This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "SecurityByte and OWASP Asia AppSec Conference 2009"

From OWASP
Jump to: navigation, search
Line 1: Line 1:
{| cellspacing="0" cellpadding="0" border="0" align="center"
+
{| class="FCK__ShowTableBorders" border="0" cellspacing="0" cellpadding="0" align="center"
 
|-
 
|-
| [[Image:SB OWASP 2009 banner.gif|center|link=http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009]]
+
| [[Image:SB OWASP 2009 banner.gif|center]]
 
|-
 
|-
 
| valign="middle" align="center" | [http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza] &#124; [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Registrations]<br>
 
| valign="middle" align="center" | [http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza] &#124; [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Registrations]<br>
 
|}
 
|}
  
<br>  
+
<br>
  
 
==== Welcome  ====
 
==== Welcome  ====
Line 46: Line 46:
 
=== You can register [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 here]  ===
 
=== You can register [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 here]  ===
  
*[http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Click Here] for Online Registrations.
+
*[http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Click Here] for Online Registrations.  
 
*[http://securitybyte.org/index.php/register.html Click Here] for Offline Registrations.
 
*[http://securitybyte.org/index.php/register.html Click Here] for Offline Registrations.
  
 
Current pricing reflects an "Early Bird" discount of 10% off the at the door price of 8,500/- INR for two days of conference, 12,500/- for one-day training track and 25,000/- for two-days training tracks.  
 
Current pricing reflects an "Early Bird" discount of 10% off the at the door price of 8,500/- INR for two days of conference, 12,500/- for one-day training track and 25,000/- for two-days training tracks.  
  
{|
+
{| class="FCK__ShowTableBorders"
 
|-
 
|-
 
| Two Days of Conference (17th and 18th November 2009)  
 
| Two Days of Conference (17th and 18th November 2009)  
| <br>  
+
| <br>
 
| 7,650/- INR  
 
| 7,650/- INR  
 
| General Public
 
| General Public
 
|-
 
|-
 
| Two Days of Conference (17th and 18th November 2009)  
 
| Two Days of Conference (17th and 18th November 2009)  
| <br>  
+
| <br>
 
| 5,000/- INR  
 
| 5,000/- INR  
 
| Students
 
| Students
 
|-
 
|-
 
| Two-Day Training Tracks (19th and 20th November 2009)  
 
| Two-Day Training Tracks (19th and 20th November 2009)  
| <br>  
+
| <br>
 
| 22,500/- INR
 
| 22,500/- INR
 
|-
 
|-
 
| One-Day Training Tracks (19th OR 20th November 2009)  
 
| One-Day Training Tracks (19th OR 20th November 2009)  
| <br>  
+
| <br>
 
| 11,250/- INR
 
| 11,250/- INR
 
|}
 
|}
Line 90: Line 90:
 
*IT Professionals Interesting in Improving IT Security<br>
 
*IT Professionals Interesting in Improving IT Security<br>
  
<br> For student discount, attendees must present proof of enrollment when picking up your badge.  
+
<br>For student discount, attendees must present proof of enrollment when picking up your badge.  
  
 
==== Schedule  ====
 
==== Schedule  ====
Line 104: Line 104:
 
== Two Days Conference  ==
 
== Two Days Conference  ==
  
Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel conference talks to be conducted in 3 separate halls for two days i.e . 17th &amp; 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular talk. Conference talks are being delivered by world renowned and most regarded speakers from around the world. Below is the detailed schedule for the two days of conference.<br>  
+
Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel conference talks to be conducted in 3 separate halls for two days i.e . 17th &amp; 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular talk. Conference talks are being delivered by world renowned and most regarded speakers from around the world. Below is the detailed schedule for the two days of conference.<br>
  
{| width="967" cellspacing="1" cellpadding="1" border="1" align="center"
+
{| border="1" cellspacing="1" cellpadding="1" width="967" align="center"
 
|- valign="middle"
 
|- valign="middle"
| height="60" align="center" colspan="7" style="background: rgb(64, 88, 160) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;" | <font size="5">'''Day 1 - 17th Nov, 2009'''</font>
+
| style="background: rgb(64,88,160); color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous" height="60" colspan="7" align="center" | <font size="5">'''Day 1 - 17th Nov, 2009'''</font>
 
|-
 
|-
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | '''&nbsp; Where&gt;'''  
+
| bgcolor="#7b8abd" height="40" valign="middle" width="67" | '''&nbsp; Where&gt;'''  
| width="300" valign="middle" height="40" bgcolor="#c0a0a0" align="center" colspan="2" | '''Conference Hall - I'''  
+
| bgcolor="#c0a0a0" height="40" valign="middle" width="300" colspan="2" align="center" | '''Conference Hall - I'''  
| width="300" valign="middle" height="40" bgcolor="#a0c0e0" align="center" colspan="2" | '''Conference Hall - II'''  
+
| bgcolor="#a0c0e0" height="40" valign="middle" width="300" colspan="2" align="center" | '''Conference Hall - II'''  
| width="300" valign="middle" height="40" bgcolor="#b3ff99" align="center" colspan="2" | '''Conference Hall - III'''
+
| bgcolor="#b3ff99" height="40" valign="middle" width="300" colspan="2" align="center" | '''Conference Hall - III'''
 
|-
 
|-
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | '''&nbsp; Who&gt;'''  
+
| bgcolor="#7b8abd" height="40" valign="middle" width="67" | '''&nbsp; Who&gt;'''  
| width="300" valign="middle" height="40" bgcolor="#c0a0a0" align="center" colspan="2" | '''(Security Researchers &amp; Enthusiasts)'''  
+
| bgcolor="#c0a0a0" height="40" valign="middle" width="300" colspan="2" align="center" | '''(Security Researchers &amp; Enthusiasts)'''  
| width="300" valign="middle" height="40" bgcolor="#a0c0e0" align="center" colspan="2" | '''(Security Auditors, Developers, QA teams, Architects)'''  
+
| bgcolor="#a0c0e0" height="40" valign="middle" width="300" colspan="2" align="center" | '''(Security Auditors, Developers, QA teams, Architects)'''  
| width="300" valign="middle" height="40" bgcolor="#b3ff99" align="center" colspan="2" | '''(Leaders, Managers, C&amp;S professionals)'''
+
| bgcolor="#b3ff99" height="40" valign="middle" width="300" colspan="2" align="center" | '''(Leaders, Managers, C&amp;S professionals)'''
 
|-
 
|-
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | 8:00 AM - 9:00 AM  
+
| bgcolor="#7b8abd" height="40" valign="middle" width="67" | 8:00 AM - 9:00 AM  
| valign="middle" bgcolor="#909090" align="center" colspan="7" | '''Registrations'''
+
| bgcolor="#909090" valign="middle" colspan="7" align="center" | '''Registrations'''
 
|-
 
|-
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | '''&nbsp; Schedule'''  
+
| bgcolor="#7b8abd" height="40" valign="middle" width="67" | '''&nbsp; Schedule'''  
| width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | '''Topic<br>'''  
+
| bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | '''Topic<br>'''
| width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | '''Speaker<br>'''  
+
| bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | '''Speaker<br>'''
| width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | '''Topic<br>'''  
+
| bgcolor="#a0c0e0" height="40" valign="middle" width="150" align="center" | '''Topic<br>'''
| width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | '''Speaker<br>'''  
+
| bgcolor="#a0c0e0" height="40" valign="middle" width="150" align="center" | '''Speaker<br>'''
| width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | '''Topic<br>'''  
+
| bgcolor="#b3ff99" height="40" valign="middle" width="150" align="center" | '''Topic<br>'''
| width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | '''Speaker<br>'''
+
| bgcolor="#b3ff99" height="40" valign="middle" width="150" align="center" | '''Speaker<br>'''
 
|-
 
|-
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | 9:00 AM - 10:30 AM  
+
| bgcolor="#7b8abd" height="40" valign="middle" width="67" | 9:00 AM - 10:30 AM  
| valign="middle" bgcolor="#909090" align="center" colspan="7" | '''Keynote'''
+
| bgcolor="#909090" valign="middle" colspan="7" align="center" | '''Keynote'''
 
|-
 
|-
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | 10:30 AM - 11:00 PM  
+
| bgcolor="#7b8abd" height="40" valign="middle" width="67" | 10:30 AM - 11:00 PM  
| valign="middle" bgcolor="#909090" align="center" colspan="7" | '''Tea Break'''
+
| bgcolor="#909090" valign="middle" colspan="7" align="center" | '''Tea Break'''
 
|-
 
|-
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | 11:00 AM - 12:00&nbsp;PM  
+
| bgcolor="#7b8abd" height="40" valign="middle" width="67" | 11:00 AM - 12:00&nbsp;PM  
| width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | Hacking Mobile Wallet/Mobile Banking<br>  
+
| bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | Hacking Mobile Wallet/Mobile Banking<br>
| width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | The Grugq, Independent Security Researcher<br>  
+
| bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | The Grugq, Independent Security Researcher<br>
| width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | How To Blackbox Test Almost Anything<br>  
+
| bgcolor="#a0c0e0" height="40" valign="middle" width="150" align="center" | How To Blackbox Test Almost Anything<br>
| width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | Aviram Jenik, Beyond Security<br>  
+
| bgcolor="#a0c0e0" height="40" valign="middle" width="150" align="center" | Aviram Jenik, Beyond Security<br>
| width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | TBD<br>  
+
| bgcolor="#b3ff99" height="40" valign="middle" width="150" align="center" | TBD<br>
| width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | Howard A. Schmidt, Former Cyber Security Advisor to the White house<br>
+
| bgcolor="#b3ff99" height="40" valign="middle" width="150" align="center" | Howard A. Schmidt, Former Cyber Security Advisor to the White house<br>
 
|-
 
|-
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | 12:00 PM - 1:00 PM  
+
| bgcolor="#7b8abd" height="40" valign="middle" width="67" | 12:00 PM - 1:00 PM  
| width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | Client Side Hacks<br>  
+
| bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | Client Side Hacks<br>
| width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | Dino Covotsos, Telspace Systems<br>  
+
| bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | Dino Covotsos, Telspace Systems<br>
| width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | Source code review vs. Penetration testing<br>  
+
| bgcolor="#a0c0e0" height="40" valign="middle" width="150" align="center" | Source code review vs. Penetration testing<br>
| width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | K. K. Mookhey, Founder &amp; Principal Consultant, NII Consulting<br>  
+
| bgcolor="#a0c0e0" height="40" valign="middle" width="150" align="center" | K. K. Mookhey, Founder &amp; Principal Consultant, NII Consulting<br>
| width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | Data Loss Protection<br>  
+
| bgcolor="#b3ff99" height="40" valign="middle" width="150" align="center" | Data Loss Protection<br>
| width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | Enno Ray, Independent Security Researche<br>
+
| bgcolor="#b3ff99" height="40" valign="middle" width="150" align="center" | Enno Ray, Independent Security Researche<br>
 
|-
 
|-
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | 1:00PM - 2:00PM  
+
| bgcolor="#7b8abd" height="40" valign="middle" width="67" | 1:00PM - 2:00PM  
| valign="middle" bgcolor="#909090" align="center" colspan="7" | '''Lunch'''
+
| bgcolor="#909090" valign="middle" colspan="7" align="center" | '''Lunch'''
 
|-
 
|-
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | 2:00 PM - 3:00&nbsp;PM  
+
| bgcolor="#7b8abd" height="40" valign="middle" width="67" | 2:00 PM - 3:00&nbsp;PM  
| width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | Exploiting Firefox Extensions<br>  
+
| bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | Exploiting Firefox Extensions<br>
| width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | Roberto Suggi Liverani, Security-Assessment.com<br>  
+
| bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | Roberto Suggi Liverani, Security-Assessment.com<br>
| width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | Microsoft SDLC<br>  
+
| bgcolor="#a0c0e0" height="40" valign="middle" width="150" align="center" | Microsoft SDLC<br>
| width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | Microsoft Corp.<br>  
+
| bgcolor="#a0c0e0" height="40" valign="middle" width="150" align="center" | Microsoft Corp.<br>
| width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | C&amp;S Compliance Model<br>  
+
| bgcolor="#b3ff99" height="40" valign="middle" width="150" align="center" | C&amp;S Compliance Model<br>
| width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | Uma Mohan, Director GDC Program India<br>
+
| bgcolor="#b3ff99" height="40" valign="middle" width="150" align="center" | Uma Mohan, Director GDC Program India<br>
 
|-
 
|-
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | 3:00 PM - 4:00&nbsp;PM  
+
| bgcolor="#7b8abd" height="40" valign="middle" width="67" | 3:00 PM - 4:00&nbsp;PM  
| width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | SQL Server Forensics 2.0<br>  
+
| bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | SQL Server Forensics 2.0<br>
| width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | Kevvie Fowler, TELUS &amp; Ringzero<br>  
+
| bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | Kevvie Fowler, TELUS &amp; Ringzero<br>
| width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | OWASP SAMM<br>  
+
| bgcolor="#a0c0e0" height="40" valign="middle" width="150" align="center" | OWASP SAMM<br>
| width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | Pravir Chandra, Director of Strategic Services,<br>Fortify<br>  
+
| bgcolor="#a0c0e0" height="40" valign="middle" width="150" align="center" | Pravir Chandra, Director of Strategic Services,<br>Fortify<br>
| width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | Risk &amp;&nbsp;Compliance<br>  
+
| bgcolor="#b3ff99" height="40" valign="middle" width="150" align="center" | Risk &amp;&nbsp;Compliance<br>
| width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | TBD<br>
+
| bgcolor="#b3ff99" height="40" valign="middle" width="150" align="center" | TBD<br>
 
|-
 
|-
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | 4:00 PM - 5:00 PM  
+
| bgcolor="#7b8abd" height="40" valign="middle" width="67" | 4:00 PM - 5:00 PM  
| width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | Advanced Web Hacking<br>  
+
| bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | Advanced Web Hacking<br>
| width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | TBD<br>  
+
| bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | TBD<br>
| width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | TBD<br>  
+
| bgcolor="#a0c0e0" height="40" valign="middle" width="150" align="center" | TBD<br>
| width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | TBD<br>  
+
| bgcolor="#a0c0e0" height="40" valign="middle" width="150" align="center" | TBD<br>
| width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | TBD<br>  
+
| bgcolor="#b3ff99" height="40" valign="middle" width="150" align="center" | TBD<br>
| width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | TBD<br>
+
| bgcolor="#b3ff99" height="40" valign="middle" width="150" align="center" | TBD<br>
 
|-
 
|-
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | 5:00 PM - 6:00 PM  
+
| bgcolor="#7b8abd" height="40" valign="middle" width="67" | 5:00 PM - 6:00 PM  
| valign="middle" bgcolor="#909090" align="center" colspan="7" | '''Drinks on the Exhibition floor'''
+
| bgcolor="#909090" valign="middle" colspan="7" align="center" | '''Drinks on the Exhibition floor'''
 
|-
 
|-
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | 7:00 PM - 10:00 PM  
+
| bgcolor="#7b8abd" height="40" valign="middle" width="67" | 7:00 PM - 10:00 PM  
| valign="middle" bgcolor="#909090" align="center" colspan="7" | '''CXO Event (Exclusive by invitation only) - Information Security Concerns for Offshoring'''
+
| bgcolor="#909090" valign="middle" colspan="7" align="center" | '''CXO Event (Exclusive by invitation only) - Information Security Concerns for Offshoring'''
 
|}
 
|}
  
<br> <br>  
+
<br><br>
  
{| width="967" cellspacing="1" cellpadding="1" border="1" align="center"
+
{| border="1" cellspacing="1" cellpadding="1" width="967" align="center"
 
|- valign="middle"
 
|- valign="middle"
| height="60" align="center" colspan="7" style="background: rgb(64, 88, 160) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;" | <font size="5">'''Day 2 - 18th Nov, 2009'''</font>
+
| style="background: rgb(64,88,160); color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous" height="60" colspan="7" align="center" | <font size="5">'''Day 2 - 18th Nov, 2009'''</font>
 
|-
 
|-
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | '''&nbsp; Where&gt;'''  
+
| bgcolor="#7b8abd" height="40" valign="middle" width="67" | '''&nbsp; Where&gt;'''  
| width="300" valign="middle" height="40" bgcolor="#c0a0a0" align="center" colspan="2" | '''Conference Hall - I'''  
+
| bgcolor="#c0a0a0" height="40" valign="middle" width="300" colspan="2" align="center" | '''Conference Hall - I'''  
| width="300" valign="middle" height="40" bgcolor="#a0c0e0" align="center" colspan="2" | '''Conference Hall - II'''  
+
| bgcolor="#a0c0e0" height="40" valign="middle" width="300" colspan="2" align="center" | '''Conference Hall - II'''  
| width="300" valign="middle" height="40" bgcolor="#b3ff99" align="center" colspan="2" | '''Conference Hall - III'''
+
| bgcolor="#b3ff99" height="40" valign="middle" width="300" colspan="2" align="center" | '''Conference Hall - III'''
 
|-
 
|-
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | '''&nbsp; Who&gt;'''  
+
| bgcolor="#7b8abd" height="40" valign="middle" width="67" | '''&nbsp; Who&gt;'''  
| width="300" valign="middle" height="40" bgcolor="#c0a0a0" align="center" colspan="2" | '''(Security Researchers &amp; Enthusiasts)'''  
+
| bgcolor="#c0a0a0" height="40" valign="middle" width="300" colspan="2" align="center" | '''(Security Researchers &amp; Enthusiasts)'''  
| width="300" valign="middle" height="40" bgcolor="#a0c0e0" align="center" colspan="2" | '''(Security Auditors, Developers, QA teams, Architects)'''  
+
| bgcolor="#a0c0e0" height="40" valign="middle" width="300" colspan="2" align="center" | '''(Security Auditors, Developers, QA teams, Architects)'''  
| width="300" valign="middle" height="40" bgcolor="#b3ff99" align="center" colspan="2" | '''(Leaders, Managers, C&amp;S professionals)'''
+
| bgcolor="#b3ff99" height="40" valign="middle" width="300" colspan="2" align="center" | '''(Leaders, Managers, C&amp;S professionals)'''
 
|-
 
|-
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | 8:00 AM - 9:00 AM  
+
| bgcolor="#7b8abd" height="40" valign="middle" width="67" | 8:00 AM - 9:00 AM  
| valign="middle" bgcolor="#909090" align="center" colspan="7" | '''Registrations'''
+
| bgcolor="#909090" valign="middle" colspan="7" align="center" | '''Registrations'''
 
|-
 
|-
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | '''&nbsp; Schedule'''  
+
| bgcolor="#7b8abd" height="40" valign="middle" width="67" | '''&nbsp; Schedule'''  
| width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | '''Topic<br>'''  
+
| bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | '''Topic<br>'''
| width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | '''Speaker<br>'''  
+
| bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | '''Speaker<br>'''
| width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | '''Topic<br>'''  
+
| bgcolor="#a0c0e0" height="40" valign="middle" width="150" align="center" | '''Topic<br>'''
| width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | '''Speaker<br>'''  
+
| bgcolor="#a0c0e0" height="40" valign="middle" width="150" align="center" | '''Speaker<br>'''
| width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | '''Topic<br>'''  
+
| bgcolor="#b3ff99" height="40" valign="middle" width="150" align="center" | '''Topic<br>'''
| width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | '''Speaker<br>'''
+
| bgcolor="#b3ff99" height="40" valign="middle" width="150" align="center" | '''Speaker<br>'''
 
|-
 
|-
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | 9:00 AM - 10:00 AM  
+
| bgcolor="#7b8abd" height="40" valign="middle" width="67" | 9:00 AM - 10:00 AM  
| valign="middle" bgcolor="#909090" align="center" colspan="7" | '''Keynote Day 2'''
+
| bgcolor="#909090" valign="middle" colspan="7" align="center" | '''Keynote Day 2'''
 
|-
 
|-
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | 10:00 AM - 11:00&nbsp;PM  
+
| bgcolor="#7b8abd" height="40" valign="middle" width="67" | 10:00 AM - 11:00&nbsp;PM  
| width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | “Do You Want To Play A Game?”: Game Theory And Simulated Cyber War<br>  
+
| bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | “Do You Want To Play A Game?”: Game Theory And Simulated Cyber War<br>
| width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | Bryan K. Fite, HackSecKlahn<br>  
+
| bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | Bryan K. Fite, HackSecKlahn<br>
| width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | TBD<br>  
+
| bgcolor="#a0c0e0" height="40" valign="middle" width="150" align="center" | TBD<br>
| width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | TBD<br>  
+
| bgcolor="#a0c0e0" height="40" valign="middle" width="150" align="center" | TBD<br>
| width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | Critical Infrastructure Security “Danger Without borders” <br>  
+
| bgcolor="#b3ff99" height="40" valign="middle" width="150" align="center" | Critical Infrastructure Security “Danger Without borders” <br>
| width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | John Bumgarner, US Cyber Consequence Unit (USCCU)<br>
+
| bgcolor="#b3ff99" height="40" valign="middle" width="150" align="center" | John Bumgarner, US Cyber Consequence Unit (USCCU)<br>
 
|-
 
|-
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | 11:00 AM - 11:30 PM  
+
| bgcolor="#7b8abd" height="40" valign="middle" width="67" | 11:00 AM - 11:30 PM  
| valign="middle" bgcolor="#909090" align="center" colspan="7" | '''Tea Break'''
+
| bgcolor="#909090" valign="middle" colspan="7" align="center" | '''Tea Break'''
 
|-
 
|-
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | 11:30 PM - 12:30 PM  
+
| bgcolor="#7b8abd" height="40" valign="middle" width="67" | 11:30 PM - 12:30 PM  
| width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | Hacking Oracle From Web<br>  
+
| bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | Hacking Oracle From Web<br>
| width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | Sid, Independent Security Researcher<br>  
+
| bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | Sid, Independent Security Researcher<br>
| width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | Testing JSON Applications For Security Holes<br>  
+
| bgcolor="#a0c0e0" height="40" valign="middle" width="150" align="center" | Testing JSON Applications For Security Holes<br>
| width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | Aviram Jenik, Beyond Security<br>  
+
| bgcolor="#a0c0e0" height="40" valign="middle" width="150" align="center" | Aviram Jenik, Beyond Security<br>
| width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | Critical Infrastructure Security “Danger Without borders” <br>  
+
| bgcolor="#b3ff99" height="40" valign="middle" width="150" align="center" | Critical Infrastructure Security “Danger Without borders” <br>
| width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | John Bumgarner, US Cyber Consequence Unit (USCCU)<br>
+
| bgcolor="#b3ff99" height="40" valign="middle" width="150" align="center" | John Bumgarner, US Cyber Consequence Unit (USCCU)<br>
 
|-
 
|-
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | 12:30 PM&nbsp;- 1:30 PM<br>  
+
| bgcolor="#7b8abd" height="40" valign="middle" width="67" | 12:30 PM&nbsp;- 1:30 PM<br>
| width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | Lust 2.0 – Desire for free WiFi and the threat of the Imposter <br>  
+
| bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | Lust 2.0 – Desire for free WiFi and the threat of the Imposter <br>
| width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | Lava Kumar Kuppan, Independent Security Researcher<br>  
+
| bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | Lava Kumar Kuppan, Independent Security Researcher<br>
| width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | TBD<br>  
+
| bgcolor="#a0c0e0" height="40" valign="middle" width="150" align="center" | TBD<br>
| width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | TBD<br>  
+
| bgcolor="#a0c0e0" height="40" valign="middle" width="150" align="center" | TBD<br>
| width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | Cloud Hacking – Distributed Attack &amp; Exploit Platform<br>  
+
| bgcolor="#b3ff99" height="40" valign="middle" width="150" align="center" | Cloud Hacking – Distributed Attack &amp; Exploit Platform<br>
| width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | Shreeraj Shah, Blueinfy Solutions<br>
+
| bgcolor="#b3ff99" height="40" valign="middle" width="150" align="center" | Shreeraj Shah, Blueinfy Solutions<br>
 
|-
 
|-
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | 1:30PM - 2:30PM  
+
| bgcolor="#7b8abd" height="40" valign="middle" width="67" | 1:30PM - 2:30PM  
| valign="middle" bgcolor="#909090" align="center" colspan="7" | '''Lunch'''
+
| bgcolor="#909090" valign="middle" colspan="7" align="center" | '''Lunch'''
 
|-
 
|-
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | 2:30 PM - 3:30&nbsp;PM  
+
| bgcolor="#7b8abd" height="40" valign="middle" width="67" | 2:30 PM - 3:30&nbsp;PM  
| width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | Xprobe3 - What's New? Going Application Level<br>  
+
| bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | Xprobe3 - What's New? Going Application Level<br>
| width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | Fyodor Yarochkin, Guard-info<br>  
+
| bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | Fyodor Yarochkin, Guard-info<br>
| width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | TBD<br>  
+
| bgcolor="#a0c0e0" height="40" valign="middle" width="150" align="center" | TBD<br>
| width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | TBD<br>  
+
| bgcolor="#a0c0e0" height="40" valign="middle" width="150" align="center" | TBD<br>
| width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | TBD<br>  
+
| bgcolor="#b3ff99" height="40" valign="middle" width="150" align="center" | TBD<br>
| width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | Cedric Blancher, EADS Innovation Works<br>
+
| bgcolor="#b3ff99" height="40" valign="middle" width="150" align="center" | Cedric Blancher, EADS Innovation Works<br>
 
|-
 
|-
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | 3:30 PM - 4:30&nbsp;PM  
+
| bgcolor="#7b8abd" height="40" valign="middle" width="67" | 3:30 PM - 4:30&nbsp;PM  
| width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors<br>  
+
| bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors<br>
| width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | Nitin Kumar/Vipin Kumar, Independent Security Researchers, NVlabs<br>  
+
| bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | Nitin Kumar/Vipin Kumar, Independent Security Researchers, NVlabs<br>
| width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | TBD<br>  
+
| bgcolor="#a0c0e0" height="40" valign="middle" width="150" align="center" | TBD<br>
| width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | TBD<br>  
+
| bgcolor="#a0c0e0" height="40" valign="middle" width="150" align="center" | TBD<br>
| width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | TBD<br>  
+
| bgcolor="#b3ff99" height="40" valign="middle" width="150" align="center" | TBD<br>
| width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | Mano Paul, Software Assurance Advisor (ISC)2<br>
+
| bgcolor="#b3ff99" height="40" valign="middle" width="150" align="center" | Mano Paul, Software Assurance Advisor (ISC)2<br>
 
|-
 
|-
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | 4:30 PM - 5:30 PM  
+
| bgcolor="#7b8abd" height="40" valign="middle" width="67" | 4:30 PM - 5:30 PM  
| width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | Anti Forensics (OSX Based Attacks)<br>  
+
| bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | Anti Forensics (OSX Based Attacks)<br>
| width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | The Grugq, Independent Security Researcher<br>  
+
| bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | The Grugq, Independent Security Researcher<br>
| width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | TBD<br>  
+
| bgcolor="#a0c0e0" height="40" valign="middle" width="150" align="center" | TBD<br>
| width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | TBD<br>  
+
| bgcolor="#a0c0e0" height="40" valign="middle" width="150" align="center" | TBD<br>
| width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | Round Table with Speakers/Industry - Security Today/tomorrow<br>  
+
| bgcolor="#b3ff99" height="40" valign="middle" width="150" align="center" | Round Table with Speakers/Industry - Security Today/tomorrow<br>
| width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | TBD<br>
+
| bgcolor="#b3ff99" height="40" valign="middle" width="150" align="center" | TBD<br>
 
|-
 
|-
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | 5:30 PM - 6:00 PM  
+
| bgcolor="#7b8abd" height="40" valign="middle" width="67" | 5:30 PM - 6:00 PM  
| valign="middle" bgcolor="#909090" align="center" colspan="7" | '''Closing Remarks by Organizing Committee'''
+
| bgcolor="#909090" valign="middle" colspan="7" align="center" | '''Closing Remarks by Organizing Committee'''
 
|}
 
|}
  
<br>  
+
<br>
  
<br>  
+
<br>
  
 
==== Trainings  ====
 
==== Trainings  ====
Line 424: Line 424:
 
| [[Image:HITB.jpg|center]]<br>
 
| [[Image:HITB.jpg|center]]<br>
 
|-
 
|-
| [[Image:SecurityCompass.JPG|center]]  
+
| [[Image:SecurityCompass.JPG|center|Associate Sponsors]]  
 
| [[Image:HNS-web.jpg|center]]  
 
| [[Image:HNS-web.jpg|center]]  
 
| [[Image:Sector.jpg|center]]<br>
 
| [[Image:Sector.jpg|center]]<br>
 
|-
 
|-
|  
+
! valign="baseline" align="center" |
| [[Image:Itmagz.jpg|center]]  
+
----
| [[Image:Clubhack.gif|center]]<br>
+
 
 +
=== Co-Sponsor "CxO Evening"  ===
 +
 
 +
&nbsp;[[Image:20th green stacked.png|center|137x97px]]
 +
 
 +
----
 +
 
 +
| [[Image:Itmagz.jpg|center]]&nbsp;[[Image:Electronicsf.jpg|center]]  
 +
| [[Image:Clubhack.gif|center]]<br>[[Image:Eventavenue Logo.jpg|center]]
 
|-
 
|-
 
|  
 
|  
| [[Image:Electronicsf.jpg|center]]
+
| &nbsp;
| [[Image:Eventavenue Logo.jpg|center]]<br>
+
| [[Image:Crowne plaza.jpg|center]]<br>
 
|-
 
|-
 
|  
 
|  
 
|  
 
|  
| [[Image:Crowne plaza.jpg|center]]
+
| &nbsp;
 
|}
 
|}
  

Revision as of 15:16, 21 September 2009

SB OWASP 2009 banner.gif
Hotel Crowne Plaza | Registrations


Welcome

Securitybyte & OWASP are proud to welcome you to the annual international information security conference – Securitybyte & OWASP AppSec Asia Conference 2009, Nov 17th through Nov 20th in Delhi & NCR, India.

This is a landmark event, as both Securitybyte and OWASP join hands to present India’s largest InfoSec event with world renowned and most regarded international speakers.

Securitybye & OWASP AppSec Asia Conference 2009 will be held at Hotel Crowne Plaza, Gurgaon, NCR, India. on 17th November through 20th November 2009.

Who Should Attend Securitybyte & OWASP AppSec Asia Conference 2009:

  • Application Developers
  • Security Researchers
  • Application Testers and Quality Assurance
  • Penetration Testers
  • Application Project Management and Staff
  • IT Security Professionals
  • Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff
  • Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance
  • Security Managers and Staff
  • Executives, Managers, and Staff Responsible for IT Security Governance
  • IT Professionals Interesting in Improving IT Security

About

About Conference

Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel conference talks to be conducted in 3 separate halls for two days i.e . 17th & 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular talk. Conference talks are being delivered by world renowned and most regarded speakers from around the world.

About Trainings

Two days post-conference are dedicated towards best-of-breed trainings being conducted in association with SANS, ISC2 and other organizations. Trainings tracks have been made available as One-Day tracks and Two-Day tracks scheduled for 19th & 20th November 2009.

Registrations

Registration is now open!

You can register here

Current pricing reflects an "Early Bird" discount of 10% off the at the door price of 8,500/- INR for two days of conference, 12,500/- for one-day training track and 25,000/- for two-days training tracks.

Two Days of Conference (17th and 18th November 2009)
7,650/- INR General Public
Two Days of Conference (17th and 18th November 2009)
5,000/- INR Students
Two-Day Training Tracks (19th and 20th November 2009)
22,500/- INR
One-Day Training Tracks (19th OR 20th November 2009)
11,250/- INR

* Service Tax @ 10.3% will be charged extra.

Click here for details on the training courses that are available.

Who Should Attend Securitybyte & OWASP AppSec Asia Conference 2009:

  • Application Developers
  • Security Researchers
  • Application Testers and Quality Assurance
  • Penetration Testers
  • Application Project Management and Staff
  • IT Security Professionals
  • Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff
  • Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance
  • Security Managers and Staff
  • Executives, Managers, and Staff Responsible for IT Security Governance
  • IT Professionals Interesting in Improving IT Security


For student discount, attendees must present proof of enrollment when picking up your badge.

Schedule

Three parallel conference talks are scheduled for 17th & 18th November 2009 in three different halls. Training tracks have been divided in one-day tracks scheduled for 19th or 20th November 2009 and two-day tracks those are schedule to continue for two days both on 19th & 20th November 2009. Follow the tabs to learn the details on both conference and trainings.

  • Click here to view the Conference Schedule for 17th & 18th November 2009.
  • Click here to view Training Schedule on 19th & 20th November 2009.

Conference

Two Days Conference

Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel conference talks to be conducted in 3 separate halls for two days i.e . 17th & 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular talk. Conference talks are being delivered by world renowned and most regarded speakers from around the world. Below is the detailed schedule for the two days of conference.

Day 1 - 17th Nov, 2009
  Where> Conference Hall - I Conference Hall - II Conference Hall - III
  Who> (Security Researchers & Enthusiasts) (Security Auditors, Developers, QA teams, Architects) (Leaders, Managers, C&S professionals)
8:00 AM - 9:00 AM Registrations
  Schedule Topic
Speaker
Topic
Speaker
Topic
Speaker
9:00 AM - 10:30 AM Keynote
10:30 AM - 11:00 PM Tea Break
11:00 AM - 12:00 PM Hacking Mobile Wallet/Mobile Banking
The Grugq, Independent Security Researcher
How To Blackbox Test Almost Anything
Aviram Jenik, Beyond Security
TBD
Howard A. Schmidt, Former Cyber Security Advisor to the White house
12:00 PM - 1:00 PM Client Side Hacks
Dino Covotsos, Telspace Systems
Source code review vs. Penetration testing
K. K. Mookhey, Founder & Principal Consultant, NII Consulting
Data Loss Protection
Enno Ray, Independent Security Researche
1:00PM - 2:00PM Lunch
2:00 PM - 3:00 PM Exploiting Firefox Extensions
Roberto Suggi Liverani, Security-Assessment.com
Microsoft SDLC
Microsoft Corp.
C&S Compliance Model
Uma Mohan, Director GDC Program India
3:00 PM - 4:00 PM SQL Server Forensics 2.0
Kevvie Fowler, TELUS & Ringzero
OWASP SAMM
Pravir Chandra, Director of Strategic Services,
Fortify
Risk & Compliance
TBD
4:00 PM - 5:00 PM Advanced Web Hacking
TBD
TBD
TBD
TBD
TBD
5:00 PM - 6:00 PM Drinks on the Exhibition floor
7:00 PM - 10:00 PM CXO Event (Exclusive by invitation only) - Information Security Concerns for Offshoring



Day 2 - 18th Nov, 2009
  Where> Conference Hall - I Conference Hall - II Conference Hall - III
  Who> (Security Researchers & Enthusiasts) (Security Auditors, Developers, QA teams, Architects) (Leaders, Managers, C&S professionals)
8:00 AM - 9:00 AM Registrations
  Schedule Topic
Speaker
Topic
Speaker
Topic
Speaker
9:00 AM - 10:00 AM Keynote Day 2
10:00 AM - 11:00 PM “Do You Want To Play A Game?”: Game Theory And Simulated Cyber War
Bryan K. Fite, HackSecKlahn
TBD
TBD
Critical Infrastructure Security “Danger Without borders”
John Bumgarner, US Cyber Consequence Unit (USCCU)
11:00 AM - 11:30 PM Tea Break
11:30 PM - 12:30 PM Hacking Oracle From Web
Sid, Independent Security Researcher
Testing JSON Applications For Security Holes
Aviram Jenik, Beyond Security
Critical Infrastructure Security “Danger Without borders”
John Bumgarner, US Cyber Consequence Unit (USCCU)
12:30 PM - 1:30 PM
Lust 2.0 – Desire for free WiFi and the threat of the Imposter
Lava Kumar Kuppan, Independent Security Researcher
TBD
TBD
Cloud Hacking – Distributed Attack & Exploit Platform
Shreeraj Shah, Blueinfy Solutions
1:30PM - 2:30PM Lunch
2:30 PM - 3:30 PM Xprobe3 - What's New? Going Application Level
Fyodor Yarochkin, Guard-info
TBD
TBD
TBD
Cedric Blancher, EADS Innovation Works
3:30 PM - 4:30 PM Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors
Nitin Kumar/Vipin Kumar, Independent Security Researchers, NVlabs
TBD
TBD
TBD
Mano Paul, Software Assurance Advisor (ISC)2
4:30 PM - 5:30 PM Anti Forensics (OSX Based Attacks)
The Grugq, Independent Security Researcher
TBD
TBD
Round Table with Speakers/Industry - Security Today/tomorrow
TBD
5:30 PM - 6:00 PM Closing Remarks by Organizing Committee



Trainings

Two Day Trainings

Two days post-conference are dedicated towards best-of-breed trainings being conducted in association with SANS, ISC2 and other organizations. Trainings tracks have been made available as One-Day tracks and Two-Day tracks scheduled for 19th & 20th November 2009.


Day 1 - 19th Nov, 2009 Day 2 - 20th Nov, 2009
Course ID Course Duration

(# of Days)

Course Title Instructor Course ID Course Duration

(# of Days)

Course Title Instructor
One Day Training Tracks
SB1DHSO 1 Day
ORACLE Hacking & Security
Sumit Sidharth,
Sb logo.png

SB1DAWH 1 Day
Advanced Web Hacking -Securing AJAX, RIA & SOA
Shreeraj Shah
Blueinfy logo.png

SB1DAFT
1 Day
Advanced Forensics Techniques
The Grugq,
Sb logo.png

SB1DIAT
1 Day
In-depth Assessment Techniques: Design, Code, and Runtime

Pravir Chandra,

Fortify.jpg

Two Day Training Tracks
SB2DBWH 2 Days
Hacking Wireless & Bluetooth 101
Dino Covotsos /
Charlton Smith,
Telspace logo.png
 
SB2DBWH 2 Days
Hacking Wireless & Bluetooth 101
Dino Covotsos /
Charlton Smith,
Telspace logo.png
 
SB2DNST 2 Days
Building advanced Network Security Tools
Daniel Mende,
Ernw logo.png
 
SB2DNST 2 Days
Building advanced Network Security Tools
Daniel Mende,
Ernw logo.png
 
SB2DCBC 2 Days
(ISC)2 CSSLP CBK Boot camp
Mano Paul,
Isc logo.png
 
SB2DCBC 2 Days
(ISC)2 CSSLP CBK Boot camp
Mano Paul,
Isc logo.png
 
SB2DSCJ / SANS Course ID : DEV530 2 Days Essential Secure Coding in Java / JEE
Sans logo.png
 
SB2DSCJ / SANS Course ID : DEV530 2 Days Essential Secure Coding in Java / JEE
Sans logo.png
 
SB2DWPT / SANS Course ID : DEV538 2 Days Web Application Pen Testing Hands-On Immersion
Sans logo.png
 
SB2DWPT / SANS Course ID : DEV538 2 Days Web Application Pen Testing Hands-On Immersion
Sans logo.png
 
SB2DSAB / SANS Course ID : AUD429 2 Days IT Security Audit Essentials Bootcamp
Sans logo.png
 
SB2DSAB / SANS Course ID : AUD429 2 Days IT Security Audit Essentials Bootcamp
Sans logo.png
 


Venue

Four Days Event is planned out at:

Hotel Crowne Plaza,
Site - 2, Sector - 29,
Gurgaon-122001 (National Capital Region), India
Hotel Front Desk: 91-124-4534000
Hotel Fax: 91-124-4304800

Sponsors

Associate Sponsors Media Partners Supporters
Torridn.jpg
Infosecurity.jpg
HITB.jpg

Associate Sponsors
HNS-web.jpg
Sector.jpg


Co-Sponsor "CxO Evening"

 
20th green stacked.png

Itmagz.jpg
 
Electronicsf.jpg
Clubhack.gif

Eventavenue Logo.jpg
 
Crowne plaza.jpg

 

Please contact Chair - OWASP India for sponsorship opportunities.



Category: OWASP India