Track A: System & Network Security

Insider Threat: Identifying Your Insider
Thiru Annadorai, Principal Consultant,Risk & Compliance, Security, MindTree

Real Security for Server Virtualization
Rajiv Motwani, Manager, Product Security Engineering at Citrix R&D India

The Changing Face of Endpoint Security
Varadarajan Kannan, Regional Manager, Symantec

Network Access Technology: How to Manage Your IT Infrastructure
Prasanna Bhaskaran, Security Consultant, Check Point Software Technologies

Responding to a Wireless Attack on Your Network
Nilanjan De, Co-founder & CTO,iViZ

Securing Remote Access With SSL VPNs: A Best Practice Primer
Sikhi Gundu and Kartik Kumar, Juniper Networks India

A New Security Blueprint
Shantanu Ghosh, Vice President, Enterprise Security & India Product Operations

Track B: Web Security

Strategy for Defense Against Web-based Advanced Persistent Threats
Anand Tapikar, Regional Presales Manager, Websense

Social Networks: Minimizing the Risks of the New Frontier
Venkat Krishnapur, Senior Director and Head, Consumer Engineering Group, McAfee

Google and Beyond: Advanced Search Engine Hacking and Web-Based Intelligence Gathering
Manish Kumar, Founder & CEO, Rooman Technologies

Information Warfare – A cloud based and conventional approach
Manu Zacharia , Director - Information Security, Millennium Consultants

Cloud Computing: Usage and Risks
Kartik Sahani, Country Manager, RSA India & SAARC, RSA- The Security Division of EMC 

Server-side Verification of Client Behavior
Sanjeev Kumar Verma , Project Manager, Paladion

Securing your Web Applications
Subbaraju Uppalapati , Manager - Identity and Security Team, Novell

Identity As A Service
Vinod Muniyappa , Practice Head - Application Security, Wipro Technologies