Insider Threat: Identifying Your Insider
Thiru Annadorai, Principal Consultant,Risk & Compliance, Security, MindTree
Real Security for Server Virtualization
Rajiv Motwani, Manager, Product Security Engineering at Citrix R&D India
The Changing Face of Endpoint Security
Varadarajan Kannan, Regional Manager, Symantec
Network Access Technology: How to Manage Your IT Infrastructure
Prasanna Bhaskaran, Security Consultant, Check Point Software Technologies
Responding to a Wireless Attack on Your Network
Nilanjan De, Co-founder & CTO,iViZ
Securing Remote Access With SSL VPNs: A Best Practice Primer
Sikhi Gundu and Kartik Kumar, Juniper Networks India
A New Security Blueprint
Shantanu Ghosh, Vice President, Enterprise Security & India Product Operations
Track B: Web Security
Strategy for Defense Against Web-based Advanced Persistent Threats
Anand Tapikar, Regional Presales Manager, Websense
Social Networks: Minimizing the Risks of the New Frontier
Venkat Krishnapur, Senior Director and Head, Consumer Engineering Group, McAfee
Google and Beyond: Advanced Search Engine Hacking and Web-Based Intelligence Gathering
Manish Kumar, Founder & CEO, Rooman Technologies
Information Warfare – A cloud based and conventional approach
Manu Zacharia , Director - Information Security, Millennium Consultants
Cloud Computing: Usage and Risks
Kartik Sahani, Country Manager, RSA India & SAARC, RSA- The Security Division of EMC
Server-side Verification of Client Behavior
Sanjeev Kumar Verma , Project Manager, Paladion
Securing your Web Applications
Subbaraju Uppalapati , Manager - Identity and Security Team, Novell
Identity As A Service
Vinod Muniyappa , Practice Head - Application Security, Wipro Technologies