Policy, Management
&
Government Issues Track
These sessions highlight the security policy
perspective, showcasing practical solutions to security dilemmas that face
government IT managers. Sessions and papers chosen for this track
predict lively discussion with the attendees.
All presentations, speakers, and times
are subject to change. We will do our best to list the most current information.
Times and dates will be announced soon.
Track Chairs:
W. Joy Prangley, USDA
Greg Gage, USDA
Janice Green, GSA
Sessions |
Access
Certificates for Electronic Services (ACES) - Enabling Government-to-Citizen
Interaction via the Internet,
J. Spencer, GSA |
Working
on a Shoestring,
D. Jarrell, GSA |
Best
Security Practices: Lowering Quality’s Total Cost of Ownership in an Age
of Growing Complexity,
M. Schanken, NSA |
Tracking
the Virus Writer: The Legal
Ramifications,
C. Orshesky, I-Secure Corp. |
Cybersecurity
in the Year 2000: Not Just for Systems Administrators Anymore,
R. Shullaw, HHS |
Guideline
for Implementing Cryptography in the Federal Government,
A. Lee, NIST |
Privacy
in the Information Age,
B. Burnham, Georgia Institute of Technology |
Anonymity
in the Information Age,
B. Burnham, Georgia Institute of Technology |
Professional
Certification of Information Security Professionals,
L. McNulty, RSA Security |
Department
of Defense (DoD) Wide Information Assurance Program (DIAP): Current Initiatives,
J. K. Burton, USN, DOD |
Critical
Infrastructure Protection for Chief Information Officers (or CIP for CIOs),
J. Davis, Mitretek |
The
Secret and Below Interoperability (SABI) Process - Continuing the Discovery
of Community Risk,
M. Loepker, NSA |
Progress
of the Best Security Practices Subcommittee,
J. Craft, USAID |
Federal
Bridge Certification Authority (FBCA) Demonstration and Panel - Part I,
R. Guida, Treasury |
Federal
Bridge Certification Authority (FBCA) Demonstration and Panel - Part II,
R. Guida, Treasury |
“Hands-On”
Approach of Building a Security Program,
B. Hadesty, USDA |
The
National Security Agency’s Use of the Systems Security Engineering Capability
Maturity Model (SSE-CMM)
Ms. Mary D. Schanken, National Security
Agency |
The New National Computer Security
Center,
L. Martin, NSA |
Papers |
Database
Security 2000,
J. Campbell, NSA |
Controlling
Primary and Secondary Access to Digital Information,
M. Abrams, MITRE Corporation |
Policy-Enhanced
Linux,
P. Clark, Naval Postgraduate School |
Best
Security Practices: An Overview,
G. King, Computer Sciences Corp. |
The
Cracker Patch Choice: An Analysis of Post Hoc Security Techniques,
C. Cowan, WireX Communications, Inc. |
The
Curse of Service: Civil Liability for Computer Security Professionals,
A. Wylene, New College of California School
of Law |
Icons
for Information Attack Scenarios,
H. Hosmer, Data Security, Inc. |
A
Taxonomy of Organizational Security Policies,
G. Smith, SAIC |
|
|