Presentations |
Download |
Two-factor
Authentication
Tan Teik Guan, Data Security Systems Solutions |
[pending] |
Plugging your Data Leaks
Ahmad Elkhatib, Pointsec (Now part of Checkpoint) |
Presentation |
Enterprise
Security Monitoring Visualized
Faiz Ahmad Shuja, rewterz |
[pending] |
Securing Your Wireless Network
Dr. Fadi Aloul, American University of Sharjah |
Presentation |
Prosecuting
Hackers: Give Peace a Chance
Jawwad Sarwana |
Presentation |
Web
Application Worms
Muhmmad Omar Khan, rewterz |
Presentation |
Win32
Exploitation 101
Muhammad Ahmed Siddiqui, rewterz |
[did not present] |
Masquerading as Trustworthy
Syed Jahanzaib Sarfaraz, Pakistan Honeynet Project |
Presentation |
How Attackers go Undetected
Ayaz Ahmed Khan,
Pakistan Honeynet Project |
Presentation |