FIRST - Improving Security Together 18th Annual FIRST Conference - June 2006 - Baltimore, Maryland

Schedule







Platinum Sponsor

BT



Silver Sponsor

Diageo



Local Host

CERT Coordination Center



Supporting Sponsors

Sun



Google



Hitachi



ISS



E-Secure-IT

Korea CertCC



Facilities — Renaissance Harborplace

Registration — Fifth floor foyer

Sunday 14:00–18:00

Monday–Wednesday 07:30–17:00

Thursday–Friday 08:00–14:00

Terminal room — Homeland room

Monday – Wednesday 08:00–17:00

Friday 08:00–14:00

Continental breakfast — Fifth floor foyer

Monday – Friday 08:00–09:00

Lunch — Baltimore ballroom

Monday – Friday 12:30–14:00




Schedule print version

Overview

June 25th (Sunday)

Registration

Program Committee Meeting

Welcome Icebreaker Reception

June 26th (Monday)

Business/Management Track

Technical Track

June 27th (Tuesday)

Business/Management Track

Technical Track

June 28th (Wednesday)

Business/Management Track

Technical Track

June 29th (Thursday)

Business/Management Track

Technical Track

June 30th (Friday)

Business/Management Track

Technical Track


June 25th (Sunday)Return to overview
14:00 – 18:00

Registration

16:00 – 17:00

Program Committee Meeting

19:00 – 21:00

Welcome Icebreaker Reception

June 26th (Monday)Return to overview
 Business/Management TrackTechnical Track
07:30 – 17:00

Registration

08:00 – 09:00

Continental Breakfast

09:00 – 09:10

The Day Ahead

The Day Ahead

09:10 – 10:30
US

Exploring the Next Level of Cyber Attacks: Methodologies and Demonstration of Web Application Hacks

Matt Fisher  Presenter (SPI Dynamics, US)

US

Secure Coding in C and C++

Robert Seacord  Presenter (CERT/CC – Carnegie Mellon University, US)

10:30 – 11:00

Coffee break

11:00 – 12:30
US

Exploring the Next Level of Cyber Attacks: Methodologies and Demonstration of Web Application Hacks (continued)

Matt Fisher  Presenter (SPI Dynamics, US)

US

Secure Coding in C and C++ (continued)

Robert Seacord  Presenter (CERT/CC – Carnegie Mellon University, US)

12:30 – 14:00

Lunch

14:00 – 15:30
US

Evaluating CSIRT Operations

Audrey Dorofee  Presenter, Chris Alberts, Robin Ruefle  Presenter (CERT/CC – Carnegie Mellon University, US)

US

Design Your Network to Aid Forensic Investigation

Robert Sisk  Presenter (IBM MSS – IBM Corporation, US)

15:30 – 16:00

Coffee break

16:00 – 17:30
US

Evaluating CSIRT Operations (continued)

Audrey Dorofee  Presenter, Chris Alberts, Robin Ruefle  Presenter (CERT/CC – Carnegie Mellon University, US)

US

Design Your Network to Aid Forensic Investigation (continued)

Robert Sisk  Presenter (IBM MSS – IBM Corporation, US)

18:00 – 19:00

Pre AGM Discussions (FIRST members only)

June 27th (Tuesday)Return to overview
 Business/Management TrackTechnical Track
07:30 – 17:00

Registration

08:00 – 09:00

Continental Breakfast

09:00 – 09:10

The Day Ahead

The Day Ahead

09:10 – 10:30
US

Log Data Analysis for Incident Response

Anton Chuvakin  Presenter (LogLogic, Inc., US)

US

Next Steps in Bridging the Gap

Gary McGraw (Cigital, Inc., US), Kenneth van Wyk  Presenter (KRvW Associates, LLC, US)

10:30 – 11:00

Coffee break

11:00 – 12:30
US

Log Data Analysis for Incident Response (continued)

Anton Chuvakin  Presenter (LogLogic, Inc., US)

US

Next Steps in Bridging the Gap (continued)

Gary McGraw (Cigital, Inc., US), Kenneth van Wyk  Presenter (KRvW Associates, LLC, US)

12:30 – 14:00

Lunch

14:00 – 15:30
CA

IT Security Teams and Outsourced Managed Security Services - working together

Nicholas Fischbach (COLT Telecom), Chris van Breda  Presenter (Cyberklix, CA)

FR

Honeypot Technology: Principles and Applications

Franck Veysset  Presenter, Laurent Butti  Presenter (France Télécom R&D, FR)

15:30 – 16:00

Coffee break

16:00 – 17:30
CA

IT Security Teams and Outsourced Managed Security Services - working together (continued)

Nicholas Fischbach (COLT Telecom), Chris van Breda  Presenter (Cyberklix, CA)

FR

Honeypot Technology: Principles and Applications (continued)

Franck Veysset  Presenter, Laurent Butti  Presenter (France Télécom R&D, FR)

19:00 – 21:00

Birds of a Feather Sessions

June 28th (Wednesday)Return to overview
 Business/Management TrackTechnical Track
07:30 – 17:30

Registration

08:00 – 09:00

Continental Breakfast

09:00 – 09:10

Welcome and Conference opening

09:10 – 09:50
US

Keynote: Computer Security Incident Response - Past, Present, Future

Richard Pethia  Presenter (CERT/CC – Carnegie Mellon University, US)

09:50 – 10:30
US

Sharing Sensitive Information without Compromising Data

Peter Allor  Presenter (ISS – Internet Security Systems, US)

10:30 – 11:00

Coffee break

11:00 – 12:00
US

CERT's Virtual Training Environment: A New Model for Security and Compliance Training

James Wrubel  Presenter (CERT/CC – Carnegie Mellon University, US)

12:00 – 12:30
NZ

If You Don't Know What You Don't Know

Arjen de Landgraaf  Presenter (Co-Logic Security, Ltd, NZ)

12:30 – 14:00

Lunch

14:00 – 14:30
KR

Risk Analysis Methodology for New IT Service

Jun Heo  Presenter, Yoojae Won (KrCERT/CC – Korea Information Security Agency, KR)

US

Reliably Determining the Outcome of Computer Network Attacks

Barry Mullins, David Chaboya  Presenter, Richard Raines, Rusty Baldwin (AFCERT – Air Force Institute of Technology, US)

14:30 – 15:00
DE

The Impact of Honeynets for CSIRTs

Jan Kohlrausch  Presenter, Jochen Schönfelder (DFN-CERT – DFN-CERT Services GmbH, DE)

PL

Automated Extraction of Threat Signatures from Network Flows

Piotr Kijewski  Presenter (CERT POLSKA – Research and Academic Computer Network in Poland, PL)

15:00 – 15:30
SG

A Strategy for Inexpensive Automated Containment of Infected or Vulnerable Systems

Steven Sim Kok Leong  Presenter (NUSCERT – National University of Singapore, SG)

FI

Behavioral Study of Bot Obedience using Causal Relationship Analysis

Lari Huttunem, Pekka Pietikäinen  Presenter (University of Oulu, FI)

15:30 – 16:00

Coffee break

16:00 – 16:30
US

Maximizing the Benefits of Intrusion Prevention Systems: Effective Deployment Strategies

Calvin Miller, Charles Iheagwara, Farrukh Awan  Presenter, Yusuf Acar (District of Columbia Government, US)

NL

A Distributed Intrusion Detection System Based on Passive Sensors

Rogier Spoor  Presenter (SURFnet-CERT – SURFnet, NL)

16:30 – 17:00
NL

Designing and Developing an Application for Incident Response Teams

Kees Leune  Presenter, Sebastiaan Tesink (Tilburg University, NL)

CH

Netflow Tools NfSen and NFDUMP

Peter Haag  Presenter (SWITCH-CERT – The Swiss Education and Research Network, CH)

17:00 – 17:30
JP

Threats of P2P File Sharing Software - a Japanese Situation About "Winny"

Keisuke Kamata  Presenter, Yuichi Miyagawa (JPCERT/CC – JPCERT Coordination Center, JP)

DE

Proactive Security Monitoring in a Policy Managed Network

Till Dörges  Presenter (PRE-CERT – PRESECURE Consulting GmbH, DE)

19:00 – 23:00

Evening at the Aquarium - Sponsored by E-Secure-IT

June 29th (Thursday)Return to overview
 Business/Management TrackTechnical Track
07:30 – 17:00

Registration

08:00 – 09:00

Continental breakfast

09:00 – 09:10

The Day Ahead

09:10 – 09:50
US

Keynote: Building Effective Relationships between CSIRTs and Law Enforcement

Brian Nagel  Presenter (Assistant Director, Office of Investigations, U.S. Secret Service, US)

09:50 – 10:30
US

The Underground Economy

Rob Thomas  Presenter (Team Cymru – Team Cymru, US)

10:30 – 11:00

Coffee break

11:00 – 11:45
GB

A Year's Evolution on Attacks Against Online Banking Customers

Matthew Pemble  Presenter (RBSG – Royal Bank of Scotland, UK)

11:45 – 12:30
US

Botnets as Vehicle for Online Crime

Aaron Hackworth  Presenter, Nicholas Ianelli  Presenter (CERT/CC – Carnegie Mellon University, US)

12:30 – 14:00

Lunch

14:00 – 14:30
DE

CarmentiS - a German Early Warning Information System - Challenges and Approaches

Jürgen Sander  Presenter (PRE-CERT – PRESECURE Consulting, GmbH, DE)

CH

Building and Deploying Billy Goat: a Worm-Detection System

Diego Zamboni, James Riordan  Presenter, Yann Duponchel (IBM MSS – IBM Zurich Reserch Laboratory, CH)

14:30 – 15:00
US

Counter-Forensic Tools: Analysis and Data Recovery

Matthew Geiger (CERT/CC – Carnegie Mellon University, US)

US

RAPIER - A 1st Responders Info Collection Tool

Joseph Schwendt  Presenter, Steven Mancini  Presenter (IFT – Intel Corporation, US)

15:00 – 15:30

Coffee Break

15:30 – 17:30

FIRST Annual General Meeting

June 30th (Friday)Return to overview
 Business/Management TrackTechnical Track
07:30 – 17:00

Registration

08:00 – 09:00

Continental Breakfast

09:00 – 09:10

The Day Ahead

09:10 – 09:50
US

Keynote: Fixing Internet Security by Hacking the Business Climate

Bruce Schneier  Presenter (Counterpane Internet Security, Inc., US)

09:50 – 10:30
US

The Survivability and Information Assurance (SIA) Curriculum

Lawrence Rogers  Presenter (CERT/CC – Carnegie Mellon University, US)

10:30 – 11:00

Coffee break

11:00 – 11:45
US
GB
JP

Legal Representatives - CERT Panel Discussion

Chris Painter  Presenter (Department of Justice, US), Damir Rajnovic  Presenter (Cisco PSIRT – Cisco Systems Co., UK), Etsuo Doi  Presenter (Attorney-at-law, JP), Tara Flanagan  Presenter (Cisco Systems – Cisco Systems Ltd., US), Terence Palfrey  Presenter (Crown Prosecution Services, UK)

11:45 – 12:30
US

VisFlowConnect-IP : A Link-Based Visualization of NetFlows for Security Monitoring

William Yurcik  Presenter (NCSA-IRST – National Center for Supercomputing Applications, US)

12:30 – 14:00

Lunch

14:00 – 14:30
NO
DE

Effectiveness of Proactive CSIRT Services

Johannes Wiik, Jose Gonzalez (Agder University, NO), Klaus-Peter Kossakowski  Presenter (Software Engineering Institute, DE)

CN

Worm Poisoning Technology and Application

Cui Xiang  Presenter, Wu Bing, Yonglin Zhou, Zou Xin (CNCERT/CC – National Computer Network Emergency Response Technical Team / Coordination Center of China, CN)

14:30 – 15:00
JP

Proposal of RSS Extension for Security Information Exchange

Masato Terada  Presenter (HIRT – Hitachi, JP)

US

A Framework for Effective Alert Visualization

Jon Ramsey, Uday Banerjee  Presenter (SWRX CERT – SecureWorks, US)

15:00 – 15:30
US

The Network-Centric Incident Response and Forensics Imperative

Richard Bejtlich  Presenter (TaoSecurity, US)

BR

Time signatures to Detect Multiheaded Stealthy Attack Tools

Jacomo Piccolini (CAIS/RNP – Brazilian Research Network, BR)

FR

Time Signatures to Detect Multi-headed Stealthy Attack Tools

Fabien Pouget  Presenter (CERTA – French Government, FR), Guillaume Urvoy-Keller, Marc Dacier (Institut EURECOM, FR)

15:30 – 16:00

Closing



Please note: the program schedule is not in its final version, adjustments still can occur.