This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "SecurityByte and OWASP Asia AppSec Conference 2009"
(→Two Day Trainings) |
|||
Line 311: | Line 311: | ||
| bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | [http://www.owasp.org/index.php/Oracle_Hacking_and_security ORACLE Hacking & Security]<br> | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | [http://www.owasp.org/index.php/Oracle_Hacking_and_security ORACLE Hacking & Security]<br> | ||
| bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | | ||
− | Sumit Sidharth,[[Image:Sb logo.png|center]]<br> | + | Sumit Sidharth,[http://www.securitybyte.org [[Image:Sb logo.png|center|95x54px]]]<br> |
| bgcolor="#7b8abd" height="40" valign="middle" width="67" | '''SB1DAWH''' | | bgcolor="#7b8abd" height="40" valign="middle" width="67" | '''SB1DAWH''' | ||
Line 317: | Line 317: | ||
| bgcolor="#a0c0e0" height="40" valign="middle" width="150" align="center" | [http://www.owasp.org/index.php/Advanced_Web_Hacking Advanced Web Hacking -Securing AJAX, RIA & SOA]<br> | | bgcolor="#a0c0e0" height="40" valign="middle" width="150" align="center" | [http://www.owasp.org/index.php/Advanced_Web_Hacking Advanced Web Hacking -Securing AJAX, RIA & SOA]<br> | ||
| bgcolor="#a0c0e0" height="40" valign="middle" width="150" align="center" | | | bgcolor="#a0c0e0" height="40" valign="middle" width="150" align="center" | | ||
− | Shreeraj Shah,[[Image:Blueinfy logo.png|center]]<br> | + | Shreeraj Shah,[http://www.blueinfy.com [[Image:Blueinfy logo.png|center]]]<br> |
|- | |- | ||
Line 324: | Line 324: | ||
| bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | [http://www.owasp.org/index.php/Advanced_Forensic_Techniques Advanced Forensics Techniques]<br> | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | [http://www.owasp.org/index.php/Advanced_Forensic_Techniques Advanced Forensics Techniques]<br> | ||
| bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | | ||
− | The Grugq,[[Image:Sb logo.png|center]]<br> | + | The Grugq,[http://www.securitybyte.org [[Image:Sb logo.png|center|101x58px]]]<br> |
| bgcolor="#7b8abd" height="40" valign="middle" width="67" | '''SB1DIAT'''<br> | | bgcolor="#7b8abd" height="40" valign="middle" width="67" | '''SB1DIAT'''<br> | ||
Line 332: | Line 332: | ||
Pravir Chandra, | Pravir Chandra, | ||
− | [[Image:Fortify.jpg|center]]<br> | + | [http://www.fortify.com [[Image:Fortify.jpg|center|102x31px]]]<br> |
|- | |- | ||
Line 341: | Line 341: | ||
| bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | [http://www.owasp.org/index.php/Hacking_bluetooth_and_wireless_101 Hacking Wireless & Bluetooth 101]<br> | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | [http://www.owasp.org/index.php/Hacking_bluetooth_and_wireless_101 Hacking Wireless & Bluetooth 101]<br> | ||
| bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | | ||
− | Dino Covotsos /<br>Charlton Smith,[[Image:Telspace logo.png|center]] | + | Dino Covotsos /<br>Charlton Smith,[http://www.telspace.co.za [[Image:Telspace logo.png|center|105x50px]]] |
| bgcolor="#7b8abd" height="40" valign="middle" width="67" | '''SB2DBWH''' | | bgcolor="#7b8abd" height="40" valign="middle" width="67" | '''SB2DBWH''' | ||
Line 347: | Line 347: | ||
| bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | [http://www.owasp.org/index.php/Hacking_bluetooth_and_wireless_101 Hacking Wireless & Bluetooth 101]<br> | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | [http://www.owasp.org/index.php/Hacking_bluetooth_and_wireless_101 Hacking Wireless & Bluetooth 101]<br> | ||
| bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | | ||
− | Dino Covotsos /<br>Charlton Smith,[[Image:Telspace logo.png|center]] | + | Dino Covotsos /<br>Charlton Smith,[http://www.telspace.co.za [[Image:Telspace logo.png|center|103x47px]]] |
|- | |- | ||
Line 354: | Line 354: | ||
| bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | [http://www.owasp.org/index.php/Building_Advanced_Network_Security_tools Building advanced Network Security Tools]<br> | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | [http://www.owasp.org/index.php/Building_Advanced_Network_Security_tools Building advanced Network Security Tools]<br> | ||
| bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | | ||
− | Daniel Mende,[[Image:Ernw logo.png|center]] | + | Daniel Mende,[http://www.ernw.de [[Image:Ernw logo.png|center]]] |
| bgcolor="#7b8abd" height="40" valign="middle" width="67" | '''SB2DNST''' | | bgcolor="#7b8abd" height="40" valign="middle" width="67" | '''SB2DNST''' | ||
Line 360: | Line 360: | ||
| bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | [http://www.owasp.org/index.php/Building_Advanced_Network_Security_tools Building advanced Network Security Tools]<br> | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | [http://www.owasp.org/index.php/Building_Advanced_Network_Security_tools Building advanced Network Security Tools]<br> | ||
| bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | | ||
− | Daniel Mende,[[Image:Ernw logo.png|center]] | + | Daniel Mende,[http://www.ernw.de [[Image:Ernw logo.png|center]]] |
|- | |- | ||
Line 367: | Line 367: | ||
| bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | [http://www.owasp.org/index.php/ISC2_CSSLP_CBK_Bootcamp (ISC)2 CSSLP CBK Boot camp]<br> | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | [http://www.owasp.org/index.php/ISC2_CSSLP_CBK_Bootcamp (ISC)2 CSSLP CBK Boot camp]<br> | ||
| bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | | ||
− | Mano Paul,[[Image:Isc logo.png|center]] | + | Mano Paul,[http://www.isc2.org [[Image:Isc logo.png|center|102x50px]]] |
| bgcolor="#7b8abd" height="40" valign="middle" width="67" | '''SB2DCBC''' | | bgcolor="#7b8abd" height="40" valign="middle" width="67" | '''SB2DCBC''' | ||
Line 373: | Line 373: | ||
| bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | [http://www.owasp.org/index.php/ISC2_CSSLP_CBK_Bootcamp (ISC)2 CSSLP CBK Boot camp]<br> | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | [http://www.owasp.org/index.php/ISC2_CSSLP_CBK_Bootcamp (ISC)2 CSSLP CBK Boot camp]<br> | ||
| bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | | ||
− | Mano Paul,[[Image:Isc logo.png|center]] | + | Mano Paul,[http://www.isc2.org [[Image:Isc logo.png|center|100x50px]]] |
|- | |- | ||
Line 379: | Line 379: | ||
| bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | 2 Days | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | 2 Days | ||
| bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | [http://www.owasp.org/index.php/SANS_Essential_Secure_Coding_Java_JEE_GSSP Essential Secure Coding in Java / JEE]<br> | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | [http://www.owasp.org/index.php/SANS_Essential_Secure_Coding_Java_JEE_GSSP Essential Secure Coding in Java / JEE]<br> | ||
− | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | [[Image:Sans logo.png|center]] | + | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | [http://www.sans.org [[Image:Sans logo.png|center|96x50px]]] |
| bgcolor="#7b8abd" height="40" valign="middle" width="67" | '''SB2DSCJ / SANS Course ID : DEV530''' | | bgcolor="#7b8abd" height="40" valign="middle" width="67" | '''SB2DSCJ / SANS Course ID : DEV530''' | ||
| bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | 2 Days | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | 2 Days | ||
| bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | [http://www.owasp.org/index.php/SANS_Essential_Secure_Coding_Java_JEE_GSSP Essential Secure Coding in Java / JEE]<br> | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | [http://www.owasp.org/index.php/SANS_Essential_Secure_Coding_Java_JEE_GSSP Essential Secure Coding in Java / JEE]<br> | ||
− | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | [[Image:Sans logo.png|center]] | + | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | [http://www.sans.org [[Image:Sans logo.png|center|94x50px]]] |
|- | |- | ||
| bgcolor="#7b8abd" height="40" valign="middle" width="67" | '''SB2DWPT / SANS Course ID : DEV538''' | | bgcolor="#7b8abd" height="40" valign="middle" width="67" | '''SB2DWPT / SANS Course ID : DEV538''' | ||
| bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | 2 Days | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | 2 Days | ||
| bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | [http://www.owasp.org/index.php/SANS_WebApp_Pentesting_handsOn_immersion Web Application Pen Testing Hands-On Immersion]<br> | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | [http://www.owasp.org/index.php/SANS_WebApp_Pentesting_handsOn_immersion Web Application Pen Testing Hands-On Immersion]<br> | ||
− | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | [[Image:Sans logo.png|center]] | + | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | [http://www.sans.org [[Image:Sans logo.png|center|97x50px]]] |
| bgcolor="#7b8abd" height="40" valign="middle" width="67" | '''SB2DWPT / SANS Course ID : DEV538''' | | bgcolor="#7b8abd" height="40" valign="middle" width="67" | '''SB2DWPT / SANS Course ID : DEV538''' | ||
| bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | 2 Days | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | 2 Days | ||
| bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | [http://www.owasp.org/index.php/SANS_WebApp_Pentesting_handsOn_immersion Web Application Pen Testing Hands-On Immersion]<br> | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | [http://www.owasp.org/index.php/SANS_WebApp_Pentesting_handsOn_immersion Web Application Pen Testing Hands-On Immersion]<br> | ||
− | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | [[Image:Sans logo.png|center]] | + | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | [http://www.sans.org [[Image:Sans logo.png|center|94x50px]]] |
|- | |- | ||
| bgcolor="#7b8abd" height="40" valign="middle" width="67" | '''SB2DSAB / SANS Course ID : AUD429''' | | bgcolor="#7b8abd" height="40" valign="middle" width="67" | '''SB2DSAB / SANS Course ID : AUD429''' | ||
| bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | 2 Days | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | 2 Days | ||
| bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | [http://www.owasp.org/index.php/SANS_IT_Security_Audit_Bootcamp IT Security Audit Essentials Bootcamp]<br> | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | [http://www.owasp.org/index.php/SANS_IT_Security_Audit_Bootcamp IT Security Audit Essentials Bootcamp]<br> | ||
− | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | [[Image:Sans logo.png|center]] | + | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | [http://www.sans.org [[Image:Sans logo.png|center|96x50px]]] |
| bgcolor="#7b8abd" height="40" valign="middle" width="67" | '''SB2DSAB / SANS Course ID : AUD429''' | | bgcolor="#7b8abd" height="40" valign="middle" width="67" | '''SB2DSAB / SANS Course ID : AUD429''' | ||
| bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | 2 Days | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | 2 Days | ||
| bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | [http://www.owasp.org/index.php/SANS_IT_Security_Audit_Bootcamp IT Security Audit Essentials Bootcamp]<br> | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | [http://www.owasp.org/index.php/SANS_IT_Security_Audit_Bootcamp IT Security Audit Essentials Bootcamp]<br> | ||
− | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | [[Image:Sans logo.png|center]] | + | | bgcolor="#c0a0a0" height="40" valign="middle" width="150" align="center" | [http://www.sans.org [[Image:Sans logo.png|center|95x50px]]] |
|} | |} | ||
Revision as of 10:57, 20 September 2009
Hotel Crowne Plaza | Registrations |
Welcome
Securitybyte & OWASP are proud to welcome you to the annual international information security conference – Securitybyte & OWASP AppSec Asia Conference 2009, Nov 17th through Nov 20th in Delhi & NCR, India.
This is a landmark event, as both Securitybyte and OWASP join hands to present India’s largest InfoSec event with world renowned and most regarded international speakers.
Securitybye & OWASP AppSec Asia Conference 2009 will be held at Hotel Crowne Plaza, Gurgaon, NCR, India. on 17th November through 20th November 2009.
Who Should Attend Securitybyte & OWASP AppSec Asia Conference 2009:
- Application Developers
- Security Researchers
- Application Testers and Quality Assurance
- Penetration Testers
- Application Project Management and Staff
- IT Security Professionals
- Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff
- Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance
- Security Managers and Staff
- Executives, Managers, and Staff Responsible for IT Security Governance
- IT Professionals Interesting in Improving IT Security
About
About Conference
Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel conference talks to be conducted in 3 separate halls for two days i.e . 17th & 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular talk. Conference talks are being delivered by world renowned and most regarded speakers from around the world.
About Trainings
Two days post-conference are dedicated towards best-of-breed trainings being conducted in association with SANS, ISC2 and other organizations. Trainings tracks have been made available as One-Day tracks and Two-Day tracks scheduled for 19th & 20th November 2009.
Registrations
Registration is now open!
You can register here
- Click Here for Online Registrations.
- Click Here for Offline Registrations.
Current pricing reflects an "Early Bird" discount of 10% off the at the door price of 8,500/- INR for two days of conference, 12,500/- for one-day training track and 25,000/- for two-days training tracks.
Two Days of Conference (17th and 18th November 2009) | |
7,650/- INR | General Public |
Two Days of Conference (17th and 18th November 2009) | |
5,000/- INR | Students |
Two-Day Training Tracks (19th and 20th November 2009) | |
22,500/- INR | |
One-Day Training Tracks (19th OR 20th November 2009) | |
11,250/- INR |
* Service Tax @ 10.3% will be charged extra.
Click here for details on the training courses that are available.
Who Should Attend Securitybyte & OWASP AppSec Asia Conference 2009:
- Application Developers
- Security Researchers
- Application Testers and Quality Assurance
- Penetration Testers
- Application Project Management and Staff
- IT Security Professionals
- Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff
- Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance
- Security Managers and Staff
- Executives, Managers, and Staff Responsible for IT Security Governance
- IT Professionals Interesting in Improving IT Security
For student discount, attendees must present proof of enrollment when picking up your badge.
Schedule
Three parallel conference talks are scheduled for 17th & 18th November 2009 in three different halls. Training tracks have been divided in one-day tracks scheduled for 19th or 20th November 2009 and two-day tracks those are schedule to continue for two days both on 19th & 20th November 2009. Follow the tabs to learn the details on both conference and trainings.
- Click here to view the Conference Schedule for 17th & 18th November 2009.
- Click here to view Training Schedule on 19th & 20th November 2009.
Conference
Two Days Conference
Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel conference talks to be conducted in 3 separate halls for two days i.e . 17th & 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular talk. Conference talks are being delivered by world renowned and most regarded speakers from around the world. Below is the detailed schedule for the two days of conference.
Day 1 - 17th Nov, 2009 | |||||||
Where> | Conference Hall - I | Conference Hall - II | Conference Hall - III | ||||
Who> | (Security Researchers & Enthusiasts) | (Security Auditors, Developers, QA teams, Architects) | (Leaders, Managers, C&S professionals) | ||||
8:00 AM - 9:00 AM | Registrations | ||||||
Schedule | Topic |
Speaker |
Topic |
Speaker |
Topic |
Speaker | |
9:00 AM - 10:30 AM | Keynote | ||||||
10:30 AM - 11:00 PM | Tea Break | ||||||
11:00 AM - 12:00 PM | Hacking Mobile Wallet/Mobile Banking |
The Grugq, Independent Security Researcher |
How To Blackbox Test Almost Anything |
Aviram Jenik, Beyond Security |
TBD |
Howard A. Schmidt, Former Cyber Security Advisor to the White house | |
12:00 PM - 1:00 PM | Client Side Hacks |
Dino Covotsos, Telspace Systems |
Source code review vs. Penetration testing |
K. K. Mookhey, Founder & Principal Consultant, NII Consulting |
Data Loss Protection |
Enno Ray, Independent Security Researche | |
1:00PM - 2:00PM | Lunch | ||||||
2:00 PM - 3:00 PM | Exploiting Firefox Extensions |
Roberto Suggi Liverani, Security-Assessment.com |
Microsoft SDLC |
Microsoft Corp. |
C&S Compliance Model |
Uma Mohan, Director GDC Program India | |
3:00 PM - 4:00 PM | SQL Server Forensics 2.0 |
Kevvie Fowler, TELUS & Ringzero |
OWASP SAMM |
Pravir Chandra, Director of Strategic Services, Fortify |
Risk & Compliance |
TBD | |
4:00 PM - 5:00 PM | Advanced Web Hacking |
TBD |
TBD |
TBD |
TBD |
TBD | |
5:00 PM - 6:00 PM | Drinks on the Exhibition floor | ||||||
7:00 PM - 10:00 PM | CXO Event (Exclusive by invitation only) - Information Security Concerns for Offshoring |
Day 2 - 18th Nov, 2009 | |||||||
Where> | Conference Hall - I | Conference Hall - II | Conference Hall - III | ||||
Who> | (Security Researchers & Enthusiasts) | (Security Auditors, Developers, QA teams, Architects) | (Leaders, Managers, C&S professionals) | ||||
8:00 AM - 9:00 AM | Registrations | ||||||
Schedule | Topic |
Speaker |
Topic |
Speaker |
Topic |
Speaker | |
9:00 AM - 10:00 AM | Keynote Day 2 | ||||||
10:00 AM - 11:00 PM | “Do You Want To Play A Game?”: Game Theory And Simulated Cyber War |
Bryan K. Fite, HackSecKlahn |
TBD |
TBD |
Critical Infrastructure Security “Danger Without borders” |
John Bumgarner, US Cyber Consequence Unit (USCCU) | |
11:00 AM - 11:30 PM | Tea Break | ||||||
11:30 PM - 12:30 PM | Hacking Oracle From Web |
Sid, Independent Security Researcher |
Testing JSON Applications For Security Holes |
Aviram Jenik, Beyond Security |
Critical Infrastructure Security “Danger Without borders” |
John Bumgarner, US Cyber Consequence Unit (USCCU) | |
12:30 PM - 1:30 PM |
Lust 2.0 – Desire for free WiFi and the threat of the Imposter |
Lava Kumar Kuppan, Independent Security Researcher |
TBD |
TBD |
Cloud Hacking – Distributed Attack & Exploit Platform |
Shreeraj Shah, Blueinfy Solutions | |
1:30PM - 2:30PM | Lunch | ||||||
2:30 PM - 3:30 PM | Xprobe3 - What's New? Going Application Level |
Fyodor Yarochkin, Guard-info |
TBD |
TBD |
TBD |
Cedric Blancher, EADS Innovation Works | |
3:30 PM - 4:30 PM | Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors |
Nitin Kumar/Vipin Kumar, Independent Security Researchers, NVlabs |
TBD |
TBD |
TBD |
Mano Paul, Software Assurance Advisor (ISC)2 | |
4:30 PM - 5:30 PM | Anti Forensics (OSX Based Attacks) |
The Grugq, Independent Security Researcher |
TBD |
TBD |
Round Table with Speakers/Industry - Security Today/tomorrow |
TBD | |
5:30 PM - 6:00 PM | Closing Remarks by Organizing Committee |
Trainings
Two Day Trainings
Two days post-conference are dedicated towards best-of-breed trainings being conducted in association with SANS, ISC2 and other organizations. Trainings tracks have been made available as One-Day tracks and Two-Day tracks scheduled for 19th & 20th November 2009.
Venue
Four Days Event is planned out at:
Hotel Crowne Plaza,
Site - 2, Sector - 29,
Gurgaon-122001 (National Capital Region), India
Hotel Front Desk: 91-124-4534000
Hotel Fax: 91-124-4304800
Sponsors
Associate Sponsors | Media Partners | Supporters |
| ||
| ||
| ||
| ||
Please contact Chair - OWASP India for sponsorship opportunities.