This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Delhi Oct Meeting 2010"
From OWASP
(→OWASP Delhi Meeting October 2010 Sponsors) |
|||
| (8 intermediate revisions by 2 users not shown) | |||
| Line 13: | Line 13: | ||
|- | |- | ||
| − | | align="center" style="width:20%; background:#4F81BD; color:white" | ''' | + | | align="center" style="width:20%; background:#4F81BD; color:white" | '''00:00 hrs – 00:00 hrs''' || style="width:30%; background:#A7BFDE" align="center" | '''<BR>Welcome Address<BR><BR>''' |
| style="width:40%; background:#EEF0F7; color:#4A4AFF" align="center" | '''OWASP Delhi Board<BR><BR>''' | | style="width:40%; background:#EEF0F7; color:#4A4AFF" align="center" | '''OWASP Delhi Board<BR><BR>''' | ||
|- | |- | ||
| − | | align="center" style="width:20%; background:#4F81BD; color:white" | ''' | + | | align="center" style="width:20%; background:#4F81BD; color:white" | '''00:00 hrs – 00:00 hrs''' || style="width:30%; background:#A7BFDE" align="center" | '''[http://www.owasp.org/index.php/Speaker_Details_of_OWASP_Delhi_Meeting_Oct_2010 Threat Modelling - Essential to a Secure Enterprise]''' |
| − | | style="width:40%; background:#FFFFFF; color:#4A4AFF" align="center" | '''<BR>[ | + | | style="width:40%; background:#FFFFFF; color:#4A4AFF" align="center" | '''<BR>[http://www.owasp.org/index.php/Speaker_Details_of_OWASP_Delhi_Meeting_Oct_2010 Megha Anand ]<BR>Senior Security Consultant <BR> E & Y<BR><BR>''' |
|- | |- | ||
| − | | align="center" style="width:20%; background:#4F81BD; color:white" | ''' | + | | align="center" style="width:20%; background:#4F81BD; color:white" | '''00:00 hrs – 00:00 hrs''' || colspan="3" style="width:80%; background:#4F81BD; color:white" align="center" | '''Open Discussion - Q&A, Individual problems and challenges''' |
|- | |- | ||
| − | | align="center" style="width:20%; background:#4F81BD; color:white" | ''' ''' || style="width:30%; background:#A7BFDE" align="center" | '''[ | + | | align="center" style="width:20%; background:#4F81BD; color:white" | ''' ''' || style="width:30%; background:#A7BFDE" align="center" | '''[http://www.owasp.org/index.php/Speaker_Details_of_OWASP_Delhi_Meeting_Oct_2010 VOIP: Emerging Threats and Defenses]''' |
| − | | style="width:40%; background:#FFFFFF; color:#4A4AFF" align="center" | '''<BR>[ | + | | style="width:40%; background:#FFFFFF; color:#4A4AFF" align="center" | '''<BR>[http://www.owasp.org/index.php/Speaker_Details_of_OWASP_Delhi_Meeting_Oct_2010 Angad Singh and Rohit Shah,]<BR> KPMG<BR> <BR>''' |
|- | |- | ||
| − | | align="center" style="width:20%; background:#4F81BD; color:white" | ''' | + | | align="center" style="width:20%; background:#4F81BD; color:white" | '''00:00 hrs – 00:00 hrs''' || colspan="3" style="width:80%; background:#4F81BD; color:white" align="center" | '''Open Discussion - Q&A, Individual problems and challenges''' |
|- | |- | ||
| − | | align="center" style="width:20%; background:#4F81BD; color:white" | ''' ''' || style="width:30%; background:#A7BFDE" align="center" | '''<BR> <BR>''' | + | | align="center" style="width:20%; background:#4F81BD; color:white" | '''00:00 hrs - 00:00 hrs''' || style="width:30%; background:#A7BFDE" align="center" | '''<BR>Vote of Thanks<BR><BR>''' |
| − | + | | style="width:40%; background:#FFFFFF; color:#4A4AFF" align="center" | '''<BR><BR> ABC <BR><BR>''' | |
| + | |- | ||
| + | |||
| + | | align="center" style="width:20%; background:#4F81BD; color:white" | '''00:00 hrs - 00:00 hrs''' || style="width:30%; background:#A7BFDE" align="center" | '''<BR>High Tea and Networking<BR><BR>''' | ||
| + | | style="width:40%; background:#EEF0F7; color:#4A4AFF" align="center" | '''---<BR><BR>''' | ||
| + | |- | ||
| + | |||
| + | |||
|} | |} | ||
| − | |||
<BR><BR> | <BR><BR> | ||
| Line 46: | Line 52: | ||
http://www.owasp.org/images/e/ec/Logo_sopra.gif | http://www.owasp.org/images/e/ec/Logo_sopra.gif | ||
| + | [http://www.torridnetworks.com https://www.owasp.org/images/d/d5/White.JPG] | ||
| + | |||
<BR><BR> | <BR><BR> | ||
| Line 59: | Line 67: | ||
== Meeting Registration == | == Meeting Registration == | ||
| − | + | Please contact [mailto:parwez.mohammad(at)gmail.com Parwez Mohammad] to register for the meeting. | |
| + | |||
| + | |||
| + | In case of any issues, feel free to contact any of the [http://www.owasp.org/index.php/New_Delhi_OWASP_Committee_Members OWASP Committee Members]. | ||
<Br><Br> | <Br><Br> | ||
== Event Pics == | == Event Pics == | ||
| − | This will updated after the meeting is held.<Br><Br> | + | This will be updated after the meeting is held.<Br><Br> |
== Event Presentations == | == Event Presentations == | ||
| − | + | [http://www.owasp.org/images/4/43/Threat_Modeling_new.pptx Threat Modelling]<Br> | |
| + | [http://www.owasp.org/images/b/b6/VOIP_Security_basics.pdf VOIP Security Basics]<Br><Br> | ||
Latest revision as of 10:19, 4 January 2012
OWASP Delhi Meeting October 30th 2010
October 30th, Saturday 2010 Meeting Agenda
| TIME | SESSION | SPEAKER | |
| 00:00 hrs – 00:00 hrs | Welcome Address |
OWASP Delhi Board | |
| 00:00 hrs – 00:00 hrs | Threat Modelling - Essential to a Secure Enterprise | Megha Anand Senior Security Consultant E & Y | |
| 00:00 hrs – 00:00 hrs | Open Discussion - Q&A, Individual problems and challenges | ||
| VOIP: Emerging Threats and Defenses | Angad Singh and Rohit Shah, KPMG | ||
| 00:00 hrs – 00:00 hrs | Open Discussion - Q&A, Individual problems and challenges | ||
| 00:00 hrs - 00:00 hrs | Vote of Thanks |
ABC | |
| 00:00 hrs - 00:00 hrs | High Tea and Networking |
--- | |
OWASP Delhi Meeting October 2010 Sponsors
Meeting Venue October 30th, 2010
Sopra Group
A-64, Sector-64
Noida
Delhi-NCR
* Directions to the venue
Meeting Registration
Please contact Parwez Mohammad to register for the meeting.
In case of any issues, feel free to contact any of the OWASP Committee Members.
Event Pics
This will be updated after the meeting is held.