FIRST Logo

14th Annual Computer Security
Incident Handling Conference
Hilton Waikoloa Village, Hawaii
June 24-28, 2002
This conference is sponsored by First.Org, Inc.

Logo 2002
FIRST conference

Registration form

Program schedule

Where to stay

Travel information


Sponsorship

Preliminary Program Schedule
Sunday, June 23, 2002
14:00-18:00

Early Registration

Waikoloa Promenade
19:00-21:00

Welcome Icebreaker Reception

Kona Pool
Monday, June 24, 2002
07:00-17:30

Registration

Waikoloa Promenade
07:00-08:30

Continental Breakfast

Lagoon Lanai
08:30-12:30

Tutorial
Forensic Discovery

Dan Farmer - USA

Wietse Venema
IBM T.J. Watson Research Center - USA

Kohala Ballroom
10:15-10:45

Break

Grand Promenade
Central
12:30-14:00

Lunch

Lagoon Lanai
14:00-17:30

Tutorial
An Investigator's Guide to File System Internals

Brian Carrier
@stake Response Team. - USA

Kohala Ballroom
15:30-16:00

Break

Grand Promenade
Central
Tuesday, June 25, 2002
07:30-17:30

Registration

Waikoloa Promenade
07:30-08:30

Continental Breakfast

Lagoon Lanai

Concurrent Sessions

08:30-10:15

Tutorial
Intrusion Detection Utilizing Ethereal

David Chaboya
AFCERT, United States Air Force - USA

Kohala Ballroom
08:30-10:15

Tutorial
CSIRT Training: Legal Issues

Jacques Schuurman
SURFnet BV - The Netherlands

Andrew Cormack, Chief Security Advisor
JANET-CERT, UKERNA - UK

Queens Grand
10:15-10:45

Break

Grand Promenade
Central

Concurrent Sessions

10:45-12:30

Tutorial
Security at the Speed of E-business: Protecting Web Applications

Rudy Bakalov
PricewaterhouseCoopers, LLP - USA

Kohala Ballroom
10:45-12:30

Tutorial
Forensics for Windows XP Clients

Larry Leibrock
eForensics LLC - USA

12:30-14:00

Lunch

Lagoon Lanai

Concurrent Sessions

14:00-17:30

Tutorial
Forensics for Windows XP Clients

Larry Leibrock
eForensics LLC - USA

Kohala Ballroom
14:00-17:30

Tutorial
The Role of Computer Forensics in the Investigation of Network Intrusion Activity

Gregory P. Schaffer
PricewaterhouseCoopers, LLP - USA

Queens Grand
15:30-16:00

Break

Grand Promenade
Central
19:30-22:00

Birds of a Feather Sessions (BOFS)

Wednesday, June 26, 2002
08:00-17:30

Registration

Waikoloa Promenade
08:00-09:00

Continental Breakfast

Lagoon Lanai
09:00-09:15

Welcome and Opening Remarks

Wietse Venema
Chair, FIRST Steering Committee

Monarchy Ballroom
09:15-10:15

Keynote
Securing America's Communication Infrastructure

Marcus H. Sachs
Director for Communication Infrastructure Protection
Office of Cyberspace Security
The White House

Monarchy Ballroom
10:15-10:45

Break

Grand Promenade
Central
10:45-12:30

Technical Session

Monarchy Ballroom
10:45-11:15

Design, Processing and Implementation of a Network Security Policy

Christoph Kroell
European Space Agency (ESA) - Germany

Monarchy Ballroom
11:15-11:45

Standardization of Computer Forensic Protocols and Procedures

Marcelo Abdalla dos Reis,
Paulo L. de Geus
Computing Institute, State University of Campinas (UNICAMP) - Brazil

Monarchy Ballroom
11:45-12:30

pdd: Memory Imaging and Forensic Analysis of Palm OS Devices

Joe Grand
Independent consultant - USA

Monarchy Ballroom
12:30-14:00

Lunch

Lagoon Lanai
14:00-14:30

Technical Session

Monarchy Ballroom
14:00-14:30

NASIRC Bulletin Processing and PKI

Thomas Baxter
NASIRC, NASA Goddard Space Flight Center - USA

Monarchy Ballroom
14:30-15:30

Panel: Ask the Experts

Moderator: Roger Safian
Northwestern University - USA

Monarchy Ballroom
15:30-16:00

Break

Kohala Promenade
16:00-17:30

Technical Session

Monarchy Ballroom
16:00-16:30

UDP Scanning

John Kristoff
DIRT, DePaul University - USA

Monarchy Ballroom
16:30-1700

Privacy Breach - Incident Response Challenges for the Next Decade

Lance Hayden
Cisco Secure Consulting Services, Cisco Systems, Inc. - USA

Vincent Miraglia
McGuireWoods LLP - USA

Monarchy Ballroom
17:00-17:30

Adaptive Rule Estimation (ARE) Algorithm Against Eluding NIDS

Byeong-Cheol Choi
Dong-Il Seo
Sung-Won Sohn
Electronic Telecommunication Research Institutes (ETRI) - Korea

Sang-Ho Lee
ChungBuk National University - Korea

Chaeho Lim
CERT-CC - Korea

Monarchy Ballroom
18:30-22:30

Hawaiian Luau Dinner

Be sure to wear your Hawaiian Shirts

Kamehameha Court
Thursday, June 27, 2002
08:00-17:30

Registration

Waikoloa Promenade
08:00-09:00

Continental Breakfast

Lagoon Lanai
09:00-10:00

Keynote
The Techie in the Boardroom: Leveraging Technical Ability to Become a Corporate Leader

David Bauer
Chief Information Security and Privacy Officer, Merrill Lynch and Co., Inc - USA

Monarchy Ballroom
10:00-10:15

Movie
Handling Incident - Case study: Multimedia Presentation

Miroslaw Maj
Krzysztof Silicki
CERT Polska, Poland

Monarchy Ballroom
10:15-10:45

Break

Grand Promenade
Central
10:45-12:30

Technical Session

Monarchy Ballroom
10:45-12:00

A Progress Report on the CVE Initiative

Robert Martin
Steven Christey
MITRE Corporation - USA

Monarchy Ballroom
12:00-12:30

Cassandra

Pascal Meunier
Eugene Spafford
CERIAS, Purdue University - USA

Monarchy Ballroom
12:30-14:00

Lunch

Lagoon Lanai
14:00-15:00

Technical Session

Monarchy Ballroom
14:00-14:30

Identification of Security Holes in Router Configurations

Denis Valois
Cedric Llorens
Equant - France

Monarchy Ballroom
14:30-15:00

The SYNDEF: A Method for Defeating DoS/DDoS SYN Flooding Attack

Noureldien Abdelrhman Noureldien
College of Technological Sciences - Sudan

Izzeldin M. Osman
Sudan University of Science & Technology - Sudan

Monarchy Ballroom
15:00-15:30

Break

15:30-18:00

FIRST Annual General Meeting

Attendance and participation is limited to FIRST team members and their invited guests, subject to approval by the Steering Committee. Information about the Annual General Meeting will be made available on the AGM web page.

Monarchy Ballroom
Friday, June 28, 2002
08:00-16:00

Registration

Waikoloa Promenade
08:00-09:00

Continental Breakfast

Lagoon Lanai
09:00-10:00

Keynote
Toward the Future: The Need for Trustworthy Computing

Scott Charney
Chief Security Strategist
Microsoft - USA

Monarchy Ballroom
10:15-10:45

Break

Grand Promenade
Central
10:45-11:45

Technical Session

Monarchy Ballroom
10:45-11:15

A Snapshot of Global Internet Worm Activity

Dug Song
Rob Malan
Robert Stone
Arbor Networks, Inc. - USA

Monarchy Ballroom
11:15-11:45

Analysis of DoS attack traffic data

Markus Haas
Jun Xu
Minho Sung
Georgia Institute of Technology - USA

Monarchy Ballroom
11:45-12:30

Vendors' Panel

Monarchy Ballroom
12:30-14:00

Lunch

Lagoon Lanai
14:00-15:00

Keynote
Recent Crypto Attacks and a New Approach to PKI

Dan Boneh
Professor
Computer Science and Electrical Engineering
Stanford University - USA

Monarchy Ballroom
15:00-15:30

Teams Update

Klaus-Peter Kossakowski
PRESECURE Consulting GmbH - Germany

Monarchy Ballroom
15:30-16:00

Closing Remarks

Wietse Venema
Chair, FIRST Steering Committee

Monarchy Ballroom