This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "SecurityByte and OWASP Asia AppSec Conference 2009"
| Line 1: | Line 1: | ||
| − | {| | + | {| cellspacing="0" cellpadding="0" border="0" align="center" class="FCK__ShowTableBorders" |
|- | |- | ||
| [[Image:SB OWASP 2009 banner.gif|center]] | | [[Image:SB OWASP 2009 banner.gif|center]] | ||
| Line 6: | Line 6: | ||
|} | |} | ||
| − | <br> | + | <br> |
==== Welcome ==== | ==== Welcome ==== | ||
| Line 54: | Line 54: | ||
|- | |- | ||
| Two Days of Conference (17th and 18th November 2009) | | Two Days of Conference (17th and 18th November 2009) | ||
| − | | <br> | + | | <br> |
| 7,650/- INR | | 7,650/- INR | ||
| General Public | | General Public | ||
|- | |- | ||
| Two Days of Conference (17th and 18th November 2009) | | Two Days of Conference (17th and 18th November 2009) | ||
| − | | <br> | + | | <br> |
| 5,000/- INR | | 5,000/- INR | ||
| Students | | Students | ||
|- | |- | ||
| Two-Day Training Tracks (19th and 20th November 2009) | | Two-Day Training Tracks (19th and 20th November 2009) | ||
| − | | <br> | + | | <br> |
| 22,500/- INR | | 22,500/- INR | ||
|- | |- | ||
| One-Day Training Tracks (19th OR 20th November 2009) | | One-Day Training Tracks (19th OR 20th November 2009) | ||
| − | | <br> | + | | <br> |
| 11,250/- INR | | 11,250/- INR | ||
|} | |} | ||
| Line 104: | Line 104: | ||
== Two Days Conference == | == Two Days Conference == | ||
| − | Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel conference talks to be conducted in 3 separate halls for two days i.e . 17th & 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular talk. Conference talks are being delivered by world renowned and most regarded speakers from around the world. Below is the detailed schedule for the two days of conference.<br> | + | Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel conference talks to be conducted in 3 separate halls for two days i.e . 17th & 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular talk. Conference talks are being delivered by world renowned and most regarded speakers from around the world. Below is the detailed schedule for the two days of conference.<br> |
| − | {| | + | {| width="967" cellspacing="1" cellpadding="1" border="1" align="center" |
|- valign="middle" | |- valign="middle" | ||
| − | | style="background: rgb(64,88,160); color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous | + | | height="60" align="center" colspan="7" style="background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;" | <font size="5">'''Day 1 - 17th Nov, 2009'''</font> |
|- | |- | ||
| − | | | + | | width="67" valign="middle" height="40" bgcolor="#7b8abd" | ''' Where>''' |
| − | | | + | | width="300" valign="middle" height="40" bgcolor="#c0a0a0" align="center" colspan="2" | '''Conference Hall - I''' |
| − | | | + | | width="300" valign="middle" height="40" bgcolor="#a0c0e0" align="center" colspan="2" | '''Conference Hall - II''' |
| − | | | + | | width="300" valign="middle" height="40" bgcolor="#b3ff99" align="center" colspan="2" | '''Conference Hall - III''' |
|- | |- | ||
| − | | | + | | width="67" valign="middle" height="40" bgcolor="#7b8abd" | ''' Who>''' |
| − | | | + | | width="300" valign="middle" height="40" bgcolor="#c0a0a0" align="center" colspan="2" | '''(Security Researchers & Enthusiasts)''' |
| − | | | + | | width="300" valign="middle" height="40" bgcolor="#a0c0e0" align="center" colspan="2" | '''(Security Auditors, Developers, QA teams, Architects)''' |
| − | | | + | | width="300" valign="middle" height="40" bgcolor="#b3ff99" align="center" colspan="2" | '''(Leaders, Managers, C&S professionals)''' |
|- | |- | ||
| − | | | + | | width="67" valign="middle" height="40" bgcolor="#7b8abd" | 8:00 AM - 9:00 AM |
| − | | bgcolor="#909090" | + | | valign="middle" bgcolor="#909090" align="center" colspan="7" | '''Registrations''' |
|- | |- | ||
| − | | | + | | width="67" valign="middle" height="40" bgcolor="#7b8abd" | ''' Schedule''' |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | '''Topic<br>''' |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | '''Speaker<br>''' |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | '''Topic<br>''' |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | '''Speaker<br>''' |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | '''Topic<br>''' |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | '''Speaker<br>''' |
|- | |- | ||
| − | | | + | | width="67" valign="middle" height="40" bgcolor="#7b8abd" | 9:00 AM - 10:30 AM |
| − | | bgcolor="#909090" | + | | valign="middle" bgcolor="#909090" align="center" colspan="7" | '''Keynote''' |
|- | |- | ||
| − | | | + | | width="67" valign="middle" height="40" bgcolor="#7b8abd" | 10:30 AM - 11:00 PM |
| − | | bgcolor="#909090" | + | | valign="middle" bgcolor="#909090" align="center" colspan="7" | '''Tea Break''' |
|- | |- | ||
| − | | | + | | width="67" valign="middle" height="40" bgcolor="#7b8abd" | 11:00 AM - 12:00 PM |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | Hacking Mobile Wallet/Mobile Banking<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | The Grugq, Independent Security Researcher<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | How To Blackbox Test Almost Anything<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | Aviram Jenik, Beyond Security<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | TBD<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | Howard A. Schmidt, Former Cyber Security Advisor to the White house<br> |
|- | |- | ||
| − | | | + | | width="67" valign="middle" height="40" bgcolor="#7b8abd" | 12:00 PM - 1:00 PM |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | Client Side Hacks<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | Dino Covotsos, Telspace Systems<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | Source code review vs. Penetration testing<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | K. K. Mookhey, Founder & Principal Consultant, NII Consulting<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | Data Loss Protection<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | Enno Ray, Independent Security Researche<br> |
|- | |- | ||
| − | | | + | | width="67" valign="middle" height="40" bgcolor="#7b8abd" | 1:00PM - 2:00PM |
| − | | bgcolor="#909090" | + | | valign="middle" bgcolor="#909090" align="center" colspan="7" | '''Lunch''' |
|- | |- | ||
| − | | | + | | width="67" valign="middle" height="40" bgcolor="#7b8abd" | 2:00 PM - 3:00 PM |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | Exploiting Firefox Extensions<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | Roberto Suggi Liverani, Security-Assessment.com<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | Microsoft SDLC<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | Microsoft Corp.<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | C&S Compliance Model<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | Uma Mohan, Director GDC Program India<br> |
|- | |- | ||
| − | | | + | | width="67" valign="middle" height="40" bgcolor="#7b8abd" | 3:00 PM - 4:00 PM |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | SQL Server Forensics 2.0<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | Kevvie Fowler, TELUS & Ringzero<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | OWASP SAMM<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | Pravir Chandra, Director of Strategic Services,<br>Fortify<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | Risk & Compliance<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | TBD<br> |
|- | |- | ||
| − | | | + | | width="67" valign="middle" height="40" bgcolor="#7b8abd" | 4:00 PM - 5:00 PM |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | Advanced Web Hacking<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | TBD<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | TBD<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | TBD<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | TBD<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | TBD<br> |
|- | |- | ||
| − | | | + | | width="67" valign="middle" height="40" bgcolor="#7b8abd" | 5:00 PM - 6:00 PM |
| − | | bgcolor="#909090" | + | | valign="middle" bgcolor="#909090" align="center" colspan="7" | '''Drinks on the Exhibition floor''' |
|- | |- | ||
| − | | | + | | width="67" valign="middle" height="40" bgcolor="#7b8abd" | 7:00 PM - 10:00 PM |
| − | | bgcolor="#909090" | + | | valign="middle" bgcolor="#909090" align="center" colspan="7" | '''CXO Event (Exclusive by invitation only) - Information Security Concerns for Offshoring''' |
|} | |} | ||
| − | <br><br> | + | <br><br> |
| − | {| | + | {| width="967" cellspacing="1" cellpadding="1" border="1" align="center" |
|- valign="middle" | |- valign="middle" | ||
| − | | style="background: rgb(64,88,160); color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous | + | | height="60" align="center" colspan="7" style="background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;" | <font size="5">'''Day 2 - 18th Nov, 2009'''</font> |
|- | |- | ||
| − | | | + | | width="67" valign="middle" height="40" bgcolor="#7b8abd" | ''' Where>''' |
| − | | | + | | width="300" valign="middle" height="40" bgcolor="#c0a0a0" align="center" colspan="2" | '''Conference Hall - I''' |
| − | | | + | | width="300" valign="middle" height="40" bgcolor="#a0c0e0" align="center" colspan="2" | '''Conference Hall - II''' |
| − | | | + | | width="300" valign="middle" height="40" bgcolor="#b3ff99" align="center" colspan="2" | '''Conference Hall - III''' |
|- | |- | ||
| − | | | + | | width="67" valign="middle" height="40" bgcolor="#7b8abd" | ''' Who>''' |
| − | | | + | | width="300" valign="middle" height="40" bgcolor="#c0a0a0" align="center" colspan="2" | '''(Security Researchers & Enthusiasts)''' |
| − | | | + | | width="300" valign="middle" height="40" bgcolor="#a0c0e0" align="center" colspan="2" | '''(Security Auditors, Developers, QA teams, Architects)''' |
| − | | | + | | width="300" valign="middle" height="40" bgcolor="#b3ff99" align="center" colspan="2" | '''(Leaders, Managers, C&S professionals)''' |
|- | |- | ||
| − | | | + | | width="67" valign="middle" height="40" bgcolor="#7b8abd" | 8:00 AM - 9:00 AM |
| − | | bgcolor="#909090" | + | | valign="middle" bgcolor="#909090" align="center" colspan="7" | '''Registrations''' |
|- | |- | ||
| − | | | + | | width="67" valign="middle" height="40" bgcolor="#7b8abd" | ''' Schedule''' |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | '''Topic<br>''' |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | '''Speaker<br>''' |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | '''Topic<br>''' |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | '''Speaker<br>''' |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | '''Topic<br>''' |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | '''Speaker<br>''' |
|- | |- | ||
| − | | | + | | width="67" valign="middle" height="40" bgcolor="#7b8abd" | 9:00 AM - 10:00 AM |
| − | | bgcolor="#909090" | + | | valign="middle" bgcolor="#909090" align="center" colspan="7" | '''Keynote Day 2''' |
|- | |- | ||
| − | | | + | | width="67" valign="middle" height="40" bgcolor="#7b8abd" | 10:00 AM - 11:00 PM |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | “Do You Want To Play A Game?”: Game Theory And Simulated Cyber War<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | Bryan K. Fite, HackSecKlahn<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | TBD<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | TBD<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | Critical Infrastructure Security “Danger Without borders” <br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | John Bumgarner, US Cyber Consequence Unit (USCCU)<br> |
|- | |- | ||
| − | | | + | | width="67" valign="middle" height="40" bgcolor="#7b8abd" | 11:00 AM - 11:30 PM |
| − | | bgcolor="#909090" | + | | valign="middle" bgcolor="#909090" align="center" colspan="7" | '''Tea Break''' |
|- | |- | ||
| − | | | + | | width="67" valign="middle" height="40" bgcolor="#7b8abd" | 11:30 PM - 12:30 PM |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | Hacking Oracle From Web<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | Sid, Independent Security Researcher<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | Testing JSON Applications For Security Holes<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | Aviram Jenik, Beyond Security<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | Critical Infrastructure Security “Danger Without borders” <br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | John Bumgarner, US Cyber Consequence Unit (USCCU)<br> |
|- | |- | ||
| − | | | + | | width="67" valign="middle" height="40" bgcolor="#7b8abd" | 12:30 PM - 1:30 PM<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | Lust 2.0 – Desire for free WiFi and the threat of the Imposter <br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | Lava Kumar Kuppan, Independent Security Researcher<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | TBD<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | TBD<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | Cloud Hacking – Distributed Attack & Exploit Platform<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | Shreeraj Shah, Blueinfy Solutions<br> |
|- | |- | ||
| − | | | + | | width="67" valign="middle" height="40" bgcolor="#7b8abd" | 1:30PM - 2:30PM |
| − | | bgcolor="#909090" | + | | valign="middle" bgcolor="#909090" align="center" colspan="7" | '''Lunch''' |
|- | |- | ||
| − | | | + | | width="67" valign="middle" height="40" bgcolor="#7b8abd" | 2:30 PM - 3:30 PM |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | Xprobe3 - What's New? Going Application Level<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | Fyodor Yarochkin, Guard-info<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | TBD<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | TBD<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | TBD<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | Cedric Blancher, EADS Innovation Works<br> |
|- | |- | ||
| − | | | + | | width="67" valign="middle" height="40" bgcolor="#7b8abd" | 3:30 PM - 4:30 PM |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | Nitin Kumar/Vipin Kumar, Independent Security Researchers, NVlabs<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | TBD<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | TBD<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | TBD<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | Mano Paul, Software Assurance Advisor (ISC)2<br> |
|- | |- | ||
| − | | | + | | width="67" valign="middle" height="40" bgcolor="#7b8abd" | 4:30 PM - 5:30 PM |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | Anti Forensics (OSX Based Attacks)<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | The Grugq, Independent Security Researcher<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | TBD<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | TBD<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | Round Table with Speakers/Industry - Security Today/tomorrow<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | TBD<br> |
|- | |- | ||
| − | | | + | | width="67" valign="middle" height="40" bgcolor="#7b8abd" | 5:30 PM - 6:00 PM |
| − | | bgcolor="#909090" | + | | valign="middle" bgcolor="#909090" align="center" colspan="7" | '''Closing Remarks by Organizing Committee''' |
|} | |} | ||
| − | <br> | + | <br> |
| − | <br> | + | <br> |
==== Trainings ==== | ==== Trainings ==== | ||
| Line 285: | Line 285: | ||
Two days post-conference are dedicated towards best-of-breed trainings being conducted in association with SANS, ISC2 and other organizations. Trainings tracks have been made available as One-Day tracks and Two-Day tracks scheduled for 19th & 20th November 2009. | Two days post-conference are dedicated towards best-of-breed trainings being conducted in association with SANS, ISC2 and other organizations. Trainings tracks have been made available as One-Day tracks and Two-Day tracks scheduled for 19th & 20th November 2009. | ||
| − | <br> | + | <br> |
| − | {| | + | {| width="967" cellspacing="1" cellpadding="1" border="1" align="center" |
|- valign="middle" | |- valign="middle" | ||
| − | | style="background: rgb(64,88,160); color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous | + | | height="60" align="center" colspan="4" style="background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;" | <font size="5">'''Day 1 - 19th Nov, 2009'''</font> |
| − | | style="background: rgb(64,88,160); color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous | + | | height="60" align="center" colspan="4" style="background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;" | <font size="5">'''Day 2 - 20th Nov, 2009'''</font> |
|- | |- | ||
| − | | | + | | width="67" valign="middle" height="40" bgcolor="#909090" | '''Course ID''' |
| − | | | + | | width="67" valign="middle" height="40" bgcolor="#909090" | '''Course Duration''' |
| − | (# of Days) | + | (# of Days) |
| − | | | + | | width="67" valign="middle" height="40" bgcolor="#909090" | '''Course Title''' |
| − | | | + | | width="67" valign="middle" height="40" bgcolor="#909090" | '''Instructor''' |
| − | | | + | | width="67" valign="middle" height="40" bgcolor="#909080" | '''Course ID''' |
| − | | | + | | width="67" valign="middle" height="40" bgcolor="#909080" | '''Course Duration''' |
| − | (# of Days) | + | (# of Days) |
| − | | | + | | width="67" valign="middle" height="40" bgcolor="#909080" | '''Course Title''' |
| − | | | + | | width="67" valign="middle" height="40" bgcolor="#909080" | '''Instructor''' |
|- | |- | ||
| − | | style="background: rgb(64,88,160); color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous | + | | height="30" align="center" colspan="8" style="background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;" | <font size="2">'''One Day Training Tracks'''</font> |
|- | |- | ||
| − | | | + | | width="67" valign="middle" height="40" bgcolor="#7b8abd" | '''SB1DHSO''' |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | 1 Day<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | [http://www.owasp.org/index.php/Oracle_Hacking_and_security ORACLE Hacking & Security]<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | |
| − | Sumit Sidharth,[[Image:Sb logo.png|center|78x50px]]<br> | + | Sumit Sidharth,[[Image:Sb logo.png|center|78x50px]]<br> |
| − | | | + | | width="67" valign="middle" height="40" bgcolor="#7b8abd" | '''SB1DAWH''' |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | 1 Day<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | [http://www.owasp.org/index.php/Advanced_Web_Hacking Advanced Web Hacking -Securing AJAX, RIA & SOA]<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | |
| − | Shreeraj Shah [[Image:Blueinfy logo.png|center]]<br> | + | Shreeraj Shah [[Image:Blueinfy logo.png|center]]<br> |
|- | |- | ||
| − | | | + | | width="67" valign="middle" height="40" bgcolor="#7b8abd" | '''SB1DAFT'''<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | 1 Day<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | [http://www.owasp.org/index.php/Advanced_Forensic_Techniques Advanced Forensics Techniques]<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | |
| − | The Grugq,[[Image:Sb logo.png|center|78x50px]]<br> | + | The Grugq,[[Image:Sb logo.png|center|78x50px]]<br> |
| − | | | + | | width="67" valign="middle" height="40" bgcolor="#7b8abd" | '''SB1DIAT'''<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | 1 Day<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | [http://www.owasp.org/index.php/InDepth_Assessment_Techniques In-depth Assessment Techniques: Design, Code, and Runtime]<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | |
Pravir Chandra, | Pravir Chandra, | ||
| − | [[Image:Fortify.jpg|center|93x31px]]<br> | + | [[Image:Fortify.jpg|center|93x31px]]<br> |
|- | |- | ||
| − | | style="background: rgb(64,88,160); color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous | + | | height="30" align="center" colspan="8" style="background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;" | <font size="2">'''Two Day Training Tracks'''</font> |
|- | |- | ||
| − | | | + | | width="67" valign="middle" height="40" bgcolor="#7b8abd" | '''SB2DBWH''' |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | 2 Days<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | [http://www.owasp.org/index.php/Hacking_bluetooth_and_wireless_101 Hacking Wireless & Bluetooth 101]<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | |
| − | Dino Covotsos /<br>Charlton Smith,[[Image:Telspace logo.png|center|76x50px]] | + | Dino Covotsos /<br>Charlton Smith,[[Image:Telspace logo.png|center|76x50px]] |
| − | | | + | | width="67" valign="middle" height="40" bgcolor="#7b8abd" | '''SB2DBWH''' |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | 2 Days<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | [http://www.owasp.org/index.php/Hacking_bluetooth_and_wireless_101 Hacking Wireless & Bluetooth 101]<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | |
| − | Dino Covotsos /<br>Charlton Smith,[[Image:Telspace logo.png|center|72x47px]] | + | Dino Covotsos /<br>Charlton Smith,[[Image:Telspace logo.png|center|72x47px]] |
|- | |- | ||
| − | | | + | | width="67" valign="middle" height="40" bgcolor="#7b8abd" | '''SB2DNST''' |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | 2 Days<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | [http://www.owasp.org/index.php/Building_Advanced_Network_Security_tools Building advanced Network Security Tools]<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | |
| − | Daniel Mende,[[Image:Ernw logo.png|center]] | + | Daniel Mende,[[Image:Ernw logo.png|center]] |
| − | | | + | | width="67" valign="middle" height="40" bgcolor="#7b8abd" | '''SB2DNST''' |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | 2 Days<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | [http://www.owasp.org/index.php/Building_Advanced_Network_Security_tools Building advanced Network Security Tools]<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | |
| − | Daniel Mende,[[Image:Ernw logo.png|center]] | + | Daniel Mende,[[Image:Ernw logo.png|center]] |
|- | |- | ||
| − | | | + | | width="67" valign="middle" height="40" bgcolor="#7b8abd" | '''SB2DCBC''' |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | 2 Days<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | [http://www.owasp.org/index.php/ISC2_CSSLP_CBK_Bootcamp (ISC)2 CSSLP CBK Boot camp]<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | |
| − | Mano Paul,[[Image:Isc logo.png|center|78x50px]] | + | Mano Paul,[[Image:Isc logo.png|center|78x50px]] |
| − | | | + | | width="67" valign="middle" height="40" bgcolor="#7b8abd" | '''SB2DCBC''' |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | 2 Days<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | [http://www.owasp.org/index.php/ISC2_CSSLP_CBK_Bootcamp (ISC)2 CSSLP CBK Boot camp]<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | |
| − | Mano Paul,[[Image:Isc logo.png|center|78x50px]] | + | Mano Paul,[[Image:Isc logo.png|center|78x50px]] |
|- | |- | ||
| − | | | + | | width="67" valign="middle" height="40" bgcolor="#7b8abd" | '''SB2DSCJ / SANS Course ID : DEV530''' |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | 2 Days |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | [http://www.owasp.org/index.php/SANS_Essential_Secure_Coding_Java_JEE_GSSP Essential Secure Coding in Java / JEE]<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | [[Image:Sans logo.png|center|78x50px]] |
| − | | | + | | width="67" valign="middle" height="40" bgcolor="#7b8abd" | '''SB2DSCJ / SANS Course ID : DEV530''' |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | 2 Days |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | [http://www.owasp.org/index.php/SANS_Essential_Secure_Coding_Java_JEE_GSSP Essential Secure Coding in Java / JEE]<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | [[Image:Sans logo.png|center|78x50px]] |
|- | |- | ||
| − | | | + | | width="67" valign="middle" height="40" bgcolor="#7b8abd" | '''SB2DWPT / SANS Course ID : DEV538''' |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | 2 Days |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | [http://www.owasp.org/index.php/SANS_WebApp_Pentesting_handsOn_immersion Web Application Pen Testing Hands-On Immersion]<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | [[Image:Sans logo.png|center|78x50px]] |
| − | | | + | | width="67" valign="middle" height="40" bgcolor="#7b8abd" | '''SB2DWPT / SANS Course ID : DEV538''' |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | 2 Days |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | [http://www.owasp.org/index.php/SANS_WebApp_Pentesting_handsOn_immersion Web Application Pen Testing Hands-On Immersion]<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | [[Image:Sans logo.png|center|78x50px]] |
|- | |- | ||
| − | | | + | | width="67" valign="middle" height="40" bgcolor="#7b8abd" | '''SB2DSAB / SANS Course ID : AUD429''' |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | 2 Days |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | [http://www.owasp.org/index.php/SANS_IT_Security_Audit_Bootcamp IT Security Audit Essentials Bootcamp]<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | [[Image:Sans logo.png|center|78x50px]] |
| − | | | + | | width="67" valign="middle" height="40" bgcolor="#7b8abd" | '''SB2DSAB / SANS Course ID : AUD429''' |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | 2 Days |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | [http://www.owasp.org/index.php/SANS_IT_Security_Audit_Bootcamp IT Security Audit Essentials Bootcamp]<br> |
| − | | | + | | width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | [[Image:Sans logo.png|center|78x50px]] |
|} | |} | ||
| − | <br> | + | <br> |
==== Venue ==== | ==== Venue ==== | ||
| Line 410: | Line 410: | ||
Four Days Event is planned out at: | Four Days Event is planned out at: | ||
| − | [http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza,]<br>Site - 2, Sector - 29, <br>Gurgaon-122001 (National Capital Region), India<br>Hotel Front Desk: 91-124-4534000<br>Hotel Fax: 91-124-4304800<br> | + | [http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg/transportation?start=1 Hotel Crowne Plaza,]<br>Site - 2, Sector - 29, <br>Gurgaon-122001 (National Capital Region), India<br>Hotel Front Desk: 91-124-4534000<br>Hotel Fax: 91-124-4304800<br> |
==== Sponsors ==== | ==== Sponsors ==== | ||
| − | {| | + | {| width="0" cellspacing="1" cellpadding="1" border="0" align="center" |
| + | |- | ||
| + | | valign="middle" align="center" | '''Co-Sponsor "CXO Evening"'''<br> | ||
| + | | valign="middle" align="center" | '''Capture The Flag (CTF) Sponsor'''<br> | ||
| + | |- | ||
| + | | [[Image:20th_green_stacked.png]]<br> | ||
| + | | <br> | ||
| + | |} | ||
| + | |||
| + | <br> | ||
| + | |||
| + | {| width="967" cellspacing="1" cellpadding="1" border="0" align="center" class="FCK__ShowTableBorders" | ||
|- valign="middle" | |- valign="middle" | ||
| height="60" align="center" | <font size="2">'''Associate Sponsors'''</font> | | height="60" align="center" | <font size="2">'''Associate Sponsors'''</font> | ||
| Line 429: | Line 440: | ||
|- | |- | ||
! valign="baseline" align="center" | | ! valign="baseline" align="center" | | ||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| [[Image:Itmagz.jpg|center]] [[Image:Electronicsf.jpg|center]] | | [[Image:Itmagz.jpg|center]] [[Image:Electronicsf.jpg|center]] | ||
| [[Image:Clubhack.gif|center]]<br>[[Image:Eventavenue Logo.jpg|center]] | | [[Image:Clubhack.gif|center]]<br>[[Image:Eventavenue Logo.jpg|center]] | ||
|- | |- | ||
| − | | | + | | <br> |
| | | | ||
| [[Image:Crowne plaza.jpg|center]]<br> | | [[Image:Crowne plaza.jpg|center]]<br> | ||
|- | |- | ||
| − | | | + | | <br> |
| − | | | + | | <br> |
| | | | ||
|} | |} | ||
| Line 451: | Line 454: | ||
Please contact [http://www.owasp.org/index.php/Category:India#OWASP_India_Co-Chairs Chair - OWASP India] for sponsorship opportunities. | Please contact [http://www.owasp.org/index.php/Category:India#OWASP_India_Co-Chairs Chair - OWASP India] for sponsorship opportunities. | ||
| − | <br> | + | <br> |
| − | __NOTOC__ <headertabs /> | + | __NOTOC__ <headertabs /> |
| − | <br> | + | <br> |
[http://www.owasp.org/index.php/Category:India Category: OWASP India] | [http://www.owasp.org/index.php/Category:India Category: OWASP India] | ||
Revision as of 09:24, 30 September 2009
| Hotel Crowne Plaza | Registrations |
Welcome
Securitybyte & OWASP are proud to welcome you to the annual international information security conference – Securitybyte & OWASP AppSec Asia Conference 2009, Nov 17th through Nov 20th in Delhi & NCR, India.
This is a landmark event, as both Securitybyte and OWASP join hands to present India’s largest InfoSec event with world renowned and most regarded international speakers.
Securitybye & OWASP AppSec Asia Conference 2009 will be held at Hotel Crowne Plaza, Gurgaon, NCR, India. on 17th November through 20th November 2009.
Who Should Attend Securitybyte & OWASP AppSec Asia Conference 2009:
- Application Developers
- Security Researchers
- Application Testers and Quality Assurance
- Penetration Testers
- Application Project Management and Staff
- IT Security Professionals
- Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff
- Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance
- Security Managers and Staff
- Executives, Managers, and Staff Responsible for IT Security Governance
- IT Professionals Interesting in Improving IT Security
About
About Conference
Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel conference talks to be conducted in 3 separate halls for two days i.e . 17th & 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular talk. Conference talks are being delivered by world renowned and most regarded speakers from around the world.
About Trainings
Two days post-conference are dedicated towards best-of-breed trainings being conducted in association with SANS, ISC2 and other organizations. Trainings tracks have been made available as One-Day tracks and Two-Day tracks scheduled for 19th & 20th November 2009.
Registrations
Registration is now open!
You can register here
- Click Here for Online Registrations.
- Click Here for Offline Registrations.
Current pricing reflects an "Early Bird" discount of 10% off the at the door price of 8,500/- INR for two days of conference, 12,500/- for one-day training track and 25,000/- for two-days training tracks.
| Two Days of Conference (17th and 18th November 2009) | |
7,650/- INR | General Public |
| Two Days of Conference (17th and 18th November 2009) | |
5,000/- INR | Students |
| Two-Day Training Tracks (19th and 20th November 2009) | |
22,500/- INR | |
| One-Day Training Tracks (19th OR 20th November 2009) | |
11,250/- INR |
* Service Tax @ 10.3% will be charged extra.
Click here for details on the training courses that are available.
Who Should Attend Securitybyte & OWASP AppSec Asia Conference 2009:
- Application Developers
- Security Researchers
- Application Testers and Quality Assurance
- Penetration Testers
- Application Project Management and Staff
- IT Security Professionals
- Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff
- Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance
- Security Managers and Staff
- Executives, Managers, and Staff Responsible for IT Security Governance
- IT Professionals Interesting in Improving IT Security
For student discount, attendees must present proof of enrollment when picking up your badge.
Schedule
Three parallel conference talks are scheduled for 17th & 18th November 2009 in three different halls. Training tracks have been divided in one-day tracks scheduled for 19th or 20th November 2009 and two-day tracks those are schedule to continue for two days both on 19th & 20th November 2009. Follow the tabs to learn the details on both conference and trainings.
- Click here to view the Conference Schedule for 17th & 18th November 2009.
- Click here to view Training Schedule on 19th & 20th November 2009.
Conference
Two Days Conference
Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel conference talks to be conducted in 3 separate halls for two days i.e . 17th & 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular talk. Conference talks are being delivered by world renowned and most regarded speakers from around the world. Below is the detailed schedule for the two days of conference.
| Day 1 - 17th Nov, 2009 | |||||||
| Where> | Conference Hall - I | Conference Hall - II | Conference Hall - III | ||||
| Who> | (Security Researchers & Enthusiasts) | (Security Auditors, Developers, QA teams, Architects) | (Leaders, Managers, C&S professionals) | ||||
| 8:00 AM - 9:00 AM | Registrations | ||||||
| Schedule | Topic |
Speaker |
Topic |
Speaker |
Topic |
Speaker | |
| 9:00 AM - 10:30 AM | Keynote | ||||||
| 10:30 AM - 11:00 PM | Tea Break | ||||||
| 11:00 AM - 12:00 PM | Hacking Mobile Wallet/Mobile Banking |
The Grugq, Independent Security Researcher |
How To Blackbox Test Almost Anything |
Aviram Jenik, Beyond Security |
TBD |
Howard A. Schmidt, Former Cyber Security Advisor to the White house | |
| 12:00 PM - 1:00 PM | Client Side Hacks |
Dino Covotsos, Telspace Systems |
Source code review vs. Penetration testing |
K. K. Mookhey, Founder & Principal Consultant, NII Consulting |
Data Loss Protection |
Enno Ray, Independent Security Researche | |
| 1:00PM - 2:00PM | Lunch | ||||||
| 2:00 PM - 3:00 PM | Exploiting Firefox Extensions |
Roberto Suggi Liverani, Security-Assessment.com |
Microsoft SDLC |
Microsoft Corp. |
C&S Compliance Model |
Uma Mohan, Director GDC Program India | |
| 3:00 PM - 4:00 PM | SQL Server Forensics 2.0 |
Kevvie Fowler, TELUS & Ringzero |
OWASP SAMM |
Pravir Chandra, Director of Strategic Services, Fortify |
Risk & Compliance |
TBD | |
| 4:00 PM - 5:00 PM | Advanced Web Hacking |
TBD |
TBD |
TBD |
TBD |
TBD | |
| 5:00 PM - 6:00 PM | Drinks on the Exhibition floor | ||||||
| 7:00 PM - 10:00 PM | CXO Event (Exclusive by invitation only) - Information Security Concerns for Offshoring | ||||||
| Day 2 - 18th Nov, 2009 | |||||||
| Where> | Conference Hall - I | Conference Hall - II | Conference Hall - III | ||||
| Who> | (Security Researchers & Enthusiasts) | (Security Auditors, Developers, QA teams, Architects) | (Leaders, Managers, C&S professionals) | ||||
| 8:00 AM - 9:00 AM | Registrations | ||||||
| Schedule | Topic |
Speaker |
Topic |
Speaker |
Topic |
Speaker | |
| 9:00 AM - 10:00 AM | Keynote Day 2 | ||||||
| 10:00 AM - 11:00 PM | “Do You Want To Play A Game?”: Game Theory And Simulated Cyber War |
Bryan K. Fite, HackSecKlahn |
TBD |
TBD |
Critical Infrastructure Security “Danger Without borders” |
John Bumgarner, US Cyber Consequence Unit (USCCU) | |
| 11:00 AM - 11:30 PM | Tea Break | ||||||
| 11:30 PM - 12:30 PM | Hacking Oracle From Web |
Sid, Independent Security Researcher |
Testing JSON Applications For Security Holes |
Aviram Jenik, Beyond Security |
Critical Infrastructure Security “Danger Without borders” |
John Bumgarner, US Cyber Consequence Unit (USCCU) | |
| 12:30 PM - 1:30 PM |
Lust 2.0 – Desire for free WiFi and the threat of the Imposter |
Lava Kumar Kuppan, Independent Security Researcher |
TBD |
TBD |
Cloud Hacking – Distributed Attack & Exploit Platform |
Shreeraj Shah, Blueinfy Solutions | |
| 1:30PM - 2:30PM | Lunch | ||||||
| 2:30 PM - 3:30 PM | Xprobe3 - What's New? Going Application Level |
Fyodor Yarochkin, Guard-info |
TBD |
TBD |
TBD |
Cedric Blancher, EADS Innovation Works | |
| 3:30 PM - 4:30 PM | Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors |
Nitin Kumar/Vipin Kumar, Independent Security Researchers, NVlabs |
TBD |
TBD |
TBD |
Mano Paul, Software Assurance Advisor (ISC)2 | |
| 4:30 PM - 5:30 PM | Anti Forensics (OSX Based Attacks) |
The Grugq, Independent Security Researcher |
TBD |
TBD |
Round Table with Speakers/Industry - Security Today/tomorrow |
TBD | |
| 5:30 PM - 6:00 PM | Closing Remarks by Organizing Committee | ||||||
Trainings
Two Day Trainings
Two days post-conference are dedicated towards best-of-breed trainings being conducted in association with SANS, ISC2 and other organizations. Trainings tracks have been made available as One-Day tracks and Two-Day tracks scheduled for 19th & 20th November 2009.
| Day 1 - 19th Nov, 2009 | Day 2 - 20th Nov, 2009 | ||||||
| Course ID | Course Duration
(# of Days) |
Course Title | Instructor | Course ID | Course Duration
(# of Days) |
Course Title | Instructor |
| One Day Training Tracks | |||||||
| SB1DHSO | 1 Day |
ORACLE Hacking & Security |
Sumit Sidharth, |
SB1DAWH | 1 Day |
Advanced Web Hacking -Securing AJAX, RIA & SOA |
Shreeraj Shah |
| SB1DAFT |
1 Day |
Advanced Forensics Techniques |
The Grugq, |
SB1DIAT |
1 Day |
In-depth Assessment Techniques: Design, Code, and Runtime |
Pravir Chandra, |
| Two Day Training Tracks | |||||||
| SB2DBWH | 2 Days |
Hacking Wireless & Bluetooth 101 |
Dino Covotsos / Charlton Smith, |
SB2DBWH | 2 Days |
Hacking Wireless & Bluetooth 101 |
Dino Covotsos / Charlton Smith, |
| SB2DNST | 2 Days |
Building advanced Network Security Tools |
Daniel Mende, | SB2DNST | 2 Days |
Building advanced Network Security Tools |
Daniel Mende, |
| SB2DCBC | 2 Days |
(ISC)2 CSSLP CBK Boot camp |
Mano Paul, | SB2DCBC | 2 Days |
(ISC)2 CSSLP CBK Boot camp |
Mano Paul, |
| SB2DSCJ / SANS Course ID : DEV530 | 2 Days | Essential Secure Coding in Java / JEE |
SB2DSCJ / SANS Course ID : DEV530 | 2 Days | Essential Secure Coding in Java / JEE |
||
| SB2DWPT / SANS Course ID : DEV538 | 2 Days | Web Application Pen Testing Hands-On Immersion |
SB2DWPT / SANS Course ID : DEV538 | 2 Days | Web Application Pen Testing Hands-On Immersion |
||
| SB2DSAB / SANS Course ID : AUD429 | 2 Days | IT Security Audit Essentials Bootcamp |
SB2DSAB / SANS Course ID : AUD429 | 2 Days | IT Security Audit Essentials Bootcamp |
||
Venue
Four Days Event is planned out at:
Hotel Crowne Plaza,
Site - 2, Sector - 29,
Gurgaon-122001 (National Capital Region), India
Hotel Front Desk: 91-124-4534000
Hotel Fax: 91-124-4304800
Sponsors
| Co-Sponsor "CXO Evening" |
Capture The Flag (CTF) Sponsor |
![]() |
|
| Associate Sponsors | Media Partners | Supporters |
| | ||
| | ||
| | ||
| |
| |
| |
|
Please contact Chair - OWASP India for sponsorship opportunities.















