Tentative Program - February 12, 2016

EMC Workshop, 1400 - 1700 hrs
Web Applications Attack and Defence, 1400 - 1700 hrs
Dissecting Anti Viruses, 1400 - 1700 hrs
Privacy Framework Implementation and Risk Assessment, 1445 - 1700 hrs


Tentative Program - February 13, 2016

Time Description Venue
0900 - Registration Outside C01
0945 - 1000 Introduction by Prof. PK C01
1005 - 1045 Keynote 1
Speaker: Dr. Rajendra S Pawar, NIIT
Cyber Security - The Indian Approach
Session Chair: Dr. Rahul Purandare
C01
1050 - 1120 Speaker: Mr. Samavedam Sarma, CERT-In
Current Cyber Security Incident Trends
Session Chair: Dr. A V Subramanyam
C01
1125 - 1145 Photo session and Coffee break Glass enclosure, Ground floor
1150 - 1230 Keynote 2: Concepts and Technologies for Cyber Defense
Speaker: Dr. G. Athithan, Chief Controller, DRDO
Session Chair: Prof. Pankaj Jalote
C01
1235 - 1330 Paper Presentation
Session Chair: Prof. Dheeraj Sanghi
C01
1330 - 1530 Lunch
Poster Session
Session Chairs: Dr. A V Subramanyam
Ms. Anuradha Gupta
Networking Session
Lobby area, Ground floor
1535 - 1605 Invited Talk 2
Speaker: Prof. Rahul Banerjee, BITS Pilani
Security and Privacy Issues in Wearable and Vehicular Computing Systems
Session Chair: Dr. Puneet Goyal
C01
1610 - 1640 Invited Talk 3
Speaker: Ms. Sunila Menon, EMC
Identifying Malware designed for Deception
Session Chair: Dr. Sambuddho Chakravarty
C01
1645 - 1715 Invited Talk 4
Speaker: Mr. Amit Patil and Sachin Vaidya, VMWare
Security - The need for separate trust domains and techniques for effective response
Session Chair: Ms. Anuradha Gupta
C01
1720 - 1730 Concluding Remarks: Prof. PK C01


Accepted Posters

You will be provided with a poster board of size 36 inch X 48 inch. Please bring your printed poster, with maximum size of 36 inch X 48 inch to the Symposium.

  1. The Anatomy of Malicious Facebook Pages
  2. Abusing Phone Numbers and Cross-Application Features for Crafting Targeted Attacks
  3. Deriving Requirements for Social Media based Community policing: Insights from Police
  4. Quantifying and Predicting Image Virality on Twitter
  5. Classification of Spam Reporters and Reportees in Twitter
  6. Deploying Low Interaction Honeypot for Darknet
  7. Quantification of Trust in Online Social Network
  8. TweetSafe – Real Time Threat Analysis on Twitter
  9. A survey Paper On Privacy Preserving Data Publishing
  10. Creation and Impact of SocialBots in Twitter
  11. Detecting Obscene Content on YouTube
  12. Epidemic Model Based Evaluation of Malware Propagation in Twitter
  13. Analysis of SQL Injection Attack on different Data models
  14. A Hybrid Intrusion Detection approach using Misuse Detection and Genetic Algorithm
  15. Vulnerability On Anonymous Networks: Your Reddit Activity Can Leave You Prone To Harassment
  16. Enhancing Security on Twitter against Third-Party Apps

EMC Workshop

WHAT: Workshop / Demo.

WHEN: 1400 - 1700hrs Feb 12, 2016

WHERE: C12, Academic Building, IIIT Delhi

WHO / ORGANISERS: Mr. Vignesh Rabindran, EMC team from Bengaluru

Title: Workshop on Advanced Threat Detection
Description: The workshop will focus on techniques employed by adversaries to conduct highly sophisticated and organized attacks on enterprise. We will look at some of the common evasion and attack techniques they use to subvert commonly deployed security controls in an enterprise. We will then discuss counter measures that can help mitigate them. We will see that advanced security controls need much more than just technology to be a deterrent.

Register here

Web Applications Attack and Defence

WHAT: Workshop / Demo.

WHEN: 1400 - 1700hrs, Feb 12, 2016

WHERE: C01, Academic Building, IIIT Delhi

WHO / ORGANISERS: Vaibhav Gupta From Adobe / Null & OWASP Delhi Chapter, Sandeep Singh from ESSEL Group / Null & OWASP Delhi Chapter

WHO SHOULD ATTEND: Aspiring/working software developers/QEs, IT security professionals/enthusiasts

Title: Web Applications Attack and Defence

Description: This would be a demo based session focused on top application security threats prevailing in the market. This workshop will be covering top 3-4 vulnerabilities in details and will walk through the attack scenarios and defending code that will be instrumental for developers/testers and security professionals in securing their applications. Participants are encouraged to bring their laptop, however, it is not compulsory.

Register here

Dissecting Anti Viruses

WHAT: Workshop / Demo.

WHEN: 1400 - 1700hrs, Feb 12, 2016

WHERE: C11, Library Building, IIIT Delhi

WHO / ORGANISERS: Mr. Ram Ganesh, Cyber Eye Research Labs

Title: Dissecting Anti Viruses

Description: The workshop will be mainly focused on delving into internals of working of Anti Viruses, commonly used evasion techniques in real time, current state of anti virus software and its limitations. This would include a demo and real time utilities for use on day to day basis. The workshop will enable participants to gain an understanding of limitations and challenges of anti viruses and also instrumental in giving insights into additional security measures along with anti viruses catering to latest threats.

Register here

Privacy Framework Implementation and Risk Assessment

WHAT: Workshop / Demo.

WHEN: 1445 - 1700hrs, Feb 12, 2016

WHERE: Board Room, Academic Building, IIIT Delhi

WHO / ORGANISERS: Data Security Council of India

Title: Privacy Framework Implementation and Risk Assessment

Description: Privacy as concept has existed in various forms and degrees, in the history. However, the origin of information or data privacy as compliance, risk management, and operational concern has been more recent. This new field, and the professionals who work within it—the privacy profession— did not exist broadly until the past decade. At the dawn of the 1990s there were a series of industries starting to experience greater risks associated with data collection and processing. As a result, these industries began to develop greater expertise in privacy management and risk mitigation. Most notably, telecom, health, information technology, consumer reporting, and data brokerages were beginning to assign employees to the task of managing privacy. As the role of privacy grew within these organizations the need for a leader—a professional within the organization who could oversee privacy as a compliance, government affairs, and operational concern—became more apparent. Driven by exponential growth in cloud, mobility and big data analysis in the digital age, privacy has become an important issue that companies must address as a core part of doing business. When faced with increasing levels of regulatory scrutiny on corporate privacy practices and growing consumer concern for protecting their personal information, companies find themselves grappling with managing a complex set of privacy requirements and expectations. Just as companies evolve their business to take advantage of new technology trends, they are challenged with reconciling the privacy concerns that come with them. Companies are hiring professionals to help them decode the challenges related with data collection and privacy. Not surprisingly customers are now lobbying behind organizations to be more transparent in the way their information is managed and secured. Moreover, regulatory bodies are also realizing the need to provide adequate protection to consumers to safeguard their privacy. The question however is how soon this growing need of privacy professional will be fulfilled? How can organizations ensure that privacy professionals are equipped with adequate tools and know-how to steer the organization through these challenges.

Schedule:
1445 - 1500: Keynote address, Mr. Vinayak Godse, Senior Director - Data Protection, DSCI
1500 - 1530: Changing Global & Domestic Privacy Regime & Growing Privacy Profession and Skills Requirement, Mr. Rahul Sharma, Sr. Consultant, DSCI
1530 - 1550: Break
1550 - 1600: Privacy quiz / puzzle
1600 - 1620: Privacy Framework Implementation and Risk Assessment, Industry expert
1620 - 1700: Organizational Liability and Legal Obligations, Industry expert
1700 - 1715: Q&A

Register here