Monday, October 16
Room
Time / Topic for Sessions and Events
8:30 - 10:00
10:30 - 12:00
1:30 - 3:00
3:30 - 5:00
5:30 / 6:00
301-303
Killer Apps - and You’re the Dead Meat (The Code That Shagged Me) The Systems Security Engineering Capability Maturity Model The National Security Agency’s Use of the Systems Security Engineering Capability Maturity Model (SSE-CMM)
307
  Opening Plenary:
Opening Plenary Keynote Speakers:
Lieutenant General Michael V. Hayden, USAF,
Director, National Security Agency/Central Security Service (NSA/CSS)

Dr. David J. Farber, Alfred Fitler Moore Professor of Telecommunication Systems at the University of Pennsylvania

National Computer Systems Security Award Winner:
Dr. Eugene H. Spafford,
Professor of Computer Science at Purdue University
Future of Information Security Evaluation Scope: Does One Size Fit All?
308
AES and Beyond State of Key Recovery Government and Industry
309
  National Information Assurance Partnership / Common Criteria Scheme Presentations National Information Assurance Partnership Projects - 2001
310
Effective Risk Analysis Network-Based Contingency Plans Awards Ceremony:
5:30pm followed by reception at 6:15pm
324
Conference Overview – Welcome Newcomers      
327-329
 :   The Secret and Below Interoperability (SABI) Process - Continuing the Discovery of Community Risk Department of Defense (DoD) Wide Information Assurance Program (DIAP): Current Initiatives
330
Student Papers:
paper 1:
The Competitive Intelligence and National Security Threat From Website Job Listings

paper 2:
The Case for Beneficial Computer Viruses and Worms – A Student's Perspective

paper 3:
Subliminal Traceroute in TCP/IP
Paper Session - Intrusion Detection:
paper 1:
Fuzzy Data Mining and Genetic Algorithms Applied to Intrusion Detection

paper 2:
Next Generation Intrusion Detection: Autonomous Reinforcement Learning of Network Attacks

paper 3:
Multiple Self-Organizing Maps for Intrusion Detection
Paper Session: Practices, Curses, and Risks
paper 1:
Best Security Practices: An Overview

paper 2:
The Curse of Service: Civil Liability for Computer Security Professionals

paper 3:
Visualizing Risks: Icons for Information Attack Scenarios
331-332
Incident Response Fundamentals   Themes and Highlights of the New Security Paradigms Workshop 2000 Security and Source-Available Systems: Risks and Opportunities