OWASPindia 2012 Aug. 24, 2012 to Aug. 25, 2012, Gurgaan, India

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
The Rising Cyber Threats to Economy & National Security Dhruv Soi , Sarah elizabeth Baso Cloud computing provides a host of benefits to organizations including areas like new or extended ...
Global Cyber Diplomacy Model Shri. alok Vijayant N/A
Closing Address Nitin Saxena N/A
The Risk of Cloud Security Atul Gupta N/A
CIOs Missing Agenda Getting the end-point Security Right! K. K. Mookhey Often in the focus to secure sensitive data, an aspect that tends to get ignored ...
International approaches to critical information infrastructure protection James Clarke Critical infrastructures (CI) have become the central nervous system of the economy in all countries ...
The Magic of Passive Web Vulnerability Analysis Lavakumar Kuppan In a penetration test the focus of the tester is usually on the offensive techniques. ...
From AppSec to MalSec: Malware Hooked, Criminal Crooked Alok Gupta Malware is everywhere and will continue to spread. Over the years, malware has infected every ...
Find me if you can Smart fuzzing and discovery! Shreeraj Shah Vulnerability would say “find me if you can”. This problem can be solved by using ...
Accelerating Cyber Security using GPUs Affordable super computing engines infrastructure protection Manish Bali The future of processing is Parallel. Over the last decade, although not truly general-purpose processors, ...
Public exploit held private Penetration Testing the researchers way Tamaghna Basu This talk is about how to solve practical challenges faced during pen-testing and exploits. Will ...
Cyber Forensics Investigating the Digital World Jayant Saran With the rising cyber threats and increasing sophistication of new cyber attacks, an effective cyber ...
Mobile Application Security Effective methodology, efficient testing! Hemil Shah Getting tired of hearing too much about mobile application security? This talk will act like ...
Real-Time Evaluation of National Network Exposure to Emerging Threats Fyodor Yarochkin This paper is real-world case study of national network exposure to emerging Internet threats. The ... Security