Agenda

TRACK A: System & Network Security

08.00AM - 09.00AM:      Registration

09.00AM - 09.40AM: Inaugural Keynote A New Security Blueprint
Shantanu Ghosh, Vice President, Enterprise Security & India Product Operations, Symantec.

10.00AM - 10.30AM: Session 1
Insider Threat: Identifying Your Insider
• The Insider Problem – An Inconvenient Truth
• Insider Threat Landscape
• Insider Threat Impact & Challenges
• The Probable Causes / Vulnerabilities
• Mitigation Strategies
Thiru Annadorai, Principal Consultant,Risk & Compliance, Security, MindTree

10.30AM - 11.00AM: Session 2
Real Security for Server Virtualization
• How to configure your virtual infrastructure servers for maximum security
• Performing patch management for your virtual server guests
• How to perform security assessments of offline virtual images
• How to monitor virtual server sprawl
• Third-party tools to help secure your virtual environment
Rajiv Motwani, Manager, Product Security Engineering at Citrix R&D India

11.00AM - 11.30AM:     Morning Break
A chance to meet up with your friends and have a cup of coffee on the house!

11.30AM - 12.15PM: Session 3
Securing the Virtual Infrastructure
• Threats to the Virtualization Stack
• Some Solutions to Secure the Virtualization Stack
Bikram Barman Senior Manager, Engineering, Products, RSA, The Security Division Of EMC

12.15PM - 01.00PM: Session 4
The Truth is on the Wire: Event Analysis and Routine Monitoring Using Network Traffic
Ajit Pillai Regional Director - India and Middle East, NIKSUN

01.00PM - 02.00PM:      Lunch
Break for lunch on the house and a chance to catch up with each other!

2.00PM - 2.30PM: Session 5
The Changing Face of Endpoint Security
Endpoint security was a strategy where software is distributed to end-user devices but centrally managed - virus and spy ware detection, full disk encryption, remote access VPN. As more of our networks become endpoint devices, managing the network is now managing the endpoint. Access Control, Identity Management, Hygiene, and Intrusion Detection are now part of a more comprehensive endpoint security strategy. This session will examine real life examples of expanded, rethought endpoint security.
Varadarajan Kannan, Regional Manager, Symantec

02.30PM - 03.00PM:       Session 6
Attacking and Defending SSL VPNs
• The many moving parts of SSL VPNs that attackers can poke, prod and compromise
• Programming and infrastructure flaws permitting abuse of the server via the HTTP protocol
• Drive-by attacks against Web-based SSL VPN clients
• Appropriate countermeasures for each possible attack
• Tools and SSL man-in-the-middle techniques that can be used to audit SSL VPN deployments
Sikhivahan Gundu, Sr. Manager, Juniper Networks
Kartik Kumar CDS, Sr. Engineer, Juniper Networks

03.00PM - 03.30PM:      Afternoon Break
Some time out for you to grab another coffee and a well earned rest.

03.30PM - 04.00PM:       Session 7
Network Access Technology: How to Manage Your IT Infrastructure
The present focus of remote access technologies is to combine and manage universal communication with VPN protocols, NAC and IAM technologies. The interaction of NAC, IAM, SSL, and IPSec VPN leads to "Next Generation Network Access Technology (NGNAT)". On the other hand, securing all your devices in real time is a must. A Modern Network Access Control solution can provide real-time data for better informed business decisions.
Prasanna Bhaskaran, Security Consultant, Check Point Software Technologies

04.00PM - 04.30PM:      Session 8
Responding to a Wireless Attack on Your Network
• Different Wi-Fi/802.11 attack techniques and case study examples
• A framework for effective incident response plan development
• Effective attack detection tools and methodologies
• Design principles that can enhance your overall wireless security profile
• Wireless audit strategies
Nilanjan De, Co-founder & CTO,iViZ

4:30PM - 5.00PM: Session 9
Intelligent Workload Management: Addressing Security & Identity Concerns
Jaimon Jose Distinguished Engineer, Novell

05:00PM:      
Conclusion