This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
SecurityByte and OWASP Asia AppSec Conference 2009
From OWASP
Two Days Conference
Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel conference talks to be conducted in 3 separate halls for two days i.e . 17th & 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular talk. Conference talks are being delivered by world renowned and most regarded speakers from around the world. Below is the detailed schedule for the two days of conference.
| Day 1 - 17th Nov, 2009 | |||||||
| Where> | Conference Hall - I | Conference Hall - II | Conference Hall - III | ||||
| Who> | (Security Researchers & Enthusiasts) | (Security Auditors, Developers, QA teams, Architects) | (Leaders, Managers, C&S professionals) | ||||
| 8:00 AM - 9:00 AM | Registrations | ||||||
| Schedule | Topic |
Speaker |
Topic |
Speaker |
Topic |
Speaker | |
| 9:00 AM - 10:30 AM | Keynote | ||||||
| 10:30 AM - 11:00 PM | Tea Break | ||||||
| 11:00 AM - 12:00 PM | TBD |
TBD |
How To Blackbox Test Almost Anything |
Aviram Jenik, Beyond Security |
The International State of Cyber Security, Risk reduction in a high threat world
|
Prof. Howard A. Schmidt, Former Cyber Security Advisor to the White house | |
| 12:00 PM - 1:00 PM | Client Side Hacks |
Dino Covotsos & Charleton Smith, Telspace Systems |
Risk Based Penetration testing |
K. K. Mookhey, Founder & Principal Consultant, NII Consulting |
Applications, the source for CyberThreats |
Mano Paul,Software Assurance Advisor,(ISC)2 | |
| 1:00PM - 2:00PM | Lunch | ||||||
| 2:00 PM - 3:00 PM | Exploiting Firefox Extensions |
Roberto Suggi Liverani, Security-Assessment.com |
Threat Modeling |
Varun Sharma,Microsoft India |
Enterprise Application Security Program |
TBD | |
| 3:00 PM - 4:00 PM | SQL Server Forensics 2.0 |
Kevvie Fowler, TELUS & Ringzero |
OWASP SAMM |
Pravir Chandra, Director of Strategic Services, Fortify |
Business Case - Risk Management/Compliance at leading Education Group AMITY (Rapid Fire: 30 Min talk) |
Dr. JS Sodhi, CIO, AMITY Group | |
| 4:00 PM - 5:00 PM | Ownage 2.0 - How to own the World |
Saumil Shah, NetSquare Solutions |
"Do you want to play a Game" - Game theory and Cyberwar |
Bryan K. Fite, HackSecKlahn |
Usability and Privacy in Security |
Dr. Ponnurangam Kumaraguru, Asst. Professor - IIIT (Rapid Fire : 30 Min talk) | |
| 5:00 PM - 6:00 PM | Tea and Snacks on the Exhibition floor | ||||||
| 7:00 PM - 10:00 PM | CXO Event (Exclusive by invitation only) - Information Security Concerns for Offshoring | ||||||
| Day 2 - 18th Nov, 2009 | |||||||
| Where> | Conference Hall - I | Conference Hall - II | Conference Hall - III | ||||
| Who> | (Security Researchers & Enthusiasts) | (Security Auditors, Developers, QA teams, Architects) | (Leaders, Managers, C&S professionals) | ||||
| 8:00 AM - 9:00 AM | Registrations | ||||||
| 9:00 AM - 10:00 AM | Round Table with Speakers / Industry Panel - "Security Today & Tomorrow' | ||||||
| 10:00 AM - 10:30 AM | Tea Break | ||||||
| Schedule | Topic |
Speaker |
Topic |
Speaker |
Topic |
Speaker | |
| 10:30 AM - 11:30 AM | All your Packets belong to us |
Daniel Mende, Security Researcher, ERNW |
SANS Dshield Webhoneypot Project |
Jason Lam, Independent Security Researcher |
Critical Infrastructure Security “Danger Without borders” |
John Bumgarner, US Cyber Consequence Unit (USCCU) | |
| 11:30 AM - 12:30 PM | Hacking Oracle From Web |
Sid, Independent Security Researcher |
Testing JSON Applications For Security Holes |
Aviram Jenik, Beyond Security |
Critical Infrastructure Security “Danger Without borders” |
John Bumgarner, US Cyber Consequence Unit (USCCU) | |
| 12:30PM - 1:30PM | Lunch | ||||||
| 1:30 PM - 2:30 PM |
Lust 2.0 – Desire for free WiFi and the threat of the Imposter |
Lava Kumar Kuppan, Independent Security Researcher |
Cloud Hacking - Distributed Attacks & Exploits |
Shreeraj Shah, Blueinfy Solutions |
TBD |
Cedric Blancher, EADS Innovation Works | |
| 2:30 PM - 3:30 PM | Xprobe3 - What's New? Going Application Level |
Fyodor Yarochkin, Armorize |
Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors |
Nitin Kumar/Vipin Kumar, Independent Security Researchers, NVlabs |
Behind the Scenes at Microsoft Security Response Center |
Dave Midturi,MSRC, Microsoft Corp. | |
| 3:30PM - 4:00PM | Tea Break | ||||||
| 4:00 PM - 5:00 PM | TBD |
TBD |
TBD |
TBD |
TBD |
TBD | |
| 5:00 PM - 6:00 PM | Closing Keynotes - "OWASP & Securitybyte" | ||||||