SecurityByte OWASP Conference Tracks


 * Xprobe3 - What's New? Going Application Level - Fyodor Yarochkin, Guard-info
 * Client Side Hacks - Dino Covotsos, Telspace Systems
 * Critical Infrastructure Security “Danger Without borders” - John Bumgarner, US Cyber Consequence Unit (USCCU)
 * Exploiting Firefox Extensions - Roberto Suggi Liverani, Security-Assessment.com
 * Cloud Hacking – Distributed Attack & Exploit Platform - Shreeraj Shah, Blueinfy Solutions
 * SQL Server Forensics 2.0 - Kevvie Fowler, TELUS & Ringzero
 * Sectors Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors - Nitin Kumar/Vipin Kumar, Independent Security Researchers, NVlabs
 * Testing JSON Applications For Security Holes - Aviram Jenik, Beyond Security
 * How To Blackbox Test Almost Anything - Aviram Jenik, Beyond Security
 * Topical Issues Affecting The Threat Landscape - Prevalence Of Web Threats - Joshua Talbot, Symantec Corp.
 * “Do You Want To Play A Game?”: Game Theory And Simulated Cyber War - Bryan K. Fite, Symantec Corp.
 * Hacking Oracle From Web - Sid, Independent Security Researcher
 * TBD - Mano Paul, Software Assurance Advisor (ISC)2
 * TBD - Howard A. Schmidt, Former Cyber Security Advisor to the White house; Former Strategic Advisor – President’s Critical Infrastructure Protection Program
 * Based Attacks) Hacking Mobile Wallet/Mobile Banking Systems, OR Anti Forensics (OSX Based Attacks) - The Grugq, Independent Security Researcher
 * Advanced Web Hacking - TBA
 * Data Loss Protection - ER, Independent Security Researcher
 * Microsoft SDLC - TBA, Microsoft Corp.
 * Reconsidering Network Defense - Cedric Blancher, EADS Innovation Works
 * Source code review vs. Penetration testing - K. K. Mookhey, Founder & Principal Consultant, NII Consulting

Category: SecurityByte And OWASP Asia AppSec Conference 2009