This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP AppSec India Conference 2008"
(→Queries) |
(→Event Sponsors) |
||
(12 intermediate revisions by 3 users not shown) | |||
Line 5: | Line 5: | ||
<b>Event Fees:</b> <BR>INR. 5,000 (approx. USD 125) for 1 day of conference<BR>INR. 10,000 (approx. USD 250) for 1-day training/workshop. | <b>Event Fees:</b> <BR>INR. 5,000 (approx. USD 125) for 1 day of conference<BR>INR. 10,000 (approx. USD 250) for 1-day training/workshop. | ||
<BR> | <BR> | ||
− | |||
− | + | ||
+ | |||
Line 32: | Line 32: | ||
<center> | <center> | ||
<B>Diamond Sponsor</B><BR><BR> | <B>Diamond Sponsor</B><BR><BR> | ||
− | [https://h10078.www1.hp.com/cda/hpms/display/main/ | + | [https://h10078.www1.hp.com/cda/hpms/display/main/hpms_content.jsp?zn=bto&cp=1-11-201_4000_100 https://www.owasp.org/images/d/d2/Hp1.JPG] |
</center> | </center> | ||
<BR><BR> | <BR><BR> | ||
Line 38: | Line 38: | ||
<B>Associate Sponsors</B><BR><BR> | <B>Associate Sponsors</B><BR><BR> | ||
[http://www.paladion.net https://www.owasp.org/images/8/86/Paladion.jpg] | [http://www.paladion.net https://www.owasp.org/images/8/86/Paladion.jpg] | ||
− | [http://www. | + | [http://www.torridnetworks.com https://www.owasp.org/images/5/5a/Torrid.jpg] |
− | |||
[http://www.sdgc.com https://www.owasp.org/images/3/39/SDG.jpg] | [http://www.sdgc.com https://www.owasp.org/images/3/39/SDG.jpg] | ||
+ | [http://www.ostfoldindia.com https://www.owasp.org/images/d/d9/Logo_new.jpg] | ||
+ | [http://www.armorize.com https://www.owasp.org/images/a/af/Logo_armorize_new_2008_300dpi2.jpg] | ||
+ | |||
</center> | </center> | ||
<br><br> | <br><br> | ||
Line 69: | Line 71: | ||
|- | |- | ||
| align="center" style="width:20%; background:#4F81BD; color:white" | '''09:00 hrs - 10:00 hrs''' || style="width:30%; background:#A7BFDE" align="center" | '''<BR>Welcome Address<br><br>About OWASP Foundation– The story so far and beyond.<BR><BR>Key note “ Application Security Trends & Challenges”<BR><BR>Vote of Thanks<BR><BR>''' | | align="center" style="width:20%; background:#4F81BD; color:white" | '''09:00 hrs - 10:00 hrs''' || style="width:30%; background:#A7BFDE" align="center" | '''<BR>Welcome Address<br><br>About OWASP Foundation– The story so far and beyond.<BR><BR>Key note “ Application Security Trends & Challenges”<BR><BR>Vote of Thanks<BR><BR>''' | ||
− | | style="width:40%; background:#EEF0F7; color:#4A4AFF" align="center" | '''Welcome address by OWASP Delhi Chapter Board<BR><BR><BR> | + | | style="width:40%; background:#EEF0F7; color:#4A4AFF" align="center" | '''Welcome address by OWASP Delhi Chapter Board<BR><BR><BR>Jason Li,<BR>OWASP Foundation USA<BR><BR><BR>Dr. Kamlesh Bajaj, CEO, DSCI (A NASSCOM Initiative)<BR><BR>Mano Paul, Software Assurance Advisor, (ISC)<sup>2</sup> <BR><BR>''' |
|- | |- | ||
Line 76: | Line 78: | ||
| align="center" style="width:20%; background:#4F81BD; color:white" | '''10:30 hrs - 11:30 hrs''' || style="width:30%; background:#A7BFDE" align="center" | '''Tour of OWASP projects & The Moral Ecology of OWASP''' | | align="center" style="width:20%; background:#4F81BD; color:white" | '''10:30 hrs - 11:30 hrs''' || style="width:30%; background:#A7BFDE" align="center" | '''Tour of OWASP projects & The Moral Ecology of OWASP''' | ||
− | | style="width:40%; background:#EEF0F7; color:#4A4AFF" align="center" | '''<BR> | + | | style="width:40%; background:#EEF0F7; color:#4A4AFF" align="center" | '''<BR>Jason Li,<BR>OWASP Foundation USA<BR><BR>''' |
|- | |- | ||
Line 85: | Line 87: | ||
− | | align="center" style="width:20%; background:#4F81BD; color:white" | '''14:30 hrs - 15:30 hrs''' || style="width:30%; background:#A7BFDE" align="center" | '''[https://www.owasp.org/index.php/ | + | | align="center" style="width:20%; background:#4F81BD; color:white" | '''14:30 hrs - 15:30 hrs''' || style="width:30%; background:#A7BFDE" align="center" | '''[https://www.owasp.org/index.php/OWASP_AppSec_India_Conference_2008_Web_Application_Security_:_Too_Costly_To_Ignore Web Application Security: Too Costly To Ignore]''' |
| style="width:40%; background:#EEF0F7; color:#4A4AFF" align="center" | '''<BR>[https://www.owasp.org/index.php/OWASP_AppSec_India_Conference_2008_Speaker_-_Rajesh_Nayak Rajesh Nayak ]<BR>[https://h10078.www1.hp.com/cda/hpms/display/main/hpms_home.jsp?zn=bto&cp=1_4011_308__&jumpid=go/btosoftware HP Software]<BR><BR>''' | | style="width:40%; background:#EEF0F7; color:#4A4AFF" align="center" | '''<BR>[https://www.owasp.org/index.php/OWASP_AppSec_India_Conference_2008_Speaker_-_Rajesh_Nayak Rajesh Nayak ]<BR>[https://h10078.www1.hp.com/cda/hpms/display/main/hpms_home.jsp?zn=bto&cp=1_4011_308__&jumpid=go/btosoftware HP Software]<BR><BR>''' | ||
|- | |- | ||
Line 94: | Line 96: | ||
− | | align="center" style="width:20%; background:#4F81BD; color:white" | '''12:30 hrs - 13:30 hrs''' || style="width:30%; background:#A7BFDE" align="center" | '''[https://www.owasp.org/index.php/OWASP_AppSec_India_Conference_2008_Building_Enterprise_AppSec_program Building | + | | align="center" style="width:20%; background:#4F81BD; color:white" | '''12:30 hrs - 13:30 hrs''' || style="width:30%; background:#A7BFDE" align="center" | '''[https://www.owasp.org/index.php/OWASP_AppSec_India_Conference_2008_Building_Enterprise_AppSec_program Building Enterprise AppSec Program]''' |
| style="width:40%; background:#EEF0F7; color:#4A4AFF" align="center" | '''<BR>[https://www.owasp.org/index.php/OWASP_AppSec_India_Conference_2008_Speaker_-_Nishchal_Bhalla Nishchal Bhalla,<BR>CEO,] <BR>[http://www.securitycompass.com Security Compass], USA<BR><BR>''' | | style="width:40%; background:#EEF0F7; color:#4A4AFF" align="center" | '''<BR>[https://www.owasp.org/index.php/OWASP_AppSec_India_Conference_2008_Speaker_-_Nishchal_Bhalla Nishchal Bhalla,<BR>CEO,] <BR>[http://www.securitycompass.com Security Compass], USA<BR><BR>''' | ||
|- | |- | ||
Line 144: | Line 146: | ||
| style="width:40%; background:#EEF0F7; color:#4A4AFF" align="center" | | | style="width:40%; background:#EEF0F7; color:#4A4AFF" align="center" | | ||
− | '''<BR>[http://www.securisksolutions.com/company/execmgt.aspx Mano Paul,<BR>CEO, SecuRisk Solutions, USA]<BR> [http://www.securisksolutions.com/Default.aspx | + | '''<BR>[http://www.securisksolutions.com/company/execmgt.aspx Mano Paul,<BR>CEO, SecuRisk Solutions, USA]<BR> [http://www.securisksolutions.com/Default.aspx http://www.securisksolutions.com/Images/Logos/SRSLogo_100x100.png]<BR>''' |
|- | |- | ||
Line 151: | Line 153: | ||
|- | |- | ||
| align="center" style="width:20%; background:#4F81BD; color:white" | '''09:00 hrs - 13:30 hrs''' || style="width:30%; background:#A7BFDE" align="center" | '''<BR>[https://www.owasp.org/index.php/OWASP_AppSec_India_Conference_2008 Writing Secure Code - Java/J2EE & .Net]<BR><BR>Hall Appsec-3<BR><BR>''' | | align="center" style="width:20%; background:#4F81BD; color:white" | '''09:00 hrs - 13:30 hrs''' || style="width:30%; background:#A7BFDE" align="center" | '''<BR>[https://www.owasp.org/index.php/OWASP_AppSec_India_Conference_2008 Writing Secure Code - Java/J2EE & .Net]<BR><BR>Hall Appsec-3<BR><BR>''' | ||
− | | style="width:40%; background:#EEF0F7; color:#4A4AFF" align="center" | '''<BR><BR>[https://h10078.www1.hp.com/cda/hpms/display/main/ | + | | style="width:40%; background:#EEF0F7; color:#4A4AFF" align="center" | '''<BR><BR>[https://h10078.www1.hp.com/cda/hpms/display/main/hpms_content.jsp?zn=bto&cp=1-11-201_4000_100 https://www.owasp.org/images/d/d2/Hp1.JPG]<BR>''' |
|- | |- | ||
| align="center" style="width:20%; background:#4F81BD; color:white" | '''13:30 hrs - 14:30 hrs''' || colspan="3" style="width:80%; background:#4F81BD; color:white" align="center" | '''Networking Lunch''' | | align="center" style="width:20%; background:#4F81BD; color:white" | '''13:30 hrs - 14:30 hrs''' || colspan="3" style="width:80%; background:#4F81BD; color:white" align="center" | '''Networking Lunch''' | ||
Line 168: | Line 170: | ||
| align="center" style="width:20%; background:#4F81BD; color:white" | '''14:30 hrs - 19:00 hrs''' || style="width:30%; background:#A7BFDE" align="center" | '''<BR>Application Security Code Review<BR><BR>Hall Appsec-3<BR><BR>''' | | align="center" style="width:20%; background:#4F81BD; color:white" | '''14:30 hrs - 19:00 hrs''' || style="width:30%; background:#A7BFDE" align="center" | '''<BR>Application Security Code Review<BR><BR>Hall Appsec-3<BR><BR>''' | ||
| style="width:40%; background:#EEF0F7; color:#4A4AFF" align="center" | | | style="width:40%; background:#EEF0F7; color:#4A4AFF" align="center" | | ||
− | ''' | + | '''[https://www.owasp.org/index.php/OWASP_AppSec_India_Conference_2008_Speaker_-_Gaurav_Kumar Gaurav Kumar],<BR> Security Consultant ,<BR><BR>[http://www.microsoft.com https://www.owasp.org/images/c/cf/MSlogo.jpg]''' |
|- | |- | ||
|} | |} |
Latest revision as of 10:17, 4 January 2012
OWASP AppSec India Conference 2008 - August 20th-21st 2008
Delhi Chapter invites you to (1) day of Conferences with theme as "Application Security - Trends and Challenges" and Technology from the world's most regarded application security leaders and experts, (1) day of extensive multi-tracked workshop, all to be held at India Habitat Center, New Delhi.
Click here to download event brochure.
Event Fees:
INR. 5,000 (approx. USD 125) for 1 day of conference
INR. 10,000 (approx. USD 250) for 1-day training/workshop.
Discounts on combined package for both the days:
Discounts available for: Academics | Government Employees | OWASP/ISC2 members.
Group Discounts are also available
* Only one discount option will be applicable to each delegate.
Registration inquiries:
Mr. Nitin Saxena
CyberMedia Events
Mobile: 9811675559
email :[email protected]
Ms. Vijitha P D'Souza
CyberMedia Events
email: [email protected]
Event Sponsors
To sponsor OWASP AppSec India Conference 2008, please download the Sponsorship Form and contact:
Mr. Vilas Hegde
Associate Vice President
CyberMedia Events
email :[email protected]
Official Event Supporters/Partners
OWASP AppSec India Conference 2008 Schedule – August 20th - August 21st
Day One [Conference Program]: Wednesday 20th August, 2008
TIME | SESSION | SPEAKER | |
08:15 hrs - 9:00 hrs | Registrations and Welcome Tea / Coffee | ||
09:00 hrs - 10:00 hrs | Welcome Address About OWASP Foundation– The story so far and beyond. Key note “ Application Security Trends & Challenges” Vote of Thanks |
Welcome address by OWASP Delhi Chapter Board Jason Li, OWASP Foundation USA Dr. Kamlesh Bajaj, CEO, DSCI (A NASSCOM Initiative) Mano Paul, Software Assurance Advisor, (ISC)2 | |
10:00 hrs – 10:30 hrs | Networking Tea / Coffee Break | ||
10:30 hrs - 11:30 hrs | Tour of OWASP projects & The Moral Ecology of OWASP | Jason Li, OWASP Foundation USA | |
11:30 hrs - 12:30 hrs | Web 2.0 Attacks - Next Generation Threats on the Rise | Shreeraj Shah, Founder & Director, BlueInfy | |
14:30 hrs - 15:30 hrs | Web Application Security: Too Costly To Ignore | Rajesh Nayak HP Software | |
13:30 hrs - 14:30 hrs | Networking Lunch | ||
12:30 hrs - 13:30 hrs | Building Enterprise AppSec Program | Nishchal Bhalla, CEO, Security Compass, USA | |
15:30 hrs - 16:30 hrs | Case Study: Testing 200+ applications in a $10 Billion Enterprise | Roshen Chandran Director of Paladion's Application Security Practice, Paladion | |
16:30 hrs - 17:00 hrs | Networking Tea / Coffee Break | ||
17:00 hrs - 18:00 hrs | OWASP AntiSamy Project | Jason Li, Senior Application Security Engineer, Aspect Security Inc., USA | |
18:00 hrs - 18:30 hrs | Vote of Thanks | OWASP Delhi Chapter Board Members |
Day Two [Trainings/Workshops]: Thursday 21st August, 2008
TIME | TRAINING/WORKSHOP TRACK | TRAINING PROVIDER | |
08:15 hrs - 9:00 hrs | Registrations and Welcome Tea / Coffee | ||
09:00 hrs - 13:30 hrs | Application Security Assessment (Threats and Exploits) Hall Appsec-1 |
||
09:00 hrs - 13:30 hrs | Advanced Threat Modeling Hall Appsec-2 |
||
11:15 hrs - 11:30 hrs | Networking Tea / Coffee Break | ||
09:00 hrs - 13:30 hrs | Writing Secure Code - Java/J2EE & .Net Hall Appsec-3 |
| |
13:30 hrs - 14:30 hrs | Networking Lunch | ||
14:30 hrs - 19:00 hrs | Web 2.0 Security Hall Appsec-1 |
Jason Li, Senior Application Security Engineer, | |
14:30 hrs - 19:00 hrs | Application Security for Managers Hall Appsec-2 |
Nishchal Bhalla, CEO, | |
16:30 hrs - 16:45 hrs | Networking Tea / Coffee Break | ||
14:30 hrs - 19:00 hrs | Application Security Code Review Hall Appsec-3 |
Gaurav Kumar, |
- Delegates attending Trainings are requested to bring their Wi-Fi enabled Laptops for the class- Preferably with VMWare Loaded*
- ISC2 Members earn 1 CPE per hour of attendance to this event*
- Speakers / topics / Training sessions are subject to change*
- Registration for a specific class will depend on the availability of seats*
Kindly visit the conference pages for the latest updates on the event.
TRAVEL/HOTELS
- Delhi Tourism: http://delhitourism.nic.in/index.aspx
- Delhi Map: http://www.mapsofindia.com/maps/delhi/delhi.htm
- Directions to Venue
- NOTE: We have negotiated special discounts for the participants of OWASP AppSec India Conference 2008. Kindly contact our Travel Partners to get quick bookings on flights/cabs/hotels at discounted price:
Queries
Travel/Hotel:
Mr. Jitin Batra
Manager, Dreamz Travel
Mobile: +91-981-055-8569
LandLine: +91-11-41586401-402
email: [email protected]
Registrations:
Mr. Nitin Saxena
CyberMedia Events
email :[email protected]
Mobile: 09811675559
Sponsorship:
Mr. Vilas Hedge
Associate Vice President
CyberMedia Events
email :[email protected]