Preliminary Program Schedule
|
Sunday, June 23, 2002
|
14:00-18:00
|
Early Registration
|
Waikoloa Promenade
|
19:00-21:00
|
Welcome Icebreaker Reception
|
Kona Pool
|
Monday, June 24, 2002
|
07:00-17:30
|
Registration
|
Waikoloa Promenade
|
07:00-08:30
|
Continental Breakfast
|
Lagoon Lanai
|
08:30-12:30
|
Tutorial
Forensic Discovery
Dan Farmer - USA
Wietse Venema
IBM T.J. Watson Research Center - USA
|
Kohala Ballroom
|
10:15-10:45
|
Break
|
Grand Promenade Central
|
12:30-14:00
|
Lunch
|
Lagoon Lanai
|
14:00-17:30
|
Tutorial
An Investigator's Guide to
File System Internals
Brian Carrier
@stake Response Team. - USA
|
Kohala Ballroom
|
15:30-16:00
|
Break
|
Grand Promenade Central
|
Tuesday, June 25, 2002
|
07:30-17:30
|
Registration
|
Waikoloa Promenade
|
07:30-08:30
|
Continental Breakfast
|
Lagoon Lanai
|
|
Concurrent Sessions
|
|
08:30-10:15
|
Tutorial
Intrusion Detection Utilizing
Ethereal
David Chaboya
AFCERT, United States Air Force - USA
|
Kohala Ballroom
|
08:30-10:15
|
Tutorial
CSIRT Training: Legal Issues
Jacques Schuurman
SURFnet BV - The Netherlands
Andrew Cormack, Chief Security Advisor
JANET-CERT, UKERNA - UK
|
Queens Grand
|
10:15-10:45
|
Break
|
Grand Promenade Central
|
|
Concurrent Sessions
|
|
10:45-12:30
|
Tutorial
Security at the Speed of E-business:
Protecting Web Applications
Rudy Bakalov
PricewaterhouseCoopers, LLP - USA
|
Kohala Ballroom
|
10:45-12:30
|
Tutorial
Forensics for Windows XP Clients
Larry Leibrock
eForensics LLC - USA
|
|
12:30-14:00
|
Lunch
|
Lagoon Lanai
|
|
Concurrent Sessions
|
|
14:00-17:30
|
Tutorial
Forensics for Windows XP Clients
Larry Leibrock
eForensics LLC - USA
|
Kohala Ballroom
|
14:00-17:30
|
Tutorial
The Role of Computer Forensics in the
Investigation of Network
Intrusion Activity
Gregory P. Schaffer
PricewaterhouseCoopers, LLP - USA
|
Queens Grand
|
15:30-16:00
|
Break
|
Grand Promenade Central
|
19:30-22:00
|
Birds of a Feather Sessions (BOFS)
|
|
Wednesday, June 26, 2002
|
08:00-17:30
|
Registration
|
Waikoloa Promenade
|
08:00-09:00
|
Continental Breakfast
|
Lagoon Lanai
|
09:00-09:15
|
Welcome and Opening Remarks
Wietse Venema
Chair, FIRST Steering Committee
|
Monarchy Ballroom
|
09:15-10:15
|
Keynote
Securing America's Communication Infrastructure
Marcus H. Sachs
Director for Communication Infrastructure Protection
Office of Cyberspace Security
The White House
|
Monarchy Ballroom
|
10:15-10:45
|
Break
|
Grand Promenade Central
|
10:45-12:30
|
Technical Session
|
Monarchy Ballroom
|
10:45-11:15
|
Design, Processing and Implementation of a
Network Security Policy
Christoph Kroell
European Space Agency (ESA) - Germany
|
Monarchy Ballroom
|
11:15-11:45
|
Standardization of Computer Forensic
Protocols and Procedures
Marcelo Abdalla dos Reis,
Paulo L. de Geus
Computing Institute, State
University of Campinas (UNICAMP) - Brazil
|
Monarchy Ballroom
|
11:45-12:30
|
pdd: Memory Imaging and Forensic Analysis of
Palm OS Devices
Joe Grand
Independent consultant - USA
|
Monarchy Ballroom
|
12:30-14:00
|
Lunch
|
Lagoon Lanai
|
14:00-14:30
|
Technical Session
|
Monarchy Ballroom
|
14:00-14:30
|
NASIRC
Bulletin Processing and PKI
Thomas Baxter
NASIRC, NASA Goddard Space
Flight Center - USA
|
Monarchy Ballroom
|
14:30-15:30
|
Panel: Ask the Experts
Moderator: Roger Safian
Northwestern University - USA
|
Monarchy Ballroom
|
15:30-16:00
|
Break
|
Kohala Promenade
|
16:00-17:30
|
Technical Session
|
Monarchy Ballroom
|
16:00-16:30
|
UDP Scanning
John Kristoff
DIRT, DePaul University - USA
|
Monarchy Ballroom
|
16:30-1700
|
Privacy Breach - Incident Response
Challenges for the Next Decade
Lance Hayden
Cisco
Secure Consulting Services, Cisco Systems, Inc. - USA
Vincent
Miraglia
McGuireWoods LLP - USA
|
Monarchy Ballroom
|
17:00-17:30
|
Adaptive Rule Estimation (ARE) Algorithm
Against Eluding NIDS
Byeong-Cheol Choi
Dong-Il Seo
Sung-Won Sohn
Electronic
Telecommunication Research Institutes (ETRI) - Korea
Sang-Ho Lee
ChungBuk National University - Korea
Chaeho Lim
CERT-CC - Korea
|
Monarchy Ballroom
|
18:30-22:30
|
Hawaiian Luau Dinner
Be sure to wear your
Hawaiian Shirts
|
Kamehameha Court
|
Thursday, June 27, 2002
|
08:00-17:30
|
Registration
|
Waikoloa Promenade
|
08:00-09:00
|
Continental Breakfast
|
Lagoon Lanai
|
09:00-10:00
|
Keynote
The Techie in the Boardroom:
Leveraging Technical Ability to Become a
Corporate Leader
David Bauer
Chief Information Security and Privacy Officer,
Merrill Lynch and Co., Inc - USA
|
Monarchy Ballroom
|
10:00-10:15
|
Movie
Handling Incident -
Case study: Multimedia Presentation
Miroslaw Maj
Krzysztof Silicki
CERT Polska, Poland
|
Monarchy Ballroom
|
10:15-10:45
|
Break
|
Grand Promenade Central
|
10:45-12:30
|
Technical Session
|
Monarchy Ballroom
|
10:45-12:00
|
A Progress Report on the CVE
Initiative
Robert Martin
Steven Christey
MITRE Corporation - USA
|
Monarchy Ballroom
|
12:00-12:30
|
Cassandra
Pascal Meunier
Eugene Spafford
CERIAS, Purdue University - USA
|
Monarchy Ballroom
|
12:30-14:00
|
Lunch
|
Lagoon Lanai
|
14:00-15:00
|
Technical Session
|
Monarchy Ballroom
|
14:00-14:30
|
Identification
of Security Holes in Router Configurations
Denis Valois
Cedric Llorens
Equant - France
|
Monarchy Ballroom
|
14:30-15:00
|
The SYNDEF: A Method for Defeating DoS/DDoS
SYN Flooding Attack
Noureldien Abdelrhman Noureldien
College of Technological Sciences - Sudan
Izzeldin M. Osman
Sudan University of Science & Technology - Sudan
|
Monarchy Ballroom
|
15:00-15:30
|
Break
|
|
15:30-18:00
|
FIRST Annual General Meeting
Attendance and participation is limited
to FIRST team members and their invited
guests, subject to approval by the Steering
Committee. Information about the Annual
General Meeting will be made available on the
AGM web page.
|
Monarchy Ballroom
|
Friday, June 28, 2002
|
08:00-16:00
|
Registration
|
Waikoloa Promenade
|
08:00-09:00
|
Continental Breakfast
|
Lagoon Lanai
|
09:00-10:00
|
Keynote
Toward the Future: The Need for Trustworthy Computing
Scott Charney
Chief Security Strategist
Microsoft - USA
|
Monarchy Ballroom
|
10:15-10:45
|
Break
|
Grand Promenade Central
|
10:45-11:45
|
Technical Session
|
Monarchy Ballroom
|
10:45-11:15
|
A Snapshot of
Global Internet Worm Activity
Dug Song
Rob Malan
Robert Stone
Arbor Networks, Inc. - USA
|
Monarchy Ballroom
|
11:15-11:45
|
Analysis of
DoS attack traffic data
Markus Haas
Jun Xu
Minho Sung
Georgia Institute of
Technology - USA
|
Monarchy Ballroom
|
11:45-12:30
|
Vendors' Panel
|
Monarchy Ballroom
|
12:30-14:00
|
Lunch
|
Lagoon Lanai
|
14:00-15:00
|
Keynote
Recent Crypto Attacks and a New Approach to PKI
Dan Boneh
Professor
Computer Science and Electrical Engineering
Stanford University - USA
|
Monarchy Ballroom
|
15:00-15:30
|
Teams Update
Klaus-Peter Kossakowski
PRESECURE Consulting GmbH - Germany
|
Monarchy Ballroom
|
15:30-16:00
|
Closing Remarks
Wietse Venema
Chair, FIRST Steering
Committee
|
Monarchy Ballroom
|