Registration for the workshop
Introductory Session and Tea
Lunch Break
Tea/Coffee Break
Registrations for the conference
Introduction to THREAT CON
Building and Developing Communities (keynote) by Matt Suiche
Tea/Coffee Break
The OWASP Top Ten Proactive Controls 2018 by Jim Manico
Networking Break
Exploiting Cloud Synchronisation to Mass Hack IoTs by Alex 'Jay' Balan
Lunch Break
License managers: The Phantom Menace by Vladimir Daschenko and Sergey Temnikov
How To Effectively Manage Your Org's Cloud Security Posture by Rohit Tamma and Sukriti Sharma
Tea/Coffee Break
Panel Discussion Session: State & Strategies of Cyber Security in Nepal
Panel Discussion Session: Government Initiatives in Cyber Security
Closing Session