|
This week is the last chance for attendees to register online for the International Conference on Network Security. For those interested in registering before time runs out please go to: www.networksecurity2006.com
Conference Program
Monday, April 17 TECHNICAL SESSIONS AND PANELS
8:45 - 10:30 am Opening Session Chair: Guy Copeland VP and Assistant to the President, CSC
· Introduction Guy Copeland
· Keynote Speech Andy Purdy Department of Homeland Security
· Issues in Wiretapping Technologies Matt Blaze University of Pennsylvania
Break (10:30 – 10:45 am)
10:45 am - 12:30 pm Panel: User Authentication Technologies Chair: Radia Perlman Sun Microsystems
· PKI: It's not that hard. Why don't we have it? Charlie Kaufman Microsoft
· Web Services/Liberty Approach to Single Sign-on Gerald Beuchelt Sun Microsystems
· Is the Identity-based Crypto the Best Solution? Terence Spies Voltage Security
· PKI: Let’s Make it Happen! Bill Burr NIST
· SAML Comparison to Kerberos to Support a Centralized Authoritative Source for Authentication Hank Simon Lockheed Martin
Lunch (12:30 – 1:45 pm)
1:45 - 3:00 pm Mesh Network Security Chair: Russ Housley Vigil Security, LLC
· Status of 802.11 Mesh and Security Donald Eastlake III Motorola
· Security Issues in 802.11s William Arbaugh, UMD Jesse Walker, Intel
· More on 802.11s Robert Moskowitz ICSA Labs, Cybertrust
Break (3:00 – 3:15 pm)
3:15 - 4:30 pm Defending Against Denial of Service Chair: Jim Hughes Sun Microsystems
· Surviving Denial of Service Andy Ellis Akamai
· MITHRIL: Adaptable Security for Survivability in Collaborative Computing Sites Von Welch, NCSA Jim Basney, NCSA Himanshu Khurana, NCSA
· Investigating the Impact of Real-World Factors on Internet Worm Propagation Xiaoyan Hong University of Alabama
4:30 - 5:30 pm Panel: Legislative Aspects of Security
· Pat Schambach Nortel
· Robert Dix Jr. Citadel Security Software
· Michael Aisenberg Verisign
· John Morris Center for Democracy & Technology
5:30 - 6:30 pm Reception
6:45 - 7:45 pm Tutorial: Network Incident Response Presenter: Richard Bejtlich Tao Security
Tuesday, April 18 TECHNICAL SESSIONS AND PANELS
9:00 - 10:30 am Software Security Chair: Charlie Kaufman Microsoft
· Why Software Breaks Andrew Lee Eset
· Federal Standards and Guidelines Developed by NIST Stuart Katzke NIST
· Impact of NSTISSP-11 on the Current Certification Climate for Products and Technology Keith Beatty SAIC
· How can we make products and deployments more secure? Eric Cole Lockheed Martin
Break (10:30 – 10:45 am)
10:45 am - 12:30 pm Network Security Protocol Issues Chair: Hilarie Orman Purple Streak, Inc.
· Introduction and Comparison of IPv4 Address Resolution Protocol, ICMP Router Discovery and ICMP Redirect; and IPv6 Neighbor Discovery Protocol Security Issues Michael Wasielewski Lockheed-Martin
· The ability for the Warfighter to share critical information across and between networks without leakage Adele Friedel Tenix America
· Availability and Security Tradeoffs Arun Sood Task Technologies Ltd.
· Firewall Traversal: Security and Scalability David McGrew Cisco Systems
· Updates on IETF Security Related Working Groups Sam Hartman MIT Russ Housley Vigil Security
Lunch (12:30 – 1:45 pm)
1:45 - 3:00 pm Security for Wireless and Internet Mobility Chair: Bijan Jabbari Isocore
· Optimizations to Support Secure AP Transitions in 802.11 WLANs Jesse Walker Intel
· 3GPP2 Network Firewall Configuration and Control Michael Paddon Qualcomm
· Proactive EAP-based handover key management for mobile wireless users Madjid Nakhjiri Motorola
Break (3:00 – 3:15 pm)
3:15 - 4:30 pm Panel: Internet Infrastructure Security Chair: Hilarie Orman Purple Streak, Inc.
· MPLS VPN Security Harmen van der Linde Cisco Systems
· DHS and Internet Infrastructure Security Marcus Sachs SRI
· Routing Security Sandra Murphy Sparta
· Why Routing Protocol Security isn't Seeing Wide Adoption Russ White Cisco Systems
4:30 - 5:30 pm Web Browser Security Moderator: Darren Moffat Sun Microsystems
· The Sad State of Evolution of Interface to User Security with a Focus on the Web Browser Eric Greenberg Netframeworks
· XML: Salvation or Struggle Donald Eastlake III Motorola
· Web Browser Security Frameworks Perry Metzger Piermont
· Issues in Web Browser Security Sam Hartman MIT
Wednesday, April 19 TECHNICAL SESSIONS AND PANELS
9:00 - 10:30 am DNS Security Chair: Donald Eastlake III Motorola
· Why isn't DNS security deployed, and would we be safer if it was? Charlie Kaufman Microsoft
· DNSSEC and FISMA Scott Rose NIST
· DNS Security Stuart Schechter Lincoln Laboratory
· The Registry Perspective on DNSSEC Matt Larson Verisgn
Break (10:30 – 10:45 am)
10:45 am - 12:30 pm Panel: Trusted Platforms Chair: Radia Perlman Sun Microsystems
· Trusted Computing: Towards Safe Computing Environments Tom Hardjono SignaCert
· A use for TPM Technology in Routing Infrastructure Andy Ellis Akamai
· Issues in TPM Technology Ned Smith Intel
· An Outsider’s Perspective on TPM Russ Housley Vigilsec
|
_______________________________________________ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html
