August 3-4, 2012
Trivandrum, India

 International Cyber Security and Policing Conference



Agenda
  • Track 1
  • Track 2

Day 1


FROMTOTOPICSBY
8:30
9:15
Registration
9:15
9:45
Opening Ceremony
9:45
10:30
Key Note AddressDr Shashi Tharoor
10:30
11:00
TEA BREAK
11:00
11:30
New Issues In The Internet & Challenges To Law EnforcementLoknath Behera IPS (NIA), New Delhi.
11:30
12:00
Mobile Applications for Law EnforcementLishoy Bhaskar, Vice President, MobME Wireless solutions
12:00
12:30
Public – Private Participation in combating Cyber CrimeMohamed Shihab, (Advisor (Technical) (IMPACT)
12:30
13:00
Autonomy- A Effective tool for Digital InvestigationShashank Agrawal (Autonomy, an HP Company)
13:00
14:00
NETWORKING LUNCH
14:00
14:45
Panel DiscussionDr Rama K Subramaniam
14:45
15:00
Ensuring Cyber Security for the state of JharkhandVineet Kumar (CTO, CDRC)
15:00
15:30
Digital ForensicsBhadran V K, C-DAC
15:30
15:45
TEA BREAK
15:45
16:15
Cyber WeaponsSameer Saxena, Mahindra Special Services Group / Head – IAHS Academy
16:15
16:45
Data SecurityS Bhansali, ICICI Bank
16:45
17:15
Alok Vijayant, NTRO, PMO


Day 2


FROMTOTOPICSBY
8:309:00
9:009:30Key Note Address 2Dr. Frederick Wamala
9:3010:00"Social Network Analysis and the War on TerrorHormis Tharakan IPS Former Director, RAW
10:0010:30Integrated Dial 100 System for Law EnforcementR Srikumar IPS (Member, Central Vigilance Commission)
10:3010:45
TEA BREAK
10:4511:30Nandkumar Saravade (Director, Citi Security and Investigative Services - South Asia)
11:3012:00Digital Response solution for Disaster ManagementXminds Pvt Limited
12:0012:30Making a Secure Data CentreArvind Seshadri, HP
12:3013:00Hacktivism, Anonymous & Security DecodedC N Shashidhar
13:0014:00
NETWORKING LUNCH
14:0014:30Impact of cyber laws on various stakeholdersAdv. Sagar Rahurkar
14:3015:00Early Teens and Influence of Cyber Space Basil Solomon, CISO, UST Global
15:0015:30Control Room IntegrationVinay Vashishta RBH
15:3015:45
TEA BREAK
15:4516:15OSINT: Open Source Intelligence for fighting cyber crime & cyber warRohit Srivastwa
16:1517:00Matthew W. Stephan
17:0017:30Closing Ceremony

Day 1


FROMTOTOPICSBY
8:30
9:15
9:15
9:45
9:45
10:30
10:30
10:45
TEA BREAK
10:45
11:15
The Management of Information Security – A Corporate Practitioner’s PerspectivePawan Kumar Singh (CISO, Tulip Telecom Limited)
11:15
11:30
Enterprise server securityRaghav Shandilya, CTO Ankhorus Cyber Security
11:30
12:15
Security Incidents – Avoiding the Apocalypse in 2012Asish Chandra Mishra, CISO, Tesco HSC
12:15
13:00
A model to reduce information security risks due to human errorAnup Narayanan, First Legion Consulting
13:00
14:00
NETWORKING LUNCH
14:00
14:40
I haz you and pwn your maalHarsimran Walia, McAfee
14:40
15:00
Satish Babu, Director, ICFOS
15:00
15:30
Business Continuity and Risk Management in Turbulent TimesMr. Venkataram Arabolu, MD, British Standards Institution
15:30
15:45
TEA BREAK
15:45
16:00
Contemporary Transcription and Resource ParasitismArpit Patel, Sneh Vyas
16:00
16:45
Evil JavaScriptBishan Singh Kochar, Yahoo


Day 2


FROMTOTOPICSBY
8:30
9:00
Registration
9:00
9:30
9:30
10:00
Building Security Incident Detection & Handling Capabilities in Enterprises Sunil Varkey-Head:IS,IDEA
10:00
10:30
The Weakest Link - Reinforcing the Human ElementSandeep Godbole, Syntel
10:30
10:45
TEA BREAK
10:45
11:30
Cracking the Mobile Application Source CodeSreenarayan A, Paladion Networks
11:30
12:15
WebApp Remote Code Execution using Server Side Scripting EnginesRahul Sasi, iSIGHT partners
12:15
13:00
Easy Money with UI-RedressingAmol Naik, Persistent Systems Ltd
13:00
14:00
NETWORKING LUNCH
14:00
14:30
Anant Shrivastava (Infosys) & Ankur Bhargava (IBM)
14:30
15:00
Layer 8 Exploitation: A threat to National SecurityAakash Kumar Goel, Ahamed Saleem, C-DAC
15:00
15:30
Prashant KV, Infosys
15:30
15:45
TEA BREAK



Home   |   Venue  |  Speakers  |  Agenda  |  Workshops  |  Events  |  Register  |  Faq  |  Contact

© Information Security Day. All Rights Reserved.