08:30 09:00 | Opening Remarks Derrick Scholl (FIRST Chair, US) |
09:00 09:45 | Enabling End-to-End Trust ![[abstract] [abstract]](/_/img/abstract.png) Scott Charney (Corporate Vice President, Trustworthy Computing, Microsoft, US) |
09:50 10:20 | The State of Internet Phishing and Fraud and Useful Means to Combat It ![[abstract] [abstract]](/_/img/abstract.png) Foy Shiver (The Anti Phishing Working Group, US) | Safety and Security of Networked LANs in Aircraft ![[abstract] [abstract]](/_/img/abstract.png) Eric Fleischman (Boeing, US) | A Collaborative Approach to Anti-Spam ![[abstract] [abstract]](/_/img/abstract.png) Chia-Mei Chen (TWCERT/CC National Sun Yat-Sen University, TW) | Geek Zone Malcode Analysis Techniques for Incident Handlers ![[abstract] [abstract]](/_/img/abstract.png) Russ McRee (holisticinfosec.org, US) | Geek Zone Applied Security Visualization ![[abstract] [abstract]](/_/img/abstract.png) Raffael Marty (Splunk, US) |
10:20 10:50 | The State of Internet Phishing and Fraud and Useful Means to Combat It (continued) ![[abstract] [abstract]](/_/img/abstract.png) | Safety and Security of Networked LANs in Aircraft (continued) ![[abstract] [abstract]](/_/img/abstract.png) | Semantic Potential of Existing Security Advisory Standards ![[abstract] [abstract]](/_/img/abstract.png) Stefan Fenz (Secure Business Austria, AT) | Malcode Analysis Techniques for Incident Handlers (continued) ![[abstract] [abstract]](/_/img/abstract.png) | Applied Security Visualization (continued) ![[abstract] [abstract]](/_/img/abstract.png) |
10:50 11:10 | |
11:10 11:40 | International Privacy & Security Compliance Navigating the Maze ![[abstract] [abstract]](/_/img/abstract.png) Steven Ringelberg (Vanguard Integrity Professionals, US) | Malicious Websites on the Chinese Web: Overview and Case Study ![[abstract] [abstract]](/_/img/abstract.png) Dr Minghua Wang (CNCERT/CC National Computer Network Emergency Response Technical Team / Coordination Center of China, CN) | Geek Zone Responding to Security Incidents: Are Security Tools Everything You Need? ![[abstract] [abstract]](/_/img/abstract.png) Rodrigo Werlinger (University of British Columbia, CA) | Practical RFID hacking without soldering irons (or Patent Attorneys) ![[abstract] [abstract]](/_/img/abstract.png) Adam Laurie (RFIDIOt, UK) | Applied Security Visualization (continued) ![[abstract] [abstract]](/_/img/abstract.png) |
11:40 12:10 | International Privacy & Security Compliance Navigating the Maze (continued) ![[abstract] [abstract]](/_/img/abstract.png) | Push-Email in the Enterprise. Is it BlackBerry, WindowsMobile or Symbian? ![[abstract] [abstract]](/_/img/abstract.png) Dr. Heiko Patzlaff (Siemens AG, Corporate Technology, CT IC CERT, DE) | Tunisias experience in building an information sharing and analysis center ![[abstract] [abstract]](/_/img/abstract.png) Haythem EL MIR (Technical Department / NACS, TN) | Practical RFID hacking without soldering irons (or Patent Attorneys) (continued) ![[abstract] [abstract]](/_/img/abstract.png) | Applied Security Visualization (continued) ![[abstract] [abstract]](/_/img/abstract.png) |
12:10 12:50 | Emerging Economies: The Vulnerability Market ![[abstract] [abstract]](/_/img/abstract.png) Terri Forslof (TippingPoint, a division of 3Com, US) | Panel Dutch Banking Panel: An overview and panel discussion about the cooperation between banks and the CSIRT community in light of phishing and other recent threats | CERTification: Assessing CSIRT Maturity ![[abstract] [abstract]](/_/img/abstract.png) Klaus-Peter Kossakowski (PRE-CERT PRESECURE Consulting GmbH, DE), Don Stikvoort (S-CURE, NL) | Tales from the dark. Diary of a compromised Windows Vista ![[abstract] [abstract]](/_/img/abstract.png) Jacomo Piccolini (CAIS/RNP Brazilian Academic and Research Network, BR), Ivo Carvalho Peixinho (CAIS/RNP Brazilian Federal Police, BR) | Applied Security Visualization (continued) ![[abstract] [abstract]](/_/img/abstract.png) |
12:50 14:10 | |
14:10 14:50 | The Dark Future of Desktop Security and How to Stop It ![[abstract] [abstract]](/_/img/abstract.png) Ivan Krstić ![[biography] [biography]](/_/img/bio.png) |
14:50 15:40 | Malware Without Borders - Multi-Party Response ![[abstract] [abstract]](/_/img/abstract.png) Jeff Williams , Ziv Mador (Microsoft, US) | SCADA Security Who Is Really In Control of Our Control Systems? ![[abstract] [abstract]](/_/img/abstract.png) Peter G. Allor (IBM Internet Security Systems, US) | Special Interest Group Abuse Handling SIG Martijn van der Heide (KPN-CERT Chairman KPN-CERT, NL) | Event Correlation for Early Warning Systems ![[abstract] [abstract]](/_/img/abstract.png) Till Dörges (PRE-CERT PRESECURE Consulting GmbH, DE) | Incident Handling around the world in 80 ms. (Well not really that fast) ![[abstract] [abstract]](/_/img/abstract.png) Greg Bassett , Steve Mancini (Intel Corporation, US) |
15:40 16:00 | |
16:00 17:00 | Intellectual Property Loss in the Global Marketplace ![[abstract] [abstract]](/_/img/abstract.png) Christopher Burgess (Cisco, US) | Has Pakistan stolen your traffic lately? Threats to Internet Routing and Global Connectivity ![[abstract] [abstract]](/_/img/abstract.png) Earl Zmijewski (Renesys, US) | Abuse Handling SIG (continued) | The Most Important Thing: How Mozilla Does Security and What You Can Steal ![[abstract] [abstract]](/_/img/abstract.png) Johnathan Nightingale (Mozilla, CA) | Incident Handling around the world in 80 ms. (Well not really that fast) (continued) ![[abstract] [abstract]](/_/img/abstract.png) |
19:00 23:00 | Social event Conference Banquet Pan Pacific Hotel Crystal Pavilion (Waterfront Road & Howe Street at Canada Place) |
| Breakout I - Regency CDEF | Breakout II - Regency AB | Breakout III / SIG - Plaza A | Geek zone I / Breakout III - Georgia B | Geek Zone II / Geek Zone I - Georgia A |
---|