This week is the last chance for attendees to register online for the International Conference on Network Security.  For those interested in registering before time runs out please go to:  www.networksecurity2006.com

 

Conference Program

 

Monday, April 17

TECHNICAL SESSIONS AND PANELS 

 

8:45 - 10:30 am

Opening Session

Chair: Guy Copeland

VP and Assistant to the President, CSC

 

· Introduction

Guy Copeland

 

· Keynote Speech

Andy Purdy

Department of Homeland Security

 

· Issues in Wiretapping Technologies

Matt Blaze

University of Pennsylvania

 

Break (10:30 – 10:45 am)

 

10:45 am - 12:30 pm

Panel: User Authentication Technologies

Chair: Radia Perlman

Sun Microsystems

 

· PKI: It's not that hard. Why don't we have it?

Charlie Kaufman

Microsoft

 

· Web Services/Liberty Approach to Single Sign-on

Gerald Beuchelt

Sun Microsystems

 

· Is the Identity-based Crypto the Best Solution?

Terence Spies

Voltage Security

 

· PKI: Let’s Make it Happen!

Bill Burr

NIST

 

· SAML Comparison to Kerberos to Support a Centralized Authoritative Source for Authentication

Hank Simon

Lockheed Martin

 

Lunch (12:30 – 1:45 pm)

 

1:45 - 3:00 pm

Mesh Network Security

Chair: Russ Housley

Vigil Security, LLC

 

· Status of 802.11 Mesh and Security

Donald Eastlake III

Motorola

 

· Security Issues in 802.11s

William Arbaugh, UMD

Jesse Walker, Intel

 

· More on 802.11s

Robert Moskowitz

ICSA Labs, Cybertrust

 

Break (3:00 – 3:15 pm)

 

3:15 - 4:30 pm

Defending Against Denial of Service

Chair: Jim Hughes

Sun Microsystems

 

· Surviving Denial of Service

Andy Ellis

Akamai

 

· MITHRIL: Adaptable Security for Survivability in Collaborative Computing Sites

Von Welch, NCSA

Jim Basney, NCSA

Himanshu Khurana, NCSA

 

· Investigating the Impact of Real-World Factors on Internet Worm Propagation

Xiaoyan Hong

University of Alabama

 

4:30 - 5:30 pm

Panel: Legislative Aspects of Security

 

· Pat Schambach

Nortel

 

· Robert Dix Jr.

Citadel Security Software

 

· Michael Aisenberg

Verisign

 

· John Morris

Center for Democracy & Technology

 

5:30 - 6:30 pm

Reception

 

6:45 - 7:45 pm

Tutorial: Network Incident Response

Presenter: Richard Bejtlich

Tao Security

 

Tuesday, April 18

TECHNICAL SESSIONS AND PANELS

 

9:00 - 10:30 am

Software Security

Chair: Charlie Kaufman

Microsoft

 

· Why Software Breaks

Andrew Lee

Eset

 

· Federal Standards and Guidelines

Developed by NIST

Stuart Katzke

NIST

 

· Impact of NSTISSP-11 on the Current

Certification Climate for Products and

Technology

Keith Beatty

SAIC

 

· How can we make products and

deployments more secure?

Eric Cole

Lockheed Martin

 

Break (10:30 – 10:45 am)

 

10:45 am - 12:30 pm

Network Security Protocol Issues

Chair: Hilarie Orman

Purple Streak, Inc.

 

· Introduction and Comparison of IPv4 Address Resolution Protocol, ICMP Router Discovery and ICMP Redirect; and IPv6 Neighbor Discovery Protocol Security Issues

Michael Wasielewski

Lockheed-Martin

 

· The ability for the Warfighter to share critical information across and between networks without leakage

Adele Friedel

Tenix America

 

· Availability and Security Tradeoffs

Arun Sood

Task Technologies Ltd.

 

· Firewall Traversal: Security and Scalability

David McGrew

Cisco Systems

 

· Updates on IETF Security Related Working Groups

Sam Hartman

MIT

Russ Housley

Vigil Security

 

Lunch (12:30 – 1:45 pm)

 

1:45 - 3:00 pm

Security for Wireless and Internet Mobility

Chair: Bijan Jabbari

Isocore

 

· Optimizations to Support Secure AP Transitions in 802.11 WLANs

Jesse Walker

Intel

 

· 3GPP2 Network Firewall Configuration and Control

Michael Paddon

Qualcomm

 

· Proactive EAP-based handover key management for mobile wireless users

Madjid Nakhjiri

Motorola

 

Break (3:00 – 3:15 pm)

 

3:15 - 4:30 pm

Panel: Internet Infrastructure Security

Chair: Hilarie Orman

Purple Streak, Inc.

 

· MPLS VPN Security

Harmen van der Linde

Cisco Systems

 

· DHS and Internet Infrastructure Security

Marcus Sachs

SRI

 

· Routing Security

Sandra Murphy

Sparta

 

· Why Routing Protocol Security isn't Seeing Wide Adoption

Russ White

Cisco Systems

 

4:30 - 5:30 pm

Web Browser Security

Moderator: Darren Moffat

Sun Microsystems

 

· The Sad State of Evolution of Interface to User Security with a Focus on the Web Browser

Eric Greenberg

Netframeworks

 

· XML: Salvation or Struggle

Donald Eastlake III

Motorola

 

· Web Browser Security Frameworks

Perry Metzger

Piermont

 

· Issues in Web Browser Security

Sam Hartman

MIT

 

Wednesday, April 19

TECHNICAL SESSIONS AND PANELS

 

9:00 - 10:30 am

DNS Security

Chair: Donald Eastlake III

Motorola

 

· Why isn't DNS security deployed, and would we be safer if it was?

Charlie Kaufman

Microsoft

 

· DNSSEC and FISMA

Scott Rose

NIST

 

· DNS Security

Stuart Schechter

Lincoln Laboratory

 

· The Registry Perspective on DNSSEC

Matt Larson

Verisgn

 

Break (10:30 – 10:45 am)

 

10:45 am - 12:30 pm

Panel: Trusted Platforms

Chair: Radia Perlman

Sun Microsystems

 

· Trusted Computing: Towards Safe Computing Environments

Tom Hardjono

SignaCert

 

· A use for TPM Technology in Routing Infrastructure

Andy Ellis

Akamai

 

· Issues in TPM Technology

Ned Smith

Intel

 

· An Outsider’s Perspective on TPM

Russ Housley

Vigilsec

 

 

 

 

 

 

 

 

 

 

 

 

 

_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to