c0c0n 2014 Aug. 22, 2014 to Aug. 23, 2014, kochi,india

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Threats & Opportunities of Big Data Analytics Hong-eng Koh N/A
Enhancing International Cooperation through the COE Convention on Cybercrime Markko Künnapu N/A
Key Note Address Apj Abdul Kalam , Abdul Kalam N/A
Raising the Bar in Global Collaboration and Private-Public Partnership Bessie Pang N/A
Management Considerations for Accreditation of International Cybercrime Professionals Raymon Velez N/A
Policy Implications for Cybercrime Policing in the Maldives Chief Inspector Ahmed Shifau N/A
ETDA’s Private-Public Collaboration in Addressing Challenges Posed by Self-Regulation of Online Communities, and Legal and Policy Issues Relating to Electronic Transactions Chaichana Mitrpant N/A
Making and breaking security in embedded devices Yashin Mehaboobe N/A
Risk Assessment - the Cornerstone of Information Security Gerhard Steinke N/A
APT: Case Study of attackers targeting public tendering Rahul Sasi N/A
Terrorist and criminal groups never surrender, French secret services neither. Explanations on real cases by a man who has worked more than ten years on operational cyber-cases David Baptiste , P1g3on N/A
Idle Machines doing Bounty Hunting (Behind your Back) Mrityunjay Gautam N/A
TBA Justin Searle N/A
National Cyber Security Policies and Initiatives in Malaysia. Sazali Sukardi N/A
NPA's National Counter Cybercrime Measures and Policy Implications Ryota Komoto N/A
Nigeria's Response to ICT Challenges in the Digital World Mohammed Ukashatu N/A
Implications of Colombia’s National Policy on Cybersecurity and Cyberdefense upon Cybercrime Investigations Alex Duran Santos N/A
Legal Considerations in Cybercrime Prosecution Donn Hoffman N/A
Task Force Argos and Policy Implications for International Cooperation Christopher Creedon N/A
My tryst with Source Code Review Anant Shrivastava N/A
The Curious Case of ProtoBufs - Demystifying Google's hottest binary protocol Prasanna Kanagasabai , Jovin Lobo N/A
Exploiting NoSQL Like Never Before Francis Alexander N/A
Breaking and Securing Mobile Apps - Automagically Aditya Gupta N/A