08:30 09:00 | Opening Remarks Derrick Scholl (FIRST Chair, US) |
09:00 09:45 | Enabling End-to-End Trust Scott Charney (Corporate Vice President, Trustworthy Computing, Microsoft, US) |
09:50 10:20 | The State of Internet Phishing and Fraud and Useful Means to Combat It Foy Shiver (The Anti Phishing Working Group, US) | Safety and Security of Networked LANs in Aircraft Eric Fleischman (Boeing, US) | A Collaborative Approach to Anti-Spam Chia-Mei Chen (TWCERT/CC National Sun Yat-Sen University, TW) | Geek Zone Malcode Analysis Techniques for Incident Handlers Russ McRee (holisticinfosec.org, US) | Geek Zone Applied Security Visualization Raffael Marty (Splunk, US) |
10:20 10:50 | The State of Internet Phishing and Fraud and Useful Means to Combat It (continued) | Safety and Security of Networked LANs in Aircraft (continued) | Semantic Potential of Existing Security Advisory Standards Stefan Fenz (Secure Business Austria, AT) | Malcode Analysis Techniques for Incident Handlers (continued) | Applied Security Visualization (continued) |
10:50 11:10 | |
11:10 11:40 | International Privacy & Security Compliance Navigating the Maze Steven Ringelberg (Vanguard Integrity Professionals, US) | Malicious Websites on the Chinese Web: Overview and Case Study Dr Minghua Wang (CNCERT/CC National Computer Network Emergency Response Technical Team / Coordination Center of China, CN) | Geek Zone Responding to Security Incidents: Are Security Tools Everything You Need? Rodrigo Werlinger (University of British Columbia, CA) | Practical RFID hacking without soldering irons (or Patent Attorneys) Adam Laurie (RFIDIOt, UK) | Applied Security Visualization (continued) |
11:40 12:10 | International Privacy & Security Compliance Navigating the Maze (continued) | Push-Email in the Enterprise. Is it BlackBerry, WindowsMobile or Symbian? Dr. Heiko Patzlaff (Siemens AG, Corporate Technology, CT IC CERT, DE) | Tunisias experience in building an information sharing and analysis center Haythem EL MIR (Technical Department / NACS, TN) | Practical RFID hacking without soldering irons (or Patent Attorneys) (continued) | Applied Security Visualization (continued) |
12:10 12:50 | Emerging Economies: The Vulnerability Market Terri Forslof (TippingPoint, a division of 3Com, US) | Panel Dutch Banking Panel: An overview and panel discussion about the cooperation between banks and the CSIRT community in light of phishing and other recent threats | CERTification: Assessing CSIRT Maturity Klaus-Peter Kossakowski (PRE-CERT PRESECURE Consulting GmbH, DE), Don Stikvoort (S-CURE, NL) | Tales from the dark. Diary of a compromised Windows Vista Jacomo Piccolini (CAIS/RNP Brazilian Academic and Research Network, BR), Ivo Carvalho Peixinho (CAIS/RNP Brazilian Federal Police, BR) | Applied Security Visualization (continued) |
12:50 14:10 | |
14:10 14:50 | The Dark Future of Desktop Security and How to Stop It Ivan Krstić |
14:50 15:40 | Malware Without Borders - Multi-Party Response Jeff Williams , Ziv Mador (Microsoft, US) | SCADA Security Who Is Really In Control of Our Control Systems? Peter G. Allor (IBM Internet Security Systems, US) | Special Interest Group Abuse Handling SIG Martijn van der Heide (KPN-CERT Chairman KPN-CERT, NL) | Event Correlation for Early Warning Systems Till Dörges (PRE-CERT PRESECURE Consulting GmbH, DE) | Incident Handling around the world in 80 ms. (Well not really that fast) Greg Bassett , Steve Mancini (Intel Corporation, US) |
15:40 16:00 | |
16:00 17:00 | Intellectual Property Loss in the Global Marketplace Christopher Burgess (Cisco, US) | Has Pakistan stolen your traffic lately? Threats to Internet Routing and Global Connectivity Earl Zmijewski (Renesys, US) | Abuse Handling SIG (continued) | The Most Important Thing: How Mozilla Does Security and What You Can Steal Johnathan Nightingale (Mozilla, CA) | Incident Handling around the world in 80 ms. (Well not really that fast) (continued) |
19:00 23:00 | Social event Conference Banquet Pan Pacific Hotel Crystal Pavilion (Waterfront Road & Howe Street at Canada Place) |
| Breakout I - Regency CDEF | Breakout II - Regency AB | Breakout III / SIG - Plaza A | Geek zone I / Breakout III - Georgia B | Geek Zone II / Geek Zone I - Georgia A |
---|