Monday,
October 16 |
Room |
Time / Topic for Sessions and Events |
8:30 - 10:00 |
10:30 - 12:00 |
1:30 - 3:00 |
3:30 - 5:00 |
5:30 / 6:00 |
301-303 |
Killer
Apps - and You’re the Dead Meat (The Code That Shagged Me) |
|
The
Systems Security Engineering Capability Maturity Model |
The
National Security Agency’s Use of the Systems Security
Engineering Capability Maturity Model (SSE-CMM) |
|
307 |
|
Opening Plenary:
Opening Plenary Keynote Speakers:
Lieutenant General Michael V. Hayden, USAF,
Director, National Security Agency/Central Security Service
(NSA/CSS)
Dr. David J. Farber, Alfred Fitler Moore Professor of
Telecommunication Systems at the University of Pennsylvania
National Computer Systems Security Award Winner:
Dr. Eugene H. Spafford,
Professor of Computer Science at Purdue University |
Future
of Information Security |
Evaluation
Scope: Does One Size Fit All? |
|
308 |
|
AES
and Beyond |
State
of Key Recovery Government and Industry |
|
309 |
|
National
Information Assurance Partnership / Common Criteria Scheme
Presentations |
National
Information Assurance Partnership Projects - 2001 |
|
310 |
|
Effective
Risk Analysis |
Network-Based
Contingency Plans |
Awards Ceremony:
5:30pm followed by reception at 6:15pm |
324 |
Conference
Overview – Welcome Newcomers |
|
|
|
|
327-329 |
: |
|
The
Secret and Below Interoperability (SABI) Process - Continuing the
Discovery of Community Risk |
Department
of Defense (DoD) Wide Information Assurance Program (DIAP): Current
Initiatives |
|
330 |
Student Papers:
paper 1:
The Competitive Intelligence and National Security Threat From
Website Job Listings
paper 2:
The Case for Beneficial Computer Viruses and Worms – A
Student's Perspective
paper 3:
Subliminal Traceroute in TCP/IP |
|
Paper Session - Intrusion
Detection:
paper 1:
Fuzzy
Data Mining and Genetic Algorithms Applied to Intrusion Detection
paper 2:
Next
Generation Intrusion Detection: Autonomous Reinforcement Learning of
Network Attacks
paper 3:
Multiple
Self-Organizing Maps for Intrusion Detection |
Paper Session: Practices,
Curses, and Risks
paper 1:
Best
Security Practices: An Overview
paper 2:
The
Curse of Service: Civil Liability for Computer Security Professionals
paper 3:
Visualizing
Risks: Icons for Information Attack Scenarios |
|
331-332 |
Incident
Response Fundamentals |
|
Themes
and Highlights of the New Security Paradigms Workshop 2000 |
Security
and Source-Available Systems: Risks and Opportunities |
|