This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "SecurityByte and OWASP Asia AppSec Conference 2009"
Line 1: | Line 1: | ||
− | {| | + | {| class="FCK__ShowTableBorders" border="0" cellspacing="0" cellpadding="0" align="center" |
|- | |- | ||
− | | [[Image:SB OWASP 2009 banner.gif|center | + | | [[Image:SB OWASP 2009 banner.gif|center]] |
|- | |- | ||
| valign="middle" align="center" | [http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza] | [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Registrations]<br> | | valign="middle" align="center" | [http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza] | [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Registrations]<br> | ||
|} | |} | ||
− | <br> | + | <br> |
==== Welcome ==== | ==== Welcome ==== | ||
Line 46: | Line 46: | ||
=== You can register [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 here] === | === You can register [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 here] === | ||
− | *[http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Click Here] for Online Registrations. | + | *[http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Click Here] for Online Registrations. |
*[http://securitybyte.org/index.php/register.html Click Here] for Offline Registrations. | *[http://securitybyte.org/index.php/register.html Click Here] for Offline Registrations. | ||
Current pricing reflects an "Early Bird" discount of 10% off the at the door price of 8,500/- INR for two days of conference, 12,500/- for one-day training track and 25,000/- for two-days training tracks. | Current pricing reflects an "Early Bird" discount of 10% off the at the door price of 8,500/- INR for two days of conference, 12,500/- for one-day training track and 25,000/- for two-days training tracks. | ||
− | {| | + | {| class="FCK__ShowTableBorders" |
|- | |- | ||
| Two Days of Conference (17th and 18th November 2009) | | Two Days of Conference (17th and 18th November 2009) | ||
− | | <br> | + | | <br> |
| 7,650/- INR | | 7,650/- INR | ||
| General Public | | General Public | ||
|- | |- | ||
| Two Days of Conference (17th and 18th November 2009) | | Two Days of Conference (17th and 18th November 2009) | ||
− | | <br> | + | | <br> |
| 5,000/- INR | | 5,000/- INR | ||
| Students | | Students | ||
|- | |- | ||
| Two-Day Training Tracks (19th and 20th November 2009) | | Two-Day Training Tracks (19th and 20th November 2009) | ||
− | | <br> | + | | <br> |
| 22,500/- INR | | 22,500/- INR | ||
|- | |- | ||
| One-Day Training Tracks (19th OR 20th November 2009) | | One-Day Training Tracks (19th OR 20th November 2009) | ||
− | | <br> | + | | <br> |
| 11,250/- INR | | 11,250/- INR | ||
|} | |} | ||
Line 90: | Line 90: | ||
*IT Professionals Interesting in Improving IT Security<br> | *IT Professionals Interesting in Improving IT Security<br> | ||
− | <br> For student discount, attendees must present proof of enrollment when picking up your badge. | + | <br>For student discount, attendees must present proof of enrollment when picking up your badge. |
==== Schedule ==== | ==== Schedule ==== | ||
Line 104: | Line 104: | ||
== Two Days Conference == | == Two Days Conference == | ||
− | Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel conference talks to be conducted in 3 separate halls for two days i.e . 17th & 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular talk. Conference talks are being delivered by world renowned and most regarded speakers from around the world. Below is the detailed schedule for the two days of conference.<br> | + | Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel conference talks to be conducted in 3 separate halls for two days i.e . 17th & 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular talk. Conference talks are being delivered by world renowned and most regarded speakers from around the world. Below is the detailed schedule for the two days of conference.<br> |
− | {| | + | {| border="1" cellspacing="1" cellpadding="1" width="967" align="center" |
|- valign="middle" | |- valign="middle" | ||
− | | | + | | style="background: rgb(64,88,160); color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous" height="60" colspan="7" align="center" | <font size="5">'''Day 1 - 17th Nov, 2009'''</font> |
|- | |- | ||
− | | | + | | bgcolor="#7b8abd" height="40" valign="middle" width="67" | ''' Where>''' |
− | | | + | | bgcolor="#c0a0a0" height="40" valign="middle" width="300" colspan="2" align="center" | '''Conference Hall - I''' |
− | | | + | | bgcolor="#a0c0e0" height="40" valign="middle" width="300" colspan="2" align="center" | '''Conference Hall - II''' |
− | | | + | | bgcolor="#b3ff99" height="40" valign="middle" width="300" colspan="2" align="center" | '''Conference Hall - III''' |
|- | |- | ||
− | | | + | | bgcolor="#7b8abd" height="40" valign="middle" width="67" | ''' Who>''' |
− | | | + | | bgcolor="#c0a0a0" height="40" valign="middle" width="300" colspan="2" align="center" | '''(Security Researchers & Enthusiasts)''' |
− | | | + | | bgcolor="#a0c0e0" height="40" valign="middle" width="300" colspan="2" align="center" | '''(Security Auditors, Developers, QA teams, Architects)''' |
− | | | + | | bgcolor="#b3ff99" height="40" valign="middle" width="300" colspan="2" align="center" | '''(Leaders, Managers, C&S professionals)''' |
|- | |- | ||
− | | | + | | bgcolor="#7b8abd" height="40" valign="middle" width="67" | 8:00 AM - 9:00 AM |
− | | | + | | bgcolor="#909090" valign="middle" colspan="7" align="center" | '''Registrations''' |
|- | |- | ||
− | | | + | | bgcolor="#7b8abd" height="40" valign="middle" width="67" | ''' Schedule''' |
− | | | + | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | '''Topic<br>''' |
− | | | + | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | '''Speaker<br>''' |
− | | | + | | bgcolor="#a0c0e0" height="40" valign="middle" width="150" align="center" | '''Topic<br>''' |
− | | | + | | bgcolor="#a0c0e0" height="40" valign="middle" width="150" align="center" | '''Speaker<br>''' |
− | | | + | | bgcolor="#b3ff99" height="40" valign="middle" width="150" align="center" | '''Topic<br>''' |
− | | | + | | bgcolor="#b3ff99" height="40" valign="middle" width="150" align="center" | '''Speaker<br>''' |
|- | |- | ||
− | | | + | | bgcolor="#7b8abd" height="40" valign="middle" width="67" | 9:00 AM - 10:30 AM |
− | | | + | | bgcolor="#909090" valign="middle" colspan="7" align="center" | '''Keynote''' |
|- | |- | ||
− | | | + | | bgcolor="#7b8abd" height="40" valign="middle" width="67" | 10:30 AM - 11:00 PM |
− | | | + | | bgcolor="#909090" valign="middle" colspan="7" align="center" | '''Tea Break''' |
|- | |- | ||
− | | | + | | bgcolor="#7b8abd" height="40" valign="middle" width="67" | 11:00 AM - 12:00 PM |
− | | | + | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | Hacking Mobile Wallet/Mobile Banking<br> |
− | | | + | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | The Grugq, Independent Security Researcher<br> |
− | | | + | | bgcolor="#a0c0e0" height="40" valign="middle" width="150" align="center" | How To Blackbox Test Almost Anything<br> |
− | | | + | | bgcolor="#a0c0e0" height="40" valign="middle" width="150" align="center" | Aviram Jenik, Beyond Security<br> |
− | | | + | | bgcolor="#b3ff99" height="40" valign="middle" width="150" align="center" | TBD<br> |
− | | | + | | bgcolor="#b3ff99" height="40" valign="middle" width="150" align="center" | Howard A. Schmidt, Former Cyber Security Advisor to the White house<br> |
|- | |- | ||
− | | | + | | bgcolor="#7b8abd" height="40" valign="middle" width="67" | 12:00 PM - 1:00 PM |
− | | | + | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | Client Side Hacks<br> |
− | | | + | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | Dino Covotsos, Telspace Systems<br> |
− | | | + | | bgcolor="#a0c0e0" height="40" valign="middle" width="150" align="center" | Source code review vs. Penetration testing<br> |
− | | | + | | bgcolor="#a0c0e0" height="40" valign="middle" width="150" align="center" | K. K. Mookhey, Founder & Principal Consultant, NII Consulting<br> |
− | | | + | | bgcolor="#b3ff99" height="40" valign="middle" width="150" align="center" | Data Loss Protection<br> |
− | | | + | | bgcolor="#b3ff99" height="40" valign="middle" width="150" align="center" | Enno Ray, Independent Security Researche<br> |
|- | |- | ||
− | | | + | | bgcolor="#7b8abd" height="40" valign="middle" width="67" | 1:00PM - 2:00PM |
− | | | + | | bgcolor="#909090" valign="middle" colspan="7" align="center" | '''Lunch''' |
|- | |- | ||
− | | | + | | bgcolor="#7b8abd" height="40" valign="middle" width="67" | 2:00 PM - 3:00 PM |
− | | | + | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | Exploiting Firefox Extensions<br> |
− | | | + | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | Roberto Suggi Liverani, Security-Assessment.com<br> |
− | | | + | | bgcolor="#a0c0e0" height="40" valign="middle" width="150" align="center" | Microsoft SDLC<br> |
− | | | + | | bgcolor="#a0c0e0" height="40" valign="middle" width="150" align="center" | Microsoft Corp.<br> |
− | | | + | | bgcolor="#b3ff99" height="40" valign="middle" width="150" align="center" | C&S Compliance Model<br> |
− | | | + | | bgcolor="#b3ff99" height="40" valign="middle" width="150" align="center" | Uma Mohan, Director GDC Program India<br> |
|- | |- | ||
− | | | + | | bgcolor="#7b8abd" height="40" valign="middle" width="67" | 3:00 PM - 4:00 PM |
− | | | + | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | SQL Server Forensics 2.0<br> |
− | | | + | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | Kevvie Fowler, TELUS & Ringzero<br> |
− | | | + | | bgcolor="#a0c0e0" height="40" valign="middle" width="150" align="center" | OWASP SAMM<br> |
− | | | + | | bgcolor="#a0c0e0" height="40" valign="middle" width="150" align="center" | Pravir Chandra, Director of Strategic Services,<br>Fortify<br> |
− | | | + | | bgcolor="#b3ff99" height="40" valign="middle" width="150" align="center" | Risk & Compliance<br> |
− | | | + | | bgcolor="#b3ff99" height="40" valign="middle" width="150" align="center" | TBD<br> |
|- | |- | ||
− | | | + | | bgcolor="#7b8abd" height="40" valign="middle" width="67" | 4:00 PM - 5:00 PM |
− | | | + | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | Advanced Web Hacking<br> |
− | | | + | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | TBD<br> |
− | | | + | | bgcolor="#a0c0e0" height="40" valign="middle" width="150" align="center" | TBD<br> |
− | | | + | | bgcolor="#a0c0e0" height="40" valign="middle" width="150" align="center" | TBD<br> |
− | | | + | | bgcolor="#b3ff99" height="40" valign="middle" width="150" align="center" | TBD<br> |
− | | | + | | bgcolor="#b3ff99" height="40" valign="middle" width="150" align="center" | TBD<br> |
|- | |- | ||
− | | | + | | bgcolor="#7b8abd" height="40" valign="middle" width="67" | 5:00 PM - 6:00 PM |
− | | | + | | bgcolor="#909090" valign="middle" colspan="7" align="center" | '''Drinks on the Exhibition floor''' |
|- | |- | ||
− | | | + | | bgcolor="#7b8abd" height="40" valign="middle" width="67" | 7:00 PM - 10:00 PM |
− | | | + | | bgcolor="#909090" valign="middle" colspan="7" align="center" | '''CXO Event (Exclusive by invitation only) - Information Security Concerns for Offshoring''' |
|} | |} | ||
− | <br> <br> | + | <br><br> |
− | {| | + | {| border="1" cellspacing="1" cellpadding="1" width="967" align="center" |
|- valign="middle" | |- valign="middle" | ||
− | | | + | | style="background: rgb(64,88,160); color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous" height="60" colspan="7" align="center" | <font size="5">'''Day 2 - 18th Nov, 2009'''</font> |
|- | |- | ||
− | | | + | | bgcolor="#7b8abd" height="40" valign="middle" width="67" | ''' Where>''' |
− | | | + | | bgcolor="#c0a0a0" height="40" valign="middle" width="300" colspan="2" align="center" | '''Conference Hall - I''' |
− | | | + | | bgcolor="#a0c0e0" height="40" valign="middle" width="300" colspan="2" align="center" | '''Conference Hall - II''' |
− | | | + | | bgcolor="#b3ff99" height="40" valign="middle" width="300" colspan="2" align="center" | '''Conference Hall - III''' |
|- | |- | ||
− | | | + | | bgcolor="#7b8abd" height="40" valign="middle" width="67" | ''' Who>''' |
− | | | + | | bgcolor="#c0a0a0" height="40" valign="middle" width="300" colspan="2" align="center" | '''(Security Researchers & Enthusiasts)''' |
− | | | + | | bgcolor="#a0c0e0" height="40" valign="middle" width="300" colspan="2" align="center" | '''(Security Auditors, Developers, QA teams, Architects)''' |
− | | | + | | bgcolor="#b3ff99" height="40" valign="middle" width="300" colspan="2" align="center" | '''(Leaders, Managers, C&S professionals)''' |
|- | |- | ||
− | | | + | | bgcolor="#7b8abd" height="40" valign="middle" width="67" | 8:00 AM - 9:00 AM |
− | | | + | | bgcolor="#909090" valign="middle" colspan="7" align="center" | '''Registrations''' |
|- | |- | ||
− | | | + | | bgcolor="#7b8abd" height="40" valign="middle" width="67" | ''' Schedule''' |
− | | | + | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | '''Topic<br>''' |
− | | | + | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | '''Speaker<br>''' |
− | | | + | | bgcolor="#a0c0e0" height="40" valign="middle" width="150" align="center" | '''Topic<br>''' |
− | | | + | | bgcolor="#a0c0e0" height="40" valign="middle" width="150" align="center" | '''Speaker<br>''' |
− | | | + | | bgcolor="#b3ff99" height="40" valign="middle" width="150" align="center" | '''Topic<br>''' |
− | | | + | | bgcolor="#b3ff99" height="40" valign="middle" width="150" align="center" | '''Speaker<br>''' |
|- | |- | ||
− | | | + | | bgcolor="#7b8abd" height="40" valign="middle" width="67" | 9:00 AM - 10:00 AM |
− | | | + | | bgcolor="#909090" valign="middle" colspan="7" align="center" | '''Keynote Day 2''' |
|- | |- | ||
− | | | + | | bgcolor="#7b8abd" height="40" valign="middle" width="67" | 10:00 AM - 11:00 PM |
− | | | + | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | “Do You Want To Play A Game?”: Game Theory And Simulated Cyber War<br> |
− | | | + | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | Bryan K. Fite, HackSecKlahn<br> |
− | | | + | | bgcolor="#a0c0e0" height="40" valign="middle" width="150" align="center" | TBD<br> |
− | | | + | | bgcolor="#a0c0e0" height="40" valign="middle" width="150" align="center" | TBD<br> |
− | | | + | | bgcolor="#b3ff99" height="40" valign="middle" width="150" align="center" | Critical Infrastructure Security “Danger Without borders” <br> |
− | | | + | | bgcolor="#b3ff99" height="40" valign="middle" width="150" align="center" | John Bumgarner, US Cyber Consequence Unit (USCCU)<br> |
|- | |- | ||
− | | | + | | bgcolor="#7b8abd" height="40" valign="middle" width="67" | 11:00 AM - 11:30 PM |
− | | | + | | bgcolor="#909090" valign="middle" colspan="7" align="center" | '''Tea Break''' |
|- | |- | ||
− | | | + | | bgcolor="#7b8abd" height="40" valign="middle" width="67" | 11:30 PM - 12:30 PM |
− | | | + | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | Hacking Oracle From Web<br> |
− | | | + | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | Sid, Independent Security Researcher<br> |
− | | | + | | bgcolor="#a0c0e0" height="40" valign="middle" width="150" align="center" | Testing JSON Applications For Security Holes<br> |
− | | | + | | bgcolor="#a0c0e0" height="40" valign="middle" width="150" align="center" | Aviram Jenik, Beyond Security<br> |
− | | | + | | bgcolor="#b3ff99" height="40" valign="middle" width="150" align="center" | Critical Infrastructure Security “Danger Without borders” <br> |
− | | | + | | bgcolor="#b3ff99" height="40" valign="middle" width="150" align="center" | John Bumgarner, US Cyber Consequence Unit (USCCU)<br> |
|- | |- | ||
− | | | + | | bgcolor="#7b8abd" height="40" valign="middle" width="67" | 12:30 PM - 1:30 PM<br> |
− | | | + | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | Lust 2.0 – Desire for free WiFi and the threat of the Imposter <br> |
− | | | + | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | Lava Kumar Kuppan, Independent Security Researcher<br> |
− | | | + | | bgcolor="#a0c0e0" height="40" valign="middle" width="150" align="center" | TBD<br> |
− | | | + | | bgcolor="#a0c0e0" height="40" valign="middle" width="150" align="center" | TBD<br> |
− | | | + | | bgcolor="#b3ff99" height="40" valign="middle" width="150" align="center" | Cloud Hacking – Distributed Attack & Exploit Platform<br> |
− | | | + | | bgcolor="#b3ff99" height="40" valign="middle" width="150" align="center" | Shreeraj Shah, Blueinfy Solutions<br> |
|- | |- | ||
− | | | + | | bgcolor="#7b8abd" height="40" valign="middle" width="67" | 1:30PM - 2:30PM |
− | | | + | | bgcolor="#909090" valign="middle" colspan="7" align="center" | '''Lunch''' |
|- | |- | ||
− | | | + | | bgcolor="#7b8abd" height="40" valign="middle" width="67" | 2:30 PM - 3:30 PM |
− | | | + | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | Xprobe3 - What's New? Going Application Level<br> |
− | | | + | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | Fyodor Yarochkin, Guard-info<br> |
− | | | + | | bgcolor="#a0c0e0" height="40" valign="middle" width="150" align="center" | TBD<br> |
− | | | + | | bgcolor="#a0c0e0" height="40" valign="middle" width="150" align="center" | TBD<br> |
− | | | + | | bgcolor="#b3ff99" height="40" valign="middle" width="150" align="center" | TBD<br> |
− | | | + | | bgcolor="#b3ff99" height="40" valign="middle" width="150" align="center" | Cedric Blancher, EADS Innovation Works<br> |
|- | |- | ||
− | | | + | | bgcolor="#7b8abd" height="40" valign="middle" width="67" | 3:30 PM - 4:30 PM |
− | | | + | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors<br> |
− | | | + | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | Nitin Kumar/Vipin Kumar, Independent Security Researchers, NVlabs<br> |
− | | | + | | bgcolor="#a0c0e0" height="40" valign="middle" width="150" align="center" | TBD<br> |
− | | | + | | bgcolor="#a0c0e0" height="40" valign="middle" width="150" align="center" | TBD<br> |
− | | | + | | bgcolor="#b3ff99" height="40" valign="middle" width="150" align="center" | TBD<br> |
− | | | + | | bgcolor="#b3ff99" height="40" valign="middle" width="150" align="center" | Mano Paul, Software Assurance Advisor (ISC)2<br> |
|- | |- | ||
− | | | + | | bgcolor="#7b8abd" height="40" valign="middle" width="67" | 4:30 PM - 5:30 PM |
− | | | + | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | Anti Forensics (OSX Based Attacks)<br> |
− | | | + | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | The Grugq, Independent Security Researcher<br> |
− | | | + | | bgcolor="#a0c0e0" height="40" valign="middle" width="150" align="center" | TBD<br> |
− | | | + | | bgcolor="#a0c0e0" height="40" valign="middle" width="150" align="center" | TBD<br> |
− | | | + | | bgcolor="#b3ff99" height="40" valign="middle" width="150" align="center" | Round Table with Speakers/Industry - Security Today/tomorrow<br> |
− | | | + | | bgcolor="#b3ff99" height="40" valign="middle" width="150" align="center" | TBD<br> |
|- | |- | ||
− | | | + | | bgcolor="#7b8abd" height="40" valign="middle" width="67" | 5:30 PM - 6:00 PM |
− | | | + | | bgcolor="#909090" valign="middle" colspan="7" align="center" | '''Closing Remarks by Organizing Committee''' |
|} | |} | ||
− | <br> | + | <br> |
− | <br> | + | <br> |
==== Trainings ==== | ==== Trainings ==== | ||
Line 424: | Line 424: | ||
| [[Image:HITB.jpg|center]]<br> | | [[Image:HITB.jpg|center]]<br> | ||
|- | |- | ||
− | | [[Image:SecurityCompass.JPG|center]] | + | | [[Image:SecurityCompass.JPG|center|Associate Sponsors]] |
| [[Image:HNS-web.jpg|center]] | | [[Image:HNS-web.jpg|center]] | ||
| [[Image:Sector.jpg|center]]<br> | | [[Image:Sector.jpg|center]]<br> | ||
|- | |- | ||
− | | | + | ! valign="baseline" align="center" | |
− | | [[Image:Itmagz.jpg|center]] | + | ---- |
− | | [[Image:Clubhack.gif|center]]<br> | + | |
+ | === Co-Sponsor "CxO Evening" === | ||
+ | |||
+ | [[Image:20th green stacked.png|center|137x97px]] | ||
+ | |||
+ | ---- | ||
+ | |||
+ | | [[Image:Itmagz.jpg|center]] [[Image:Electronicsf.jpg|center]] | ||
+ | | [[Image:Clubhack.gif|center]]<br>[[Image:Eventavenue Logo.jpg|center]] | ||
|- | |- | ||
| | | | ||
− | | | + | | |
− | | [[Image: | + | | [[Image:Crowne plaza.jpg|center]]<br> |
|- | |- | ||
| | | | ||
| | | | ||
− | | | + | | |
|} | |} | ||
Revision as of 15:16, 21 September 2009
Hotel Crowne Plaza | Registrations |
Welcome
Securitybyte & OWASP are proud to welcome you to the annual international information security conference – Securitybyte & OWASP AppSec Asia Conference 2009, Nov 17th through Nov 20th in Delhi & NCR, India.
This is a landmark event, as both Securitybyte and OWASP join hands to present India’s largest InfoSec event with world renowned and most regarded international speakers.
Securitybye & OWASP AppSec Asia Conference 2009 will be held at Hotel Crowne Plaza, Gurgaon, NCR, India. on 17th November through 20th November 2009.
Who Should Attend Securitybyte & OWASP AppSec Asia Conference 2009:
- Application Developers
- Security Researchers
- Application Testers and Quality Assurance
- Penetration Testers
- Application Project Management and Staff
- IT Security Professionals
- Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff
- Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance
- Security Managers and Staff
- Executives, Managers, and Staff Responsible for IT Security Governance
- IT Professionals Interesting in Improving IT Security
About
About Conference
Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel conference talks to be conducted in 3 separate halls for two days i.e . 17th & 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular talk. Conference talks are being delivered by world renowned and most regarded speakers from around the world.
About Trainings
Two days post-conference are dedicated towards best-of-breed trainings being conducted in association with SANS, ISC2 and other organizations. Trainings tracks have been made available as One-Day tracks and Two-Day tracks scheduled for 19th & 20th November 2009.
Registrations
Registration is now open!
You can register here
- Click Here for Online Registrations.
- Click Here for Offline Registrations.
Current pricing reflects an "Early Bird" discount of 10% off the at the door price of 8,500/- INR for two days of conference, 12,500/- for one-day training track and 25,000/- for two-days training tracks.
Two Days of Conference (17th and 18th November 2009) | |
7,650/- INR | General Public |
Two Days of Conference (17th and 18th November 2009) | |
5,000/- INR | Students |
Two-Day Training Tracks (19th and 20th November 2009) | |
22,500/- INR | |
One-Day Training Tracks (19th OR 20th November 2009) | |
11,250/- INR |
* Service Tax @ 10.3% will be charged extra.
Click here for details on the training courses that are available.
Who Should Attend Securitybyte & OWASP AppSec Asia Conference 2009:
- Application Developers
- Security Researchers
- Application Testers and Quality Assurance
- Penetration Testers
- Application Project Management and Staff
- IT Security Professionals
- Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff
- Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance
- Security Managers and Staff
- Executives, Managers, and Staff Responsible for IT Security Governance
- IT Professionals Interesting in Improving IT Security
For student discount, attendees must present proof of enrollment when picking up your badge.
Schedule
Three parallel conference talks are scheduled for 17th & 18th November 2009 in three different halls. Training tracks have been divided in one-day tracks scheduled for 19th or 20th November 2009 and two-day tracks those are schedule to continue for two days both on 19th & 20th November 2009. Follow the tabs to learn the details on both conference and trainings.
- Click here to view the Conference Schedule for 17th & 18th November 2009.
- Click here to view Training Schedule on 19th & 20th November 2009.
Conference
Two Days Conference
Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel conference talks to be conducted in 3 separate halls for two days i.e . 17th & 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular talk. Conference talks are being delivered by world renowned and most regarded speakers from around the world. Below is the detailed schedule for the two days of conference.
Day 1 - 17th Nov, 2009 | |||||||
Where> | Conference Hall - I | Conference Hall - II | Conference Hall - III | ||||
Who> | (Security Researchers & Enthusiasts) | (Security Auditors, Developers, QA teams, Architects) | (Leaders, Managers, C&S professionals) | ||||
8:00 AM - 9:00 AM | Registrations | ||||||
Schedule | Topic |
Speaker |
Topic |
Speaker |
Topic |
Speaker | |
9:00 AM - 10:30 AM | Keynote | ||||||
10:30 AM - 11:00 PM | Tea Break | ||||||
11:00 AM - 12:00 PM | Hacking Mobile Wallet/Mobile Banking |
The Grugq, Independent Security Researcher |
How To Blackbox Test Almost Anything |
Aviram Jenik, Beyond Security |
TBD |
Howard A. Schmidt, Former Cyber Security Advisor to the White house | |
12:00 PM - 1:00 PM | Client Side Hacks |
Dino Covotsos, Telspace Systems |
Source code review vs. Penetration testing |
K. K. Mookhey, Founder & Principal Consultant, NII Consulting |
Data Loss Protection |
Enno Ray, Independent Security Researche | |
1:00PM - 2:00PM | Lunch | ||||||
2:00 PM - 3:00 PM | Exploiting Firefox Extensions |
Roberto Suggi Liverani, Security-Assessment.com |
Microsoft SDLC |
Microsoft Corp. |
C&S Compliance Model |
Uma Mohan, Director GDC Program India | |
3:00 PM - 4:00 PM | SQL Server Forensics 2.0 |
Kevvie Fowler, TELUS & Ringzero |
OWASP SAMM |
Pravir Chandra, Director of Strategic Services, Fortify |
Risk & Compliance |
TBD | |
4:00 PM - 5:00 PM | Advanced Web Hacking |
TBD |
TBD |
TBD |
TBD |
TBD | |
5:00 PM - 6:00 PM | Drinks on the Exhibition floor | ||||||
7:00 PM - 10:00 PM | CXO Event (Exclusive by invitation only) - Information Security Concerns for Offshoring |
Day 2 - 18th Nov, 2009 | |||||||
Where> | Conference Hall - I | Conference Hall - II | Conference Hall - III | ||||
Who> | (Security Researchers & Enthusiasts) | (Security Auditors, Developers, QA teams, Architects) | (Leaders, Managers, C&S professionals) | ||||
8:00 AM - 9:00 AM | Registrations | ||||||
Schedule | Topic |
Speaker |
Topic |
Speaker |
Topic |
Speaker | |
9:00 AM - 10:00 AM | Keynote Day 2 | ||||||
10:00 AM - 11:00 PM | “Do You Want To Play A Game?”: Game Theory And Simulated Cyber War |
Bryan K. Fite, HackSecKlahn |
TBD |
TBD |
Critical Infrastructure Security “Danger Without borders” |
John Bumgarner, US Cyber Consequence Unit (USCCU) | |
11:00 AM - 11:30 PM | Tea Break | ||||||
11:30 PM - 12:30 PM | Hacking Oracle From Web |
Sid, Independent Security Researcher |
Testing JSON Applications For Security Holes |
Aviram Jenik, Beyond Security |
Critical Infrastructure Security “Danger Without borders” |
John Bumgarner, US Cyber Consequence Unit (USCCU) | |
12:30 PM - 1:30 PM |
Lust 2.0 – Desire for free WiFi and the threat of the Imposter |
Lava Kumar Kuppan, Independent Security Researcher |
TBD |
TBD |
Cloud Hacking – Distributed Attack & Exploit Platform |
Shreeraj Shah, Blueinfy Solutions | |
1:30PM - 2:30PM | Lunch | ||||||
2:30 PM - 3:30 PM | Xprobe3 - What's New? Going Application Level |
Fyodor Yarochkin, Guard-info |
TBD |
TBD |
TBD |
Cedric Blancher, EADS Innovation Works | |
3:30 PM - 4:30 PM | Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors |
Nitin Kumar/Vipin Kumar, Independent Security Researchers, NVlabs |
TBD |
TBD |
TBD |
Mano Paul, Software Assurance Advisor (ISC)2 | |
4:30 PM - 5:30 PM | Anti Forensics (OSX Based Attacks) |
The Grugq, Independent Security Researcher |
TBD |
TBD |
Round Table with Speakers/Industry - Security Today/tomorrow |
TBD | |
5:30 PM - 6:00 PM | Closing Remarks by Organizing Committee |
Trainings
Two Day Trainings
Two days post-conference are dedicated towards best-of-breed trainings being conducted in association with SANS, ISC2 and other organizations. Trainings tracks have been made available as One-Day tracks and Two-Day tracks scheduled for 19th & 20th November 2009.
Day 1 - 19th Nov, 2009 | Day 2 - 20th Nov, 2009 | ||||||
Course ID | Course Duration
(# of Days) |
Course Title | Instructor | Course ID | Course Duration
(# of Days) |
Course Title | Instructor |
One Day Training Tracks | |||||||
SB1DHSO | 1 Day |
ORACLE Hacking & Security |
Sumit Sidharth, |
SB1DAWH | 1 Day |
Advanced Web Hacking -Securing AJAX, RIA & SOA |
Shreeraj Shah |
SB1DAFT |
1 Day |
Advanced Forensics Techniques |
The Grugq, |
SB1DIAT |
1 Day |
In-depth Assessment Techniques: Design, Code, and Runtime |
Pravir Chandra, |
Two Day Training Tracks | |||||||
SB2DBWH | 2 Days |
Hacking Wireless & Bluetooth 101 |
Dino Covotsos / Charlton Smith, |
SB2DBWH | 2 Days |
Hacking Wireless & Bluetooth 101 |
Dino Covotsos / Charlton Smith, |
SB2DNST | 2 Days |
Building advanced Network Security Tools |
Daniel Mende, | SB2DNST | 2 Days |
Building advanced Network Security Tools |
Daniel Mende, |
SB2DCBC | 2 Days |
(ISC)2 CSSLP CBK Boot camp |
Mano Paul, | SB2DCBC | 2 Days |
(ISC)2 CSSLP CBK Boot camp |
Mano Paul, |
SB2DSCJ / SANS Course ID : DEV530 | 2 Days | Essential Secure Coding in Java / JEE |
SB2DSCJ / SANS Course ID : DEV530 | 2 Days | Essential Secure Coding in Java / JEE |
||
SB2DWPT / SANS Course ID : DEV538 | 2 Days | Web Application Pen Testing Hands-On Immersion |
SB2DWPT / SANS Course ID : DEV538 | 2 Days | Web Application Pen Testing Hands-On Immersion |
||
SB2DSAB / SANS Course ID : AUD429 | 2 Days | IT Security Audit Essentials Bootcamp |
SB2DSAB / SANS Course ID : AUD429 | 2 Days | IT Security Audit Essentials Bootcamp |
Venue
Four Days Event is planned out at:
Hotel Crowne Plaza,
Site - 2, Sector - 29,
Gurgaon-122001 (National Capital Region), India
Hotel Front Desk: 91-124-4534000
Hotel Fax: 91-124-4304800
Sponsors
Associate Sponsors | Media Partners | Supporters |
| ||
| ||
Co-Sponsor "CxO Evening" |
| |
---|---|---|
| ||
Please contact Chair - OWASP India for sponsorship opportunities.