collapse:&lt;br /&gt;
 collapse;width:100%&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;23&amp;quot; style=&amp;quot;height:17.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;23&amp;quot; style=&amp;quot;height: 17.25pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Where &amp;amp;gt;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 309px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #333399&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 1&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 316px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #3366FF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 2&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 334px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #00CCFF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 3:&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;19&amp;quot; style=&amp;quot;height:14.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;19&amp;quot; style=&amp;quot;height: 14.25pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Who &amp;amp;gt;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 309px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #333399&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Security Researchers &amp;amp;amp; Enthusiasts)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 316px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #3366FF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Security Auditors, Developers, QA, Architects)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 334px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #00CCFF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Leaders, Managers, C&amp;amp;amp;S professionals)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Schedule&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;10&amp;quot; height=&amp;quot;285&amp;quot; width=&amp;quot;24&amp;quot; style=&amp;quot;height: 213.75pt; width: 18pt; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid black; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;9:00AM&amp;amp;nbsp;&amp;amp;nbsp; - 10:30AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #DBE5F1&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Keynote Sessions&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;10:30AM - 11:00AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C5BE97&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Tea break &amp;amp;amp; Snacks on Exhibition Floor&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;11:00AM - 12:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;TBD&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;IBM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;How To Blackbox Test Almost Anything&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Aviram Jenik, Beyond Security&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;The International State of Cyber Security, Risk &lt;br /&gt;
		reduction in a high threat world&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Howard A. Schmidt, Former Cyber Security Advisor to &lt;br /&gt;
		the White house&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;12:00PM - 1:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Reconsidering Network Defenses or NOT !&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Cedric Blancher, EADS Innovation Works&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Lust 2.0 – Desire for free WiFi and the threat of the &lt;br /&gt;
		Imposter&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Lava Kumar Kuppan, Independent Security Researcher&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Applications - The new cyber security frontier&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Mano Paul, Software Assurance Advisor (ISC)2&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;1:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 2:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FAC090&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Lunch&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;2:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 3:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Exploiting Firefox Extensions&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Roberto Suggi Liverani, Security-Assessment.com&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Threat Modeling&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Varun Sharma, Microsoft Corp.&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Behind the scenes at the Microsoft Security Response &lt;br /&gt;
		Center&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Dave Midturi and Suresh Venkateswaran, Microsoft &lt;br /&gt;
		Security Response Center&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;3:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 4:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;SQL Server Forensics 2.0&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Kevvie Fowler, TELUS &amp;amp;amp; Ringzero&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Nitin Kumar/Vipin Kumar, Independent Security &lt;br /&gt;
		Researchers, Nvlabs&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Business Case-Risk Management/Compliance at leading &lt;br /&gt;
		Education Group at AMITY&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Dr J.S Sodhi, AMITY&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;4:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 4:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Business Continuity Case Study&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Venkataram Arabolu, BSI&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Usability and Privacy in Security&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Ponnurangam Kumaraguru, IIIT&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;4:30 PM&amp;amp;nbsp;&amp;amp;nbsp; - 5:30 PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C5BE97&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Tea break &amp;amp;amp; Snacks on Exhibition Floor&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;15&amp;quot; style=&amp;quot;height:11.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;15&amp;quot; style=&amp;quot;height: 11.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;7:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 10:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #DBE5F1&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;India Technology Leadership Summit 2009 (Exclusive by &lt;br /&gt;
		invitation only) -&amp;amp;quot; Information Security Concerns for Offshoring&amp;amp;quot;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;8&amp;quot; style=&amp;quot;height: 6.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;10&amp;quot; height=&amp;quot;8&amp;quot; style=&amp;quot;height: 6.0pt; width: 1070px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: white&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;23&amp;quot; style=&amp;quot;height:17.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;23&amp;quot; style=&amp;quot;height: 17.25pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Where &amp;amp;gt;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 309px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #333399&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 1&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 316px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #3366FF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 2&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 334px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #00CCFF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 3:&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;19&amp;quot; style=&amp;quot;height:14.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;19&amp;quot; style=&amp;quot;height: 14.25pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Who &amp;amp;gt;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 309px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #333399&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Security Researchers &amp;amp;amp; Enthusiasts)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 316px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #3366FF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Security Auditors, Developers, QA, Architects)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 334px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #00CCFF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Leaders, Managers, C&amp;amp;amp;S professionals)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Schedule&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;10&amp;quot; height=&amp;quot;257&amp;quot; width=&amp;quot;24&amp;quot; style=&amp;quot;height: 192.75pt; width: 18pt; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;9:00AM&amp;amp;nbsp;&amp;amp;nbsp; - 10:00AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #DBE5F1&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Round Table with Speakers / Industry Panel - &lt;br /&gt;
		&amp;amp;quot;Security Today &amp;amp;amp; Tomorrow'&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;10:00AM - 10:30AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C5BE97&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Tea break &amp;amp;amp; Snacks on Exhibition Floor&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;32&amp;quot; style=&amp;quot;height:24.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;32&amp;quot; style=&amp;quot;height: 24.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;10:30AM - 11:30AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Ten Things Web Developers Still Aren't Doing&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Frank Kim, ThinkSec Consulting&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;SANS Dshield Webhoneypot Project&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Jason Lam, Independent Security Researcher&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Critical Infrastructure Security “Danger Without &lt;br /&gt;
		borders”&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;John Bumgarner, US Cyber Consequence Unit (USCCU)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;32&amp;quot; style=&amp;quot;height:24.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;32&amp;quot; style=&amp;quot;height: 24.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;11:30AM - 12:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Cloud Hacking – Distributed Attack &amp;amp;amp; Exploit Platform&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Shreeraj Shah, Blueinfy Solutions&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Testing JSON Applications For Security Holes&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Aviram Jenik, Beyond Security&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Critical Infrastructure Security “Danger Without &lt;br /&gt;
		borders”&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;John Bumgarner, US Cyber Consequence Unit (USCCU)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;12:30PM&amp;amp;nbsp; - 1:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FAC090&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Lunch&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;1:30PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 2:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;All Your Packets Belong to Us - Attacking Backbone &lt;br /&gt;
		Technologies&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Daniel Mende, Security Researcher, ERNW&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Risk based Penetration Testing&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;K. K. Mookhey, Founder &amp;amp;amp; Principal Consultant, NII &lt;br /&gt;
		Consulting&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Wi-Fi security: the good, the bad and the ugly&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Cedric Blancher, EADS Innovation Works&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;32&amp;quot; style=&amp;quot;height:24.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;32&amp;quot; style=&amp;quot;height: 24.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;2:30PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 3:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Xprobe3 - What's New? Going Application Level&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Fyodor Yarochkin, Guard-info&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;OWASP SAMM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Pravir Chandra, OWASP&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Do you wanna Play a Game Game theory and Cyberwar&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Bryan K. Fite, HackSecKlahn&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;3:30PM-4:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C5BE97&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Tea break &amp;amp;amp; Snacks on Exhibition Floor&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;32&amp;quot; style=&amp;quot;height:24.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;32&amp;quot; style=&amp;quot;height: 24.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;4:00 PM&amp;amp;nbsp;&amp;amp;nbsp; - 5:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Rumbling Infections – Web Malware Ontology&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Aditya K. Sood, COSEINC&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;Hacking Oracle From Web&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Sid, Independent Security Researcher&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Connected Information Security Framework&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Anil Kumar Chintala, Microsoft&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;5:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 5:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #DBE5F1&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Closing Remarks by Organizing Committee&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&amp;amp;nbsp;&amp;lt;/p&amp;gt;&lt;/div&gt;</summary>
		<author><name>Puneetm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SecurityByte_and_OWASP_Asia_AppSec_Conference_2009&amp;diff=73175</id>
		<title>SecurityByte and OWASP Asia AppSec Conference 2009</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SecurityByte_and_OWASP_Asia_AppSec_Conference_2009&amp;diff=73175"/>
				<updated>2009-11-13T11:12:30Z</updated>
		
		<summary type="html">&lt;p&gt;Puneetm: /* Two Days Conference */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Two Days Conference  ==&lt;br /&gt;
&lt;br /&gt;
Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel conference talks to be conducted in 3 separate halls for two days i.e . 17th &amp;amp;amp; 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular talk. Conference talks are being delivered by world renowned and most regarded speakers from around the world. Below is the detailed schedule for the two days of conference.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;&amp;lt;font face=&amp;quot;Arial&amp;quot; size=&amp;quot;2&amp;quot;&amp;gt;Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel training sessions to be conducted in 3 separate halls for two days i.e . 17th &amp;amp;amp; 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular session. Conference talks are being delivered by world renowned and most regarded speakers from around the world. Below is the conference schedule listing confirmed speakers and talks. Couple of talks are under review by the CFP (Call For Papers) Committee and shall be available as soon as those are confirmed. Event also follows two days of InfoSec trainings to be delivered in association with SANS, ISC2 and other organizations.&amp;lt;/font&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&amp;lt;font face=&amp;quot;Arial&amp;quot; size=&amp;quot;2&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;/font&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&amp;amp;nbsp;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;table border=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot; style=&amp;quot;border-collapse:&lt;br /&gt;
 collapse;width:100%&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;23&amp;quot; style=&amp;quot;height:17.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;23&amp;quot; style=&amp;quot;height: 17.25pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Where &amp;amp;gt;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 309px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #333399&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 1&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 316px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #3366FF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 2&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 334px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #00CCFF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 3:&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;19&amp;quot; style=&amp;quot;height:14.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;19&amp;quot; style=&amp;quot;height: 14.25pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Who &amp;amp;gt;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 309px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #333399&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Security Researchers &amp;amp;amp; Enthusiasts)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 316px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #3366FF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Security Auditors, Developers, QA, Architects)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 334px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #00CCFF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Leaders, Managers, C&amp;amp;amp;S professionals)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Schedule&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;10&amp;quot; height=&amp;quot;285&amp;quot; width=&amp;quot;24&amp;quot; style=&amp;quot;height: 213.75pt; width: 18pt; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid black; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;img border=&amp;quot;0&amp;quot; src=&amp;quot;index.1.gif&amp;quot; width=&amp;quot;25&amp;quot; height=&amp;quot;271&amp;quot;&amp;gt; &amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;9:00AM&amp;amp;nbsp;&amp;amp;nbsp; - 10:30AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #DBE5F1&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Keynote Sessions&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;10:30AM - 11:00AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C5BE97&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Tea break &amp;amp;amp; Snacks on Exhibition Floor&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;11:00AM - 12:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;TBD&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;IBM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;How To Blackbox Test Almost Anything&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Aviram Jenik, Beyond Security&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;The International State of Cyber Security, Risk &lt;br /&gt;
		reduction in a high threat world&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Howard A. Schmidt, Former Cyber Security Advisor to &lt;br /&gt;
		the White house&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;12:00PM - 1:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Reconsidering Network Defenses or NOT !&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Cedric Blancher, EADS Innovation Works&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Lust 2.0 – Desire for free WiFi and the threat of the &lt;br /&gt;
		Imposter&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Lava Kumar Kuppan, Independent Security Researcher&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Applications - The new cyber security frontier&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Mano Paul, Software Assurance Advisor (ISC)2&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;1:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 2:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FAC090&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Lunch&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;2:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 3:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Exploiting Firefox Extensions&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Roberto Suggi Liverani, Security-Assessment.com&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Threat Modeling&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Varun Sharma, Microsoft Corp.&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Behind the scenes at the Microsoft Security Response &lt;br /&gt;
		Center&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Dave Midturi and Suresh Venkateswaran, Microsoft &lt;br /&gt;
		Security Response Center&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;3:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 4:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;SQL Server Forensics 2.0&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Kevvie Fowler, TELUS &amp;amp;amp; Ringzero&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Nitin Kumar/Vipin Kumar, Independent Security &lt;br /&gt;
		Researchers, Nvlabs&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Business Case-Risk Management/Compliance at leading &lt;br /&gt;
		Education Group at AMITY&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Dr J.S Sodhi, AMITY&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;4:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 4:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Business Continuity Case Study&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Venkataram Arabolu, BSI&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Usability and Privacy in Security&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Ponnurangam Kumaraguru, IIIT&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;4:30 PM&amp;amp;nbsp;&amp;amp;nbsp; - 5:30 PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C5BE97&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Tea break &amp;amp;amp; Snacks on Exhibition Floor&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;15&amp;quot; style=&amp;quot;height:11.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;15&amp;quot; style=&amp;quot;height: 11.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;7:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 10:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #DBE5F1&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;India Technology Leadership Summit 2009 (Exclusive by &lt;br /&gt;
		invitation only) -&amp;amp;quot; Information Security Concerns for Offshoring&amp;amp;quot;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;8&amp;quot; style=&amp;quot;height: 6.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;10&amp;quot; height=&amp;quot;8&amp;quot; style=&amp;quot;height: 6.0pt; width: 1070px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: white&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;23&amp;quot; style=&amp;quot;height:17.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;23&amp;quot; style=&amp;quot;height: 17.25pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Where &amp;amp;gt;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 309px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #333399&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 1&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 316px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #3366FF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 2&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 334px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #00CCFF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 3:&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;19&amp;quot; style=&amp;quot;height:14.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;19&amp;quot; style=&amp;quot;height: 14.25pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Who &amp;amp;gt;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 309px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #333399&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Security Researchers &amp;amp;amp; Enthusiasts)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 316px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #3366FF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Security Auditors, Developers, QA, Architects)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 334px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #00CCFF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Leaders, Managers, C&amp;amp;amp;S professionals)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Schedule&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;10&amp;quot; height=&amp;quot;257&amp;quot; width=&amp;quot;24&amp;quot; style=&amp;quot;height: 192.75pt; width: 18pt; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;img border=&amp;quot;0&amp;quot; src=&amp;quot;index.2.gif&amp;quot; width=&amp;quot;25&amp;quot; height=&amp;quot;255&amp;quot;&amp;gt; &amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;9:00AM&amp;amp;nbsp;&amp;amp;nbsp; - 10:00AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #DBE5F1&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Round Table with Speakers / Industry Panel - &lt;br /&gt;
		&amp;amp;quot;Security Today &amp;amp;amp; Tomorrow'&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;10:00AM - 10:30AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C5BE97&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Tea break &amp;amp;amp; Snacks on Exhibition Floor&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;32&amp;quot; style=&amp;quot;height:24.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;32&amp;quot; style=&amp;quot;height: 24.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;10:30AM - 11:30AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Ten Things Web Developers Still Aren't Doing&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Frank Kim, ThinkSec Consulting&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;SANS Dshield Webhoneypot Project&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Jason Lam, Independent Security Researcher&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Critical Infrastructure Security “Danger Without &lt;br /&gt;
		borders”&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;John Bumgarner, US Cyber Consequence Unit (USCCU)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;32&amp;quot; style=&amp;quot;height:24.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;32&amp;quot; style=&amp;quot;height: 24.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;11:30AM - 12:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Cloud Hacking – Distributed Attack &amp;amp;amp; Exploit Platform&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Shreeraj Shah, Blueinfy Solutions&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Testing JSON Applications For Security Holes&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Aviram Jenik, Beyond Security&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Critical Infrastructure Security “Danger Without &lt;br /&gt;
		borders”&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;John Bumgarner, US Cyber Consequence Unit (USCCU)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;12:30PM&amp;amp;nbsp; - 1:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FAC090&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Lunch&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;1:30PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 2:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;All Your Packets Belong to Us - Attacking Backbone &lt;br /&gt;
		Technologies&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Daniel Mende, Security Researcher, ERNW&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Risk based Penetration Testing&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;K. K. Mookhey, Founder &amp;amp;amp; Principal Consultant, NII &lt;br /&gt;
		Consulting&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Wi-Fi security: the good, the bad and the ugly&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Cedric Blancher, EADS Innovation Works&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;32&amp;quot; style=&amp;quot;height:24.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;32&amp;quot; style=&amp;quot;height: 24.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;2:30PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 3:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Xprobe3 - What's New? Going Application Level&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Fyodor Yarochkin, Guard-info&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;OWASP SAMM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Pravir Chandra, OWASP&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Do you wanna Play a Game Game theory and Cyberwar&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Bryan K. Fite, HackSecKlahn&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;3:30PM-4:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C5BE97&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Tea break &amp;amp;amp; Snacks on Exhibition Floor&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;32&amp;quot; style=&amp;quot;height:24.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;32&amp;quot; style=&amp;quot;height: 24.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;4:00 PM&amp;amp;nbsp;&amp;amp;nbsp; - 5:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Rumbling Infections – Web Malware Ontology&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Aditya K. Sood, COSEINC&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;Hacking Oracle From Web&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Sid, Independent Security Researcher&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Connected Information Security Framework&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Anil Kumar Chintala, Microsoft&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;5:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 5:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #DBE5F1&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Closing Remarks by Organizing Committee&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&amp;amp;nbsp;&amp;lt;/p&amp;gt;&lt;/div&gt;</summary>
		<author><name>Puneetm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SecurityByte_and_OWASP_Asia_AppSec_Conference_2009&amp;diff=73174</id>
		<title>SecurityByte and OWASP Asia AppSec Conference 2009</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SecurityByte_and_OWASP_Asia_AppSec_Conference_2009&amp;diff=73174"/>
				<updated>2009-11-13T11:11:22Z</updated>
		
		<summary type="html">&lt;p&gt;Puneetm: /* Two Days Conference */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Two Days Conference  ==&lt;br /&gt;
&lt;br /&gt;
Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel conference talks to be conducted in 3 separate halls for two days i.e . 17th &amp;amp;amp; 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular talk. Conference talks are being delivered by world renowned and most regarded speakers from around the world. Below is the detailed schedule for the two days of conference.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;&amp;lt;font face=&amp;quot;Arial&amp;quot; size=&amp;quot;2&amp;quot;&amp;gt;Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel training sessions to be conducted in 3 separate halls for two days i.e . 17th &amp;amp;amp; 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular session. Conference talks are being delivered by world renowned and most regarded speakers from around the world. Below is the conference schedule listing confirmed speakers and talks. Couple of talks are under review by the CFP (Call For Papers) Committee and shall be available as soon as those are confirmed. Event also follows two days of InfoSec trainings to be delivered in association with SANS, ISC2 and other organizations.&amp;lt;/font&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&amp;lt;font face=&amp;quot;Arial&amp;quot; size=&amp;quot;2&amp;quot;&amp;gt;&amp;lt;a target=&amp;quot;_blank&amp;quot; href=&amp;quot;http://securitybyte.org/index.php/trainings/schedule.html&amp;quot;&amp;gt;Click here&amp;lt;/a&amp;gt; for the training schedule for 19th &amp;amp;amp; 20th November 2009.&lt;br /&gt;
&amp;lt;/font&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&amp;amp;nbsp;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;table border=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot; style=&amp;quot;border-collapse:&lt;br /&gt;
 collapse;width:100%&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;23&amp;quot; style=&amp;quot;height:17.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;23&amp;quot; style=&amp;quot;height: 17.25pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Where &amp;amp;gt;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 309px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #333399&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 1&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 316px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #3366FF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 2&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 334px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #00CCFF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 3:&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;19&amp;quot; style=&amp;quot;height:14.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;19&amp;quot; style=&amp;quot;height: 14.25pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Who &amp;amp;gt;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 309px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #333399&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Security Researchers &amp;amp;amp; Enthusiasts)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 316px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #3366FF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Security Auditors, Developers, QA, Architects)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 334px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #00CCFF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Leaders, Managers, C&amp;amp;amp;S professionals)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Schedule&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;10&amp;quot; height=&amp;quot;285&amp;quot; width=&amp;quot;24&amp;quot; style=&amp;quot;height: 213.75pt; width: 18pt; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid black; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;img border=&amp;quot;0&amp;quot; src=&amp;quot;index.1.gif&amp;quot; width=&amp;quot;25&amp;quot; height=&amp;quot;271&amp;quot;&amp;gt; &amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;9:00AM&amp;amp;nbsp;&amp;amp;nbsp; - 10:30AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #DBE5F1&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Keynote Sessions&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;10:30AM - 11:00AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C5BE97&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Tea break &amp;amp;amp; Snacks on Exhibition Floor&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;11:00AM - 12:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;TBD&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;IBM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;How To Blackbox Test Almost Anything&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Aviram Jenik, Beyond Security&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;The International State of Cyber Security, Risk &lt;br /&gt;
		reduction in a high threat world&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Howard A. Schmidt, Former Cyber Security Advisor to &lt;br /&gt;
		the White house&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;12:00PM - 1:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Reconsidering Network Defenses or NOT !&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Cedric Blancher, EADS Innovation Works&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Lust 2.0 – Desire for free WiFi and the threat of the &lt;br /&gt;
		Imposter&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Lava Kumar Kuppan, Independent Security Researcher&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Applications - The new cyber security frontier&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Mano Paul, Software Assurance Advisor (ISC)2&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;1:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 2:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FAC090&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Lunch&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;2:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 3:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Exploiting Firefox Extensions&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Roberto Suggi Liverani, Security-Assessment.com&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Threat Modeling&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Varun Sharma, Microsoft Corp.&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Behind the scenes at the Microsoft Security Response &lt;br /&gt;
		Center&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Dave Midturi and Suresh Venkateswaran, Microsoft &lt;br /&gt;
		Security Response Center&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;3:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 4:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;SQL Server Forensics 2.0&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Kevvie Fowler, TELUS &amp;amp;amp; Ringzero&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Nitin Kumar/Vipin Kumar, Independent Security &lt;br /&gt;
		Researchers, Nvlabs&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Business Case-Risk Management/Compliance at leading &lt;br /&gt;
		Education Group at AMITY&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Dr J.S Sodhi, AMITY&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;4:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 4:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Business Continuity Case Study&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Venkataram Arabolu, BSI&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Usability and Privacy in Security&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Ponnurangam Kumaraguru, IIIT&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;4:30 PM&amp;amp;nbsp;&amp;amp;nbsp; - 5:30 PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C5BE97&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Tea break &amp;amp;amp; Snacks on Exhibition Floor&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;15&amp;quot; style=&amp;quot;height:11.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;15&amp;quot; style=&amp;quot;height: 11.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;7:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 10:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #DBE5F1&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;India Technology Leadership Summit 2009 (Exclusive by &lt;br /&gt;
		invitation only) -&amp;amp;quot; Information Security Concerns for Offshoring&amp;amp;quot;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;8&amp;quot; style=&amp;quot;height: 6.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;10&amp;quot; height=&amp;quot;8&amp;quot; style=&amp;quot;height: 6.0pt; width: 1070px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: white&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;23&amp;quot; style=&amp;quot;height:17.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;23&amp;quot; style=&amp;quot;height: 17.25pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Where &amp;amp;gt;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 309px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #333399&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 1&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 316px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #3366FF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 2&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 334px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #00CCFF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 3:&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;19&amp;quot; style=&amp;quot;height:14.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;19&amp;quot; style=&amp;quot;height: 14.25pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Who &amp;amp;gt;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 309px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #333399&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Security Researchers &amp;amp;amp; Enthusiasts)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 316px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #3366FF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Security Auditors, Developers, QA, Architects)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 334px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #00CCFF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Leaders, Managers, C&amp;amp;amp;S professionals)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Schedule&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;10&amp;quot; height=&amp;quot;257&amp;quot; width=&amp;quot;24&amp;quot; style=&amp;quot;height: 192.75pt; width: 18pt; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;img border=&amp;quot;0&amp;quot; src=&amp;quot;index.2.gif&amp;quot; width=&amp;quot;25&amp;quot; height=&amp;quot;255&amp;quot;&amp;gt; &amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;9:00AM&amp;amp;nbsp;&amp;amp;nbsp; - 10:00AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #DBE5F1&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Round Table with Speakers / Industry Panel - &lt;br /&gt;
		&amp;amp;quot;Security Today &amp;amp;amp; Tomorrow'&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;10:00AM - 10:30AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C5BE97&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Tea break &amp;amp;amp; Snacks on Exhibition Floor&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;32&amp;quot; style=&amp;quot;height:24.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;32&amp;quot; style=&amp;quot;height: 24.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;10:30AM - 11:30AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Ten Things Web Developers Still Aren't Doing&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Frank Kim, ThinkSec Consulting&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;SANS Dshield Webhoneypot Project&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Jason Lam, Independent Security Researcher&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Critical Infrastructure Security “Danger Without &lt;br /&gt;
		borders”&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;John Bumgarner, US Cyber Consequence Unit (USCCU)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;32&amp;quot; style=&amp;quot;height:24.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;32&amp;quot; style=&amp;quot;height: 24.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;11:30AM - 12:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Cloud Hacking – Distributed Attack &amp;amp;amp; Exploit Platform&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Shreeraj Shah, Blueinfy Solutions&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Testing JSON Applications For Security Holes&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Aviram Jenik, Beyond Security&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Critical Infrastructure Security “Danger Without &lt;br /&gt;
		borders”&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;John Bumgarner, US Cyber Consequence Unit (USCCU)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;12:30PM&amp;amp;nbsp; - 1:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FAC090&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Lunch&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;1:30PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 2:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;All Your Packets Belong to Us - Attacking Backbone &lt;br /&gt;
		Technologies&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Daniel Mende, Security Researcher, ERNW&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Risk based Penetration Testing&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;K. K. Mookhey, Founder &amp;amp;amp; Principal Consultant, NII &lt;br /&gt;
		Consulting&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Wi-Fi security: the good, the bad and the ugly&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Cedric Blancher, EADS Innovation Works&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;32&amp;quot; style=&amp;quot;height:24.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;32&amp;quot; style=&amp;quot;height: 24.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;2:30PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 3:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Xprobe3 - What's New? Going Application Level&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Fyodor Yarochkin, Guard-info&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;OWASP SAMM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Pravir Chandra, OWASP&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Do you wanna Play a Game Game theory and Cyberwar&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Bryan K. Fite, HackSecKlahn&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;3:30PM-4:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C5BE97&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Tea break &amp;amp;amp; Snacks on Exhibition Floor&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;32&amp;quot; style=&amp;quot;height:24.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;32&amp;quot; style=&amp;quot;height: 24.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;4:00 PM&amp;amp;nbsp;&amp;amp;nbsp; - 5:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Rumbling Infections – Web Malware Ontology&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Aditya K. Sood, COSEINC&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;Hacking Oracle From Web&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Sid, Independent Security Researcher&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Connected Information Security Framework&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Anil Kumar Chintala, Microsoft&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;5:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 5:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #DBE5F1&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Closing Remarks by Organizing Committee&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&amp;amp;nbsp;&amp;lt;/p&amp;gt;&lt;/div&gt;</summary>
		<author><name>Puneetm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SecurityByte_and_OWASP_Asia_AppSec_Conference_2009&amp;diff=73173</id>
		<title>SecurityByte and OWASP Asia AppSec Conference 2009</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SecurityByte_and_OWASP_Asia_AppSec_Conference_2009&amp;diff=73173"/>
				<updated>2009-11-13T11:10:49Z</updated>
		
		<summary type="html">&lt;p&gt;Puneetm: /* Two Days Conference */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Two Days Conference  ==&lt;br /&gt;
&lt;br /&gt;
Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel conference talks to be conducted in 3 separate halls for two days i.e . 17th &amp;amp;amp; 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular talk. Conference talks are being delivered by world renowned and most regarded speakers from around the world. Below is the detailed schedule for the two days of conference.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;&amp;lt;font face=&amp;quot;Arial&amp;quot; size=&amp;quot;2&amp;quot;&amp;gt;Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel training sessions to be conducted in 3 separate halls for two days i.e . 17th &amp;amp;amp; 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular session. Conference talks are being delivered by world renowned and most regarded speakers from around the world. Below is the conference schedule listing confirmed speakers and talks. Couple of talks are under review by the CFP (Call For Papers) Committee and shall be available as soon as those are confirmed. Event also follows two days of InfoSec trainings to be delivered in association with SANS, ISC2 and other organizations.&amp;lt;/font&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&amp;lt;font face=&amp;quot;Arial&amp;quot; size=&amp;quot;2&amp;quot;&amp;gt;&amp;lt;a target=&amp;quot;_blank&amp;quot; href=&amp;quot;http://securitybyte.org/index.php/trainings/schedule.html&amp;quot;&amp;gt;Click here&amp;lt;/a&amp;gt; for the training schedule for 19th &amp;amp;amp; 20th November 2009.&lt;br /&gt;
&amp;lt;/font&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&amp;amp;nbsp;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;table border=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot; style=&amp;quot;border-collapse:&lt;br /&gt;
 collapse;width:100%&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;colgroup&amp;gt;&lt;br /&gt;
		&amp;lt;col width=&amp;quot;18&amp;quot; style=&amp;quot;width: 18pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;col width=&amp;quot;108&amp;quot; style=&amp;quot;width: 81pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;col width=&amp;quot;198&amp;quot; style=&amp;quot;width: 149pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;col width=&amp;quot;137&amp;quot; style=&amp;quot;width: 103pt&amp;quot;&amp;gt;&amp;lt;col width=&amp;quot;6&amp;quot; style=&amp;quot;width: 5pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;col width=&amp;quot;200&amp;quot; style=&amp;quot;width: 150pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;col width=&amp;quot;134&amp;quot; style=&amp;quot;width: 101pt&amp;quot;&amp;gt;&amp;lt;col width=&amp;quot;6&amp;quot; style=&amp;quot;width: 5pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;col width=&amp;quot;199&amp;quot; style=&amp;quot;width: 149pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;col width=&amp;quot;166&amp;quot; style=&amp;quot;width: 125pt&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;/colgroup&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;23&amp;quot; style=&amp;quot;height:17.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;23&amp;quot; style=&amp;quot;height: 17.25pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Where &amp;amp;gt;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 309px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #333399&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 1&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 316px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #3366FF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 2&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 334px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #00CCFF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 3:&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;19&amp;quot; style=&amp;quot;height:14.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;19&amp;quot; style=&amp;quot;height: 14.25pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Who &amp;amp;gt;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 309px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #333399&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Security Researchers &amp;amp;amp; Enthusiasts)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 316px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #3366FF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Security Auditors, Developers, QA, Architects)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 334px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #00CCFF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Leaders, Managers, C&amp;amp;amp;S professionals)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Schedule&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;10&amp;quot; height=&amp;quot;285&amp;quot; width=&amp;quot;24&amp;quot; style=&amp;quot;height: 213.75pt; width: 18pt; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid black; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;img border=&amp;quot;0&amp;quot; src=&amp;quot;index.1.gif&amp;quot; width=&amp;quot;25&amp;quot; height=&amp;quot;271&amp;quot;&amp;gt; &amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;9:00AM&amp;amp;nbsp;&amp;amp;nbsp; - 10:30AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #DBE5F1&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Keynote Sessions&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;10:30AM - 11:00AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C5BE97&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Tea break &amp;amp;amp; Snacks on Exhibition Floor&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;11:00AM - 12:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;TBD&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;IBM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;How To Blackbox Test Almost Anything&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Aviram Jenik, Beyond Security&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;The International State of Cyber Security, Risk &lt;br /&gt;
		reduction in a high threat world&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Howard A. Schmidt, Former Cyber Security Advisor to &lt;br /&gt;
		the White house&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;12:00PM - 1:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Reconsidering Network Defenses or NOT !&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Cedric Blancher, EADS Innovation Works&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Lust 2.0 – Desire for free WiFi and the threat of the &lt;br /&gt;
		Imposter&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Lava Kumar Kuppan, Independent Security Researcher&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Applications - The new cyber security frontier&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Mano Paul, Software Assurance Advisor (ISC)2&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;1:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 2:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FAC090&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Lunch&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;2:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 3:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Exploiting Firefox Extensions&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Roberto Suggi Liverani, Security-Assessment.com&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Threat Modeling&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Varun Sharma, Microsoft Corp.&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Behind the scenes at the Microsoft Security Response &lt;br /&gt;
		Center&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Dave Midturi and Suresh Venkateswaran, Microsoft &lt;br /&gt;
		Security Response Center&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;3:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 4:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;SQL Server Forensics 2.0&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Kevvie Fowler, TELUS &amp;amp;amp; Ringzero&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Nitin Kumar/Vipin Kumar, Independent Security &lt;br /&gt;
		Researchers, Nvlabs&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Business Case-Risk Management/Compliance at leading &lt;br /&gt;
		Education Group at AMITY&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Dr J.S Sodhi, AMITY&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;4:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 4:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Business Continuity Case Study&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Venkataram Arabolu, BSI&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Usability and Privacy in Security&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Ponnurangam Kumaraguru, IIIT&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;4:30 PM&amp;amp;nbsp;&amp;amp;nbsp; - 5:30 PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C5BE97&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Tea break &amp;amp;amp; Snacks on Exhibition Floor&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;15&amp;quot; style=&amp;quot;height:11.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;15&amp;quot; style=&amp;quot;height: 11.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;7:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 10:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #DBE5F1&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;India Technology Leadership Summit 2009 (Exclusive by &lt;br /&gt;
		invitation only) -&amp;amp;quot; Information Security Concerns for Offshoring&amp;amp;quot;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;8&amp;quot; style=&amp;quot;height: 6.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;10&amp;quot; height=&amp;quot;8&amp;quot; style=&amp;quot;height: 6.0pt; width: 1070px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: white&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;23&amp;quot; style=&amp;quot;height:17.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;23&amp;quot; style=&amp;quot;height: 17.25pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Where &amp;amp;gt;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 309px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #333399&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 1&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 316px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #3366FF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 2&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 334px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #00CCFF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 3:&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;19&amp;quot; style=&amp;quot;height:14.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;19&amp;quot; style=&amp;quot;height: 14.25pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Who &amp;amp;gt;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 309px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #333399&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Security Researchers &amp;amp;amp; Enthusiasts)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 316px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #3366FF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Security Auditors, Developers, QA, Architects)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 334px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #00CCFF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Leaders, Managers, C&amp;amp;amp;S professionals)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Schedule&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;10&amp;quot; height=&amp;quot;257&amp;quot; width=&amp;quot;24&amp;quot; style=&amp;quot;height: 192.75pt; width: 18pt; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;img border=&amp;quot;0&amp;quot; src=&amp;quot;index.2.gif&amp;quot; width=&amp;quot;25&amp;quot; height=&amp;quot;255&amp;quot;&amp;gt; &amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;9:00AM&amp;amp;nbsp;&amp;amp;nbsp; - 10:00AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #DBE5F1&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Round Table with Speakers / Industry Panel - &lt;br /&gt;
		&amp;amp;quot;Security Today &amp;amp;amp; Tomorrow'&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;10:00AM - 10:30AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C5BE97&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Tea break &amp;amp;amp; Snacks on Exhibition Floor&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;32&amp;quot; style=&amp;quot;height:24.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;32&amp;quot; style=&amp;quot;height: 24.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;10:30AM - 11:30AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Ten Things Web Developers Still Aren't Doing&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Frank Kim, ThinkSec Consulting&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;SANS Dshield Webhoneypot Project&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Jason Lam, Independent Security Researcher&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Critical Infrastructure Security “Danger Without &lt;br /&gt;
		borders”&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;John Bumgarner, US Cyber Consequence Unit (USCCU)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;32&amp;quot; style=&amp;quot;height:24.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;32&amp;quot; style=&amp;quot;height: 24.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;11:30AM - 12:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Cloud Hacking – Distributed Attack &amp;amp;amp; Exploit Platform&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Shreeraj Shah, Blueinfy Solutions&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Testing JSON Applications For Security Holes&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Aviram Jenik, Beyond Security&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Critical Infrastructure Security “Danger Without &lt;br /&gt;
		borders”&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;John Bumgarner, US Cyber Consequence Unit (USCCU)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;12:30PM&amp;amp;nbsp; - 1:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FAC090&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Lunch&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;1:30PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 2:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;All Your Packets Belong to Us - Attacking Backbone &lt;br /&gt;
		Technologies&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Daniel Mende, Security Researcher, ERNW&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Risk based Penetration Testing&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;K. K. Mookhey, Founder &amp;amp;amp; Principal Consultant, NII &lt;br /&gt;
		Consulting&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Wi-Fi security: the good, the bad and the ugly&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Cedric Blancher, EADS Innovation Works&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;32&amp;quot; style=&amp;quot;height:24.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;32&amp;quot; style=&amp;quot;height: 24.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;2:30PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 3:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Xprobe3 - What's New? Going Application Level&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Fyodor Yarochkin, Guard-info&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;OWASP SAMM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Pravir Chandra, OWASP&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Do you wanna Play a Game Game theory and Cyberwar&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Bryan K. Fite, HackSecKlahn&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;3:30PM-4:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C5BE97&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Tea break &amp;amp;amp; Snacks on Exhibition Floor&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;32&amp;quot; style=&amp;quot;height:24.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;32&amp;quot; style=&amp;quot;height: 24.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;4:00 PM&amp;amp;nbsp;&amp;amp;nbsp; - 5:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Rumbling Infections – Web Malware Ontology&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Aditya K. Sood, COSEINC&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;Hacking Oracle From Web&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Sid, Independent Security Researcher&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Connected Information Security Framework&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Anil Kumar Chintala, Microsoft&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;5:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 5:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #DBE5F1&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Closing Remarks by Organizing Committee&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&amp;amp;nbsp;&amp;lt;/p&amp;gt;&lt;/div&gt;</summary>
		<author><name>Puneetm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SecurityByte_and_OWASP_Asia_AppSec_Conference_2009&amp;diff=73172</id>
		<title>SecurityByte and OWASP Asia AppSec Conference 2009</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SecurityByte_and_OWASP_Asia_AppSec_Conference_2009&amp;diff=73172"/>
				<updated>2009-11-13T11:09:59Z</updated>
		
		<summary type="html">&lt;p&gt;Puneetm: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Two Days Conference  ==&lt;br /&gt;
&lt;br /&gt;
Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel conference talks to be conducted in 3 separate halls for two days i.e . 17th &amp;amp;amp; 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular talk. Conference talks are being delivered by world renowned and most regarded speakers from around the world. Below is the detailed schedule for the two days of conference.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 1 - 17th Nov, 2009'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Where&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - I''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - II''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - III'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Who&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Researchers &amp;amp;amp; Enthusiasts)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Auditors, Developers, QA teams, Architects)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Leaders, Managers, C&amp;amp;amp;S professionals)'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 8:00 AM - 9:00 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Registrations'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Schedule''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 9:00 AM - 10:30 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Keynote'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:30 AM - 11:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea Break'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 11:00 AM - 12:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | How To Blackbox Test Almost Anything&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Aviram Jenik, Beyond Security&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | The International State of Cyber Security, Risk reduction in a high threat world&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Prof. Howard A. Schmidt, Former Cyber Security Advisor to the White house&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:00 PM - 1:00 PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Client Side Hacks&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Dino Covotsos &amp;amp; Charleton Smith, Telspace Systems&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Risk Based Penetration testing&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | K. K. Mookhey, Founder &amp;amp;amp; Principal Consultant, NII Consulting&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Applications, the source for CyberThreats&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Mano Paul,Software Assurance Advisor,(ISC)2&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 1:00PM - 2:00PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Lunch'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 2:00 PM - 3:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Exploiting Firefox Extensions&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Roberto Suggi Liverani, Security-Assessment.com&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Threat Modeling&amp;lt;br&amp;gt;&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Varun Sharma,Microsoft India&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Enterprise Application Security Program&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 3:00 PM - 4:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | SQL Server Forensics 2.0&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Kevvie Fowler, TELUS &amp;amp;amp; Ringzero&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | OWASP SAMM&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Pravir Chandra, Director of Strategic Services,&amp;lt;br&amp;gt;Fortify&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Business Case - Risk Management/Compliance at leading Education Group AMITY (Rapid Fire: 30 Min talk)&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Dr. JS Sodhi, CIO, AMITY Group&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 4:00 PM - 5:00 PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Ownage 2.0 - How to own the World&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Saumil Shah, NetSquare Solutions&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | &amp;quot;Do you want to play a Game&amp;quot; - Game theory and Cyberwar&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Bryan K. Fite, HackSecKlahn&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Usability and Privacy in Security&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Dr. Ponnurangam Kumaraguru, Asst. Professor - IIIT (Rapid Fire : 30 Min talk)&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 5:00 PM - 6:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea and Snacks on the Exhibition floor'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 7:00 PM - 10:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''CXO Event (Exclusive by invitation only) - Information Security Concerns for Offshoring'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 2 - 18th Nov, 2009'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Where&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - I''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - II''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - III'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Who&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Researchers &amp;amp;amp; Enthusiasts)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Auditors, Developers, QA teams, Architects)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Leaders, Managers, C&amp;amp;amp;S professionals)'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 8:00 AM - 9:00 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Registrations'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 9:00 AM - 10:00 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Round Table with Speakers / Industry Panel - &amp;quot;Security Today &amp;amp; Tomorrow''''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:00 AM - 10:30 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea Break'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Schedule''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:30 AM - 11:30&amp;amp;nbsp;AM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | All your Packets belong to us&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Daniel Mende, Security Researcher, ERNW&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | SANS Dshield Webhoneypot Project&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Jason Lam, Independent Security Researcher&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Critical Infrastructure Security “Danger Without borders” &amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | John Bumgarner, US Cyber Consequence Unit (USCCU)&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 11:30 AM - 12:30 PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Hacking Oracle From Web&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Sid, Independent Security Researcher&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Testing JSON Applications For Security Holes&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Aviram Jenik, Beyond Security&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Critical Infrastructure Security “Danger Without borders” &amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | John Bumgarner, US Cyber Consequence Unit (USCCU)&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:30PM - 1:30PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Lunch'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 1:30 PM&amp;amp;nbsp;- 2:30 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Lust 2.0 – Desire for free WiFi and the threat of the Imposter &amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Lava Kumar Kuppan, Independent Security Researcher&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Cloud Hacking - Distributed Attacks &amp;amp; Exploits&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Shreeraj Shah, Blueinfy Solutions&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Cedric Blancher, EADS Innovation Works&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 2:30 PM - 3:30&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Xprobe3 - What's New? Going Application Level&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Fyodor Yarochkin, Armorize&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Nitin Kumar/Vipin Kumar, Independent Security Researchers, NVlabs&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Behind the Scenes at Microsoft Security Response Center&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Dave Midturi,MSRC, Microsoft Corp.&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 3:30PM - 4:00PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea Break'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 4:00 PM - 5:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 5:00 PM - 6:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Closing Keynotes - &amp;quot;OWASP &amp;amp; Securitybyte&amp;quot;'''&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Trainings  ====&lt;/div&gt;</summary>
		<author><name>Puneetm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SecurityByte_and_OWASP_Asia_AppSec_Conference_2009&amp;diff=73171</id>
		<title>SecurityByte and OWASP Asia AppSec Conference 2009</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SecurityByte_and_OWASP_Asia_AppSec_Conference_2009&amp;diff=73171"/>
				<updated>2009-11-13T11:04:10Z</updated>
		
		<summary type="html">&lt;p&gt;Puneetm: /* Two Days Conference */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;p&amp;gt;&amp;lt;font face=&amp;quot;Arial&amp;quot; size=&amp;quot;2&amp;quot;&amp;gt;Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel training sessions to be conducted in 3 separate halls for two days i.e . 17th &amp;amp;amp; 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular session. Conference talks are being delivered by world renowned and most regarded speakers from around the world. Below is the conference schedule listing confirmed speakers and talks. Couple of talks are under review by the CFP (Call For Papers) Committee and shall be available as soon as those are confirmed. Event also follows two days of InfoSec trainings to be delivered in association with SANS, ISC2 and other organizations.&amp;lt;/font&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&amp;lt;font face=&amp;quot;Arial&amp;quot; size=&amp;quot;2&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;/font&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&amp;amp;nbsp;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;table border=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot; style=&amp;quot;border-collapse:&lt;br /&gt;
 collapse;width:100%&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;23&amp;quot; style=&amp;quot;height:17.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;23&amp;quot; style=&amp;quot;height: 17.25pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Where &amp;amp;gt;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 309px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #333399&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 1&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 316px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #3366FF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 2&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 334px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #00CCFF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 3:&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;19&amp;quot; style=&amp;quot;height:14.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;19&amp;quot; style=&amp;quot;height: 14.25pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Who &amp;amp;gt;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 309px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #333399&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Security Researchers &amp;amp;amp; Enthusiasts)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 316px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #3366FF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Security Auditors, Developers, QA, Architects)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 334px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #00CCFF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Leaders, Managers, C&amp;amp;amp;S professionals)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Schedule&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;10&amp;quot; height=&amp;quot;285&amp;quot; width=&amp;quot;24&amp;quot; style=&amp;quot;height: 213.75pt; width: 18pt; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid black; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;9:00AM&amp;amp;nbsp;&amp;amp;nbsp; - 10:30AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #DBE5F1&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Keynote Sessions&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;10:30AM - 11:00AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C5BE97&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Tea break &amp;amp;amp; Snacks on Exhibition Floor&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;11:00AM - 12:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;TBD&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;IBM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;How To Blackbox Test Almost Anything&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Aviram Jenik, Beyond Security&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;The International State of Cyber Security, Risk &lt;br /&gt;
		reduction in a high threat world&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Howard A. Schmidt, Former Cyber Security Advisor to &lt;br /&gt;
		the White house&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;12:00PM - 1:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Reconsidering Network Defenses or NOT !&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Cedric Blancher, EADS Innovation Works&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Lust 2.0 – Desire for free WiFi and the threat of the &lt;br /&gt;
		Imposter&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Lava Kumar Kuppan, Independent Security Researcher&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Applications - The new cyber security frontier&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Mano Paul, Software Assurance Advisor (ISC)2&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;1:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 2:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FAC090&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Lunch&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;2:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 3:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Exploiting Firefox Extensions&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Roberto Suggi Liverani, Security-Assessment.com&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Threat Modeling&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Varun Sharma, Microsoft Corp.&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Behind the scenes at the Microsoft Security Response &lt;br /&gt;
		Center&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Dave Midturi and Suresh Venkateswaran, Microsoft &lt;br /&gt;
		Security Response Center&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;3:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 4:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;SQL Server Forensics 2.0&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Kevvie Fowler, TELUS &amp;amp;amp; Ringzero&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Nitin Kumar/Vipin Kumar, Independent Security &lt;br /&gt;
		Researchers, Nvlabs&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Business Case-Risk Management/Compliance at leading &lt;br /&gt;
		Education Group at AMITY&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Dr J.S Sodhi, AMITY&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;4:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 4:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Business Continuity Case Study&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Venkataram Arabolu, BSI&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Usability and Privacy in Security&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Ponnurangam Kumaraguru, IIIT&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;4:30 PM&amp;amp;nbsp;&amp;amp;nbsp; - 5:30 PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C5BE97&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Tea break &amp;amp;amp; Snacks on Exhibition Floor&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;15&amp;quot; style=&amp;quot;height:11.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;15&amp;quot; style=&amp;quot;height: 11.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;7:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 10:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #DBE5F1&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;India Technology Leadership Summit 2009 (Exclusive by &lt;br /&gt;
		invitation only) -&amp;amp;quot; Information Security Concerns for Offshoring&amp;amp;quot;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;8&amp;quot; style=&amp;quot;height: 6.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;10&amp;quot; height=&amp;quot;8&amp;quot; style=&amp;quot;height: 6.0pt; width: 1070px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: white&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;23&amp;quot; style=&amp;quot;height:17.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;23&amp;quot; style=&amp;quot;height: 17.25pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Where &amp;amp;gt;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 309px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #333399&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 1&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 316px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #3366FF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 2&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 334px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #00CCFF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 3:&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;19&amp;quot; style=&amp;quot;height:14.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;19&amp;quot; style=&amp;quot;height: 14.25pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Who &amp;amp;gt;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 309px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #333399&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Security Researchers &amp;amp;amp; Enthusiasts)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 316px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #3366FF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Security Auditors, Developers, QA, Architects)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 334px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #00CCFF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Leaders, Managers, C&amp;amp;amp;S professionals)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Schedule&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;10&amp;quot; height=&amp;quot;257&amp;quot; width=&amp;quot;24&amp;quot; style=&amp;quot;height: 192.75pt; width: 18pt; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;9:00AM&amp;amp;nbsp;&amp;amp;nbsp; - 10:00AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #DBE5F1&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Round Table with Speakers / Industry Panel - &lt;br /&gt;
		&amp;amp;quot;Security Today &amp;amp;amp; Tomorrow'&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;10:00AM - 10:30AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C5BE97&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Tea break &amp;amp;amp; Snacks on Exhibition Floor&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;32&amp;quot; style=&amp;quot;height:24.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;32&amp;quot; style=&amp;quot;height: 24.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;10:30AM - 11:30AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Ten Things Web Developers Still Aren't Doing&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Frank Kim, ThinkSec Consulting&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;SANS Dshield Webhoneypot Project&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Jason Lam, Independent Security Researcher&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Critical Infrastructure Security “Danger Without &lt;br /&gt;
		borders”&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;John Bumgarner, US Cyber Consequence Unit (USCCU)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;32&amp;quot; style=&amp;quot;height:24.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;32&amp;quot; style=&amp;quot;height: 24.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;11:30AM - 12:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Cloud Hacking – Distributed Attack &amp;amp;amp; Exploit Platform&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Shreeraj Shah, Blueinfy Solutions&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Testing JSON Applications For Security Holes&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Aviram Jenik, Beyond Security&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Critical Infrastructure Security “Danger Without &lt;br /&gt;
		borders”&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;John Bumgarner, US Cyber Consequence Unit (USCCU)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;12:30PM&amp;amp;nbsp; - 1:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FAC090&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Lunch&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;1:30PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 2:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;All Your Packets Belong to Us - Attacking Backbone &lt;br /&gt;
		Technologies&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Daniel Mende, Security Researcher, ERNW&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Risk based Penetration Testing&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;K. K. Mookhey, Founder &amp;amp;amp; Principal Consultant, NII &lt;br /&gt;
		Consulting&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Wi-Fi security: the good, the bad and the ugly&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Cedric Blancher, EADS Innovation Works&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;32&amp;quot; style=&amp;quot;height:24.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;32&amp;quot; style=&amp;quot;height: 24.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;2:30PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 3:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Xprobe3 - What's New? Going Application Level&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Fyodor Yarochkin, Guard-info&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;OWASP SAMM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Pravir Chandra, OWASP&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Do you wanna Play a Game Game theory and Cyberwar&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Bryan K. Fite, HackSecKlahn&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;3:30PM-4:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C5BE97&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Tea break &amp;amp;amp; Snacks on Exhibition Floor&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;32&amp;quot; style=&amp;quot;height:24.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;32&amp;quot; style=&amp;quot;height: 24.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;4:00 PM&amp;amp;nbsp;&amp;amp;nbsp; - 5:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Rumbling Infections – Web Malware Ontology&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Aditya K. Sood, COSEINC&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;Hacking Oracle From Web&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Sid, Independent Security Researcher&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Connected Information Security Framework&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Anil Kumar Chintala, Microsoft&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;5:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 5:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #DBE5F1&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Closing Remarks by Organizing Committee&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Puneetm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SecurityByte_and_OWASP_Asia_AppSec_Conference_2009&amp;diff=73170</id>
		<title>SecurityByte and OWASP Asia AppSec Conference 2009</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SecurityByte_and_OWASP_Asia_AppSec_Conference_2009&amp;diff=73170"/>
				<updated>2009-11-13T10:58:29Z</updated>
		
		<summary type="html">&lt;p&gt;Puneetm: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:SB OWASP 2009 banner.gif|center|link=http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009]]&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza] &amp;amp;#124; [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Registrations]&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*&amp;lt;b&amp;gt;Only One Week Left ! Register Online today to grab your seat for India's best Security Conference.&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;Honorable Former President of India, Dr. A.P.J Abdul Kalam to Inaugrate the India Technology Leadership Summit 2009. &amp;lt;/b&amp;gt;This event is an Invitation ONLY event.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Registrations Click Here]''' for more information.&lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
Securitybyte &amp;amp;amp; OWASP are proud to welcome you to the annual international information security conference – Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009, Nov 17th through Nov 20th in Delhi &amp;amp;amp; NCR, India. &lt;br /&gt;
&lt;br /&gt;
This is a landmark event, as both Securitybyte and OWASP join hands to present India’s largest InfoSec event with world renowned and most regarded international speakers. &lt;br /&gt;
&lt;br /&gt;
Securitybye &amp;amp;amp; OWASP AppSec Asia Conference 2009 will be held at [http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza, Gurgaon, NCR, India.] on 17th November through 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Security Researchers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Penetration Testers &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*IT Security Professionals &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
&lt;br /&gt;
==== About  ====&lt;br /&gt;
&lt;br /&gt;
== About Conference  ==&lt;br /&gt;
&lt;br /&gt;
Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel conference talks to be conducted in 3 separate halls for two days i.e . 17th &amp;amp;amp; 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular talk. Conference talks are being delivered by world renowned and most regarded speakers from around the world. &lt;br /&gt;
&lt;br /&gt;
== About Trainings  ==&lt;br /&gt;
&lt;br /&gt;
Two days post-conference are dedicated towards best-of-breed trainings being conducted in association with SANS, ISC2 and other organizations. Trainings tracks have been made available as One-Day tracks and Two-Day tracks scheduled for 19th &amp;amp;amp; 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
==== Registrations  ====&lt;br /&gt;
&lt;br /&gt;
== [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Registration] is now open!  ==&lt;br /&gt;
&lt;br /&gt;
=== You can register [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 here]  ===&lt;br /&gt;
&lt;br /&gt;
*[http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Click Here] for Online Registrations. &lt;br /&gt;
*[http://securitybyte.org/index.php/register.html Click Here] for Offline Registrations.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Please check out our Exclusive Discount Offer, available Starting October 6th - 15th, 2009. &amp;quot;SAVE BIG NOW !&amp;quot;&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''''The below pricing reflects the Standard Registration Prices .''''' &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Two Days of Conference (17th and 18th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.8,500/- INR &lt;br /&gt;
| General Public&lt;br /&gt;
|-&lt;br /&gt;
| Two Days of Conference (17th and 18th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.5,000/- INR &lt;br /&gt;
| Students&lt;br /&gt;
|-&lt;br /&gt;
| Two-Day Training Tracks (19th and 20th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.25,000/- INR&lt;br /&gt;
|-&lt;br /&gt;
| One-Day Training Tracks (19th OR 20th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.12,500/- INR&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;** Service Tax @ 10.3% will be charged extra.&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;ISC2&amp;lt;/b&amp;gt; Members can avail a Special 15% discount on Conference &amp;amp; Training Registration.&lt;br /&gt;
(Please provide your ISC2 Certification ID number to avail the above Discount)&lt;br /&gt;
For Registrations contact us at registrations@securitybyte.org&lt;br /&gt;
== Exclusive Offers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;- Group / Team Discounts available: Kindly contact us at registrations@securitybyte.org&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Special University Student discount&amp;lt;/b&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
- University Students can register for two days of conference for just Rs. 5000 (including taxes)&amp;lt;br&amp;gt;&lt;br /&gt;
- Special 15 % Discounts for Training registration&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Trainings Click here for details on the training courses that are available.]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Who Should Attend Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009: ==&lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Security Researchers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Penetration Testers &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*IT Security Professionals &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;For student discount, attendees must present proof of enrollment when picking up your badge. &lt;br /&gt;
&lt;br /&gt;
==== Schedule  ====&lt;br /&gt;
&lt;br /&gt;
Three parallel conference talks are scheduled for 17th &amp;amp;amp; 18th November 2009 in three different halls. Training tracks have been divided in one-day tracks scheduled for 19th or 20th November 2009 and two-day tracks those are schedule to continue for two days both on 19th &amp;amp;amp; 20th November 2009. Follow the tabs to learn the details on both conference and trainings. &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Conference Click here] to view the '''Conference Schedule''' for 17th &amp;amp;amp; 18th November 2009.&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Trainings Click here] to view '''Training Schedule''' on 19th &amp;amp;amp; 20th November 2009.&lt;br /&gt;
&lt;br /&gt;
==== Conference  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;&amp;lt;font face=&amp;quot;Arial&amp;quot; size=&amp;quot;2&amp;quot;&amp;gt;Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel training sessions to be conducted in 3 separate halls for two days i.e . 17th &amp;amp;amp; 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular session. Conference talks are being delivered by world renowned and most regarded speakers from around the world. Below is the conference schedule listing confirmed speakers and talks. Couple of talks are under review by the CFP (Call For Papers) Committee and shall be available as soon as those are confirmed. Event also follows two days of InfoSec trainings to be delivered in association with SANS, ISC2 and other organizations.&amp;lt;/font&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&amp;lt;font face=&amp;quot;Arial&amp;quot; size=&amp;quot;2&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;/font&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&amp;amp;nbsp;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;table border=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot; style=&amp;quot;border-collapse:&lt;br /&gt;
 collapse;width:100%&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;23&amp;quot; style=&amp;quot;height:17.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;23&amp;quot; style=&amp;quot;height: 17.25pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Where &amp;amp;gt;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 309px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #333399&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 1&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 316px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #3366FF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 2&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 334px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #00CCFF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 3:&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;19&amp;quot; style=&amp;quot;height:14.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;19&amp;quot; style=&amp;quot;height: 14.25pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Who &amp;amp;gt;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 309px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #333399&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Security Researchers &amp;amp;amp; Enthusiasts)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 316px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #3366FF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Security Auditors, Developers, QA, Architects)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 334px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #00CCFF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Leaders, Managers, C&amp;amp;amp;S professionals)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Schedule&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;10&amp;quot; height=&amp;quot;285&amp;quot; width=&amp;quot;24&amp;quot; style=&amp;quot;height: 213.75pt; width: 18pt; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid black; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;9:00AM&amp;amp;nbsp;&amp;amp;nbsp; - 10:30AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #DBE5F1&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Keynote Sessions&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;10:30AM - 11:00AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C5BE97&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Tea break &amp;amp;amp; Snacks on Exhibition Floor&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;11:00AM - 12:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;TBD&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;IBM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;How To Blackbox Test Almost Anything&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Aviram Jenik, Beyond Security&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;The International State of Cyber Security, Risk &lt;br /&gt;
		reduction in a high threat world&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Howard A. Schmidt, Former Cyber Security Advisor to &lt;br /&gt;
		the White house&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;12:00PM - 1:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Reconsidering Network Defenses or NOT !&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Cedric Blancher, EADS Innovation Works&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Lust 2.0 – Desire for free WiFi and the threat of the &lt;br /&gt;
		Imposter&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Lava Kumar Kuppan, Independent Security Researcher&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Applications - The new cyber security frontier&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Mano Paul, Software Assurance Advisor (ISC)2&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;1:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 2:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FAC090&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Lunch&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;2:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 3:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Exploiting Firefox Extensions&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Roberto Suggi Liverani, Security-Assessment.com&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Threat Modeling&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Varun Sharma, Microsoft Corp.&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Behind the scenes at the Microsoft Security Response &lt;br /&gt;
		Center&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Dave Midturi and Suresh Venkateswaran, Microsoft &lt;br /&gt;
		Security Response Center&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;3:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 4:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;SQL Server Forensics 2.0&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Kevvie Fowler, TELUS &amp;amp;amp; Ringzero&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Nitin Kumar/Vipin Kumar, Independent Security &lt;br /&gt;
		Researchers, Nvlabs&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Business Case-Risk Management/Compliance at leading &lt;br /&gt;
		Education Group at AMITY&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Dr J.S Sodhi, AMITY&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;4:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 4:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Business Continuity Case Study&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Venkataram Arabolu, BSI&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Usability and Privacy in Security&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Ponnurangam Kumaraguru, IIIT&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;4:30 PM&amp;amp;nbsp;&amp;amp;nbsp; - 5:30 PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C5BE97&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Tea break &amp;amp;amp; Snacks on Exhibition Floor&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;15&amp;quot; style=&amp;quot;height:11.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;15&amp;quot; style=&amp;quot;height: 11.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;7:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 10:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #DBE5F1&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;India Technology Leadership Summit 2009 (Exclusive by &lt;br /&gt;
		invitation only) -&amp;amp;quot; Information Security Concerns for Offshoring&amp;amp;quot;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;8&amp;quot; style=&amp;quot;height: 6.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;10&amp;quot; height=&amp;quot;8&amp;quot; style=&amp;quot;height: 6.0pt; width: 1070px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: white&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;23&amp;quot; style=&amp;quot;height:17.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;23&amp;quot; style=&amp;quot;height: 17.25pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Where &amp;amp;gt;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 309px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #333399&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 1&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 316px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #3366FF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 2&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 334px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #00CCFF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 3:&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;19&amp;quot; style=&amp;quot;height:14.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;19&amp;quot; style=&amp;quot;height: 14.25pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Who &amp;amp;gt;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 309px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #333399&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Security Researchers &amp;amp;amp; Enthusiasts)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 316px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #3366FF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Security Auditors, Developers, QA, Architects)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 334px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #00CCFF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Leaders, Managers, C&amp;amp;amp;S professionals)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Schedule&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;10&amp;quot; height=&amp;quot;257&amp;quot; width=&amp;quot;24&amp;quot; style=&amp;quot;height: 192.75pt; width: 18pt; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;9:00AM&amp;amp;nbsp;&amp;amp;nbsp; - 10:00AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #DBE5F1&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Round Table with Speakers / Industry Panel - &lt;br /&gt;
		&amp;amp;quot;Security Today &amp;amp;amp; Tomorrow'&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;10:00AM - 10:30AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C5BE97&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Tea break &amp;amp;amp; Snacks on Exhibition Floor&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;32&amp;quot; style=&amp;quot;height:24.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;32&amp;quot; style=&amp;quot;height: 24.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;10:30AM - 11:30AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Ten Things Web Developers Still Aren't Doing&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Frank Kim, ThinkSec Consulting&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;SANS Dshield Webhoneypot Project&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Jason Lam, Independent Security Researcher&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Critical Infrastructure Security “Danger Without &lt;br /&gt;
		borders”&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;John Bumgarner, US Cyber Consequence Unit (USCCU)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;32&amp;quot; style=&amp;quot;height:24.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;32&amp;quot; style=&amp;quot;height: 24.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;11:30AM - 12:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Cloud Hacking – Distributed Attack &amp;amp;amp; Exploit Platform&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Shreeraj Shah, Blueinfy Solutions&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Testing JSON Applications For Security Holes&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Aviram Jenik, Beyond Security&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Critical Infrastructure Security “Danger Without &lt;br /&gt;
		borders”&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;John Bumgarner, US Cyber Consequence Unit (USCCU)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;12:30PM&amp;amp;nbsp; - 1:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FAC090&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Lunch&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;1:30PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 2:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;All Your Packets Belong to Us - Attacking Backbone &lt;br /&gt;
		Technologies&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Daniel Mende, Security Researcher, ERNW&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Risk based Penetration Testing&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;K. K. Mookhey, Founder &amp;amp;amp; Principal Consultant, NII &lt;br /&gt;
		Consulting&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Wi-Fi security: the good, the bad and the ugly&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Cedric Blancher, EADS Innovation Works&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;32&amp;quot; style=&amp;quot;height:24.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;32&amp;quot; style=&amp;quot;height: 24.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;2:30PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 3:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Xprobe3 - What's New? Going Application Level&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Fyodor Yarochkin, Guard-info&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;OWASP SAMM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Pravir Chandra, OWASP&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Do you wanna Play a Game Game theory and Cyberwar&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Bryan K. Fite, HackSecKlahn&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;3:30PM-4:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C5BE97&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Tea break &amp;amp;amp; Snacks on Exhibition Floor&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;32&amp;quot; style=&amp;quot;height:24.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;32&amp;quot; style=&amp;quot;height: 24.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;4:00 PM&amp;amp;nbsp;&amp;amp;nbsp; - 5:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Rumbling Infections – Web Malware Ontology&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Aditya K. Sood, COSEINC&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;Hacking Oracle From Web&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Sid, Independent Security Researcher&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Connected Information Security Framework&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Anil Kumar Chintala, Microsoft&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;5:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 5:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #DBE5F1&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Closing Remarks by Organizing Committee&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&amp;amp;nbsp;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;/body&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Hotel Stay &amp;amp; Travel Information  ==&lt;br /&gt;
&lt;br /&gt;
To help our valued delegates with Hotel and Travel services, we have negotiated with some of the best and Budget Category Guest houses in Gurgaon that are located within a radius of 3 - 4 Kms from the venue.&lt;br /&gt;
&lt;br /&gt;
Limited cheaper accommodation is available near the venue hotel in budget hotels/apartments area. The tariff of these hotels ranges from Rs.2000 onwards per room night (inclusive of Room Rent, Breakfast and Luxury Tax).  Interested delegates / students can send a formal request for the desired accommodations and dates to our official travel agent.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;OFFICIAL TRAVEL AGENT&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dreamz conference Management Pvt.Ltd&amp;lt;/b&amp;gt; will look after your hotel accommodation in Gurgaon and New Delhi, pre &amp;amp; post conference tours / travel needs in India for delegates and visitors independently. If you wish to go for sightseeing tour within New Delhi and around it to places like Agra, Jaipur, Rajasthan etc. However, we would encourage you to make early bookings which will be done on “first – come - first service” basis and let us know of your interest, since that would ultimately work in your favour. Early reservation is strongly recommended as November being a high demand period for hotels in Gurgaon.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
For further details please contact:&lt;br /&gt;
&lt;br /&gt;
DREAMZ CONFERENCE MANAGEMENT PVT.LTD&lt;br /&gt;
&lt;br /&gt;
406, Ansal’s Majestic Tower, Vikas Puri, New Delhi – 110018&lt;br /&gt;
&lt;br /&gt;
Tel: 91 – 11 – 41586401, 402, Fax: 91 – 11 – 41586400&lt;br /&gt;
&lt;br /&gt;
Email: info@dreamztravel.net / dreamztravelindia@yahoo.com&lt;br /&gt;
&lt;br /&gt;
Website: www.dreamztravel.net&lt;br /&gt;
&lt;br /&gt;
Contact Person: Jitin Batra ( +91 9810558569 )&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==== Capture the Flag  ====&lt;br /&gt;
&lt;br /&gt;
== HackHunt 2009  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;India's foremost Hacking Challenge &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Your Shot to the Title of India's best hacker along with Prize money of more than &amp;lt;b&amp;gt;Rs 150,000&amp;lt;/b&amp;gt; up for grabs!&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Search for India’s Best Ethical Hacker &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
HackHunt is India’s leading hacking competition and aims at awarding the best ethical hackers in the country. The competition is brought to you by Appin Security Group, a leading Information Security and Ethical Hacking Company and Securitybyte, a global Information Security Conference Company. &lt;br /&gt;
&lt;br /&gt;
The competition will be conducted in 3 phases. The 1st two rounds will be online and the 3rd and final round will take place at“Securitybyte &amp;amp; OWASP Appsec Asia 2009” on November 17, 2009at Crowne Plaza, Gurgaon. &lt;br /&gt;
&lt;br /&gt;
Level 1 – Knowledge Check&lt;br /&gt;
All the participants will be answering a quiz and based on the score top 10% will be shortlisted to 2nd round.&lt;br /&gt;
&lt;br /&gt;
Level 2 – Skill Check&lt;br /&gt;
This stage will require an attacker to get to the final FLAG file which he/she would need to register for the event.&lt;br /&gt;
&lt;br /&gt;
Level 3 – Final Round&lt;br /&gt;
This stage will require the attackers to exploit a pre-announced SSID which has WPA (or wpa 2).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To participate and for more details visit website :- http://www.hackerscouncil.org/&lt;br /&gt;
&lt;br /&gt;
== PacketWars  ==&lt;br /&gt;
&amp;lt;b&amp;gt;First time in India brought to you by Securitybyte! &amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;                                              &lt;br /&gt;
About PacketWars&lt;br /&gt;
&lt;br /&gt;
PacketWars is an intense, real-time information warfare simulation. Unlike other “capture the flag” games, the battlegrounds featured in PacketWars use the same software and hardware you would encounter in the real world.&lt;br /&gt;
&lt;br /&gt;
PacketWars is designed to operate like a sport. Think Formula One Racing meets professional golf with a dash of Ultimate Fighting thrown in for good measure. Serious fun!&lt;br /&gt;
&lt;br /&gt;
Visit http://packetwars.com/ for more details.&lt;br /&gt;
How To Play?&lt;br /&gt;
&lt;br /&gt;
PacketWars is a Sport like nothing you have ever experienced! Games known as “BATTLES” pit individual players and teams against each other in a race to achieve defined objectives.&lt;br /&gt;
&lt;br /&gt;
The rules of engagement are simple:&lt;br /&gt;
- Illegal activity of any kind is prohibited&lt;br /&gt;
- Protect yourself at all times&lt;br /&gt;
- Battles are designed to be of a low, medium or high difficulty level based on the battle objectives and battle duration&lt;br /&gt;
- Primary, Secondary and Tertiary objectives are defined and assigned points based on difficulty&lt;br /&gt;
- Battles have time limits and other defined constraints&lt;br /&gt;
- Constraints are sometimes known to the combatants and other times are not&lt;br /&gt;
- Anything that is not expressly prohibited is allowed&lt;br /&gt;
- Points are awarded for FLARE&lt;br /&gt;
&lt;br /&gt;
Equipment Needed:&lt;br /&gt;
- Most combants use a notebook and a BackTrack CD however you are only limited by your imagination and bank account&lt;br /&gt;
- You need a battle field and a PacketMaster…Oh yeah, skillz come in handy also!How To Play&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b.How can I participate?&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
PacketWars to be held at the Hotel Crowne Plaza, Gurgaon on Nov 17 &amp;amp; Nov 18, 2009. Participation is FREE! Schedule will be announced soon.&lt;br /&gt;
&lt;br /&gt;
== WebWar III  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;About&amp;lt;/b&amp;gt;&lt;br /&gt;
Hackers attack, coders defend, when you get them together you end up with Web War III. WWIII is designed to put your Web Application attack and defense skills to the test.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Teams&amp;lt;/b&amp;gt;&lt;br /&gt;
Each team consists of two players, an attacker and a defender. The attacker would be capable of identifying Web Application Vulnerabilities (OWASP Top 10). The defender would be capable of writing secure Java code.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Game Format&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The game has two stages:&lt;br /&gt;
&lt;br /&gt;
Stage 1:&lt;br /&gt;
Each team is given a VM Ware image containing a web server hosting a vulnerable web application. During this stage each team identifies the vulnerabilities in their application.&lt;br /&gt;
They try to fix the identified vulnerabilities by making code changes.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Stage 2:&lt;br /&gt;
The IP addresses of the Web Server's of all the teams is announced.&lt;br /&gt;
Each team looks for vulnerabilities in the Web Applications of the other teams.&lt;br /&gt;
Vulnerabilities found on the opponents' application get positive points.&lt;br /&gt;
Vulnerabilities found by the opponents on your application get negative points.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Team with the highest points at the end of Stage 2 wins.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Tools and Equipments&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Each team should bring their own laptop with VM Ware installed.&lt;br /&gt;
The attacker can use any tools they bring.&lt;br /&gt;
The applications come with ESAPI to help the defenders fix the code quicker.&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
==== Leadership Summit 2009  ====&lt;br /&gt;
&amp;lt;b&amp;gt;India's top technology thought leaders coming together to discuss &amp;quot;Security concerns in off-shoring&amp;quot;&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Honored Guests&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
-Honorable Former President of India, Dr. A.P.J Abdul Kalam to inaugrate the Leadership Summit 2009.&amp;lt;br&amp;gt;&lt;br /&gt;
-Prof. Howard A. Schmidt(Advisor, NIST; Former Vice Chair - President’s Critical Infrastructure Board; Former Special Advisor – Cyberspace Security for White House)&amp;lt;br&amp;gt;&lt;br /&gt;
-Mr. Hord Tipton, Executive Director (ISC)2&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;About the Event&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
An elite gathering of 200 technology leaders, decision makers &amp;amp; InfoSec experts from leading service providers, government agencies and various industry verticals.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Two hours of panel discussions between three panels of 12 distinguished industry experts representing outsourcing companies, service providers and the regulatory bodies.  Panel discussions will be followed by networking dinner &amp;amp; cocktails.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Prof Howard A. Schmidt (Advisor, NIST; Former Vice Chair - President’s Critical Infrastructure Board; Former Special Advisor – Cyberspace Security for White House) will facilitate the panel discussions. Thought leaders participating in the panel discussions are:&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Outsourcing Organizations&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Raghavendra Vaidya, CIO - GE Capital India&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. CRN Vairavelu, VP - Ford Technology Services India&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Pankaj Agrawal, CISO - Aircel Limited&amp;lt;br&amp;gt;&lt;br /&gt;
TBD&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Service Providers&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Terry Thomas, Partner - Ernst &amp;amp; Young&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Debashis Ghosh, Head (LS&amp;amp;H ISU) - Tata Consultancy Services&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Sunil Gujral, EVP &amp;amp; CTO - Quatrro&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Sunil Goyal, COO - Sopra group&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Regulatory Bodies&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Dr. Kamlesh Bajaj, CEO - DSCI (a NASSCOM initiative)&amp;lt;br&amp;gt;&lt;br /&gt;
Dr. Gulshan Rai, Director - CERT-in&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Hord Tipton, Executive Director - ISC2 (ex CIO, US Department of Interior)&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Vakul Sharma, Lawyer - Supreme Court&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The event is exclusive to industry leaders and is by private invitation only. If you are interested in attending the event, please email your business card to info@securitybyte.org This e-mail address is being protected from spambots.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Venue - Hotel Crowne Plaza, Gurgaon | Timings - 5:30PM - 9:00PM&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
Please contact [http://www.owasp.org/index.php/Category:India#OWASP_India_Co-Chairs Chair - OWASP India] for sponsorship opportunities. &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Category:India Category: OWASP India]&lt;/div&gt;</summary>
		<author><name>Puneetm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SecurityByte_and_OWASP_Asia_AppSec_Conference_2009&amp;diff=73169</id>
		<title>SecurityByte and OWASP Asia AppSec Conference 2009</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SecurityByte_and_OWASP_Asia_AppSec_Conference_2009&amp;diff=73169"/>
				<updated>2009-11-13T10:57:34Z</updated>
		
		<summary type="html">&lt;p&gt;Puneetm: /* Two Days Conference */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:SB OWASP 2009 banner.gif|center|link=http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009]]&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza] &amp;amp;#124; [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Registrations]&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*&amp;lt;b&amp;gt;Only One Week Left ! Register Online today to grab your seat for India's best Security Conference.&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;Honorable Former President of India, Dr. A.P.J Abdul Kalam to Inaugrate the India Technology Leadership Summit 2009. &amp;lt;/b&amp;gt;This event is an Invitation ONLY event.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Registrations Click Here]''' for more information.&lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
Securitybyte &amp;amp;amp; OWASP are proud to welcome you to the annual international information security conference – Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009, Nov 17th through Nov 20th in Delhi &amp;amp;amp; NCR, India. &lt;br /&gt;
&lt;br /&gt;
This is a landmark event, as both Securitybyte and OWASP join hands to present India’s largest InfoSec event with world renowned and most regarded international speakers. &lt;br /&gt;
&lt;br /&gt;
Securitybye &amp;amp;amp; OWASP AppSec Asia Conference 2009 will be held at [http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza, Gurgaon, NCR, India.] on 17th November through 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Security Researchers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Penetration Testers &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*IT Security Professionals &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
&lt;br /&gt;
==== About  ====&lt;br /&gt;
&lt;br /&gt;
== About Conference  ==&lt;br /&gt;
&lt;br /&gt;
Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel conference talks to be conducted in 3 separate halls for two days i.e . 17th &amp;amp;amp; 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular talk. Conference talks are being delivered by world renowned and most regarded speakers from around the world. &lt;br /&gt;
&lt;br /&gt;
== About Trainings  ==&lt;br /&gt;
&lt;br /&gt;
Two days post-conference are dedicated towards best-of-breed trainings being conducted in association with SANS, ISC2 and other organizations. Trainings tracks have been made available as One-Day tracks and Two-Day tracks scheduled for 19th &amp;amp;amp; 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
==== Registrations  ====&lt;br /&gt;
&lt;br /&gt;
== [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Registration] is now open!  ==&lt;br /&gt;
&lt;br /&gt;
=== You can register [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 here]  ===&lt;br /&gt;
&lt;br /&gt;
*[http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Click Here] for Online Registrations. &lt;br /&gt;
*[http://securitybyte.org/index.php/register.html Click Here] for Offline Registrations.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Please check out our Exclusive Discount Offer, available Starting October 6th - 15th, 2009. &amp;quot;SAVE BIG NOW !&amp;quot;&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''''The below pricing reflects the Standard Registration Prices .''''' &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Two Days of Conference (17th and 18th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.8,500/- INR &lt;br /&gt;
| General Public&lt;br /&gt;
|-&lt;br /&gt;
| Two Days of Conference (17th and 18th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.5,000/- INR &lt;br /&gt;
| Students&lt;br /&gt;
|-&lt;br /&gt;
| Two-Day Training Tracks (19th and 20th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.25,000/- INR&lt;br /&gt;
|-&lt;br /&gt;
| One-Day Training Tracks (19th OR 20th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.12,500/- INR&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;** Service Tax @ 10.3% will be charged extra.&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;ISC2&amp;lt;/b&amp;gt; Members can avail a Special 15% discount on Conference &amp;amp; Training Registration.&lt;br /&gt;
(Please provide your ISC2 Certification ID number to avail the above Discount)&lt;br /&gt;
For Registrations contact us at registrations@securitybyte.org&lt;br /&gt;
== Exclusive Offers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;- Group / Team Discounts available: Kindly contact us at registrations@securitybyte.org&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Special University Student discount&amp;lt;/b&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
- University Students can register for two days of conference for just Rs. 5000 (including taxes)&amp;lt;br&amp;gt;&lt;br /&gt;
- Special 15 % Discounts for Training registration&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Trainings Click here for details on the training courses that are available.]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Who Should Attend Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009: ==&lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Security Researchers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Penetration Testers &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*IT Security Professionals &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;For student discount, attendees must present proof of enrollment when picking up your badge. &lt;br /&gt;
&lt;br /&gt;
==== Schedule  ====&lt;br /&gt;
&lt;br /&gt;
Three parallel conference talks are scheduled for 17th &amp;amp;amp; 18th November 2009 in three different halls. Training tracks have been divided in one-day tracks scheduled for 19th or 20th November 2009 and two-day tracks those are schedule to continue for two days both on 19th &amp;amp;amp; 20th November 2009. Follow the tabs to learn the details on both conference and trainings. &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Conference Click here] to view the '''Conference Schedule''' for 17th &amp;amp;amp; 18th November 2009.&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Trainings Click here] to view '''Training Schedule''' on 19th &amp;amp;amp; 20th November 2009.&lt;br /&gt;
&lt;br /&gt;
==== Conference  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;&amp;lt;font face=&amp;quot;Arial&amp;quot; size=&amp;quot;2&amp;quot;&amp;gt;Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel training sessions to be conducted in 3 separate halls for two days i.e . 17th &amp;amp;amp; 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular session. Conference talks are being delivered by world renowned and most regarded speakers from around the world. Below is the conference schedule listing confirmed speakers and talks. Couple of talks are under review by the CFP (Call For Papers) Committee and shall be available as soon as those are confirmed. Event also follows two days of InfoSec trainings to be delivered in association with SANS, ISC2 and other organizations.&amp;lt;/font&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&amp;lt;font face=&amp;quot;Arial&amp;quot; size=&amp;quot;2&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;/font&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&amp;amp;nbsp;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;table border=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot; style=&amp;quot;border-collapse:&lt;br /&gt;
 collapse;width:100%&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;23&amp;quot; style=&amp;quot;height:17.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;23&amp;quot; style=&amp;quot;height: 17.25pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Where &amp;amp;gt;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 309px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #333399&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 1&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 316px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #3366FF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 2&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 334px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #00CCFF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 3:&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;19&amp;quot; style=&amp;quot;height:14.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;19&amp;quot; style=&amp;quot;height: 14.25pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Who &amp;amp;gt;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 309px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #333399&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Security Researchers &amp;amp;amp; Enthusiasts)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 316px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #3366FF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Security Auditors, Developers, QA, Architects)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 334px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #00CCFF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Leaders, Managers, C&amp;amp;amp;S professionals)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Schedule&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;10&amp;quot; height=&amp;quot;285&amp;quot; width=&amp;quot;24&amp;quot; style=&amp;quot;height: 213.75pt; width: 18pt; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid black; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;9:00AM&amp;amp;nbsp;&amp;amp;nbsp; - 10:30AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #DBE5F1&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Keynote Sessions&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;10:30AM - 11:00AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C5BE97&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Tea break &amp;amp;amp; Snacks on Exhibition Floor&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;11:00AM - 12:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;TBD&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;IBM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;How To Blackbox Test Almost Anything&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Aviram Jenik, Beyond Security&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;The International State of Cyber Security, Risk &lt;br /&gt;
		reduction in a high threat world&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Howard A. Schmidt, Former Cyber Security Advisor to &lt;br /&gt;
		the White house&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;12:00PM - 1:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Reconsidering Network Defenses or NOT !&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Cedric Blancher, EADS Innovation Works&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Lust 2.0 – Desire for free WiFi and the threat of the &lt;br /&gt;
		Imposter&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Lava Kumar Kuppan, Independent Security Researcher&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Applications - The new cyber security frontier&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Mano Paul, Software Assurance Advisor (ISC)2&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;1:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 2:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FAC090&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Lunch&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;2:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 3:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Exploiting Firefox Extensions&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Roberto Suggi Liverani, Security-Assessment.com&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Threat Modeling&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Varun Sharma, Microsoft Corp.&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Behind the scenes at the Microsoft Security Response &lt;br /&gt;
		Center&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Dave Midturi and Suresh Venkateswaran, Microsoft &lt;br /&gt;
		Security Response Center&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;3:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 4:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;SQL Server Forensics 2.0&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Kevvie Fowler, TELUS &amp;amp;amp; Ringzero&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Nitin Kumar/Vipin Kumar, Independent Security &lt;br /&gt;
		Researchers, Nvlabs&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Business Case-Risk Management/Compliance at leading &lt;br /&gt;
		Education Group at AMITY&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Dr J.S Sodhi, AMITY&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;4:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 4:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Business Continuity Case Study&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Venkataram Arabolu, BSI&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Usability and Privacy in Security&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Ponnurangam Kumaraguru, IIIT&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;4:30 PM&amp;amp;nbsp;&amp;amp;nbsp; - 5:30 PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C5BE97&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Tea break &amp;amp;amp; Snacks on Exhibition Floor&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;15&amp;quot; style=&amp;quot;height:11.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;15&amp;quot; style=&amp;quot;height: 11.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;7:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 10:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #DBE5F1&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;India Technology Leadership Summit 2009 (Exclusive by &lt;br /&gt;
		invitation only) -&amp;amp;quot; Information Security Concerns for Offshoring&amp;amp;quot;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;8&amp;quot; style=&amp;quot;height: 6.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;10&amp;quot; height=&amp;quot;8&amp;quot; style=&amp;quot;height: 6.0pt; width: 1070px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: white&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;23&amp;quot; style=&amp;quot;height:17.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;23&amp;quot; style=&amp;quot;height: 17.25pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Where &amp;amp;gt;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 309px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #333399&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 1&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 316px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #3366FF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 2&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 334px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #00CCFF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Conference Hall 3:&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;19&amp;quot; style=&amp;quot;height:14.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;19&amp;quot; style=&amp;quot;height: 14.25pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Who &amp;amp;gt;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 309px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #333399&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Security Researchers &amp;amp;amp; Enthusiasts)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 316px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #3366FF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Security Auditors, Developers, QA, Architects)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 334px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #00CCFF&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;(Leaders, Managers, C&amp;amp;amp;S professionals)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;2&amp;quot; height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Schedule&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Topic&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Speaker&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;10&amp;quot; height=&amp;quot;257&amp;quot; width=&amp;quot;24&amp;quot; style=&amp;quot;height: 192.75pt; width: 18pt; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;9:00AM&amp;amp;nbsp;&amp;amp;nbsp; - 10:00AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #DBE5F1&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Round Table with Speakers / Industry Panel - &lt;br /&gt;
		&amp;amp;quot;Security Today &amp;amp;amp; Tomorrow'&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;10:00AM - 10:30AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C5BE97&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Tea break &amp;amp;amp; Snacks on Exhibition Floor&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;32&amp;quot; style=&amp;quot;height:24.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;32&amp;quot; style=&amp;quot;height: 24.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;10:30AM - 11:30AM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Ten Things Web Developers Still Aren't Doing&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Frank Kim, ThinkSec Consulting&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;SANS Dshield Webhoneypot Project&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Jason Lam, Independent Security Researcher&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Critical Infrastructure Security “Danger Without &lt;br /&gt;
		borders”&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;John Bumgarner, US Cyber Consequence Unit (USCCU)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;32&amp;quot; style=&amp;quot;height:24.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;32&amp;quot; style=&amp;quot;height: 24.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;11:30AM - 12:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Cloud Hacking – Distributed Attack &amp;amp;amp; Exploit Platform&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Shreeraj Shah, Blueinfy Solutions&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Testing JSON Applications For Security Holes&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Aviram Jenik, Beyond Security&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Critical Infrastructure Security “Danger Without &lt;br /&gt;
		borders”&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;John Bumgarner, US Cyber Consequence Unit (USCCU)&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;12:30PM&amp;amp;nbsp; - 1:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FAC090&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Lunch&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;47&amp;quot; style=&amp;quot;height:35.25pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;47&amp;quot; style=&amp;quot;height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;1:30PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 2:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;All Your Packets Belong to Us - Attacking Backbone &lt;br /&gt;
		Technologies&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Daniel Mende, Security Researcher, ERNW&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Risk based Penetration Testing&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;K. K. Mookhey, Founder &amp;amp;amp; Principal Consultant, NII &lt;br /&gt;
		Consulting&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Wi-Fi security: the good, the bad and the ugly&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Cedric Blancher, EADS Innovation Works&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;32&amp;quot; style=&amp;quot;height:24.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;32&amp;quot; style=&amp;quot;height: 24.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;2:30PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 3:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Xprobe3 - What's New? Going Application Level&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Fyodor Yarochkin, Guard-info&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;OWASP SAMM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Pravir Chandra, OWASP&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Do you wanna Play a Game Game theory and Cyberwar&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Bryan K. Fite, HackSecKlahn&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;17&amp;quot; style=&amp;quot;height:12.75pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;17&amp;quot; style=&amp;quot;height: 12.75pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;3:30PM-4:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C5BE97&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Tea break &amp;amp;amp; Snacks on Exhibition Floor&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;32&amp;quot; style=&amp;quot;height:24.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;32&amp;quot; style=&amp;quot;height: 24.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;4:00 PM&amp;amp;nbsp;&amp;amp;nbsp; - 5:00PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Rumbling Infections – Web Malware Ontology&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Aditya K. Sood, COSEINC&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;Hacking Oracle From Web&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Sid, Independent Security Researcher&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 186px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Connected Information Security Framework&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td style=&amp;quot;width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Anil Kumar Chintala, Microsoft&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;tr height=&amp;quot;16&amp;quot; style=&amp;quot;height:12.0pt&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;td height=&amp;quot;16&amp;quot; style=&amp;quot;height: 12.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;5:00PM&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; - 5:30PM&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;td colspan=&amp;quot;8&amp;quot; style=&amp;quot;width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #DBE5F1&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;font face=&amp;quot;Arial&amp;quot;&amp;gt;Closing Remarks by Organizing Committee&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&amp;amp;nbsp;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;/body&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Two Day Trainings  ==&lt;br /&gt;
&lt;br /&gt;
Two days post-conference are dedicated towards best-of-breed trainings being conducted in association with SANS, ISC2 and other organizations. Trainings tracks have been made available as One-Day tracks and Two-Day tracks scheduled for 19th &amp;amp;amp; 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 1 - 19th Nov, 2009'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 2 - 20th Nov, 2009'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course ID''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course Duration''' &lt;br /&gt;
(# of Days) &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course Title''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Instructor''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course ID''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course Duration''' &lt;br /&gt;
(# of Days) &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course Title''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Instructor'''&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;30&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''One Day Training Tracks'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DHSO''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Oracle_Hacking_and_security ORACLE Hacking &amp;amp;amp; Security]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Sumit Sidharth,[[Image:Sb logo.png|center|78x50px|link=http://www.securitybyte.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DAWH''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Advanced_Web_Hacking Advanced Web Hacking -Securing AJAX, RIA &amp;amp;amp; SOA]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Shreeraj Shah [[Image:Blueinfy logo.png|center|link=http://www.blueinfy.com]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DAFT'''&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Advanced_Forensic_Techniques Advanced Forensics Techniques]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Dr. Chandrasekhar Umapathy,[[Image:Sb logo.png|center|78x50px|link=http://www.securitybyte.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DIAT'''&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/InDepth_Assessment_Techniques In-depth Assessment Techniques: Design, Code, and Runtime]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Fydor Yarochkin, &lt;br /&gt;
&lt;br /&gt;
[[Image:Logo_Armorize.JPG‎|center|93x31px|link=http://www.armorize.com]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;30&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Two Day Training Tracks'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DNST''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Building_Advanced_Network_Security_tools Building advanced Network Security Tools]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Daniel Mende,[[Image:Ernw logo.png|center]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DNST''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Building_Advanced_Network_Security_tools Building advanced Network Security Tools]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Daniel Mende,[[Image:Ernw logo.png|center]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DCBC''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/ISC2_CSSLP_CBK_Bootcamp (ISC)2 CSSLP CBK Boot camp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Mano Paul,[[Image:Isc logo.png|center|78x50px|link=http://www.isc2.org]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DCBC''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/ISC2_CSSLP_CBK_Bootcamp (ISC)2 CSSLP CBK Boot camp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Mano Paul,[[Image:Isc logo.png|center|78x50px|link=http://www.isc2.org]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSCJ / SANS Course ID&amp;amp;nbsp;: DEV530''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_Essential_Secure_Coding_Java_JEE_GSSP Essential Secure Coding in Java / JEE]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSCJ / SANS Course ID&amp;amp;nbsp;: DEV530''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_Essential_Secure_Coding_Java_JEE_GSSP Essential Secure Coding in Java / JEE]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DWPT / SANS Course ID&amp;amp;nbsp;: DEV538''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_WebApp_Pentesting_handsOn_immersion Web Application Pen Testing Hands-On Immersion]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DWPT / SANS Course ID&amp;amp;nbsp;: DEV538''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_WebApp_Pentesting_handsOn_immersion Web Application Pen Testing Hands-On Immersion]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSAB / SANS Course ID&amp;amp;nbsp;: AUD429''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_IT_Security_Audit_Bootcamp IT Security Audit Essentials Bootcamp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSAB / SANS Course ID&amp;amp;nbsp;: AUD429''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_IT_Security_Audit_Bootcamp IT Security Audit Essentials Bootcamp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Venue  ====&lt;br /&gt;
&lt;br /&gt;
Four Days Event is planned out at: &lt;br /&gt;
&lt;br /&gt;
[http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza,]&amp;lt;br&amp;gt;Site - 2, Sector - 29, &amp;lt;br&amp;gt;Gurgaon-122001 (National Capital Region), India&amp;lt;br&amp;gt;Hotel Front Desk: 91-124-4534000&amp;lt;br&amp;gt;Hotel Fax: 91-124-4304800&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | '''Co-Sponsor &amp;quot;Leadership Summit 2009&amp;quot;'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | '''CTF&amp;amp;nbsp;(Capture The Flag) Sponsor'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | '''Education &amp;amp;nbsp;Partner'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:20th green stacked.png|center|ISC2|link=http://www.isc2.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
| [[Image:Appin.jpg|center|link=http://www.appinsecurity.com]]&amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
| [[Image:BRIP-Logo.jpg|center|link=http://www.brip.co.in]]&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
| [[Image:Beyond-logo_large.jpg|Left|link=http://www.www.beyondsecurity.com]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Associate Sponsors'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;90&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Media Partners'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Supporters'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Torridn.jpg|center|link=http://www.torridnetworks.com]] &lt;br /&gt;
| [[Image:SSecurity_india_small.gif‎ |center|link=http://www.searchsecurity.in]]&lt;br /&gt;
| [[Image:HITB.jpg|center|link=http://conference.hitb.org]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:SecurityCompass.JPG|center|link=http://www.securitycompass.com]] &lt;br /&gt;
| [[Image:HNS-web.jpg|center|link=http://www.net-security.org]] &lt;br /&gt;
| [[Image:Sector.jpg|center|link=http://www.sector.ca]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Logo_Armorize.JPG|center|link=http://www.armorize.com]] &amp;lt;br&amp;gt;‎ &lt;br /&gt;
| [[Image:Infosecurity.jpg|center|link=http://www.infosecuritymagz.com]] &amp;lt;br&amp;gt;&lt;br /&gt;
| [[Image:Clubhack.gif|center]]&amp;lt;br&amp;gt;[[Image:Eventavenue Logo.jpg|center|link=https://www.eventavenue.com]]&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:eads.jpg|center|link=http://www.eads.com]]&amp;lt;br&amp;gt;&lt;br /&gt;
| [[Image:Itmagz.jpg|center]]&amp;amp;nbsp;[[Image:Electronicsf.jpg|center|link=http://www.electronicsforu.com]] &lt;br /&gt;
| [[Image:Crowne plaza.jpg|center|link=http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
==== Hotel &amp;amp; Travel  ====&lt;br /&gt;
&lt;br /&gt;
== Hotel Stay &amp;amp; Travel Information  ==&lt;br /&gt;
&lt;br /&gt;
To help our valued delegates with Hotel and Travel services, we have negotiated with some of the best and Budget Category Guest houses in Gurgaon that are located within a radius of 3 - 4 Kms from the venue.&lt;br /&gt;
&lt;br /&gt;
Limited cheaper accommodation is available near the venue hotel in budget hotels/apartments area. The tariff of these hotels ranges from Rs.2000 onwards per room night (inclusive of Room Rent, Breakfast and Luxury Tax).  Interested delegates / students can send a formal request for the desired accommodations and dates to our official travel agent.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;OFFICIAL TRAVEL AGENT&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dreamz conference Management Pvt.Ltd&amp;lt;/b&amp;gt; will look after your hotel accommodation in Gurgaon and New Delhi, pre &amp;amp; post conference tours / travel needs in India for delegates and visitors independently. If you wish to go for sightseeing tour within New Delhi and around it to places like Agra, Jaipur, Rajasthan etc. However, we would encourage you to make early bookings which will be done on “first – come - first service” basis and let us know of your interest, since that would ultimately work in your favour. Early reservation is strongly recommended as November being a high demand period for hotels in Gurgaon.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
For further details please contact:&lt;br /&gt;
&lt;br /&gt;
DREAMZ CONFERENCE MANAGEMENT PVT.LTD&lt;br /&gt;
&lt;br /&gt;
406, Ansal’s Majestic Tower, Vikas Puri, New Delhi – 110018&lt;br /&gt;
&lt;br /&gt;
Tel: 91 – 11 – 41586401, 402, Fax: 91 – 11 – 41586400&lt;br /&gt;
&lt;br /&gt;
Email: info@dreamztravel.net / dreamztravelindia@yahoo.com&lt;br /&gt;
&lt;br /&gt;
Website: www.dreamztravel.net&lt;br /&gt;
&lt;br /&gt;
Contact Person: Jitin Batra ( +91 9810558569 )&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==== Capture the Flag  ====&lt;br /&gt;
&lt;br /&gt;
== HackHunt 2009  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;India's foremost Hacking Challenge &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Your Shot to the Title of India's best hacker along with Prize money of more than &amp;lt;b&amp;gt;Rs 150,000&amp;lt;/b&amp;gt; up for grabs!&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Search for India’s Best Ethical Hacker &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
HackHunt is India’s leading hacking competition and aims at awarding the best ethical hackers in the country. The competition is brought to you by Appin Security Group, a leading Information Security and Ethical Hacking Company and Securitybyte, a global Information Security Conference Company. &lt;br /&gt;
&lt;br /&gt;
The competition will be conducted in 3 phases. The 1st two rounds will be online and the 3rd and final round will take place at“Securitybyte &amp;amp; OWASP Appsec Asia 2009” on November 17, 2009at Crowne Plaza, Gurgaon. &lt;br /&gt;
&lt;br /&gt;
Level 1 – Knowledge Check&lt;br /&gt;
All the participants will be answering a quiz and based on the score top 10% will be shortlisted to 2nd round.&lt;br /&gt;
&lt;br /&gt;
Level 2 – Skill Check&lt;br /&gt;
This stage will require an attacker to get to the final FLAG file which he/she would need to register for the event.&lt;br /&gt;
&lt;br /&gt;
Level 3 – Final Round&lt;br /&gt;
This stage will require the attackers to exploit a pre-announced SSID which has WPA (or wpa 2).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To participate and for more details visit website :- http://www.hackerscouncil.org/&lt;br /&gt;
&lt;br /&gt;
== PacketWars  ==&lt;br /&gt;
&amp;lt;b&amp;gt;First time in India brought to you by Securitybyte! &amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;                                              &lt;br /&gt;
About PacketWars&lt;br /&gt;
&lt;br /&gt;
PacketWars is an intense, real-time information warfare simulation. Unlike other “capture the flag” games, the battlegrounds featured in PacketWars use the same software and hardware you would encounter in the real world.&lt;br /&gt;
&lt;br /&gt;
PacketWars is designed to operate like a sport. Think Formula One Racing meets professional golf with a dash of Ultimate Fighting thrown in for good measure. Serious fun!&lt;br /&gt;
&lt;br /&gt;
Visit http://packetwars.com/ for more details.&lt;br /&gt;
How To Play?&lt;br /&gt;
&lt;br /&gt;
PacketWars is a Sport like nothing you have ever experienced! Games known as “BATTLES” pit individual players and teams against each other in a race to achieve defined objectives.&lt;br /&gt;
&lt;br /&gt;
The rules of engagement are simple:&lt;br /&gt;
- Illegal activity of any kind is prohibited&lt;br /&gt;
- Protect yourself at all times&lt;br /&gt;
- Battles are designed to be of a low, medium or high difficulty level based on the battle objectives and battle duration&lt;br /&gt;
- Primary, Secondary and Tertiary objectives are defined and assigned points based on difficulty&lt;br /&gt;
- Battles have time limits and other defined constraints&lt;br /&gt;
- Constraints are sometimes known to the combatants and other times are not&lt;br /&gt;
- Anything that is not expressly prohibited is allowed&lt;br /&gt;
- Points are awarded for FLARE&lt;br /&gt;
&lt;br /&gt;
Equipment Needed:&lt;br /&gt;
- Most combants use a notebook and a BackTrack CD however you are only limited by your imagination and bank account&lt;br /&gt;
- You need a battle field and a PacketMaster…Oh yeah, skillz come in handy also!How To Play&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b.How can I participate?&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
PacketWars to be held at the Hotel Crowne Plaza, Gurgaon on Nov 17 &amp;amp; Nov 18, 2009. Participation is FREE! Schedule will be announced soon.&lt;br /&gt;
&lt;br /&gt;
== WebWar III  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;About&amp;lt;/b&amp;gt;&lt;br /&gt;
Hackers attack, coders defend, when you get them together you end up with Web War III. WWIII is designed to put your Web Application attack and defense skills to the test.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Teams&amp;lt;/b&amp;gt;&lt;br /&gt;
Each team consists of two players, an attacker and a defender. The attacker would be capable of identifying Web Application Vulnerabilities (OWASP Top 10). The defender would be capable of writing secure Java code.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Game Format&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The game has two stages:&lt;br /&gt;
&lt;br /&gt;
Stage 1:&lt;br /&gt;
Each team is given a VM Ware image containing a web server hosting a vulnerable web application. During this stage each team identifies the vulnerabilities in their application.&lt;br /&gt;
They try to fix the identified vulnerabilities by making code changes.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Stage 2:&lt;br /&gt;
The IP addresses of the Web Server's of all the teams is announced.&lt;br /&gt;
Each team looks for vulnerabilities in the Web Applications of the other teams.&lt;br /&gt;
Vulnerabilities found on the opponents' application get positive points.&lt;br /&gt;
Vulnerabilities found by the opponents on your application get negative points.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Team with the highest points at the end of Stage 2 wins.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Tools and Equipments&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Each team should bring their own laptop with VM Ware installed.&lt;br /&gt;
The attacker can use any tools they bring.&lt;br /&gt;
The applications come with ESAPI to help the defenders fix the code quicker.&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
==== Leadership Summit 2009  ====&lt;br /&gt;
&amp;lt;b&amp;gt;India's top technology thought leaders coming together to discuss &amp;quot;Security concerns in off-shoring&amp;quot;&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Honored Guests&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
-Honorable Former President of India, Dr. A.P.J Abdul Kalam to inaugrate the Leadership Summit 2009.&amp;lt;br&amp;gt;&lt;br /&gt;
-Prof. Howard A. Schmidt(Advisor, NIST; Former Vice Chair - President’s Critical Infrastructure Board; Former Special Advisor – Cyberspace Security for White House)&amp;lt;br&amp;gt;&lt;br /&gt;
-Mr. Hord Tipton, Executive Director (ISC)2&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;About the Event&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
An elite gathering of 200 technology leaders, decision makers &amp;amp; InfoSec experts from leading service providers, government agencies and various industry verticals.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Two hours of panel discussions between three panels of 12 distinguished industry experts representing outsourcing companies, service providers and the regulatory bodies.  Panel discussions will be followed by networking dinner &amp;amp; cocktails.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Prof Howard A. Schmidt (Advisor, NIST; Former Vice Chair - President’s Critical Infrastructure Board; Former Special Advisor – Cyberspace Security for White House) will facilitate the panel discussions. Thought leaders participating in the panel discussions are:&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Outsourcing Organizations&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Raghavendra Vaidya, CIO - GE Capital India&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. CRN Vairavelu, VP - Ford Technology Services India&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Pankaj Agrawal, CISO - Aircel Limited&amp;lt;br&amp;gt;&lt;br /&gt;
TBD&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Service Providers&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Terry Thomas, Partner - Ernst &amp;amp; Young&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Debashis Ghosh, Head (LS&amp;amp;H ISU) - Tata Consultancy Services&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Sunil Gujral, EVP &amp;amp; CTO - Quatrro&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Sunil Goyal, COO - Sopra group&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Regulatory Bodies&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Dr. Kamlesh Bajaj, CEO - DSCI (a NASSCOM initiative)&amp;lt;br&amp;gt;&lt;br /&gt;
Dr. Gulshan Rai, Director - CERT-in&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Hord Tipton, Executive Director - ISC2 (ex CIO, US Department of Interior)&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Vakul Sharma, Lawyer - Supreme Court&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The event is exclusive to industry leaders and is by private invitation only. If you are interested in attending the event, please email your business card to info@securitybyte.org This e-mail address is being protected from spambots.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Venue - Hotel Crowne Plaza, Gurgaon | Timings - 5:30PM - 9:00PM&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
Please contact [http://www.owasp.org/index.php/Category:India#OWASP_India_Co-Chairs Chair - OWASP India] for sponsorship opportunities. &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Category:India Category: OWASP India]&lt;/div&gt;</summary>
		<author><name>Puneetm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SecurityByte_and_OWASP_Asia_AppSec_Conference_2009&amp;diff=72891</id>
		<title>SecurityByte and OWASP Asia AppSec Conference 2009</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SecurityByte_and_OWASP_Asia_AppSec_Conference_2009&amp;diff=72891"/>
				<updated>2009-11-09T18:48:10Z</updated>
		
		<summary type="html">&lt;p&gt;Puneetm: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:SB OWASP 2009 banner.gif|center|link=http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009]]&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza] &amp;amp;#124; [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Registrations]&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*&amp;lt;b&amp;gt;Only One Week Left ! Register Online today to grab your seat for India's best Security Conference.&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;Honorable Former President of India, Dr. A.P.J Abdul Kalam to Inaugrate the India Technology Leadership Summit 2009. &amp;lt;/b&amp;gt;This event is an Invitation ONLY event.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Registrations Click Here]''' for more information.&lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
Securitybyte &amp;amp;amp; OWASP are proud to welcome you to the annual international information security conference – Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009, Nov 17th through Nov 20th in Delhi &amp;amp;amp; NCR, India. &lt;br /&gt;
&lt;br /&gt;
This is a landmark event, as both Securitybyte and OWASP join hands to present India’s largest InfoSec event with world renowned and most regarded international speakers. &lt;br /&gt;
&lt;br /&gt;
Securitybye &amp;amp;amp; OWASP AppSec Asia Conference 2009 will be held at [http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza, Gurgaon, NCR, India.] on 17th November through 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Security Researchers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Penetration Testers &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*IT Security Professionals &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
&lt;br /&gt;
==== About  ====&lt;br /&gt;
&lt;br /&gt;
== About Conference  ==&lt;br /&gt;
&lt;br /&gt;
Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel conference talks to be conducted in 3 separate halls for two days i.e . 17th &amp;amp;amp; 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular talk. Conference talks are being delivered by world renowned and most regarded speakers from around the world. &lt;br /&gt;
&lt;br /&gt;
== About Trainings  ==&lt;br /&gt;
&lt;br /&gt;
Two days post-conference are dedicated towards best-of-breed trainings being conducted in association with SANS, ISC2 and other organizations. Trainings tracks have been made available as One-Day tracks and Two-Day tracks scheduled for 19th &amp;amp;amp; 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
==== Registrations  ====&lt;br /&gt;
&lt;br /&gt;
== [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Registration] is now open!  ==&lt;br /&gt;
&lt;br /&gt;
=== You can register [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 here]  ===&lt;br /&gt;
&lt;br /&gt;
*[http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Click Here] for Online Registrations. &lt;br /&gt;
*[http://securitybyte.org/index.php/register.html Click Here] for Offline Registrations.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Please check out our Exclusive Discount Offer, available Starting October 6th - 15th, 2009. &amp;quot;SAVE BIG NOW !&amp;quot;&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''''The below pricing reflects the Standard Registration Prices .''''' &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Two Days of Conference (17th and 18th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.8,500/- INR &lt;br /&gt;
| General Public&lt;br /&gt;
|-&lt;br /&gt;
| Two Days of Conference (17th and 18th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.5,000/- INR &lt;br /&gt;
| Students&lt;br /&gt;
|-&lt;br /&gt;
| Two-Day Training Tracks (19th and 20th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.25,000/- INR&lt;br /&gt;
|-&lt;br /&gt;
| One-Day Training Tracks (19th OR 20th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.12,500/- INR&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;** Service Tax @ 10.3% will be charged extra.&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;ISC2&amp;lt;/b&amp;gt; Members can avail a Special 15% discount on Conference &amp;amp; Training Registration.&lt;br /&gt;
(Please provide your ISC2 Certification ID number to avail the above Discount)&lt;br /&gt;
For Registrations contact us at registrations@securitybyte.org&lt;br /&gt;
== Exclusive Offers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;- Group / Team Discounts available: Kindly contact us at registrations@securitybyte.org&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Special University Student discount&amp;lt;/b&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
- University Students can register for two days of conference for just Rs. 5000 (including taxes)&amp;lt;br&amp;gt;&lt;br /&gt;
- Special 15 % Discounts for Training registration&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Trainings Click here for details on the training courses that are available.]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Who Should Attend Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009: ==&lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Security Researchers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Penetration Testers &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*IT Security Professionals &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;For student discount, attendees must present proof of enrollment when picking up your badge. &lt;br /&gt;
&lt;br /&gt;
==== Schedule  ====&lt;br /&gt;
&lt;br /&gt;
Three parallel conference talks are scheduled for 17th &amp;amp;amp; 18th November 2009 in three different halls. Training tracks have been divided in one-day tracks scheduled for 19th or 20th November 2009 and two-day tracks those are schedule to continue for two days both on 19th &amp;amp;amp; 20th November 2009. Follow the tabs to learn the details on both conference and trainings. &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Conference Click here] to view the '''Conference Schedule''' for 17th &amp;amp;amp; 18th November 2009.&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Trainings Click here] to view '''Training Schedule''' on 19th &amp;amp;amp; 20th November 2009.&lt;br /&gt;
&lt;br /&gt;
==== Conference  ====&lt;br /&gt;
&lt;br /&gt;
== Two Days Conference  ==&lt;br /&gt;
&lt;br /&gt;
Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel conference talks to be conducted in 3 separate halls for two days i.e . 17th &amp;amp;amp; 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular talk. Conference talks are being delivered by world renowned and most regarded speakers from around the world. Below is the detailed schedule for the two days of conference.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 1 - 17th Nov, 2009'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Where&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - I''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - II''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - III'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Who&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Researchers &amp;amp;amp; Enthusiasts)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Auditors, Developers, QA teams, Architects)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Leaders, Managers, C&amp;amp;amp;S professionals)'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 8:00 AM - 9:00 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Registrations'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Schedule''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 9:00 AM - 10:30 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Keynote'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:30 AM - 11:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea Break'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 11:00 AM - 12:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | How To Blackbox Test Almost Anything&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Aviram Jenik, Beyond Security&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | The International State of Cyber Security, Risk reduction in a high threat world&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Prof. Howard A. Schmidt, Former Cyber Security Advisor to the White house&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:00 PM - 1:00 PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Client Side Hacks&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Dino Covotsos &amp;amp; Charleton Smith, Telspace Systems&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Risk Based Penetration testing&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | K. K. Mookhey, Founder &amp;amp;amp; Principal Consultant, NII Consulting&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Applications, the source for CyberThreats&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Mano Paul,Software Assurance Advisor,(ISC)2&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 1:00PM - 2:00PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Lunch'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 2:00 PM - 3:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Exploiting Firefox Extensions&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Roberto Suggi Liverani, Security-Assessment.com&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Threat Modeling&amp;lt;br&amp;gt;&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Varun Sharma,Microsoft India&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Enterprise Application Security Program&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 3:00 PM - 4:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | SQL Server Forensics 2.0&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Kevvie Fowler, TELUS &amp;amp;amp; Ringzero&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | OWASP SAMM&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Pravir Chandra, Director of Strategic Services,&amp;lt;br&amp;gt;Fortify&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Business Case - Risk Management/Compliance at leading Education Group AMITY (Rapid Fire: 30 Min talk)&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Dr. JS Sodhi, CIO, AMITY Group&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 4:00 PM - 5:00 PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Ownage 2.0 - How to own the World&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Saumil Shah, NetSquare Solutions&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | &amp;quot;Do you want to play a Game&amp;quot; - Game theory and Cyberwar&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Bryan K. Fite, HackSecKlahn&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Usability and Privacy in Security&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Dr. Ponnurangam Kumaraguru, Asst. Professor - IIIT (Rapid Fire : 30 Min talk)&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 5:00 PM - 6:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea and Snacks on the Exhibition floor'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 7:00 PM - 10:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''CXO Event (Exclusive by invitation only) - Information Security Concerns for Offshoring'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 2 - 18th Nov, 2009'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Where&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - I''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - II''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - III'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Who&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Researchers &amp;amp;amp; Enthusiasts)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Auditors, Developers, QA teams, Architects)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Leaders, Managers, C&amp;amp;amp;S professionals)'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 8:00 AM - 9:00 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Registrations'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 9:00 AM - 10:00 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Round Table with Speakers / Industry Panel - &amp;quot;Security Today &amp;amp; Tomorrow''''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:00 AM - 10:30 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea Break'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Schedule''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:30 AM - 11:30&amp;amp;nbsp;AM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | All your Packets belong to us&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Daniel Mende, Security Researcher, ERNW&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | SANS Dshield Webhoneypot Project&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Jason Lam, Independent Security Researcher&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Critical Infrastructure Security “Danger Without borders” &amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | John Bumgarner, US Cyber Consequence Unit (USCCU)&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 11:30 AM - 12:30 PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Hacking Oracle From Web&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Sid, Independent Security Researcher&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Testing JSON Applications For Security Holes&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Aviram Jenik, Beyond Security&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Critical Infrastructure Security “Danger Without borders” &amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | John Bumgarner, US Cyber Consequence Unit (USCCU)&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:30PM - 1:30PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Lunch'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 1:30 PM&amp;amp;nbsp;- 2:30 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Lust 2.0 – Desire for free WiFi and the threat of the Imposter &amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Lava Kumar Kuppan, Independent Security Researcher&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Cloud Hacking - Distributed Attacks &amp;amp; Exploits&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Shreeraj Shah, Blueinfy Solutions&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Cedric Blancher, EADS Innovation Works&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 2:30 PM - 3:30&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Xprobe3 - What's New? Going Application Level&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Fyodor Yarochkin, Armorize&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Nitin Kumar/Vipin Kumar, Independent Security Researchers, NVlabs&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Behind the Scenes at Microsoft Security Response Center&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Dave Midturi,MSRC, Microsoft Corp.&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 3:30PM - 4:00PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea Break'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 4:00 PM - 5:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 5:00 PM - 6:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Closing Keynotes - &amp;quot;OWASP &amp;amp; Securitybyte&amp;quot;'''&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Trainings  ====&lt;br /&gt;
&lt;br /&gt;
== Two Day Trainings  ==&lt;br /&gt;
&lt;br /&gt;
Two days post-conference are dedicated towards best-of-breed trainings being conducted in association with SANS, ISC2 and other organizations. Trainings tracks have been made available as One-Day tracks and Two-Day tracks scheduled for 19th &amp;amp;amp; 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 1 - 19th Nov, 2009'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 2 - 20th Nov, 2009'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course ID''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course Duration''' &lt;br /&gt;
(# of Days) &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course Title''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Instructor''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course ID''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course Duration''' &lt;br /&gt;
(# of Days) &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course Title''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Instructor'''&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;30&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''One Day Training Tracks'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DHSO''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Oracle_Hacking_and_security ORACLE Hacking &amp;amp;amp; Security]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Sumit Sidharth,[[Image:Sb logo.png|center|78x50px|link=http://www.securitybyte.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DAWH''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Advanced_Web_Hacking Advanced Web Hacking -Securing AJAX, RIA &amp;amp;amp; SOA]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Shreeraj Shah [[Image:Blueinfy logo.png|center|link=http://www.blueinfy.com]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DAFT'''&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Advanced_Forensic_Techniques Advanced Forensics Techniques]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Dr. Chandrasekhar Umapathy,[[Image:Sb logo.png|center|78x50px|link=http://www.securitybyte.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DIAT'''&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/InDepth_Assessment_Techniques In-depth Assessment Techniques: Design, Code, and Runtime]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Fydor Yarochkin, &lt;br /&gt;
&lt;br /&gt;
[[Image:Logo_Armorize.JPG‎|center|93x31px|link=http://www.armorize.com]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;30&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Two Day Training Tracks'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DNST''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Building_Advanced_Network_Security_tools Building advanced Network Security Tools]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Daniel Mende,[[Image:Ernw logo.png|center]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DNST''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Building_Advanced_Network_Security_tools Building advanced Network Security Tools]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Daniel Mende,[[Image:Ernw logo.png|center]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DCBC''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/ISC2_CSSLP_CBK_Bootcamp (ISC)2 CSSLP CBK Boot camp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Mano Paul,[[Image:Isc logo.png|center|78x50px|link=http://www.isc2.org]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DCBC''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/ISC2_CSSLP_CBK_Bootcamp (ISC)2 CSSLP CBK Boot camp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Mano Paul,[[Image:Isc logo.png|center|78x50px|link=http://www.isc2.org]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSCJ / SANS Course ID&amp;amp;nbsp;: DEV530''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_Essential_Secure_Coding_Java_JEE_GSSP Essential Secure Coding in Java / JEE]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSCJ / SANS Course ID&amp;amp;nbsp;: DEV530''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_Essential_Secure_Coding_Java_JEE_GSSP Essential Secure Coding in Java / JEE]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DWPT / SANS Course ID&amp;amp;nbsp;: DEV538''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_WebApp_Pentesting_handsOn_immersion Web Application Pen Testing Hands-On Immersion]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DWPT / SANS Course ID&amp;amp;nbsp;: DEV538''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_WebApp_Pentesting_handsOn_immersion Web Application Pen Testing Hands-On Immersion]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSAB / SANS Course ID&amp;amp;nbsp;: AUD429''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_IT_Security_Audit_Bootcamp IT Security Audit Essentials Bootcamp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSAB / SANS Course ID&amp;amp;nbsp;: AUD429''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_IT_Security_Audit_Bootcamp IT Security Audit Essentials Bootcamp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Venue  ====&lt;br /&gt;
&lt;br /&gt;
Four Days Event is planned out at: &lt;br /&gt;
&lt;br /&gt;
[http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza,]&amp;lt;br&amp;gt;Site - 2, Sector - 29, &amp;lt;br&amp;gt;Gurgaon-122001 (National Capital Region), India&amp;lt;br&amp;gt;Hotel Front Desk: 91-124-4534000&amp;lt;br&amp;gt;Hotel Fax: 91-124-4304800&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | '''Co-Sponsor &amp;quot;Leadership Summit 2009&amp;quot;'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | '''CTF&amp;amp;nbsp;(Capture The Flag) Sponsor'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | '''Education &amp;amp;nbsp;Partner'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:20th green stacked.png|center|ISC2|link=http://www.isc2.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
| [[Image:Appin.jpg|center|link=http://www.appinsecurity.com]]&amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
| [[Image:BRIP-Logo.jpg|center|link=http://www.brip.co.in]]&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
| [[Image:Beyond-logo_large.jpg|Left|link=http://www.www.beyondsecurity.com]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Associate Sponsors'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;90&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Media Partners'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Supporters'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Torridn.jpg|center|link=http://www.torridnetworks.com]] &lt;br /&gt;
| [[Image:SSecurity_india_small.gif‎ |center|link=http://www.searchsecurity.in]]&lt;br /&gt;
| [[Image:HITB.jpg|center|link=http://conference.hitb.org]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:SecurityCompass.JPG|center|link=http://www.securitycompass.com]] &lt;br /&gt;
| [[Image:HNS-web.jpg|center|link=http://www.net-security.org]] &lt;br /&gt;
| [[Image:Sector.jpg|center|link=http://www.sector.ca]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Logo_Armorize.JPG|center|link=http://www.armorize.com]] &amp;lt;br&amp;gt;‎ &lt;br /&gt;
| [[Image:Infosecurity.jpg|center|link=http://www.infosecuritymagz.com]] &amp;lt;br&amp;gt;&lt;br /&gt;
| [[Image:Clubhack.gif|center]]&amp;lt;br&amp;gt;[[Image:Eventavenue Logo.jpg|center|link=https://www.eventavenue.com]]&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:eads.jpg|center|link=http://www.eads.com]]&amp;lt;br&amp;gt;&lt;br /&gt;
| [[Image:Itmagz.jpg|center]]&amp;amp;nbsp;[[Image:Electronicsf.jpg|center|link=http://www.electronicsforu.com]] &lt;br /&gt;
| [[Image:Crowne plaza.jpg|center|link=http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
==== Hotel &amp;amp; Travel  ====&lt;br /&gt;
&lt;br /&gt;
== Hotel Stay &amp;amp; Travel Information  ==&lt;br /&gt;
&lt;br /&gt;
To help our valued delegates with Hotel and Travel services, we have negotiated with some of the best and Budget Category Guest houses in Gurgaon that are located within a radius of 3 - 4 Kms from the venue.&lt;br /&gt;
&lt;br /&gt;
Limited cheaper accommodation is available near the venue hotel in budget hotels/apartments area. The tariff of these hotels ranges from Rs.2000 onwards per room night (inclusive of Room Rent, Breakfast and Luxury Tax).  Interested delegates / students can send a formal request for the desired accommodations and dates to our official travel agent.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;OFFICIAL TRAVEL AGENT&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dreamz conference Management Pvt.Ltd&amp;lt;/b&amp;gt; will look after your hotel accommodation in Gurgaon and New Delhi, pre &amp;amp; post conference tours / travel needs in India for delegates and visitors independently. If you wish to go for sightseeing tour within New Delhi and around it to places like Agra, Jaipur, Rajasthan etc. However, we would encourage you to make early bookings which will be done on “first – come - first service” basis and let us know of your interest, since that would ultimately work in your favour. Early reservation is strongly recommended as November being a high demand period for hotels in Gurgaon.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
For further details please contact:&lt;br /&gt;
&lt;br /&gt;
DREAMZ CONFERENCE MANAGEMENT PVT.LTD&lt;br /&gt;
&lt;br /&gt;
406, Ansal’s Majestic Tower, Vikas Puri, New Delhi – 110018&lt;br /&gt;
&lt;br /&gt;
Tel: 91 – 11 – 41586401, 402, Fax: 91 – 11 – 41586400&lt;br /&gt;
&lt;br /&gt;
Email: info@dreamztravel.net / dreamztravelindia@yahoo.com&lt;br /&gt;
&lt;br /&gt;
Website: www.dreamztravel.net&lt;br /&gt;
&lt;br /&gt;
Contact Person: Jitin Batra ( +91 9810558569 )&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==== Capture the Flag  ====&lt;br /&gt;
&lt;br /&gt;
== HackHunt 2009  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;India's foremost Hacking Challenge &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Your Shot to the Title of India's best hacker along with Prize money of more than &amp;lt;b&amp;gt;Rs 150,000&amp;lt;/b&amp;gt; up for grabs!&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Search for India’s Best Ethical Hacker &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
HackHunt is India’s leading hacking competition and aims at awarding the best ethical hackers in the country. The competition is brought to you by Appin Security Group, a leading Information Security and Ethical Hacking Company and Securitybyte, a global Information Security Conference Company. &lt;br /&gt;
&lt;br /&gt;
The competition will be conducted in 3 phases. The 1st two rounds will be online and the 3rd and final round will take place at“Securitybyte &amp;amp; OWASP Appsec Asia 2009” on November 17, 2009at Crowne Plaza, Gurgaon. &lt;br /&gt;
&lt;br /&gt;
Level 1 – Knowledge Check&lt;br /&gt;
All the participants will be answering a quiz and based on the score top 10% will be shortlisted to 2nd round.&lt;br /&gt;
&lt;br /&gt;
Level 2 – Skill Check&lt;br /&gt;
This stage will require an attacker to get to the final FLAG file which he/she would need to register for the event.&lt;br /&gt;
&lt;br /&gt;
Level 3 – Final Round&lt;br /&gt;
This stage will require the attackers to exploit a pre-announced SSID which has WPA (or wpa 2).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To participate and for more details visit website :- http://www.hackerscouncil.org/&lt;br /&gt;
&lt;br /&gt;
== PacketWars  ==&lt;br /&gt;
&amp;lt;b&amp;gt;First time in India brought to you by Securitybyte! &amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;                                              &lt;br /&gt;
About PacketWars&lt;br /&gt;
&lt;br /&gt;
PacketWars is an intense, real-time information warfare simulation. Unlike other “capture the flag” games, the battlegrounds featured in PacketWars use the same software and hardware you would encounter in the real world.&lt;br /&gt;
&lt;br /&gt;
PacketWars is designed to operate like a sport. Think Formula One Racing meets professional golf with a dash of Ultimate Fighting thrown in for good measure. Serious fun!&lt;br /&gt;
&lt;br /&gt;
Visit http://packetwars.com/ for more details.&lt;br /&gt;
How To Play?&lt;br /&gt;
&lt;br /&gt;
PacketWars is a Sport like nothing you have ever experienced! Games known as “BATTLES” pit individual players and teams against each other in a race to achieve defined objectives.&lt;br /&gt;
&lt;br /&gt;
The rules of engagement are simple:&lt;br /&gt;
- Illegal activity of any kind is prohibited&lt;br /&gt;
- Protect yourself at all times&lt;br /&gt;
- Battles are designed to be of a low, medium or high difficulty level based on the battle objectives and battle duration&lt;br /&gt;
- Primary, Secondary and Tertiary objectives are defined and assigned points based on difficulty&lt;br /&gt;
- Battles have time limits and other defined constraints&lt;br /&gt;
- Constraints are sometimes known to the combatants and other times are not&lt;br /&gt;
- Anything that is not expressly prohibited is allowed&lt;br /&gt;
- Points are awarded for FLARE&lt;br /&gt;
&lt;br /&gt;
Equipment Needed:&lt;br /&gt;
- Most combants use a notebook and a BackTrack CD however you are only limited by your imagination and bank account&lt;br /&gt;
- You need a battle field and a PacketMaster…Oh yeah, skillz come in handy also!How To Play&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b.How can I participate?&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
PacketWars to be held at the Hotel Crowne Plaza, Gurgaon on Nov 17 &amp;amp; Nov 18, 2009. Participation is FREE! Schedule will be announced soon.&lt;br /&gt;
&lt;br /&gt;
== WebWar III  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;About&amp;lt;/b&amp;gt;&lt;br /&gt;
Hackers attack, coders defend, when you get them together you end up with Web War III. WWIII is designed to put your Web Application attack and defense skills to the test.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Teams&amp;lt;/b&amp;gt;&lt;br /&gt;
Each team consists of two players, an attacker and a defender. The attacker would be capable of identifying Web Application Vulnerabilities (OWASP Top 10). The defender would be capable of writing secure Java code.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Game Format&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The game has two stages:&lt;br /&gt;
&lt;br /&gt;
Stage 1:&lt;br /&gt;
Each team is given a VM Ware image containing a web server hosting a vulnerable web application. During this stage each team identifies the vulnerabilities in their application.&lt;br /&gt;
They try to fix the identified vulnerabilities by making code changes.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Stage 2:&lt;br /&gt;
The IP addresses of the Web Server's of all the teams is announced.&lt;br /&gt;
Each team looks for vulnerabilities in the Web Applications of the other teams.&lt;br /&gt;
Vulnerabilities found on the opponents' application get positive points.&lt;br /&gt;
Vulnerabilities found by the opponents on your application get negative points.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Team with the highest points at the end of Stage 2 wins.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Tools and Equipments&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Each team should bring their own laptop with VM Ware installed.&lt;br /&gt;
The attacker can use any tools they bring.&lt;br /&gt;
The applications come with ESAPI to help the defenders fix the code quicker.&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
==== Leadership Summit 2009  ====&lt;br /&gt;
&amp;lt;b&amp;gt;India's top technology thought leaders coming together to discuss &amp;quot;Security concerns in off-shoring&amp;quot;&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Honored Guests&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
-Honorable Former President of India, Dr. A.P.J Abdul Kalam to inaugrate the Leadership Summit 2009.&amp;lt;br&amp;gt;&lt;br /&gt;
-Prof. Howard A. Schmidt(Advisor, NIST; Former Vice Chair - President’s Critical Infrastructure Board; Former Special Advisor – Cyberspace Security for White House)&amp;lt;br&amp;gt;&lt;br /&gt;
-Mr. Hord Tipton, Executive Director (ISC)2&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;About the Event&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
An elite gathering of 200 technology leaders, decision makers &amp;amp; InfoSec experts from leading service providers, government agencies and various industry verticals.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Two hours of panel discussions between three panels of 12 distinguished industry experts representing outsourcing companies, service providers and the regulatory bodies.  Panel discussions will be followed by networking dinner &amp;amp; cocktails.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Prof Howard A. Schmidt (Advisor, NIST; Former Vice Chair - President’s Critical Infrastructure Board; Former Special Advisor – Cyberspace Security for White House) will facilitate the panel discussions. Thought leaders participating in the panel discussions are:&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Outsourcing Organizations&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Raghavendra Vaidya, CIO - GE Capital India&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. CRN Vairavelu, VP - Ford Technology Services India&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Pankaj Agrawal, CISO - Aircel Limited&amp;lt;br&amp;gt;&lt;br /&gt;
TBD&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Service Providers&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Terry Thomas, Partner - Ernst &amp;amp; Young&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Debashis Ghosh, Head (LS&amp;amp;H ISU) - Tata Consultancy Services&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Sunil Gujral, EVP &amp;amp; CTO - Quatrro&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Sunil Goyal, COO - Sopra group&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Regulatory Bodies&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Dr. Kamlesh Bajaj, CEO - DSCI (a NASSCOM initiative)&amp;lt;br&amp;gt;&lt;br /&gt;
Dr. Gulshan Rai, Director - CERT-in&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Hord Tipton, Executive Director - ISC2 (ex CIO, US Department of Interior)&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Vakul Sharma, Lawyer - Supreme Court&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The event is exclusive to industry leaders and is by private invitation only. If you are interested in attending the event, please email your business card to info@securitybyte.org This e-mail address is being protected from spambots.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Venue - Hotel Crowne Plaza, Gurgaon | Timings - 5:30PM - 9:00PM&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
Please contact [http://www.owasp.org/index.php/Category:India#OWASP_India_Co-Chairs Chair - OWASP India] for sponsorship opportunities. &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Category:India Category: OWASP India]&lt;/div&gt;</summary>
		<author><name>Puneetm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Eads.jpg&amp;diff=72890</id>
		<title>File:Eads.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Eads.jpg&amp;diff=72890"/>
				<updated>2009-11-09T18:42:21Z</updated>
		
		<summary type="html">&lt;p&gt;Puneetm: uploaded a new version of &amp;quot;File:Eads.jpg&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Puneetm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Eads.jpg&amp;diff=72889</id>
		<title>File:Eads.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Eads.jpg&amp;diff=72889"/>
				<updated>2009-11-09T18:37:08Z</updated>
		
		<summary type="html">&lt;p&gt;Puneetm: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Puneetm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=InDepth_Assessment_Techniques&amp;diff=72886</id>
		<title>InDepth Assessment Techniques</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=InDepth_Assessment_Techniques&amp;diff=72886"/>
				<updated>2009-11-09T18:19:21Z</updated>
		
		<summary type="html">&lt;p&gt;Puneetm: /* In-depth Assessment Techniques: Design, Code, and Runtime */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= '''In-depth Assessment Techniques: Design, Code, and Runtime''' =&lt;br /&gt;
&lt;br /&gt;
Course: In-depth Assessment Techniques: Design, Code, and Runtime&amp;lt;br&amp;gt;Course ID: SB1DIAT&amp;lt;br&amp;gt;Instructor: Fyodor Yarochkin, Armorize&amp;lt;br&amp;gt;CPE Credits: 7 CPE’s &amp;lt;br&amp;gt;Duration: 1 Day&amp;lt;br&amp;gt;Date: November 20th, 2009 (9 AM – 6 PM)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Who should attend?'''&amp;lt;br&amp;gt;• Anyone who is interested in advancing their software assessment skills&amp;lt;br&amp;gt;• Security Architects &amp;amp;amp; Consultants wanting to learn advanced secure design concepts&amp;lt;br&amp;gt;• Team leads and developers interested in learning more about Design reviews, code reviews and&amp;lt;br&amp;gt;Runtime code analysis&amp;lt;br&amp;gt;• Penetration Testers and security testers&lt;br /&gt;
&lt;br /&gt;
'''Class Pre-requisite:'''&amp;lt;br&amp;gt;• The tutorial has a primary focus on intermediate/advanced assessment and testing concepts for architects and developers.&amp;lt;br&amp;gt;• Prior experience in Penetration testing or software security assessment preferred.&lt;br /&gt;
&lt;br /&gt;
'''Class Requirement:''' No laptop required.&lt;br /&gt;
&lt;br /&gt;
'''Course Description:'''&lt;br /&gt;
&lt;br /&gt;
This tutorial is targeted at those wanting to enhance their software assessment skills. Specifically, the tutorial teaches attendees techniques for design analysis, code review, and penetration testing that uncovers a wide variety of vulnerabilities and weaknesses in applications. If you have pre-existing skills and want to learn more than this course is perfect. The tutorial will generally focus on web applications, but most information applies to software of any type. In addition, attendees will learn general methods for protecting against the security issues uncovered by each assessment technique. &lt;br /&gt;
&lt;br /&gt;
The tutorial topics include: &amp;lt;br&amp;gt;• System decomposition for analysis &amp;lt;br&amp;gt;• Lightweight threat/risk modeling &amp;lt;br&amp;gt;• Identifying interfaces/attack surface &amp;lt;br&amp;gt;• Testing business logic and edge cases &amp;lt;br&amp;gt;• Assessing for provision of security mechanisms &amp;lt;br&amp;gt;• Assessing for key vulnerability classes &amp;lt;br&amp;gt;• Risk classification and weighting &amp;lt;br&amp;gt;• Root cause analysis and patching &lt;br /&gt;
&lt;br /&gt;
The tutorial has a primary focus on intermediate/advanced assessment and testing concepts for architects and developers. Automated security assessment tools will be discussed in context, but not demoed. &amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Puneetm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SecurityByte_and_OWASP_Asia_AppSec_Conference_2009&amp;diff=72885</id>
		<title>SecurityByte and OWASP Asia AppSec Conference 2009</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SecurityByte_and_OWASP_Asia_AppSec_Conference_2009&amp;diff=72885"/>
				<updated>2009-11-09T18:17:51Z</updated>
		
		<summary type="html">&lt;p&gt;Puneetm: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:SB OWASP 2009 banner.gif|center|link=http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009]]&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza] &amp;amp;#124; [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Registrations]&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*&amp;lt;b&amp;gt;Only One Week Left ! Register Online today to grab your seat for India's best Security Conference.&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;Honorable Former President of India, Dr. A.P.J Abdul Kalam to Inaugrate the India Technology Leadership Summit 2009. &amp;lt;/b&amp;gt;This event is an Invitation ONLY event.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Registrations Click Here]''' for more information.&lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
Securitybyte &amp;amp;amp; OWASP are proud to welcome you to the annual international information security conference – Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009, Nov 17th through Nov 20th in Delhi &amp;amp;amp; NCR, India. &lt;br /&gt;
&lt;br /&gt;
This is a landmark event, as both Securitybyte and OWASP join hands to present India’s largest InfoSec event with world renowned and most regarded international speakers. &lt;br /&gt;
&lt;br /&gt;
Securitybye &amp;amp;amp; OWASP AppSec Asia Conference 2009 will be held at [http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza, Gurgaon, NCR, India.] on 17th November through 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Security Researchers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Penetration Testers &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*IT Security Professionals &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
&lt;br /&gt;
==== About  ====&lt;br /&gt;
&lt;br /&gt;
== About Conference  ==&lt;br /&gt;
&lt;br /&gt;
Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel conference talks to be conducted in 3 separate halls for two days i.e . 17th &amp;amp;amp; 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular talk. Conference talks are being delivered by world renowned and most regarded speakers from around the world. &lt;br /&gt;
&lt;br /&gt;
== About Trainings  ==&lt;br /&gt;
&lt;br /&gt;
Two days post-conference are dedicated towards best-of-breed trainings being conducted in association with SANS, ISC2 and other organizations. Trainings tracks have been made available as One-Day tracks and Two-Day tracks scheduled for 19th &amp;amp;amp; 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
==== Registrations  ====&lt;br /&gt;
&lt;br /&gt;
== [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Registration] is now open!  ==&lt;br /&gt;
&lt;br /&gt;
=== You can register [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 here]  ===&lt;br /&gt;
&lt;br /&gt;
*[http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Click Here] for Online Registrations. &lt;br /&gt;
*[http://securitybyte.org/index.php/register.html Click Here] for Offline Registrations.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Please check out our Exclusive Discount Offer, available Starting October 6th - 15th, 2009. &amp;quot;SAVE BIG NOW !&amp;quot;&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''''The below pricing reflects the Standard Registration Prices .''''' &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Two Days of Conference (17th and 18th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.8,500/- INR &lt;br /&gt;
| General Public&lt;br /&gt;
|-&lt;br /&gt;
| Two Days of Conference (17th and 18th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.5,000/- INR &lt;br /&gt;
| Students&lt;br /&gt;
|-&lt;br /&gt;
| Two-Day Training Tracks (19th and 20th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.25,000/- INR&lt;br /&gt;
|-&lt;br /&gt;
| One-Day Training Tracks (19th OR 20th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.12,500/- INR&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;** Service Tax @ 10.3% will be charged extra.&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;ISC2&amp;lt;/b&amp;gt; Members can avail a Special 15% discount on Conference &amp;amp; Training Registration.&lt;br /&gt;
(Please provide your ISC2 Certification ID number to avail the above Discount)&lt;br /&gt;
For Registrations contact us at registrations@securitybyte.org&lt;br /&gt;
== Exclusive Offers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;- Group / Team Discounts available: Kindly contact us at registrations@securitybyte.org&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Special University Student discount&amp;lt;/b&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
- University Students can register for two days of conference for just Rs. 5000 (including taxes)&amp;lt;br&amp;gt;&lt;br /&gt;
- Special 15 % Discounts for Training registration&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Trainings Click here for details on the training courses that are available.]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Who Should Attend Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009: ==&lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Security Researchers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Penetration Testers &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*IT Security Professionals &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;For student discount, attendees must present proof of enrollment when picking up your badge. &lt;br /&gt;
&lt;br /&gt;
==== Schedule  ====&lt;br /&gt;
&lt;br /&gt;
Three parallel conference talks are scheduled for 17th &amp;amp;amp; 18th November 2009 in three different halls. Training tracks have been divided in one-day tracks scheduled for 19th or 20th November 2009 and two-day tracks those are schedule to continue for two days both on 19th &amp;amp;amp; 20th November 2009. Follow the tabs to learn the details on both conference and trainings. &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Conference Click here] to view the '''Conference Schedule''' for 17th &amp;amp;amp; 18th November 2009.&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Trainings Click here] to view '''Training Schedule''' on 19th &amp;amp;amp; 20th November 2009.&lt;br /&gt;
&lt;br /&gt;
==== Conference  ====&lt;br /&gt;
&lt;br /&gt;
== Two Days Conference  ==&lt;br /&gt;
&lt;br /&gt;
Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel conference talks to be conducted in 3 separate halls for two days i.e . 17th &amp;amp;amp; 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular talk. Conference talks are being delivered by world renowned and most regarded speakers from around the world. Below is the detailed schedule for the two days of conference.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 1 - 17th Nov, 2009'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Where&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - I''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - II''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - III'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Who&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Researchers &amp;amp;amp; Enthusiasts)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Auditors, Developers, QA teams, Architects)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Leaders, Managers, C&amp;amp;amp;S professionals)'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 8:00 AM - 9:00 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Registrations'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Schedule''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 9:00 AM - 10:30 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Keynote'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:30 AM - 11:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea Break'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 11:00 AM - 12:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | How To Blackbox Test Almost Anything&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Aviram Jenik, Beyond Security&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | The International State of Cyber Security, Risk reduction in a high threat world&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Prof. Howard A. Schmidt, Former Cyber Security Advisor to the White house&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:00 PM - 1:00 PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Client Side Hacks&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Dino Covotsos &amp;amp; Charleton Smith, Telspace Systems&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Risk Based Penetration testing&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | K. K. Mookhey, Founder &amp;amp;amp; Principal Consultant, NII Consulting&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Applications, the source for CyberThreats&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Mano Paul,Software Assurance Advisor,(ISC)2&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 1:00PM - 2:00PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Lunch'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 2:00 PM - 3:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Exploiting Firefox Extensions&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Roberto Suggi Liverani, Security-Assessment.com&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Threat Modeling&amp;lt;br&amp;gt;&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Varun Sharma,Microsoft India&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Enterprise Application Security Program&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 3:00 PM - 4:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | SQL Server Forensics 2.0&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Kevvie Fowler, TELUS &amp;amp;amp; Ringzero&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | OWASP SAMM&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Pravir Chandra, Director of Strategic Services,&amp;lt;br&amp;gt;Fortify&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Business Case - Risk Management/Compliance at leading Education Group AMITY (Rapid Fire: 30 Min talk)&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Dr. JS Sodhi, CIO, AMITY Group&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 4:00 PM - 5:00 PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Ownage 2.0 - How to own the World&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Saumil Shah, NetSquare Solutions&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | &amp;quot;Do you want to play a Game&amp;quot; - Game theory and Cyberwar&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Bryan K. Fite, HackSecKlahn&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Usability and Privacy in Security&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Dr. Ponnurangam Kumaraguru, Asst. Professor - IIIT (Rapid Fire : 30 Min talk)&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 5:00 PM - 6:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea and Snacks on the Exhibition floor'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 7:00 PM - 10:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''CXO Event (Exclusive by invitation only) - Information Security Concerns for Offshoring'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 2 - 18th Nov, 2009'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Where&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - I''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - II''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - III'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Who&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Researchers &amp;amp;amp; Enthusiasts)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Auditors, Developers, QA teams, Architects)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Leaders, Managers, C&amp;amp;amp;S professionals)'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 8:00 AM - 9:00 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Registrations'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 9:00 AM - 10:00 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Round Table with Speakers / Industry Panel - &amp;quot;Security Today &amp;amp; Tomorrow''''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:00 AM - 10:30 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea Break'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Schedule''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:30 AM - 11:30&amp;amp;nbsp;AM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | All your Packets belong to us&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Daniel Mende, Security Researcher, ERNW&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | SANS Dshield Webhoneypot Project&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Jason Lam, Independent Security Researcher&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Critical Infrastructure Security “Danger Without borders” &amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | John Bumgarner, US Cyber Consequence Unit (USCCU)&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 11:30 AM - 12:30 PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Hacking Oracle From Web&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Sid, Independent Security Researcher&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Testing JSON Applications For Security Holes&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Aviram Jenik, Beyond Security&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Critical Infrastructure Security “Danger Without borders” &amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | John Bumgarner, US Cyber Consequence Unit (USCCU)&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:30PM - 1:30PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Lunch'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 1:30 PM&amp;amp;nbsp;- 2:30 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Lust 2.0 – Desire for free WiFi and the threat of the Imposter &amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Lava Kumar Kuppan, Independent Security Researcher&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Cloud Hacking - Distributed Attacks &amp;amp; Exploits&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Shreeraj Shah, Blueinfy Solutions&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Cedric Blancher, EADS Innovation Works&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 2:30 PM - 3:30&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Xprobe3 - What's New? Going Application Level&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Fyodor Yarochkin, Armorize&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Nitin Kumar/Vipin Kumar, Independent Security Researchers, NVlabs&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Behind the Scenes at Microsoft Security Response Center&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Dave Midturi,MSRC, Microsoft Corp.&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 3:30PM - 4:00PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea Break'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 4:00 PM - 5:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 5:00 PM - 6:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Closing Keynotes - &amp;quot;OWASP &amp;amp; Securitybyte&amp;quot;'''&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Trainings  ====&lt;br /&gt;
&lt;br /&gt;
== Two Day Trainings  ==&lt;br /&gt;
&lt;br /&gt;
Two days post-conference are dedicated towards best-of-breed trainings being conducted in association with SANS, ISC2 and other organizations. Trainings tracks have been made available as One-Day tracks and Two-Day tracks scheduled for 19th &amp;amp;amp; 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 1 - 19th Nov, 2009'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 2 - 20th Nov, 2009'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course ID''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course Duration''' &lt;br /&gt;
(# of Days) &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course Title''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Instructor''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course ID''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course Duration''' &lt;br /&gt;
(# of Days) &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course Title''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Instructor'''&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;30&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''One Day Training Tracks'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DHSO''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Oracle_Hacking_and_security ORACLE Hacking &amp;amp;amp; Security]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Sumit Sidharth,[[Image:Sb logo.png|center|78x50px|link=http://www.securitybyte.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DAWH''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Advanced_Web_Hacking Advanced Web Hacking -Securing AJAX, RIA &amp;amp;amp; SOA]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Shreeraj Shah [[Image:Blueinfy logo.png|center|link=http://www.blueinfy.com]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DAFT'''&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Advanced_Forensic_Techniques Advanced Forensics Techniques]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Dr. Chandrasekhar Umapathy,[[Image:Sb logo.png|center|78x50px|link=http://www.securitybyte.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DIAT'''&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/InDepth_Assessment_Techniques In-depth Assessment Techniques: Design, Code, and Runtime]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Fydor Yarochkin, &lt;br /&gt;
&lt;br /&gt;
[[Image:Logo_Armorize.JPG‎|center|93x31px|link=http://www.armorize.com]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;30&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Two Day Training Tracks'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DNST''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Building_Advanced_Network_Security_tools Building advanced Network Security Tools]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Daniel Mende,[[Image:Ernw logo.png|center]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DNST''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Building_Advanced_Network_Security_tools Building advanced Network Security Tools]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Daniel Mende,[[Image:Ernw logo.png|center]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DCBC''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/ISC2_CSSLP_CBK_Bootcamp (ISC)2 CSSLP CBK Boot camp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Mano Paul,[[Image:Isc logo.png|center|78x50px|link=http://www.isc2.org]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DCBC''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/ISC2_CSSLP_CBK_Bootcamp (ISC)2 CSSLP CBK Boot camp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Mano Paul,[[Image:Isc logo.png|center|78x50px|link=http://www.isc2.org]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSCJ / SANS Course ID&amp;amp;nbsp;: DEV530''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_Essential_Secure_Coding_Java_JEE_GSSP Essential Secure Coding in Java / JEE]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSCJ / SANS Course ID&amp;amp;nbsp;: DEV530''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_Essential_Secure_Coding_Java_JEE_GSSP Essential Secure Coding in Java / JEE]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DWPT / SANS Course ID&amp;amp;nbsp;: DEV538''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_WebApp_Pentesting_handsOn_immersion Web Application Pen Testing Hands-On Immersion]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DWPT / SANS Course ID&amp;amp;nbsp;: DEV538''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_WebApp_Pentesting_handsOn_immersion Web Application Pen Testing Hands-On Immersion]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSAB / SANS Course ID&amp;amp;nbsp;: AUD429''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_IT_Security_Audit_Bootcamp IT Security Audit Essentials Bootcamp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSAB / SANS Course ID&amp;amp;nbsp;: AUD429''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_IT_Security_Audit_Bootcamp IT Security Audit Essentials Bootcamp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Venue  ====&lt;br /&gt;
&lt;br /&gt;
Four Days Event is planned out at: &lt;br /&gt;
&lt;br /&gt;
[http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza,]&amp;lt;br&amp;gt;Site - 2, Sector - 29, &amp;lt;br&amp;gt;Gurgaon-122001 (National Capital Region), India&amp;lt;br&amp;gt;Hotel Front Desk: 91-124-4534000&amp;lt;br&amp;gt;Hotel Fax: 91-124-4304800&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | '''Co-Sponsor &amp;quot;Leadership Summit 2009&amp;quot;'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | '''CTF&amp;amp;nbsp;(Capture The Flag) Sponsor'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | '''Education &amp;amp;nbsp;Partner'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:20th green stacked.png|center|ISC2|link=http://www.isc2.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
| [[Image:Appin.jpg|center|link=http://www.appinsecurity.com]]&amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
| [[Image:BRIP-Logo.jpg|center|link=http://www.brip.co.in]]&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
| [[Image:Beyond-logo_large.jpg|Left|link=http://www.www.beyondsecurity.com]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Associate Sponsors'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;90&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Media Partners'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Supporters'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Torridn.jpg|center|link=http://www.torridnetworks.com]] &lt;br /&gt;
| [[Image:SSecurity_india_small.gif‎ |center|link=http://www.searchsecurity.in]]&lt;br /&gt;
| [[Image:HITB.jpg|center|link=http://conference.hitb.org]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:SecurityCompass.JPG|center|link=http://www.securitycompass.com]] &lt;br /&gt;
| [[Image:HNS-web.jpg|center|link=http://www.net-security.org]] &lt;br /&gt;
| [[Image:Sector.jpg|center|link=http://www.sector.ca]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Logo_Armorize.JPG|center|link=http://www.armorize.com]] &amp;lt;br&amp;gt;‎ &lt;br /&gt;
| [[Image:Infosecurity.jpg|center|link=http://www.infosecuritymagz.com]] &amp;lt;br&amp;gt;&lt;br /&gt;
| [[Image:Clubhack.gif|center]]&amp;lt;br&amp;gt;[[Image:Eventavenue Logo.jpg|center|link=https://www.eventavenue.com]]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| [[Image:Itmagz.jpg|center]]&amp;amp;nbsp;[[Image:Electronicsf.jpg|center|link=http://www.electronicsforu.com]] &lt;br /&gt;
| [[Image:Crowne plaza.jpg|center|link=http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
==== Hotel &amp;amp; Travel  ====&lt;br /&gt;
&lt;br /&gt;
== Hotel Stay &amp;amp; Travel Information  ==&lt;br /&gt;
&lt;br /&gt;
To help our valued delegates with Hotel and Travel services, we have negotiated with some of the best and Budget Category Guest houses in Gurgaon that are located within a radius of 3 - 4 Kms from the venue.&lt;br /&gt;
&lt;br /&gt;
Limited cheaper accommodation is available near the venue hotel in budget hotels/apartments area. The tariff of these hotels ranges from Rs.2000 onwards per room night (inclusive of Room Rent, Breakfast and Luxury Tax).  Interested delegates / students can send a formal request for the desired accommodations and dates to our official travel agent.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;OFFICIAL TRAVEL AGENT&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dreamz conference Management Pvt.Ltd&amp;lt;/b&amp;gt; will look after your hotel accommodation in Gurgaon and New Delhi, pre &amp;amp; post conference tours / travel needs in India for delegates and visitors independently. If you wish to go for sightseeing tour within New Delhi and around it to places like Agra, Jaipur, Rajasthan etc. However, we would encourage you to make early bookings which will be done on “first – come - first service” basis and let us know of your interest, since that would ultimately work in your favour. Early reservation is strongly recommended as November being a high demand period for hotels in Gurgaon.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
For further details please contact:&lt;br /&gt;
&lt;br /&gt;
DREAMZ CONFERENCE MANAGEMENT PVT.LTD&lt;br /&gt;
&lt;br /&gt;
406, Ansal’s Majestic Tower, Vikas Puri, New Delhi – 110018&lt;br /&gt;
&lt;br /&gt;
Tel: 91 – 11 – 41586401, 402, Fax: 91 – 11 – 41586400&lt;br /&gt;
&lt;br /&gt;
Email: info@dreamztravel.net / dreamztravelindia@yahoo.com&lt;br /&gt;
&lt;br /&gt;
Website: www.dreamztravel.net&lt;br /&gt;
&lt;br /&gt;
Contact Person: Jitin Batra ( +91 9810558569 )&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==== Capture the Flag  ====&lt;br /&gt;
&lt;br /&gt;
== HackHunt 2009  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;India's foremost Hacking Challenge &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Your Shot to the Title of India's best hacker along with Prize money of more than &amp;lt;b&amp;gt;Rs 150,000&amp;lt;/b&amp;gt; up for grabs!&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Search for India’s Best Ethical Hacker &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
HackHunt is India’s leading hacking competition and aims at awarding the best ethical hackers in the country. The competition is brought to you by Appin Security Group, a leading Information Security and Ethical Hacking Company and Securitybyte, a global Information Security Conference Company. &lt;br /&gt;
&lt;br /&gt;
The competition will be conducted in 3 phases. The 1st two rounds will be online and the 3rd and final round will take place at“Securitybyte &amp;amp; OWASP Appsec Asia 2009” on November 17, 2009at Crowne Plaza, Gurgaon. &lt;br /&gt;
&lt;br /&gt;
Level 1 – Knowledge Check&lt;br /&gt;
All the participants will be answering a quiz and based on the score top 10% will be shortlisted to 2nd round.&lt;br /&gt;
&lt;br /&gt;
Level 2 – Skill Check&lt;br /&gt;
This stage will require an attacker to get to the final FLAG file which he/she would need to register for the event.&lt;br /&gt;
&lt;br /&gt;
Level 3 – Final Round&lt;br /&gt;
This stage will require the attackers to exploit a pre-announced SSID which has WPA (or wpa 2).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To participate and for more details visit website :- http://www.hackerscouncil.org/&lt;br /&gt;
&lt;br /&gt;
== PacketWars  ==&lt;br /&gt;
&amp;lt;b&amp;gt;First time in India brought to you by Securitybyte! &amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;                                              &lt;br /&gt;
About PacketWars&lt;br /&gt;
&lt;br /&gt;
PacketWars is an intense, real-time information warfare simulation. Unlike other “capture the flag” games, the battlegrounds featured in PacketWars use the same software and hardware you would encounter in the real world.&lt;br /&gt;
&lt;br /&gt;
PacketWars is designed to operate like a sport. Think Formula One Racing meets professional golf with a dash of Ultimate Fighting thrown in for good measure. Serious fun!&lt;br /&gt;
&lt;br /&gt;
Visit http://packetwars.com/ for more details.&lt;br /&gt;
How To Play?&lt;br /&gt;
&lt;br /&gt;
PacketWars is a Sport like nothing you have ever experienced! Games known as “BATTLES” pit individual players and teams against each other in a race to achieve defined objectives.&lt;br /&gt;
&lt;br /&gt;
The rules of engagement are simple:&lt;br /&gt;
- Illegal activity of any kind is prohibited&lt;br /&gt;
- Protect yourself at all times&lt;br /&gt;
- Battles are designed to be of a low, medium or high difficulty level based on the battle objectives and battle duration&lt;br /&gt;
- Primary, Secondary and Tertiary objectives are defined and assigned points based on difficulty&lt;br /&gt;
- Battles have time limits and other defined constraints&lt;br /&gt;
- Constraints are sometimes known to the combatants and other times are not&lt;br /&gt;
- Anything that is not expressly prohibited is allowed&lt;br /&gt;
- Points are awarded for FLARE&lt;br /&gt;
&lt;br /&gt;
Equipment Needed:&lt;br /&gt;
- Most combants use a notebook and a BackTrack CD however you are only limited by your imagination and bank account&lt;br /&gt;
- You need a battle field and a PacketMaster…Oh yeah, skillz come in handy also!How To Play&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b.How can I participate?&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
PacketWars to be held at the Hotel Crowne Plaza, Gurgaon on Nov 17 &amp;amp; Nov 18, 2009. Participation is FREE! Schedule will be announced soon.&lt;br /&gt;
&lt;br /&gt;
== WebWar III  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;About&amp;lt;/b&amp;gt;&lt;br /&gt;
Hackers attack, coders defend, when you get them together you end up with Web War III. WWIII is designed to put your Web Application attack and defense skills to the test.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Teams&amp;lt;/b&amp;gt;&lt;br /&gt;
Each team consists of two players, an attacker and a defender. The attacker would be capable of identifying Web Application Vulnerabilities (OWASP Top 10). The defender would be capable of writing secure Java code.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Game Format&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The game has two stages:&lt;br /&gt;
&lt;br /&gt;
Stage 1:&lt;br /&gt;
Each team is given a VM Ware image containing a web server hosting a vulnerable web application. During this stage each team identifies the vulnerabilities in their application.&lt;br /&gt;
They try to fix the identified vulnerabilities by making code changes.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Stage 2:&lt;br /&gt;
The IP addresses of the Web Server's of all the teams is announced.&lt;br /&gt;
Each team looks for vulnerabilities in the Web Applications of the other teams.&lt;br /&gt;
Vulnerabilities found on the opponents' application get positive points.&lt;br /&gt;
Vulnerabilities found by the opponents on your application get negative points.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Team with the highest points at the end of Stage 2 wins.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Tools and Equipments&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Each team should bring their own laptop with VM Ware installed.&lt;br /&gt;
The attacker can use any tools they bring.&lt;br /&gt;
The applications come with ESAPI to help the defenders fix the code quicker.&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
==== Leadership Summit 2009  ====&lt;br /&gt;
&amp;lt;b&amp;gt;India's top technology thought leaders coming together to discuss &amp;quot;Security concerns in off-shoring&amp;quot;&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Honored Guests&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
-Honorable Former President of India, Dr. A.P.J Abdul Kalam to inaugrate the Leadership Summit 2009.&amp;lt;br&amp;gt;&lt;br /&gt;
-Prof. Howard A. Schmidt(Advisor, NIST; Former Vice Chair - President’s Critical Infrastructure Board; Former Special Advisor – Cyberspace Security for White House)&amp;lt;br&amp;gt;&lt;br /&gt;
-Mr. Hord Tipton, Executive Director (ISC)2&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;About the Event&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
An elite gathering of 200 technology leaders, decision makers &amp;amp; InfoSec experts from leading service providers, government agencies and various industry verticals.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Two hours of panel discussions between three panels of 12 distinguished industry experts representing outsourcing companies, service providers and the regulatory bodies.  Panel discussions will be followed by networking dinner &amp;amp; cocktails.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Prof Howard A. Schmidt (Advisor, NIST; Former Vice Chair - President’s Critical Infrastructure Board; Former Special Advisor – Cyberspace Security for White House) will facilitate the panel discussions. Thought leaders participating in the panel discussions are:&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Outsourcing Organizations&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Raghavendra Vaidya, CIO - GE Capital India&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. CRN Vairavelu, VP - Ford Technology Services India&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Pankaj Agrawal, CISO - Aircel Limited&amp;lt;br&amp;gt;&lt;br /&gt;
TBD&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Service Providers&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Terry Thomas, Partner - Ernst &amp;amp; Young&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Debashis Ghosh, Head (LS&amp;amp;H ISU) - Tata Consultancy Services&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Sunil Gujral, EVP &amp;amp; CTO - Quatrro&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Sunil Goyal, COO - Sopra group&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Regulatory Bodies&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Dr. Kamlesh Bajaj, CEO - DSCI (a NASSCOM initiative)&amp;lt;br&amp;gt;&lt;br /&gt;
Dr. Gulshan Rai, Director - CERT-in&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Hord Tipton, Executive Director - ISC2 (ex CIO, US Department of Interior)&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Vakul Sharma, Lawyer - Supreme Court&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The event is exclusive to industry leaders and is by private invitation only. If you are interested in attending the event, please email your business card to info@securitybyte.org This e-mail address is being protected from spambots.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Venue - Hotel Crowne Plaza, Gurgaon | Timings - 5:30PM - 9:00PM&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
Please contact [http://www.owasp.org/index.php/Category:India#OWASP_India_Co-Chairs Chair - OWASP India] for sponsorship opportunities. &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Category:India Category: OWASP India]&lt;/div&gt;</summary>
		<author><name>Puneetm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Logo_Armorize.JPG&amp;diff=72884</id>
		<title>File:Logo Armorize.JPG</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Logo_Armorize.JPG&amp;diff=72884"/>
				<updated>2009-11-09T18:09:22Z</updated>
		
		<summary type="html">&lt;p&gt;Puneetm: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Puneetm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SecurityByte_and_OWASP_Asia_AppSec_Conference_2009&amp;diff=72785</id>
		<title>SecurityByte and OWASP Asia AppSec Conference 2009</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SecurityByte_and_OWASP_Asia_AppSec_Conference_2009&amp;diff=72785"/>
				<updated>2009-11-07T17:22:02Z</updated>
		
		<summary type="html">&lt;p&gt;Puneetm: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:SB OWASP 2009 banner.gif|center|link=http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009]]&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza] &amp;amp;#124; [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Registrations]&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*&amp;lt;b&amp;gt;Only One Week Left ! Register Online today to grab your seat for India's best Security Conference.&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;Honorable Former President of India, Dr. A.P.J Abdul Kalam to Inaugrate the India Technology Leadership Summit 2009. &amp;lt;/b&amp;gt;This event is an Invitation ONLY event.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Registrations Click Here]''' for more information.&lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
Securitybyte &amp;amp;amp; OWASP are proud to welcome you to the annual international information security conference – Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009, Nov 17th through Nov 20th in Delhi &amp;amp;amp; NCR, India. &lt;br /&gt;
&lt;br /&gt;
This is a landmark event, as both Securitybyte and OWASP join hands to present India’s largest InfoSec event with world renowned and most regarded international speakers. &lt;br /&gt;
&lt;br /&gt;
Securitybye &amp;amp;amp; OWASP AppSec Asia Conference 2009 will be held at [http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza, Gurgaon, NCR, India.] on 17th November through 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Security Researchers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Penetration Testers &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*IT Security Professionals &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
&lt;br /&gt;
==== About  ====&lt;br /&gt;
&lt;br /&gt;
== About Conference  ==&lt;br /&gt;
&lt;br /&gt;
Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel conference talks to be conducted in 3 separate halls for two days i.e . 17th &amp;amp;amp; 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular talk. Conference talks are being delivered by world renowned and most regarded speakers from around the world. &lt;br /&gt;
&lt;br /&gt;
== About Trainings  ==&lt;br /&gt;
&lt;br /&gt;
Two days post-conference are dedicated towards best-of-breed trainings being conducted in association with SANS, ISC2 and other organizations. Trainings tracks have been made available as One-Day tracks and Two-Day tracks scheduled for 19th &amp;amp;amp; 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
==== Registrations  ====&lt;br /&gt;
&lt;br /&gt;
== [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Registration] is now open!  ==&lt;br /&gt;
&lt;br /&gt;
=== You can register [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 here]  ===&lt;br /&gt;
&lt;br /&gt;
*[http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Click Here] for Online Registrations. &lt;br /&gt;
*[http://securitybyte.org/index.php/register.html Click Here] for Offline Registrations.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Please check out our Exclusive Discount Offer, available Starting October 6th - 15th, 2009. &amp;quot;SAVE BIG NOW !&amp;quot;&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''''The below pricing reflects the Standard Registration Prices .''''' &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Two Days of Conference (17th and 18th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.8,500/- INR &lt;br /&gt;
| General Public&lt;br /&gt;
|-&lt;br /&gt;
| Two Days of Conference (17th and 18th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.5,000/- INR &lt;br /&gt;
| Students&lt;br /&gt;
|-&lt;br /&gt;
| Two-Day Training Tracks (19th and 20th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.25,000/- INR&lt;br /&gt;
|-&lt;br /&gt;
| One-Day Training Tracks (19th OR 20th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.12,500/- INR&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;** Service Tax @ 10.3% will be charged extra.&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;ISC2&amp;lt;/b&amp;gt; Members can avail a Special 15% discount on Conference &amp;amp; Training Registration.&lt;br /&gt;
(Please provide your ISC2 Certification ID number to avail the above Discount)&lt;br /&gt;
For Registrations contact us at registrations@securitybyte.org&lt;br /&gt;
== Exclusive Offers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;- Group / Team Discounts available: Kindly contact us at registrations@securitybyte.org&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Special University Student discount&amp;lt;/b&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
- University Students can register for two days of conference for just Rs. 5000 (including taxes)&amp;lt;br&amp;gt;&lt;br /&gt;
- Special 15 % Discounts for Training registration&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Trainings Click here for details on the training courses that are available.]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Who Should Attend Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009: ==&lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Security Researchers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Penetration Testers &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*IT Security Professionals &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;For student discount, attendees must present proof of enrollment when picking up your badge. &lt;br /&gt;
&lt;br /&gt;
==== Schedule  ====&lt;br /&gt;
&lt;br /&gt;
Three parallel conference talks are scheduled for 17th &amp;amp;amp; 18th November 2009 in three different halls. Training tracks have been divided in one-day tracks scheduled for 19th or 20th November 2009 and two-day tracks those are schedule to continue for two days both on 19th &amp;amp;amp; 20th November 2009. Follow the tabs to learn the details on both conference and trainings. &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Conference Click here] to view the '''Conference Schedule''' for 17th &amp;amp;amp; 18th November 2009.&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Trainings Click here] to view '''Training Schedule''' on 19th &amp;amp;amp; 20th November 2009.&lt;br /&gt;
&lt;br /&gt;
==== Conference  ====&lt;br /&gt;
&lt;br /&gt;
== Two Days Conference  ==&lt;br /&gt;
&lt;br /&gt;
Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel conference talks to be conducted in 3 separate halls for two days i.e . 17th &amp;amp;amp; 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular talk. Conference talks are being delivered by world renowned and most regarded speakers from around the world. Below is the detailed schedule for the two days of conference.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 1 - 17th Nov, 2009'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Where&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - I''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - II''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - III'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Who&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Researchers &amp;amp;amp; Enthusiasts)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Auditors, Developers, QA teams, Architects)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Leaders, Managers, C&amp;amp;amp;S professionals)'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 8:00 AM - 9:00 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Registrations'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Schedule''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 9:00 AM - 10:30 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Keynote'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:30 AM - 11:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea Break'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 11:00 AM - 12:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | How To Blackbox Test Almost Anything&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Aviram Jenik, Beyond Security&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | The International State of Cyber Security, Risk reduction in a high threat world&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Prof. Howard A. Schmidt, Former Cyber Security Advisor to the White house&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:00 PM - 1:00 PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Client Side Hacks&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Dino Covotsos &amp;amp; Charleton Smith, Telspace Systems&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Risk Based Penetration testing&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | K. K. Mookhey, Founder &amp;amp;amp; Principal Consultant, NII Consulting&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Applications, the source for CyberThreats&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Mano Paul,Software Assurance Advisor,(ISC)2&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 1:00PM - 2:00PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Lunch'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 2:00 PM - 3:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Exploiting Firefox Extensions&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Roberto Suggi Liverani, Security-Assessment.com&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Threat Modeling&amp;lt;br&amp;gt;&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Varun Sharma,Microsoft India&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Enterprise Application Security Program&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 3:00 PM - 4:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | SQL Server Forensics 2.0&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Kevvie Fowler, TELUS &amp;amp;amp; Ringzero&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | OWASP SAMM&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Pravir Chandra, Director of Strategic Services,&amp;lt;br&amp;gt;Fortify&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Business Case - Risk Management/Compliance at leading Education Group AMITY (Rapid Fire: 30 Min talk)&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Dr. JS Sodhi, CIO, AMITY Group&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 4:00 PM - 5:00 PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Ownage 2.0 - How to own the World&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Saumil Shah, NetSquare Solutions&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | &amp;quot;Do you want to play a Game&amp;quot; - Game theory and Cyberwar&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Bryan K. Fite, HackSecKlahn&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Usability and Privacy in Security&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Dr. Ponnurangam Kumaraguru, Asst. Professor - IIIT (Rapid Fire : 30 Min talk)&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 5:00 PM - 6:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea and Snacks on the Exhibition floor'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 7:00 PM - 10:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''CXO Event (Exclusive by invitation only) - Information Security Concerns for Offshoring'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 2 - 18th Nov, 2009'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Where&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - I''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - II''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - III'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Who&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Researchers &amp;amp;amp; Enthusiasts)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Auditors, Developers, QA teams, Architects)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Leaders, Managers, C&amp;amp;amp;S professionals)'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 8:00 AM - 9:00 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Registrations'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 9:00 AM - 10:00 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Round Table with Speakers / Industry Panel - &amp;quot;Security Today &amp;amp; Tomorrow''''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:00 AM - 10:30 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea Break'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Schedule''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:30 AM - 11:30&amp;amp;nbsp;AM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | All your Packets belong to us&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Daniel Mende, Security Researcher, ERNW&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | SANS Dshield Webhoneypot Project&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Jason Lam, Independent Security Researcher&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Critical Infrastructure Security “Danger Without borders” &amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | John Bumgarner, US Cyber Consequence Unit (USCCU)&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 11:30 AM - 12:30 PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Hacking Oracle From Web&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Sid, Independent Security Researcher&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Testing JSON Applications For Security Holes&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Aviram Jenik, Beyond Security&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Critical Infrastructure Security “Danger Without borders” &amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | John Bumgarner, US Cyber Consequence Unit (USCCU)&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:30PM - 1:30PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Lunch'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 1:30 PM&amp;amp;nbsp;- 2:30 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Lust 2.0 – Desire for free WiFi and the threat of the Imposter &amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Lava Kumar Kuppan, Independent Security Researcher&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Cloud Hacking - Distributed Attacks &amp;amp; Exploits&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Shreeraj Shah, Blueinfy Solutions&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Cedric Blancher, EADS Innovation Works&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 2:30 PM - 3:30&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Xprobe3 - What's New? Going Application Level&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Fyodor Yarochkin, Armorize&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Nitin Kumar/Vipin Kumar, Independent Security Researchers, NVlabs&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Behind the Scenes at Microsoft Security Response Center&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Dave Midturi,MSRC, Microsoft Corp.&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 3:30PM - 4:00PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea Break'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 4:00 PM - 5:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 5:00 PM - 6:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Closing Keynotes - &amp;quot;OWASP &amp;amp; Securitybyte&amp;quot;'''&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Trainings  ====&lt;br /&gt;
&lt;br /&gt;
== Two Day Trainings  ==&lt;br /&gt;
&lt;br /&gt;
Two days post-conference are dedicated towards best-of-breed trainings being conducted in association with SANS, ISC2 and other organizations. Trainings tracks have been made available as One-Day tracks and Two-Day tracks scheduled for 19th &amp;amp;amp; 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 1 - 19th Nov, 2009'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 2 - 20th Nov, 2009'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course ID''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course Duration''' &lt;br /&gt;
(# of Days) &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course Title''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Instructor''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course ID''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course Duration''' &lt;br /&gt;
(# of Days) &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course Title''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Instructor'''&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;30&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''One Day Training Tracks'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DHSO''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Oracle_Hacking_and_security ORACLE Hacking &amp;amp;amp; Security]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Sumit Sidharth,[[Image:Sb logo.png|center|78x50px|link=http://www.securitybyte.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DAWH''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Advanced_Web_Hacking Advanced Web Hacking -Securing AJAX, RIA &amp;amp;amp; SOA]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Shreeraj Shah [[Image:Blueinfy logo.png|center|link=http://www.blueinfy.com]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DAFT'''&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Advanced_Forensic_Techniques Advanced Forensics Techniques]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Dr. Chandrasekhar Umapathy,[[Image:Sb logo.png|center|78x50px|link=http://www.securitybyte.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DIAT'''&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/InDepth_Assessment_Techniques In-depth Assessment Techniques: Design, Code, and Runtime]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Pravir Chandra, &lt;br /&gt;
&lt;br /&gt;
[[Image:Fortify.jpg|center|93x31px|link=http://www.fortify.com]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;30&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Two Day Training Tracks'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DNST''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Building_Advanced_Network_Security_tools Building advanced Network Security Tools]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Daniel Mende,[[Image:Ernw logo.png|center]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DNST''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Building_Advanced_Network_Security_tools Building advanced Network Security Tools]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Daniel Mende,[[Image:Ernw logo.png|center]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DCBC''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/ISC2_CSSLP_CBK_Bootcamp (ISC)2 CSSLP CBK Boot camp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Mano Paul,[[Image:Isc logo.png|center|78x50px|link=http://www.isc2.org]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DCBC''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/ISC2_CSSLP_CBK_Bootcamp (ISC)2 CSSLP CBK Boot camp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Mano Paul,[[Image:Isc logo.png|center|78x50px|link=http://www.isc2.org]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSCJ / SANS Course ID&amp;amp;nbsp;: DEV530''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_Essential_Secure_Coding_Java_JEE_GSSP Essential Secure Coding in Java / JEE]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSCJ / SANS Course ID&amp;amp;nbsp;: DEV530''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_Essential_Secure_Coding_Java_JEE_GSSP Essential Secure Coding in Java / JEE]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DWPT / SANS Course ID&amp;amp;nbsp;: DEV538''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_WebApp_Pentesting_handsOn_immersion Web Application Pen Testing Hands-On Immersion]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DWPT / SANS Course ID&amp;amp;nbsp;: DEV538''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_WebApp_Pentesting_handsOn_immersion Web Application Pen Testing Hands-On Immersion]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSAB / SANS Course ID&amp;amp;nbsp;: AUD429''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_IT_Security_Audit_Bootcamp IT Security Audit Essentials Bootcamp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSAB / SANS Course ID&amp;amp;nbsp;: AUD429''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_IT_Security_Audit_Bootcamp IT Security Audit Essentials Bootcamp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Venue  ====&lt;br /&gt;
&lt;br /&gt;
Four Days Event is planned out at: &lt;br /&gt;
&lt;br /&gt;
[http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza,]&amp;lt;br&amp;gt;Site - 2, Sector - 29, &amp;lt;br&amp;gt;Gurgaon-122001 (National Capital Region), India&amp;lt;br&amp;gt;Hotel Front Desk: 91-124-4534000&amp;lt;br&amp;gt;Hotel Fax: 91-124-4304800&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | '''Co-Sponsor &amp;quot;Leadership Summit 2009&amp;quot;'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | '''CTF&amp;amp;nbsp;(Capture The Flag) Sponsor'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | '''Education &amp;amp;nbsp;Partner'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:20th green stacked.png|center|ISC2|link=http://www.isc2.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
| [[Image:Appin.jpg|center|link=http://www.appinsecurity.com]]&amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
| [[Image:BRIP-Logo.jpg|center|link=http://www.brip.co.in]]&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
| [[Image:Beyond-logo_large.jpg|Left|link=http://www.www.beyondsecurity.com]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Associate Sponsors'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;90&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Media Partners'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Supporters'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Torridn.jpg|center|link=http://www.torridnetworks.com]] &lt;br /&gt;
| [[Image:SSecurity_india_small.gif‎ |center|link=http://www.searchsecurity.in]]&lt;br /&gt;
| [[Image:HITB.jpg|center|link=http://conference.hitb.org]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:SecurityCompass.JPG|center|link=http://www.securitycompass.com]] &lt;br /&gt;
| [[Image:HNS-web.jpg|center|link=http://www.net-security.org]] &lt;br /&gt;
| [[Image:Sector.jpg|center|link=http://www.sector.ca]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! valign=&amp;quot;baseline&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| [[Image:Infosecurity.jpg|center|link=http://www.infosecuritymagz.com]] &amp;lt;br&amp;gt;&lt;br /&gt;
| [[Image:Clubhack.gif|center]]&amp;lt;br&amp;gt;[[Image:Eventavenue Logo.jpg|center|link=https://www.eventavenue.com]]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| [[Image:Itmagz.jpg|center]]&amp;amp;nbsp;[[Image:Electronicsf.jpg|center|link=http://www.electronicsforu.com]] &lt;br /&gt;
| [[Image:Crowne plaza.jpg|center|link=http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
==== Hotel &amp;amp; Travel  ====&lt;br /&gt;
&lt;br /&gt;
== Hotel Stay &amp;amp; Travel Information  ==&lt;br /&gt;
&lt;br /&gt;
To help our valued delegates with Hotel and Travel services, we have negotiated with some of the best and Budget Category Guest houses in Gurgaon that are located within a radius of 3 - 4 Kms from the venue.&lt;br /&gt;
&lt;br /&gt;
Limited cheaper accommodation is available near the venue hotel in budget hotels/apartments area. The tariff of these hotels ranges from Rs.2000 onwards per room night (inclusive of Room Rent, Breakfast and Luxury Tax).  Interested delegates / students can send a formal request for the desired accommodations and dates to our official travel agent.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;OFFICIAL TRAVEL AGENT&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dreamz conference Management Pvt.Ltd&amp;lt;/b&amp;gt; will look after your hotel accommodation in Gurgaon and New Delhi, pre &amp;amp; post conference tours / travel needs in India for delegates and visitors independently. If you wish to go for sightseeing tour within New Delhi and around it to places like Agra, Jaipur, Rajasthan etc. However, we would encourage you to make early bookings which will be done on “first – come - first service” basis and let us know of your interest, since that would ultimately work in your favour. Early reservation is strongly recommended as November being a high demand period for hotels in Gurgaon.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
For further details please contact:&lt;br /&gt;
&lt;br /&gt;
DREAMZ CONFERENCE MANAGEMENT PVT.LTD&lt;br /&gt;
&lt;br /&gt;
406, Ansal’s Majestic Tower, Vikas Puri, New Delhi – 110018&lt;br /&gt;
&lt;br /&gt;
Tel: 91 – 11 – 41586401, 402, Fax: 91 – 11 – 41586400&lt;br /&gt;
&lt;br /&gt;
Email: info@dreamztravel.net / dreamztravelindia@yahoo.com&lt;br /&gt;
&lt;br /&gt;
Website: www.dreamztravel.net&lt;br /&gt;
&lt;br /&gt;
Contact Person: Jitin Batra ( +91 9810558569 )&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==== Capture the Flag  ====&lt;br /&gt;
&lt;br /&gt;
== HackHunt 2009  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;India's foremost Hacking Challenge &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Your Shot to the Title of India's best hacker along with Prize money of more than &amp;lt;b&amp;gt;Rs 150,000&amp;lt;/b&amp;gt; up for grabs!&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Search for India’s Best Ethical Hacker &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
HackHunt is India’s leading hacking competition and aims at awarding the best ethical hackers in the country. The competition is brought to you by Appin Security Group, a leading Information Security and Ethical Hacking Company and Securitybyte, a global Information Security Conference Company. &lt;br /&gt;
&lt;br /&gt;
The competition will be conducted in 3 phases. The 1st two rounds will be online and the 3rd and final round will take place at“Securitybyte &amp;amp; OWASP Appsec Asia 2009” on November 17, 2009at Crowne Plaza, Gurgaon. &lt;br /&gt;
&lt;br /&gt;
Level 1 – Knowledge Check&lt;br /&gt;
All the participants will be answering a quiz and based on the score top 10% will be shortlisted to 2nd round.&lt;br /&gt;
&lt;br /&gt;
Level 2 – Skill Check&lt;br /&gt;
This stage will require an attacker to get to the final FLAG file which he/she would need to register for the event.&lt;br /&gt;
&lt;br /&gt;
Level 3 – Final Round&lt;br /&gt;
This stage will require the attackers to exploit a pre-announced SSID which has WPA (or wpa 2).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To participate and for more details visit website :- http://www.hackerscouncil.org/&lt;br /&gt;
&lt;br /&gt;
== PacketWars  ==&lt;br /&gt;
&amp;lt;b&amp;gt;First time in India brought to you by Securitybyte! &amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;                                              &lt;br /&gt;
About PacketWars&lt;br /&gt;
&lt;br /&gt;
PacketWars is an intense, real-time information warfare simulation. Unlike other “capture the flag” games, the battlegrounds featured in PacketWars use the same software and hardware you would encounter in the real world.&lt;br /&gt;
&lt;br /&gt;
PacketWars is designed to operate like a sport. Think Formula One Racing meets professional golf with a dash of Ultimate Fighting thrown in for good measure. Serious fun!&lt;br /&gt;
&lt;br /&gt;
Visit http://packetwars.com/ for more details.&lt;br /&gt;
How To Play?&lt;br /&gt;
&lt;br /&gt;
PacketWars is a Sport like nothing you have ever experienced! Games known as “BATTLES” pit individual players and teams against each other in a race to achieve defined objectives.&lt;br /&gt;
&lt;br /&gt;
The rules of engagement are simple:&lt;br /&gt;
- Illegal activity of any kind is prohibited&lt;br /&gt;
- Protect yourself at all times&lt;br /&gt;
- Battles are designed to be of a low, medium or high difficulty level based on the battle objectives and battle duration&lt;br /&gt;
- Primary, Secondary and Tertiary objectives are defined and assigned points based on difficulty&lt;br /&gt;
- Battles have time limits and other defined constraints&lt;br /&gt;
- Constraints are sometimes known to the combatants and other times are not&lt;br /&gt;
- Anything that is not expressly prohibited is allowed&lt;br /&gt;
- Points are awarded for FLARE&lt;br /&gt;
&lt;br /&gt;
Equipment Needed:&lt;br /&gt;
- Most combants use a notebook and a BackTrack CD however you are only limited by your imagination and bank account&lt;br /&gt;
- You need a battle field and a PacketMaster…Oh yeah, skillz come in handy also!How To Play&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b.How can I participate?&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
PacketWars to be held at the Hotel Crowne Plaza, Gurgaon on Nov 17 &amp;amp; Nov 18, 2009. Participation is FREE! Schedule will be announced soon.&lt;br /&gt;
&lt;br /&gt;
== WebWar III  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;About&amp;lt;/b&amp;gt;&lt;br /&gt;
Hackers attack, coders defend, when you get them together you end up with Web War III. WWIII is designed to put your Web Application attack and defense skills to the test.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Teams&amp;lt;/b&amp;gt;&lt;br /&gt;
Each team consists of two players, an attacker and a defender. The attacker would be capable of identifying Web Application Vulnerabilities (OWASP Top 10). The defender would be capable of writing secure Java code.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Game Format&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The game has two stages:&lt;br /&gt;
&lt;br /&gt;
Stage 1:&lt;br /&gt;
Each team is given a VM Ware image containing a web server hosting a vulnerable web application. During this stage each team identifies the vulnerabilities in their application.&lt;br /&gt;
They try to fix the identified vulnerabilities by making code changes.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Stage 2:&lt;br /&gt;
The IP addresses of the Web Server's of all the teams is announced.&lt;br /&gt;
Each team looks for vulnerabilities in the Web Applications of the other teams.&lt;br /&gt;
Vulnerabilities found on the opponents' application get positive points.&lt;br /&gt;
Vulnerabilities found by the opponents on your application get negative points.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Team with the highest points at the end of Stage 2 wins.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Tools and Equipments&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Each team should bring their own laptop with VM Ware installed.&lt;br /&gt;
The attacker can use any tools they bring.&lt;br /&gt;
The applications come with ESAPI to help the defenders fix the code quicker.&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
==== Leadership Summit 2009  ====&lt;br /&gt;
&amp;lt;b&amp;gt;India's top technology thought leaders coming together to discuss &amp;quot;Security concerns in off-shoring&amp;quot;&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Honored Guests&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
-Honorable Former President of India, Dr. A.P.J Abdul Kalam to inaugrate the Leadership Summit 2009.&amp;lt;br&amp;gt;&lt;br /&gt;
-Prof. Howard A. Schmidt(Advisor, NIST; Former Vice Chair - President’s Critical Infrastructure Board; Former Special Advisor – Cyberspace Security for White House)&amp;lt;br&amp;gt;&lt;br /&gt;
-Mr. Hord Tipton, Executive Director (ISC)2&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;About the Event&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
An elite gathering of 200 technology leaders, decision makers &amp;amp; InfoSec experts from leading service providers, government agencies and various industry verticals.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Two hours of panel discussions between three panels of 12 distinguished industry experts representing outsourcing companies, service providers and the regulatory bodies.  Panel discussions will be followed by networking dinner &amp;amp; cocktails.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Prof Howard A. Schmidt (Advisor, NIST; Former Vice Chair - President’s Critical Infrastructure Board; Former Special Advisor – Cyberspace Security for White House) will facilitate the panel discussions. Thought leaders participating in the panel discussions are:&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Outsourcing Organizations&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Raghavendra Vaidya, CIO - GE Capital India&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. CRN Vairavelu, VP - Ford Technology Services India&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Pankaj Agrawal, CISO - Aircel Limited&amp;lt;br&amp;gt;&lt;br /&gt;
TBD&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Service Providers&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Terry Thomas, Partner - Ernst &amp;amp; Young&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Debashis Ghosh, Head (LS&amp;amp;H ISU) - Tata Consultancy Services&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Sunil Gujral, EVP &amp;amp; CTO - Quatrro&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Sunil Goyal, COO - Sopra group&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Regulatory Bodies&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Dr. Kamlesh Bajaj, CEO - DSCI (a NASSCOM initiative)&amp;lt;br&amp;gt;&lt;br /&gt;
Dr. Gulshan Rai, Director - CERT-in&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Hord Tipton, Executive Director - ISC2 (ex CIO, US Department of Interior)&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Vakul Sharma, Lawyer - Supreme Court&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The event is exclusive to industry leaders and is by private invitation only. If you are interested in attending the event, please email your business card to info@securitybyte.org This e-mail address is being protected from spambots.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Venue - Hotel Crowne Plaza, Gurgaon | Timings - 5:30PM - 9:00PM&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
Please contact [http://www.owasp.org/index.php/Category:India#OWASP_India_Co-Chairs Chair - OWASP India] for sponsorship opportunities. &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Category:India Category: OWASP India]&lt;/div&gt;</summary>
		<author><name>Puneetm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SecurityByte_and_OWASP_Asia_AppSec_Conference_2009&amp;diff=72784</id>
		<title>SecurityByte and OWASP Asia AppSec Conference 2009</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SecurityByte_and_OWASP_Asia_AppSec_Conference_2009&amp;diff=72784"/>
				<updated>2009-11-07T16:33:36Z</updated>
		
		<summary type="html">&lt;p&gt;Puneetm: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:SB OWASP 2009 banner.gif|center|link=http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009]]&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza] &amp;amp;#124; [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Registrations]&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*&amp;lt;b&amp;gt;Only One Week Left ! Register Online today to grab your seat for India's best Security Conference.&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;Honorable Ex-President of India, Dr. A.P.J Abdul Kalam to Inaugrate the India Technology Leadership Summit 2009. &amp;lt;/b&amp;gt;This event is an Invitation ONLY event.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Registrations Click Here]''' for more information.&lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
Securitybyte &amp;amp;amp; OWASP are proud to welcome you to the annual international information security conference – Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009, Nov 17th through Nov 20th in Delhi &amp;amp;amp; NCR, India. &lt;br /&gt;
&lt;br /&gt;
This is a landmark event, as both Securitybyte and OWASP join hands to present India’s largest InfoSec event with world renowned and most regarded international speakers. &lt;br /&gt;
&lt;br /&gt;
Securitybye &amp;amp;amp; OWASP AppSec Asia Conference 2009 will be held at [http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza, Gurgaon, NCR, India.] on 17th November through 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Security Researchers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Penetration Testers &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*IT Security Professionals &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
&lt;br /&gt;
==== About  ====&lt;br /&gt;
&lt;br /&gt;
== About Conference  ==&lt;br /&gt;
&lt;br /&gt;
Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel conference talks to be conducted in 3 separate halls for two days i.e . 17th &amp;amp;amp; 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular talk. Conference talks are being delivered by world renowned and most regarded speakers from around the world. &lt;br /&gt;
&lt;br /&gt;
== About Trainings  ==&lt;br /&gt;
&lt;br /&gt;
Two days post-conference are dedicated towards best-of-breed trainings being conducted in association with SANS, ISC2 and other organizations. Trainings tracks have been made available as One-Day tracks and Two-Day tracks scheduled for 19th &amp;amp;amp; 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
==== Registrations  ====&lt;br /&gt;
&lt;br /&gt;
== [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Registration] is now open!  ==&lt;br /&gt;
&lt;br /&gt;
=== You can register [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 here]  ===&lt;br /&gt;
&lt;br /&gt;
*[http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Click Here] for Online Registrations. &lt;br /&gt;
*[http://securitybyte.org/index.php/register.html Click Here] for Offline Registrations.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Please check out our Exclusive Discount Offer, available Starting October 6th - 15th, 2009. &amp;quot;SAVE BIG NOW !&amp;quot;&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''''The below pricing reflects the Standard Registration Prices .''''' &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Two Days of Conference (17th and 18th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.8,500/- INR &lt;br /&gt;
| General Public&lt;br /&gt;
|-&lt;br /&gt;
| Two Days of Conference (17th and 18th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.5,000/- INR &lt;br /&gt;
| Students&lt;br /&gt;
|-&lt;br /&gt;
| Two-Day Training Tracks (19th and 20th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.25,000/- INR&lt;br /&gt;
|-&lt;br /&gt;
| One-Day Training Tracks (19th OR 20th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.12,500/- INR&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;** Service Tax @ 10.3% will be charged extra.&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;ISC2&amp;lt;/b&amp;gt; Members can avail a Special 15% discount on Conference &amp;amp; Training Registration.&lt;br /&gt;
(Please provide your ISC2 Certification ID number to avail the above Discount)&lt;br /&gt;
For Registrations contact us at registrations@securitybyte.org&lt;br /&gt;
== Exclusive Offers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;- Group / Team Discounts available: Kindly contact us at registrations@securitybyte.org&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Special University Student discount&amp;lt;/b&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
- University Students can register for two days of conference for just Rs. 5000 (including taxes)&amp;lt;br&amp;gt;&lt;br /&gt;
- Special 15 % Discounts for Training registration&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Trainings Click here for details on the training courses that are available.]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Who Should Attend Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009: ==&lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Security Researchers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Penetration Testers &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*IT Security Professionals &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;For student discount, attendees must present proof of enrollment when picking up your badge. &lt;br /&gt;
&lt;br /&gt;
==== Schedule  ====&lt;br /&gt;
&lt;br /&gt;
Three parallel conference talks are scheduled for 17th &amp;amp;amp; 18th November 2009 in three different halls. Training tracks have been divided in one-day tracks scheduled for 19th or 20th November 2009 and two-day tracks those are schedule to continue for two days both on 19th &amp;amp;amp; 20th November 2009. Follow the tabs to learn the details on both conference and trainings. &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Conference Click here] to view the '''Conference Schedule''' for 17th &amp;amp;amp; 18th November 2009.&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Trainings Click here] to view '''Training Schedule''' on 19th &amp;amp;amp; 20th November 2009.&lt;br /&gt;
&lt;br /&gt;
==== Conference  ====&lt;br /&gt;
&lt;br /&gt;
== Two Days Conference  ==&lt;br /&gt;
&lt;br /&gt;
Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel conference talks to be conducted in 3 separate halls for two days i.e . 17th &amp;amp;amp; 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular talk. Conference talks are being delivered by world renowned and most regarded speakers from around the world. Below is the detailed schedule for the two days of conference.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 1 - 17th Nov, 2009'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Where&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - I''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - II''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - III'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Who&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Researchers &amp;amp;amp; Enthusiasts)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Auditors, Developers, QA teams, Architects)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Leaders, Managers, C&amp;amp;amp;S professionals)'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 8:00 AM - 9:00 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Registrations'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Schedule''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 9:00 AM - 10:30 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Keynote'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:30 AM - 11:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea Break'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 11:00 AM - 12:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | How To Blackbox Test Almost Anything&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Aviram Jenik, Beyond Security&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | The International State of Cyber Security, Risk reduction in a high threat world&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Prof. Howard A. Schmidt, Former Cyber Security Advisor to the White house&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:00 PM - 1:00 PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Client Side Hacks&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Dino Covotsos &amp;amp; Charleton Smith, Telspace Systems&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Risk Based Penetration testing&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | K. K. Mookhey, Founder &amp;amp;amp; Principal Consultant, NII Consulting&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Applications, the source for CyberThreats&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Mano Paul,Software Assurance Advisor,(ISC)2&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 1:00PM - 2:00PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Lunch'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 2:00 PM - 3:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Exploiting Firefox Extensions&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Roberto Suggi Liverani, Security-Assessment.com&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Threat Modeling&amp;lt;br&amp;gt;&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Varun Sharma,Microsoft India&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Enterprise Application Security Program&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 3:00 PM - 4:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | SQL Server Forensics 2.0&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Kevvie Fowler, TELUS &amp;amp;amp; Ringzero&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | OWASP SAMM&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Pravir Chandra, Director of Strategic Services,&amp;lt;br&amp;gt;Fortify&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Business Case - Risk Management/Compliance at leading Education Group AMITY (Rapid Fire: 30 Min talk)&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Dr. JS Sodhi, CIO, AMITY Group&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 4:00 PM - 5:00 PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Ownage 2.0 - How to own the World&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Saumil Shah, NetSquare Solutions&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | &amp;quot;Do you want to play a Game&amp;quot; - Game theory and Cyberwar&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Bryan K. Fite, HackSecKlahn&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Usability and Privacy in Security&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Dr. Ponnurangam Kumaraguru, Asst. Professor - IIIT (Rapid Fire : 30 Min talk)&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 5:00 PM - 6:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea and Snacks on the Exhibition floor'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 7:00 PM - 10:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''CXO Event (Exclusive by invitation only) - Information Security Concerns for Offshoring'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 2 - 18th Nov, 2009'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Where&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - I''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - II''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - III'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Who&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Researchers &amp;amp;amp; Enthusiasts)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Auditors, Developers, QA teams, Architects)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Leaders, Managers, C&amp;amp;amp;S professionals)'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 8:00 AM - 9:00 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Registrations'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 9:00 AM - 10:00 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Round Table with Speakers / Industry Panel - &amp;quot;Security Today &amp;amp; Tomorrow''''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:00 AM - 10:30 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea Break'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Schedule''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:30 AM - 11:30&amp;amp;nbsp;AM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | All your Packets belong to us&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Daniel Mende, Security Researcher, ERNW&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | SANS Dshield Webhoneypot Project&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Jason Lam, Independent Security Researcher&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Critical Infrastructure Security “Danger Without borders” &amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | John Bumgarner, US Cyber Consequence Unit (USCCU)&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 11:30 AM - 12:30 PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Hacking Oracle From Web&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Sid, Independent Security Researcher&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Testing JSON Applications For Security Holes&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Aviram Jenik, Beyond Security&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Critical Infrastructure Security “Danger Without borders” &amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | John Bumgarner, US Cyber Consequence Unit (USCCU)&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:30PM - 1:30PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Lunch'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 1:30 PM&amp;amp;nbsp;- 2:30 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Lust 2.0 – Desire for free WiFi and the threat of the Imposter &amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Lava Kumar Kuppan, Independent Security Researcher&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Cloud Hacking - Distributed Attacks &amp;amp; Exploits&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Shreeraj Shah, Blueinfy Solutions&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Cedric Blancher, EADS Innovation Works&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 2:30 PM - 3:30&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Xprobe3 - What's New? Going Application Level&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Fyodor Yarochkin, Armorize&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Nitin Kumar/Vipin Kumar, Independent Security Researchers, NVlabs&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Behind the Scenes at Microsoft Security Response Center&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Dave Midturi,MSRC, Microsoft Corp.&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 3:30PM - 4:00PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea Break'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 4:00 PM - 5:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 5:00 PM - 6:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Closing Keynotes - &amp;quot;OWASP &amp;amp; Securitybyte&amp;quot;'''&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Trainings  ====&lt;br /&gt;
&lt;br /&gt;
== Two Day Trainings  ==&lt;br /&gt;
&lt;br /&gt;
Two days post-conference are dedicated towards best-of-breed trainings being conducted in association with SANS, ISC2 and other organizations. Trainings tracks have been made available as One-Day tracks and Two-Day tracks scheduled for 19th &amp;amp;amp; 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 1 - 19th Nov, 2009'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 2 - 20th Nov, 2009'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course ID''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course Duration''' &lt;br /&gt;
(# of Days) &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course Title''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Instructor''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course ID''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course Duration''' &lt;br /&gt;
(# of Days) &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course Title''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Instructor'''&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;30&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''One Day Training Tracks'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DHSO''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Oracle_Hacking_and_security ORACLE Hacking &amp;amp;amp; Security]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Sumit Sidharth,[[Image:Sb logo.png|center|78x50px|link=http://www.securitybyte.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DAWH''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Advanced_Web_Hacking Advanced Web Hacking -Securing AJAX, RIA &amp;amp;amp; SOA]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Shreeraj Shah [[Image:Blueinfy logo.png|center|link=http://www.blueinfy.com]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DAFT'''&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Advanced_Forensic_Techniques Advanced Forensics Techniques]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Dr. Chandrasekhar Umapathy,[[Image:Sb logo.png|center|78x50px|link=http://www.securitybyte.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DIAT'''&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/InDepth_Assessment_Techniques In-depth Assessment Techniques: Design, Code, and Runtime]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Pravir Chandra, &lt;br /&gt;
&lt;br /&gt;
[[Image:Fortify.jpg|center|93x31px|link=http://www.fortify.com]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;30&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Two Day Training Tracks'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DNST''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Building_Advanced_Network_Security_tools Building advanced Network Security Tools]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Daniel Mende,[[Image:Ernw logo.png|center]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DNST''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Building_Advanced_Network_Security_tools Building advanced Network Security Tools]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Daniel Mende,[[Image:Ernw logo.png|center]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DCBC''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/ISC2_CSSLP_CBK_Bootcamp (ISC)2 CSSLP CBK Boot camp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Mano Paul,[[Image:Isc logo.png|center|78x50px|link=http://www.isc2.org]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DCBC''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/ISC2_CSSLP_CBK_Bootcamp (ISC)2 CSSLP CBK Boot camp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Mano Paul,[[Image:Isc logo.png|center|78x50px|link=http://www.isc2.org]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSCJ / SANS Course ID&amp;amp;nbsp;: DEV530''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_Essential_Secure_Coding_Java_JEE_GSSP Essential Secure Coding in Java / JEE]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSCJ / SANS Course ID&amp;amp;nbsp;: DEV530''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_Essential_Secure_Coding_Java_JEE_GSSP Essential Secure Coding in Java / JEE]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DWPT / SANS Course ID&amp;amp;nbsp;: DEV538''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_WebApp_Pentesting_handsOn_immersion Web Application Pen Testing Hands-On Immersion]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DWPT / SANS Course ID&amp;amp;nbsp;: DEV538''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_WebApp_Pentesting_handsOn_immersion Web Application Pen Testing Hands-On Immersion]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSAB / SANS Course ID&amp;amp;nbsp;: AUD429''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_IT_Security_Audit_Bootcamp IT Security Audit Essentials Bootcamp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSAB / SANS Course ID&amp;amp;nbsp;: AUD429''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_IT_Security_Audit_Bootcamp IT Security Audit Essentials Bootcamp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Venue  ====&lt;br /&gt;
&lt;br /&gt;
Four Days Event is planned out at: &lt;br /&gt;
&lt;br /&gt;
[http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza,]&amp;lt;br&amp;gt;Site - 2, Sector - 29, &amp;lt;br&amp;gt;Gurgaon-122001 (National Capital Region), India&amp;lt;br&amp;gt;Hotel Front Desk: 91-124-4534000&amp;lt;br&amp;gt;Hotel Fax: 91-124-4304800&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | '''Co-Sponsor &amp;quot;Leadership Summit 2009&amp;quot;'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | '''CTF&amp;amp;nbsp;(Capture The Flag) Sponsor'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | '''Education &amp;amp;nbsp;Partner'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:20th green stacked.png|center|ISC2|link=http://www.isc2.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
| [[Image:Appin.jpg|center|link=http://www.appinsecurity.com]]&amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
| [[Image:BRIP-Logo.jpg|center|link=http://www.brip.co.in]]&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
| [[Image:Beyond-logo_large.jpg|Left|link=http://www.www.beyondsecurity.com]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Associate Sponsors'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;90&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Media Partners'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Supporters'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Torridn.jpg|center|link=http://www.torridnetworks.com]] &lt;br /&gt;
| [[Image:SSecurity_india_small.gif‎ |center|link=http://www.searchsecurity.in]]&lt;br /&gt;
| [[Image:HITB.jpg|center|link=http://conference.hitb.org]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:SecurityCompass.JPG|center|link=http://www.securitycompass.com]] &lt;br /&gt;
| [[Image:HNS-web.jpg|center|link=http://www.net-security.org]] &lt;br /&gt;
| [[Image:Sector.jpg|center|link=http://www.sector.ca]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! valign=&amp;quot;baseline&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| [[Image:Infosecurity.jpg|center|link=http://www.infosecuritymagz.com]] &amp;lt;br&amp;gt;&lt;br /&gt;
| [[Image:Clubhack.gif|center]]&amp;lt;br&amp;gt;[[Image:Eventavenue Logo.jpg|center|link=https://www.eventavenue.com]]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| [[Image:Itmagz.jpg|center]]&amp;amp;nbsp;[[Image:Electronicsf.jpg|center|link=http://www.electronicsforu.com]] &lt;br /&gt;
| [[Image:Crowne plaza.jpg|center|link=http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
==== Hotel &amp;amp; Travel  ====&lt;br /&gt;
&lt;br /&gt;
== Hotel Stay &amp;amp; Travel Information  ==&lt;br /&gt;
&lt;br /&gt;
To help our valued delegates with Hotel and Travel services, we have negotiated with some of the best and Budget Category Guest houses in Gurgaon that are located within a radius of 3 - 4 Kms from the venue.&lt;br /&gt;
&lt;br /&gt;
Limited cheaper accommodation is available near the venue hotel in budget hotels/apartments area. The tariff of these hotels ranges from Rs.2000 onwards per room night (inclusive of Room Rent, Breakfast and Luxury Tax).  Interested delegates / students can send a formal request for the desired accommodations and dates to our official travel agent.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;OFFICIAL TRAVEL AGENT&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dreamz conference Management Pvt.Ltd&amp;lt;/b&amp;gt; will look after your hotel accommodation in Gurgaon and New Delhi, pre &amp;amp; post conference tours / travel needs in India for delegates and visitors independently. If you wish to go for sightseeing tour within New Delhi and around it to places like Agra, Jaipur, Rajasthan etc. However, we would encourage you to make early bookings which will be done on “first – come - first service” basis and let us know of your interest, since that would ultimately work in your favour. Early reservation is strongly recommended as November being a high demand period for hotels in Gurgaon.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
For further details please contact:&lt;br /&gt;
&lt;br /&gt;
DREAMZ CONFERENCE MANAGEMENT PVT.LTD&lt;br /&gt;
&lt;br /&gt;
406, Ansal’s Majestic Tower, Vikas Puri, New Delhi – 110018&lt;br /&gt;
&lt;br /&gt;
Tel: 91 – 11 – 41586401, 402, Fax: 91 – 11 – 41586400&lt;br /&gt;
&lt;br /&gt;
Email: info@dreamztravel.net / dreamztravelindia@yahoo.com&lt;br /&gt;
&lt;br /&gt;
Website: www.dreamztravel.net&lt;br /&gt;
&lt;br /&gt;
Contact Person: Jitin Batra ( +91 9810558569 )&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==== Capture the Flag  ====&lt;br /&gt;
&lt;br /&gt;
== HackHunt 2009  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;India's foremost Hacking Challenge &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Your Shot to the Title of India's best hacker along with Prize money of more than &amp;lt;b&amp;gt;Rs 150,000&amp;lt;/b&amp;gt; up for grabs!&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Search for India’s Best Ethical Hacker &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
HackHunt is India’s leading hacking competition and aims at awarding the best ethical hackers in the country. The competition is brought to you by Appin Security Group, a leading Information Security and Ethical Hacking Company and Securitybyte, a global Information Security Conference Company. &lt;br /&gt;
&lt;br /&gt;
The competition will be conducted in 3 phases. The 1st two rounds will be online and the 3rd and final round will take place at“Securitybyte &amp;amp; OWASP Appsec Asia 2009” on November 17, 2009at Crowne Plaza, Gurgaon. &lt;br /&gt;
&lt;br /&gt;
Level 1 – Knowledge Check&lt;br /&gt;
All the participants will be answering a quiz and based on the score top 10% will be shortlisted to 2nd round.&lt;br /&gt;
&lt;br /&gt;
Level 2 – Skill Check&lt;br /&gt;
This stage will require an attacker to get to the final FLAG file which he/she would need to register for the event.&lt;br /&gt;
&lt;br /&gt;
Level 3 – Final Round&lt;br /&gt;
This stage will require the attackers to exploit a pre-announced SSID which has WPA (or wpa 2).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To participate and for more details visit website :- http://www.hackerscouncil.org/&lt;br /&gt;
&lt;br /&gt;
== PacketWars  ==&lt;br /&gt;
&amp;lt;b&amp;gt;First time in India brought to you by Securitybyte! &amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;                                              &lt;br /&gt;
About PacketWars&lt;br /&gt;
&lt;br /&gt;
PacketWars is an intense, real-time information warfare simulation. Unlike other “capture the flag” games, the battlegrounds featured in PacketWars use the same software and hardware you would encounter in the real world.&lt;br /&gt;
&lt;br /&gt;
PacketWars is designed to operate like a sport. Think Formula One Racing meets professional golf with a dash of Ultimate Fighting thrown in for good measure. Serious fun!&lt;br /&gt;
&lt;br /&gt;
Visit http://packetwars.com/ for more details.&lt;br /&gt;
How To Play?&lt;br /&gt;
&lt;br /&gt;
PacketWars is a Sport like nothing you have ever experienced! Games known as “BATTLES” pit individual players and teams against each other in a race to achieve defined objectives.&lt;br /&gt;
&lt;br /&gt;
The rules of engagement are simple:&lt;br /&gt;
- Illegal activity of any kind is prohibited&lt;br /&gt;
- Protect yourself at all times&lt;br /&gt;
- Battles are designed to be of a low, medium or high difficulty level based on the battle objectives and battle duration&lt;br /&gt;
- Primary, Secondary and Tertiary objectives are defined and assigned points based on difficulty&lt;br /&gt;
- Battles have time limits and other defined constraints&lt;br /&gt;
- Constraints are sometimes known to the combatants and other times are not&lt;br /&gt;
- Anything that is not expressly prohibited is allowed&lt;br /&gt;
- Points are awarded for FLARE&lt;br /&gt;
&lt;br /&gt;
Equipment Needed:&lt;br /&gt;
- Most combants use a notebook and a BackTrack CD however you are only limited by your imagination and bank account&lt;br /&gt;
- You need a battle field and a PacketMaster…Oh yeah, skillz come in handy also!How To Play&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b.How can I participate?&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
PacketWars to be held at the Hotel Crowne Plaza, Gurgaon on Nov 17 &amp;amp; Nov 18, 2009. Participation is FREE! Schedule will be announced soon.&lt;br /&gt;
&lt;br /&gt;
== WebWar III  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;About&amp;lt;/b&amp;gt;&lt;br /&gt;
Hackers attack, coders defend, when you get them together you end up with Web War III. WWIII is designed to put your Web Application attack and defense skills to the test.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Teams&amp;lt;/b&amp;gt;&lt;br /&gt;
Each team consists of two players, an attacker and a defender. The attacker would be capable of identifying Web Application Vulnerabilities (OWASP Top 10). The defender would be capable of writing secure Java code.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Game Format&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The game has two stages:&lt;br /&gt;
&lt;br /&gt;
Stage 1:&lt;br /&gt;
Each team is given a VM Ware image containing a web server hosting a vulnerable web application. During this stage each team identifies the vulnerabilities in their application.&lt;br /&gt;
They try to fix the identified vulnerabilities by making code changes.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Stage 2:&lt;br /&gt;
The IP addresses of the Web Server's of all the teams is announced.&lt;br /&gt;
Each team looks for vulnerabilities in the Web Applications of the other teams.&lt;br /&gt;
Vulnerabilities found on the opponents' application get positive points.&lt;br /&gt;
Vulnerabilities found by the opponents on your application get negative points.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Team with the highest points at the end of Stage 2 wins.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Tools and Equipments&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Each team should bring their own laptop with VM Ware installed.&lt;br /&gt;
The attacker can use any tools they bring.&lt;br /&gt;
The applications come with ESAPI to help the defenders fix the code quicker.&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
==== Leadership Summit 2009  ====&lt;br /&gt;
&amp;lt;b&amp;gt;India's top technology thought leaders coming together to discuss &amp;quot;Security concerns in off-shoring&amp;quot;&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Honored Guests&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
-Honorable Ex-President of India, Dr. A.P.J Abdul Kalam to inaugrate the Leadership Summit 2009.&amp;lt;br&amp;gt;&lt;br /&gt;
-Prof. Howard A. Schmidt(Advisor, NIST; Former Vice Chair - President’s Critical Infrastructure Board; Former Special Advisor – Cyberspace Security for White House)&amp;lt;br&amp;gt;&lt;br /&gt;
-Mr. Hord Tipton, Executive Director (ISC)2&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;About the Event&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
An elite gathering of 200 technology leaders, decision makers &amp;amp; InfoSec experts from leading service providers, government agencies and various industry verticals.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Two hours of panel discussions between three panels of 12 distinguished industry experts representing outsourcing companies, service providers and the regulatory bodies.  Panel discussions will be followed by networking dinner &amp;amp; cocktails.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Prof Howard A. Schmidt (Advisor, NIST; Former Vice Chair - President’s Critical Infrastructure Board; Former Special Advisor – Cyberspace Security for White House) will facilitate the panel discussions. Thought leaders participating in the panel discussions are:&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Outsourcing Organizations&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Raghavendra Vaidya, CIO - GE Capital India&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. CRN Vairavelu, VP - Ford Technology Services India&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Pankaj Agrawal, CISO - Aircel Limited&amp;lt;br&amp;gt;&lt;br /&gt;
TBD&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Service Providers&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Terry Thomas, Partner - Ernst &amp;amp; Young&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Debashis Ghosh, Head (LS&amp;amp;H ISU) - Tata Consultancy Services&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Sunil Gujral, EVP &amp;amp; CTO - Quatrro&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Sunil Goyal, COO - Sopra group&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Regulatory Bodies&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Dr. Kamlesh Bajaj, CEO - DSCI (a NASSCOM initiative)&amp;lt;br&amp;gt;&lt;br /&gt;
Dr. Gulshan Rai, Director - CERT-in&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Hord Tipton, Executive Director - ISC2 (ex CIO, US Department of Interior)&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Vakul Sharma, Lawyer - Supreme Court&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The event is exclusive to industry leaders and is by private invitation only. If you are interested in attending the event, please email your business card to info@securitybyte.org This e-mail address is being protected from spambots.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Venue - Hotel Crowne Plaza, Gurgaon | Timings - 5:30PM - 9:00PM&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
Please contact [http://www.owasp.org/index.php/Category:India#OWASP_India_Co-Chairs Chair - OWASP India] for sponsorship opportunities. &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Category:India Category: OWASP India]&lt;/div&gt;</summary>
		<author><name>Puneetm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SecurityByte_and_OWASP_Asia_AppSec_Conference_2009&amp;diff=72783</id>
		<title>SecurityByte and OWASP Asia AppSec Conference 2009</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SecurityByte_and_OWASP_Asia_AppSec_Conference_2009&amp;diff=72783"/>
				<updated>2009-11-07T16:30:33Z</updated>
		
		<summary type="html">&lt;p&gt;Puneetm: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:SB OWASP 2009 banner.gif|center|link=http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009]]&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza] &amp;amp;#124; [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Registrations]&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*&amp;lt;b&amp;gt;Only Two Weeks Left ! Register Online today to grab your seat for India's best Security Conference.&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Registrations Click Here]''' for more information.&lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
Securitybyte &amp;amp;amp; OWASP are proud to welcome you to the annual international information security conference – Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009, Nov 17th through Nov 20th in Delhi &amp;amp;amp; NCR, India. &lt;br /&gt;
&lt;br /&gt;
This is a landmark event, as both Securitybyte and OWASP join hands to present India’s largest InfoSec event with world renowned and most regarded international speakers. &lt;br /&gt;
&lt;br /&gt;
Securitybye &amp;amp;amp; OWASP AppSec Asia Conference 2009 will be held at [http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza, Gurgaon, NCR, India.] on 17th November through 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Security Researchers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Penetration Testers &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*IT Security Professionals &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
&lt;br /&gt;
==== About  ====&lt;br /&gt;
&lt;br /&gt;
== About Conference  ==&lt;br /&gt;
&lt;br /&gt;
Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel conference talks to be conducted in 3 separate halls for two days i.e . 17th &amp;amp;amp; 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular talk. Conference talks are being delivered by world renowned and most regarded speakers from around the world. &lt;br /&gt;
&lt;br /&gt;
== About Trainings  ==&lt;br /&gt;
&lt;br /&gt;
Two days post-conference are dedicated towards best-of-breed trainings being conducted in association with SANS, ISC2 and other organizations. Trainings tracks have been made available as One-Day tracks and Two-Day tracks scheduled for 19th &amp;amp;amp; 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
==== Registrations  ====&lt;br /&gt;
&lt;br /&gt;
== [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Registration] is now open!  ==&lt;br /&gt;
&lt;br /&gt;
=== You can register [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 here]  ===&lt;br /&gt;
&lt;br /&gt;
*[http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Click Here] for Online Registrations. &lt;br /&gt;
*[http://securitybyte.org/index.php/register.html Click Here] for Offline Registrations.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Please check out our Exclusive Discount Offer, available Starting October 6th - 15th, 2009. &amp;quot;SAVE BIG NOW !&amp;quot;&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''''The below pricing reflects the Standard Registration Prices .''''' &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Two Days of Conference (17th and 18th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.8,500/- INR &lt;br /&gt;
| General Public&lt;br /&gt;
|-&lt;br /&gt;
| Two Days of Conference (17th and 18th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.5,000/- INR &lt;br /&gt;
| Students&lt;br /&gt;
|-&lt;br /&gt;
| Two-Day Training Tracks (19th and 20th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.25,000/- INR&lt;br /&gt;
|-&lt;br /&gt;
| One-Day Training Tracks (19th OR 20th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.12,500/- INR&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;** Service Tax @ 10.3% will be charged extra.&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;ISC2&amp;lt;/b&amp;gt; Members can avail a Special 15% discount on Conference &amp;amp; Training Registration.&lt;br /&gt;
(Please provide your ISC2 Certification ID number to avail the above Discount)&lt;br /&gt;
For Registrations contact us at registrations@securitybyte.org&lt;br /&gt;
== Exclusive Offers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;- Group / Team Discounts available: Kindly contact us at registrations@securitybyte.org&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Special University Student discount&amp;lt;/b&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
- University Students can register for two days of conference for just Rs. 5000 (including taxes)&amp;lt;br&amp;gt;&lt;br /&gt;
- Special 15 % Discounts for Training registration&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Trainings Click here for details on the training courses that are available.]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Who Should Attend Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009: ==&lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Security Researchers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Penetration Testers &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*IT Security Professionals &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;For student discount, attendees must present proof of enrollment when picking up your badge. &lt;br /&gt;
&lt;br /&gt;
==== Schedule  ====&lt;br /&gt;
&lt;br /&gt;
Three parallel conference talks are scheduled for 17th &amp;amp;amp; 18th November 2009 in three different halls. Training tracks have been divided in one-day tracks scheduled for 19th or 20th November 2009 and two-day tracks those are schedule to continue for two days both on 19th &amp;amp;amp; 20th November 2009. Follow the tabs to learn the details on both conference and trainings. &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Conference Click here] to view the '''Conference Schedule''' for 17th &amp;amp;amp; 18th November 2009.&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Trainings Click here] to view '''Training Schedule''' on 19th &amp;amp;amp; 20th November 2009.&lt;br /&gt;
&lt;br /&gt;
==== Conference  ====&lt;br /&gt;
&lt;br /&gt;
== Two Days Conference  ==&lt;br /&gt;
&lt;br /&gt;
Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel conference talks to be conducted in 3 separate halls for two days i.e . 17th &amp;amp;amp; 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular talk. Conference talks are being delivered by world renowned and most regarded speakers from around the world. Below is the detailed schedule for the two days of conference.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 1 - 17th Nov, 2009'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Where&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - I''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - II''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - III'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Who&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Researchers &amp;amp;amp; Enthusiasts)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Auditors, Developers, QA teams, Architects)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Leaders, Managers, C&amp;amp;amp;S professionals)'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 8:00 AM - 9:00 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Registrations'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Schedule''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 9:00 AM - 10:30 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Keynote'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:30 AM - 11:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea Break'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 11:00 AM - 12:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | How To Blackbox Test Almost Anything&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Aviram Jenik, Beyond Security&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | The International State of Cyber Security, Risk reduction in a high threat world&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Prof. Howard A. Schmidt, Former Cyber Security Advisor to the White house&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:00 PM - 1:00 PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Client Side Hacks&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Dino Covotsos &amp;amp; Charleton Smith, Telspace Systems&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Risk Based Penetration testing&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | K. K. Mookhey, Founder &amp;amp;amp; Principal Consultant, NII Consulting&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Applications, the source for CyberThreats&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Mano Paul,Software Assurance Advisor,(ISC)2&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 1:00PM - 2:00PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Lunch'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 2:00 PM - 3:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Exploiting Firefox Extensions&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Roberto Suggi Liverani, Security-Assessment.com&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Threat Modeling&amp;lt;br&amp;gt;&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Varun Sharma,Microsoft India&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Enterprise Application Security Program&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 3:00 PM - 4:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | SQL Server Forensics 2.0&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Kevvie Fowler, TELUS &amp;amp;amp; Ringzero&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | OWASP SAMM&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Pravir Chandra, Director of Strategic Services,&amp;lt;br&amp;gt;Fortify&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Business Case - Risk Management/Compliance at leading Education Group AMITY (Rapid Fire: 30 Min talk)&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Dr. JS Sodhi, CIO, AMITY Group&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 4:00 PM - 5:00 PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Ownage 2.0 - How to own the World&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Saumil Shah, NetSquare Solutions&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | &amp;quot;Do you want to play a Game&amp;quot; - Game theory and Cyberwar&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Bryan K. Fite, HackSecKlahn&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Usability and Privacy in Security&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Dr. Ponnurangam Kumaraguru, Asst. Professor - IIIT (Rapid Fire : 30 Min talk)&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 5:00 PM - 6:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea and Snacks on the Exhibition floor'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 7:00 PM - 10:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''CXO Event (Exclusive by invitation only) - Information Security Concerns for Offshoring'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 2 - 18th Nov, 2009'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Where&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - I''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - II''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - III'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Who&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Researchers &amp;amp;amp; Enthusiasts)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Auditors, Developers, QA teams, Architects)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Leaders, Managers, C&amp;amp;amp;S professionals)'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 8:00 AM - 9:00 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Registrations'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 9:00 AM - 10:00 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Round Table with Speakers / Industry Panel - &amp;quot;Security Today &amp;amp; Tomorrow''''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:00 AM - 10:30 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea Break'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Schedule''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:30 AM - 11:30&amp;amp;nbsp;AM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | All your Packets belong to us&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Daniel Mende, Security Researcher, ERNW&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | SANS Dshield Webhoneypot Project&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Jason Lam, Independent Security Researcher&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Critical Infrastructure Security “Danger Without borders” &amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | John Bumgarner, US Cyber Consequence Unit (USCCU)&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 11:30 AM - 12:30 PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Hacking Oracle From Web&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Sid, Independent Security Researcher&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Testing JSON Applications For Security Holes&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Aviram Jenik, Beyond Security&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Critical Infrastructure Security “Danger Without borders” &amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | John Bumgarner, US Cyber Consequence Unit (USCCU)&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:30PM - 1:30PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Lunch'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 1:30 PM&amp;amp;nbsp;- 2:30 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Lust 2.0 – Desire for free WiFi and the threat of the Imposter &amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Lava Kumar Kuppan, Independent Security Researcher&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Cloud Hacking - Distributed Attacks &amp;amp; Exploits&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Shreeraj Shah, Blueinfy Solutions&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Cedric Blancher, EADS Innovation Works&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 2:30 PM - 3:30&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Xprobe3 - What's New? Going Application Level&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Fyodor Yarochkin, Armorize&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Nitin Kumar/Vipin Kumar, Independent Security Researchers, NVlabs&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Behind the Scenes at Microsoft Security Response Center&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Dave Midturi,MSRC, Microsoft Corp.&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 3:30PM - 4:00PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea Break'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 4:00 PM - 5:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 5:00 PM - 6:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Closing Keynotes - &amp;quot;OWASP &amp;amp; Securitybyte&amp;quot;'''&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Trainings  ====&lt;br /&gt;
&lt;br /&gt;
== Two Day Trainings  ==&lt;br /&gt;
&lt;br /&gt;
Two days post-conference are dedicated towards best-of-breed trainings being conducted in association with SANS, ISC2 and other organizations. Trainings tracks have been made available as One-Day tracks and Two-Day tracks scheduled for 19th &amp;amp;amp; 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 1 - 19th Nov, 2009'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 2 - 20th Nov, 2009'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course ID''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course Duration''' &lt;br /&gt;
(# of Days) &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course Title''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Instructor''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course ID''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course Duration''' &lt;br /&gt;
(# of Days) &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course Title''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Instructor'''&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;30&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''One Day Training Tracks'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DHSO''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Oracle_Hacking_and_security ORACLE Hacking &amp;amp;amp; Security]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Sumit Sidharth,[[Image:Sb logo.png|center|78x50px|link=http://www.securitybyte.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DAWH''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Advanced_Web_Hacking Advanced Web Hacking -Securing AJAX, RIA &amp;amp;amp; SOA]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Shreeraj Shah [[Image:Blueinfy logo.png|center|link=http://www.blueinfy.com]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DAFT'''&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Advanced_Forensic_Techniques Advanced Forensics Techniques]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Dr. Chandrasekhar Umapathy,[[Image:Sb logo.png|center|78x50px|link=http://www.securitybyte.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DIAT'''&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/InDepth_Assessment_Techniques In-depth Assessment Techniques: Design, Code, and Runtime]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Pravir Chandra, &lt;br /&gt;
&lt;br /&gt;
[[Image:Fortify.jpg|center|93x31px|link=http://www.fortify.com]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;30&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Two Day Training Tracks'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DNST''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Building_Advanced_Network_Security_tools Building advanced Network Security Tools]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Daniel Mende,[[Image:Ernw logo.png|center]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DNST''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Building_Advanced_Network_Security_tools Building advanced Network Security Tools]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Daniel Mende,[[Image:Ernw logo.png|center]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DCBC''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/ISC2_CSSLP_CBK_Bootcamp (ISC)2 CSSLP CBK Boot camp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Mano Paul,[[Image:Isc logo.png|center|78x50px|link=http://www.isc2.org]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DCBC''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/ISC2_CSSLP_CBK_Bootcamp (ISC)2 CSSLP CBK Boot camp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Mano Paul,[[Image:Isc logo.png|center|78x50px|link=http://www.isc2.org]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSCJ / SANS Course ID&amp;amp;nbsp;: DEV530''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_Essential_Secure_Coding_Java_JEE_GSSP Essential Secure Coding in Java / JEE]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSCJ / SANS Course ID&amp;amp;nbsp;: DEV530''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_Essential_Secure_Coding_Java_JEE_GSSP Essential Secure Coding in Java / JEE]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DWPT / SANS Course ID&amp;amp;nbsp;: DEV538''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_WebApp_Pentesting_handsOn_immersion Web Application Pen Testing Hands-On Immersion]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DWPT / SANS Course ID&amp;amp;nbsp;: DEV538''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_WebApp_Pentesting_handsOn_immersion Web Application Pen Testing Hands-On Immersion]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSAB / SANS Course ID&amp;amp;nbsp;: AUD429''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_IT_Security_Audit_Bootcamp IT Security Audit Essentials Bootcamp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSAB / SANS Course ID&amp;amp;nbsp;: AUD429''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_IT_Security_Audit_Bootcamp IT Security Audit Essentials Bootcamp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Venue  ====&lt;br /&gt;
&lt;br /&gt;
Four Days Event is planned out at: &lt;br /&gt;
&lt;br /&gt;
[http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza,]&amp;lt;br&amp;gt;Site - 2, Sector - 29, &amp;lt;br&amp;gt;Gurgaon-122001 (National Capital Region), India&amp;lt;br&amp;gt;Hotel Front Desk: 91-124-4534000&amp;lt;br&amp;gt;Hotel Fax: 91-124-4304800&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | '''Co-Sponsor &amp;quot;Leadership Summit 2009&amp;quot;'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | '''CTF&amp;amp;nbsp;(Capture The Flag) Sponsor'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | '''Education &amp;amp;nbsp;Partner'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:20th green stacked.png|center|ISC2|link=http://www.isc2.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
| [[Image:Appin.jpg|center|link=http://www.appinsecurity.com]]&amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
| [[Image:BRIP-Logo.jpg|center|link=http://www.brip.co.in]]&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
| [[Image:Beyond-logo_large.jpg|Left|link=http://www.www.beyondsecurity.com]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Associate Sponsors'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;90&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Media Partners'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Supporters'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Torridn.jpg|center|link=http://www.torridnetworks.com]] &lt;br /&gt;
| [[Image:SSecurity_india_small.gif‎ |center|link=http://www.searchsecurity.in]]&lt;br /&gt;
| [[Image:HITB.jpg|center|link=http://conference.hitb.org]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:SecurityCompass.JPG|center|link=http://www.securitycompass.com]] &lt;br /&gt;
| [[Image:HNS-web.jpg|center|link=http://www.net-security.org]] &lt;br /&gt;
| [[Image:Sector.jpg|center|link=http://www.sector.ca]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! valign=&amp;quot;baseline&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| [[Image:Infosecurity.jpg|center|link=http://www.infosecuritymagz.com]] &amp;lt;br&amp;gt;&lt;br /&gt;
| [[Image:Clubhack.gif|center]]&amp;lt;br&amp;gt;[[Image:Eventavenue Logo.jpg|center|link=https://www.eventavenue.com]]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| [[Image:Itmagz.jpg|center]]&amp;amp;nbsp;[[Image:Electronicsf.jpg|center|link=http://www.electronicsforu.com]] &lt;br /&gt;
| [[Image:Crowne plaza.jpg|center|link=http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
==== Hotel &amp;amp; Travel  ====&lt;br /&gt;
&lt;br /&gt;
== Hotel Stay &amp;amp; Travel Information  ==&lt;br /&gt;
&lt;br /&gt;
To help our valued delegates with Hotel and Travel services, we have negotiated with some of the best and Budget Category Guest houses in Gurgaon that are located within a radius of 3 - 4 Kms from the venue.&lt;br /&gt;
&lt;br /&gt;
Limited cheaper accommodation is available near the venue hotel in budget hotels/apartments area. The tariff of these hotels ranges from Rs.2000 onwards per room night (inclusive of Room Rent, Breakfast and Luxury Tax).  Interested delegates / students can send a formal request for the desired accommodations and dates to our official travel agent.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;OFFICIAL TRAVEL AGENT&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dreamz conference Management Pvt.Ltd&amp;lt;/b&amp;gt; will look after your hotel accommodation in Gurgaon and New Delhi, pre &amp;amp; post conference tours / travel needs in India for delegates and visitors independently. If you wish to go for sightseeing tour within New Delhi and around it to places like Agra, Jaipur, Rajasthan etc. However, we would encourage you to make early bookings which will be done on “first – come - first service” basis and let us know of your interest, since that would ultimately work in your favour. Early reservation is strongly recommended as November being a high demand period for hotels in Gurgaon.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
For further details please contact:&lt;br /&gt;
&lt;br /&gt;
DREAMZ CONFERENCE MANAGEMENT PVT.LTD&lt;br /&gt;
&lt;br /&gt;
406, Ansal’s Majestic Tower, Vikas Puri, New Delhi – 110018&lt;br /&gt;
&lt;br /&gt;
Tel: 91 – 11 – 41586401, 402, Fax: 91 – 11 – 41586400&lt;br /&gt;
&lt;br /&gt;
Email: info@dreamztravel.net / dreamztravelindia@yahoo.com&lt;br /&gt;
&lt;br /&gt;
Website: www.dreamztravel.net&lt;br /&gt;
&lt;br /&gt;
Contact Person: Jitin Batra ( +91 9810558569 )&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==== Capture the Flag  ====&lt;br /&gt;
&lt;br /&gt;
== HackHunt 2009  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;India's foremost Hacking Challenge &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Your Shot to the Title of India's best hacker along with Prize money of more than &amp;lt;b&amp;gt;Rs 150,000&amp;lt;/b&amp;gt; up for grabs!&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Search for India’s Best Ethical Hacker &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
HackHunt is India’s leading hacking competition and aims at awarding the best ethical hackers in the country. The competition is brought to you by Appin Security Group, a leading Information Security and Ethical Hacking Company and Securitybyte, a global Information Security Conference Company. &lt;br /&gt;
&lt;br /&gt;
The competition will be conducted in 3 phases. The 1st two rounds will be online and the 3rd and final round will take place at“Securitybyte &amp;amp; OWASP Appsec Asia 2009” on November 17, 2009at Crowne Plaza, Gurgaon. &lt;br /&gt;
&lt;br /&gt;
Level 1 – Knowledge Check&lt;br /&gt;
All the participants will be answering a quiz and based on the score top 10% will be shortlisted to 2nd round.&lt;br /&gt;
&lt;br /&gt;
Level 2 – Skill Check&lt;br /&gt;
This stage will require an attacker to get to the final FLAG file which he/she would need to register for the event.&lt;br /&gt;
&lt;br /&gt;
Level 3 – Final Round&lt;br /&gt;
This stage will require the attackers to exploit a pre-announced SSID which has WPA (or wpa 2).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To participate and for more details visit website :- http://www.hackerscouncil.org/&lt;br /&gt;
&lt;br /&gt;
== PacketWars  ==&lt;br /&gt;
&amp;lt;b&amp;gt;First time in India brought to you by Securitybyte! &amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;                                              &lt;br /&gt;
About PacketWars&lt;br /&gt;
&lt;br /&gt;
PacketWars is an intense, real-time information warfare simulation. Unlike other “capture the flag” games, the battlegrounds featured in PacketWars use the same software and hardware you would encounter in the real world.&lt;br /&gt;
&lt;br /&gt;
PacketWars is designed to operate like a sport. Think Formula One Racing meets professional golf with a dash of Ultimate Fighting thrown in for good measure. Serious fun!&lt;br /&gt;
&lt;br /&gt;
Visit http://packetwars.com/ for more details.&lt;br /&gt;
How To Play?&lt;br /&gt;
&lt;br /&gt;
PacketWars is a Sport like nothing you have ever experienced! Games known as “BATTLES” pit individual players and teams against each other in a race to achieve defined objectives.&lt;br /&gt;
&lt;br /&gt;
The rules of engagement are simple:&lt;br /&gt;
- Illegal activity of any kind is prohibited&lt;br /&gt;
- Protect yourself at all times&lt;br /&gt;
- Battles are designed to be of a low, medium or high difficulty level based on the battle objectives and battle duration&lt;br /&gt;
- Primary, Secondary and Tertiary objectives are defined and assigned points based on difficulty&lt;br /&gt;
- Battles have time limits and other defined constraints&lt;br /&gt;
- Constraints are sometimes known to the combatants and other times are not&lt;br /&gt;
- Anything that is not expressly prohibited is allowed&lt;br /&gt;
- Points are awarded for FLARE&lt;br /&gt;
&lt;br /&gt;
Equipment Needed:&lt;br /&gt;
- Most combants use a notebook and a BackTrack CD however you are only limited by your imagination and bank account&lt;br /&gt;
- You need a battle field and a PacketMaster…Oh yeah, skillz come in handy also!How To Play&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b.How can I participate?&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
PacketWars to be held at the Hotel Crowne Plaza, Gurgaon on Nov 17 &amp;amp; Nov 18, 2009. Participation is FREE! Schedule will be announced soon.&lt;br /&gt;
&lt;br /&gt;
== WebWar III  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;About&amp;lt;/b&amp;gt;&lt;br /&gt;
Hackers attack, coders defend, when you get them together you end up with Web War III. WWIII is designed to put your Web Application attack and defense skills to the test.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Teams&amp;lt;/b&amp;gt;&lt;br /&gt;
Each team consists of two players, an attacker and a defender. The attacker would be capable of identifying Web Application Vulnerabilities (OWASP Top 10). The defender would be capable of writing secure Java code.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Game Format&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The game has two stages:&lt;br /&gt;
&lt;br /&gt;
Stage 1:&lt;br /&gt;
Each team is given a VM Ware image containing a web server hosting a vulnerable web application. During this stage each team identifies the vulnerabilities in their application.&lt;br /&gt;
They try to fix the identified vulnerabilities by making code changes.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Stage 2:&lt;br /&gt;
The IP addresses of the Web Server's of all the teams is announced.&lt;br /&gt;
Each team looks for vulnerabilities in the Web Applications of the other teams.&lt;br /&gt;
Vulnerabilities found on the opponents' application get positive points.&lt;br /&gt;
Vulnerabilities found by the opponents on your application get negative points.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Team with the highest points at the end of Stage 2 wins.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Tools and Equipments&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Each team should bring their own laptop with VM Ware installed.&lt;br /&gt;
The attacker can use any tools they bring.&lt;br /&gt;
The applications come with ESAPI to help the defenders fix the code quicker.&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
==== Leadership Summit 2009  ====&lt;br /&gt;
&amp;lt;b&amp;gt;India's top technology thought leaders coming together to discuss &amp;quot;Security concerns in off-shoring&amp;quot;&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Honored Guests&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
-Honorable Ex-President of India, Dr. A.P.J Abdul Kalam to inaugrate the Leadership Summit 2009.&amp;lt;br&amp;gt;&lt;br /&gt;
-Prof. Howard A. Schmidt(Advisor, NIST; Former Vice Chair - President’s Critical Infrastructure Board; Former Special Advisor – Cyberspace Security for White House)&amp;lt;br&amp;gt;&lt;br /&gt;
-Mr. Hord Tipton, Executive Director (ISC)2&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;About the Event&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
An elite gathering of 200 technology leaders, decision makers &amp;amp; InfoSec experts from leading service providers, government agencies and various industry verticals.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Two hours of panel discussions between three panels of 12 distinguished industry experts representing outsourcing companies, service providers and the regulatory bodies.  Panel discussions will be followed by networking dinner &amp;amp; cocktails.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Prof Howard A. Schmidt (Advisor, NIST; Former Vice Chair - President’s Critical Infrastructure Board; Former Special Advisor – Cyberspace Security for White House) will facilitate the panel discussions. Thought leaders participating in the panel discussions are:&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Outsourcing Organizations&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Raghavendra Vaidya, CIO - GE Capital India&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. CRN Vairavelu, VP - Ford Technology Services India&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Pankaj Agrawal, CISO - Aircel Limited&amp;lt;br&amp;gt;&lt;br /&gt;
TBD&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Service Providers&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Terry Thomas, Partner - Ernst &amp;amp; Young&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Debashis Ghosh, Head (LS&amp;amp;H ISU) - Tata Consultancy Services&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Sunil Gujral, EVP &amp;amp; CTO - Quatrro&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Sunil Goyal, COO - Sopra group&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Regulatory Bodies&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Dr. Kamlesh Bajaj, CEO - DSCI (a NASSCOM initiative)&amp;lt;br&amp;gt;&lt;br /&gt;
Dr. Gulshan Rai, Director - CERT-in&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Hord Tipton, Executive Director - ISC2 (ex CIO, US Department of Interior)&amp;lt;br&amp;gt;&lt;br /&gt;
Mr. Vakul Sharma, Lawyer - Supreme Court&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The event is exclusive to industry leaders and is by private invitation only. If you are interested in attending the event, please email your business card to info@securitybyte.org This e-mail address is being protected from spambots.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Venue - Hotel Crowne Plaza, Gurgaon | Timings - 5:30PM - 9:00PM&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
Please contact [http://www.owasp.org/index.php/Category:India#OWASP_India_Co-Chairs Chair - OWASP India] for sponsorship opportunities. &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Category:India Category: OWASP India]&lt;/div&gt;</summary>
		<author><name>Puneetm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SecurityByte_and_OWASP_Asia_AppSec_Conference_2009&amp;diff=72782</id>
		<title>SecurityByte and OWASP Asia AppSec Conference 2009</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SecurityByte_and_OWASP_Asia_AppSec_Conference_2009&amp;diff=72782"/>
				<updated>2009-11-07T16:04:09Z</updated>
		
		<summary type="html">&lt;p&gt;Puneetm: /* Two Day Trainings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:SB OWASP 2009 banner.gif|center|link=http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009]]&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza] &amp;amp;#124; [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Registrations]&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*&amp;lt;b&amp;gt;Only Two Weeks Left ! Register Online today to grab your seat for India's best Security Conference.&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Registrations Click Here]''' for more information.&lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
Securitybyte &amp;amp;amp; OWASP are proud to welcome you to the annual international information security conference – Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009, Nov 17th through Nov 20th in Delhi &amp;amp;amp; NCR, India. &lt;br /&gt;
&lt;br /&gt;
This is a landmark event, as both Securitybyte and OWASP join hands to present India’s largest InfoSec event with world renowned and most regarded international speakers. &lt;br /&gt;
&lt;br /&gt;
Securitybye &amp;amp;amp; OWASP AppSec Asia Conference 2009 will be held at [http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza, Gurgaon, NCR, India.] on 17th November through 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Security Researchers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Penetration Testers &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*IT Security Professionals &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
&lt;br /&gt;
==== About  ====&lt;br /&gt;
&lt;br /&gt;
== About Conference  ==&lt;br /&gt;
&lt;br /&gt;
Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel conference talks to be conducted in 3 separate halls for two days i.e . 17th &amp;amp;amp; 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular talk. Conference talks are being delivered by world renowned and most regarded speakers from around the world. &lt;br /&gt;
&lt;br /&gt;
== About Trainings  ==&lt;br /&gt;
&lt;br /&gt;
Two days post-conference are dedicated towards best-of-breed trainings being conducted in association with SANS, ISC2 and other organizations. Trainings tracks have been made available as One-Day tracks and Two-Day tracks scheduled for 19th &amp;amp;amp; 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
==== Registrations  ====&lt;br /&gt;
&lt;br /&gt;
== [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Registration] is now open!  ==&lt;br /&gt;
&lt;br /&gt;
=== You can register [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 here]  ===&lt;br /&gt;
&lt;br /&gt;
*[http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Click Here] for Online Registrations. &lt;br /&gt;
*[http://securitybyte.org/index.php/register.html Click Here] for Offline Registrations.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Please check out our Exclusive Discount Offer, available Starting October 6th - 15th, 2009. &amp;quot;SAVE BIG NOW !&amp;quot;&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''''The below pricing reflects the Standard Registration Prices .''''' &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Two Days of Conference (17th and 18th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.8,500/- INR &lt;br /&gt;
| General Public&lt;br /&gt;
|-&lt;br /&gt;
| Two Days of Conference (17th and 18th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.5,000/- INR &lt;br /&gt;
| Students&lt;br /&gt;
|-&lt;br /&gt;
| Two-Day Training Tracks (19th and 20th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.25,000/- INR&lt;br /&gt;
|-&lt;br /&gt;
| One-Day Training Tracks (19th OR 20th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.12,500/- INR&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;** Service Tax @ 10.3% will be charged extra.&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;ISC2&amp;lt;/b&amp;gt; Members can avail a Special 15% discount on Conference &amp;amp; Training Registration.&lt;br /&gt;
(Please provide your ISC2 Certification ID number to avail the above Discount)&lt;br /&gt;
For Registrations contact us at registrations@securitybyte.org&lt;br /&gt;
== Exclusive Offers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;- Group / Team Discounts available: Kindly contact us at registrations@securitybyte.org&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Special University Student discount&amp;lt;/b&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
- University Students can register for two days of conference for just Rs. 5000 (including taxes)&amp;lt;br&amp;gt;&lt;br /&gt;
- Special 15 % Discounts for Training registration&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Trainings Click here for details on the training courses that are available.]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Who Should Attend Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009: ==&lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Security Researchers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Penetration Testers &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*IT Security Professionals &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;For student discount, attendees must present proof of enrollment when picking up your badge. &lt;br /&gt;
&lt;br /&gt;
==== Schedule  ====&lt;br /&gt;
&lt;br /&gt;
Three parallel conference talks are scheduled for 17th &amp;amp;amp; 18th November 2009 in three different halls. Training tracks have been divided in one-day tracks scheduled for 19th or 20th November 2009 and two-day tracks those are schedule to continue for two days both on 19th &amp;amp;amp; 20th November 2009. Follow the tabs to learn the details on both conference and trainings. &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Conference Click here] to view the '''Conference Schedule''' for 17th &amp;amp;amp; 18th November 2009.&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Trainings Click here] to view '''Training Schedule''' on 19th &amp;amp;amp; 20th November 2009.&lt;br /&gt;
&lt;br /&gt;
==== Conference  ====&lt;br /&gt;
&lt;br /&gt;
== Two Days Conference  ==&lt;br /&gt;
&lt;br /&gt;
Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel conference talks to be conducted in 3 separate halls for two days i.e . 17th &amp;amp;amp; 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular talk. Conference talks are being delivered by world renowned and most regarded speakers from around the world. Below is the detailed schedule for the two days of conference.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 1 - 17th Nov, 2009'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Where&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - I''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - II''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - III'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Who&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Researchers &amp;amp;amp; Enthusiasts)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Auditors, Developers, QA teams, Architects)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Leaders, Managers, C&amp;amp;amp;S professionals)'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 8:00 AM - 9:00 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Registrations'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Schedule''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 9:00 AM - 10:30 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Keynote'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:30 AM - 11:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea Break'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 11:00 AM - 12:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | How To Blackbox Test Almost Anything&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Aviram Jenik, Beyond Security&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | The International State of Cyber Security, Risk reduction in a high threat world&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Prof. Howard A. Schmidt, Former Cyber Security Advisor to the White house&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:00 PM - 1:00 PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Client Side Hacks&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Dino Covotsos &amp;amp; Charleton Smith, Telspace Systems&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Risk Based Penetration testing&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | K. K. Mookhey, Founder &amp;amp;amp; Principal Consultant, NII Consulting&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Applications, the source for CyberThreats&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Mano Paul,Software Assurance Advisor,(ISC)2&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 1:00PM - 2:00PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Lunch'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 2:00 PM - 3:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Exploiting Firefox Extensions&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Roberto Suggi Liverani, Security-Assessment.com&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Threat Modeling&amp;lt;br&amp;gt;&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Varun Sharma,Microsoft India&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Enterprise Application Security Program&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 3:00 PM - 4:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | SQL Server Forensics 2.0&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Kevvie Fowler, TELUS &amp;amp;amp; Ringzero&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | OWASP SAMM&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Pravir Chandra, Director of Strategic Services,&amp;lt;br&amp;gt;Fortify&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Business Case - Risk Management/Compliance at leading Education Group AMITY (Rapid Fire: 30 Min talk)&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Dr. JS Sodhi, CIO, AMITY Group&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 4:00 PM - 5:00 PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Ownage 2.0 - How to own the World&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Saumil Shah, NetSquare Solutions&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | &amp;quot;Do you want to play a Game&amp;quot; - Game theory and Cyberwar&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Bryan K. Fite, HackSecKlahn&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Usability and Privacy in Security&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Dr. Ponnurangam Kumaraguru, Asst. Professor - IIIT (Rapid Fire : 30 Min talk)&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 5:00 PM - 6:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea and Snacks on the Exhibition floor'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 7:00 PM - 10:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''CXO Event (Exclusive by invitation only) - Information Security Concerns for Offshoring'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 2 - 18th Nov, 2009'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Where&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - I''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - II''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - III'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Who&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Researchers &amp;amp;amp; Enthusiasts)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Auditors, Developers, QA teams, Architects)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Leaders, Managers, C&amp;amp;amp;S professionals)'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 8:00 AM - 9:00 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Registrations'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 9:00 AM - 10:00 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Round Table with Speakers / Industry Panel - &amp;quot;Security Today &amp;amp; Tomorrow''''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:00 AM - 10:30 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea Break'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Schedule''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:30 AM - 11:30&amp;amp;nbsp;AM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | All your Packets belong to us&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Daniel Mende, Security Researcher, ERNW&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | SANS Dshield Webhoneypot Project&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Jason Lam, Independent Security Researcher&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Critical Infrastructure Security “Danger Without borders” &amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | John Bumgarner, US Cyber Consequence Unit (USCCU)&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 11:30 AM - 12:30 PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Hacking Oracle From Web&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Sid, Independent Security Researcher&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Testing JSON Applications For Security Holes&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Aviram Jenik, Beyond Security&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Critical Infrastructure Security “Danger Without borders” &amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | John Bumgarner, US Cyber Consequence Unit (USCCU)&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:30PM - 1:30PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Lunch'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 1:30 PM&amp;amp;nbsp;- 2:30 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Lust 2.0 – Desire for free WiFi and the threat of the Imposter &amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Lava Kumar Kuppan, Independent Security Researcher&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Cloud Hacking - Distributed Attacks &amp;amp; Exploits&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Shreeraj Shah, Blueinfy Solutions&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Cedric Blancher, EADS Innovation Works&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 2:30 PM - 3:30&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Xprobe3 - What's New? Going Application Level&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Fyodor Yarochkin, Armorize&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Nitin Kumar/Vipin Kumar, Independent Security Researchers, NVlabs&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Behind the Scenes at Microsoft Security Response Center&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Dave Midturi,MSRC, Microsoft Corp.&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 3:30PM - 4:00PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea Break'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 4:00 PM - 5:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 5:00 PM - 6:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Closing Keynotes - &amp;quot;OWASP &amp;amp; Securitybyte&amp;quot;'''&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Trainings  ====&lt;br /&gt;
&lt;br /&gt;
== Two Day Trainings  ==&lt;br /&gt;
&lt;br /&gt;
Two days post-conference are dedicated towards best-of-breed trainings being conducted in association with SANS, ISC2 and other organizations. Trainings tracks have been made available as One-Day tracks and Two-Day tracks scheduled for 19th &amp;amp;amp; 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 1 - 19th Nov, 2009'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 2 - 20th Nov, 2009'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course ID''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course Duration''' &lt;br /&gt;
(# of Days) &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course Title''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Instructor''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course ID''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course Duration''' &lt;br /&gt;
(# of Days) &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course Title''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Instructor'''&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;30&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''One Day Training Tracks'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DHSO''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Oracle_Hacking_and_security ORACLE Hacking &amp;amp;amp; Security]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Sumit Sidharth,[[Image:Sb logo.png|center|78x50px|link=http://www.securitybyte.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DAWH''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Advanced_Web_Hacking Advanced Web Hacking -Securing AJAX, RIA &amp;amp;amp; SOA]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Shreeraj Shah [[Image:Blueinfy logo.png|center|link=http://www.blueinfy.com]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DAFT'''&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Advanced_Forensic_Techniques Advanced Forensics Techniques]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Dr. Chandrasekhar Umapathy,[[Image:Sb logo.png|center|78x50px|link=http://www.securitybyte.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DIAT'''&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/InDepth_Assessment_Techniques In-depth Assessment Techniques: Design, Code, and Runtime]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Pravir Chandra, &lt;br /&gt;
&lt;br /&gt;
[[Image:Fortify.jpg|center|93x31px|link=http://www.fortify.com]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;30&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Two Day Training Tracks'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DNST''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Building_Advanced_Network_Security_tools Building advanced Network Security Tools]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Daniel Mende,[[Image:Ernw logo.png|center]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DNST''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Building_Advanced_Network_Security_tools Building advanced Network Security Tools]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Daniel Mende,[[Image:Ernw logo.png|center]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DCBC''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/ISC2_CSSLP_CBK_Bootcamp (ISC)2 CSSLP CBK Boot camp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Mano Paul,[[Image:Isc logo.png|center|78x50px|link=http://www.isc2.org]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DCBC''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/ISC2_CSSLP_CBK_Bootcamp (ISC)2 CSSLP CBK Boot camp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Mano Paul,[[Image:Isc logo.png|center|78x50px|link=http://www.isc2.org]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSCJ / SANS Course ID&amp;amp;nbsp;: DEV530''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_Essential_Secure_Coding_Java_JEE_GSSP Essential Secure Coding in Java / JEE]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSCJ / SANS Course ID&amp;amp;nbsp;: DEV530''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_Essential_Secure_Coding_Java_JEE_GSSP Essential Secure Coding in Java / JEE]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DWPT / SANS Course ID&amp;amp;nbsp;: DEV538''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_WebApp_Pentesting_handsOn_immersion Web Application Pen Testing Hands-On Immersion]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DWPT / SANS Course ID&amp;amp;nbsp;: DEV538''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_WebApp_Pentesting_handsOn_immersion Web Application Pen Testing Hands-On Immersion]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSAB / SANS Course ID&amp;amp;nbsp;: AUD429''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_IT_Security_Audit_Bootcamp IT Security Audit Essentials Bootcamp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSAB / SANS Course ID&amp;amp;nbsp;: AUD429''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_IT_Security_Audit_Bootcamp IT Security Audit Essentials Bootcamp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Venue  ====&lt;br /&gt;
&lt;br /&gt;
Four Days Event is planned out at: &lt;br /&gt;
&lt;br /&gt;
[http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza,]&amp;lt;br&amp;gt;Site - 2, Sector - 29, &amp;lt;br&amp;gt;Gurgaon-122001 (National Capital Region), India&amp;lt;br&amp;gt;Hotel Front Desk: 91-124-4534000&amp;lt;br&amp;gt;Hotel Fax: 91-124-4304800&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | '''Co-Sponsor &amp;quot;Leadership Summit 2009&amp;quot;'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | '''CTF&amp;amp;nbsp;(Capture The Flag) Sponsor'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | '''Education &amp;amp;nbsp;Partner'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:20th green stacked.png|center|ISC2|link=http://www.isc2.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
| [[Image:Appin.jpg|center|link=http://www.appinsecurity.com]]&amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
| [[Image:BRIP-Logo.jpg|center|link=http://www.brip.co.in]]&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
| [[Image:Beyond-logo_large.jpg|Left|link=http://www.www.beyondsecurity.com]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Associate Sponsors'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;90&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Media Partners'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Supporters'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Torridn.jpg|center|link=http://www.torridnetworks.com]] &lt;br /&gt;
| [[Image:SSecurity_india_small.gif‎ |center|link=http://www.searchsecurity.in]]&lt;br /&gt;
| [[Image:HITB.jpg|center|link=http://conference.hitb.org]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:SecurityCompass.JPG|center|link=http://www.securitycompass.com]] &lt;br /&gt;
| [[Image:HNS-web.jpg|center|link=http://www.net-security.org]] &lt;br /&gt;
| [[Image:Sector.jpg|center|link=http://www.sector.ca]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! valign=&amp;quot;baseline&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| [[Image:Infosecurity.jpg|center|link=http://www.infosecuritymagz.com]] &amp;lt;br&amp;gt;&lt;br /&gt;
| [[Image:Clubhack.gif|center]]&amp;lt;br&amp;gt;[[Image:Eventavenue Logo.jpg|center|link=https://www.eventavenue.com]]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| [[Image:Itmagz.jpg|center]]&amp;amp;nbsp;[[Image:Electronicsf.jpg|center|link=http://www.electronicsforu.com]] &lt;br /&gt;
| [[Image:Crowne plaza.jpg|center|link=http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
==== Hotel &amp;amp; Travel  ====&lt;br /&gt;
&lt;br /&gt;
== Hotel Stay &amp;amp; Travel Information  ==&lt;br /&gt;
&lt;br /&gt;
To help our valued delegates with Hotel and Travel services, we have negotiated with some of the best and Budget Category Guest houses in Gurgaon that are located within a radius of 3 - 4 Kms from the venue.&lt;br /&gt;
&lt;br /&gt;
Limited cheaper accommodation is available near the venue hotel in budget hotels/apartments area. The tariff of these hotels ranges from Rs.2000 onwards per room night (inclusive of Room Rent, Breakfast and Luxury Tax).  Interested delegates / students can send a formal request for the desired accommodations and dates to our official travel agent.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;OFFICIAL TRAVEL AGENT&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dreamz conference Management Pvt.Ltd&amp;lt;/b&amp;gt; will look after your hotel accommodation in Gurgaon and New Delhi, pre &amp;amp; post conference tours / travel needs in India for delegates and visitors independently. If you wish to go for sightseeing tour within New Delhi and around it to places like Agra, Jaipur, Rajasthan etc. However, we would encourage you to make early bookings which will be done on “first – come - first service” basis and let us know of your interest, since that would ultimately work in your favour. Early reservation is strongly recommended as November being a high demand period for hotels in Gurgaon.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
For further details please contact:&lt;br /&gt;
&lt;br /&gt;
DREAMZ CONFERENCE MANAGEMENT PVT.LTD&lt;br /&gt;
&lt;br /&gt;
406, Ansal’s Majestic Tower, Vikas Puri, New Delhi – 110018&lt;br /&gt;
&lt;br /&gt;
Tel: 91 – 11 – 41586401, 402, Fax: 91 – 11 – 41586400&lt;br /&gt;
&lt;br /&gt;
Email: info@dreamztravel.net / dreamztravelindia@yahoo.com&lt;br /&gt;
&lt;br /&gt;
Website: www.dreamztravel.net&lt;br /&gt;
&lt;br /&gt;
Contact Person: Jitin Batra ( +91 9810558569 )&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
Please contact [http://www.owasp.org/index.php/Category:India#OWASP_India_Co-Chairs Chair - OWASP India] for sponsorship opportunities. &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Category:India Category: OWASP India]&lt;/div&gt;</summary>
		<author><name>Puneetm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SecurityByte_and_OWASP_Asia_AppSec_Conference_2009&amp;diff=72491</id>
		<title>SecurityByte and OWASP Asia AppSec Conference 2009</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SecurityByte_and_OWASP_Asia_AppSec_Conference_2009&amp;diff=72491"/>
				<updated>2009-10-31T14:03:52Z</updated>
		
		<summary type="html">&lt;p&gt;Puneetm: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:SB OWASP 2009 banner.gif|center|link=http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009]]&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza] &amp;amp;#124; [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Registrations]&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*&amp;lt;b&amp;gt;Only Two Weeks Left ! Register Online today to grab your seat for India's best Security Conference.&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Registrations Click Here]''' for more information.&lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
Securitybyte &amp;amp;amp; OWASP are proud to welcome you to the annual international information security conference – Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009, Nov 17th through Nov 20th in Delhi &amp;amp;amp; NCR, India. &lt;br /&gt;
&lt;br /&gt;
This is a landmark event, as both Securitybyte and OWASP join hands to present India’s largest InfoSec event with world renowned and most regarded international speakers. &lt;br /&gt;
&lt;br /&gt;
Securitybye &amp;amp;amp; OWASP AppSec Asia Conference 2009 will be held at [http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza, Gurgaon, NCR, India.] on 17th November through 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Security Researchers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Penetration Testers &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*IT Security Professionals &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
&lt;br /&gt;
==== About  ====&lt;br /&gt;
&lt;br /&gt;
== About Conference  ==&lt;br /&gt;
&lt;br /&gt;
Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel conference talks to be conducted in 3 separate halls for two days i.e . 17th &amp;amp;amp; 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular talk. Conference talks are being delivered by world renowned and most regarded speakers from around the world. &lt;br /&gt;
&lt;br /&gt;
== About Trainings  ==&lt;br /&gt;
&lt;br /&gt;
Two days post-conference are dedicated towards best-of-breed trainings being conducted in association with SANS, ISC2 and other organizations. Trainings tracks have been made available as One-Day tracks and Two-Day tracks scheduled for 19th &amp;amp;amp; 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
==== Registrations  ====&lt;br /&gt;
&lt;br /&gt;
== [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Registration] is now open!  ==&lt;br /&gt;
&lt;br /&gt;
=== You can register [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 here]  ===&lt;br /&gt;
&lt;br /&gt;
*[http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Click Here] for Online Registrations. &lt;br /&gt;
*[http://securitybyte.org/index.php/register.html Click Here] for Offline Registrations.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Please check out our Exclusive Discount Offer, available Starting October 6th - 15th, 2009. &amp;quot;SAVE BIG NOW !&amp;quot;&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''''The below pricing reflects the Standard Registration Prices .''''' &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Two Days of Conference (17th and 18th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.8,500/- INR &lt;br /&gt;
| General Public&lt;br /&gt;
|-&lt;br /&gt;
| Two Days of Conference (17th and 18th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.5,000/- INR &lt;br /&gt;
| Students&lt;br /&gt;
|-&lt;br /&gt;
| Two-Day Training Tracks (19th and 20th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.25,000/- INR&lt;br /&gt;
|-&lt;br /&gt;
| One-Day Training Tracks (19th OR 20th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.12,500/- INR&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;** Service Tax @ 10.3% will be charged extra.&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;ISC2&amp;lt;/b&amp;gt; Members can avail a Special 15% discount on Conference &amp;amp; Training Registration.&lt;br /&gt;
(Please provide your ISC2 Certification ID number to avail the above Discount)&lt;br /&gt;
For Registrations contact us at registrations@securitybyte.org&lt;br /&gt;
== Exclusive Offers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;- Group / Team Discounts available: Kindly contact us at registrations@securitybyte.org&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Special University Student discount&amp;lt;/b&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
- University Students can register for two days of conference for just Rs. 5000 (including taxes)&amp;lt;br&amp;gt;&lt;br /&gt;
- Special 15 % Discounts for Training registration&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Trainings Click here for details on the training courses that are available.]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Who Should Attend Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009: ==&lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Security Researchers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Penetration Testers &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*IT Security Professionals &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;For student discount, attendees must present proof of enrollment when picking up your badge. &lt;br /&gt;
&lt;br /&gt;
==== Schedule  ====&lt;br /&gt;
&lt;br /&gt;
Three parallel conference talks are scheduled for 17th &amp;amp;amp; 18th November 2009 in three different halls. Training tracks have been divided in one-day tracks scheduled for 19th or 20th November 2009 and two-day tracks those are schedule to continue for two days both on 19th &amp;amp;amp; 20th November 2009. Follow the tabs to learn the details on both conference and trainings. &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Conference Click here] to view the '''Conference Schedule''' for 17th &amp;amp;amp; 18th November 2009.&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Trainings Click here] to view '''Training Schedule''' on 19th &amp;amp;amp; 20th November 2009.&lt;br /&gt;
&lt;br /&gt;
==== Conference  ====&lt;br /&gt;
&lt;br /&gt;
== Two Days Conference  ==&lt;br /&gt;
&lt;br /&gt;
Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel conference talks to be conducted in 3 separate halls for two days i.e . 17th &amp;amp;amp; 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular talk. Conference talks are being delivered by world renowned and most regarded speakers from around the world. Below is the detailed schedule for the two days of conference.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 1 - 17th Nov, 2009'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Where&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - I''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - II''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - III'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Who&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Researchers &amp;amp;amp; Enthusiasts)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Auditors, Developers, QA teams, Architects)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Leaders, Managers, C&amp;amp;amp;S professionals)'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 8:00 AM - 9:00 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Registrations'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Schedule''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 9:00 AM - 10:30 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Keynote'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:30 AM - 11:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea Break'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 11:00 AM - 12:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | How To Blackbox Test Almost Anything&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Aviram Jenik, Beyond Security&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | The International State of Cyber Security, Risk reduction in a high threat world&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Prof. Howard A. Schmidt, Former Cyber Security Advisor to the White house&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:00 PM - 1:00 PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Client Side Hacks&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Dino Covotsos &amp;amp; Charleton Smith, Telspace Systems&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Risk Based Penetration testing&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | K. K. Mookhey, Founder &amp;amp;amp; Principal Consultant, NII Consulting&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Applications, the source for CyberThreats&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Mano Paul,Software Assurance Advisor,(ISC)2&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 1:00PM - 2:00PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Lunch'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 2:00 PM - 3:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Exploiting Firefox Extensions&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Roberto Suggi Liverani, Security-Assessment.com&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Threat Modeling&amp;lt;br&amp;gt;&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Varun Sharma,Microsoft India&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Enterprise Application Security Program&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 3:00 PM - 4:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | SQL Server Forensics 2.0&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Kevvie Fowler, TELUS &amp;amp;amp; Ringzero&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | OWASP SAMM&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Pravir Chandra, Director of Strategic Services,&amp;lt;br&amp;gt;Fortify&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Business Case - Risk Management/Compliance at leading Education Group AMITY (Rapid Fire: 30 Min talk)&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Dr. JS Sodhi, CIO, AMITY Group&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 4:00 PM - 5:00 PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Ownage 2.0 - How to own the World&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Saumil Shah, NetSquare Solutions&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | &amp;quot;Do you want to play a Game&amp;quot; - Game theory and Cyberwar&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Bryan K. Fite, HackSecKlahn&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Usability and Privacy in Security&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Dr. Ponnurangam Kumaraguru, Asst. Professor - IIIT (Rapid Fire : 30 Min talk)&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 5:00 PM - 6:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea and Snacks on the Exhibition floor'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 7:00 PM - 10:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''CXO Event (Exclusive by invitation only) - Information Security Concerns for Offshoring'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 2 - 18th Nov, 2009'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Where&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - I''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - II''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - III'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Who&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Researchers &amp;amp;amp; Enthusiasts)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Auditors, Developers, QA teams, Architects)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Leaders, Managers, C&amp;amp;amp;S professionals)'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 8:00 AM - 9:00 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Registrations'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 9:00 AM - 10:00 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Round Table with Speakers / Industry Panel - &amp;quot;Security Today &amp;amp; Tomorrow''''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:00 AM - 10:30 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea Break'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Schedule''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:30 AM - 11:30&amp;amp;nbsp;AM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | All your Packets belong to us&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Daniel Mende, Security Researcher, ERNW&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | SANS Dshield Webhoneypot Project&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Jason Lam, Independent Security Researcher&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Critical Infrastructure Security “Danger Without borders” &amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | John Bumgarner, US Cyber Consequence Unit (USCCU)&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 11:30 AM - 12:30 PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Hacking Oracle From Web&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Sid, Independent Security Researcher&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Testing JSON Applications For Security Holes&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Aviram Jenik, Beyond Security&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Critical Infrastructure Security “Danger Without borders” &amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | John Bumgarner, US Cyber Consequence Unit (USCCU)&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:30PM - 1:30PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Lunch'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 1:30 PM&amp;amp;nbsp;- 2:30 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Lust 2.0 – Desire for free WiFi and the threat of the Imposter &amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Lava Kumar Kuppan, Independent Security Researcher&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Cloud Hacking - Distributed Attacks &amp;amp; Exploits&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Shreeraj Shah, Blueinfy Solutions&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Cedric Blancher, EADS Innovation Works&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 2:30 PM - 3:30&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Xprobe3 - What's New? Going Application Level&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Fyodor Yarochkin, Armorize&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Nitin Kumar/Vipin Kumar, Independent Security Researchers, NVlabs&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Behind the Scenes at Microsoft Security Response Center&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Dave Midturi,MSRC, Microsoft Corp.&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 3:30PM - 4:00PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea Break'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 4:00 PM - 5:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 5:00 PM - 6:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Closing Keynotes - &amp;quot;OWASP &amp;amp; Securitybyte&amp;quot;'''&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Trainings  ====&lt;br /&gt;
&lt;br /&gt;
== Two Day Trainings  ==&lt;br /&gt;
&lt;br /&gt;
Two days post-conference are dedicated towards best-of-breed trainings being conducted in association with SANS, ISC2 and other organizations. Trainings tracks have been made available as One-Day tracks and Two-Day tracks scheduled for 19th &amp;amp;amp; 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 1 - 19th Nov, 2009'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 2 - 20th Nov, 2009'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course ID''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course Duration''' &lt;br /&gt;
(# of Days) &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course Title''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Instructor''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course ID''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course Duration''' &lt;br /&gt;
(# of Days) &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course Title''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Instructor'''&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;30&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''One Day Training Tracks'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DHSO''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Oracle_Hacking_and_security ORACLE Hacking &amp;amp;amp; Security]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Sumit Sidharth,[[Image:Sb logo.png|center|78x50px|link=http://www.securitybyte.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DAWH''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Advanced_Web_Hacking Advanced Web Hacking -Securing AJAX, RIA &amp;amp;amp; SOA]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Shreeraj Shah [[Image:Blueinfy logo.png|center|link=http://www.blueinfy.com]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DAFT'''&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Advanced_Forensic_Techniques Advanced Forensics Techniques]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Dr. Chandrasekhar Umapathy,[[Image:Sb logo.png|center|78x50px|link=http://www.securitybyte.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DIAT'''&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/InDepth_Assessment_Techniques In-depth Assessment Techniques: Design, Code, and Runtime]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Pravir Chandra, &lt;br /&gt;
&lt;br /&gt;
[[Image:Fortify.jpg|center|93x31px|link=http://www.fortify.com]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;30&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Two Day Training Tracks'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DBWH''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Hacking_bluetooth_and_wireless_101 Hacking Wireless &amp;amp;amp; Bluetooth 101]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Dino Covotsos /&amp;lt;br&amp;gt;Charlton Smith,[[Image:Telspace logo.png|center|76x50px]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DBWH''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Hacking_bluetooth_and_wireless_101 Hacking Wireless &amp;amp;amp; Bluetooth 101]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Dino Covotsos /&amp;lt;br&amp;gt;Charlton Smith,[[Image:Telspace logo.png|center|72x47px]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DNST''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Building_Advanced_Network_Security_tools Building advanced Network Security Tools]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Daniel Mende,[[Image:Ernw logo.png|center]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DNST''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Building_Advanced_Network_Security_tools Building advanced Network Security Tools]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Daniel Mende,[[Image:Ernw logo.png|center]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DCBC''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/ISC2_CSSLP_CBK_Bootcamp (ISC)2 CSSLP CBK Boot camp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Mano Paul,[[Image:Isc logo.png|center|78x50px|link=http://www.isc2.org]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DCBC''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/ISC2_CSSLP_CBK_Bootcamp (ISC)2 CSSLP CBK Boot camp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Mano Paul,[[Image:Isc logo.png|center|78x50px|link=http://www.isc2.org]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSCJ / SANS Course ID&amp;amp;nbsp;: DEV530''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_Essential_Secure_Coding_Java_JEE_GSSP Essential Secure Coding in Java / JEE]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSCJ / SANS Course ID&amp;amp;nbsp;: DEV530''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_Essential_Secure_Coding_Java_JEE_GSSP Essential Secure Coding in Java / JEE]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DWPT / SANS Course ID&amp;amp;nbsp;: DEV538''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_WebApp_Pentesting_handsOn_immersion Web Application Pen Testing Hands-On Immersion]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DWPT / SANS Course ID&amp;amp;nbsp;: DEV538''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_WebApp_Pentesting_handsOn_immersion Web Application Pen Testing Hands-On Immersion]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSAB / SANS Course ID&amp;amp;nbsp;: AUD429''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_IT_Security_Audit_Bootcamp IT Security Audit Essentials Bootcamp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSAB / SANS Course ID&amp;amp;nbsp;: AUD429''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_IT_Security_Audit_Bootcamp IT Security Audit Essentials Bootcamp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Venue  ====&lt;br /&gt;
&lt;br /&gt;
Four Days Event is planned out at: &lt;br /&gt;
&lt;br /&gt;
[http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza,]&amp;lt;br&amp;gt;Site - 2, Sector - 29, &amp;lt;br&amp;gt;Gurgaon-122001 (National Capital Region), India&amp;lt;br&amp;gt;Hotel Front Desk: 91-124-4534000&amp;lt;br&amp;gt;Hotel Fax: 91-124-4304800&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | '''Co-Sponsor &amp;quot;Leadership Summit 2009&amp;quot;'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | '''CTF&amp;amp;nbsp;(Capture The Flag) Sponsor'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | '''Education &amp;amp;nbsp;Partner'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:20th green stacked.png|center|ISC2|link=http://www.isc2.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
| [[Image:Appin.jpg|center|link=http://www.appinsecurity.com]]&amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
| [[Image:BRIP-Logo.jpg|center|link=http://www.brip.co.in]]&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
| [[Image:Beyond-logo_large.jpg|Left|link=http://www.www.beyondsecurity.com]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Associate Sponsors'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;90&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Media Partners'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Supporters'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Torridn.jpg|center|link=http://www.torridnetworks.com]] &lt;br /&gt;
| [[Image:SSecurity_india_small.gif‎ |center|link=http://www.searchsecurity.in]]&lt;br /&gt;
| [[Image:HITB.jpg|center|link=http://conference.hitb.org]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:SecurityCompass.JPG|center|link=http://www.securitycompass.com]] &lt;br /&gt;
| [[Image:HNS-web.jpg|center|link=http://www.net-security.org]] &lt;br /&gt;
| [[Image:Sector.jpg|center|link=http://www.sector.ca]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! valign=&amp;quot;baseline&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| [[Image:Infosecurity.jpg|center|link=http://www.infosecuritymagz.com]] &amp;lt;br&amp;gt;&lt;br /&gt;
| [[Image:Clubhack.gif|center]]&amp;lt;br&amp;gt;[[Image:Eventavenue Logo.jpg|center|link=https://www.eventavenue.com]]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| [[Image:Itmagz.jpg|center]]&amp;amp;nbsp;[[Image:Electronicsf.jpg|center|link=http://www.electronicsforu.com]] &lt;br /&gt;
| [[Image:Crowne plaza.jpg|center|link=http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
==== Hotel &amp;amp; Travel  ====&lt;br /&gt;
&lt;br /&gt;
== Hotel Stay &amp;amp; Travel Information  ==&lt;br /&gt;
&lt;br /&gt;
To help our valued delegates with Hotel and Travel services, we have negotiated with some of the best and Budget Category Guest houses in Gurgaon that are located within a radius of 3 - 4 Kms from the venue.&lt;br /&gt;
&lt;br /&gt;
Limited cheaper accommodation is available near the venue hotel in budget hotels/apartments area. The tariff of these hotels ranges from Rs.2000 onwards per room night (inclusive of Room Rent, Breakfast and Luxury Tax).  Interested delegates / students can send a formal request for the desired accommodations and dates to our official travel agent.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;OFFICIAL TRAVEL AGENT&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dreamz conference Management Pvt.Ltd&amp;lt;/b&amp;gt; will look after your hotel accommodation in Gurgaon and New Delhi, pre &amp;amp; post conference tours / travel needs in India for delegates and visitors independently. If you wish to go for sightseeing tour within New Delhi and around it to places like Agra, Jaipur, Rajasthan etc. However, we would encourage you to make early bookings which will be done on “first – come - first service” basis and let us know of your interest, since that would ultimately work in your favour. Early reservation is strongly recommended as November being a high demand period for hotels in Gurgaon.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
For further details please contact:&lt;br /&gt;
&lt;br /&gt;
DREAMZ CONFERENCE MANAGEMENT PVT.LTD&lt;br /&gt;
&lt;br /&gt;
406, Ansal’s Majestic Tower, Vikas Puri, New Delhi – 110018&lt;br /&gt;
&lt;br /&gt;
Tel: 91 – 11 – 41586401, 402, Fax: 91 – 11 – 41586400&lt;br /&gt;
&lt;br /&gt;
Email: info@dreamztravel.net / dreamztravelindia@yahoo.com&lt;br /&gt;
&lt;br /&gt;
Website: www.dreamztravel.net&lt;br /&gt;
&lt;br /&gt;
Contact Person: Jitin Batra ( +91 9810558569 )&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
Please contact [http://www.owasp.org/index.php/Category:India#OWASP_India_Co-Chairs Chair - OWASP India] for sponsorship opportunities. &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Category:India Category: OWASP India]&lt;/div&gt;</summary>
		<author><name>Puneetm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SecurityByte_and_OWASP_Asia_AppSec_Conference_2009&amp;diff=72490</id>
		<title>SecurityByte and OWASP Asia AppSec Conference 2009</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SecurityByte_and_OWASP_Asia_AppSec_Conference_2009&amp;diff=72490"/>
				<updated>2009-10-31T14:01:29Z</updated>
		
		<summary type="html">&lt;p&gt;Puneetm: /* Exclusive Offers */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:SB OWASP 2009 banner.gif|center|link=http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009]]&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza] &amp;amp;#124; [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Registrations]&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*Register between 6th - 15th October 2009 and get '''Complementary Return Air Flight''' from anywhere in India. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Registrations Click Here]''' for more information.&lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
Securitybyte &amp;amp;amp; OWASP are proud to welcome you to the annual international information security conference – Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009, Nov 17th through Nov 20th in Delhi &amp;amp;amp; NCR, India. &lt;br /&gt;
&lt;br /&gt;
This is a landmark event, as both Securitybyte and OWASP join hands to present India’s largest InfoSec event with world renowned and most regarded international speakers. &lt;br /&gt;
&lt;br /&gt;
Securitybye &amp;amp;amp; OWASP AppSec Asia Conference 2009 will be held at [http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza, Gurgaon, NCR, India.] on 17th November through 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Security Researchers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Penetration Testers &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*IT Security Professionals &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
&lt;br /&gt;
==== About  ====&lt;br /&gt;
&lt;br /&gt;
== About Conference  ==&lt;br /&gt;
&lt;br /&gt;
Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel conference talks to be conducted in 3 separate halls for two days i.e . 17th &amp;amp;amp; 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular talk. Conference talks are being delivered by world renowned and most regarded speakers from around the world. &lt;br /&gt;
&lt;br /&gt;
== About Trainings  ==&lt;br /&gt;
&lt;br /&gt;
Two days post-conference are dedicated towards best-of-breed trainings being conducted in association with SANS, ISC2 and other organizations. Trainings tracks have been made available as One-Day tracks and Two-Day tracks scheduled for 19th &amp;amp;amp; 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
==== Registrations  ====&lt;br /&gt;
&lt;br /&gt;
== [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Registration] is now open!  ==&lt;br /&gt;
&lt;br /&gt;
=== You can register [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 here]  ===&lt;br /&gt;
&lt;br /&gt;
*[http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Click Here] for Online Registrations. &lt;br /&gt;
*[http://securitybyte.org/index.php/register.html Click Here] for Offline Registrations.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Please check out our Exclusive Discount Offer, available Starting October 6th - 15th, 2009. &amp;quot;SAVE BIG NOW !&amp;quot;&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''''The below pricing reflects the Standard Registration Prices .''''' &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Two Days of Conference (17th and 18th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.8,500/- INR &lt;br /&gt;
| General Public&lt;br /&gt;
|-&lt;br /&gt;
| Two Days of Conference (17th and 18th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.5,000/- INR &lt;br /&gt;
| Students&lt;br /&gt;
|-&lt;br /&gt;
| Two-Day Training Tracks (19th and 20th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.25,000/- INR&lt;br /&gt;
|-&lt;br /&gt;
| One-Day Training Tracks (19th OR 20th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.12,500/- INR&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;** Service Tax @ 10.3% will be charged extra.&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;ISC2&amp;lt;/b&amp;gt; Members can avail a Special 15% discount on Conference &amp;amp; Training Registration.&lt;br /&gt;
(Please provide your ISC2 Certification ID number to avail the above Discount)&lt;br /&gt;
For Registrations contact us at registrations@securitybyte.org&lt;br /&gt;
== Exclusive Offers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;- Group / Team Discounts available: Kindly contact us at registrations@securitybyte.org&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Special University Student discount&amp;lt;/b&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
- University Students can register for two days of conference for just Rs. 5000 (including taxes)&amp;lt;br&amp;gt;&lt;br /&gt;
- Special 15 % Discounts for Training registration&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Trainings Click here for details on the training courses that are available.]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Who Should Attend Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009: ==&lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Security Researchers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Penetration Testers &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*IT Security Professionals &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;For student discount, attendees must present proof of enrollment when picking up your badge. &lt;br /&gt;
&lt;br /&gt;
==== Schedule  ====&lt;br /&gt;
&lt;br /&gt;
Three parallel conference talks are scheduled for 17th &amp;amp;amp; 18th November 2009 in three different halls. Training tracks have been divided in one-day tracks scheduled for 19th or 20th November 2009 and two-day tracks those are schedule to continue for two days both on 19th &amp;amp;amp; 20th November 2009. Follow the tabs to learn the details on both conference and trainings. &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Conference Click here] to view the '''Conference Schedule''' for 17th &amp;amp;amp; 18th November 2009.&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Trainings Click here] to view '''Training Schedule''' on 19th &amp;amp;amp; 20th November 2009.&lt;br /&gt;
&lt;br /&gt;
==== Conference  ====&lt;br /&gt;
&lt;br /&gt;
== Two Days Conference  ==&lt;br /&gt;
&lt;br /&gt;
Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel conference talks to be conducted in 3 separate halls for two days i.e . 17th &amp;amp;amp; 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular talk. Conference talks are being delivered by world renowned and most regarded speakers from around the world. Below is the detailed schedule for the two days of conference.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 1 - 17th Nov, 2009'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Where&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - I''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - II''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - III'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Who&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Researchers &amp;amp;amp; Enthusiasts)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Auditors, Developers, QA teams, Architects)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Leaders, Managers, C&amp;amp;amp;S professionals)'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 8:00 AM - 9:00 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Registrations'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Schedule''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 9:00 AM - 10:30 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Keynote'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:30 AM - 11:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea Break'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 11:00 AM - 12:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | How To Blackbox Test Almost Anything&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Aviram Jenik, Beyond Security&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | The International State of Cyber Security, Risk reduction in a high threat world&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Prof. Howard A. Schmidt, Former Cyber Security Advisor to the White house&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:00 PM - 1:00 PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Client Side Hacks&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Dino Covotsos &amp;amp; Charleton Smith, Telspace Systems&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Risk Based Penetration testing&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | K. K. Mookhey, Founder &amp;amp;amp; Principal Consultant, NII Consulting&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Applications, the source for CyberThreats&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Mano Paul,Software Assurance Advisor,(ISC)2&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 1:00PM - 2:00PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Lunch'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 2:00 PM - 3:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Exploiting Firefox Extensions&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Roberto Suggi Liverani, Security-Assessment.com&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Threat Modeling&amp;lt;br&amp;gt;&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Varun Sharma,Microsoft India&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Enterprise Application Security Program&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 3:00 PM - 4:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | SQL Server Forensics 2.0&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Kevvie Fowler, TELUS &amp;amp;amp; Ringzero&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | OWASP SAMM&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Pravir Chandra, Director of Strategic Services,&amp;lt;br&amp;gt;Fortify&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Business Case - Risk Management/Compliance at leading Education Group AMITY (Rapid Fire: 30 Min talk)&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Dr. JS Sodhi, CIO, AMITY Group&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 4:00 PM - 5:00 PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Ownage 2.0 - How to own the World&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Saumil Shah, NetSquare Solutions&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | &amp;quot;Do you want to play a Game&amp;quot; - Game theory and Cyberwar&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Bryan K. Fite, HackSecKlahn&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Usability and Privacy in Security&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Dr. Ponnurangam Kumaraguru, Asst. Professor - IIIT (Rapid Fire : 30 Min talk)&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 5:00 PM - 6:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea and Snacks on the Exhibition floor'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 7:00 PM - 10:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''CXO Event (Exclusive by invitation only) - Information Security Concerns for Offshoring'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 2 - 18th Nov, 2009'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Where&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - I''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - II''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - III'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Who&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Researchers &amp;amp;amp; Enthusiasts)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Auditors, Developers, QA teams, Architects)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Leaders, Managers, C&amp;amp;amp;S professionals)'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 8:00 AM - 9:00 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Registrations'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 9:00 AM - 10:00 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Round Table with Speakers / Industry Panel - &amp;quot;Security Today &amp;amp; Tomorrow''''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:00 AM - 10:30 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea Break'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Schedule''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:30 AM - 11:30&amp;amp;nbsp;AM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | All your Packets belong to us&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Daniel Mende, Security Researcher, ERNW&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | SANS Dshield Webhoneypot Project&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Jason Lam, Independent Security Researcher&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Critical Infrastructure Security “Danger Without borders” &amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | John Bumgarner, US Cyber Consequence Unit (USCCU)&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 11:30 AM - 12:30 PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Hacking Oracle From Web&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Sid, Independent Security Researcher&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Testing JSON Applications For Security Holes&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Aviram Jenik, Beyond Security&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Critical Infrastructure Security “Danger Without borders” &amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | John Bumgarner, US Cyber Consequence Unit (USCCU)&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:30PM - 1:30PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Lunch'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 1:30 PM&amp;amp;nbsp;- 2:30 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Lust 2.0 – Desire for free WiFi and the threat of the Imposter &amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Lava Kumar Kuppan, Independent Security Researcher&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Cloud Hacking - Distributed Attacks &amp;amp; Exploits&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Shreeraj Shah, Blueinfy Solutions&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Cedric Blancher, EADS Innovation Works&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 2:30 PM - 3:30&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Xprobe3 - What's New? Going Application Level&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Fyodor Yarochkin, Armorize&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Nitin Kumar/Vipin Kumar, Independent Security Researchers, NVlabs&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Behind the Scenes at Microsoft Security Response Center&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Dave Midturi,MSRC, Microsoft Corp.&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 3:30PM - 4:00PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea Break'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 4:00 PM - 5:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 5:00 PM - 6:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Closing Keynotes - &amp;quot;OWASP &amp;amp; Securitybyte&amp;quot;'''&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Trainings  ====&lt;br /&gt;
&lt;br /&gt;
== Two Day Trainings  ==&lt;br /&gt;
&lt;br /&gt;
Two days post-conference are dedicated towards best-of-breed trainings being conducted in association with SANS, ISC2 and other organizations. Trainings tracks have been made available as One-Day tracks and Two-Day tracks scheduled for 19th &amp;amp;amp; 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 1 - 19th Nov, 2009'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 2 - 20th Nov, 2009'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course ID''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course Duration''' &lt;br /&gt;
(# of Days) &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course Title''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Instructor''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course ID''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course Duration''' &lt;br /&gt;
(# of Days) &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course Title''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Instructor'''&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;30&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''One Day Training Tracks'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DHSO''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Oracle_Hacking_and_security ORACLE Hacking &amp;amp;amp; Security]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Sumit Sidharth,[[Image:Sb logo.png|center|78x50px|link=http://www.securitybyte.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DAWH''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Advanced_Web_Hacking Advanced Web Hacking -Securing AJAX, RIA &amp;amp;amp; SOA]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Shreeraj Shah [[Image:Blueinfy logo.png|center|link=http://www.blueinfy.com]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DAFT'''&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Advanced_Forensic_Techniques Advanced Forensics Techniques]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Dr. Chandrasekhar Umapathy,[[Image:Sb logo.png|center|78x50px|link=http://www.securitybyte.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DIAT'''&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/InDepth_Assessment_Techniques In-depth Assessment Techniques: Design, Code, and Runtime]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Pravir Chandra, &lt;br /&gt;
&lt;br /&gt;
[[Image:Fortify.jpg|center|93x31px|link=http://www.fortify.com]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;30&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Two Day Training Tracks'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DBWH''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Hacking_bluetooth_and_wireless_101 Hacking Wireless &amp;amp;amp; Bluetooth 101]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Dino Covotsos /&amp;lt;br&amp;gt;Charlton Smith,[[Image:Telspace logo.png|center|76x50px]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DBWH''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Hacking_bluetooth_and_wireless_101 Hacking Wireless &amp;amp;amp; Bluetooth 101]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Dino Covotsos /&amp;lt;br&amp;gt;Charlton Smith,[[Image:Telspace logo.png|center|72x47px]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DNST''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Building_Advanced_Network_Security_tools Building advanced Network Security Tools]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Daniel Mende,[[Image:Ernw logo.png|center]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DNST''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Building_Advanced_Network_Security_tools Building advanced Network Security Tools]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Daniel Mende,[[Image:Ernw logo.png|center]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DCBC''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/ISC2_CSSLP_CBK_Bootcamp (ISC)2 CSSLP CBK Boot camp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Mano Paul,[[Image:Isc logo.png|center|78x50px|link=http://www.isc2.org]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DCBC''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/ISC2_CSSLP_CBK_Bootcamp (ISC)2 CSSLP CBK Boot camp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Mano Paul,[[Image:Isc logo.png|center|78x50px|link=http://www.isc2.org]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSCJ / SANS Course ID&amp;amp;nbsp;: DEV530''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_Essential_Secure_Coding_Java_JEE_GSSP Essential Secure Coding in Java / JEE]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSCJ / SANS Course ID&amp;amp;nbsp;: DEV530''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_Essential_Secure_Coding_Java_JEE_GSSP Essential Secure Coding in Java / JEE]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DWPT / SANS Course ID&amp;amp;nbsp;: DEV538''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_WebApp_Pentesting_handsOn_immersion Web Application Pen Testing Hands-On Immersion]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DWPT / SANS Course ID&amp;amp;nbsp;: DEV538''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_WebApp_Pentesting_handsOn_immersion Web Application Pen Testing Hands-On Immersion]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSAB / SANS Course ID&amp;amp;nbsp;: AUD429''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_IT_Security_Audit_Bootcamp IT Security Audit Essentials Bootcamp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSAB / SANS Course ID&amp;amp;nbsp;: AUD429''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_IT_Security_Audit_Bootcamp IT Security Audit Essentials Bootcamp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Venue  ====&lt;br /&gt;
&lt;br /&gt;
Four Days Event is planned out at: &lt;br /&gt;
&lt;br /&gt;
[http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza,]&amp;lt;br&amp;gt;Site - 2, Sector - 29, &amp;lt;br&amp;gt;Gurgaon-122001 (National Capital Region), India&amp;lt;br&amp;gt;Hotel Front Desk: 91-124-4534000&amp;lt;br&amp;gt;Hotel Fax: 91-124-4304800&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | '''Co-Sponsor &amp;quot;Leadership Summit 2009&amp;quot;'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | '''CTF&amp;amp;nbsp;(Capture The Flag) Sponsor'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | '''Education &amp;amp;nbsp;Partner'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:20th green stacked.png|center|ISC2|link=http://www.isc2.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
| [[Image:Appin.jpg|center|link=http://www.appinsecurity.com]]&amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
| [[Image:BRIP-Logo.jpg|center|link=http://www.brip.co.in]]&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
| [[Image:Beyond-logo_large.jpg|Left|link=http://www.www.beyondsecurity.com]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Associate Sponsors'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;90&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Media Partners'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Supporters'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Torridn.jpg|center|link=http://www.torridnetworks.com]] &lt;br /&gt;
| [[Image:SSecurity_india_small.gif‎ |center|link=http://www.searchsecurity.in]]&lt;br /&gt;
| [[Image:HITB.jpg|center|link=http://conference.hitb.org]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:SecurityCompass.JPG|center|link=http://www.securitycompass.com]] &lt;br /&gt;
| [[Image:HNS-web.jpg|center|link=http://www.net-security.org]] &lt;br /&gt;
| [[Image:Sector.jpg|center|link=http://www.sector.ca]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! valign=&amp;quot;baseline&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| [[Image:Infosecurity.jpg|center|link=http://www.infosecuritymagz.com]] &amp;lt;br&amp;gt;&lt;br /&gt;
| [[Image:Clubhack.gif|center]]&amp;lt;br&amp;gt;[[Image:Eventavenue Logo.jpg|center|link=https://www.eventavenue.com]]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| [[Image:Itmagz.jpg|center]]&amp;amp;nbsp;[[Image:Electronicsf.jpg|center|link=http://www.electronicsforu.com]] &lt;br /&gt;
| [[Image:Crowne plaza.jpg|center|link=http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
==== Hotel &amp;amp; Travel  ====&lt;br /&gt;
&lt;br /&gt;
== Hotel Stay &amp;amp; Travel Information  ==&lt;br /&gt;
&lt;br /&gt;
To help our valued delegates with Hotel and Travel services, we have negotiated with some of the best and Budget Category Guest houses in Gurgaon that are located within a radius of 3 - 4 Kms from the venue.&lt;br /&gt;
&lt;br /&gt;
Limited cheaper accommodation is available near the venue hotel in budget hotels/apartments area. The tariff of these hotels ranges from Rs.2000 onwards per room night (inclusive of Room Rent, Breakfast and Luxury Tax).  Interested delegates / students can send a formal request for the desired accommodations and dates to our official travel agent.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;OFFICIAL TRAVEL AGENT&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dreamz conference Management Pvt.Ltd&amp;lt;/b&amp;gt; will look after your hotel accommodation in Gurgaon and New Delhi, pre &amp;amp; post conference tours / travel needs in India for delegates and visitors independently. If you wish to go for sightseeing tour within New Delhi and around it to places like Agra, Jaipur, Rajasthan etc. However, we would encourage you to make early bookings which will be done on “first – come - first service” basis and let us know of your interest, since that would ultimately work in your favour. Early reservation is strongly recommended as November being a high demand period for hotels in Gurgaon.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
For further details please contact:&lt;br /&gt;
&lt;br /&gt;
DREAMZ CONFERENCE MANAGEMENT PVT.LTD&lt;br /&gt;
&lt;br /&gt;
406, Ansal’s Majestic Tower, Vikas Puri, New Delhi – 110018&lt;br /&gt;
&lt;br /&gt;
Tel: 91 – 11 – 41586401, 402, Fax: 91 – 11 – 41586400&lt;br /&gt;
&lt;br /&gt;
Email: info@dreamztravel.net / dreamztravelindia@yahoo.com&lt;br /&gt;
&lt;br /&gt;
Website: www.dreamztravel.net&lt;br /&gt;
&lt;br /&gt;
Contact Person: Jitin Batra ( +91 9810558569 )&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
Please contact [http://www.owasp.org/index.php/Category:India#OWASP_India_Co-Chairs Chair - OWASP India] for sponsorship opportunities. &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Category:India Category: OWASP India]&lt;/div&gt;</summary>
		<author><name>Puneetm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SecurityByte_and_OWASP_Asia_AppSec_Conference_2009&amp;diff=72489</id>
		<title>SecurityByte and OWASP Asia AppSec Conference 2009</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SecurityByte_and_OWASP_Asia_AppSec_Conference_2009&amp;diff=72489"/>
				<updated>2009-10-31T14:00:26Z</updated>
		
		<summary type="html">&lt;p&gt;Puneetm: /* Exclusive Offers */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:SB OWASP 2009 banner.gif|center|link=http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009]]&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza] &amp;amp;#124; [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Registrations]&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*Register between 6th - 15th October 2009 and get '''Complementary Return Air Flight''' from anywhere in India. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Registrations Click Here]''' for more information.&lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
Securitybyte &amp;amp;amp; OWASP are proud to welcome you to the annual international information security conference – Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009, Nov 17th through Nov 20th in Delhi &amp;amp;amp; NCR, India. &lt;br /&gt;
&lt;br /&gt;
This is a landmark event, as both Securitybyte and OWASP join hands to present India’s largest InfoSec event with world renowned and most regarded international speakers. &lt;br /&gt;
&lt;br /&gt;
Securitybye &amp;amp;amp; OWASP AppSec Asia Conference 2009 will be held at [http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza, Gurgaon, NCR, India.] on 17th November through 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Security Researchers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Penetration Testers &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*IT Security Professionals &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
&lt;br /&gt;
==== About  ====&lt;br /&gt;
&lt;br /&gt;
== About Conference  ==&lt;br /&gt;
&lt;br /&gt;
Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel conference talks to be conducted in 3 separate halls for two days i.e . 17th &amp;amp;amp; 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular talk. Conference talks are being delivered by world renowned and most regarded speakers from around the world. &lt;br /&gt;
&lt;br /&gt;
== About Trainings  ==&lt;br /&gt;
&lt;br /&gt;
Two days post-conference are dedicated towards best-of-breed trainings being conducted in association with SANS, ISC2 and other organizations. Trainings tracks have been made available as One-Day tracks and Two-Day tracks scheduled for 19th &amp;amp;amp; 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
==== Registrations  ====&lt;br /&gt;
&lt;br /&gt;
== [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Registration] is now open!  ==&lt;br /&gt;
&lt;br /&gt;
=== You can register [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 here]  ===&lt;br /&gt;
&lt;br /&gt;
*[http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Click Here] for Online Registrations. &lt;br /&gt;
*[http://securitybyte.org/index.php/register.html Click Here] for Offline Registrations.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Please check out our Exclusive Discount Offer, available Starting October 6th - 15th, 2009. &amp;quot;SAVE BIG NOW !&amp;quot;&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''''The below pricing reflects the Standard Registration Prices .''''' &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Two Days of Conference (17th and 18th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.8,500/- INR &lt;br /&gt;
| General Public&lt;br /&gt;
|-&lt;br /&gt;
| Two Days of Conference (17th and 18th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.5,000/- INR &lt;br /&gt;
| Students&lt;br /&gt;
|-&lt;br /&gt;
| Two-Day Training Tracks (19th and 20th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.25,000/- INR&lt;br /&gt;
|-&lt;br /&gt;
| One-Day Training Tracks (19th OR 20th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.12,500/- INR&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;** Service Tax @ 10.3% will be charged extra.&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;ISC2&amp;lt;/b&amp;gt; Members can avail a Special 15% discount on Conference &amp;amp; Training Registration.&lt;br /&gt;
(Please provide your ISC2 Certification ID number to avail the above Discount)&lt;br /&gt;
For Registrations contact us at registrations@securitybyte.org&lt;br /&gt;
== Exclusive Offers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Group / Team Discounts available: Kindly contact us at registrations@securitybyte.org&amp;lt;br&amp;gt;&lt;br /&gt;
Special University Student discount&amp;lt;/b&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
- University Students can register for two days of conference for just Rs. 5000 (including taxes)&amp;lt;br&amp;gt;&lt;br /&gt;
- Special 15 % Discounts for Training registration&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Trainings Click here for details on the training courses that are available.]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Who Should Attend Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009: ==&lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Security Researchers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Penetration Testers &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*IT Security Professionals &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;For student discount, attendees must present proof of enrollment when picking up your badge. &lt;br /&gt;
&lt;br /&gt;
==== Schedule  ====&lt;br /&gt;
&lt;br /&gt;
Three parallel conference talks are scheduled for 17th &amp;amp;amp; 18th November 2009 in three different halls. Training tracks have been divided in one-day tracks scheduled for 19th or 20th November 2009 and two-day tracks those are schedule to continue for two days both on 19th &amp;amp;amp; 20th November 2009. Follow the tabs to learn the details on both conference and trainings. &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Conference Click here] to view the '''Conference Schedule''' for 17th &amp;amp;amp; 18th November 2009.&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Trainings Click here] to view '''Training Schedule''' on 19th &amp;amp;amp; 20th November 2009.&lt;br /&gt;
&lt;br /&gt;
==== Conference  ====&lt;br /&gt;
&lt;br /&gt;
== Two Days Conference  ==&lt;br /&gt;
&lt;br /&gt;
Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel conference talks to be conducted in 3 separate halls for two days i.e . 17th &amp;amp;amp; 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular talk. Conference talks are being delivered by world renowned and most regarded speakers from around the world. Below is the detailed schedule for the two days of conference.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 1 - 17th Nov, 2009'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Where&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - I''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - II''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - III'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Who&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Researchers &amp;amp;amp; Enthusiasts)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Auditors, Developers, QA teams, Architects)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Leaders, Managers, C&amp;amp;amp;S professionals)'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 8:00 AM - 9:00 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Registrations'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Schedule''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 9:00 AM - 10:30 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Keynote'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:30 AM - 11:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea Break'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 11:00 AM - 12:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | How To Blackbox Test Almost Anything&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Aviram Jenik, Beyond Security&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | The International State of Cyber Security, Risk reduction in a high threat world&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Prof. Howard A. Schmidt, Former Cyber Security Advisor to the White house&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:00 PM - 1:00 PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Client Side Hacks&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Dino Covotsos &amp;amp; Charleton Smith, Telspace Systems&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Risk Based Penetration testing&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | K. K. Mookhey, Founder &amp;amp;amp; Principal Consultant, NII Consulting&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Applications, the source for CyberThreats&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Mano Paul,Software Assurance Advisor,(ISC)2&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 1:00PM - 2:00PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Lunch'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 2:00 PM - 3:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Exploiting Firefox Extensions&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Roberto Suggi Liverani, Security-Assessment.com&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Threat Modeling&amp;lt;br&amp;gt;&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Varun Sharma,Microsoft India&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Enterprise Application Security Program&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 3:00 PM - 4:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | SQL Server Forensics 2.0&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Kevvie Fowler, TELUS &amp;amp;amp; Ringzero&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | OWASP SAMM&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Pravir Chandra, Director of Strategic Services,&amp;lt;br&amp;gt;Fortify&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Business Case - Risk Management/Compliance at leading Education Group AMITY (Rapid Fire: 30 Min talk)&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Dr. JS Sodhi, CIO, AMITY Group&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 4:00 PM - 5:00 PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Ownage 2.0 - How to own the World&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Saumil Shah, NetSquare Solutions&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | &amp;quot;Do you want to play a Game&amp;quot; - Game theory and Cyberwar&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Bryan K. Fite, HackSecKlahn&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Usability and Privacy in Security&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Dr. Ponnurangam Kumaraguru, Asst. Professor - IIIT (Rapid Fire : 30 Min talk)&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 5:00 PM - 6:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea and Snacks on the Exhibition floor'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 7:00 PM - 10:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''CXO Event (Exclusive by invitation only) - Information Security Concerns for Offshoring'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 2 - 18th Nov, 2009'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Where&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - I''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - II''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - III'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Who&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Researchers &amp;amp;amp; Enthusiasts)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Auditors, Developers, QA teams, Architects)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Leaders, Managers, C&amp;amp;amp;S professionals)'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 8:00 AM - 9:00 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Registrations'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 9:00 AM - 10:00 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Round Table with Speakers / Industry Panel - &amp;quot;Security Today &amp;amp; Tomorrow''''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:00 AM - 10:30 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea Break'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Schedule''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:30 AM - 11:30&amp;amp;nbsp;AM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | All your Packets belong to us&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Daniel Mende, Security Researcher, ERNW&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | SANS Dshield Webhoneypot Project&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Jason Lam, Independent Security Researcher&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Critical Infrastructure Security “Danger Without borders” &amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | John Bumgarner, US Cyber Consequence Unit (USCCU)&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 11:30 AM - 12:30 PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Hacking Oracle From Web&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Sid, Independent Security Researcher&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Testing JSON Applications For Security Holes&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Aviram Jenik, Beyond Security&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Critical Infrastructure Security “Danger Without borders” &amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | John Bumgarner, US Cyber Consequence Unit (USCCU)&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:30PM - 1:30PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Lunch'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 1:30 PM&amp;amp;nbsp;- 2:30 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Lust 2.0 – Desire for free WiFi and the threat of the Imposter &amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Lava Kumar Kuppan, Independent Security Researcher&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Cloud Hacking - Distributed Attacks &amp;amp; Exploits&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Shreeraj Shah, Blueinfy Solutions&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Cedric Blancher, EADS Innovation Works&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 2:30 PM - 3:30&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Xprobe3 - What's New? Going Application Level&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Fyodor Yarochkin, Armorize&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Nitin Kumar/Vipin Kumar, Independent Security Researchers, NVlabs&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Behind the Scenes at Microsoft Security Response Center&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Dave Midturi,MSRC, Microsoft Corp.&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 3:30PM - 4:00PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea Break'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 4:00 PM - 5:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 5:00 PM - 6:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Closing Keynotes - &amp;quot;OWASP &amp;amp; Securitybyte&amp;quot;'''&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Trainings  ====&lt;br /&gt;
&lt;br /&gt;
== Two Day Trainings  ==&lt;br /&gt;
&lt;br /&gt;
Two days post-conference are dedicated towards best-of-breed trainings being conducted in association with SANS, ISC2 and other organizations. Trainings tracks have been made available as One-Day tracks and Two-Day tracks scheduled for 19th &amp;amp;amp; 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 1 - 19th Nov, 2009'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 2 - 20th Nov, 2009'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course ID''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course Duration''' &lt;br /&gt;
(# of Days) &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course Title''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Instructor''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course ID''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course Duration''' &lt;br /&gt;
(# of Days) &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course Title''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Instructor'''&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;30&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''One Day Training Tracks'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DHSO''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Oracle_Hacking_and_security ORACLE Hacking &amp;amp;amp; Security]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Sumit Sidharth,[[Image:Sb logo.png|center|78x50px|link=http://www.securitybyte.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DAWH''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Advanced_Web_Hacking Advanced Web Hacking -Securing AJAX, RIA &amp;amp;amp; SOA]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Shreeraj Shah [[Image:Blueinfy logo.png|center|link=http://www.blueinfy.com]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DAFT'''&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Advanced_Forensic_Techniques Advanced Forensics Techniques]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Dr. Chandrasekhar Umapathy,[[Image:Sb logo.png|center|78x50px|link=http://www.securitybyte.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DIAT'''&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/InDepth_Assessment_Techniques In-depth Assessment Techniques: Design, Code, and Runtime]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Pravir Chandra, &lt;br /&gt;
&lt;br /&gt;
[[Image:Fortify.jpg|center|93x31px|link=http://www.fortify.com]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;30&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Two Day Training Tracks'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DBWH''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Hacking_bluetooth_and_wireless_101 Hacking Wireless &amp;amp;amp; Bluetooth 101]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Dino Covotsos /&amp;lt;br&amp;gt;Charlton Smith,[[Image:Telspace logo.png|center|76x50px]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DBWH''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Hacking_bluetooth_and_wireless_101 Hacking Wireless &amp;amp;amp; Bluetooth 101]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Dino Covotsos /&amp;lt;br&amp;gt;Charlton Smith,[[Image:Telspace logo.png|center|72x47px]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DNST''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Building_Advanced_Network_Security_tools Building advanced Network Security Tools]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Daniel Mende,[[Image:Ernw logo.png|center]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DNST''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Building_Advanced_Network_Security_tools Building advanced Network Security Tools]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Daniel Mende,[[Image:Ernw logo.png|center]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DCBC''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/ISC2_CSSLP_CBK_Bootcamp (ISC)2 CSSLP CBK Boot camp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Mano Paul,[[Image:Isc logo.png|center|78x50px|link=http://www.isc2.org]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DCBC''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/ISC2_CSSLP_CBK_Bootcamp (ISC)2 CSSLP CBK Boot camp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Mano Paul,[[Image:Isc logo.png|center|78x50px|link=http://www.isc2.org]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSCJ / SANS Course ID&amp;amp;nbsp;: DEV530''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_Essential_Secure_Coding_Java_JEE_GSSP Essential Secure Coding in Java / JEE]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSCJ / SANS Course ID&amp;amp;nbsp;: DEV530''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_Essential_Secure_Coding_Java_JEE_GSSP Essential Secure Coding in Java / JEE]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DWPT / SANS Course ID&amp;amp;nbsp;: DEV538''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_WebApp_Pentesting_handsOn_immersion Web Application Pen Testing Hands-On Immersion]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DWPT / SANS Course ID&amp;amp;nbsp;: DEV538''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_WebApp_Pentesting_handsOn_immersion Web Application Pen Testing Hands-On Immersion]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSAB / SANS Course ID&amp;amp;nbsp;: AUD429''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_IT_Security_Audit_Bootcamp IT Security Audit Essentials Bootcamp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSAB / SANS Course ID&amp;amp;nbsp;: AUD429''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_IT_Security_Audit_Bootcamp IT Security Audit Essentials Bootcamp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Venue  ====&lt;br /&gt;
&lt;br /&gt;
Four Days Event is planned out at: &lt;br /&gt;
&lt;br /&gt;
[http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza,]&amp;lt;br&amp;gt;Site - 2, Sector - 29, &amp;lt;br&amp;gt;Gurgaon-122001 (National Capital Region), India&amp;lt;br&amp;gt;Hotel Front Desk: 91-124-4534000&amp;lt;br&amp;gt;Hotel Fax: 91-124-4304800&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | '''Co-Sponsor &amp;quot;Leadership Summit 2009&amp;quot;'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | '''CTF&amp;amp;nbsp;(Capture The Flag) Sponsor'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | '''Education &amp;amp;nbsp;Partner'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:20th green stacked.png|center|ISC2|link=http://www.isc2.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
| [[Image:Appin.jpg|center|link=http://www.appinsecurity.com]]&amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
| [[Image:BRIP-Logo.jpg|center|link=http://www.brip.co.in]]&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
| [[Image:Beyond-logo_large.jpg|Left|link=http://www.www.beyondsecurity.com]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Associate Sponsors'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;90&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Media Partners'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Supporters'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Torridn.jpg|center|link=http://www.torridnetworks.com]] &lt;br /&gt;
| [[Image:SSecurity_india_small.gif‎ |center|link=http://www.searchsecurity.in]]&lt;br /&gt;
| [[Image:HITB.jpg|center|link=http://conference.hitb.org]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:SecurityCompass.JPG|center|link=http://www.securitycompass.com]] &lt;br /&gt;
| [[Image:HNS-web.jpg|center|link=http://www.net-security.org]] &lt;br /&gt;
| [[Image:Sector.jpg|center|link=http://www.sector.ca]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! valign=&amp;quot;baseline&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| [[Image:Infosecurity.jpg|center|link=http://www.infosecuritymagz.com]] &amp;lt;br&amp;gt;&lt;br /&gt;
| [[Image:Clubhack.gif|center]]&amp;lt;br&amp;gt;[[Image:Eventavenue Logo.jpg|center|link=https://www.eventavenue.com]]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| [[Image:Itmagz.jpg|center]]&amp;amp;nbsp;[[Image:Electronicsf.jpg|center|link=http://www.electronicsforu.com]] &lt;br /&gt;
| [[Image:Crowne plaza.jpg|center|link=http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
==== Hotel &amp;amp; Travel  ====&lt;br /&gt;
&lt;br /&gt;
== Hotel Stay &amp;amp; Travel Information  ==&lt;br /&gt;
&lt;br /&gt;
To help our valued delegates with Hotel and Travel services, we have negotiated with some of the best and Budget Category Guest houses in Gurgaon that are located within a radius of 3 - 4 Kms from the venue.&lt;br /&gt;
&lt;br /&gt;
Limited cheaper accommodation is available near the venue hotel in budget hotels/apartments area. The tariff of these hotels ranges from Rs.2000 onwards per room night (inclusive of Room Rent, Breakfast and Luxury Tax).  Interested delegates / students can send a formal request for the desired accommodations and dates to our official travel agent.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;OFFICIAL TRAVEL AGENT&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dreamz conference Management Pvt.Ltd&amp;lt;/b&amp;gt; will look after your hotel accommodation in Gurgaon and New Delhi, pre &amp;amp; post conference tours / travel needs in India for delegates and visitors independently. If you wish to go for sightseeing tour within New Delhi and around it to places like Agra, Jaipur, Rajasthan etc. However, we would encourage you to make early bookings which will be done on “first – come - first service” basis and let us know of your interest, since that would ultimately work in your favour. Early reservation is strongly recommended as November being a high demand period for hotels in Gurgaon.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
For further details please contact:&lt;br /&gt;
&lt;br /&gt;
DREAMZ CONFERENCE MANAGEMENT PVT.LTD&lt;br /&gt;
&lt;br /&gt;
406, Ansal’s Majestic Tower, Vikas Puri, New Delhi – 110018&lt;br /&gt;
&lt;br /&gt;
Tel: 91 – 11 – 41586401, 402, Fax: 91 – 11 – 41586400&lt;br /&gt;
&lt;br /&gt;
Email: info@dreamztravel.net / dreamztravelindia@yahoo.com&lt;br /&gt;
&lt;br /&gt;
Website: www.dreamztravel.net&lt;br /&gt;
&lt;br /&gt;
Contact Person: Jitin Batra ( +91 9810558569 )&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
Please contact [http://www.owasp.org/index.php/Category:India#OWASP_India_Co-Chairs Chair - OWASP India] for sponsorship opportunities. &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Category:India Category: OWASP India]&lt;/div&gt;</summary>
		<author><name>Puneetm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SecurityByte_and_OWASP_Asia_AppSec_Conference_2009&amp;diff=72488</id>
		<title>SecurityByte and OWASP Asia AppSec Conference 2009</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SecurityByte_and_OWASP_Asia_AppSec_Conference_2009&amp;diff=72488"/>
				<updated>2009-10-31T13:59:27Z</updated>
		
		<summary type="html">&lt;p&gt;Puneetm: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:SB OWASP 2009 banner.gif|center|link=http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009]]&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza] &amp;amp;#124; [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Registrations]&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*Register between 6th - 15th October 2009 and get '''Complementary Return Air Flight''' from anywhere in India. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Registrations Click Here]''' for more information.&lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
Securitybyte &amp;amp;amp; OWASP are proud to welcome you to the annual international information security conference – Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009, Nov 17th through Nov 20th in Delhi &amp;amp;amp; NCR, India. &lt;br /&gt;
&lt;br /&gt;
This is a landmark event, as both Securitybyte and OWASP join hands to present India’s largest InfoSec event with world renowned and most regarded international speakers. &lt;br /&gt;
&lt;br /&gt;
Securitybye &amp;amp;amp; OWASP AppSec Asia Conference 2009 will be held at [http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza, Gurgaon, NCR, India.] on 17th November through 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Security Researchers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Penetration Testers &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*IT Security Professionals &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
&lt;br /&gt;
==== About  ====&lt;br /&gt;
&lt;br /&gt;
== About Conference  ==&lt;br /&gt;
&lt;br /&gt;
Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel conference talks to be conducted in 3 separate halls for two days i.e . 17th &amp;amp;amp; 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular talk. Conference talks are being delivered by world renowned and most regarded speakers from around the world. &lt;br /&gt;
&lt;br /&gt;
== About Trainings  ==&lt;br /&gt;
&lt;br /&gt;
Two days post-conference are dedicated towards best-of-breed trainings being conducted in association with SANS, ISC2 and other organizations. Trainings tracks have been made available as One-Day tracks and Two-Day tracks scheduled for 19th &amp;amp;amp; 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
==== Registrations  ====&lt;br /&gt;
&lt;br /&gt;
== [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Registration] is now open!  ==&lt;br /&gt;
&lt;br /&gt;
=== You can register [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 here]  ===&lt;br /&gt;
&lt;br /&gt;
*[http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Click Here] for Online Registrations. &lt;br /&gt;
*[http://securitybyte.org/index.php/register.html Click Here] for Offline Registrations.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Please check out our Exclusive Discount Offer, available Starting October 6th - 15th, 2009. &amp;quot;SAVE BIG NOW !&amp;quot;&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''''The below pricing reflects the Standard Registration Prices .''''' &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Two Days of Conference (17th and 18th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.8,500/- INR &lt;br /&gt;
| General Public&lt;br /&gt;
|-&lt;br /&gt;
| Two Days of Conference (17th and 18th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.5,000/- INR &lt;br /&gt;
| Students&lt;br /&gt;
|-&lt;br /&gt;
| Two-Day Training Tracks (19th and 20th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.25,000/- INR&lt;br /&gt;
|-&lt;br /&gt;
| One-Day Training Tracks (19th OR 20th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.12,500/- INR&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;** Service Tax @ 10.3% will be charged extra.&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;ISC2&amp;lt;/b&amp;gt; Members can avail a Special 15% discount on Conference &amp;amp; Training Registration.&lt;br /&gt;
(Please provide your ISC2 Certification ID number to avail the above Discount)&lt;br /&gt;
For Registrations contact us at registrations@securitybyte.org&lt;br /&gt;
== Exclusive Offers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Group / Team Discounts available: Kindly contact us at registrations@securitybyte.org&amp;lt;br&amp;gt;&lt;br /&gt;
Special University Student discount&amp;lt;/b&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
- University Students can register for two days of conference for just Rs. 5000 (including taxes)&lt;br /&gt;
- Special 15 % Discounts for Training registration&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Trainings Click here for details on the training courses that are available.]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Who Should Attend Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009: ==&lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Security Researchers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Penetration Testers &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*IT Security Professionals &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;For student discount, attendees must present proof of enrollment when picking up your badge. &lt;br /&gt;
&lt;br /&gt;
==== Schedule  ====&lt;br /&gt;
&lt;br /&gt;
Three parallel conference talks are scheduled for 17th &amp;amp;amp; 18th November 2009 in three different halls. Training tracks have been divided in one-day tracks scheduled for 19th or 20th November 2009 and two-day tracks those are schedule to continue for two days both on 19th &amp;amp;amp; 20th November 2009. Follow the tabs to learn the details on both conference and trainings. &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Conference Click here] to view the '''Conference Schedule''' for 17th &amp;amp;amp; 18th November 2009.&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Trainings Click here] to view '''Training Schedule''' on 19th &amp;amp;amp; 20th November 2009.&lt;br /&gt;
&lt;br /&gt;
==== Conference  ====&lt;br /&gt;
&lt;br /&gt;
== Two Days Conference  ==&lt;br /&gt;
&lt;br /&gt;
Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel conference talks to be conducted in 3 separate halls for two days i.e . 17th &amp;amp;amp; 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular talk. Conference talks are being delivered by world renowned and most regarded speakers from around the world. Below is the detailed schedule for the two days of conference.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 1 - 17th Nov, 2009'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Where&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - I''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - II''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - III'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Who&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Researchers &amp;amp;amp; Enthusiasts)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Auditors, Developers, QA teams, Architects)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Leaders, Managers, C&amp;amp;amp;S professionals)'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 8:00 AM - 9:00 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Registrations'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Schedule''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 9:00 AM - 10:30 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Keynote'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:30 AM - 11:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea Break'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 11:00 AM - 12:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | How To Blackbox Test Almost Anything&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Aviram Jenik, Beyond Security&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | The International State of Cyber Security, Risk reduction in a high threat world&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Prof. Howard A. Schmidt, Former Cyber Security Advisor to the White house&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:00 PM - 1:00 PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Client Side Hacks&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Dino Covotsos &amp;amp; Charleton Smith, Telspace Systems&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Risk Based Penetration testing&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | K. K. Mookhey, Founder &amp;amp;amp; Principal Consultant, NII Consulting&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Applications, the source for CyberThreats&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Mano Paul,Software Assurance Advisor,(ISC)2&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 1:00PM - 2:00PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Lunch'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 2:00 PM - 3:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Exploiting Firefox Extensions&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Roberto Suggi Liverani, Security-Assessment.com&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Threat Modeling&amp;lt;br&amp;gt;&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Varun Sharma,Microsoft India&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Enterprise Application Security Program&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 3:00 PM - 4:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | SQL Server Forensics 2.0&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Kevvie Fowler, TELUS &amp;amp;amp; Ringzero&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | OWASP SAMM&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Pravir Chandra, Director of Strategic Services,&amp;lt;br&amp;gt;Fortify&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Business Case - Risk Management/Compliance at leading Education Group AMITY (Rapid Fire: 30 Min talk)&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Dr. JS Sodhi, CIO, AMITY Group&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 4:00 PM - 5:00 PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Ownage 2.0 - How to own the World&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Saumil Shah, NetSquare Solutions&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | &amp;quot;Do you want to play a Game&amp;quot; - Game theory and Cyberwar&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Bryan K. Fite, HackSecKlahn&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Usability and Privacy in Security&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Dr. Ponnurangam Kumaraguru, Asst. Professor - IIIT (Rapid Fire : 30 Min talk)&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 5:00 PM - 6:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea and Snacks on the Exhibition floor'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 7:00 PM - 10:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''CXO Event (Exclusive by invitation only) - Information Security Concerns for Offshoring'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 2 - 18th Nov, 2009'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Where&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - I''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - II''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - III'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Who&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Researchers &amp;amp;amp; Enthusiasts)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Auditors, Developers, QA teams, Architects)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Leaders, Managers, C&amp;amp;amp;S professionals)'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 8:00 AM - 9:00 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Registrations'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 9:00 AM - 10:00 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Round Table with Speakers / Industry Panel - &amp;quot;Security Today &amp;amp; Tomorrow''''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:00 AM - 10:30 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea Break'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Schedule''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:30 AM - 11:30&amp;amp;nbsp;AM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | All your Packets belong to us&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Daniel Mende, Security Researcher, ERNW&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | SANS Dshield Webhoneypot Project&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Jason Lam, Independent Security Researcher&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Critical Infrastructure Security “Danger Without borders” &amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | John Bumgarner, US Cyber Consequence Unit (USCCU)&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 11:30 AM - 12:30 PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Hacking Oracle From Web&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Sid, Independent Security Researcher&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Testing JSON Applications For Security Holes&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Aviram Jenik, Beyond Security&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Critical Infrastructure Security “Danger Without borders” &amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | John Bumgarner, US Cyber Consequence Unit (USCCU)&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:30PM - 1:30PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Lunch'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 1:30 PM&amp;amp;nbsp;- 2:30 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Lust 2.0 – Desire for free WiFi and the threat of the Imposter &amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Lava Kumar Kuppan, Independent Security Researcher&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Cloud Hacking - Distributed Attacks &amp;amp; Exploits&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Shreeraj Shah, Blueinfy Solutions&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Cedric Blancher, EADS Innovation Works&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 2:30 PM - 3:30&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Xprobe3 - What's New? Going Application Level&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Fyodor Yarochkin, Armorize&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Nitin Kumar/Vipin Kumar, Independent Security Researchers, NVlabs&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Behind the Scenes at Microsoft Security Response Center&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Dave Midturi,MSRC, Microsoft Corp.&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 3:30PM - 4:00PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea Break'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 4:00 PM - 5:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 5:00 PM - 6:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Closing Keynotes - &amp;quot;OWASP &amp;amp; Securitybyte&amp;quot;'''&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Trainings  ====&lt;br /&gt;
&lt;br /&gt;
== Two Day Trainings  ==&lt;br /&gt;
&lt;br /&gt;
Two days post-conference are dedicated towards best-of-breed trainings being conducted in association with SANS, ISC2 and other organizations. Trainings tracks have been made available as One-Day tracks and Two-Day tracks scheduled for 19th &amp;amp;amp; 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 1 - 19th Nov, 2009'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 2 - 20th Nov, 2009'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course ID''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course Duration''' &lt;br /&gt;
(# of Days) &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course Title''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Instructor''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course ID''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course Duration''' &lt;br /&gt;
(# of Days) &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course Title''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Instructor'''&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;30&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''One Day Training Tracks'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DHSO''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Oracle_Hacking_and_security ORACLE Hacking &amp;amp;amp; Security]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Sumit Sidharth,[[Image:Sb logo.png|center|78x50px|link=http://www.securitybyte.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DAWH''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Advanced_Web_Hacking Advanced Web Hacking -Securing AJAX, RIA &amp;amp;amp; SOA]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Shreeraj Shah [[Image:Blueinfy logo.png|center|link=http://www.blueinfy.com]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DAFT'''&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Advanced_Forensic_Techniques Advanced Forensics Techniques]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Dr. Chandrasekhar Umapathy,[[Image:Sb logo.png|center|78x50px|link=http://www.securitybyte.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DIAT'''&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/InDepth_Assessment_Techniques In-depth Assessment Techniques: Design, Code, and Runtime]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Pravir Chandra, &lt;br /&gt;
&lt;br /&gt;
[[Image:Fortify.jpg|center|93x31px|link=http://www.fortify.com]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;30&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Two Day Training Tracks'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DBWH''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Hacking_bluetooth_and_wireless_101 Hacking Wireless &amp;amp;amp; Bluetooth 101]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Dino Covotsos /&amp;lt;br&amp;gt;Charlton Smith,[[Image:Telspace logo.png|center|76x50px]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DBWH''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Hacking_bluetooth_and_wireless_101 Hacking Wireless &amp;amp;amp; Bluetooth 101]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Dino Covotsos /&amp;lt;br&amp;gt;Charlton Smith,[[Image:Telspace logo.png|center|72x47px]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DNST''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Building_Advanced_Network_Security_tools Building advanced Network Security Tools]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Daniel Mende,[[Image:Ernw logo.png|center]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DNST''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Building_Advanced_Network_Security_tools Building advanced Network Security Tools]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Daniel Mende,[[Image:Ernw logo.png|center]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DCBC''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/ISC2_CSSLP_CBK_Bootcamp (ISC)2 CSSLP CBK Boot camp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Mano Paul,[[Image:Isc logo.png|center|78x50px|link=http://www.isc2.org]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DCBC''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/ISC2_CSSLP_CBK_Bootcamp (ISC)2 CSSLP CBK Boot camp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Mano Paul,[[Image:Isc logo.png|center|78x50px|link=http://www.isc2.org]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSCJ / SANS Course ID&amp;amp;nbsp;: DEV530''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_Essential_Secure_Coding_Java_JEE_GSSP Essential Secure Coding in Java / JEE]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSCJ / SANS Course ID&amp;amp;nbsp;: DEV530''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_Essential_Secure_Coding_Java_JEE_GSSP Essential Secure Coding in Java / JEE]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DWPT / SANS Course ID&amp;amp;nbsp;: DEV538''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_WebApp_Pentesting_handsOn_immersion Web Application Pen Testing Hands-On Immersion]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DWPT / SANS Course ID&amp;amp;nbsp;: DEV538''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_WebApp_Pentesting_handsOn_immersion Web Application Pen Testing Hands-On Immersion]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSAB / SANS Course ID&amp;amp;nbsp;: AUD429''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_IT_Security_Audit_Bootcamp IT Security Audit Essentials Bootcamp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSAB / SANS Course ID&amp;amp;nbsp;: AUD429''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_IT_Security_Audit_Bootcamp IT Security Audit Essentials Bootcamp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Venue  ====&lt;br /&gt;
&lt;br /&gt;
Four Days Event is planned out at: &lt;br /&gt;
&lt;br /&gt;
[http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza,]&amp;lt;br&amp;gt;Site - 2, Sector - 29, &amp;lt;br&amp;gt;Gurgaon-122001 (National Capital Region), India&amp;lt;br&amp;gt;Hotel Front Desk: 91-124-4534000&amp;lt;br&amp;gt;Hotel Fax: 91-124-4304800&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | '''Co-Sponsor &amp;quot;Leadership Summit 2009&amp;quot;'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | '''CTF&amp;amp;nbsp;(Capture The Flag) Sponsor'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | '''Education &amp;amp;nbsp;Partner'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:20th green stacked.png|center|ISC2|link=http://www.isc2.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
| [[Image:Appin.jpg|center|link=http://www.appinsecurity.com]]&amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
| [[Image:BRIP-Logo.jpg|center|link=http://www.brip.co.in]]&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
| [[Image:Beyond-logo_large.jpg|Left|link=http://www.www.beyondsecurity.com]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Associate Sponsors'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;90&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Media Partners'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Supporters'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Torridn.jpg|center|link=http://www.torridnetworks.com]] &lt;br /&gt;
| [[Image:SSecurity_india_small.gif‎ |center|link=http://www.searchsecurity.in]]&lt;br /&gt;
| [[Image:HITB.jpg|center|link=http://conference.hitb.org]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:SecurityCompass.JPG|center|link=http://www.securitycompass.com]] &lt;br /&gt;
| [[Image:HNS-web.jpg|center|link=http://www.net-security.org]] &lt;br /&gt;
| [[Image:Sector.jpg|center|link=http://www.sector.ca]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! valign=&amp;quot;baseline&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| [[Image:Infosecurity.jpg|center|link=http://www.infosecuritymagz.com]] &amp;lt;br&amp;gt;&lt;br /&gt;
| [[Image:Clubhack.gif|center]]&amp;lt;br&amp;gt;[[Image:Eventavenue Logo.jpg|center|link=https://www.eventavenue.com]]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| [[Image:Itmagz.jpg|center]]&amp;amp;nbsp;[[Image:Electronicsf.jpg|center|link=http://www.electronicsforu.com]] &lt;br /&gt;
| [[Image:Crowne plaza.jpg|center|link=http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
==== Hotel &amp;amp; Travel  ====&lt;br /&gt;
&lt;br /&gt;
== Hotel Stay &amp;amp; Travel Information  ==&lt;br /&gt;
&lt;br /&gt;
To help our valued delegates with Hotel and Travel services, we have negotiated with some of the best and Budget Category Guest houses in Gurgaon that are located within a radius of 3 - 4 Kms from the venue.&lt;br /&gt;
&lt;br /&gt;
Limited cheaper accommodation is available near the venue hotel in budget hotels/apartments area. The tariff of these hotels ranges from Rs.2000 onwards per room night (inclusive of Room Rent, Breakfast and Luxury Tax).  Interested delegates / students can send a formal request for the desired accommodations and dates to our official travel agent.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;OFFICIAL TRAVEL AGENT&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dreamz conference Management Pvt.Ltd&amp;lt;/b&amp;gt; will look after your hotel accommodation in Gurgaon and New Delhi, pre &amp;amp; post conference tours / travel needs in India for delegates and visitors independently. If you wish to go for sightseeing tour within New Delhi and around it to places like Agra, Jaipur, Rajasthan etc. However, we would encourage you to make early bookings which will be done on “first – come - first service” basis and let us know of your interest, since that would ultimately work in your favour. Early reservation is strongly recommended as November being a high demand period for hotels in Gurgaon.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
For further details please contact:&lt;br /&gt;
&lt;br /&gt;
DREAMZ CONFERENCE MANAGEMENT PVT.LTD&lt;br /&gt;
&lt;br /&gt;
406, Ansal’s Majestic Tower, Vikas Puri, New Delhi – 110018&lt;br /&gt;
&lt;br /&gt;
Tel: 91 – 11 – 41586401, 402, Fax: 91 – 11 – 41586400&lt;br /&gt;
&lt;br /&gt;
Email: info@dreamztravel.net / dreamztravelindia@yahoo.com&lt;br /&gt;
&lt;br /&gt;
Website: www.dreamztravel.net&lt;br /&gt;
&lt;br /&gt;
Contact Person: Jitin Batra ( +91 9810558569 )&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
Please contact [http://www.owasp.org/index.php/Category:India#OWASP_India_Co-Chairs Chair - OWASP India] for sponsorship opportunities. &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Category:India Category: OWASP India]&lt;/div&gt;</summary>
		<author><name>Puneetm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Beyond-logo_large.jpg&amp;diff=72482</id>
		<title>File:Beyond-logo large.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Beyond-logo_large.jpg&amp;diff=72482"/>
				<updated>2009-10-31T13:42:16Z</updated>
		
		<summary type="html">&lt;p&gt;Puneetm: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Puneetm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Advanced_Forensic_Techniques&amp;diff=72208</id>
		<title>Advanced Forensic Techniques</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Advanced_Forensic_Techniques&amp;diff=72208"/>
				<updated>2009-10-25T14:05:05Z</updated>
		
		<summary type="html">&lt;p&gt;Puneetm: /* Advanced Forensics Techniques */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= '''Advanced Forensics Techniques''' =&lt;br /&gt;
&lt;br /&gt;
Course: Advanced Forensics Techniques&amp;lt;br&amp;gt;Course ID: SB1DAFT&amp;lt;br&amp;gt;Instructor: Dr. Chandrasekar Umapathy&amp;lt;br&amp;gt;CPE Credits: 7 CPE’s&amp;lt;br&amp;gt;Duration: 1 Day&amp;lt;br&amp;gt;Date: November 19th, 2009 (9 AM – 6 PM)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Who should attend?'''&amp;lt;br&amp;gt;• General IT security specialists and administrators&amp;lt;br&amp;gt;• IT security specialists who are interested in learning core concepts of Forensics specifically&amp;lt;br&amp;gt;• Security officers for organisations and companies&amp;lt;br&amp;gt;• Law Enforcement agencies&amp;lt;br&amp;gt;• Incident Response Team members&lt;br /&gt;
&lt;br /&gt;
'''Class Pre-requisite:'''&amp;lt;br&amp;gt;• This class is for anyone who wants to begin with Forensics.&lt;br /&gt;
&lt;br /&gt;
'''Class Requirement:'''&amp;lt;br&amp;gt;• Students to carry their laptop with at least Windows XP professional SP2.&amp;lt;br&amp;gt;• Students should have Administrative access / Privileges on the laptop for installing software.&amp;lt;br&amp;gt;• USB or CD/DVDROM device (N.B for bootable software).&amp;lt;br&amp;gt;• Wireless Enabled&amp;lt;br&amp;gt;• Required tools would be distributed during the session&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Course Description:'''&lt;br /&gt;
&lt;br /&gt;
This course covers the fundamental steps of the in-depth computer forensic methodology so that each student will have the complete qualifications to work as a computer forensic investigator in the field helping solve and fight crime. &lt;br /&gt;
&lt;br /&gt;
'''Module 1 - Computer Forensic Investigative Theory'''&amp;lt;br&amp;gt;&lt;br /&gt;
- History of Digital Forensics&amp;lt;br&amp;gt;&lt;br /&gt;
- Digital Evidence&amp;lt;br&amp;gt;&lt;br /&gt;
- Three Main Aspects to Digital Evidence Reconstruction&amp;lt;br&amp;gt;&lt;br /&gt;
- Attack Guidelines for the Recovery of Digital Data&amp;lt;br&amp;gt;&lt;br /&gt;
- Classification&amp;lt;br&amp;gt;&lt;br /&gt;
- Reconstruction&amp;lt;br&amp;gt;&lt;br /&gt;
- Demo - TimeStomping&amp;lt;br&amp;gt;&lt;br /&gt;
- Behavioral evidence analysis (BEA)&amp;lt;br&amp;gt;&lt;br /&gt;
- Equivocal forensic analysis (EFA)&amp;lt;br&amp;gt;&lt;br /&gt;
- Victimology&amp;lt;br&amp;gt;&lt;br /&gt;
- Demo - Following the Clues from an Email Header&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Module 2 - Computer Forensic Processing Techniques'''&amp;lt;br&amp;gt;&lt;br /&gt;
- Goal of Digital Evidence Processing&amp;lt;br&amp;gt;&lt;br /&gt;
- Demo - Logical Review with FTK&amp;lt;br&amp;gt;&lt;br /&gt;
- Duplication&amp;lt;br&amp;gt;&lt;br /&gt;
- Documenting and Identifying&amp;lt;br&amp;gt;&lt;br /&gt;
- Disassembling the Device&amp;lt;br&amp;gt;&lt;br /&gt;
- Disconnecting the Device&amp;lt;br&amp;gt;&lt;br /&gt;
- Document the Boot Sequence&amp;lt;br&amp;gt;&lt;br /&gt;
- Removing and Attaching the Storage Device to Duplicated System&amp;lt;br&amp;gt;&lt;br /&gt;
- Circumstances Preventing the Removal of Storage Devices&amp;lt;br&amp;gt;&lt;br /&gt;
- Write Protection via Hardware/Software&amp;lt;br&amp;gt;&lt;br /&gt;
- Geometry of a Storage Device&amp;lt;br&amp;gt;&lt;br /&gt;
- Host Protected Area (HPA)&amp;lt;br&amp;gt;&lt;br /&gt;
- Tools for Duplicating Evidence to Examiner's Storage Device&amp;lt;br&amp;gt;&lt;br /&gt;
- Demo - Hashing and Duplicating a Drive&amp;lt;br&amp;gt;&lt;br /&gt;
- Preparing Duplication for Evidence Examination&amp;lt;br&amp;gt;&lt;br /&gt;
- Recording the Logical Drive Structure&amp;lt;br&amp;gt;&lt;br /&gt;
- Logical Processes&amp;lt;br&amp;gt;&lt;br /&gt;
- Known Files&amp;lt;br&amp;gt;&lt;br /&gt;
- Reference Lists&amp;lt;br&amp;gt;&lt;br /&gt;
- Verify that File Headers Match Extensions&amp;lt;br&amp;gt;&lt;br /&gt;
- Demo - Introduction to FTK&amp;lt;br&amp;gt;&lt;br /&gt;
- Regular Expressions&amp;lt;br&amp;gt;&lt;br /&gt;
- Demo - Using Regular Expressions&amp;lt;br&amp;gt;&lt;br /&gt;
- File Signatures&amp;lt;br&amp;gt;&lt;br /&gt;
- Demo - Hex Workshop Analysis of Graphic Files&amp;lt;br&amp;gt;&lt;br /&gt;
- Module 2 Review &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Module 3 - Crypto and Password Recovery'''&amp;lt;br&amp;gt;&lt;br /&gt;
- Background&amp;lt;br&amp;gt;&lt;br /&gt;
- Demo - Stegonography&amp;lt;br&amp;gt;&lt;br /&gt;
- History&amp;lt;br&amp;gt;&lt;br /&gt;
- Concepts 1&amp;lt;br&amp;gt;&lt;br /&gt;
- Demo - Cracking a Windows Hashed Password&amp;lt;br&amp;gt;&lt;br /&gt;
- Concepts 2&amp;lt;br&amp;gt;&lt;br /&gt;
- File Protection&amp;lt;br&amp;gt;&lt;br /&gt;
- Options 1&amp;lt;br&amp;gt;&lt;br /&gt;
- Demo - Recovering Passwords from a Zip File&amp;lt;br&amp;gt;&lt;br /&gt;
- Options 2&amp;lt;br&amp;gt;&lt;br /&gt;
- Rainbow Tables&amp;lt;br&amp;gt;&lt;br /&gt;
- Demo - Brute Force/Dictionary Cracks with Lophtcrack&amp;lt;br&amp;gt;&lt;br /&gt;
- Demo - Password Cracking with Rainbow Tables&amp;lt;br&amp;gt;&lt;br /&gt;
- Module 3 Review &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Module 4 - Specialized Artifact Recovery'''&amp;lt;br&amp;gt;&lt;br /&gt;
- Overview&amp;lt;br&amp;gt;&lt;br /&gt;
- Exam Preparation Stage&amp;lt;br&amp;gt;&lt;br /&gt;
- Windows File Date/Time Stamps&amp;lt;br&amp;gt;&lt;br /&gt;
- File Signatures&amp;lt;br&amp;gt;&lt;br /&gt;
- Image File Databases&amp;lt;br&amp;gt;&lt;br /&gt;
- Demo - Thumbs.DB&amp;lt;br&amp;gt;&lt;br /&gt;
- The Windows OS&amp;lt;br&amp;gt;&lt;br /&gt;
- Windows Operating Environment&amp;lt;br&amp;gt;&lt;br /&gt;
- Windows Registry&amp;lt;br&amp;gt;&lt;br /&gt;
- Windows Registry Hives 1&amp;lt;br&amp;gt;&lt;br /&gt;
- Demo - Registry Overview&amp;lt;br&amp;gt;&lt;br /&gt;
- Windows Registry Hives 2&amp;lt;br&amp;gt;&lt;br /&gt;
- Windows NT/2000/XP Registry&amp;lt;br&amp;gt;&lt;br /&gt;
- Windows Registry ID Numbers&amp;lt;br&amp;gt;&lt;br /&gt;
- Windows Alternate Data Streams&amp;lt;br&amp;gt;&lt;br /&gt;
- Demo - Alternate Data Streams&amp;lt;br&amp;gt;&lt;br /&gt;
- Windows Unique ID Numbers&amp;lt;br&amp;gt;&lt;br /&gt;
- Other ID&amp;lt;br&amp;gt;&lt;br /&gt;
- Historical Files 1&amp;lt;br&amp;gt;&lt;br /&gt;
- Demo - Real Index.dat&amp;lt;br&amp;gt;&lt;br /&gt;
- Historical Files 2&amp;lt;br&amp;gt;&lt;br /&gt;
- Demo - Review of Event Viewer&amp;lt;br&amp;gt;&lt;br /&gt;
- Historical Files 3&amp;lt;br&amp;gt;&lt;br /&gt;
- Demo - Historical Entries in the Registry&amp;lt;br&amp;gt;&lt;br /&gt;
- Historical Files 4&amp;lt;br&amp;gt;&lt;br /&gt;
- Windows Recycle Bin&amp;lt;br&amp;gt;&lt;br /&gt;
- Demo - INFO Files&amp;lt;br&amp;gt;&lt;br /&gt;
- Outlook E-Mail&amp;lt;br&amp;gt;&lt;br /&gt;
- Outlook 2k/Workgroup E-Mail&amp;lt;br&amp;gt;&lt;br /&gt;
- Outlook Express 4/5/6&amp;lt;br&amp;gt;&lt;br /&gt;
- Web E-Mail&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Exercises'''&lt;br /&gt;
&lt;br /&gt;
Two cases modeled after real-world examples will be presented to the students. Students will work in a group to investigate and analyze evidence related to a computer crime and present their findings to the class.&lt;br /&gt;
&lt;br /&gt;
=  =&lt;/div&gt;</summary>
		<author><name>Puneetm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SecurityByte_and_OWASP_Asia_AppSec_Conference_2009&amp;diff=71632</id>
		<title>SecurityByte and OWASP Asia AppSec Conference 2009</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SecurityByte_and_OWASP_Asia_AppSec_Conference_2009&amp;diff=71632"/>
				<updated>2009-10-16T17:12:26Z</updated>
		
		<summary type="html">&lt;p&gt;Puneetm: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:SB OWASP 2009 banner.gif|center|link=http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009]]&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza] &amp;amp;#124; [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Registrations]&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*Register between 6th - 15th October 2009 and get '''Complementary Return Air Flight''' from anywhere in India. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Registrations Click Here]''' for more information.&lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
Securitybyte &amp;amp;amp; OWASP are proud to welcome you to the annual international information security conference – Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009, Nov 17th through Nov 20th in Delhi &amp;amp;amp; NCR, India. &lt;br /&gt;
&lt;br /&gt;
This is a landmark event, as both Securitybyte and OWASP join hands to present India’s largest InfoSec event with world renowned and most regarded international speakers. &lt;br /&gt;
&lt;br /&gt;
Securitybye &amp;amp;amp; OWASP AppSec Asia Conference 2009 will be held at [http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza, Gurgaon, NCR, India.] on 17th November through 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Security Researchers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Penetration Testers &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*IT Security Professionals &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
&lt;br /&gt;
==== About  ====&lt;br /&gt;
&lt;br /&gt;
== About Conference  ==&lt;br /&gt;
&lt;br /&gt;
Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel conference talks to be conducted in 3 separate halls for two days i.e . 17th &amp;amp;amp; 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular talk. Conference talks are being delivered by world renowned and most regarded speakers from around the world. &lt;br /&gt;
&lt;br /&gt;
== About Trainings  ==&lt;br /&gt;
&lt;br /&gt;
Two days post-conference are dedicated towards best-of-breed trainings being conducted in association with SANS, ISC2 and other organizations. Trainings tracks have been made available as One-Day tracks and Two-Day tracks scheduled for 19th &amp;amp;amp; 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
==== Registrations  ====&lt;br /&gt;
&lt;br /&gt;
== [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Registration] is now open!  ==&lt;br /&gt;
&lt;br /&gt;
=== You can register [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 here]  ===&lt;br /&gt;
&lt;br /&gt;
*[http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Click Here] for Online Registrations. &lt;br /&gt;
*[http://securitybyte.org/index.php/register.html Click Here] for Offline Registrations.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Please check out our Exclusive Discount Offer, available Starting October 6th - 15th, 2009. &amp;quot;SAVE BIG NOW !&amp;quot;&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''''The below pricing reflects the Standard Registration Prices .''''' &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Two Days of Conference (17th and 18th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.8,500/- INR &lt;br /&gt;
| General Public&lt;br /&gt;
|-&lt;br /&gt;
| Two Days of Conference (17th and 18th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.5,000/- INR &lt;br /&gt;
| Students&lt;br /&gt;
|-&lt;br /&gt;
| Two-Day Training Tracks (19th and 20th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.25,000/- INR&lt;br /&gt;
|-&lt;br /&gt;
| One-Day Training Tracks (19th OR 20th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.12,500/- INR&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;** Service Tax @ 10.3% will be charged extra.&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;ISC2&amp;lt;/b&amp;gt; Members can avail a Special 15% discount on Conference Registration.&lt;br /&gt;
(Please provide your ISC2 Certification ID number to avail the above Discount)&lt;br /&gt;
&lt;br /&gt;
== Exclusive Offers ==&lt;br /&gt;
&lt;br /&gt;
=== For Outstation (Non-NCR) Participants ===&lt;br /&gt;
&lt;br /&gt;
*'''Air Travel from anywhere in India''' * - Register between 6th - 15th October 2009 and get a return economy class air ticket from anywhere in India to New Delhi at no extra charges. &lt;br /&gt;
&lt;br /&gt;
'''OR'''&lt;br /&gt;
=== For Local (NCR) Participants ===&lt;br /&gt;
'''Complementary access to two days of conference *''' - Register for two days of trainings between 6th - 15th October 2009 and get two days of conference access without any extra charges.&lt;br /&gt;
&lt;br /&gt;
'''* Conditions:'''&lt;br /&gt;
&lt;br /&gt;
*Above offers are ONLY valid for the successful registrations made via [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 online payment gateway].&lt;br /&gt;
*These offers are valid on an individual's name and can't be clubbed between multiple participants.&lt;br /&gt;
* Offer for out-station participants is available ONLY on the registrations for bundled package of 4 days event (Two Days of Conference &amp;amp; Two Days of Trainings). &lt;br /&gt;
*Flight ticket will be issued by the organizing committee for arrival in New Delhi on 17th November 2009 and Departure from New Delhi on 20th November 2009. Offer does not apply to reimbursements for the air tickets booked by the participants themselves.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Trainings Click here for details on the training courses that are available.]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Who Should Attend Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009: ==&lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Security Researchers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Penetration Testers &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*IT Security Professionals &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;For student discount, attendees must present proof of enrollment when picking up your badge. &lt;br /&gt;
&lt;br /&gt;
==== Schedule  ====&lt;br /&gt;
&lt;br /&gt;
Three parallel conference talks are scheduled for 17th &amp;amp;amp; 18th November 2009 in three different halls. Training tracks have been divided in one-day tracks scheduled for 19th or 20th November 2009 and two-day tracks those are schedule to continue for two days both on 19th &amp;amp;amp; 20th November 2009. Follow the tabs to learn the details on both conference and trainings. &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Conference Click here] to view the '''Conference Schedule''' for 17th &amp;amp;amp; 18th November 2009.&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Trainings Click here] to view '''Training Schedule''' on 19th &amp;amp;amp; 20th November 2009.&lt;br /&gt;
&lt;br /&gt;
==== Conference  ====&lt;br /&gt;
&lt;br /&gt;
== Two Days Conference  ==&lt;br /&gt;
&lt;br /&gt;
Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel conference talks to be conducted in 3 separate halls for two days i.e . 17th &amp;amp;amp; 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular talk. Conference talks are being delivered by world renowned and most regarded speakers from around the world. Below is the detailed schedule for the two days of conference.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 1 - 17th Nov, 2009'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Where&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - I''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - II''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - III'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Who&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Researchers &amp;amp;amp; Enthusiasts)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Auditors, Developers, QA teams, Architects)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Leaders, Managers, C&amp;amp;amp;S professionals)'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 8:00 AM - 9:00 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Registrations'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Schedule''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 9:00 AM - 10:30 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Keynote'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:30 AM - 11:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea Break'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 11:00 AM - 12:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | How To Blackbox Test Almost Anything&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Aviram Jenik, Beyond Security&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | The International State of Cyber Security, Risk reduction in a high threat world&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Prof. Howard A. Schmidt, Former Cyber Security Advisor to the White house&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:00 PM - 1:00 PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Client Side Hacks&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Dino Covotsos &amp;amp; Charleton Smith, Telspace Systems&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Risk Based Penetration testing&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | K. K. Mookhey, Founder &amp;amp;amp; Principal Consultant, NII Consulting&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Applications, the source for CyberThreats&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Mano Paul,Software Assurance Advisor,(ISC)2&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 1:00PM - 2:00PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Lunch'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 2:00 PM - 3:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Exploiting Firefox Extensions&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Roberto Suggi Liverani, Security-Assessment.com&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Threat Modeling&amp;lt;br&amp;gt;&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Varun Sharma,Microsoft India&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Enterprise Application Security Program&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 3:00 PM - 4:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | SQL Server Forensics 2.0&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Kevvie Fowler, TELUS &amp;amp;amp; Ringzero&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | OWASP SAMM&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Pravir Chandra, Director of Strategic Services,&amp;lt;br&amp;gt;Fortify&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Business Case - Risk Management/Compliance at leading Education Group AMITY (Rapid Fire: 30 Min talk)&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Dr. JS Sodhi, CIO, AMITY Group&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 4:00 PM - 5:00 PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Ownage 2.0 - How to own the World&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Saumil Shah, NetSquare Solutions&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | &amp;quot;Do you want to play a Game&amp;quot; - Game theory and Cyberwar&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Bryan K. Fite, HackSecKlahn&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Usability and Privacy in Security&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Dr. Ponnurangam Kumaraguru, Asst. Professor - IIIT (Rapid Fire : 30 Min talk)&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 5:00 PM - 6:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea and Snacks on the Exhibition floor'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 7:00 PM - 10:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''CXO Event (Exclusive by invitation only) - Information Security Concerns for Offshoring'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 2 - 18th Nov, 2009'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Where&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - I''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - II''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - III'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Who&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Researchers &amp;amp;amp; Enthusiasts)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Auditors, Developers, QA teams, Architects)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Leaders, Managers, C&amp;amp;amp;S professionals)'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 8:00 AM - 9:00 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Registrations'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 9:00 AM - 10:00 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Round Table with Speakers / Industry Panel - &amp;quot;Security Today &amp;amp; Tomorrow''''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:00 AM - 10:30 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea Break'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Schedule''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:30 AM - 11:30&amp;amp;nbsp;AM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | All your Packets belong to us&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Daniel Mende, Security Researcher, ERNW&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | SANS Dshield Webhoneypot Project&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Jason Lam, Independent Security Researcher&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Critical Infrastructure Security “Danger Without borders” &amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | John Bumgarner, US Cyber Consequence Unit (USCCU)&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 11:30 AM - 12:30 PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Hacking Oracle From Web&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Sid, Independent Security Researcher&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Testing JSON Applications For Security Holes&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Aviram Jenik, Beyond Security&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Critical Infrastructure Security “Danger Without borders” &amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | John Bumgarner, US Cyber Consequence Unit (USCCU)&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:30PM - 1:30PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Lunch'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 1:30 PM&amp;amp;nbsp;- 2:30 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Lust 2.0 – Desire for free WiFi and the threat of the Imposter &amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Lava Kumar Kuppan, Independent Security Researcher&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Cloud Hacking - Distributed Attacks &amp;amp; Exploits&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Shreeraj Shah, Blueinfy Solutions&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Cedric Blancher, EADS Innovation Works&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 2:30 PM - 3:30&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Xprobe3 - What's New? Going Application Level&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Fyodor Yarochkin, Armorize&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Nitin Kumar/Vipin Kumar, Independent Security Researchers, NVlabs&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Behind the Scenes at Microsoft Security Response Center&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Dave Midturi,MSRC, Microsoft Corp.&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 3:30PM - 4:00PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea Break'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 4:00 PM - 5:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 5:00 PM - 6:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Closing Keynotes - &amp;quot;OWASP &amp;amp; Securitybyte&amp;quot;'''&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Trainings  ====&lt;br /&gt;
&lt;br /&gt;
== Two Day Trainings  ==&lt;br /&gt;
&lt;br /&gt;
Two days post-conference are dedicated towards best-of-breed trainings being conducted in association with SANS, ISC2 and other organizations. Trainings tracks have been made available as One-Day tracks and Two-Day tracks scheduled for 19th &amp;amp;amp; 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 1 - 19th Nov, 2009'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 2 - 20th Nov, 2009'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course ID''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course Duration''' &lt;br /&gt;
(# of Days) &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course Title''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Instructor''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course ID''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course Duration''' &lt;br /&gt;
(# of Days) &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course Title''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Instructor'''&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;30&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''One Day Training Tracks'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DHSO''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Oracle_Hacking_and_security ORACLE Hacking &amp;amp;amp; Security]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Sumit Sidharth,[[Image:Sb logo.png|center|78x50px|link=http://www.securitybyte.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DAWH''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Advanced_Web_Hacking Advanced Web Hacking -Securing AJAX, RIA &amp;amp;amp; SOA]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Shreeraj Shah [[Image:Blueinfy logo.png|center|link=http://www.blueinfy.com]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DAFT'''&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Advanced_Forensic_Techniques Advanced Forensics Techniques]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
The Grugq,[[Image:Sb logo.png|center|78x50px|link=http://www.securitybyte.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DIAT'''&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/InDepth_Assessment_Techniques In-depth Assessment Techniques: Design, Code, and Runtime]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Pravir Chandra, &lt;br /&gt;
&lt;br /&gt;
[[Image:Fortify.jpg|center|93x31px|link=http://www.fortify.com]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;30&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Two Day Training Tracks'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DBWH''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Hacking_bluetooth_and_wireless_101 Hacking Wireless &amp;amp;amp; Bluetooth 101]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Dino Covotsos /&amp;lt;br&amp;gt;Charlton Smith,[[Image:Telspace logo.png|center|76x50px]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DBWH''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Hacking_bluetooth_and_wireless_101 Hacking Wireless &amp;amp;amp; Bluetooth 101]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Dino Covotsos /&amp;lt;br&amp;gt;Charlton Smith,[[Image:Telspace logo.png|center|72x47px]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DNST''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Building_Advanced_Network_Security_tools Building advanced Network Security Tools]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Daniel Mende,[[Image:Ernw logo.png|center]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DNST''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Building_Advanced_Network_Security_tools Building advanced Network Security Tools]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Daniel Mende,[[Image:Ernw logo.png|center]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DCBC''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/ISC2_CSSLP_CBK_Bootcamp (ISC)2 CSSLP CBK Boot camp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Mano Paul,[[Image:Isc logo.png|center|78x50px|link=http://www.isc2.org]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DCBC''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/ISC2_CSSLP_CBK_Bootcamp (ISC)2 CSSLP CBK Boot camp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Mano Paul,[[Image:Isc logo.png|center|78x50px|link=http://www.isc2.org]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSCJ / SANS Course ID&amp;amp;nbsp;: DEV530''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_Essential_Secure_Coding_Java_JEE_GSSP Essential Secure Coding in Java / JEE]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSCJ / SANS Course ID&amp;amp;nbsp;: DEV530''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_Essential_Secure_Coding_Java_JEE_GSSP Essential Secure Coding in Java / JEE]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DWPT / SANS Course ID&amp;amp;nbsp;: DEV538''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_WebApp_Pentesting_handsOn_immersion Web Application Pen Testing Hands-On Immersion]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DWPT / SANS Course ID&amp;amp;nbsp;: DEV538''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_WebApp_Pentesting_handsOn_immersion Web Application Pen Testing Hands-On Immersion]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSAB / SANS Course ID&amp;amp;nbsp;: AUD429''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_IT_Security_Audit_Bootcamp IT Security Audit Essentials Bootcamp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSAB / SANS Course ID&amp;amp;nbsp;: AUD429''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_IT_Security_Audit_Bootcamp IT Security Audit Essentials Bootcamp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Venue  ====&lt;br /&gt;
&lt;br /&gt;
Four Days Event is planned out at: &lt;br /&gt;
&lt;br /&gt;
[http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza,]&amp;lt;br&amp;gt;Site - 2, Sector - 29, &amp;lt;br&amp;gt;Gurgaon-122001 (National Capital Region), India&amp;lt;br&amp;gt;Hotel Front Desk: 91-124-4534000&amp;lt;br&amp;gt;Hotel Fax: 91-124-4304800&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | '''Co-Sponsor &amp;quot;CXO Evening&amp;quot;'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | '''CTF&amp;amp;nbsp;(Capture The Flag) Sponsor'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | '''Education &amp;amp;nbsp;Partner'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:20th green stacked.png|center|ISC2|link=http://www.isc2.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
| [[Image:Appin.jpg|center|link=http://www.appinsecurity.com]]&amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
| [[Image:BRIP-Logo.jpg|center|link=http://www.brip.co.in]]&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Associate Sponsors'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;90&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Media Partners'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Supporters'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Torridn.jpg|center|link=http://www.torridnetworks.com]] &lt;br /&gt;
| [[Image:SSecurity_india_small.gif‎ |center|link=http://www.searchsecurity.in]]&lt;br /&gt;
| [[Image:HITB.jpg|center|link=http://conference.hitb.org]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:SecurityCompass.JPG|center|link=http://www.securitycompass.com]] &lt;br /&gt;
| [[Image:HNS-web.jpg|center|link=http://www.net-security.org]] &lt;br /&gt;
| [[Image:Sector.jpg|center|link=http://www.sector.ca]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! valign=&amp;quot;baseline&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| [[Image:Infosecurity.jpg|center|link=http://www.infosecuritymagz.com]] &amp;lt;br&amp;gt;&lt;br /&gt;
| [[Image:Clubhack.gif|center]]&amp;lt;br&amp;gt;[[Image:Eventavenue Logo.jpg|center|link=https://www.eventavenue.com]]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| [[Image:Itmagz.jpg|center]]&amp;amp;nbsp;[[Image:Electronicsf.jpg|center|link=http://www.electronicsforu.com]] &lt;br /&gt;
| [[Image:Crowne plaza.jpg|center|link=http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
==== Hotel &amp;amp; Travel  ====&lt;br /&gt;
&lt;br /&gt;
== Hotel Stay &amp;amp; Travel Infomation  ==&lt;br /&gt;
&lt;br /&gt;
To help our valued delegates with Hotel and Travel services, we have negotiated with some of the best and Budget Category Guest houses in Gurgaon that are located within a radius of 3 - 4 Kms from the venue.&lt;br /&gt;
&lt;br /&gt;
Limited cheaper accommodation is available near the venue hotel in budget hotels/apartments area. The tariff of these hotels ranges from Rs.2000 onwards per room night (inclusive of Room Rent, Breakfast and Luxury Tax).  Interested delegates / students can send a formal request for the desired accommodations and dates to our official travel agent.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;OFFICIAL TRAVEL AGENT&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dreamz conference Management Pvt.Ltd&amp;lt;/b&amp;gt; will look after your hotel accommodation in Gurgaon and New Delhi, pre &amp;amp; post conference tours / travel needs in India for delegates and visitors independently. If you wish to go for sightseeing tour within New Delhi and around it to places like Agra, Jaipur, Rajasthan etc. However, we would encourage you to make early bookings which will be done on “first – come - first service” basis and let us know of your interest, since that would ultimately work in your favour. Early reservation is strongly recommended as November being a high demand period for hotels in Gurgaon.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
For further details please contact:&lt;br /&gt;
&lt;br /&gt;
DREAMZ CONFERENCE MANAGEMENT PVT.LTD&lt;br /&gt;
&lt;br /&gt;
406, Ansal’s Majestic Tower, Vikas Puri, New Delhi – 110018&lt;br /&gt;
&lt;br /&gt;
Tel: 91 – 11 – 41586401, 402, Fax: 91 – 11 – 41586400&lt;br /&gt;
&lt;br /&gt;
Email: info@dreamztravel.net / dreamztravelindia@yahoo.com&lt;br /&gt;
&lt;br /&gt;
Website: www.dreamztravel.net&lt;br /&gt;
&lt;br /&gt;
Contact Person: Jitin Batra ( +91 9810558569 )&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
Please contact [http://www.owasp.org/index.php/Category:India#OWASP_India_Co-Chairs Chair - OWASP India] for sponsorship opportunities. &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Category:India Category: OWASP India]&lt;/div&gt;</summary>
		<author><name>Puneetm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:SSecurity_india_small.gif&amp;diff=71631</id>
		<title>File:SSecurity india small.gif</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:SSecurity_india_small.gif&amp;diff=71631"/>
				<updated>2009-10-16T17:01:33Z</updated>
		
		<summary type="html">&lt;p&gt;Puneetm: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Puneetm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:SSecurity_india_small.jpg&amp;diff=71630</id>
		<title>File:SSecurity india small.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:SSecurity_india_small.jpg&amp;diff=71630"/>
				<updated>2009-10-16T17:00:18Z</updated>
		
		<summary type="html">&lt;p&gt;Puneetm: uploaded a new version of &amp;quot;File:SSecurity india small.jpg&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Puneetm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:SSecurity_india_small.jpg&amp;diff=71629</id>
		<title>File:SSecurity india small.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:SSecurity_india_small.jpg&amp;diff=71629"/>
				<updated>2009-10-16T16:45:33Z</updated>
		
		<summary type="html">&lt;p&gt;Puneetm: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Puneetm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:SSecurity_india.jpg&amp;diff=71628</id>
		<title>File:SSecurity india.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:SSecurity_india.jpg&amp;diff=71628"/>
				<updated>2009-10-16T16:36:40Z</updated>
		
		<summary type="html">&lt;p&gt;Puneetm: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Puneetm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Advanced_Forensic_Techniques&amp;diff=70918</id>
		<title>Advanced Forensic Techniques</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Advanced_Forensic_Techniques&amp;diff=70918"/>
				<updated>2009-10-06T17:47:13Z</updated>
		
		<summary type="html">&lt;p&gt;Puneetm: /* Advanced Forensics Techniques */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= '''Advanced Forensics Techniques''' =&lt;br /&gt;
&lt;br /&gt;
Course: Advanced Forensics Techniques&amp;lt;br&amp;gt;Course ID: SB1DAFT&amp;lt;br&amp;gt;Instructor: The Grugq&amp;lt;br&amp;gt;CPE Credits: 7 CPE’s&amp;lt;br&amp;gt;Duration: 1 Day&amp;lt;br&amp;gt;Date: November 19th, 2009 (9 AM – 6 PM)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Who should attend?'''&amp;lt;br&amp;gt;• General IT security specialists and administrators&amp;lt;br&amp;gt;• IT security specialists who are interested in learning core concepts of Forensics specifically&amp;lt;br&amp;gt;• Security officers for organisations and companies&amp;lt;br&amp;gt;• Law Enforcement agencies&amp;lt;br&amp;gt;• Incident Response Team members&lt;br /&gt;
&lt;br /&gt;
'''Class Pre-requisite:'''&amp;lt;br&amp;gt;• This class is for anyone who wants to begin with Forensics.&lt;br /&gt;
&lt;br /&gt;
'''Class Requirement:'''&amp;lt;br&amp;gt;• Students to carry their laptop with at least Windows XP professional SP2.&amp;lt;br&amp;gt;• Students should have Administrative access / Privileges on the laptop for installing software.&amp;lt;br&amp;gt;• USB or CD/DVDROM device (N.B for bootable software).&amp;lt;br&amp;gt;• Wireless Enabled&amp;lt;br&amp;gt;• Required tools would be distributed during the session&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Course Description:'''&lt;br /&gt;
&lt;br /&gt;
This course covers the fundamental steps of the in-depth computer forensic methodology so that each student will have the complete qualifications to work as a computer forensic investigator in the field helping solve and fight crime.&amp;lt;br&amp;gt;&lt;br /&gt;
'''More details coming soon !!'''&lt;br /&gt;
&lt;br /&gt;
=  =&lt;/div&gt;</summary>
		<author><name>Puneetm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SecurityByte_and_OWASP_Asia_AppSec_Conference_2009&amp;diff=70868</id>
		<title>SecurityByte and OWASP Asia AppSec Conference 2009</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SecurityByte_and_OWASP_Asia_AppSec_Conference_2009&amp;diff=70868"/>
				<updated>2009-10-06T15:25:43Z</updated>
		
		<summary type="html">&lt;p&gt;Puneetm: /* You can register here */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:SB OWASP 2009 banner.gif|center|link=http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009]]&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza] &amp;amp;#124; [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Registrations]&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*Register between 6th - 15th October 2009 and get '''Complementary Return Air Flight''' from anywhere in India. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Registrations Click Here]''' for more information.&lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
Securitybyte &amp;amp;amp; OWASP are proud to welcome you to the annual international information security conference – Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009, Nov 17th through Nov 20th in Delhi &amp;amp;amp; NCR, India. &lt;br /&gt;
&lt;br /&gt;
This is a landmark event, as both Securitybyte and OWASP join hands to present India’s largest InfoSec event with world renowned and most regarded international speakers. &lt;br /&gt;
&lt;br /&gt;
Securitybye &amp;amp;amp; OWASP AppSec Asia Conference 2009 will be held at [http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza, Gurgaon, NCR, India.] on 17th November through 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Security Researchers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Penetration Testers &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*IT Security Professionals &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
&lt;br /&gt;
==== About  ====&lt;br /&gt;
&lt;br /&gt;
== About Conference  ==&lt;br /&gt;
&lt;br /&gt;
Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel conference talks to be conducted in 3 separate halls for two days i.e . 17th &amp;amp;amp; 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular talk. Conference talks are being delivered by world renowned and most regarded speakers from around the world. &lt;br /&gt;
&lt;br /&gt;
== About Trainings  ==&lt;br /&gt;
&lt;br /&gt;
Two days post-conference are dedicated towards best-of-breed trainings being conducted in association with SANS, ISC2 and other organizations. Trainings tracks have been made available as One-Day tracks and Two-Day tracks scheduled for 19th &amp;amp;amp; 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
==== Registrations  ====&lt;br /&gt;
&lt;br /&gt;
== [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Registration] is now open!  ==&lt;br /&gt;
&lt;br /&gt;
=== You can register [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 here]  ===&lt;br /&gt;
&lt;br /&gt;
*[http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Click Here] for Online Registrations. &lt;br /&gt;
*[http://securitybyte.org/index.php/register.html Click Here] for Offline Registrations.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Please check out our Exclusive Discount Offer, available Starting October 6th - 15th, 2009. &amp;quot;SAVE BIG NOW !&amp;quot;&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''''The below pricing reflects the Standard Registration Prices .''''' &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Two Days of Conference (17th and 18th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.8,500/- INR &lt;br /&gt;
| General Public&lt;br /&gt;
|-&lt;br /&gt;
| Two Days of Conference (17th and 18th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.5,000/- INR &lt;br /&gt;
| Students&lt;br /&gt;
|-&lt;br /&gt;
| Two-Day Training Tracks (19th and 20th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.25,000/- INR&lt;br /&gt;
|-&lt;br /&gt;
| One-Day Training Tracks (19th OR 20th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| Rs.12,500/- INR&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;** Service Tax @ 10.3% will be charged extra.&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;ISC2&amp;lt;/b&amp;gt; Members can avail a Special 15% discount on Conference Registration.&lt;br /&gt;
(Please provide your ISC2 Certification ID number to avail the above Discount)&lt;br /&gt;
&lt;br /&gt;
== Exclusive Offers ==&lt;br /&gt;
&lt;br /&gt;
=== For Outstation (Non-NCR) Participants ===&lt;br /&gt;
&lt;br /&gt;
*'''Air Travel from anywhere in India''' * - Register between 6th - 15th October 2009 and get a return economy class air ticket from anywhere in India to New Delhi at no extra charges. &lt;br /&gt;
&lt;br /&gt;
'''OR'''&lt;br /&gt;
=== For Local (NCR) Participants ===&lt;br /&gt;
'''Complementary access to two days of conference *''' - Register for two days of trainings between 6th - 15th October 2009 and get two days of conference access without any extra charges.&lt;br /&gt;
&lt;br /&gt;
'''* Conditions:'''&lt;br /&gt;
&lt;br /&gt;
*Above offers are ONLY valid for the successful registrations made via [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 online payment gateway].&lt;br /&gt;
*These offers are valid on an individual's name and can't be clubbed between multiple participants.&lt;br /&gt;
* Offer for out-station participants is available ONLY on the registrations for bundled package of 4 days event (Two Days of Conference &amp;amp; Two Days of Trainings). &lt;br /&gt;
*Flight ticket will be issued by the organizing committee for arrival in New Delhi on 17th November 2009 and Departure from New Delhi on 20th November 2009. Offer does not apply to reimbursements for the air tickets booked by the participants themselves.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Trainings Click here for details on the training courses that are available.]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Who Should Attend Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009: ==&lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Security Researchers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Penetration Testers &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*IT Security Professionals &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;For student discount, attendees must present proof of enrollment when picking up your badge. &lt;br /&gt;
&lt;br /&gt;
==== Schedule  ====&lt;br /&gt;
&lt;br /&gt;
Three parallel conference talks are scheduled for 17th &amp;amp;amp; 18th November 2009 in three different halls. Training tracks have been divided in one-day tracks scheduled for 19th or 20th November 2009 and two-day tracks those are schedule to continue for two days both on 19th &amp;amp;amp; 20th November 2009. Follow the tabs to learn the details on both conference and trainings. &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Conference Click here] to view the '''Conference Schedule''' for 17th &amp;amp;amp; 18th November 2009.&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Trainings Click here] to view '''Training Schedule''' on 19th &amp;amp;amp; 20th November 2009.&lt;br /&gt;
&lt;br /&gt;
==== Conference  ====&lt;br /&gt;
&lt;br /&gt;
== Two Days Conference  ==&lt;br /&gt;
&lt;br /&gt;
Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel conference talks to be conducted in 3 separate halls for two days i.e . 17th &amp;amp;amp; 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular talk. Conference talks are being delivered by world renowned and most regarded speakers from around the world. Below is the detailed schedule for the two days of conference.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 1 - 17th Nov, 2009'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Where&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - I''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - II''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - III'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Who&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Researchers &amp;amp;amp; Enthusiasts)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Auditors, Developers, QA teams, Architects)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Leaders, Managers, C&amp;amp;amp;S professionals)'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 8:00 AM - 9:00 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Registrations'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Schedule''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 9:00 AM - 10:30 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Keynote'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:30 AM - 11:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea Break'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 11:00 AM - 12:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | How To Blackbox Test Almost Anything&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Aviram Jenik, Beyond Security&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | The International State of Cyber Security, Risk reduction in a high threat world&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Prof. Howard A. Schmidt, Former Cyber Security Advisor to the White house&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:00 PM - 1:00 PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Client Side Hacks&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Dino Covotsos &amp;amp; Charleton Smith, Telspace Systems&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Risk Based Penetration testing&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | K. K. Mookhey, Founder &amp;amp;amp; Principal Consultant, NII Consulting&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Applications, the source for CyberThreats&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Mano Paul,Software Assurance Advisor,(ISC)2&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 1:00PM - 2:00PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Lunch'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 2:00 PM - 3:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Exploiting Firefox Extensions&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Roberto Suggi Liverani, Security-Assessment.com&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Threat Modeling&amp;lt;br&amp;gt;&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Varun Sharma,Microsoft India&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Enterprise Application Security Program&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 3:00 PM - 4:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | SQL Server Forensics 2.0&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Kevvie Fowler, TELUS &amp;amp;amp; Ringzero&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | OWASP SAMM&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Pravir Chandra, Director of Strategic Services,&amp;lt;br&amp;gt;Fortify&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Business Case - Risk Management/Compliance at leading Education Group AMITY (Rapid Fire: 30 Min talk)&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Dr. JS Sodhi, CIO, AMITY Group&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 4:00 PM - 5:00 PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Ownage 2.0 - How to own the World&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Saumil Shah, NetSquare Solutions&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | &amp;quot;Do you want to play a Game&amp;quot; - Game theory and Cyberwar&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Bryan K. Fite, HackSecKlahn&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Usability and Privacy in Security&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Dr. Ponnurangam Kumaraguru, Asst. Professor - IIIT (Rapid Fire : 30 Min talk)&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 5:00 PM - 6:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea and Snacks on the Exhibition floor'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 7:00 PM - 10:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''CXO Event (Exclusive by invitation only) - Information Security Concerns for Offshoring'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 2 - 18th Nov, 2009'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Where&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - I''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - II''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - III'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Who&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Researchers &amp;amp;amp; Enthusiasts)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Auditors, Developers, QA teams, Architects)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Leaders, Managers, C&amp;amp;amp;S professionals)'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 8:00 AM - 9:00 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Registrations'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 9:00 AM - 10:00 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Round Table with Speakers / Industry Panel - &amp;quot;Security Today &amp;amp; Tomorrow''''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:00 AM - 10:30 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea Break'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Schedule''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:30 AM - 11:30&amp;amp;nbsp;AM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | All your Packets belong to us&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Daniel Mende, Security Researcher, ERNW&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | SANS Dshield Webhoneypot Project&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Jason Lam, Independent Security Researcher&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Critical Infrastructure Security “Danger Without borders” &amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | John Bumgarner, US Cyber Consequence Unit (USCCU)&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 11:30 AM - 12:30 PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Hacking Oracle From Web&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Sid, Independent Security Researcher&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Testing JSON Applications For Security Holes&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Aviram Jenik, Beyond Security&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Critical Infrastructure Security “Danger Without borders” &amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | John Bumgarner, US Cyber Consequence Unit (USCCU)&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:30PM - 1:30PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Lunch'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 1:30 PM&amp;amp;nbsp;- 2:30 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Lust 2.0 – Desire for free WiFi and the threat of the Imposter &amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Lava Kumar Kuppan, Independent Security Researcher&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Cloud Hacking - Distributed Attacks &amp;amp; Exploits&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Shreeraj Shah, Blueinfy Solutions&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Cedric Blancher, EADS Innovation Works&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 2:30 PM - 3:30&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Xprobe3 - What's New? Going Application Level&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Fyodor Yarochkin, Armorize&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Nitin Kumar/Vipin Kumar, Independent Security Researchers, NVlabs&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Behind the Scenes at Microsoft Security Response Center&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Dave Midturi,MSRC, Microsoft Corp.&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 3:30PM - 4:00PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea Break'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 4:00 PM - 5:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 5:00 PM - 6:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Closing Keynotes - &amp;quot;OWASP &amp;amp; Securitybyte&amp;quot;'''&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Trainings  ====&lt;br /&gt;
&lt;br /&gt;
== Two Day Trainings  ==&lt;br /&gt;
&lt;br /&gt;
Two days post-conference are dedicated towards best-of-breed trainings being conducted in association with SANS, ISC2 and other organizations. Trainings tracks have been made available as One-Day tracks and Two-Day tracks scheduled for 19th &amp;amp;amp; 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 1 - 19th Nov, 2009'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 2 - 20th Nov, 2009'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course ID''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course Duration''' &lt;br /&gt;
(# of Days) &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course Title''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Instructor''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course ID''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course Duration''' &lt;br /&gt;
(# of Days) &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course Title''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Instructor'''&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;30&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''One Day Training Tracks'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DHSO''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Oracle_Hacking_and_security ORACLE Hacking &amp;amp;amp; Security]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Sumit Sidharth,[[Image:Sb logo.png|center|78x50px|link=http://www.securitybyte.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DAWH''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Advanced_Web_Hacking Advanced Web Hacking -Securing AJAX, RIA &amp;amp;amp; SOA]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Shreeraj Shah [[Image:Blueinfy logo.png|center|link=http://www.blueinfy.com]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DAFT'''&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Advanced_Forensic_Techniques Advanced Forensics Techniques]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
The Grugq,[[Image:Sb logo.png|center|78x50px|link=http://www.securitybyte.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DIAT'''&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/InDepth_Assessment_Techniques In-depth Assessment Techniques: Design, Code, and Runtime]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Pravir Chandra, &lt;br /&gt;
&lt;br /&gt;
[[Image:Fortify.jpg|center|93x31px|link=http://www.fortify.com]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;30&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Two Day Training Tracks'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DBWH''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Hacking_bluetooth_and_wireless_101 Hacking Wireless &amp;amp;amp; Bluetooth 101]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Dino Covotsos /&amp;lt;br&amp;gt;Charlton Smith,[[Image:Telspace logo.png|center|76x50px]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DBWH''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Hacking_bluetooth_and_wireless_101 Hacking Wireless &amp;amp;amp; Bluetooth 101]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Dino Covotsos /&amp;lt;br&amp;gt;Charlton Smith,[[Image:Telspace logo.png|center|72x47px]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DNST''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Building_Advanced_Network_Security_tools Building advanced Network Security Tools]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Daniel Mende,[[Image:Ernw logo.png|center]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DNST''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Building_Advanced_Network_Security_tools Building advanced Network Security Tools]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Daniel Mende,[[Image:Ernw logo.png|center]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DCBC''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/ISC2_CSSLP_CBK_Bootcamp (ISC)2 CSSLP CBK Boot camp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Mano Paul,[[Image:Isc logo.png|center|78x50px|link=http://www.isc2.org]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DCBC''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/ISC2_CSSLP_CBK_Bootcamp (ISC)2 CSSLP CBK Boot camp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Mano Paul,[[Image:Isc logo.png|center|78x50px|link=http://www.isc2.org]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSCJ / SANS Course ID&amp;amp;nbsp;: DEV530''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_Essential_Secure_Coding_Java_JEE_GSSP Essential Secure Coding in Java / JEE]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSCJ / SANS Course ID&amp;amp;nbsp;: DEV530''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_Essential_Secure_Coding_Java_JEE_GSSP Essential Secure Coding in Java / JEE]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DWPT / SANS Course ID&amp;amp;nbsp;: DEV538''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_WebApp_Pentesting_handsOn_immersion Web Application Pen Testing Hands-On Immersion]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DWPT / SANS Course ID&amp;amp;nbsp;: DEV538''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_WebApp_Pentesting_handsOn_immersion Web Application Pen Testing Hands-On Immersion]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSAB / SANS Course ID&amp;amp;nbsp;: AUD429''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_IT_Security_Audit_Bootcamp IT Security Audit Essentials Bootcamp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSAB / SANS Course ID&amp;amp;nbsp;: AUD429''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_IT_Security_Audit_Bootcamp IT Security Audit Essentials Bootcamp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Venue  ====&lt;br /&gt;
&lt;br /&gt;
Four Days Event is planned out at: &lt;br /&gt;
&lt;br /&gt;
[http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza,]&amp;lt;br&amp;gt;Site - 2, Sector - 29, &amp;lt;br&amp;gt;Gurgaon-122001 (National Capital Region), India&amp;lt;br&amp;gt;Hotel Front Desk: 91-124-4534000&amp;lt;br&amp;gt;Hotel Fax: 91-124-4304800&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | '''Co-Sponsor &amp;quot;CXO Evening&amp;quot;'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | '''CTF&amp;amp;nbsp;(Capture The Flag) Sponsor'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | '''Education &amp;amp;nbsp;Partner'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:20th green stacked.png|center|ISC2|link=http://www.isc2.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
| [[Image:Appin.jpg|center|link=http://www.appinsecurity.com]]&amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
| [[Image:BRIP-Logo.jpg|center|link=http://www.brip.co.in]]&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Associate Sponsors'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Media Partners'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Supporters'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Torridn.jpg|center|link=http://www.torridnetworks.com]] &lt;br /&gt;
| [[Image:Infosecurity.jpg|center|link=http://www.infosecuritymagz.com]] &lt;br /&gt;
| [[Image:HITB.jpg|center|link=http://conference.hitb.org]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:SecurityCompass.JPG|center|link=http://www.securitycompass.com]] &lt;br /&gt;
| [[Image:HNS-web.jpg|center|link=http://www.net-security.org]] &lt;br /&gt;
| [[Image:Sector.jpg|center|link=http://www.sector.ca]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! valign=&amp;quot;baseline&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| [[Image:Itmagz.jpg|center]]&amp;amp;nbsp;[[Image:Electronicsf.jpg|center|link=http://www.electronicsforu.com]] &lt;br /&gt;
| [[Image:Clubhack.gif|center]]&amp;lt;br&amp;gt;[[Image:Eventavenue Logo.jpg|center|link=https://www.eventavenue.com]]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;amp;nbsp; &lt;br /&gt;
| [[Image:Crowne plaza.jpg|center|link=http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
==== Hotel &amp;amp; Travel  ====&lt;br /&gt;
&lt;br /&gt;
== Hotel Stay &amp;amp; Travel Infomation  ==&lt;br /&gt;
&lt;br /&gt;
To help our valued delegates with Hotel and Travel services, we have negotiated with some of the best and Budget Category Guest houses in Gurgaon that are located within a radius of 3 - 4 Kms from the venue.&lt;br /&gt;
&lt;br /&gt;
Limited cheaper accommodation is available near the venue hotel in budget hotels/apartments area. The tariff of these hotels ranges from Rs.2000 onwards per room night (inclusive of Room Rent, Breakfast and Luxury Tax).  Interested delegates / students can send a formal request for the desired accommodations and dates to our official travel agent.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;OFFICIAL TRAVEL AGENT&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dreamz conference Management Pvt.Ltd&amp;lt;/b&amp;gt; will look after your hotel accommodation in Gurgaon and New Delhi, pre &amp;amp; post conference tours / travel needs in India for delegates and visitors independently. If you wish to go for sightseeing tour within New Delhi and around it to places like Agra, Jaipur, Rajasthan etc. However, we would encourage you to make early bookings which will be done on “first – come - first service” basis and let us know of your interest, since that would ultimately work in your favour. Early reservation is strongly recommended as November being a high demand period for hotels in Gurgaon.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
For further details please contact:&lt;br /&gt;
&lt;br /&gt;
DREAMZ CONFERENCE MANAGEMENT PVT.LTD&lt;br /&gt;
&lt;br /&gt;
406, Ansal’s Majestic Tower, Vikas Puri, New Delhi – 110018&lt;br /&gt;
&lt;br /&gt;
Tel: 91 – 11 – 41586401, 402, Fax: 91 – 11 – 41586400&lt;br /&gt;
&lt;br /&gt;
Email: info@dreamztravel.net / dreamztravelindia@yahoo.com&lt;br /&gt;
&lt;br /&gt;
Website: www.dreamztravel.net&lt;br /&gt;
&lt;br /&gt;
Contact Person: Jitin Batra ( +91 9810558569 )&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
Please contact [http://www.owasp.org/index.php/Category:India#OWASP_India_Co-Chairs Chair - OWASP India] for sponsorship opportunities. &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Category:India Category: OWASP India]&lt;/div&gt;</summary>
		<author><name>Puneetm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SecurityByte_and_OWASP_Asia_AppSec_Conference_2009&amp;diff=70835</id>
		<title>SecurityByte and OWASP Asia AppSec Conference 2009</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SecurityByte_and_OWASP_Asia_AppSec_Conference_2009&amp;diff=70835"/>
				<updated>2009-10-06T15:12:53Z</updated>
		
		<summary type="html">&lt;p&gt;Puneetm: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:SB OWASP 2009 banner.gif|center|link=http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009]]&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza] &amp;amp;#124; [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Registrations]&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*Register between 6th - 15th October 2009 and get '''Complementary Return Air Flight''' from anywhere in India. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Registrations Click Here]''' for more information.&lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
Securitybyte &amp;amp;amp; OWASP are proud to welcome you to the annual international information security conference – Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009, Nov 17th through Nov 20th in Delhi &amp;amp;amp; NCR, India. &lt;br /&gt;
&lt;br /&gt;
This is a landmark event, as both Securitybyte and OWASP join hands to present India’s largest InfoSec event with world renowned and most regarded international speakers. &lt;br /&gt;
&lt;br /&gt;
Securitybye &amp;amp;amp; OWASP AppSec Asia Conference 2009 will be held at [http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza, Gurgaon, NCR, India.] on 17th November through 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Security Researchers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Penetration Testers &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*IT Security Professionals &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
&lt;br /&gt;
==== About  ====&lt;br /&gt;
&lt;br /&gt;
== About Conference  ==&lt;br /&gt;
&lt;br /&gt;
Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel conference talks to be conducted in 3 separate halls for two days i.e . 17th &amp;amp;amp; 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular talk. Conference talks are being delivered by world renowned and most regarded speakers from around the world. &lt;br /&gt;
&lt;br /&gt;
== About Trainings  ==&lt;br /&gt;
&lt;br /&gt;
Two days post-conference are dedicated towards best-of-breed trainings being conducted in association with SANS, ISC2 and other organizations. Trainings tracks have been made available as One-Day tracks and Two-Day tracks scheduled for 19th &amp;amp;amp; 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
==== Registrations  ====&lt;br /&gt;
&lt;br /&gt;
== [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Registration] is now open!  ==&lt;br /&gt;
&lt;br /&gt;
=== You can register [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 here]  ===&lt;br /&gt;
&lt;br /&gt;
*[http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Click Here] for Online Registrations. &lt;br /&gt;
*[http://securitybyte.org/index.php/register.html Click Here] for Offline Registrations.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The below Current pricing reflects an &amp;lt;b&amp;gt;&amp;quot;Early Bird&amp;quot; discount of 10% &amp;lt;/b&amp;gt;off from regular registration price of 8,500/- INR for two days of conference, 12,500/- for one-day training track and 25,000/- for two-days training tracks.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;The below &amp;lt;b&amp;gt;&amp;quot;Early Bird&amp;quot; Offer&amp;lt;/b&amp;gt; closes on 5th October 2009.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Two Days of Conference (17th and 18th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| 7,650/- INR &lt;br /&gt;
| General Public&lt;br /&gt;
|-&lt;br /&gt;
| Two Days of Conference (17th and 18th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| 5,000/- INR &lt;br /&gt;
| Students&lt;br /&gt;
|-&lt;br /&gt;
| Two-Day Training Tracks (19th and 20th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| 22,500/- INR&lt;br /&gt;
|-&lt;br /&gt;
| One-Day Training Tracks (19th OR 20th November 2009) &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| 11,250/- INR&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;** Service Tax @ 10.3% will be charged extra.&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;ISC2&amp;lt;/b&amp;gt; Members can avail a Special 15% discount on Conference Registration.&lt;br /&gt;
(Please provide your ISC2 Certification ID number to avail the above Discount)&lt;br /&gt;
&lt;br /&gt;
== Exclusive Offers ==&lt;br /&gt;
&lt;br /&gt;
=== For Outstation (Non-NCR) Participants ===&lt;br /&gt;
&lt;br /&gt;
*'''Air Travel from anywhere in India''' * - Register between 6th - 15th October 2009 and get a return economy class air ticket from anywhere in India to New Delhi at no extra charges. &lt;br /&gt;
&lt;br /&gt;
'''OR'''&lt;br /&gt;
=== For Local (NCR) Participants ===&lt;br /&gt;
'''Complementary access to two days of conference *''' - Register for two days of trainings between 6th - 15th October 2009 and get two days of conference access without any extra charges.&lt;br /&gt;
&lt;br /&gt;
'''* Conditions:'''&lt;br /&gt;
&lt;br /&gt;
*Above offers are ONLY valid for the successful registrations made via [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 online payment gateway].&lt;br /&gt;
*These offers are valid on an individual's name and can't be clubbed between multiple participants.&lt;br /&gt;
* Offer for out-station participants is available ONLY on the registrations for bundled package of 4 days event (Two Days of Conference &amp;amp; Two Days of Trainings). &lt;br /&gt;
*Flight ticket will be issued by the organizing committee for arrival in New Delhi on 17th November 2009 and Departure from New Delhi on 20th November 2009. Offer does not apply to reimbursements for the air tickets booked by the participants themselves.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Trainings Click here for details on the training courses that are available.]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Who Should Attend Securitybyte &amp;amp;amp; OWASP AppSec Asia Conference 2009: ==&lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Security Researchers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Penetration Testers &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*IT Security Professionals &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;For student discount, attendees must present proof of enrollment when picking up your badge. &lt;br /&gt;
&lt;br /&gt;
==== Schedule  ====&lt;br /&gt;
&lt;br /&gt;
Three parallel conference talks are scheduled for 17th &amp;amp;amp; 18th November 2009 in three different halls. Training tracks have been divided in one-day tracks scheduled for 19th or 20th November 2009 and two-day tracks those are schedule to continue for two days both on 19th &amp;amp;amp; 20th November 2009. Follow the tabs to learn the details on both conference and trainings. &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Conference Click here] to view the '''Conference Schedule''' for 17th &amp;amp;amp; 18th November 2009.&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Trainings Click here] to view '''Training Schedule''' on 19th &amp;amp;amp; 20th November 2009.&lt;br /&gt;
&lt;br /&gt;
==== Conference  ====&lt;br /&gt;
&lt;br /&gt;
== Two Days Conference  ==&lt;br /&gt;
&lt;br /&gt;
Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel conference talks to be conducted in 3 separate halls for two days i.e . 17th &amp;amp;amp; 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular talk. Conference talks are being delivered by world renowned and most regarded speakers from around the world. Below is the detailed schedule for the two days of conference.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 1 - 17th Nov, 2009'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Where&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - I''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - II''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - III'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Who&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Researchers &amp;amp;amp; Enthusiasts)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Auditors, Developers, QA teams, Architects)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Leaders, Managers, C&amp;amp;amp;S professionals)'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 8:00 AM - 9:00 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Registrations'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Schedule''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 9:00 AM - 10:30 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Keynote'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:30 AM - 11:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea Break'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 11:00 AM - 12:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | How To Blackbox Test Almost Anything&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Aviram Jenik, Beyond Security&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | The International State of Cyber Security, Risk reduction in a high threat world&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Prof. Howard A. Schmidt, Former Cyber Security Advisor to the White house&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:00 PM - 1:00 PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Client Side Hacks&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Dino Covotsos &amp;amp; Charleton Smith, Telspace Systems&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Risk Based Penetration testing&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | K. K. Mookhey, Founder &amp;amp;amp; Principal Consultant, NII Consulting&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Applications, the source for CyberThreats&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Mano Paul,Software Assurance Advisor,(ISC)2&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 1:00PM - 2:00PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Lunch'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 2:00 PM - 3:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Exploiting Firefox Extensions&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Roberto Suggi Liverani, Security-Assessment.com&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Threat Modeling&amp;lt;br&amp;gt;&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Varun Sharma,Microsoft India&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Enterprise Application Security Program&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 3:00 PM - 4:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | SQL Server Forensics 2.0&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Kevvie Fowler, TELUS &amp;amp;amp; Ringzero&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | OWASP SAMM&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Pravir Chandra, Director of Strategic Services,&amp;lt;br&amp;gt;Fortify&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Business Case - Risk Management/Compliance at leading Education Group AMITY (Rapid Fire: 30 Min talk)&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Dr. JS Sodhi, CIO, AMITY Group&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 4:00 PM - 5:00 PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Ownage 2.0 - How to own the World&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Saumil Shah, NetSquare Solutions&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | &amp;quot;Do you want to play a Game&amp;quot; - Game theory and Cyberwar&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Bryan K. Fite, HackSecKlahn&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Usability and Privacy in Security&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Dr. Ponnurangam Kumaraguru, Asst. Professor - IIIT (Rapid Fire : 30 Min talk)&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 5:00 PM - 6:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea and Snacks on the Exhibition floor'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 7:00 PM - 10:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''CXO Event (Exclusive by invitation only) - Information Security Concerns for Offshoring'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 2 - 18th Nov, 2009'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Where&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - I''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - II''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Conference Hall - III'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Who&amp;amp;gt;''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Researchers &amp;amp;amp; Enthusiasts)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Security Auditors, Developers, QA teams, Architects)''' &lt;br /&gt;
| width=&amp;quot;300&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | '''(Leaders, Managers, C&amp;amp;amp;S professionals)'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 8:00 AM - 9:00 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Registrations'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 9:00 AM - 10:00 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Round Table with Speakers / Industry Panel - &amp;quot;Security Today &amp;amp; Tomorrow''''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:00 AM - 10:30 AM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea Break'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''&amp;amp;nbsp; Schedule''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Topic&amp;lt;br&amp;gt;''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Speaker&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:30 AM - 11:30&amp;amp;nbsp;AM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | All your Packets belong to us&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Daniel Mende, Security Researcher, ERNW&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | SANS Dshield Webhoneypot Project&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Jason Lam, Independent Security Researcher&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Critical Infrastructure Security “Danger Without borders” &amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | John Bumgarner, US Cyber Consequence Unit (USCCU)&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 11:30 AM - 12:30 PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Hacking Oracle From Web&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Sid, Independent Security Researcher&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Testing JSON Applications For Security Holes&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Aviram Jenik, Beyond Security&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Critical Infrastructure Security “Danger Without borders” &amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | John Bumgarner, US Cyber Consequence Unit (USCCU)&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:30PM - 1:30PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Lunch'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 1:30 PM&amp;amp;nbsp;- 2:30 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Lust 2.0 – Desire for free WiFi and the threat of the Imposter &amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Lava Kumar Kuppan, Independent Security Researcher&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Cloud Hacking - Distributed Attacks &amp;amp; Exploits&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Shreeraj Shah, Blueinfy Solutions&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Cedric Blancher, EADS Innovation Works&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 2:30 PM - 3:30&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Xprobe3 - What's New? Going Application Level&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Fyodor Yarochkin, Armorize&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Nitin Kumar/Vipin Kumar, Independent Security Researchers, NVlabs&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Behind the Scenes at Microsoft Security Response Center&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | Dave Midturi,MSRC, Microsoft Corp.&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 3:30PM - 4:00PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Tea Break'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 4:00 PM - 5:00&amp;amp;nbsp;PM &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | TBD&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 5:00 PM - 6:00 PM &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | '''Closing Keynotes - &amp;quot;OWASP &amp;amp; Securitybyte&amp;quot;'''&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Trainings  ====&lt;br /&gt;
&lt;br /&gt;
== Two Day Trainings  ==&lt;br /&gt;
&lt;br /&gt;
Two days post-conference are dedicated towards best-of-breed trainings being conducted in association with SANS, ISC2 and other organizations. Trainings tracks have been made available as One-Day tracks and Two-Day tracks scheduled for 19th &amp;amp;amp; 20th November 2009. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 1 - 19th Nov, 2009'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Day 2 - 20th Nov, 2009'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course ID''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course Duration''' &lt;br /&gt;
(# of Days) &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Course Title''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; | '''Instructor''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course ID''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course Duration''' &lt;br /&gt;
(# of Days) &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Course Title''' &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909080&amp;quot; | '''Instructor'''&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;30&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''One Day Training Tracks'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DHSO''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Oracle_Hacking_and_security ORACLE Hacking &amp;amp;amp; Security]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Sumit Sidharth,[[Image:Sb logo.png|center|78x50px|link=http://www.securitybyte.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DAWH''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Advanced_Web_Hacking Advanced Web Hacking -Securing AJAX, RIA &amp;amp;amp; SOA]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Shreeraj Shah [[Image:Blueinfy logo.png|center|link=http://www.blueinfy.com]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DAFT'''&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Advanced_Forensic_Techniques Advanced Forensics Techniques]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
The Grugq,[[Image:Sb logo.png|center|78x50px|link=http://www.securitybyte.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB1DIAT'''&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | 1 Day&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/InDepth_Assessment_Techniques In-depth Assessment Techniques: Design, Code, and Runtime]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Pravir Chandra, &lt;br /&gt;
&lt;br /&gt;
[[Image:Fortify.jpg|center|93x31px|link=http://www.fortify.com]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;30&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Two Day Training Tracks'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DBWH''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Hacking_bluetooth_and_wireless_101 Hacking Wireless &amp;amp;amp; Bluetooth 101]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Dino Covotsos /&amp;lt;br&amp;gt;Charlton Smith,[[Image:Telspace logo.png|center|76x50px]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DBWH''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Hacking_bluetooth_and_wireless_101 Hacking Wireless &amp;amp;amp; Bluetooth 101]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Dino Covotsos /&amp;lt;br&amp;gt;Charlton Smith,[[Image:Telspace logo.png|center|72x47px]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DNST''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Building_Advanced_Network_Security_tools Building advanced Network Security Tools]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Daniel Mende,[[Image:Ernw logo.png|center]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DNST''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Building_Advanced_Network_Security_tools Building advanced Network Security Tools]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Daniel Mende,[[Image:Ernw logo.png|center]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DCBC''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/ISC2_CSSLP_CBK_Bootcamp (ISC)2 CSSLP CBK Boot camp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Mano Paul,[[Image:Isc logo.png|center|78x50px|link=http://www.isc2.org]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DCBC''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/ISC2_CSSLP_CBK_Bootcamp (ISC)2 CSSLP CBK Boot camp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
Mano Paul,[[Image:Isc logo.png|center|78x50px|link=http://www.isc2.org]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSCJ / SANS Course ID&amp;amp;nbsp;: DEV530''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_Essential_Secure_Coding_Java_JEE_GSSP Essential Secure Coding in Java / JEE]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSCJ / SANS Course ID&amp;amp;nbsp;: DEV530''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_Essential_Secure_Coding_Java_JEE_GSSP Essential Secure Coding in Java / JEE]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DWPT / SANS Course ID&amp;amp;nbsp;: DEV538''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_WebApp_Pentesting_handsOn_immersion Web Application Pen Testing Hands-On Immersion]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DWPT / SANS Course ID&amp;amp;nbsp;: DEV538''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_WebApp_Pentesting_handsOn_immersion Web Application Pen Testing Hands-On Immersion]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSAB / SANS Course ID&amp;amp;nbsp;: AUD429''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_IT_Security_Audit_Bootcamp IT Security Audit Essentials Bootcamp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;67&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | '''SB2DSAB / SANS Course ID&amp;amp;nbsp;: AUD429''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | 2 Days &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/SANS_IT_Security_Audit_Bootcamp IT Security Audit Essentials Bootcamp]&amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Sans logo.png|center|78x50px|link=http://www.sans.org]]&amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Venue  ====&lt;br /&gt;
&lt;br /&gt;
Four Days Event is planned out at: &lt;br /&gt;
&lt;br /&gt;
[http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza,]&amp;lt;br&amp;gt;Site - 2, Sector - 29, &amp;lt;br&amp;gt;Gurgaon-122001 (National Capital Region), India&amp;lt;br&amp;gt;Hotel Front Desk: 91-124-4534000&amp;lt;br&amp;gt;Hotel Fax: 91-124-4304800&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | '''Co-Sponsor &amp;quot;CXO Evening&amp;quot;'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | '''CTF&amp;amp;nbsp;(Capture The Flag) Sponsor'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; | '''Education &amp;amp;nbsp;Partner'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:20th green stacked.png|center|ISC2|link=http://www.isc2.org]]&amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
| [[Image:Appin.jpg|center|link=http://www.appinsecurity.com]]&amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
| [[Image:BRIP-Logo.jpg|center|link=http://www.brip.co.in]]&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;967&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Associate Sponsors'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Media Partners'''&amp;lt;/font&amp;gt; &lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;'''Supporters'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Torridn.jpg|center|link=http://www.torridnetworks.com]] &lt;br /&gt;
| [[Image:Infosecurity.jpg|center|link=http://www.infosecuritymagz.com]] &lt;br /&gt;
| [[Image:HITB.jpg|center|link=http://conference.hitb.org]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:SecurityCompass.JPG|center|link=http://www.securitycompass.com]] &lt;br /&gt;
| [[Image:HNS-web.jpg|center|link=http://www.net-security.org]] &lt;br /&gt;
| [[Image:Sector.jpg|center|link=http://www.sector.ca]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! valign=&amp;quot;baseline&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| [[Image:Itmagz.jpg|center]]&amp;amp;nbsp;[[Image:Electronicsf.jpg|center|link=http://www.electronicsforu.com]] &lt;br /&gt;
| [[Image:Clubhack.gif|center]]&amp;lt;br&amp;gt;[[Image:Eventavenue Logo.jpg|center|link=https://www.eventavenue.com]]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;amp;nbsp; &lt;br /&gt;
| [[Image:Crowne plaza.jpg|center|link=http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
==== Hotel &amp;amp; Travel  ====&lt;br /&gt;
&lt;br /&gt;
== Hotel Stay &amp;amp; Travel Infomation  ==&lt;br /&gt;
&lt;br /&gt;
To help our valued delegates with Hotel and Travel services, we have negotiated with some of the best and Budget Category Guest houses in Gurgaon that are located within a radius of 3 - 4 Kms from the venue.&lt;br /&gt;
&lt;br /&gt;
Limited cheaper accommodation is available near the venue hotel in budget hotels/apartments area. The tariff of these hotels ranges from Rs.2000 onwards per room night (inclusive of Room Rent, Breakfast and Luxury Tax).  Interested delegates / students can send a formal request for the desired accommodations and dates to our official travel agent.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;OFFICIAL TRAVEL AGENT&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dreamz conference Management Pvt.Ltd&amp;lt;/b&amp;gt; will look after your hotel accommodation in Gurgaon and New Delhi, pre &amp;amp; post conference tours / travel needs in India for delegates and visitors independently. If you wish to go for sightseeing tour within New Delhi and around it to places like Agra, Jaipur, Rajasthan etc. However, we would encourage you to make early bookings which will be done on “first – come - first service” basis and let us know of your interest, since that would ultimately work in your favour. Early reservation is strongly recommended as November being a high demand period for hotels in Gurgaon.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
For further details please contact:&lt;br /&gt;
&lt;br /&gt;
DREAMZ CONFERENCE MANAGEMENT PVT.LTD&lt;br /&gt;
&lt;br /&gt;
406, Ansal’s Majestic Tower, Vikas Puri, New Delhi – 110018&lt;br /&gt;
&lt;br /&gt;
Tel: 91 – 11 – 41586401, 402, Fax: 91 – 11 – 41586400&lt;br /&gt;
&lt;br /&gt;
Email: info@dreamztravel.net / dreamztravelindia@yahoo.com&lt;br /&gt;
&lt;br /&gt;
Website: www.dreamztravel.net&lt;br /&gt;
&lt;br /&gt;
Contact Person: Jitin Batra ( +91 9810558569 )&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
Please contact [http://www.owasp.org/index.php/Category:India#OWASP_India_Co-Chairs Chair - OWASP India] for sponsorship opportunities. &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Category:India Category: OWASP India]&lt;/div&gt;</summary>
		<author><name>Puneetm</name></author>	</entry>

	</feed>