This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "SecurityByte and OWASP Asia AppSec Conference 2009"

From OWASP
Jump to: navigation, search
(Exclusive Offers)
(About Trainings)
 
(27 intermediate revisions by 2 users not shown)
Line 7: Line 7:
  
 
<br>  
 
<br>  
 +
== Announcement  ==
 +
 +
'''''2009 - OWASP India is back with more interesting and exciting stuff from AppSec World..'''''<br><br>With the successful launch of '''OWASP India Conference''' in August 2008, organized in New Delhi with participation from 350+ attendees from 80+ companies and government sector. OWASP India now proudly announces the biggest Information security conference in India in association with an International Information Security Conference (www.securitybyte.org). '''Securitybyte and OWASP AppSec Asia Conference 2009''' is planned for 17th - 20th November 2009 in New Delhi &amp; NCR. Event will cover end-to-end Information Security tracks that includes Application Security, Network / Infrastructure Security, Cyber Terrorism, Cloud security,SOA Security, Cyber Forensics, Wi-Fi security, Risk Management &amp; Compliance, etc.
 +
 +
 +
*<b>Only One Week Left ! Register Online today to grab your seat for India's best Security Conference.</b><br><br>
 +
*<b>Honorable Former President of India, Dr. A.P.J Abdul Kalam to Inaugrate the India Technology Leadership Summit 2009. </b>This event is an Invitation ONLY event.
  
*Register between 6th - 15th October 2009 and get '''Complementary Return Air Flight''' from anywhere in India. <br>
 
  
 
'''[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Registrations Click Here]''' for more information.
 
'''[http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Registrations Click Here]''' for more information.
Line 44: Line 50:
 
Two days post-conference are dedicated towards best-of-breed trainings being conducted in association with SANS, ISC2 and other organizations. Trainings tracks have been made available as One-Day tracks and Two-Day tracks scheduled for 19th &amp; 20th November 2009.  
 
Two days post-conference are dedicated towards best-of-breed trainings being conducted in association with SANS, ISC2 and other organizations. Trainings tracks have been made available as One-Day tracks and Two-Day tracks scheduled for 19th &amp; 20th November 2009.  
  
==== Registrations  ====
+
== OWASP Asia AppSec Conference 2009 Organizing Committee  ==
 +
 
 +
Committee has been formed by the volunteers who wish to contribute their efforts in organizing India's biggest InfoSec event.
 +
 
 +
[http://www.owasp.org/index.php/OWASP_AppSec_Asia_Conference_2009_Organizing_Committee Click Here To View Organizing Committee Members]<br><br>
 +
 
 +
 
 +
== Registrations  ==
  
 
== [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Registration] is now open!  ==
 
== [http://www.eventavenue.com/attReglogin.do?eventId=EVT1987 Registration] is now open!  ==
Line 117: Line 130:
  
 
== Two Days Conference  ==
 
== Two Days Conference  ==
 
+
<p><font face="Arial" size="2">Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel training sessions to be conducted in 3 separate halls for two days i.e . 17th &amp; 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular session. Conference talks are being delivered by world renowned and most regarded speakers from around the world. Below is the conference schedule listing confirmed speakers and talks. Couple of talks are under review by the CFP (Call For Papers) Committee and shall be available as soon as those are confirmed. Event also follows two days of InfoSec trainings to be delivered in association with SANS, ISC2 and other organizations.</font></p>
Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel conference talks to be conducted in 3 separate halls for two days i.e . 17th &amp; 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular talk. Conference talks are being delivered by world renowned and most regarded speakers from around the world. Below is the detailed schedule for the two days of conference.<br>  
+
<p>&nbsp;</p>
 
+
<table border="0" cellpadding="0" style="border-collapse:
{| width="967" cellspacing="1" cellpadding="1" border="1" align="center"
+
collapse;width:100%">
|- valign="middle"
+
<tr height="23" style="height:17.25pt">
| height="60" align="center" colspan="7" style="background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;" | <font size="5">'''Day 1 - 17th Nov, 2009'''</font>
+
<td colspan="2" height="23" style="height: 17.25pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000">
|-
+
<font face="Arial">Where &gt;</font></td>
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | '''&nbsp; Where&gt;'''
+
<td colspan="2" style="width: 309px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #333399">
| width="300" valign="middle" height="40" bgcolor="#c0a0a0" align="center" colspan="2" | '''Conference Hall - I'''
+
<font face="Arial">Conference Hall 1</font></td>
| width="300" valign="middle" height="40" bgcolor="#a0c0e0" align="center" colspan="2" | '''Conference Hall - II'''
+
<td rowspan="3" style="width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5">
| width="300" valign="middle" height="40" bgcolor="#b3ff99" align="center" colspan="2" | '''Conference Hall - III'''
+
<font face="Arial">&nbsp;</font></td>
|-
+
<td colspan="2" style="width: 318px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #3366FF">
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | '''&nbsp; Who&gt;'''
+
<font face="Arial">Conference Hall 2</font></td>
| width="300" valign="middle" height="40" bgcolor="#c0a0a0" align="center" colspan="2" | '''(Security Researchers &amp; Enthusiasts)'''
+
<td rowspan="3" style="width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5">
| width="300" valign="middle" height="40" bgcolor="#a0c0e0" align="center" colspan="2" | '''(Security Auditors, Developers, QA teams, Architects)'''
+
<font face="Arial">&nbsp;</font></td>
| width="300" valign="middle" height="40" bgcolor="#b3ff99" align="center" colspan="2" | '''(Leaders, Managers, C&amp;S professionals)'''
+
<td colspan="2" style="width: 333px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #00CCFF">
|-
+
<font face="Arial">Conference Hall 3:&nbsp;</font></td>
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | 8:00 AM - 9:00 AM
+
</tr>
| valign="middle" bgcolor="#909090" align="center" colspan="7" | '''Registrations'''
+
<tr height="19" style="height:14.25pt">
|-
+
<td colspan="2" height="19" style="height: 14.25pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000">
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | '''&nbsp; Schedule'''
+
<font face="Arial">Who &gt;</font></td>
| width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | '''Topic<br>'''
+
<td colspan="2" style="width: 309px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #333399">
| width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | '''Speaker<br>'''
+
<font face="Arial">(Security Researchers &amp; Enthusiasts)</font></td>
| width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | '''Topic<br>'''
+
<td colspan="2" style="width: 318px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #3366FF">
| width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | '''Speaker<br>'''
+
<font face="Arial">(Security Auditors, Developers, QA, Architects)</font></td>
| width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | '''Topic<br>'''
+
<td colspan="2" style="width: 333px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #00CCFF">
| width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | '''Speaker<br>'''
+
<font face="Arial">(Leaders, Managers, C&amp;S professionals)</font></td>
|-
+
</tr>
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | 9:00 AM - 10:30 AM
+
<tr height="17" style="height:12.75pt">
| valign="middle" bgcolor="#909090" align="center" colspan="7" | '''Keynote'''
+
<td colspan="2" height="17" style="height: 12.75pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000">
|-
+
<font face="Arial">Schedule</font></td>
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | 10:30 AM - 11:00 PM
+
<td style="width: 162px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000">
| valign="middle" bgcolor="#909090" align="center" colspan="7" | '''Tea Break'''
+
<font face="Arial">Topic</font></td>
|-
+
<td style="width: 143px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000">
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | 11:00 AM - 12:00&nbsp;PM
+
<font face="Arial">Speaker</font></td>
| width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | TBD<br>  
+
<td style="width: 185px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000">
| width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | TBD<br>  
+
<font face="Arial">Topic</font></td>
| width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | How To Blackbox Test Almost Anything<br>
+
<td style="width: 128px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000">
| width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | Aviram Jenik, Beyond Security<br>  
+
<font face="Arial">Speaker</font></td>
| width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | The International State of Cyber Security, Risk reduction in a high threat world
+
<td style="width: 185px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000">
<br>
+
<font face="Arial">Topic</font></td>
| width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | Prof. Howard A. Schmidt, Former Cyber Security Advisor to the White house<br>
+
<td style="width: 145px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000">
|-
+
<font face="Arial">Speaker</font></td>
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | 12:00 PM - 1:00 PM
+
</tr>
| width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | Client Side Hacks<br>
+
<tr height="16" style="height:12.0pt">
| width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | Dino Covotsos & Charleton Smith, Telspace Systems<br>  
+
<td rowspan="10" height="285" width="24" style="height: 213.75pt; width: 18pt; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid black; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000">
| width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | Risk Based Penetration testing<br>
+
<font face="Arial">
| width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | K. K. Mookhey, Founder &amp; Principal Consultant, NII Consulting<br>
+
http://www.owasp.org/images/5/59/Day1.gif</font></td>
| width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | Applications, the source for CyberThreats<br>
+
<td style="width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59">
| width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | Mano Paul,Software Assurance Advisor,(ISC)2<br>
+
<font face="Arial">9:00AM&nbsp;&nbsp; - 10:30AM</font></td>
|-
+
<td colspan="8" style="width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #DBE5F1">
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | 1:00PM - 2:00PM
+
<font face="Arial">Keynote Sessions</font></td>
| valign="middle" bgcolor="#909090" align="center" colspan="7" | '''Lunch'''
+
</tr>
|-
+
<tr height="16" style="height:12.0pt">
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | 2:00 PM - 3:00&nbsp;PM
+
<td height="16" style="height: 12.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59">
| width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | Exploiting Firefox Extensions<br>
+
<font face="Arial">10:30AM - 11:00AM</font></td>
| width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | Roberto Suggi Liverani, Security-Assessment.com<br>  
+
<td colspan="8" style="width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C5BE97">
| width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | Threat Modeling<br>
+
<font face="Arial">Tea break &amp; Snacks on Exhibition Floor</font></td>
| width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | Varun Sharma,Microsoft India<br>  
+
</tr>
| width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | Enterprise Application Security Program<br>
+
<tr height="47" style="height:35.25pt">
| width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | TBD<br>
+
<td height="47" style="height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59">
|-
+
<font face="Arial">11:00AM - 12:00PM</font></td>
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | 3:00 PM - 4:00&nbsp;PM
+
<td style="width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px">
| width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | SQL Server Forensics 2.0<br>
+
Active Man in the Middle</td>
| width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | Kevvie Fowler, TELUS &amp; Ringzero<br>
+
<td style="width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px">
| width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | OWASP SAMM<br>  
+
<font face="Arial">Adi Sharabani, IBM</font></td>
| width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | Pravir Chandra, Director of Strategic Services,<br>Fortify<br>  
+
<td rowspan="2" style="width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5">
| width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | Business Case - Risk Management/Compliance at leading Education Group AMITY (Rapid Fire: 30 Min talk)<br>
+
<font face="Arial">&nbsp;</font></td>
| width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | Dr. JS Sodhi, CIO, AMITY Group<br>
+
<td style="width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px">
|-
+
<font face="Arial">How To Blackbox Test Almost Anything</font></td>
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | 4:00 PM - 5:00 PM
+
<td style="width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px">
| width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | Ownage 2.0 - How to own the World<br>
+
<font face="Arial">Aviram Jenik, Beyond Security</font></td>
| width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | Saumil Shah, NetSquare Solutions<br>
+
<td rowspan="2" style="width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5">
| width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | "Do you want to play a Game" - Game theory and Cyberwar<br>  
+
<font face="Arial">&nbsp;</font></td>
| width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | Bryan K. Fite, HackSecKlahn<br>  
+
<td style="width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px">
| width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | Usability and Privacy in Security<br>
+
<font face="Arial">The International State of Cyber Security, Risk
| width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | Dr. Ponnurangam Kumaraguru, Asst. Professor - IIIT (Rapid Fire : 30 Min talk)<br>
+
reduction in a high threat world</font></td>
|-
+
<td style="width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px">
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | 5:00 PM - 6:00 PM
+
<font face="Arial">Howard A. Schmidt, Former Cyber Security Advisor to
| valign="middle" bgcolor="#909090" align="center" colspan="7" | '''Tea and Snacks on the Exhibition floor'''
+
the White house</font></td>
|-
+
</tr>
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | 7:00 PM - 10:00 PM
+
<tr height="47" style="height:35.25pt">
| valign="middle" bgcolor="#909090" align="center" colspan="7" | '''CXO Event (Exclusive by invitation only) - Information Security Concerns for Offshoring'''
+
<td height="47" style="height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59">
|}
+
<font face="Arial">12:00PM - 1:00PM</font></td>
 
+
<td style="width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px">
<br><br>  
+
<font face="Arial">Reconsidering Network Defenses or NOT !</font></td>
 
+
<td style="width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px">
{| width="967" cellspacing="1" cellpadding="1" border="1" align="center"
+
<font face="Arial">Cedric Blancher, EADS Innovation Works</font></td>
|- valign="middle"
+
<td style="width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px">
| height="60" align="center" colspan="7" style="background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;" | <font size="5">'''Day 2 - 18th Nov, 2009'''</font>
+
<font face="Arial">Lust 2.0 – Desire for free WiFi and the threat of the  
|-
+
Imposter&nbsp;</font></td>
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | '''&nbsp; Where&gt;'''
+
<td style="width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px">
| width="300" valign="middle" height="40" bgcolor="#c0a0a0" align="center" colspan="2" | '''Conference Hall - I'''
+
<font face="Arial">Lava Kumar Kuppan, Independent Security Researcher</font></td>
| width="300" valign="middle" height="40" bgcolor="#a0c0e0" align="center" colspan="2" | '''Conference Hall - II'''
+
<td style="width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px">
| width="300" valign="middle" height="40" bgcolor="#b3ff99" align="center" colspan="2" | '''Conference Hall - III'''
+
<font face="Arial">Applications - The new cyber security frontier</font></td>
|-
+
<td style="width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px">
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | '''&nbsp; Who&gt;'''
+
<font face="Arial">Mano Paul, Software Assurance Advisor (ISC)2</font></td>
| width="300" valign="middle" height="40" bgcolor="#c0a0a0" align="center" colspan="2" | '''(Security Researchers &amp; Enthusiasts)'''
+
</tr>
| width="300" valign="middle" height="40" bgcolor="#a0c0e0" align="center" colspan="2" | '''(Security Auditors, Developers, QA teams, Architects)'''
+
<tr height="17" style="height:12.75pt">
| width="300" valign="middle" height="40" bgcolor="#b3ff99" align="center" colspan="2" | '''(Leaders, Managers, C&amp;S professionals)'''
+
<td height="17" style="height: 12.75pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59">
|-
+
<font face="Arial">1:00PM&nbsp;&nbsp;&nbsp; - 2:00PM</font></td>
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | 8:00 AM - 9:00 AM
+
<td colspan="8" style="width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FAC090">
| valign="middle" bgcolor="#909090" align="center" colspan="7" | '''Registrations'''
+
<font face="Arial">Lunch</font></td>
|-
+
</tr>
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | 9:00 AM - 10:00 AM
+
<tr height="47" style="height:35.25pt">
| valign="middle" bgcolor="#909090" align="center" colspan="7" | '''Round Table with Speakers / Industry Panel - "Security Today & Tomorrow''''
+
<td height="47" style="height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59">
|-
+
<font face="Arial">2:00PM&nbsp;&nbsp;&nbsp; - 3:00PM</font></td>
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | 10:00 AM - 10:30 AM
+
<td style="width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px">
| valign="middle" bgcolor="#909090" align="center" colspan="7" | '''Tea Break'''
+
<font face="Arial">Exploiting Firefox Extensions</font></td>
|-
+
<td style="width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px">
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | '''&nbsp; Schedule'''
+
<font face="Arial">Roberto Suggi Liverani, Security-Assessment.com</font></td>
| width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | '''Topic<br>'''
+
<td rowspan="3" style="width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5">
| width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | '''Speaker<br>'''
+
<font face="Arial">&nbsp;</font></td>
| width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | '''Topic<br>'''
+
<td style="width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px">
| width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | '''Speaker<br>'''
+
<font face="Arial">Threat Modeling&nbsp;</font></td>
| width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | '''Topic<br>'''
+
<td style="width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px">
| width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | '''Speaker<br>'''
+
<font face="Arial">Varun Sharma, Microsoft Corp.</font></td>
|-
+
<td rowspan="3" style="width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5">
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | 10:30 AM - 11:30&nbsp;AM
+
<font face="Arial">&nbsp;</font></td>
| width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | All your Packets belong to us<br>  
+
<td style="width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px">
| width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | Daniel Mende, Security Researcher, ERNW<br>  
+
<font face="Arial">Behind the scenes at the Microsoft Security Response
| width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | SANS Dshield Webhoneypot Project<br>
+
Center</font></td>
| width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | Jason Lam, Independent Security Researcher<br>  
+
<td style="width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px">
| width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | Critical Infrastructure Security “Danger Without borders” <br>  
+
<font face="Arial">Dave Midturi and Suresh Venkateswaran, Microsoft
| width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | John Bumgarner, US Cyber Consequence Unit (USCCU)<br>
+
Security Response Center</font></td>
|-
+
</tr>
|width="67" valign="middle" height="40" bgcolor="#7b8abd" | 11:30 AM - 12:30 PM
+
<tr height="47" style="height:35.25pt">
| width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | Hacking Oracle From Web<br>
+
<td height="47" style="height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59">
| width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | Sid, Independent Security Researcher<br>  
+
<font face="Arial">3:00PM&nbsp;&nbsp;&nbsp; - 4:00PM</font></td>
| width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | Testing JSON Applications For Security Holes<br>  
+
<td rowspan="2" style="width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px">
| width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | Aviram Jenik, Beyond Security<br>  
+
<font face="Arial">SQL Server Forensics 2.0</font></td>
| width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | Critical Infrastructure Security “Danger Without borders” <br>
+
<td rowspan="2" style="width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px">
| width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | John Bumgarner, US Cyber Consequence Unit (USCCU)<br>
+
<font face="Arial">Kevvie Fowler, TELUS &amp; Ringzero</font></td>
|-
+
<td style="width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px">
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | 12:30PM - 1:30PM
+
<font face="Arial">Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors</font></td>
| valign="middle" bgcolor="#909090" align="center" colspan="7" | '''Lunch'''
+
<td style="width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px">
|-
+
<font face="Arial">Nitin Kumar/Vipin Kumar, Independent Security
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | 1:30 PM&nbsp;- 2:30 PM<br>  
+
Researchers, Nvlabs</font></td>
| width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | Lust 2.0 – Desire for free WiFi and the threat of the Imposter <br>  
+
<td style="width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px">
| width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | Lava Kumar Kuppan, Independent Security Researcher<br>
+
<font face="Arial">Business Case-Risk Management/Compliance at leading
| width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | Cloud Hacking - Distributed Attacks & Exploits<br>
+
Education Group at AMITY</font></td>
| width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | Shreeraj Shah, Blueinfy Solutions<br>  
+
<td style="width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px">
| width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | TBD<br>  
+
<font face="Arial">Dr J.S Sodhi, AMITY</font></td>
| width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | Cedric Blancher, EADS Innovation Works<br>
+
</tr>
|-
+
<tr height="17" style="height:12.75pt">
 
+
<td height="17" style="height: 12.75pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59">
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | 2:30 PM - 3:30&nbsp;PM
+
<font face="Arial">4:00PM&nbsp;&nbsp;&nbsp; - 4:30PM</font></td>
| width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | Xprobe3 - What's New? Going Application Level<br>
+
<td style="width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px">
| width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | Fyodor Yarochkin, Armorize<br>  
+
<font face="Arial">Business Continuity Case Study</font></td>
| width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors<br>  
+
<td style="width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px">
| width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | Nitin Kumar/Vipin Kumar, Independent Security Researchers, NVlabs<br>
+
<font face="Arial">Venkataram Arabolu, BSI</font></td>
| width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | Behind the Scenes at Microsoft Security Response Center<br>  
+
<td style="width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px">
| width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | Dave Midturi,MSRC, Microsoft Corp.<br>
+
<font face="Arial">Usability and Privacy in Security</font></td>
|-
+
<td style="width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px">
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | 3:30PM - 4:00PM
+
<font face="Arial">Ponnurangam Kumaraguru, IIIT&nbsp;</font></td>
| valign="middle" bgcolor="#909090" align="center" colspan="7" | '''Tea Break'''
+
</tr>
|-
+
<tr height="16" style="height: 12.0pt">
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | 4:00 PM - 5:00&nbsp;PM
+
<td height="16" style="height: 12.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59">
| width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | TBD<br>  
+
<font face="Arial">4:30 PM&nbsp;&nbsp; - 5:30 PM</font></td>
| width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | TBD<br>
+
<td colspan="8" style="width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C5BE97">
| width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | TBD<br>
+
<font face="Arial">Tea break &amp; Snacks on Exhibition Floor</font></td>
| width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | TBD<br>  
+
</tr>
| width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | TBD<br>  
+
<tr height="15" style="height:11.25pt">
| width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | TBD<br>
+
<td height="15" style="height: 11.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #9BBB59">
|-
+
<font face="Arial">7:00PM&nbsp;&nbsp;&nbsp; - 10:00PM</font></td>
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | 5:00 PM - 6:00 PM
+
<td colspan="8" style="width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #DBE5F1">
| valign="middle" bgcolor="#909090" align="center" colspan="7" | '''Closing Keynotes - "OWASP & Securitybyte"'''
+
<font face="Arial">India Technology Leadership Summit 2009 (Exclusive by invitation only) -&quot; Information Security Concerns for Offshoring&quot;</font></td>
|-
+
</tr>
|}
+
<tr height="8" style="height: 6.0pt">
 
+
<td colspan="10" height="8" style="height: 6.0pt; width: 1070px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: white">
<br>  
+
<font face="Arial">&nbsp;</font></td>
 
+
</tr>
<br>  
+
<tr height="23" style="height:17.25pt">
 +
<td colspan="2" height="23" style="height: 17.25pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000">
 +
<font face="Arial">Where &gt;</font></td>
 +
<td colspan="2" style="width: 309px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #333399">
 +
<font face="Arial">Conference Hall 1</font></td>
 +
<td rowspan="3" style="width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5">
 +
<font face="Arial">&nbsp;</font></td>
 +
<td colspan="2" style="width: 318px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #3366FF">
 +
<font face="Arial">Conference Hall 2</font></td>
 +
<td rowspan="3" style="width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5">
 +
<font face="Arial">&nbsp;</font></td>
 +
<td colspan="2" style="width: 333px; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #00CCFF">
 +
<font face="Arial">Conference Hall 3:&nbsp;</font></td>
 +
</tr>
 +
<tr height="19" style="height:14.25pt">
 +
<td colspan="2" height="19" style="height: 14.25pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000">
 +
<font face="Arial">Who &gt;</font></td>
 +
<td colspan="2" style="width: 309px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #333399">
 +
<font face="Arial">(Security Researchers &amp; Enthusiasts)</font></td>
 +
<td colspan="2" style="width: 318px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #3366FF">
 +
<font face="Arial">(Security Auditors, Developers, QA, Architects)</font></td>
 +
<td colspan="2" style="width: 333px; color: white; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; font-size: 10.0pt; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #00CCFF">
 +
<font face="Arial">(Leaders, Managers, C&amp;S professionals)</font></td>
 +
</tr>
 +
<tr height="17" style="height:12.75pt">
 +
<td colspan="2" height="17" style="height: 12.75pt; width: 83px; color: white; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: right; white-space: normal; font-style: normal; text-decoration: none; vertical-align: bottom; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000">
 +
<font face="Arial">Schedule</font></td>
 +
<td style="width: 162px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000">
 +
<font face="Arial">Topic</font></td>
 +
<td style="width: 143px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000">
 +
<font face="Arial">Speaker</font></td>
 +
<td style="width: 185px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000">
 +
<font face="Arial">Topic</font></td>
 +
<td style="width: 128px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000">
 +
<font face="Arial">Speaker</font></td>
 +
<td style="width: 185px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000">
 +
<font face="Arial">Topic</font></td>
 +
<td style="width: 145px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; vertical-align: bottom; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FFC000">
 +
<font face="Arial">Speaker</font></td>
 +
</tr>
 +
<tr height="16" style="height:12.0pt">
 +
<td rowspan="10" height="257" width="24" style="height: 192.75pt; width: 18pt; color: white; font-size: 12.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C00000">
 +
<font face="Arial">
 +
http://www.owasp.org/images/7/73/Day2.gif</font></td>
 +
<td style="width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7">
 +
<font face="Arial">9:00AM&nbsp;&nbsp; - 10:00AM</font></td>
 +
<td colspan="8" style="width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #DBE5F1">
 +
<font face="Arial">Round Table with Speakers / Industry Panel - &quot;Security Today &amp; Tomorrow'</font></td>
 +
</tr>
 +
<tr height="16" style="height:12.0pt">
 +
<td height="16" style="height: 12.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7">
 +
<font face="Arial">10:00AM - 10:30AM</font></td>
 +
<td colspan="8" style="width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C5BE97">
 +
<font face="Arial">Tea break &amp; Snacks on Exhibition Floor</font></td>
 +
</tr>
 +
<tr height="32" style="height:24.0pt">
 +
<td height="32" style="height: 24.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7">
 +
<font face="Arial">10:30AM - 11:30AM</font></td>
 +
<td style="width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px">
 +
<font face="Arial">Ten Things Web Developers Still Aren't Doing</font></td>
 +
<td style="width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px">
 +
<font face="Arial">Frank Kim, ThinkSec Consulting</font></td>
 +
<td rowspan="2" style="width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5">
 +
<font face="Arial">&nbsp;</font></td>
 +
<td style="width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px">
 +
<font face="Arial">SANS Dshield Webhoneypot Project</font></td>
 +
<td style="width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px">
 +
<font face="Arial">Jason Lam, Independent Security Researcher</font></td>
 +
<td rowspan="2" style="width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5">
 +
<font face="Arial">&nbsp;</font></td>
 +
<td style="width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px">
 +
<font face="Arial">Critical Infrastructure Security “Danger Without
 +
borders”&nbsp;</font></td>
 +
<td style="width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px">
 +
<font face="Arial">John Bumgarner, US Cyber Consequence Unit (USCCU)</font></td>
 +
</tr>
 +
<tr height="32" style="height:24.0pt">
 +
<td height="32" style="height: 24.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7">
 +
<font face="Arial">11:30AM - 12:30PM</font></td>
 +
<td style="width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px">
 +
<font face="Arial">Cloud Hacking – Distributed Attack &amp; Exploit Platform</font></td>
 +
<td style="width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px">
 +
<font face="Arial">Shreeraj Shah, Blueinfy Solutions</font></td>
 +
<td style="width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px">
 +
<font face="Arial">Testing JSON Applications For Security Holes</font></td>
 +
<td style="width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px">
 +
<font face="Arial">Aviram Jenik, Beyond Security</font></td>
 +
<td style="width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px">
 +
<font face="Arial">Critical Infrastructure Security “Danger Without
 +
borders”&nbsp;</font></td>
 +
<td style="width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px">
 +
<font face="Arial">John Bumgarner, US Cyber Consequence Unit (USCCU)</font></td>
 +
</tr>
 +
<tr height="17" style="height:12.75pt">
 +
<td height="17" style="height: 12.75pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7">
 +
<font face="Arial">12:30PM&nbsp; - 1:30PM</font></td>
 +
<td colspan="8" style="width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #FAC090">
 +
<font face="Arial">Lunch</font></td>
 +
</tr>
 +
<tr height="47" style="height:35.25pt">
 +
<td height="47" style="height: 35.25pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7">
 +
<font face="Arial">1:30PM&nbsp;&nbsp;&nbsp; - 2:30PM</font></td>
 +
<td style="width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px">
 +
<font face="Arial">All Your Packets Belong to Us - Attacking Backbone
 +
Technologies&nbsp;</font></td>
 +
<td style="width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px">
 +
<font face="Arial">Daniel Mende, Security Researcher, ERNW</font></td>
 +
<td rowspan="2" style="width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5">
 +
<font face="Arial">&nbsp;</font></td>
 +
<td style="width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px">
 +
<font face="Arial">Risk based Penetration Testing</font></td>
 +
<td style="width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px">
 +
<font face="Arial">K. K. Mookhey, Founder &amp; Principal Consultant, NII
 +
Consulting</font></td>
 +
<td rowspan="2" style="width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5">
 +
<font face="Arial">&nbsp;</font></td>
 +
<td style="width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px">
 +
<font face="Arial">Wi-Fi security: the good, the bad and the ugly</font></td>
 +
<td style="width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px">
 +
<font face="Arial">Cedric Blancher, EADS Innovation Works</font></td>
 +
</tr>
 +
<tr height="32" style="height:24.0pt">
 +
<td height="32" style="height: 24.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7">
 +
<font face="Arial">2:30PM&nbsp;&nbsp;&nbsp; - 3:30PM</font></td>
 +
<td style="width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px">
 +
<font face="Arial">Xprobe3 - What's New? Going Application Level</font></td>
 +
<td style="width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px">
 +
<font face="Arial">Fyodor Yarochkin, Armorize</font></td>
 +
<td style="width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px">
 +
<font face="Arial">OWASP SAMM</font></td>
 +
<td style="width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px">
 +
<font face="Arial">Pravir Chandra, OWASP</font></td>
 +
<td style="width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: .5pt solid windowtext; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px">
 +
<font face="Arial">Do you wanna Play a Game Game theory and Cyberwar</font></td>
 +
<td style="width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px">
 +
<font face="Arial">Bryan K. Fite, HackSecKlahn</font></td>
 +
</tr>
 +
<tr height="17" style="height:12.75pt">
 +
<td height="17" style="height: 12.75pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7">
 +
<font face="Arial">3:30PM-4:00PM</font></td>
 +
<td colspan="8" style="width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid black; border-top: .5pt solid windowtext; border-bottom: medium none; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #C5BE97">
 +
<font face="Arial">Tea break &amp; Snacks on Exhibition Floor</font></td>
 +
</tr>
 +
<tr height="32" style="height:24.0pt">
 +
<td height="32" style="height: 24.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7">
 +
<font face="Arial">4:00 PM&nbsp;&nbsp; - 5:00PM</font></td>
 +
<td style="width: 162px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px">
 +
<font face="Arial">Rumbling Infections – Web Malware Ontology</font></td>
 +
<td style="width: 143px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px">
 +
<font face="Arial">Aditya K. Sood, COSEINC</font></td>
 +
<td style="width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5">
 +
<font face="Arial">&nbsp;</font></td>
 +
<td style="width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px">
 +
<font face="Arial">&nbsp;Hacking Oracle From Web</font></td>
 +
<td style="width: 128px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px">
 +
<font face="Arial">Sid, Independent Security Researcher</font></td>
 +
<td style="width: 4px; color: white; font-size: 11.0pt; font-weight: 700; font-family: Calibri, sans-serif; text-align: center; vertical-align: middle; white-space: normal; font-style: normal; text-decoration: none; border: 2.0pt double #3F3F3F; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #A5A5A5">
 +
<font face="Arial">&nbsp;</font></td>
 +
<td style="width: 185px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px">
 +
<font face="Arial">Connected Information Security Framework</font></td>
 +
<td style="width: 145px; font-size: 8.0pt; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-weight: 400; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px">
 +
<font face="Arial">Anil Kumar Chintala, Microsoft</font></td>
 +
</tr>
 +
<tr height="16" style="height:12.0pt">
 +
<td height="16" style="height: 12.0pt; width: 55px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: left; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: medium none; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #B2A1C7">
 +
<font face="Arial">5:00PM&nbsp;&nbsp;&nbsp; - 5:30PM</font></td>
 +
<td colspan="8" style="width: 985px; font-size: 8.0pt; font-weight: 700; font-family: Arial, sans-serif; text-align: center; vertical-align: middle; white-space: normal; color: windowtext; font-style: normal; text-decoration: none; border-left: medium none; border-right: .5pt solid windowtext; border-top: .5pt solid windowtext; border-bottom: .5pt solid windowtext; padding-left: 1px; padding-right: 1px; padding-top: 1px; background: #DBE5F1">
 +
<font face="Arial">Closing Remarks by Organizing Committee</font></td>
 +
</tr>
 +
</table>
  
 
==== Trainings  ====
 
==== Trainings  ====
Line 342: Line 524:
 
| width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | [http://www.owasp.org/index.php/InDepth_Assessment_Techniques In-depth Assessment Techniques: Design, Code, and Runtime]<br>  
 
| width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | [http://www.owasp.org/index.php/InDepth_Assessment_Techniques In-depth Assessment Techniques: Design, Code, and Runtime]<br>  
 
| width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" |  
 
| width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" |  
Pravir Chandra,  
+
Fydor Yarochkin,  
  
[[Image:Fortify.jpg|center|93x31px|link=http://www.fortify.com]]<br>  
+
[[Image:Logo_Armorize.JPG‎|center|93x31px|link=http://www.armorize.com]]<br>  
  
 
|-
 
|-
 
| height="30" align="center" colspan="8" style="background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;" | <font size="2">'''Two Day Training Tracks'''</font>
 
| height="30" align="center" colspan="8" style="background: rgb(64, 88, 160) none repeat scroll 0% 0%; color: white; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;" | <font size="2">'''Two Day Training Tracks'''</font>
|-
 
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | '''SB2DBWH'''
 
| width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | 2 Days<br>
 
| width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | [http://www.owasp.org/index.php/Hacking_bluetooth_and_wireless_101 Hacking Wireless &amp; Bluetooth 101]<br>
 
| width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" |
 
Dino Covotsos /<br>Charlton Smith,[[Image:Telspace logo.png|center|76x50px]]&nbsp;
 
 
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | '''SB2DBWH'''
 
| width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | 2 Days<br>
 
| width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" | [http://www.owasp.org/index.php/Hacking_bluetooth_and_wireless_101 Hacking Wireless &amp; Bluetooth 101]<br>
 
| width="150" valign="middle" height="40" bgcolor="#c0a0a0" align="center" |
 
Dino Covotsos /<br>Charlton Smith,[[Image:Telspace logo.png|center|72x47px]]&nbsp;
 
 
 
|-
 
|-
 
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | '''SB2DNST'''  
 
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | '''SB2DNST'''  
Line 427: Line 596:
  
 
<br>  
 
<br>  
 
+
http://www.owasp.org/images/e/e2/Sponsor1.JPG
{| cellspacing="1" cellpadding="1" border="0" align="center"
+
http://www.owasp.org/images/a/a6/Sponsor2.JPG
|-
+
<br>  
| valign="middle" align="center" | '''Co-Sponsor "Leadership Summit 2009"'''<br><br>
 
|
 
| valign="middle" align="center" | '''CTF&nbsp;(Capture The Flag) Sponsor'''<br><br>
 
|
 
| valign="middle" align="center" | '''Education &nbsp;Partner'''<br><br>
 
|-
 
| [[Image:20th green stacked.png|center|ISC2|link=http://www.isc2.org]]<br>
 
| &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
 
| [[Image:Appin.jpg|center|link=http://www.appinsecurity.com]]<br>
 
| &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
 
| [[Image:BRIP-Logo.jpg|center|link=http://www.brip.co.in]]<br>
 
|}
 
| &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
 
| [[Image:Beyond-logo_large.jpg|Left|link=http://www.www.beyondsecurity.com]]
 
 
 
<br> <br>
 
 
 
{| width="967" cellspacing="1" cellpadding="1" border="0" align="center" class="FCK__ShowTableBorders"
 
|- valign="middle"
 
| height="60" align="center" | <font size="2">'''Associate Sponsors'''</font>
 
| height="90" align="center" | <font size="2">'''Media Partners'''</font>
 
| height="60" align="center" | <font size="2">'''Supporters'''</font>
 
|-
 
| [[Image:Torridn.jpg|center|link=http://www.torridnetworks.com]]
 
| [[Image:SSecurity_india_small.gif‎ |center|link=http://www.searchsecurity.in]]
 
| [[Image:HITB.jpg|center|link=http://conference.hitb.org]]<br>
 
|-
 
| [[Image:SecurityCompass.JPG|center|link=http://www.securitycompass.com]]
 
| [[Image:HNS-web.jpg|center|link=http://www.net-security.org]]
 
| [[Image:Sector.jpg|center|link=http://www.sector.ca]]<br>
 
|-
 
! valign="baseline" align="center" | <br>
 
| [[Image:Infosecurity.jpg|center|link=http://www.infosecuritymagz.com]] <br>
 
| [[Image:Clubhack.gif|center]]<br>[[Image:Eventavenue Logo.jpg|center|link=https://www.eventavenue.com]]
 
|-
 
| <br>
 
| [[Image:Itmagz.jpg|center]]&nbsp;[[Image:Electronicsf.jpg|center|link=http://www.electronicsforu.com]]
 
| [[Image:Crowne plaza.jpg|center|link=http://www.ichotelsgroup.com/h/d/cp/1/en/hotel/ndegg]]<br>
 
|-
 
| <br>
 
| <br>
 
| &nbsp;
 
|}
 
 
==== Hotel & Travel  ====
 
==== Hotel & Travel  ====
  
Line 504: Line 630:
  
 
<br>
 
<br>
 +
==== Capture the Flag  ====
 +
 +
== HackHunt 2009  ==
 +
 +
<b>India's foremost Hacking Challenge </b>
 +
 +
Your Shot to the Title of India's best hacker along with Prize money of more than <b>Rs 150,000</b> up for grabs!
 +
 +
 +
 +
<b>Search for India’s Best Ethical Hacker </b>
 +
 +
HackHunt is India’s leading hacking competition and aims at awarding the best ethical hackers in the country. The competition is brought to you by Appin Security Group, a leading Information Security and Ethical Hacking Company and Securitybyte, a global Information Security Conference Company.
 +
 +
The competition will be conducted in 3 phases. The 1st two rounds will be online and the 3rd and final round will take place at“Securitybyte & OWASP Appsec Asia 2009” on November 17, 2009at Crowne Plaza, Gurgaon.
 +
 +
Level 1 – Knowledge Check
 +
All the participants will be answering a quiz and based on the score top 10% will be shortlisted to 2nd round.
 +
 +
Level 2 – Skill Check
 +
This stage will require an attacker to get to the final FLAG file which he/she would need to register for the event.
 +
 +
Level 3 – Final Round
 +
This stage will require the attackers to exploit a pre-announced SSID which has WPA (or wpa 2).
 +
 +
 +
To participate and for more details visit website :- http://www.hackerscouncil.org/
 +
 +
== PacketWars  ==
 +
<b>First time in India brought to you by Securitybyte! </b><br>                                             
 +
About PacketWars
 +
 +
PacketWars is an intense, real-time information warfare simulation. Unlike other “capture the flag” games, the battlegrounds featured in PacketWars use the same software and hardware you would encounter in the real world.
 +
 +
PacketWars is designed to operate like a sport. Think Formula One Racing meets professional golf with a dash of Ultimate Fighting thrown in for good measure. Serious fun!
 +
 +
Visit http://packetwars.com/ for more details.
 +
How To Play?
 +
 +
PacketWars is a Sport like nothing you have ever experienced! Games known as “BATTLES” pit individual players and teams against each other in a race to achieve defined objectives.
 +
 +
The rules of engagement are simple:
 +
- Illegal activity of any kind is prohibited
 +
- Protect yourself at all times
 +
- Battles are designed to be of a low, medium or high difficulty level based on the battle objectives and battle duration
 +
- Primary, Secondary and Tertiary objectives are defined and assigned points based on difficulty
 +
- Battles have time limits and other defined constraints
 +
- Constraints are sometimes known to the combatants and other times are not
 +
- Anything that is not expressly prohibited is allowed
 +
- Points are awarded for FLARE
 +
 +
Equipment Needed:
 +
- Most combants use a notebook and a BackTrack CD however you are only limited by your imagination and bank account
 +
- You need a battle field and a PacketMaster…Oh yeah, skillz come in handy also!How To Play<br><br>
 +
<b.How can I participate?</b><br>
 +
PacketWars to be held at the Hotel Crowne Plaza, Gurgaon on Nov 17 & Nov 18, 2009. Participation is FREE! Schedule will be announced soon.
 +
 +
== WebWar III  ==
 +
 +
<b>About</b>
 +
Hackers attack, coders defend, when you get them together you end up with Web War III. WWIII is designed to put your Web Application attack and defense skills to the test.<br><br>
 +
 +
<b>Teams</b>
 +
Each team consists of two players, an attacker and a defender. The attacker would be capable of identifying Web Application Vulnerabilities (OWASP Top 10). The defender would be capable of writing secure Java code.
 +
<br><br>
 +
 +
 +
<b>Game Format</b><br>
 +
 +
The game has two stages:
  
 +
Stage 1:
 +
Each team is given a VM Ware image containing a web server hosting a vulnerable web application. During this stage each team identifies the vulnerabilities in their application.
 +
They try to fix the identified vulnerabilities by making code changes.<br>
  
 +
Stage 2:
 +
The IP addresses of the Web Server's of all the teams is announced.
 +
Each team looks for vulnerabilities in the Web Applications of the other teams.
 +
Vulnerabilities found on the opponents' application get positive points.
 +
Vulnerabilities found by the opponents on your application get negative points.<br>
  
 +
Team with the highest points at the end of Stage 2 wins.
 +
<br><br>
 +
 +
<b>Tools and Equipments</b>
 +
 +
Each team should bring their own laptop with VM Ware installed.
 +
The attacker can use any tools they bring.
 +
The applications come with ESAPI to help the defenders fix the code quicker.
 
<br>  
 
<br>  
 +
==== Leadership Summit 2009  ====
 +
<b>India's top technology thought leaders coming together to discuss "Security concerns in off-shoring"</b><br>
 +
 +
<b>Honored Guests</b><br>
 +
-Honorable Former President of India, Dr. A.P.J Abdul Kalam to inaugrate the Leadership Summit 2009.<br>
 +
-Prof. Howard A. Schmidt(Advisor, NIST; Former Vice Chair - President’s Critical Infrastructure Board; Former Special Advisor – Cyberspace Security for White House)<br>
 +
-Mr. Hord Tipton, Executive Director (ISC)2<br>
 +
 +
<b>About the Event</b><br>
 +
An elite gathering of 200 technology leaders, decision makers & InfoSec experts from leading service providers, government agencies and various industry verticals.
 +
<br>
 +
Two hours of panel discussions between three panels of 12 distinguished industry experts representing outsourcing companies, service providers and the regulatory bodies.  Panel discussions will be followed by networking dinner & cocktails.<br>
 +
 +
Prof Howard A. Schmidt (Advisor, NIST; Former Vice Chair - President’s Critical Infrastructure Board; Former Special Advisor – Cyberspace Security for White House) will facilitate the panel discussions. Thought leaders participating in the panel discussions are:<br>
  
 +
<b>Outsourcing Organizations</b><br>
 +
Mr. Raghavendra Vaidya, CIO - GE Capital India<br>
 +
Mr. CRN Vairavelu, VP - Ford Technology Services India<br>
 +
Mr. Pankaj Agrawal, CISO - Aircel Limited<br>
 +
TBD<br>
 +
<br>
 +
<b>Service Providers</b><br>
 +
Mr. Terry Thomas, Partner - Ernst & Young<br>
 +
Mr. Debashis Ghosh, Head (LS&H ISU) - Tata Consultancy Services<br>
 +
Mr. Sunil Gujral, EVP & CTO - Quatrro<br>
 +
Mr. Sunil Goyal, COO - Sopra group<br>
 +
<br>
 +
<b>Regulatory Bodies</b><br>
 +
Dr. Kamlesh Bajaj, CEO - DSCI (a NASSCOM initiative)<br>
 +
Dr. Gulshan Rai, Director - CERT-in<br>
 +
Mr. Hord Tipton, Executive Director - ISC2 (ex CIO, US Department of Interior)<br>
 +
Mr. Vakul Sharma, Lawyer - Supreme Court<br>
 +
<br>
 +
The event is exclusive to industry leaders and is by private invitation only. If you are interested in attending the event, please email your business card to [email protected] This e-mail address is being protected from spambots.<br>
 +
 +
Venue - Hotel Crowne Plaza, Gurgaon | Timings - 5:30PM - 9:00PM
 +
<br>
 
__NOTOC__ <headertabs />  
 
__NOTOC__ <headertabs />  
 
Please contact [http://www.owasp.org/index.php/Category:India#OWASP_India_Co-Chairs Chair - OWASP India] for sponsorship opportunities.  
 
Please contact [http://www.owasp.org/index.php/Category:India#OWASP_India_Co-Chairs Chair - OWASP India] for sponsorship opportunities.  

Latest revision as of 12:17, 18 February 2012

SB OWASP 2009 banner.gif
Hotel Crowne Plaza | Registrations


Announcement

2009 - OWASP India is back with more interesting and exciting stuff from AppSec World..

With the successful launch of OWASP India Conference in August 2008, organized in New Delhi with participation from 350+ attendees from 80+ companies and government sector. OWASP India now proudly announces the biggest Information security conference in India in association with an International Information Security Conference (www.securitybyte.org). Securitybyte and OWASP AppSec Asia Conference 2009 is planned for 17th - 20th November 2009 in New Delhi & NCR. Event will cover end-to-end Information Security tracks that includes Application Security, Network / Infrastructure Security, Cyber Terrorism, Cloud security,SOA Security, Cyber Forensics, Wi-Fi security, Risk Management & Compliance, etc.


  • Only One Week Left ! Register Online today to grab your seat for India's best Security Conference.

  • Honorable Former President of India, Dr. A.P.J Abdul Kalam to Inaugrate the India Technology Leadership Summit 2009. This event is an Invitation ONLY event.


Click Here for more information.

Welcome

Securitybyte & OWASP are proud to welcome you to the annual international information security conference – Securitybyte & OWASP AppSec Asia Conference 2009, Nov 17th through Nov 20th in Delhi & NCR, India.

This is a landmark event, as both Securitybyte and OWASP join hands to present India’s largest InfoSec event with world renowned and most regarded international speakers.

Securitybye & OWASP AppSec Asia Conference 2009 will be held at Hotel Crowne Plaza, Gurgaon, NCR, India. on 17th November through 20th November 2009.

Who Should Attend Securitybyte & OWASP AppSec Asia Conference 2009:

  • Application Developers
  • Security Researchers
  • Application Testers and Quality Assurance
  • Penetration Testers
  • Application Project Management and Staff
  • IT Security Professionals
  • Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff
  • Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance
  • Security Managers and Staff
  • Executives, Managers, and Staff Responsible for IT Security Governance
  • IT Professionals Interesting in Improving IT Security

About

About Conference

Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel conference talks to be conducted in 3 separate halls for two days i.e . 17th & 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular talk. Conference talks are being delivered by world renowned and most regarded speakers from around the world.

About Trainings

Two days post-conference are dedicated towards best-of-breed trainings being conducted in association with SANS, ISC2 and other organizations. Trainings tracks have been made available as One-Day tracks and Two-Day tracks scheduled for 19th & 20th November 2009.

OWASP Asia AppSec Conference 2009 Organizing Committee

Committee has been formed by the volunteers who wish to contribute their efforts in organizing India's biggest InfoSec event.

Click Here To View Organizing Committee Members


Registrations

Registration is now open!

You can register here

Please check out our Exclusive Discount Offer, available Starting October 6th - 15th, 2009. "SAVE BIG NOW !"

The below pricing reflects the Standard Registration Prices .

Two Days of Conference (17th and 18th November 2009)
Rs.8,500/- INR General Public
Two Days of Conference (17th and 18th November 2009)
Rs.5,000/- INR Students
Two-Day Training Tracks (19th and 20th November 2009)
Rs.25,000/- INR
One-Day Training Tracks (19th OR 20th November 2009)
Rs.12,500/- INR

** Service Tax @ 10.3% will be charged extra.

  • ISC2 Members can avail a Special 15% discount on Conference & Training Registration.

(Please provide your ISC2 Certification ID number to avail the above Discount) For Registrations contact us at [email protected]

Exclusive Offers

- Group / Team Discounts available: Kindly contact us at [email protected]

Special University Student discount

- University Students can register for two days of conference for just Rs. 5000 (including taxes)
- Special 15 % Discounts for Training registration


Click here for details on the training courses that are available.

Who Should Attend Securitybyte & OWASP AppSec Asia Conference 2009:

  • Application Developers
  • Security Researchers
  • Application Testers and Quality Assurance
  • Penetration Testers
  • Application Project Management and Staff
  • IT Security Professionals
  • Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff
  • Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance
  • Security Managers and Staff
  • Executives, Managers, and Staff Responsible for IT Security Governance
  • IT Professionals Interesting in Improving IT Security


For student discount, attendees must present proof of enrollment when picking up your badge.

Schedule

Three parallel conference talks are scheduled for 17th & 18th November 2009 in three different halls. Training tracks have been divided in one-day tracks scheduled for 19th or 20th November 2009 and two-day tracks those are schedule to continue for two days both on 19th & 20th November 2009. Follow the tabs to learn the details on both conference and trainings.

  • Click here to view the Conference Schedule for 17th & 18th November 2009.
  • Click here to view Training Schedule on 19th & 20th November 2009.

Conference

Two Days Conference

Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel training sessions to be conducted in 3 separate halls for two days i.e . 17th & 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular session. Conference talks are being delivered by world renowned and most regarded speakers from around the world. Below is the conference schedule listing confirmed speakers and talks. Couple of talks are under review by the CFP (Call For Papers) Committee and shall be available as soon as those are confirmed. Event also follows two days of InfoSec trainings to be delivered in association with SANS, ISC2 and other organizations.

 

Where > Conference Hall 1   Conference Hall 2   Conference Hall 3: 
Who > (Security Researchers & Enthusiasts) (Security Auditors, Developers, QA, Architects) (Leaders, Managers, C&S professionals)
Schedule Topic Speaker Topic Speaker Topic Speaker

Day1.gif
9:00AM   - 10:30AM Keynote Sessions
10:30AM - 11:00AM Tea break & Snacks on Exhibition Floor
11:00AM - 12:00PM Active Man in the Middle Adi Sharabani, IBM   How To Blackbox Test Almost Anything Aviram Jenik, Beyond Security  

The International State of Cyber Security, Risk

reduction in a high threat world

Howard A. Schmidt, Former Cyber Security Advisor to

the White house
12:00PM - 1:00PM Reconsidering Network Defenses or NOT ! Cedric Blancher, EADS Innovation Works

Lust 2.0 – Desire for free WiFi and the threat of the

Imposter 
Lava Kumar Kuppan, Independent Security Researcher Applications - The new cyber security frontier Mano Paul, Software Assurance Advisor (ISC)2
1:00PM    - 2:00PM Lunch
2:00PM    - 3:00PM Exploiting Firefox Extensions Roberto Suggi Liverani, Security-Assessment.com   Threat Modeling  Varun Sharma, Microsoft Corp.  

Behind the scenes at the Microsoft Security Response

Center

Dave Midturi and Suresh Venkateswaran, Microsoft

Security Response Center
3:00PM    - 4:00PM SQL Server Forensics 2.0 Kevvie Fowler, TELUS & Ringzero Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors

Nitin Kumar/Vipin Kumar, Independent Security

Researchers, Nvlabs

Business Case-Risk Management/Compliance at leading

Education Group at AMITY
Dr J.S Sodhi, AMITY
4:00PM    - 4:30PM Business Continuity Case Study Venkataram Arabolu, BSI Usability and Privacy in Security Ponnurangam Kumaraguru, IIIT 
4:30 PM   - 5:30 PM Tea break & Snacks on Exhibition Floor
7:00PM    - 10:00PM India Technology Leadership Summit 2009 (Exclusive by invitation only) -" Information Security Concerns for Offshoring"
 
Where > Conference Hall 1   Conference Hall 2   Conference Hall 3: 
Who > (Security Researchers & Enthusiasts) (Security Auditors, Developers, QA, Architects) (Leaders, Managers, C&S professionals)
Schedule Topic Speaker Topic Speaker Topic Speaker

Day2.gif
9:00AM   - 10:00AM Round Table with Speakers / Industry Panel - "Security Today & Tomorrow'
10:00AM - 10:30AM Tea break & Snacks on Exhibition Floor
10:30AM - 11:30AM Ten Things Web Developers Still Aren't Doing Frank Kim, ThinkSec Consulting   SANS Dshield Webhoneypot Project Jason Lam, Independent Security Researcher  

Critical Infrastructure Security “Danger Without

borders” 
John Bumgarner, US Cyber Consequence Unit (USCCU)
11:30AM - 12:30PM Cloud Hacking – Distributed Attack & Exploit Platform Shreeraj Shah, Blueinfy Solutions Testing JSON Applications For Security Holes Aviram Jenik, Beyond Security

Critical Infrastructure Security “Danger Without

borders” 
John Bumgarner, US Cyber Consequence Unit (USCCU)
12:30PM  - 1:30PM Lunch
1:30PM    - 2:30PM

All Your Packets Belong to Us - Attacking Backbone

Technologies 
Daniel Mende, Security Researcher, ERNW   Risk based Penetration Testing

K. K. Mookhey, Founder & Principal Consultant, NII

Consulting
  Wi-Fi security: the good, the bad and the ugly Cedric Blancher, EADS Innovation Works
2:30PM    - 3:30PM Xprobe3 - What's New? Going Application Level Fyodor Yarochkin, Armorize OWASP SAMM Pravir Chandra, OWASP Do you wanna Play a Game Game theory and Cyberwar Bryan K. Fite, HackSecKlahn
3:30PM-4:00PM Tea break & Snacks on Exhibition Floor
4:00 PM   - 5:00PM Rumbling Infections – Web Malware Ontology Aditya K. Sood, COSEINC    Hacking Oracle From Web Sid, Independent Security Researcher   Connected Information Security Framework Anil Kumar Chintala, Microsoft
5:00PM    - 5:30PM Closing Remarks by Organizing Committee

Trainings

Two Day Trainings

Two days post-conference are dedicated towards best-of-breed trainings being conducted in association with SANS, ISC2 and other organizations. Trainings tracks have been made available as One-Day tracks and Two-Day tracks scheduled for 19th & 20th November 2009.


Day 1 - 19th Nov, 2009 Day 2 - 20th Nov, 2009
Course ID Course Duration

(# of Days)

Course Title Instructor Course ID Course Duration

(# of Days)

Course Title Instructor
One Day Training Tracks
SB1DHSO 1 Day
ORACLE Hacking & Security
Sumit Sidharth,
Sb logo.png

SB1DAWH 1 Day
Advanced Web Hacking -Securing AJAX, RIA & SOA
Shreeraj Shah
Blueinfy logo.png

SB1DAFT
1 Day
Advanced Forensics Techniques
Dr. Chandrasekhar Umapathy,
Sb logo.png

SB1DIAT
1 Day
In-depth Assessment Techniques: Design, Code, and Runtime

Fydor Yarochkin,

Logo Armorize.JPG

Two Day Training Tracks
SB2DNST 2 Days
Building advanced Network Security Tools
Daniel Mende,
Ernw logo.png
 
SB2DNST 2 Days
Building advanced Network Security Tools
Daniel Mende,
Ernw logo.png
 
SB2DCBC 2 Days
(ISC)2 CSSLP CBK Boot camp
Mano Paul,
Isc logo.png
 
SB2DCBC 2 Days
(ISC)2 CSSLP CBK Boot camp
Mano Paul,
Isc logo.png
 
SB2DSCJ / SANS Course ID : DEV530 2 Days Essential Secure Coding in Java / JEE
Sans logo.png
 
SB2DSCJ / SANS Course ID : DEV530 2 Days Essential Secure Coding in Java / JEE
Sans logo.png
 
SB2DWPT / SANS Course ID : DEV538 2 Days Web Application Pen Testing Hands-On Immersion
Sans logo.png
 
SB2DWPT / SANS Course ID : DEV538 2 Days Web Application Pen Testing Hands-On Immersion
Sans logo.png
 
SB2DSAB / SANS Course ID : AUD429 2 Days IT Security Audit Essentials Bootcamp
Sans logo.png
 
SB2DSAB / SANS Course ID : AUD429 2 Days IT Security Audit Essentials Bootcamp
Sans logo.png
 


Venue

Four Days Event is planned out at:

Hotel Crowne Plaza,
Site - 2, Sector - 29,
Gurgaon-122001 (National Capital Region), India
Hotel Front Desk: 91-124-4534000
Hotel Fax: 91-124-4304800

Sponsors


Sponsor1.JPG Sponsor2.JPG

Hotel & Travel

Hotel Stay & Travel Information

To help our valued delegates with Hotel and Travel services, we have negotiated with some of the best and Budget Category Guest houses in Gurgaon that are located within a radius of 3 - 4 Kms from the venue.

Limited cheaper accommodation is available near the venue hotel in budget hotels/apartments area. The tariff of these hotels ranges from Rs.2000 onwards per room night (inclusive of Room Rent, Breakfast and Luxury Tax). Interested delegates / students can send a formal request for the desired accommodations and dates to our official travel agent.


OFFICIAL TRAVEL AGENT

Dreamz conference Management Pvt.Ltd will look after your hotel accommodation in Gurgaon and New Delhi, pre & post conference tours / travel needs in India for delegates and visitors independently. If you wish to go for sightseeing tour within New Delhi and around it to places like Agra, Jaipur, Rajasthan etc. However, we would encourage you to make early bookings which will be done on “first – come - first service” basis and let us know of your interest, since that would ultimately work in your favour. Early reservation is strongly recommended as November being a high demand period for hotels in Gurgaon.


For further details please contact:

DREAMZ CONFERENCE MANAGEMENT PVT.LTD

406, Ansal’s Majestic Tower, Vikas Puri, New Delhi – 110018

Tel: 91 – 11 – 41586401, 402, Fax: 91 – 11 – 41586400

Email: [email protected] / [email protected]

Website: www.dreamztravel.net

Contact Person: Jitin Batra ( +91 9810558569 )



Capture the Flag

HackHunt 2009

India's foremost Hacking Challenge

Your Shot to the Title of India's best hacker along with Prize money of more than Rs 150,000 up for grabs!


Search for India’s Best Ethical Hacker

HackHunt is India’s leading hacking competition and aims at awarding the best ethical hackers in the country. The competition is brought to you by Appin Security Group, a leading Information Security and Ethical Hacking Company and Securitybyte, a global Information Security Conference Company.

The competition will be conducted in 3 phases. The 1st two rounds will be online and the 3rd and final round will take place at“Securitybyte & OWASP Appsec Asia 2009” on November 17, 2009at Crowne Plaza, Gurgaon.

Level 1 – Knowledge Check All the participants will be answering a quiz and based on the score top 10% will be shortlisted to 2nd round.

Level 2 – Skill Check This stage will require an attacker to get to the final FLAG file which he/she would need to register for the event.

Level 3 – Final Round This stage will require the attackers to exploit a pre-announced SSID which has WPA (or wpa 2).


To participate and for more details visit website :- http://www.hackerscouncil.org/

PacketWars

First time in India brought to you by Securitybyte!
About PacketWars

PacketWars is an intense, real-time information warfare simulation. Unlike other “capture the flag” games, the battlegrounds featured in PacketWars use the same software and hardware you would encounter in the real world.

PacketWars is designed to operate like a sport. Think Formula One Racing meets professional golf with a dash of Ultimate Fighting thrown in for good measure. Serious fun!

Visit http://packetwars.com/ for more details. How To Play?

PacketWars is a Sport like nothing you have ever experienced! Games known as “BATTLES” pit individual players and teams against each other in a race to achieve defined objectives.

The rules of engagement are simple: - Illegal activity of any kind is prohibited - Protect yourself at all times - Battles are designed to be of a low, medium or high difficulty level based on the battle objectives and battle duration - Primary, Secondary and Tertiary objectives are defined and assigned points based on difficulty - Battles have time limits and other defined constraints - Constraints are sometimes known to the combatants and other times are not - Anything that is not expressly prohibited is allowed - Points are awarded for FLARE

Equipment Needed: - Most combants use a notebook and a BackTrack CD however you are only limited by your imagination and bank account - You need a battle field and a PacketMaster…Oh yeah, skillz come in handy also!How To Play

<b.How can I participate?</b>
PacketWars to be held at the Hotel Crowne Plaza, Gurgaon on Nov 17 & Nov 18, 2009. Participation is FREE! Schedule will be announced soon.

WebWar III

About Hackers attack, coders defend, when you get them together you end up with Web War III. WWIII is designed to put your Web Application attack and defense skills to the test.

Teams Each team consists of two players, an attacker and a defender. The attacker would be capable of identifying Web Application Vulnerabilities (OWASP Top 10). The defender would be capable of writing secure Java code.


Game Format

The game has two stages:

Stage 1: Each team is given a VM Ware image containing a web server hosting a vulnerable web application. During this stage each team identifies the vulnerabilities in their application. They try to fix the identified vulnerabilities by making code changes.

Stage 2: The IP addresses of the Web Server's of all the teams is announced. Each team looks for vulnerabilities in the Web Applications of the other teams. Vulnerabilities found on the opponents' application get positive points. Vulnerabilities found by the opponents on your application get negative points.

Team with the highest points at the end of Stage 2 wins.

Tools and Equipments

Each team should bring their own laptop with VM Ware installed. The attacker can use any tools they bring. The applications come with ESAPI to help the defenders fix the code quicker.

Leadership Summit 2009

India's top technology thought leaders coming together to discuss "Security concerns in off-shoring"

Honored Guests
-Honorable Former President of India, Dr. A.P.J Abdul Kalam to inaugrate the Leadership Summit 2009.
-Prof. Howard A. Schmidt(Advisor, NIST; Former Vice Chair - President’s Critical Infrastructure Board; Former Special Advisor – Cyberspace Security for White House)
-Mr. Hord Tipton, Executive Director (ISC)2

About the Event
An elite gathering of 200 technology leaders, decision makers & InfoSec experts from leading service providers, government agencies and various industry verticals.
Two hours of panel discussions between three panels of 12 distinguished industry experts representing outsourcing companies, service providers and the regulatory bodies. Panel discussions will be followed by networking dinner & cocktails.

Prof Howard A. Schmidt (Advisor, NIST; Former Vice Chair - President’s Critical Infrastructure Board; Former Special Advisor – Cyberspace Security for White House) will facilitate the panel discussions. Thought leaders participating in the panel discussions are:

Outsourcing Organizations
Mr. Raghavendra Vaidya, CIO - GE Capital India
Mr. CRN Vairavelu, VP - Ford Technology Services India
Mr. Pankaj Agrawal, CISO - Aircel Limited
TBD

Service Providers
Mr. Terry Thomas, Partner - Ernst & Young
Mr. Debashis Ghosh, Head (LS&H ISU) - Tata Consultancy Services
Mr. Sunil Gujral, EVP & CTO - Quatrro
Mr. Sunil Goyal, COO - Sopra group

Regulatory Bodies
Dr. Kamlesh Bajaj, CEO - DSCI (a NASSCOM initiative)
Dr. Gulshan Rai, Director - CERT-in
Mr. Hord Tipton, Executive Director - ISC2 (ex CIO, US Department of Interior)
Mr. Vakul Sharma, Lawyer - Supreme Court

The event is exclusive to industry leaders and is by private invitation only. If you are interested in attending the event, please email your business card to [email protected] This e-mail address is being protected from spambots.

Venue - Hotel Crowne Plaza, Gurgaon | Timings - 5:30PM - 9:00PM

Please contact Chair - OWASP India for sponsorship opportunities.

Category: OWASP India