Thursday, October 19 | |||
Room(s) | Time / Topic for Sessions and Events | ||
8:30 - 10:00 | 10:30 - 12:00 | 1:00 - 6:00 | |
301-303 | Collusion Detection Las Vegas Style | Post-Conference
Workshops
Investigating Computer Virus and Other Malware Incidents Staying Ahead of the Hackers: Network Vulnerability Testing Information System Survival School Cryptography for Beginners: What is it and how can I use it? Introduction to the National Certification and Accreditation Approach (The NIACAP) Attack Techniques and Defenses Introduction to the Common Criteria (CC), Common Evaluation Methodology (CEM), and Common Criteria Toolbox |
|
307 | Multi-level Security (MLS) and Its Evolution to Date | Closing Plenary | |
308 | Tracking the Virus Writer – The Legal Ramifications | Closing Plenary | |
309 | Anonymity in the Information Age | Closing Plenary | |
310 | Information Assurance Technologies: 10 Years Past, Present, & Future | Closing Plenary | |
327-329 | Computer Security From the Trojan War to Now | ||
330 | Paper Session: Operating Systems and
Their Effects on Information Security
paper 1: An Operating System Analog to the Perl Data Tainting Functionality paper 2:
paper 3:
|
||
331-332 | Smart Card Security Users Group Protection Profile & Projects | ||