This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP Delhi Oct Meeting 2010"

From OWASP
Jump to: navigation, search
(OWASP Delhi Meeting October 2010 Sponsors)
 
(One intermediate revision by the same user not shown)
Line 52: Line 52:
  
 
http://www.owasp.org/images/e/ec/Logo_sopra.gif
 
http://www.owasp.org/images/e/ec/Logo_sopra.gif
 +
[http://www.torridnetworks.com https://www.owasp.org/images/d/d5/White.JPG]
 +
 
<BR><BR>
 
<BR><BR>
  
Line 77: Line 79:
 
== Event Presentations ==
 
== Event Presentations ==
  
[http://www.owasp.org/images/c/c0/Threat_Modelling.pptx Threat Modelling]<Br>
+
[http://www.owasp.org/images/4/43/Threat_Modeling_new.pptx Threat Modelling]<Br>
 
[http://www.owasp.org/images/b/b6/VOIP_Security_basics.pdf VOIP Security Basics]<Br><Br>
 
[http://www.owasp.org/images/b/b6/VOIP_Security_basics.pdf VOIP Security Basics]<Br><Br>

Latest revision as of 10:19, 4 January 2012

OWASP Delhi Meeting October 30th 2010

October 30th, Saturday 2010 Meeting Agenda

TIME SESSION SPEAKER
00:00 hrs – 00:00 hrs
Welcome Address

OWASP Delhi Board

00:00 hrs – 00:00 hrs Threat Modelling - Essential to a Secure Enterprise
Megha Anand
Senior Security Consultant
E & Y

00:00 hrs – 00:00 hrs Open Discussion - Q&A, Individual problems and challenges
VOIP: Emerging Threats and Defenses
Angad Singh and Rohit Shah,
KPMG

00:00 hrs – 00:00 hrs Open Discussion - Q&A, Individual problems and challenges
00:00 hrs - 00:00 hrs
Vote of Thanks



ABC

00:00 hrs - 00:00 hrs
High Tea and Networking

---



OWASP Delhi Meeting October 2010 Sponsors

Logo_sopra.gif White.JPG



Meeting Venue October 30th, 2010

Sopra Group
A-64, Sector-64
Noida
Delhi-NCR

* Directions to the venue

Meeting Registration

Please contact Parwez Mohammad to register for the meeting.


In case of any issues, feel free to contact any of the OWASP Committee Members.

Event Pics

This will be updated after the meeting is held.

Event Presentations

Threat Modelling
VOIP Security Basics