Return to Dayview
Monday,
Oct. 16:
3:30-5:00
Monday
8:30-10:00

1:30-3:00

3:30-5:00

Tuesday
8:30-10:00

10:30-12:00

1:30-3:00

3:30-5:00

Wednesday
8:30-10:00

10:30-12:00

1:30-3:00

3:30-5:00

Thursday
8:30-10:00

10:30-12:00
 

 
Monday, October 16: 3:30-5:00 Day Track

All presentations, speakers, and times are subject to change. We will do our best to list the most current information. 
 
3:30-5:00 Sessions for Monday October 16
Rooms: 301-303
The National Security Agency’s Use of the Systems Security Engineering Capability Maturity Model (SSE-CMM)
  • Chair: Ms. Mary D. Schanken, National Security Agency

  •  
  • Mr. Paul W. Boudra, National Security Agency
  • Mr. Charles G. Menk III, National Security Agency

Room: 307
Evaluation Scope: Does One Size Fit All?
  • Chair: John Doody, CESG, UK

  •  
  • David Hodges, CESG, UK
  • Adrian Price, Ministry of Defence, UK
  • Bill Simpson, Borderware
  • Janet Scruby, Syntegra CLEF

Room: 308
State of Key Recovery Government and Industry
  • Chair: Santosh Chokhani, CygnaCom Solutions/an Entrust Technologies Company

  •  
  • Donna Dodson, SSA
  • Diane Dunshee, NSA
  • Santosh Chokhani, CygnaCom
  • Cragin Shelton, Mitre Corporation
  • David Cross, Microsoft

Room: 309
National Information Assurance Partnership Projects - 2001
  • Chair: Ron Ross, NIST

  •  
  • L. Arnold Johnson, NIST
  • Gene Troy, NIST
  • Peter Mell, NIST

Room: 310
Network-Based Contingency Plans
  • Thomas Peltier, Netigy Corporation

Rooms: 327-329
Department of Defense (DoD) Wide Information Assurance Program (DIAP): Current Initiatives
  • Chair: Captain J. Katharine Burton, USN, DoD

  •  
  • Terry Bartlett, DIAP
  • George Bieber, DISA
  • Jim Christy, DIAP

Room: 330
Paper Session: Practices, Curses, and Risks
  • Chair: Michael Ware, Independent Consultant
  • paper 1:
    Best Security Practices: An Overview
    • Guy King, Computer Sciences Corporation
    paper 2:
    The Curse of Service: Civil Liability for Computer Security Professionals
    • Arthur J. Wylene, New College of California School of Law
    paper 3:
    Visualizing Risks: Icons for Information Attack Scenarios
    • Hilary H. Hosmer, Data Security, Inc.

    Rooms: 331-332
    Security and Source-Available Systems: Risks and Opportunities
    • Chair: Peter G. Neumann, SRI International

    •  
    • Jay Beale, Bastille Linux
    • Dr. Crispin Cowan, WireX Communications, Inc.
    • Eric Raymond, Open Source Initiative

     

    Last update July 5, 2001

    Welcome | Program | General Information
     Contacts | Home | NIST Home