This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
SecurityByte and OWASP Asia AppSec Conference 2009
Two Days Conference
Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel conference talks to be conducted in 3 separate halls for two days i.e . 17th & 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular talk. Conference talks are being delivered by world renowned and most regarded speakers from around the world. Below is the detailed schedule for the two days of conference.
Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel training sessions to be conducted in 3 separate halls for two days i.e . 17th & 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular session. Conference talks are being delivered by world renowned and most regarded speakers from around the world. Below is the conference schedule listing confirmed speakers and talks. Couple of talks are under review by the CFP (Call For Papers) Committee and shall be available as soon as those are confirmed. Event also follows two days of InfoSec trainings to be delivered in association with SANS, ISC2 and other organizations.
<a target="_blank" href="http://securitybyte.org/index.php/trainings/schedule.html">Click here</a> for the training schedule for 19th & 20th November 2009.
Where > | Conference Hall 1 | Conference Hall 2 | Conference Hall 3: | ||||||
Who > | (Security Researchers & Enthusiasts) | (Security Auditors, Developers, QA, Architects) | (Leaders, Managers, C&S professionals) | ||||||
Schedule | Topic | Speaker | Topic | Speaker | Topic | Speaker | |||
<img border="0" src="index.1.gif" width="25" height="271"> |
9:00AM - 10:30AM | Keynote Sessions | |||||||
10:30AM - 11:00AM | Tea break & Snacks on Exhibition Floor | ||||||||
11:00AM - 12:00PM | TBD | IBM | How To Blackbox Test Almost Anything | Aviram Jenik, Beyond Security |
The International State of Cyber Security, Risk reduction in a high threat world |
Howard A. Schmidt, Former Cyber Security Advisor to the White house |
|||
12:00PM - 1:00PM | Reconsidering Network Defenses or NOT ! | Cedric Blancher, EADS Innovation Works |
Lust 2.0 – Desire for free WiFi and the threat of the Imposter |
Lava Kumar Kuppan, Independent Security Researcher | Applications - The new cyber security frontier | Mano Paul, Software Assurance Advisor (ISC)2 | |||
1:00PM - 2:00PM | Lunch | ||||||||
2:00PM - 3:00PM | Exploiting Firefox Extensions | Roberto Suggi Liverani, Security-Assessment.com | Threat Modeling | Varun Sharma, Microsoft Corp. |
Behind the scenes at the Microsoft Security Response Center |
Dave Midturi and Suresh Venkateswaran, Microsoft Security Response Center |
|||
3:00PM - 4:00PM | SQL Server Forensics 2.0 | Kevvie Fowler, TELUS & Ringzero | Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors |
Nitin Kumar/Vipin Kumar, Independent Security Researchers, Nvlabs |
Business Case-Risk Management/Compliance at leading Education Group at AMITY |
Dr J.S Sodhi, AMITY | |||
4:00PM - 4:30PM | Business Continuity Case Study | Venkataram Arabolu, BSI | Usability and Privacy in Security | Ponnurangam Kumaraguru, IIIT | |||||
4:30 PM - 5:30 PM | Tea break & Snacks on Exhibition Floor | ||||||||
7:00PM - 10:00PM |
India Technology Leadership Summit 2009 (Exclusive by invitation only) -" Information Security Concerns for Offshoring" |
||||||||
Where > | Conference Hall 1 | Conference Hall 2 | Conference Hall 3: | ||||||
Who > | (Security Researchers & Enthusiasts) | (Security Auditors, Developers, QA, Architects) | (Leaders, Managers, C&S professionals) | ||||||
Schedule | Topic | Speaker | Topic | Speaker | Topic | Speaker | |||
<img border="0" src="index.2.gif" width="25" height="255"> |
9:00AM - 10:00AM |
Round Table with Speakers / Industry Panel - "Security Today & Tomorrow' |
|||||||
10:00AM - 10:30AM | Tea break & Snacks on Exhibition Floor | ||||||||
10:30AM - 11:30AM | Ten Things Web Developers Still Aren't Doing | Frank Kim, ThinkSec Consulting | SANS Dshield Webhoneypot Project | Jason Lam, Independent Security Researcher |
Critical Infrastructure Security “Danger Without borders” |
John Bumgarner, US Cyber Consequence Unit (USCCU) | |||
11:30AM - 12:30PM | Cloud Hacking – Distributed Attack & Exploit Platform | Shreeraj Shah, Blueinfy Solutions | Testing JSON Applications For Security Holes | Aviram Jenik, Beyond Security |
Critical Infrastructure Security “Danger Without borders” |
John Bumgarner, US Cyber Consequence Unit (USCCU) | |||
12:30PM - 1:30PM | Lunch | ||||||||
1:30PM - 2:30PM |
All Your Packets Belong to Us - Attacking Backbone Technologies |
Daniel Mende, Security Researcher, ERNW | Risk based Penetration Testing |
K. K. Mookhey, Founder & Principal Consultant, NII Consulting |
Wi-Fi security: the good, the bad and the ugly | Cedric Blancher, EADS Innovation Works | |||
2:30PM - 3:30PM | Xprobe3 - What's New? Going Application Level | Fyodor Yarochkin, Guard-info | OWASP SAMM | Pravir Chandra, OWASP | Do you wanna Play a Game Game theory and Cyberwar | Bryan K. Fite, HackSecKlahn | |||
3:30PM-4:00PM | Tea break & Snacks on Exhibition Floor | ||||||||
4:00 PM - 5:00PM | Rumbling Infections – Web Malware Ontology | Aditya K. Sood, COSEINC | Hacking Oracle From Web | Sid, Independent Security Researcher | Connected Information Security Framework | Anil Kumar Chintala, Microsoft | |||
5:00PM - 5:30PM | Closing Remarks by Organizing Committee |