• Follow Us

  • November13–16,2014|The Ashok, New Delhi

    Get Registered
  • Sri Lanka

    September09–10,2014|BMICH, Sri Lanka

    Visit Now

About

Ground Zero Summit

- November 2014, New Delhi

Ground Zero Summit (G0S) 2014 in its second year promises to be Asia's largest Information Security gathering and proposes to be the ultimate platform for showcasing researches and sharing knowledge in the field of cyber security. G0S rationale: The increasing volume and complexity of cyber threats - including phishing scams, data theft, and online vulnerabilities, demand that we remain vigilant about securing our systems and information. Enterprises and governments worldwide are grappling the grim reality of data and critical systems being exploited. This summits aims at addressing these new forms of cyber attack and formulate solutions.

About Us

G0S is an exclusive platform bringing together private and government players under one roop to debate, dicuss and deliberate on :
  • Sharing and imparting information on evolving attack vectors.
  • Exploring and demonstrating zero-day vulnerabilities.
  • Practical application of tools and techniques.
  • Integrated platform to demonstrate and showcase pioneering security technologies - both defensive and offensive.

Mission

To encourage research and development of avant-garde information security products in the region.

Vision

Ground Zero Summit aims to act as a central platform in the Asia region for: Selected top 50 research and development companies from across the globe to exhibit their defensive and offensive cyber security products to the right audience

Remaining For The Conference To Start

Register Now

Ground Zero Summit
Call For Paper 2014

Tracks and relevant submissions

G0S is a triple track conference and papers have to be submitted under the following tracks.

Systems Track

(OS/Systems/Application/Hardware)
  • OS exploitation
  • Application hacking
  • Rootkits and Malware
  • Forensics and Anti-forensics
  • SCADA security and exploitation
  • Telecom equipment security and exploitation
  • Embedded device/hardware security and exploitation
  • Malware on the mobile platform - Android, Windows OS, Symbian
  • Mobile Application Security.
  • Bitcoin Forensics
  • Banking Security

Communications Track

(Communication and Networks)
  • Protocol exploitation and security
  • Satellite Technology / Security
  • Aviation Security
  • Botnet communication, C&C and takedowns
  • Web hacking
  • Radio communication hacking
  • GSM/3G/LTE/5G networks - security and exploitation
  • Satellite communication hacking
  • Network security
  • Intrusion prevention (and evasion) techniques
  • APT prevention (and evasion) techniques
  • Replacing network Security with "Intelligent, self automated Networks"
  • Growth of Mobile Data Networks with repercussions for the same

Strategy Track

(Gov/GRC/Cyber warfare/CII)
  • GRC
  • Privacy
  • Social media in context of security and Privacy
  • Surveillance
  • Auditing
  • New age Cyber warfare/Cyber intelligence/Cyber terrorism/Cyber crimes
  • Upcoming information security trends
  • Critical infrastructure Protection
  • Cyber security in context of the Govt
  • Global Cyber Diplomacy
  • IT Act 2008 in light of Prism Surveillance
  • Security VS privacy
  • Evolving role of CERT to protect country's citizens against external and internal intrusions
  • Repercussions of PRISM surveillance leak on Social Media

E-mail for submission: "cfp@g0s.org"


Deadline of Submission: October 15, 2014

Speaker's Privileges

  • G0S is providing all speakers including International speakers with return air tickets (Economy).
  • For Indian speakers return air tickets will be provided for distance more than 300 kms, others will be provided First class train tickets.
  • Accommodation in New Delhi for 3 nights (check out time as per hotel policy).
  • One speaker pass and one complementary Conference pass.
  • Invitation to Conference party.
  • An honorarium of USD 1000 is to be awarded for talks that are new, highly technical and have never been presented or published before (exclusive to G0S 2014) anywhere online or offline.
  • Please note that the selection of a paper for an honorarium is at the sole discretion of the Ground Zero Staff and their decision will be final based on the technical depth of the talk and whether it has been presented/published before.
  • In cases where there are more than one speakers for the same session, Only one speaker may avail benefits and privileges under G0S policy.
  • IIC membership will be provided to all speakers for 1 year initially.

Speakers

Speaker who made it truly successful event

Ground Zero Summit 2013

Schedule

To Be Announced

Workshops


  • Practical SAP Security in Cyber-era

    Speaker: Alexander Polyakov

    Education Seminar

    This will be a four-hour long workshop, focused on the basic and advanced technical aspects of SAP security. Understanding the architecture of typical SAP system and focusing on every component


  • Android security workshop

    Speaker: Anant Shrivastava

    HTML5 & CSS3

    Android needs no introduction, it's one of the fastest growing Smartphone / Tablet OS. Future plans to just include telecommunication equipment but also entertainment equipment like TV, Music Players and other house hold items.


  • CISCO workshop on The network as a security platform

    Speaker: Sandeep Rao

    jQuery Master Class

    Traditional L3/L4 Firewalls that just block traffic based on specific ports are no longer sufficient to detect and block the above threats.

Venue

Conference Will Be Held At

The Ashok Hotel Delhi

No hotel symbolizes the traditional grandeur and hospitality of the historic capital of India more than The Ashok - Delhi's first and leading 5 star hotel.

Set in a prime Location in New Delhi's Diplomatic Enclave, The Ashok is a distinctive landmark. With its impeccable luxury, it's all the little details that make the difference between an ordinary visit and a spectacular experience.

Getting Here

From Airport

  • Head north-west on IGI Airport T3 Road towards IGI T3 Rd.
  • Make a U-turn at IGI T3 Rd
  • Slight left to merge onto Delhi-Gurgaon Expy
  • Continue onto NH8
  • Continue onto Sardar Patel Marg
  • Turn right onto Kautilya Marg
  • Ashok Hotel, 50-B, Kautilya Marg, Diplomatic Enclave, Chanakyapuri

From Railway Station

  • Head north-west on Kautilya Marg towards Nyaya Marg
  • Turn right onto Sardar Patel Marg.
  • Take the 1st left onto Mother Teresa Crescent.
  • Turn right onto Park St.
  • At the roundabout, take the 1st exit onto Baba Kharak Singh Marg.
  • Continue onto Gol Dak Khana Roundabout.
  • Slight left onto Baba Kharak Singh Marg.
  • Turn left onto Connaught Circus.
  • Turn left onto Minto Rd.
  • Turn left at Deen Dayal Upadhaya Marg
  • Turn left
  • Turn right

Travel Notes

Coming Soon

Partners

Partners play a major role in the success of our event.

Platinum Partner

Gold Partners


Exhibitors

Principal Police Partners

Academia Partners

Awareness Partners

Supporting Associations


Media Partners

Online Media Partners

International Media Partners

Organised By


Indian Infosec Consortium

Comprised With

News


  • 2014 Conference Will Be Held in November

    News Image

    NEW DELHI: Faced with fresh cyber spying threats, the Department of Telecom has asked internet service providers to reset passwords and other settings in devices installed at premises of fixed line broadband subscribers ...

    Read full story

  • Conference Location at the Capital of India

    News Image

    A large financial services company was recently the victim of a phishing attack and had to deal with a significant chunk of its data being compromised. The company would have saved the crores of rupees it subsequently spent on containing the damage h...

    Read full story

  • Things You Can See While You Are Here

    News Image

    According to a top secret survey report commissioned by the government, nation deepest military secrets are vulnerable to cyber spooks, with 3,000 internet connections of the Defence Ministry and the Air Force Communication Ce...

    Read full story

Cyber bullies can hide behind a mask of anonymity inline, and do not need direct physical access to their victims to do inimaginable harm.

Follow Us

Contact Info

For Marketing & Registrations, Contact:
Aniket Aggarwal
Phone:+91 11-43084861 | Mobile:+91 8130782299
Email:info@g0s.org