<

Event Schedule

Time
Agenda
09:30-10:00

Registration for the workshop

10:00-10:30

Introductory Session and Tea



10:30-12:30
Hall 1

Workshop

Building Secure API's and Web Applications by Jim Manico

Hall 2

Workshop

Bug Bounty Workshop by Prateek Tiwari

12:30-13:30

Lunch Break



13:30-15:30
Hall 1

Workshop

Building Secure API's and Web Applications by Jim Manico

Hall 2

Workshop

Bug Bounty Workshop by Prateek Tiwari

15:30-16:00

Tea/Coffee Break



16:00-17:30
Hall 1

Workshop

Building Secure API's and Web Applications by Jim Manico

Hall 2

Workshop

Bug Bounty Workshop by Prateek Tiwari

Time
Agenda
08:30-09:30

Registrations for the conference

09:30-09:45

Introduction to THREAT CON

09:45-10:30
Talk

Building and Developing Communities (keynote) by Matt Suiche

10:30-10:50

Tea/Coffee Break

10:50-11:35
Talk

The OWASP Top Ten Proactive Controls 2018 by Jim Manico

11:35-12:00

Networking Break

12:00-12:45
Talk

Exploiting Cloud Synchronisation to Mass Hack IoTs by Alex 'Jay' Balan

12:45-13:45

Lunch Break

13:45-14:30
Talk

License managers: The Phantom Menace by Vladimir Daschenko and Sergey Temnikov

14:30-15:15
Talk

How To Effectively Manage Your Org's Cloud Security Posture by Rohit Tamma and Sukriti Sharma

15:15-15:35

Tea/Coffee Break

15:35-16:20
Discussion

Panel Discussion Session: State & Strategies of Cyber Security in Nepal

16:20-17:05
Discussion

Panel Discussion Session: Government Initiatives in Cyber Security

17:05-17:30

Closing Session

Subscribe and get our news and updates.