Program

June 22-27, 2008
Hyatt Regency Vancouver
British Columbia, Canada

20th Annual FIRST Conference

Final Program

Overview

Sunday, June 22nd

Registration

Ice Breaker Reception


Monday, June 23rd

Tutorials

SIG Meetings


Tuesday, June 24th

Tutorials

SIG Meetings

Beer & Gear

Pre-AGM


Wednesday, June 25th

Conference Opening

Breakout Sessions

SIG Meetings

Geek Zones

Sponsors' Luncheon


 

Thursday, June 26th

General Session

Breakout Sessions

Geek Zones

SIG Meetings

Annual General Meeting (AGM)


Friday, June 27th

General Session

Breakout Sessions

Geek Zones

SIG Meetings

Conference Closing


Program

Download the conference schedule

schedule-2008.pdf
PDF format, 470Kb


Sunday, June 22nd


14:00 – 18:00

Registration

19:00 – 21:00

Added Attraction

Ice Breaker Reception



Monday, June 23rd


08:30 – 10:50

Tutorial

MSFT Defend the Flag - Day 1

US

Tutorial

System, Network and Security Log Analysis for Incident Response [abstract]

Anton Chuvakin [biography] (LogLogic, Inc., US)

SE

Geek Zone

Detecting Intrusions - The latest forensics tools and techniques to identify Windows malware infections [abstract]

Pär Österberg Medina [biography] (Swedish IT Incident Centre, Sitic, SE)

US

Special Interest Group

CVSS SIG [abstract]

Gavin Reid [biography] (Cisco Systems, US)

10:50 – 11:10

Morning tea break

11:10 – 12:30

MSFT Defend the Flag - Day 1 (continued)

US

System, Network and Security Log Analysis for Incident Response (continued) [abstract]

SE

Detecting Intrusions - The latest forensics tools and techniques to identify Windows malware infections (continued) [abstract]

USUK

Vendor SIG

Bruce Monroe (Intel, US), Damir (Gaus) Rajnovic (Cisco PSIRT – Cisco Systems Co., UK)

12:30 – 14:00

Lunch break

14:00 – 15:20

MSFT Defend the Flag - Day 1 (continued)

US

System, Network and Security Log Analysis for Incident Response (continued) [abstract]

SE

Detecting Intrusions - The latest forensics tools and techniques to identify Windows malware infections (continued) [abstract]

USUK

Vendor SIG (continued)

15:20 – 15:40

Afternoon tea break

15:40 – 17:00

MSFT Defend the Flag - Day 1 (continued)

US

System, Network and Security Log Analysis for Incident Response (continued) [abstract]

SE

Detecting Intrusions - The latest forensics tools and techniques to identify Windows malware infections (continued) [abstract]

USUK

Vendor SIG (continued)

 Tutorial I - Regency ABTutorial II - Regency CGeek zone I - Plaza ABSIG - Plaza C


Tuesday, June 24th


08:30 – 10:50

Tutorial

MSFT Defend the Flag - Day 2

JP

Special Interest Group

FIRST Law Enforcement/CSIRT Cooperation SIG (LECC-SIG) – Related G8: HI-Tech Crimes Workshop [abstract]

Yurie Ito (JPCERT/CC, JP)

US

Tutorial

Creating and Managing Computer Security Incident Response Teams(CSIRTs) [abstract]

Georgia Killcrece [biography], Mark Zajicek [biography], Robin Ruefle [biography] (CERT/CC – Carnegie Mellon University, US)

UKNL

Tutorial

Techies Can Communicate Too ! [abstract]

David Pybus [biography] (Diageo, UK), Don Stikvoort [biography] (S-CURE, NL)

10:50 – 11:10

Morning tea break

11:10 – 12:30

MSFT Defend the Flag - Day 2 (continued)

JP

FIRST Law Enforcement/CSIRT Cooperation SIG (LECC-SIG) – Related G8: HI-Tech Crimes Workshop (continued) [abstract]

US

Creating and Managing Computer Security Incident Response Teams(CSIRTs) (continued) [abstract]

UKNL

Techies Can Communicate Too ! (continued) [abstract]

12:30 – 14:00

Lunch break

14:00 – 15:20

MSFT Defend the Flag - Day 2 (continued)

US

Tutorial

The life cycle of infections and a botnet [abstract]

Richard Perlotto [biography] (Shadowserver Foundation, US)

US

Creating and Managing Computer Security Incident Response Teams(CSIRTs) (continued) [abstract]

NL

Special Interest Group

Network Monitoring SIG - Monitoring and Detection of Fast-Flux Service Networks [abstract]

Carol Overes [biography] (GOVCERT.NL, NL)

15:20 – 15:40

Afternoon tea break

15:40 – 16:30

MSFT Defend the Flag - Day 2 (continued)

US

The life cycle of infections and a botnet (continued) [abstract]

US

Creating and Managing Computer Security Incident Response Teams(CSIRTs) (continued) [abstract]

NL

Network Monitoring SIG - Large-scale Monitoring of Fast-Flux Service Networks [abstract]

Carol Overes [biography] (GOVCERT.NL, NL)

16:30 – 18:00

Added Attraction

Bear n' Gear

18:00 – 19:00

Side event

Pre AGM

 Tutorial I - Regency ABTutorial II - Regency CTutorial III - Plaza ABTutorial IV - Plaza C


Wednesday, June 25th


08:30 – 09:00
US

Opening Remarks

Derrick Scholl (FIRST Chair, US)

09:00 – 09:45
US

Enabling End-to-End Trust [abstract]

Scott Charney [biography] (Corporate Vice President, Trustworthy Computing, Microsoft, US)

09:50 – 10:20
US

The State of Internet Phishing and Fraud and Useful Means to Combat It [abstract]

Foy Shiver [biography] (The Anti Phishing Working Group, US)

US

Safety and Security of Networked LANs in Aircraft [abstract]

Eric Fleischman [biography] (Boeing, US)

TW

A Collaborative Approach to Anti-Spam [abstract]

Chia-Mei Chen [biography] (TWCERT/CC – National Sun Yat-Sen University, TW)

US

Geek Zone

Malcode Analysis Techniques for Incident Handlers [abstract]

Russ McRee [biography] (holisticinfosec.org, US)

US

Geek Zone

Applied Security Visualization [abstract]

Raffael Marty [biography] (Splunk, US)

10:20 – 10:50
US

The State of Internet Phishing and Fraud and Useful Means to Combat It (continued) [abstract]

US

Safety and Security of Networked LANs in Aircraft (continued) [abstract]

AT

Semantic Potential of Existing Security Advisory Standards [abstract]

Stefan Fenz (Secure Business Austria, AT)

US

Malcode Analysis Techniques for Incident Handlers (continued) [abstract]

US

Applied Security Visualization (continued) [abstract]

10:50 – 11:10

Morning tea break

11:10 – 11:40
US

International Privacy & Security Compliance — Navigating the Maze [abstract]

Steven Ringelberg [biography] (Vanguard Integrity Professionals, US)

CN

Malicious Websites on the Chinese Web: Overview and Case Study [abstract]

Dr Minghua Wang [biography] (CNCERT/CC – National Computer Network Emergency Response Technical Team / Coordination Center of China, CN)

CA

Geek Zone

Responding to Security Incidents: Are Security Tools Everything You Need? [abstract]

Rodrigo Werlinger [biography] (University of British Columbia, CA)

UK

Practical RFID hacking without soldering irons (or Patent Attorneys) [abstract]

Adam Laurie [biography] (RFIDIOt, UK)

US

Applied Security Visualization (continued) [abstract]

11:40 – 12:10
US

International Privacy & Security Compliance — Navigating the Maze (continued) [abstract]

DE

Push-Email in the Enterprise. Is it BlackBerry, WindowsMobile or Symbian? [abstract]

Dr. Heiko Patzlaff [biography] (Siemens AG, Corporate Technology, CT IC CERT, DE)

TN

Tunisia’s experience in building an information sharing and analysis center [abstract]

Haythem EL MIR [biography] (Technical Department / NACS, TN)

UK

Practical RFID hacking without soldering irons (or Patent Attorneys) (continued) [abstract]

US

Applied Security Visualization (continued) [abstract]

12:10 – 12:50
US

Emerging Economies: The Vulnerability Market [abstract]

Terri Forslof [biography] (TippingPoint, a division of 3Com, US)

Panel

Dutch Banking Panel: An overview and panel discussion about the cooperation between banks and the CSIRT community in light of phishing and other recent threats

DENL

CERTification: Assessing CSIRT Maturity [abstract]

Klaus-Peter Kossakowski [biography] (PRE-CERT – PRESECURE Consulting GmbH, DE), Don Stikvoort [biography] (S-CURE, NL)

BR

Tales from the dark. Diary of a compromised Windows Vista [abstract]

Jacomo Piccolini [biography] (CAIS/RNP – Brazilian Academic and Research Network, BR), Ivo Carvalho Peixinho [biography] (CAIS/RNP – Brazilian Federal Police, BR)

US

Applied Security Visualization (continued) [abstract]

12:50 – 14:10

Lunch break

14:10 – 14:50
HR

The Dark Future of Desktop Security and How to Stop It [abstract]

Ivan Krstić [biography]

14:50 – 15:40
US

Malware Without Borders - Multi-Party Response [abstract]

Jeff Williams [biography], Ziv Mador [biography] (Microsoft, US)

US

SCADA Security – Who Is Really In Control of Our Control Systems? [abstract]

Peter G. Allor [biography] (IBM Internet Security Systems, US)

NL

Special Interest Group

Abuse Handling SIG

Martijn van der Heide (KPN-CERT – Chairman KPN-CERT, NL)

DE

Event Correlation for Early Warning Systems [abstract]

Till Dörges [biography] (PRE-CERT – PRESECURE Consulting GmbH, DE)

US

Incident Handling around the world in 80 ms. (Well not really that fast) [abstract]

Greg Bassett [biography], Steve Mancini [biography] (Intel Corporation, US)

15:40 – 16:00

Afternoon tea break

16:00 – 17:00
US

Intellectual Property Loss in the Global Marketplace [abstract]

Christopher Burgess [biography] (Cisco, US)

US

Has Pakistan stolen your traffic lately? – Threats to Internet Routing and Global Connectivity [abstract]

Earl Zmijewski [biography] (Renesys, US)

NL

Abuse Handling SIG (continued)

CA

The Most Important Thing: How Mozilla Does Security and What You Can Steal [abstract]

Johnathan Nightingale [biography] (Mozilla, CA)

US

Incident Handling around the world in 80 ms. (Well not really that fast) (continued) [abstract]

19:00 – 23:00

Social event

Conference Banquet

Pan Pacific Hotel Crystal Pavilion (Waterfront Road & Howe Street at Canada Place)

 Breakout I - Regency CDEFBreakout II - Regency ABBreakout III / SIG - Plaza AGeek zone I / Breakout III - Georgia BGeek Zone II / Geek Zone I - Georgia A


Thursday, June 26th


08:30 – 09:00

Opening Remarks

09:00 – 10:00
US

The Enterprise’s Role in Protecting Critical Infrastructures [abstract]

John Stewart [biography] (Cisco Systems, US)

10:00 – 10:50
CA

Computer Forensics for Managers and IT Administrators What you need to know [abstract]

Chris van Breda [biography] (Cyberklix, CA)

US

Incident Management Mission Diagnostic(IMMD) Method [abstract]

Georgia Killcrece [biography], Mark Zajicek [biography], Robin Ruefle [biography] (CERT/CC – Carnegie Mellon University, US)

FR

FMC (Fixed Mobile Convergence) - What About Security [abstract]

Franck Veysset [biography] (France Télécom R&D, FR)

US

Geek Zone

Inside a BBB Malware Scheme - Mapping and Dissecting Attacker Infrastructure [abstract]

Michael La Pilla [biography] (VeriSign – iDefense, US)

UK

Geek Zone

The future of hacking: Blended attacks using social engineering [abstract]

Peter Wood [biography] (First Base Technologies, UK)

10:50 – 11:10

Morning tea break

11:10 – 11:40
US

Industry Briefing – An Exercise in Vendor Coordination

Peter G. Allor [biography] (IBM Internet Security Systems, US)

US

Safely Sharing Data Between CSIRTs for Collaborative Security: The SCRUB* Anonymization Tool Infrastructure [abstract]

William Yurcik [biography] (University of Texas at Dallas, US)

CN

Matrix, a Distributed Honeynet and its Applications [abstract]

Yonglin Zhou [biography] (CNCERT/CC – National Computer Network Emergency Response Technical Team / Coordination Center of China, CN)

US

Virtualization Technology A Manifold Arms Race [abstract]

Michael H. Warfield [biography] (IBM Internet Security Systems, US)

UK

The future of hacking: Blended attacks using social engineering (continued) [abstract]

11:40 – 12:10
US

Industry Briefing – An Exercise in Vendor Coordination (continued)

DE

GridCERT Services - Modification of traditional and additional new CERT Services for Grids [abstract]

Antonio Liu (PRESECURE, DE)

PL

Spotspam - Tackling Spam at New Frontiers [abstract]

Przemyslaw Jaroszewski [biography] (CERT POLSKA, PL)

US

Virtualization Technology A Manifold Arms Race (continued) [abstract]

UK

The future of hacking: Blended attacks using social engineering (continued) [abstract]

12:10 – 12:50
US

Who’s watching the watch dogs? Security Audits for network infrastructure security enforcement devices [abstract]

Kowsik Guruswamy [biography] (Mu Dynamics, US)

NLPL

The HoneySpider Network: Fighting client-side threats [abstract]

Rogier J.L. Spoor [biography] (SURFnet, NL), Piotr Kijewski [biography] (CERT POLSKA – NASK/CERT Polska, PL), Carol Overes [biography] (GOVCERT.NL, NL)

ES

National spam monitoring network [abstract]

Juan Díez González [biography], Luis Fernández [biography] (INTECO, ES)

DE

About the Security Pros and Cons of Server Virtualization [abstract]

Dr. Martin Wimmer [biography] (Siemens AG, Corporate Technology, CT IC CERT, DE)

US

Tracking and Detecting Trojan Command and Control Servers [abstract]

Ryan Olson [biography] (VeriSign – Verisign/iDefense, US)

12:50 – 14:10

Lunch break

14:10 – 14:50
CA

Insecurity [abstract]

J. D. Frazer [biography] (UserFriendly.org, CA)

14:50 – 15:20
US

The Easiest Score on the Internet - PII and corporate secrets for the taking on P2P file sharing networks. [abstract]

Chris Gormley [biography] (Tiversa, Inc., US)

US

Automating Vulnerability Management in a Heterogeneous Enterprise [abstract]

Jeff Boerio [biography] (Intel Corporation, US)

PL

Barriers to CSIRTS cooperation with other CSIRTS and The CLOSER Project [abstract]

Emin Akhundov, Krzysztof Silicki [biography], Miroslaw Maj [biography] (NASK/CERT Polska, PL)

US

Bot Herder Case Studies [abstract]

Richard Perlotto [biography] (Shadowserver Foundation, US)

US

Trends in the Internet Underground / Cyber Kadogos [abstract]

Christopher Abad [biography] (20 GOTO 10, US)

15:20 – 15:40
US

The Easiest Score on the Internet - PII and corporate secrets for the taking on P2P file sharing networks. (continued) [abstract]

US

Automating Vulnerability Management in a Heterogeneous Enterprise (continued) [abstract]

PL

Barriers to CSIRTS cooperation with other CSIRTS and The CLOSER Project (continued) [abstract]

US

Bot Herder Case Studies (continued) [abstract]

US

Trends in the Internet Underground / Cyber Kadogos (continued) [abstract]

15:40 – 17:50

Side event

Annual General Meeting (AGM)

* Limited to FIRST team members and their invited guests, subject to approval by the Steering Committee

 Breakout I - Regency CDEFBreakout II - Georgia BBreakout III / SIG - Plaza AGeek zone I - Regency ABGeek zone II - Georgia A


Friday, June 27th


08:30 – 08:50

Opening Remarks

08:50 – 09:30
US

Internet Law Update 2008 [abstract]

William Cook [biography] (Wildman, Harrold, Allen and Dixon LLP, US)

09:30 – 10:20
US

Public and Private Collaboration for Improved National Cyber Security [abstract]

Peter G. Allor [biography] (IBM Internet Security Systems, US)

US

Cyber Fraud Trends [abstract]

Ralph Thomas (VERISIGN iDefense, US)

CH

Putting private and government CERT’s to the test [abstract]

Stephen Frei (ETH Zurich, CH)

US

Geek Zone

Security Testing: Moving Beyond the Penetration Test [abstract]

Kenneth R. van Wyk [biography] (KRvW Associates, LLC, US)

CA

Geek Zone

Building a no frills malware lab: How to construct a relatively inexpensive, yet effective, malware analysis lab for CIRTs [abstract]

Andre Cormier, Robert Pitcher (CCIRC, CA)

10:20 – 10:40

Morning tea break

10:40 – 11:30
USBE

Securing Wiki-Style Technology in the Global Enterprise: The Competing Tensions of Privacy Law and Distributed Collaboration [abstract]

Steven Michalove [biography] (Microsoft, US), Thomas Daemen [biography] (Microsoft, BE)

US

Security Breaches: To Disclose or not to Disclose [abstract]

Gib Sorebo [biography] (SAIC, US)

US

Special Interest Group

CSIRT Metrics SIG

Georgia Killcrece [biography] (CERT/CC – Carnegie Mellon University, US)

US

Identifying network scanning tools [abstract]

Kenneth R. van Wyk [biography] (KRvW Associates, LLC, US), Robert Floodeen [biography] (Spectrum, US)

CA

Building a no frills malware lab: How to construct a relatively inexpensive, yet effective, malware analysis lab for CIRTs (continued) [abstract]

11:30 – 12:20
UK

Models and Experiences for National and International Information Sharing [abstract]

Andrea Rigoni [biography] (Symantec, UK)

UK

Security and Education – Bringing it all Together [abstract]

Frank Wintle [biography] (PanMedia Ltd, UK)

US

CSIRT Metrics SIG (continued)

NL

Beyond a sensor: Towards the Globalization of SURFids [abstract]

Wim Biemolt (SURFnet, NL)

CA

Building a no frills malware lab: How to construct a relatively inexpensive, yet effective, malware analysis lab for CIRTs (continued) [abstract]

12:20 – 12:50
CA

Managing Security & Privacy Incidents in the Health Care Environment [abstract]

Bobby Singh [biography] (Smart Systems for Health Agency, CA)

KR

Efforts to Secure Electronic Financial Transactions [abstract]

JinWook Choi [biography] (Financial Security Agency, KR)

US

CSIRT Metrics SIG (continued)

BR

Phishing without URL, when miscreants go malware [abstract]

Atanai Sousa Ticianelli [biography], Jacomo Piccolini [biography] (CAIS/RNP – Brazilian Academic and Research Network, BR)

CA

Building a no frills malware lab: How to construct a relatively inexpensive, yet effective, malware analysis lab for CIRTs (continued) [abstract]

12:50 – 14:10

Lunch break

14:10 – 14:30
US

Closing Remarks

Derrick Scholl (FIRST Chair, US)

 Breakout I - Regency CDEFBreakout II - Regency ABBreakout III / SIG - Plaza AGeek zone I - Georgia BGeek zone II - Georgia A


20th Annual Conference Sponsorship Team