GRC Frameworks Implementations & Audits

GRC Frameworks Implementations & Audits GRC Stands for Governance, Risk Management & Compliance and this is a system used by many organizations to meet their statutory, regulatory & organizational requirements . This Keynote will be focusing about the complete life-cycle of GRC , enabling participants to learn that it is indispensable for organization to perform steadily and serve smoothly through implementation of standards/ frameworks by managing all associated risk amicably as per level of risk associated with each of the asset. Furthermore, this session shall cover the following topics as well. • Understanding of better Risk Management & Controls implementation • Automation of GRC activities and its benefits • Provision of internal and external transparency • Clear and defined policies and procedures for related processes of organizations • Reduction in risk across the whole organization including cybersecurity risks, operational risks and business risk

A framework for understanding hack-and-leak operations

This presentation outlines a framework for understanding hack-and-leak operations, arguing that we must rethink the effects of divulging - and fabricating - secret information in an era of ubiquitous digital technologies and severe political crises. It suggests that hack-and-leak operations sit between two paradigms of cybersecurity. The first paradigm focuses on intrusion (unauthorized access to networks), while the second concentrates on influence (the use of digital technologies to illegitimately shape public debate). Analyses generally tackle one of these two aspects: cybersecurity specialists focus on intrusion, setting aside the complexities of the digital public sphere, while media scholars do the opposite, closely analyzing flows of leaked information without considering how it was obtained. This presentation instead argues for conceptualizing hack-and-leak operations as a distinct category of incident combining these two paradigms, with specific implications for cyber policy.

Internet of Things and mobile technologies for eHealth

This keynote will focus on a new hot topic on e-health technologies considering recent advances on e-Health systems, including mobility environments and mobile technologies. Information and communication technologies have rapidly grown in the few last decades along with mobile Internet concept of anywhere and anytime connection. In this context, Mobile Health (m-Health) proposes to deliver healthcare services, overcoming geographical, temporal and even organizational barriers. Pervasive and m-Health services aim to respond several emerging problems in health services, including, the increasing number of chronic diseases related to lifestyle, high costs in existing national health services, the need to empower patients and families to self-care and manage their own healthcare, and the need to provide direct access to health services, regardless of time and place.

Web Hacking - Attacks & Defense

Web hacking - Attacks & Defense discusses the Application security topics such as SQLI, XSS , Command injection , CSRF, LFI, Oauth2.0 ,etc .. It focuses on both Attacks and defense in depth of Web application security. This talk is for both pen-testers (who wants to learn different attacks techniques & bypasses for web applications) and Software Developers (who wants to learn defense in depth techniques to secure the web applications).

Microphone Forensics: A Study of Digital Traces On Identical Microphones

Video or audio recording helps a criminal investigator to analyze the scene and to collect evidences. In this regards, a robust method is required to assure the originality of the recording. In this paper, we focus on the digital audio forensics and study how to extract the unique digital traces of any microphone. We perform feature extraction on the recording that is collected from several microphone models with at least two identical microphones of each model. Experimental results and analysis indicate that the signal of the sound recording of the identical microphone has different digital traces.