conference program - FINAL 7/13/2009



2009 Local Host

JPCERT

Diamond & Program

BT - Diamond

Platinum Sponsors

CERT/CC - Platinum Best Practices

JFIRST - Platinum Banquet

IPA - Platinum

Gold Sponsors

NRI Secure - Gold

NTT - Gold

IIJ - Gold & Internet

Microsoft - Gold

>> View the full 2009 <<
Sponsorship Team Here!

Schedule At-a-Glance

Saturday, June 27
Train the Trainers (Open!)

Sunday, June 28th
Train the Trainers (Open!)
Registrations
Ice Breaker Reception

Monday, June 29th
Registration
Conference Opening
Breakout Sessions
LE SIG

Tuesday, June 30th
Registration
General Session
Breakout Sessions
NM SIG
Vendor SIG
Vendor Tables
Vendor Showcase
Pre-Annual General Meeting (AGM)

Registration — 3F Genji Waiting Room
Sunday, 14:00-18:00
Monday-Friday, 08:00-16:00

High Tech Experience Lounge — 3F Konjaku
Monday-Friday, 08:00-18:00

Breakfast — 3F Genji South
Monday-Friday, 07:30-08:45

Lunch — M, T, TH
3F Genji South and 5F Taketori

12:00-13:30

Lunch — W
3F Genji South

12:00-13:30

Lunch — F
3F Genji South & East

12:00-13:30

Wednesday, July 1st
Registration
General Session
Breakout Sessions
Vendor Tables
Conference Banquet

Thursday, July 2nd
Registration
General Session
Vendor Tables
Breakout Sessions

Friday, July 3rd
Registration
General Session
Vendor Tables
Breakout Sessions
Conference Closing




FINAL Program

Translation services will be available! = Translation services will be available daily for general session and keynote speakers.

Saturday, June 27th

13:00-17:00 Train the Trainers (Open to all attendees) — 5F Kokin North


Sunday, June 28th

09:00-17:00 Train the Trainers (Open to all attendees) — 3F Genji West
14:00-18:00 Registration — Crystal Foyer
17:30-18:30 Program Committee Meeting — 5F Soushi
19:00-21:00 Ice Breaker Reception — 3F Genji West & North


Monday, June 29th

08:00-16:00 Registration — 3F Crystal Foyer
08:45-10:30

Translation services will be available!Conference Opening — 3F Genji West & North
08:45-09:00 | Opening Remarks: Derrick Scholl, FIRST Chair, US
09:00-10:30 | Keynote: Suguru Yamaguchi Bio, Information Security Management and Economic Crisis, JPCERT & Advisor on Information Security, National Information Security Center, Cabinet Office Japan

10:30-11:00 Networking Break — 3F Genji Waiting Room and 5F Taketori + Foyer
11:00-12:00 Track I: Technical
3F Genji West & North
Track II: Management
5F Kokin North
Track III: Incident Response
5F Kokin Naka
11:00-11:30
US
Attacker Illusions: Finding the Real "Who" and "Why"
Michael La Pilla Bio
iDefense-VeriSign, US
US
Architecting Systems of Systems for Response
Andrew McDermott Bio
Science Applications International Corporation (SAIC), US
US
ES
Anti-Phishing Working Group and the Internet Policy Committee
Jordi Aguilà Bio
e-la Caixa CSIRT, ES
Foy Shiver Bio
Anti-Phishing Working Group, US
11:30-12:00
US
Attacker Illusions: Finding the Real "Who" and "Why"
(continued)
US
Architecting Systems of Systems for Response
(continued)
US
Measuring the Root Cause of Incidents
Karen Scarfone Bio
National Institute of Standards and Technology (NIST), US
12:00-13:30 Lunch — 3F Genji South and 5F Taketori
13:30-15:30 Track I — 3F Genji West & North Track II — 5F Kokin North Track III — 5F Kokin Naka
13:30-14:00
US
Proprietary Data Leaks: Response and Recovery

Sherri Davidoff Bio
Davidoff Information Security
Consulting, LLC, US
Jonathan Ham Bio
Lake Missoula Group, US
UK
Recapturing the Wheel—Media Perspectives on Crisis and Recovery
Frank Wintle Bio
PanMedia, UK
Law Enforcement
Special Interest Group (LE SIG)

14:00-14:30
US
Proprietary Data Leaks: Response and Recovery

(continued)
UK
Recapturing the Wheel—Media Perspectives on Crisis and Recovery
(continued)
LE SIG


14:30-15:00
US
The State of Phishing/Fraud and Efforts to Deliver Forensic Tools & Resources for ECrime Fighters
Foy Shiver Bio
Anti-Phishing Working Group, US
UK
Using Social Media in Incident Response


Martin McKeay Bio
The Network Security Blog, US
LE SIG



15:00-15:30
US
The State of Phishing/Fraud and Efforts to Deliver Forensic Tools & Resources for ECrime Fighters
(continued)
Public Relations & Incident Response Panel Discussion

Panelists:
Martin McKeay Bio
The Network Security Blog, US
Frank Wintle Bio
PanMedia, UK
LE SIG


15:30-16:00 Networking Break — 3F Genji Waiting Room and 5F Taketori + Foyer
16:00-17:30 Track I — 3F Genji West & North Track II — 5F Kokin North Track III — 5F Kokin Naka
16:00-16:30
IR
Effective Software Vulnerability Discovery within a Time Constraint
Kaveh Razavi Bio
Dr. Babak Sadeghian Bio
Dr. Mehdi Shajari
Bio
Amirkabir University of Technology, IR
US
Trouble Ahead: Cyber Security Policy Developments...or the lack thereof
Eli Jellenc Bio
iDefense-VeriSign, US
LE SIG


16:30-17:00
IR
Effective Software Vulnerability Discovery within a Time Constraint
(continued)
US
Emerging Threats and Attack Trends
Paul Oxman Bio
Cisco Systems, US
LE SIG

17:00-17:30
US
What can FIRST do for you: a look at the available infrastructure options
Kenneth Van Wyk Bio
KRvW Associates, LLC
US
Emerging Threats and Attack Trends
(continued)
LE SIG



Tuesday, June 30th

08:00-16:00 Registration — 3F Crystal Foyer
08:45-10:30 Translation services will be available!General Session — 3F Genji West & North
08:45-09:00 | Opening Remarks:
Derrick Scholl, FIRST Chair, US
09:00-10:30 | Keynote: Bruce Schneier Bio, Reconceptualizing Security, Chief Security Technology Officer, BT, UK
10:30-11:00 Networking Break — 3F Genji Waiting Room and 5F Taketori + Foyer
11:00-12:00 Track I: Technical
5F Kokin Naka
Track II: Management
5F Kokin North
Track III: Incident Response
3F Genji West & North
11:00-11:30

Carol Overes Bio
GOVCERT.NL, NL

US
Missing Clues: How to Prevent Critical Gaps in Your Security Monitoring

Martin Nystrom Bio
David Schwartzburg Bio
Cisco Systems, US
US
Establishing Collaborative Response to Abuse of the Domain Name System

Greg Rattray Bio
ICANN, US
11:30-12:00
(continued)
US
Missing Clues: How to Prevent Critical Gaps in Your Security Monitoring
(continued)
US
Establishing Collaborative Response to Abuse of the Domain Name System
(continued)
12:00-13:30 Lunch — 3F Genji South and 5F Taketori
13:30-17:00
Vendor Special Interest Group (Vendor SIG) — 7F Houjou
Damir "Gaus" Rajnovic
Cisco Systems, UK
13:30-15:30 Track I — 5F Kokin Naka Track II — 5F Kokin North Track III —3F Genji West & North
13:30-14:00
(continued)
US
The Next Generation of Incident Response

Gib Sorebo Bio
Science Applications International Corporation (SAIC), US
US
Comprehensive Response: A Bird's Eye View of Microsoft Critical Security Update MS08-067
Steve Adegbite Bio
Ziv Mador
Bio
Jonathan Ness
Bio
Microsoft, US
14:00-1430
(continued)
US
The Next Generation of Incident Response

(continued)
US
Comprehensive Response: A Bird's Eye View of Microsoft Critical Security Update MS08-067
(continued)
14:30-15:00
(continued)
US
Deriving information from raw data: making business decisions with logs

Toby Weir-Jones Bio
BT, US
US
Comprehensive Response: A Bird's Eye View of Microsoft Critical Security Update MS08-067
(continued)
15:00-15:30
(continued)
US
Deriving information from raw data: making business decisions with logs
(continued)
US
Comprehensive Response: A Bird's Eye View of Microsoft Critical Security Update MS08-067
(continued)
15:30-16:00 Networking Break - 3F Genji Waiting Room & Taketori + Foyer
16:00-17:30 Track I — 5F Kokin Naka Track II — 5F Kokin North Track III — 3F Genji West & North
16:00-16:30
(continued)
 
FR
INTERPOL Initiatives to Enhance Cyber Security
Vincent Danjean Bio
INTERPOL, FR
16:30-17:00
(continued)
FR
Information Security's Third Wave
Eli Jellenc Bio
iDefense-VeriSign, US
FR
INTERPOL Initiatives to Enhance Cyber Security
(continued)
17:00-19:30 Vendor Showcase - 3F Genji Waiting Room
18:00-19:30 Pre-Annual General Meeting (AGM, Members Only) — 3F Genji West & North
20:00-22:00 Metrics SIG
Georgia Killcrece
CERT/CC, US


Wednesday, July 1st

08:00-16:00 Registration — Crystal Foyer
08:00-18:00 Vendor Tables — 3F Genji Waiting Room
08:45-10:30 Translation services will be available!General Session — 3F Genji West & North
08:45-09:00 | Opening Remarks:
Derrick Scholl, FIRST Chair, US
09:00-10:00 | Keynote: Jose Nazario Bio, Attacks Against the Cloud: Combating Denial-of-Service, Arbor Networks, US
10:00-10:30 | Keynote: Kurt SauerBio, Information security one character at a time, Spinlock Technologies, JP
10:30-11:00 Networking Break —3F Genji South & Taketori + Foyer
11:00-12:00 Track I: Technical
5F Kokin North
Track II: Management
3F Genji West & North
Track III: Incident Response
5F Kokin Naka
11:00-11:30
TW
A Method for Detecting Wide-scale Network Anomalies


Minghua Wang Bio
CNCERT/CC, PRC
UK
Threat Response —doing the right thing first time!


Greg Day Bio
McAfee, UK
DE
Windows Memory Forensics with Volatility

PDF Download Prerequisites
Andreas Schuster Bio
Deutche Telekom AG, DE
11:30-12:00
TW
Malicious Webpage Detection


Chia-Mei Chen Bio
TWCERT/CC
Sun Yat-Sen University, TW
UK
Threat Response —doing the right thing first time!


(continued)
DE
Windows Memory Forensics with Volatility

PDF Download Prerequisites
(continued)
12:00-13:30 Lunch — 3F Genji South
13:30-15:30 Track I — 5F Kokin North Track II —3F Genji West & North Track III — 5F Kokin Naka
13:30-14:00
DE
Information Security Exchange Formats and Standards
Till Dörges Bio
PRESENSE Technologies GmbH, DE
US
SCADA Security—Who Is Really In Control of Our Control Systems?
Peter Allor Bio
IBM, US
DE
Windows Memory Forensics with Volatility

PDF Download Prerequisites
(continued)
14:00-14:30
IR
How to handle Domain Hijacking Incidents


Dr. Mehdi Shajari Bio
Amirkabir University of Technology, IR
US
SCADA Security—Who Is Really In Control of Our Control Systems?

(continued)
DE
Windows Memory Forensics with Volatility

PDF Download Prerequisites
(continued)
14:30-15:00
US
Mashup Security & Incident Response Considerations


Andrew McDermott Bio
Science Applications International Corporation (SAIC), US
NL
When Worlds Collide: Understanding Telco Fraud in a VoIP World

Scott McIntyreBio
KPN-CERT, NL
DE
Windows Memory Forensics with Volatility

PDF Download Prerequisites
(continued)
15:00-15:30
US
Mashup Security & Incident Response Considerations


(continued)
NL
When Worlds Collide: Understanding Telco Fraud in a VoIP World

(continued)
DE
Windows Memory Forensics with Volatility

PDF Download Prerequisites
(continued)
15:30-16:00 Meet the Candidates - 3F Crystal Foyer by the Membership Table
15:30-16:00 Networking Break - 3F Genji Waiting Room & Taketori + Foyer
16:00-17:30 Track I — 5F Kokin North Track II —3F Genji West & North Track III — 5F Kokin Naka
16:00-16:30
US
Proactively Blacklisting Fast-Flux Domains and IP Addresses
Shahan Sudusinghe Bio
iDefense-VeriSign, US
US
Incident Response and Voice for Voice Services

Lee Sutterfield Bio
SecureLogix, US
CN
Network Security Assistance to the Beijing Olympic Games

Bochao Liu Bio
CNCERT/CC, PRC
16:30-17:00
JP
Proposal of MyJVN for Security Information Exchange Infrastructure
Masato Terada Bio
IPA, JP
US
Incident Response and Voice for Voice Services

(continued)
US
Creating an End-to-End Identity Management Architecture
Jeff CrumeBio
IBM, US
17:00-17:30
MY
Handling Incidents from Honeynet Data
Adli Wahid Bio
CyberSecurity Malaysia, MY
VoIP Panel Discussion

Panelists:
Scott McIntyre Bio
KPN-CERT, NL
Kurt Sauer Bio
Spinlock Technologies, JP
Lee Sutterfield Bio
SecureLogix, US
US
Creating an End-to-End Identity Management Architecture
(continued)
19:00-22:00 Conference Banquet — 3F Genji Ballroom


Thursday, July 2nd

08:00-1600 Registration — Crystal Foyer
08:00-18:00 Vendor Tables — 3F Genji Waiting Room
08:45-10:30 Translation services will be available!General Session — 3F Genji West & North
08:45-09:00 | Opening Remarks: Derrick Scholl
, FIRST Chair, US
09:00-10:00 | Keynote: Takayuki Sasaki Bio, The Great Hanshin-Awaji Earthquake, Director, Vice President and Executive Officer, Head of IT Headquarters, JR West, JP
10:30-11:00 Networking Break —3F Genji Waiting Room & Taketori + Foyer
11:00-12:00 Track I: Technical
5F Kokin Naka
Track II: Management
3F Genji West & North
Track III: Incident Response
5F Kokin North
11:00-11:30
UK
In the Cloud Security

Greg Day Bio
McAfee, UK
US
More of What Hackers Don't Want You to Know
Jeff Crume Bio
IBM, US
SG
To be or not to be—An Incident Recovery Case Study
Chunyan "Sherman" Xie Bio
National University of Singapore, SG
11:30-12:00
UK
In the Cloud Security

(continued)
US
More of What Hackers Don't Want You to Know
(continued)
SG
To be or not to be—An Incident Recovery Case Study
(continued)
12:00-13:30 Lunch — 3F Genji South & 5F Taketori
13:30-15:00 Track I — 5F Kokin Naka Track II — 3F Genji West & North Track III — 5F Kokin North
13:30-14:00
PRC
Chinese Hacker Community and Culture, Underground Malware Industry

Wei Zhao Bio
KnownSec, PRC
CH
Closing the Gap between Policy Creation and Enforcement

Sven Bruelisauer Bio
Open Systems AG, CH
ES
The Threat of Banking Trojans: Detection Forensics and Response. (Insights from a Bank CSIRT)
Marc Vilanova Bio
e-la Caixa CSIRT, ES
14:00-14:30
PRC
Chinese Hacker Community and Culture, Underground Malware Industry
(continued)
JP
The Incident Response and the Law Enforcement

Yoshio Yamada Bio
National Police Agency of Japan, JP
GE
EE
Analysis of the DDoS Attacks on Georgia & Estonia
Toomas Lepik Bio
CERT-EE, EE
David Tabatadze
Bio
CERT-GE, GE
14:30-15:00
US
FIRST Business Plan

Peter Allor Bio
IBM, US
DE
Contradictions in Current European Security Policy
Dr. Jan K. Koecher Bio
DFN-CERT Services GmbH
JP
CSIRT Modeling Architecture

Yoshida Takahiko Bio
NTT, JP
15:15-18:30 Annual General Meeting (AGM, Members Only) — 3F Genji West & North
**Members must have a valid government issued photo ID in order to enter the AGM. No exceptions.**


Friday, July 3rd

08:00-16:00 Registration — Crystal Foyer
08:00-14:00 Vendor Tables — 3F Genji Waiting Room
08:45-10:30 Translation services will be available!General Session — 3F Genji West & North
08:45-09:00 | Opening Remarks: Derrick Scholl
, FIRST Chair, US
09:00-10:30 | Keynote:
Ray StantonBio, Security and the Future Generation, Global Head, Business Continuity, Security and Governance Practice, BT, UK
10:30-11:00 Networking Break —3F Genji Waiting Room & Kokin South
11:00-12:00 Track I: Technical
5F Kokin North
Track II: Management
3F Genji West & North
Track III: Incident Response
5F Kokin Naka
11:00-11:30
US
Update on Carrier Infrastructure Security Attacks
Jose NazarioBio
Arbor Networks, US
US
Show Me The Evil--A Graphical Look at Online Crime
Dave Deitrich Bio
Team Cymru
US
ICASI Update


Peter Allor Bio
IBM, US
11:30-12:00
US
Update on Carrier Infrastructure Security Attacks
(continued)
US
Show Me The Evil--A Graphical Look at Online Crime
(continued)
DE
Internet Analysis System (IAS) - Module of the German IT Early Warning System
Martin BierwirthBio
Andre Vorbach Bio
Federal Office for Information Security (BSI, Germany)
12:00-13:30 Lunch — 3F Genji South & East
13:30-14:30 Track I— 5F Kokin North Track II — 3F Genji West & North Track III — 5F Kokin Naka
13:30-14:00
BR
New Developments on Brazilian Phishing Malware

Jacomo Piccolini Bio
ESR/RNP, BR
US
The Essential Role of the CSIRT in Secure Software Development
Kenneth Van Wyk Bio
KRvW Associates, LLC, US
JP
Anti-bot Countermeasures in Japan

Chris Horsley Bio
Takashi Manabe Bio

JPCERT/CC
14:00-14:30
BR
New Developments on Brazilian Phishing Malware

(continued)
US
The Essential Role of the CSIRT in Secure Software Development
(continued)
 
14:30-15:00 Closing Remarks — 3F Genji West & North
Derrick Scholl
, FIRST Chair, US

 


Powered by Conference & Publication Services, LLC