This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Delhi January Meeting 2009"
From OWASP
(→November 29th 2008 Meeting Agenda) |
(→November 29th 2008 Meeting Agenda) |
||
| Line 13: | Line 13: | ||
|- | |- | ||
| − | | align="center" style="width:20%; background:#4F81BD; color:white" | ''' | + | | align="center" style="width:20%; background:#4F81BD; color:white" | '''15:00 hrs - 15:15 hrs''' || style="width:30%; background:#A7BFDE" align="center" | '''<BR>Welcome Address<BR><BR>''' |
| style="width:40%; background:#EEF0F7; color:#4A4AFF" align="center" | '''OWASP Delhi Board<BR><BR>''' | | style="width:40%; background:#EEF0F7; color:#4A4AFF" align="center" | '''OWASP Delhi Board<BR><BR>''' | ||
|- | |- | ||
| − | | align="center" style="width:20%; background:#4F81BD; color:white" | ''' | + | | align="center" style="width:20%; background:#4F81BD; color:white" | '''15:15 hrs – 16:00 hrs''' || style="width:30%; background:#A7BFDE" align="center" | '''[https://www.owasp.org/index.php/OWASP_Delhi_Meeting_Scrutinizing_Session_Based_Attacks Scrutinizing Session Based Attacks]''' |
| style="width:40%; background:#FFFFFF; color:#4A4AFF" align="center" | '''<BR>[https://www.owasp.org/index.php/OWASP_Delhi_Meeting_Gunwant_Singh Gunwant Singh, <BR>Sr. Network Engineer,]<BR><BR> SAIC <BR><BR>''' | | style="width:40%; background:#FFFFFF; color:#4A4AFF" align="center" | '''<BR>[https://www.owasp.org/index.php/OWASP_Delhi_Meeting_Gunwant_Singh Gunwant Singh, <BR>Sr. Network Engineer,]<BR><BR> SAIC <BR><BR>''' | ||
|- | |- | ||
| − | | align="center" style="width:20%; background:#4F81BD; color:white" | ''' | + | | align="center" style="width:20%; background:#4F81BD; color:white" | '''16:00 hrs – 16:15 hrs''' || colspan="3" style="width:80%; background:#4F81BD; color:white" align="center" | '''Open Discussion - Q&A, Individual problems and challenges''' |
|- | |- | ||
| − | | align="center" style="width:20%; background:#4F81BD; color:white" | ''' | + | | align="center" style="width:20%; background:#4F81BD; color:white" | '''16:15 hrs – 17:00 hrs''' || style="width:30%; background:#A7BFDE" align="center" | '''[https://www.owasp.org/index.php/Scrutinizing_International_Security_Standards_To_Mitigate_the_Vulnerabilities_arising_through_SQL_Injection_Attacks Scrutinizing International Security Standards To Mitigate the Vulnerabilities arising through SQL Injection Attacks]''' |
| − | | style="width:40%; background:#FFFFFF; color:#4A4AFF" align="center" | '''<BR><BR><BR> | + | | style="width:40%; background:#FFFFFF; color:#4A4AFF" align="center" | '''<BR><BR><BR>Supriya Madan<BR><BR>''' |
|- | |- | ||
| − | | align="center" style="width:20%; background:#4F81BD; color:white" | ''' | + | | align="center" style="width:20%; background:#4F81BD; color:white" | '''17:00 hrs – 17:15 hrs''' || colspan="3" style="width:80%; background:#4F81BD; color:white" align="center" | '''Open Discussion - Q&A, Individual problems and challenges''' |
|- | |- | ||
| − | | align="center" style="width:20%; background:#4F81BD; color:white" | ''' | + | | align="center" style="width:20%; background:#4F81BD; color:white" | '''17:15 hrs – 18:00 hrs''' || style="width:30%; background:#A7BFDE" align="center" | '''[https://www.owasp.org/index.php/Delhi TBD]''' |
| style="width:40%; background:#FFFFFF; color:#4A4AFF" align="center" | '''<BR>[https://www.owasp.org/index.php/Delhi TBD]<BR><BR>''' | | style="width:40%; background:#FFFFFF; color:#4A4AFF" align="center" | '''<BR>[https://www.owasp.org/index.php/Delhi TBD]<BR><BR>''' | ||
|- | |- | ||
| − | | align="center" style="width:20%; background:#4F81BD; color:white" | ''' | + | | align="center" style="width:20%; background:#4F81BD; color:white" | '''18:00 hrs – 18:15 hrs''' || colspan="3" style="width:80%; background:#4F81BD; color:white" align="center" | '''Open Discussion - Q&A, Individual problems and challenges''' |
|- | |- | ||
| − | | align="center" style="width:20%; background:#4F81BD; color:white" | ''' | + | | align="center" style="width:20%; background:#4F81BD; color:white" | '''18:15 hrs - 18:20 hrs''' || style="width:30%; background:#A7BFDE" align="center" | '''<BR>Vote of Thanks<BR><BR>''' |
| style="width:40%; background:#FFFFFF; color:#4A4AFF" align="center" | '''<BR><BR>TBD<BR><BR>''' | | style="width:40%; background:#FFFFFF; color:#4A4AFF" align="center" | '''<BR><BR>TBD<BR><BR>''' | ||
|- | |- | ||
| − | | align="center" style="width:20%; background:#4F81BD; color:white" | ''' | + | | align="center" style="width:20%; background:#4F81BD; color:white" | '''18:20 hrs - 18:35 hrs''' || style="width:30%; background:#A7BFDE" align="center" | '''<BR>High Tea and Networking<BR><BR>''' |
| style="width:40%; background:#EEF0F7; color:#4A4AFF" align="center" | '''---<BR><BR>''' | | style="width:40%; background:#EEF0F7; color:#4A4AFF" align="center" | '''---<BR><BR>''' | ||
|- | |- | ||
Revision as of 16:46, 22 January 2009
OWASP Delhi Meeting January 31st 2009
November 29th 2008 Meeting Agenda
| TIME | SESSION | SPEAKER | |
| 15:00 hrs - 15:15 hrs | Welcome Address |
OWASP Delhi Board | |
| 15:15 hrs – 16:00 hrs | Scrutinizing Session Based Attacks | Gunwant Singh, Sr. Network Engineer, SAIC | |
| 16:00 hrs – 16:15 hrs | Open Discussion - Q&A, Individual problems and challenges | ||
| 16:15 hrs – 17:00 hrs | Scrutinizing International Security Standards To Mitigate the Vulnerabilities arising through SQL Injection Attacks | Supriya Madan | |
| 17:00 hrs – 17:15 hrs | Open Discussion - Q&A, Individual problems and challenges | ||
| 17:15 hrs – 18:00 hrs | TBD | TBD | |
| 18:00 hrs – 18:15 hrs | Open Discussion - Q&A, Individual problems and challenges | ||
| 18:15 hrs - 18:20 hrs | Vote of Thanks |
TBD | |
| 18:20 hrs - 18:35 hrs | High Tea and Networking |
--- | |
OWASP Delhi Meeting January 2009 Sponsors
Meeting Venue January 31st, 2009
TBD