18-19 MAY, 2018 | PUNE | INDIA
Security Architecture Conference started as a simple idea to grow the Information Security builder community. The 5th edition of SACON is organized by CISO Platform, the largest social collaboration platform exclusively for CISOs and senior information security executives with 60,000+ subscribers Join the largest security architecture conference in the region. | 18 - 19 May | Pune | India. Learn Security Architecture, Application Security Architecture, OSINT, Darkweb & More.
© Copyright CISO Platform
“If I hadn't come, it would take another 2 to 3 years to learn and understand these tools”
“Very insightful, will definitely help us create a very effective security architecture”
“The principles .. gives a structure to the thought process”
Chief Technology Officer,
ERP Scan
Program Manager,
Defense Advanced Research Projects Agency (DARPA)
Software Engineer,
MediaTek
(Part of Heartbleed Bug Discovery team)
Head Of Application Security,
NCR Corporation
Visit The Himalayas, Taj Mahal, The Great Indian Dessert & Palaces, The Western Ghats & many more places
SACON sells out very fast, register and book your passes before it's sold out. If you register but do not purchase, that will allow you to get insider content from SACON and you can catch up when we are hosting one near you!
8:30 to 9:00 AM
Registration
9:00 to 11:00 AM
(1 Day Workshop) : Artificial Intelligence & Machine Learning
Introduction to Machine Learning - demystifying reality from hype and alphabet soup. This will include:
a. taxonomy of machine learning
b. model
c. algorithms
d. brief introduction to ML mathematics
e. data
f. architecture
g. methodologies,
h. measurement
i. deployment
11:00 to 11:30 AM
Break
11:30 to 1:00 PM
(1 Day Workshop) : Artificial Intelligence & Machine Learning
Description of the project
a. problem statement
b. expected outcome
c. data description and analysis
d. challenges
e. design model
f. algorithm selecction
g. technology selection
h. report design
18 & 19 May, 2018
All talks will happen in the main or parallel track, detail of which will be mentioned in emailed agenda
All talks will happen in the main or parallel track, detail of which will be mentioned in emailed agenda
SACON 4th edition - International Conference on Security Architecture. Here are some points to keep in mind while submitting the form:
Submit asap. Submission may close if enough good papers are received
Former Security Architect at BT London, Multiple Patents
Multiple Patents, Zero Day Discovery, IIT Alumni
Head Of CISO Advisory, CISO Platform, IIT Alumni
Multiple Patents, IIT Alumni, Fortune 40-under-40, Frequent international speaker at RSA, Interop and more
Chief Technology Officer,
Xerox
Speaker & Review Board Member, Black Hat
Lead Of Digital Security, Raiffeisen Bank International
Chief Technology Officer, LookingGlass
Who Should Attend: CISO, CRO, CIO, Information Security Experts, IT Risk Professionals, Appsec Professionals ....
Mobile - We brought together best of the minds in the Security Industry
Chief Technology Officer,
ERP Scan
Program Manager,
Defense Advanced Research Projects Agency (DARPA)
Software Engineer,
MediaTek
(Part of Heartbleed Bug Discovery team)
Head Of Application Security,
NCR Corporation
Former Security Architect at BT London, Multiple Patents
Multiple Patents, Zero Day Discovery, IIT Alumni
Head Of CISO Advisory, CISO Platform, IIT Alumni
Multiple Patents, IIT Alumni, Fortune 40-under-40, Frequent international speaker at RSA, Interop and more
Speaker & Review Board Member, Black Hat
Lead Of Digital Security, Raiffeisen Bank International
Chief Technology Officer, LookingGlass
We brought together best of the minds in the Security Industry
Chief Technology Officer,
Xerox
We brought together best of the minds in the Security Industry
“The principles .. gives a structure to the thought process”
“If I hadn't come, it would take another 2 to 3 years to learn and understand these tools”
“Very insightful, will definitely help us create a very effective security architecture”
Don't Forget The Deadline For Submission Is 30th June
Overview of AI & Machine Learning for CISOs and how they're impacting the security landscape
Summary of Top Talks from prominent security conferences like RSAC, BlackHat, Defcon etc.
Overview of Deception Technology, Architecture & Key Components, Deployment Guidelines
Designing Multiple layers of Security Architecture, from Business Architecture to Technical Security Architecture
AI & Machine Learning for CISOs
Top talks from global conferences
Deception
Cybersecurity Reference Architecture Design
Understanding Business / Management
& Communicating with the Board
Understanding key management concepts so that you can align your security program with business priorities & Creating a reference board presentation template which you can use for 2018
Managing insider threats using behavioural analytics
Insider Threats
Security Threats Landscape for 2017
Evolution of Security Threats landscape & top 10 threats that were new in 2017
Top 10 Security Predictions for 2018
Based on our research, we'll be presenting top 10 predictions for 2018 for you to consider when making your plans
SOC
Reference architecture and overview of key components of a SOC, e.g.: SIEM, Honeypots, Data Sources, Integrations, Threat Intelligence, EDR, Forensics Tools etc.
IR - Incident Response
Building a framework & processes for managing cybersecurity incidents
Security Architecture Workshop
Designing Multiple layers of Security Architecture, from Business Architecture to Technical Security Architecture
Cyber Range Drills
Wargame on responding to various types of security incidents at a strategic and operational level
Threat Hunting
Here we'll discuss the Key Components, Tool Set, Learning "Hunter" Skills and a Case Study
Cloud Security
Overview of Amazon’s approach to cybersecurity
AppSec
Creating a scenario of an organization and then use controls from OpenSAMM and BSIMM to choose the right elements of the AppSec program
Security Tech Landscape
Overview of new & emerging security technologies in the market and how the security tech landscape is shaping up
Overview of the IoT technology architecture and modelling threats & controls against different components (e.g.: Gateway)
Forensics
Workshop on how to do a comprehensive forensics examination post an incident, at endpoint & network level
SecDevOps
Leveraging the opportunity provided by DevOps to embed & automate security in the CI/CD processes
Startup Security
Startup Security Stack: Using 80-20 rule to build effective security strategy for a startup
Who Should Attend: CISO, CRO, Information Security Experts, IT Risk Professionals, Appsec Professionals ....
IOT
SOC
Reference architecture and overview of key components of a SOC, e.g.: SIEM, Honeypots, Data Sources, Integrations, Threat Intelligence, EDR, Forensics Tools etc.
IR - Incident Response
Building a framework & processes for managing cybersecurity incidents
Security Architecture Workshop
Designing Multiple layers of Security Architecture, from Business Architecture to Technical Security Architecture
Cyber Range Drills
Wargame on responding to various types of security incidents at a strategic and operational level
Who Should Attend: CISO, CRO, CIO, Information Security Experts, IT Risk Professionals, Appsec Professionals ....
Threat Hunting
Here we'll discuss the Key Components, Tool Set, Learning "Hunter" Skills and a Case Study
Cloud Security
Overview of Amazon’s approach to cybersecurity
AppSec
Creating a scenario of an organization and then use controls from OpenSAMM and BSIMM to choose the right elements of the AppSec program
Security Tech Landscape
Overview of new & emerging security technologies in the market and how the security tech landscape is shaping up
Forensics
Workshop on how to do a comprehensive forensics examination post an incident, at endpoint & network level
SecDevOps
Leveraging the opportunity provided by DevOps to embed & automate security in the CI/CD processes
Startup Security
Startup Security Stack: Using 80-20 rule to build effective security strategy for a startup
AI & Machine Learning for CISOs
Overview of AI & Machine Learning for CISOs and how they're impacting the security landscape
Top talks from global conferences
Summary of Top Talks from prominent security conferences like RSAC, BlackHat, Defcon etc.
Deception
Overview of Deception Technology, Architecture & Key Components, Deployment Guidelines
Cybersecurity Reference Architecture Design
Designing Multiple layers of Security Architecture, from Business Architecture to Technical Security Architecture
IOT
Overview of the IoT technology architecture and modelling threats & controls against different components (e.g.: Gateway)
Insider Threats
Managing insider threats using behavioural analytics
Security Threats Landscape for 2017
Evolution of Security Threats landscape & top 10 threats that were new in 2017
Top 10 Security Predictions for 2018
Based on our research, we'll be presenting top 10 predictions for 2018 for you to consider when making your plans
Understanding Business / Management
& Communicating with the Board
Understanding key management concepts so that you can align your security program with business priorities & Creating a reference board presentation template which you can use for 2018
Do You Have An Interesting Security Technology To Showcase?
Do You Have An Interesting Security Technology To Showcase?
Speaker : Rohit Srivastwa
About Speaker : Security Evangelist and Founder of India's first ever hackers conference and community named “ClubHack”
Description : During this workshop we will take attendees through the reality of dark web and demystify facts from fiction. The participants would get insights to various products available and traded on the dark web. This will help you to get a better understanding of the importance of threat intelligence
Agenda :
1. Introduction - Learn and understand the difference between Clearnet and Darknet. Darknet, Deepweb , Darkweb - what they mean.
2. Operational security before entering the darker side of internet
3. Understand Darknet entry points
4. Setting and configuring the Darknet Entry Points (Tor, Zeronet etc)
5. Tor Hidden Services; Using Tor Web Proxies
6. Darknet /Deepweb Search Engines
7. Exploring the Darknet – Darknet Economies
8. Utilizing Darknet as definitive source for Threat Intelligence
Requirement : Attendees must have good knowledge of windows & linux platform. They must have Knowledge of running & troubleshooting a VM on own device.
Laptop should have ability to access 802.11 b/g/n Wi-Fi network in an unrestricted / unfiltered nature. Enough memory to create and run a VM on hypervisor of your choice. A fresh VM of windows/linux
Speaker : Arnab Chattopadhayay & Subrat Panda
About Speaker : Arnab Chattopadhyay was the former security architect at BT London. Subrat Panda is an AI & ML expert who is currently the principal architect at Capillary Technologies
Subrat Panda is currently working as a Principal Architect with Capillary Technologies where he is heading AI and Data Sciences teams which builds products in the Retail domain. Prior to this he worked with a bay area based food tech startup, Taro. Before this, he worked as a Senior architect with Nvidia and as a research engineer with IBM Systems and Technology. He has completed by his BTech(2002) and PhD(2008) in Computer Science from IIT Kharagpur. He is also a Co-Founder of IDLI(Indian Deep Learning Initiative). He has multiple patents and publications.
Agenda :
1. Setting the context : what is AI, ML. How are they related and not related
2. Brief history of AI
3. Machine learning: algorithms, data, measurement matrices, challenges
4. Machine learning evolution: Deep learning (touch upon CNN, LSTM, GAN)
5. Machine learning use cases: finance, automotive, security
6. Machine learning implementation pipeline
7. Machine learning at scale
8. A hand-on session: building a machine learning solution using Python, Sciekit-learn, Tensorflow
Discount Periods
|
Time
|
Price*
|
Early Bird Discount
|
12th Apr to 26th Apr
|
INR 6,500
|
Regular Price
|
27th Apr to 9th May
|
INR 10,000
|
Late Price
|
10th May onwards
|
INR 15,000
|
*Special Discount May Be Available For Pre-Registrants & Past Event Attendees (Email invite only). All Prices exclusive of taxes
Speaker : Nilanjan De
About Speaker : Currently CTO at FireCompass. He has multiple patents in IT Security and has discovered multiple well known Zero Day vulnerabilities which are listed in CVE. He’s an alumnus of IIT Kharagpur. He’s well-known in the security community and has published several exploits and advisories for the first time in the world
Agenda :
1. Immutable Infrastructure - Fundamentals, Immutable Servers, Semi-Immutable Servers, Phoenix Servers etc.
2. Advantages & Drawbacks Of Immutable Infrastructure
3. How To Implement ? Immutable Containers
4. Demo. Tools & Technologies
5. Serverless Architecture
1:00 to 2:00 PM
Lunch
2:00 to 4:30 PM
(1 Day Workshop) : Artificial Intelligence & Machine Learning
-Setup environment, create low level design, coding
4:30 to 5:00 PM
Break
5:00 to 5:30 PM
(1 Day Workshop) : Artificial Intelligence & Machine Learning
-Run training, test, measure result, create visual presentation of result, any other discussion
Day 1 : 18th May
Day 2 : 19th May
9:00 to 11:00 AM
(1 Day Workshop) : Exploring Darkweb For Threat Intelligence
-Introduction - Learn and understand the difference between Clearnet and Darknet. Darknet, Deepweb , Darkweb - what they mean.
-Operational security before entering the darker side of internet
11:00 to 11:30 AM
Break
11:30 to 1:00 PM
(1 Day Workshop) : Exploring Darkweb For Threat Intelligence
-Understand Darknet entry points
-Setting and configuring the Darknet Entry Points (Tor, Zeronet etc)
-Tor Hidden Services; Using Tor Web Proxies
1:00 to 2:00 PM
Lunch
2:00 to 4:30 PM
(1 Day Workshop) : Exploring Darkweb For Threat Intelligence
-Darknet /Deepweb Search Engines
-Exploring the Darknet – Darknet Economies (Cyber Crime Markets, Drug and Arms Markets, Counterfeit and Fake Currency Markets,Terrorist and Jihadist Presence)
-Utilizing Darknet as definitive source for Threat Intelligence
9.
-Q&A
(Note : Agenda may undergo changes under unavoidable circumstances)
Requirement : Attendees must have a laptop with 8 GB RAM, Linux Virtual Machine, 64bit CPU (CPU circa 2011 or newer will generally be64 bit). Softwares needed - Anaconda, Scikitlern, Natplotlib, Pandas, Tensorflow, Keras
Steps to get VM :
Step 1: Kindly download the Machine Learning VM from here : click here
Step 2: Download software to run VM For Mac Users download VMWare Fusion (30 day demo version) For Others download VMWare Workstation Player
Step 3: Check login to the Linux in VM using : UserId : deeplearning Password : deeplearning
SACON (Security Architecture Conference) is the security architecture conference. It hosts great security minds from the world. Get access to selected talks from the conference.