Securitybyte and OWASP AppSec Asia Conference 2009 comprised of three parallel training sessions conducted in 3 separate halls for two days, the 17th & 18th November 2009.  Below are the links to the presentations.

Where > Orchid Tulip I Tulip II & Tulip III
Who > (Security Researchers & Enthusiasts) (Security Auditors, Developers, QA, Architects) (Leaders, Managers, C&S professionals)
Schedule Topic Speaker Topic Speaker Topic Speaker
9:00AM - 10:30AM Keynote Sessions
10:30AM - 11:00AM Tea break & Snacks on Exhibition Floor
11:00AM - 12:00PM Active Man in the Middle Adi Sharabani, IBM How To Blackbox Test Almost Anything Aviram Jenik, Beyond Security The International State of Cyber Security, Risk reduction in a high threat world Howard A. Schmidt, Former Cyber Security Advisor to the White house
12:00PM - 1:00PM Wi-Fi security: the good, the bad and the ugly Cedric Blancher, EADS Innovation Works Lust 2.0 – Desire for free WiFi and the threat of the Imposter Lava Kumar Kuppan, Independent Security Researcher Applications - The new cyber security frontier Mano Paul, Software Assurance Advisor (ISC)2
1:00PM - 2:00PM Lunch
2:00PM - 3:00PM Xprobe3 - What's New? Going Application Level Fyodor Yarochkin, Armorize Threat Modeling Varun Sharma, Microsoft Behind the scenes at the MSRC Dave Midturi and Suresh Venkateswaran, MSRC
3:00PM - 4:00PM Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors Nitin Kumar/Vipin Kumar, Independent Security Researchers, Nvlabs Business Case-Risk Management/Compliance at AMITY Dr J.S Sodhi, AMITY State and Non-state Actors Jeffrey Carr, GreyLogic
4:00PM - 4:30PM     Business Continuity Case Study Venkataram Arabolu, BSI Usability and Privacy in Security Ponnurangam Kumaraguru, IIIT
4:30 PM - 5:30 PM Tea break & Snacks on Exhibition Floor
7:00PM - 10:00PM India Technology Leadership Summit 2009 (Exclusive by invitation only) -" Information Security Concerns for Offshoring"
Where > Orchid Tulip I Tulip II & Tulip III
Who > (Security Researchers & Enthusiasts) (Security Auditors, Developers, QA, Architects) (Leaders, Managers, C&S professionals)
Schedule Topic Speaker Topic Speaker Topic Speaker
9:00AM - 10:00AM Round Table with Speakers / Industry Panel - "Security Today & Tomorrow'
10:00AM - 10:30AM Tea break & Snacks on Exhibition Floor
10:30AM - 11:30AM Ten Things Web Developers Still Aren't Doing Frank Kim, ThinkSec Consulting SANS Dshield Webhoneypot Project Jason Lam, Independent Security Researcher Critical Infrastructure Security “Danger Without borders” John Bumgarner, US Cyber Consequence Unit
11:30AM - 12:30PM Cloud Hacking – Distributed Attack & Exploit Platform Shreeraj Shah, Blueinfy Solutions Testing JSON Applications For Security Holes Aviram Jenik, Beyond Security Critical Infrastructure Security “Danger Without borders” John Bumgarner, US Cyber Consequence Unit
12:30PM - 1:30PM Lunch
1:30PM - 2:30PM From Russia With Love Fyodor Yarochkin, Armorize Risk based Penetration Testing K. K. Mookhey, Founder & Principal Consultant, NII Consulting Reconsidering Network Defenses or NOT ! Cedric Blancher, EADS Innovation Works
2:30PM - 3:30PM Zer0 Days live demo, Exploiting Firefox Extension Roberto Suggi Liverani, Security-Assessment.com SQL Server Forensics 2.0 Kevvie Fowler, TELUS & Ringzero Do you wanna Play a Game Game theory and Cyberwar Bryan K. Fite, HackSecKlahn
3:30PM-4:00PM Tea break & Snacks on Exhibition Floor
4:00 PM - 5:00PM Rumbling Infections – Web Malware Ontology Aditya K. Sood, COSEINC Hacking Oracle From Web Sid, Independent Security Researcher   Introduction to Web Protection Library Anil Kumar Chintala, Microsoft
5:00PM - 5:30PM Closing Remarks by Organizing Committee