Date

November 26, 2015

Location

Bangalore

Remaining

100 Tickets

Speakers

6+ Professional Speakers

What's about event

The IT Security and Ethical Hacking Conference - 2015 will be a unique event in Bangalore, where the best of minds in the hacking world and the IT Security experts, leaders in the information security industry and the cyber community along with the professionals on cyber security meet face-to -face to join their efforts to co-operate in addressing the most topical issues of the Internet Security space..

This will be the Second edition of the Conference. The Conference will be held in Bangalore, on 26th November, 2015 and will get together industry leaders, Academia and ethical hackers, IT Security experts to share knowledge and leading-edge ideas about information security and everything related to it.

The daylong event, will be directed towards managing and securing digital information and will have participants from different fields who will address key issues of information technology. Technical Speakers will present on 0-Day Vulnerabilities, Exploits Hacks, Internet Censorship and National Security Issues etc.

Register

IT Security Champions League

IT Security Champions League is an initiative of Ethical Hacking and UNICOM to run India's most prestigious Corporate Quiz on Ethical Hacking.

REGISTER | LEARN | COMPETE | WIN

Conference or Event Schedule / dont forget it

Unlock the power of your management system

Most organizations are engaged in combating IT and cyber security threats, by looking at better and more mature technologies and are implementing many tools. ISO27001:2013 provides a mechanism to integrate all elements of cyber security and business objectives to create a very robust mechanism to combat these threats, by setting up an Information Security Management System (ISMS). This talk will focus on how an Information Security Management System, can be used to enhance the capabilities of a cyber-security program through governance and management, irrespective of whether and organization is certified or not.

Penetration Test Design- Don't leave it to chance

In this presentation , the speaker would give his perspective of penetration test design based on his implementation experience. The talk will cover the details related to Reconnaissance, Scanning and Attack based test design approach.

Building Hacker proof cloud deployable software

The talk will cover cloud security specific details around following areas :
- Cloud deployed products security technical architecture
- Common mistakes that customer make when they move on premise application to cloud
- How to beat hacker by thinking like a hacker
- Overview of Testing application using hacking tools
- Understanding Privacy, Multi-tenant concerns
- Short live Demo of moving on premise application to Cloud using MS threat model
- Server side Input validation examples
- TLS examples
- Cloud Authentication and authorization patterns
- encryption best practices
- Database security best practices
During the Presentation, I will try to involve audience by online Poll, quizzes and token gifts and Q&A.

A case study on how we tracked and attributed a list of hackers who were targeting mobile users

One of the biggest challenge and question raised in cybersecurity is "who" attacked your organization and "why" . In our talk we explain how it is possible to attribute the attackers of a targeted APT campaign.
The talk would be based on our analysis on an APT Teams specialized in targeting private organization using Mobile Malwares via social media. We would explain in our talk how we traced the attackers, identified their infrastructures, tools they used to attack their targets. The talk would help people understanding APT groups targeting private organizations and how the culprits could be tracked. Since the attackers mainly target government contractors and private companies, we would explain the many ways organizations could stop such attacks. The targeted audience of the talk would be anyone who want's to know mobile malware analysis and how to Gather Intelligence on Targeted Attacks.

e-Supari : A peep In to the spooky world of "Deep Dark Web" & Underground Cybercrime Syndicate

What is Deep Web ?
- Difference between Deep Web, Dark Web and Surface Web
- Research on underground carding shop where all Indian banks' credit card and debit cards were on sell
- Overview of how these hidden dark markets can be accessed / a few important terminologies related to Deep dark web
- A few tips for being anonymous online while dealing with such dark webs
- Overview of popular dark markets, their operators and history(if any) related to them
- Services offered by these dark markets
- Information regarding the latest research by MIT on these dark markets and its effect on the current dark market
- Closing remarks

Complete the Magic in Application Security

How many times have we heard the following phrases, "I do not know how much is my application share?", "I will be ready to buy the Top Application Security Scanning Products available in market, but will my application be secured?", "Can I measure my application security effectiveness against a defined maturity model?", "I have received a long list of vulnerabilities reported but my development team does not have the bandwidth to fix them!", "My testing team does not know how to perform a Security Test!", "I have outsourced my application or product development to this vendor but now I have hundreds of security vulnerabilities reported just when I was planning to go for product deployment. I do not have time to fix them and my neck is about to be slaughtered!!!"
With lots of new applications getting hacked almost every day, Securing Applications have gained greater prominence. But is there a potential magic pill to solve most of these Application Security Challenges?!
The Answer is YES and this session will give you insights to that magical pill. Come and explore!

Event Sponsors / dont forget it

Testimonials / See What People Say About Us

Event Speakers / meet with greaters

Agnidipta Sarkar

Global Information Risk and Continuity Officer

HP

Anish Cheriyan

Head of Quality, Cyber Security and SW Engineering Center of Excellence

Huawei India

Anand Tapikar

Product Security Leader - India (Cyber Security and privacy Team )

GE Healthcare

Nitesh Sinha

CEO

Kirtar Oza

Manager - Information Security

Infosys

Rahul Sasi

Chief Technology Officer

CloudSek

Sriharsha N

Security Test Expert

Huawei Technologies

Event Price list (26th)

Super Early Bird

Rs 6,999
14% service Tax
Till 30th September
ISEH HUB
6 odd speakers

Standard

Rs 8,999
14% service Tax
ISEH HUB
Till 25th November
6 odd speakers

Register now / dont miss event!

Event FAQS / find your answers

IT Security and Ethical Hacking Conference in Bangalore is open to anyone who has an interest in The Network Security, Cyber Security, Ethical Hacking and works in the technology/telecoms industry or any related field.

No

Yes, all conference attendees must register in advance to attend the event.

As this is predominantly an event for the IT Security Industry, if you are interested in attending. Please note that there will be a charge to attend as a student (can avail special discount as a student).

Yes you can, please contact contact@unicomlearning.com with what you would like to be changed and we can assist.

Please fill the below details of youe colleague and send us an email block the seats. Name
Email ID
Designation
Contact NO
Company name

Recent Blog Posts / get news!

Event Location

Hotel Park Plaza
90/4, Outer Ring Road,
Munnekollaly Village,
Marathahalli, Bangalore
Phone : 080 4909 4909

contact@unicomlearning.com

Get Direction

Contact Us