exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Securitybyte / OWASP AppSec Asia Call For Papers

Securitybyte / OWASP AppSec Asia Call For Papers
Posted Jul 7, 2009
Authored by Securitybyte CFP | Site securitybyte.org

The Security Byte and OWASP AppSec Asia conference call for papers has been announced. It will be held November 17th through the 20th, 2009 in New Delhi.

tags | paper, conference
SHA-256 | 17f76a326bcdb64098fbc50142c360dcb935456b4cbb41e26afa13952a419f7d

Securitybyte / OWASP AppSec Asia Call For Papers

Change Mirror Download
Securitybyte & OWASP AppSec Asia Conference is a forum where Ethical Hackers, Practitioners, Researchers, and Developers in Information Security field, gathers to showcase and exchange new Researches, Innovations, Practical ideas and Experiences. If you are developing, researching, or implementing practical solutions to protect Corporate or Government Information Infrastructures, please consider sharing your experience and expertise at this conference.

First round of CFP submission is July 30th, 2009.
Send your interest and submissions to cfp@securitybyte.org

For any Speaking query, please contact us at speakers@securitybyte.org

We are seeking submissions for both Two days Conference Track & Post conference two days Training workshops in the following areas:

Conference Tracks (17 – 18 Nov, 2009)
You can submit your response for any the following three conference tracks

* CT 1 - Application, Database & Web Security
* CT 2 - Infrastructure Security (Network / Wireless/ Bluetooth / Malware / Forensics / Cyber- terrorism / Physical Security / Information warfare etc.)
* CT 3 - Risk Management / Compliance


Session will have to be delivered in any one of the following Session format for Conference talks:

* Coldfire Sessions (60 Minutes): These sessions are primarily core technical talks and will cover the following categories:
o Zer0 Days / Original Security Research
o Application and Database Security (All Technologies)
o Cyber Terrorism / Critical Infrastructure Issues
o Incidence Response and Defeating Incidence Response
o Electronic Device Security (Cell Phones / PDA’s etc..)
o Infrastructure Security (Wireless, Bluetooth, OS, Device etc)
o Browser Security
o Regulations (PCI, SoX 404, Clause 49 , ISO etc.)


* Rapidfire Sessions (30 Minutes): These sessions are focused around Information Security Management issues that will be addressed through:
o Business Case
o Panel Talk / Open Discussion with more than one speaker
o Upto speed (Old attack vector, new attack technique)


Please provide the following details with your submission:

* Name, title, address, email and phone/contact number
* Session Track (Developer / Application Security or Infrastructure Security or Risk Management)
* Session Format (Coldfire or Rapidfire)
* Short biography, photo, qualification, occupation, achievement and affiliations (limit 250 words).
* Summary or abstract for your presentation (limit 1250 words)
* Technical requirements (video, internet, wireless, audio, etc.)
* References (Contact name, title, email address of two conferences you have spoken at or comparable references)
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close