This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

SecurityByte and OWASP Asia AppSec Conference 2009

From OWASP
Revision as of 11:13, 13 November 2009 by Puneetm (talk | contribs) (Two Days Conference)

Jump to: navigation, search

Two Days Conference

Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel conference talks to be conducted in 3 separate halls for two days i.e . 17th & 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular talk. Conference talks are being delivered by world renowned and most regarded speakers from around the world. Below is the detailed schedule for the two days of conference.

Securitybyte and OWASP AppSec Asia Conference 2009 comprise of three parallel training sessions to be conducted in 3 separate halls for two days i.e . 17th & 18th November 2009. Attendees will carry the freedom to switch the halls as per their interest towards a particular session. Conference talks are being delivered by world renowned and most regarded speakers from around the world. Below is the conference schedule listing confirmed speakers and talks. Couple of talks are under review by the CFP (Call For Papers) Committee and shall be available as soon as those are confirmed. Event also follows two days of InfoSec trainings to be delivered in association with SANS, ISC2 and other organizations.

 

Where > Conference Hall 1   Conference Hall 2   Conference Hall 3: 
Who > (Security Researchers & Enthusiasts) (Security Auditors, Developers, QA, Architects) (Leaders, Managers, C&S professionals)
Schedule Topic Speaker Topic Speaker Topic Speaker

9:00AM   - 10:30AM Keynote Sessions
10:30AM - 11:00AM Tea break & Snacks on Exhibition Floor
11:00AM - 12:00PM TBD IBM   How To Blackbox Test Almost Anything Aviram Jenik, Beyond Security  

The International State of Cyber Security, Risk

reduction in a high threat world

Howard A. Schmidt, Former Cyber Security Advisor to

the White house
12:00PM - 1:00PM Reconsidering Network Defenses or NOT ! Cedric Blancher, EADS Innovation Works

Lust 2.0 – Desire for free WiFi and the threat of the

Imposter 
Lava Kumar Kuppan, Independent Security Researcher Applications - The new cyber security frontier Mano Paul, Software Assurance Advisor (ISC)2
1:00PM    - 2:00PM Lunch
2:00PM    - 3:00PM Exploiting Firefox Extensions Roberto Suggi Liverani, Security-Assessment.com   Threat Modeling  Varun Sharma, Microsoft Corp.  

Behind the scenes at the Microsoft Security Response

Center

Dave Midturi and Suresh Venkateswaran, Microsoft

Security Response Center
3:00PM    - 4:00PM SQL Server Forensics 2.0 Kevvie Fowler, TELUS & Ringzero Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors

Nitin Kumar/Vipin Kumar, Independent Security

Researchers, Nvlabs

Business Case-Risk Management/Compliance at leading

Education Group at AMITY
Dr J.S Sodhi, AMITY
4:00PM    - 4:30PM Business Continuity Case Study Venkataram Arabolu, BSI Usability and Privacy in Security Ponnurangam Kumaraguru, IIIT 
4:30 PM   - 5:30 PM Tea break & Snacks on Exhibition Floor
7:00PM    - 10:00PM

India Technology Leadership Summit 2009 (Exclusive by

invitation only) -" Information Security Concerns for Offshoring"
 
Where > Conference Hall 1   Conference Hall 2   Conference Hall 3: 
Who > (Security Researchers & Enthusiasts) (Security Auditors, Developers, QA, Architects) (Leaders, Managers, C&S professionals)
Schedule Topic Speaker Topic Speaker Topic Speaker

9:00AM   - 10:00AM

Round Table with Speakers / Industry Panel -

"Security Today & Tomorrow'
10:00AM - 10:30AM Tea break & Snacks on Exhibition Floor
10:30AM - 11:30AM Ten Things Web Developers Still Aren't Doing Frank Kim, ThinkSec Consulting   SANS Dshield Webhoneypot Project Jason Lam, Independent Security Researcher  

Critical Infrastructure Security “Danger Without

borders” 
John Bumgarner, US Cyber Consequence Unit (USCCU)
11:30AM - 12:30PM Cloud Hacking – Distributed Attack & Exploit Platform Shreeraj Shah, Blueinfy Solutions Testing JSON Applications For Security Holes Aviram Jenik, Beyond Security

Critical Infrastructure Security “Danger Without

borders” 
John Bumgarner, US Cyber Consequence Unit (USCCU)
12:30PM  - 1:30PM Lunch
1:30PM    - 2:30PM

All Your Packets Belong to Us - Attacking Backbone

Technologies 
Daniel Mende, Security Researcher, ERNW   Risk based Penetration Testing

K. K. Mookhey, Founder & Principal Consultant, NII

Consulting
  Wi-Fi security: the good, the bad and the ugly Cedric Blancher, EADS Innovation Works
2:30PM    - 3:30PM Xprobe3 - What's New? Going Application Level Fyodor Yarochkin, Guard-info OWASP SAMM Pravir Chandra, OWASP Do you wanna Play a Game Game theory and Cyberwar Bryan K. Fite, HackSecKlahn
3:30PM-4:00PM Tea break & Snacks on Exhibition Floor
4:00 PM   - 5:00PM Rumbling Infections – Web Malware Ontology Aditya K. Sood, COSEINC    Hacking Oracle From Web Sid, Independent Security Researcher   Connected Information Security Framework Anil Kumar Chintala, Microsoft
5:00PM    - 5:30PM Closing Remarks by Organizing Committee