|   | 
Last update July 5, 2001
| Tuesday, October 17: 1:30-3:00 Day Track All presentations, speakers, and times are subject to change. We will
do our best to list the most current information. 
 
| 1:30-3:00
Sessions for Tuesday October 17 |  
| Rooms: 301-303 Protection
of B2B Exchanges and Vendor Operations
 
Chair: Mr. Charlie Baggett, Risk Management
Associates, Inc.
 
Tim Ehrsam, Oracle Corporation
Nick Piazzola, VeriSign
Gary Secrest, Johnson & Johnson 
 |  
| Room: 307 Federal
Bridge Certification Authority (FBCA) Demonstration and Panel – Part I
 
Chair: Richard A. Guida, Federal
PKI Steering Committee 
Tim Polk, NIST
Stanley Choffrey, GSA
Dave Fillingham, NSA 
 |  
| Room: 308 Incident
Response - Stopping Them Dead in Their Tracks
 
Chair: Jon David, Lehman Brothers
 
Robert Stone, UUNET Technologies
Jim Duncan, Cisco
Bill Hancock, Exodus Communications
Richard Reybok, Merrill Lynch 
 |  
| Room: 309 The
Common Criteria Structures: The Healthcare Response to Security Regulation
 
Chair: Dr. Lewis Lorton, Forum on Privacy
& Security in Healthcare
 
Lisa A. Gallagher, Exodus Security Services
Paul Zatychec, EWA-Canada Ltd.
Leslie Spiece, University of Wisconsin
Alan Brown, McKenna & Cuneo 
 |  
| Room: 310 Operational
Computer Forensics - the New Frontier
 
Michael J. Corby, CCP, CISSP, Netigy Corporation 
 |  
| Room: To Be Announced Common
Criteria Project: Making the CC Recognition Arrangement a Reality
 
Chair: Murray Donaldson, CESG, UK
 
Lynne Ambuel, Decisive Analytics Corporation
Frank Belvin, Mitre Corporation
Ron Ross, NIST 
 |  
| Rooms: 327-329 Best
Security Practices: Lowering Quality's Total Cost of Ownership in an Age
of Growing Complexity
 
Chair: James P. Craft, United States
Agency for International Development (USAID)
 
Tom Burke, GSA
Jack L. Brock, Jr., GAO
Guy L. Copeland, Computer Sciences Corporation
(CSC)
Robert E. Giovagnoni, Infrastructure Defense,
Inc. (iDEFENSE) 
 |  
| Room: 330 Paper Session: Case Studies
 
paper 1:
Chair: Jim
Tippett, Independent Consultant Using
B Method to Formalize the Java Card Runtime Security Policy for a Common
Criteria Evaluation
 
paper 2:
Stéphanie Motré, Gemplus, France Penetration
Analysis of a Xerox Docucenter DC 230ST: Assessing the Security of a Multi-Purpose
Office Machine
 
paper 3:
Benjamin A. Kuperman, Purdue University Analysis
of Terminal Server Architectures for Thin Clients in a High Assurance Network
 
Cynthia Irvine, Naval Postgraduate School 
 |  
| Rooms: 331-332 Information
Assurance Metrics: Prophecy, Process, or Pipedream?
 
Chair: Ronda
R. Henning, Harris Corporation 
Michael J. Skroch, DARPA
John McHugh , Carnegie Mellon Center for Survivable
Systems
John Michael Williams, JMW Trading Company
 
 |  |  
|  |  |