Tutorials Track
These sessions provide information for
newcomers to the security field as well as a refresher for the experienced
security professionals. This track encompasses a wide range of tutorials
from developing a security plan to implementing role-based access control.
Generally there will be two tutorial sessions be running at any time.
All presentations, speakers, and times
are subject to change. We will do our best to list the most current information.
Times and dates will be announced soon.
Track Chair:
Karen Ferraiolo, Arca Systems,
an Exodus Communications Company
Tutorials |
Preparing
for Intrusion Detection,
T. Peltier, Netigy Corporation |
Operational
Computer Forensics - The New Frontier,
M. Corby, Netigy Corporation |
Information
Systems Survivability: Protecting Critical Systems,
R. Linger, CERT Coordination Center /
Software Engineering Institute |
Effective
Risk Analysis,
T. Peltier, Netigy Corporation |
Network-Based
Contingency Plans,
T. Peltier, Netigy Corporation |
Information
Security Year in Review - Technical Vulnerabilities,
D. Kennedy, ICSA |
Single
Sign-On: Myth or Reality,
T. Peltier, Netigy Corporation |
Biometrics
- Understanding the Architecture, APIs, Encryption and Authentication Security,
W. Saito, I/O Software, Inc. |
Scorecard
for Online Authentication
Technologies,
Dow Williamson, RSA Security, Inc. |
RSA
Digital Signature Standards,
B. Kalisti, RSA Security, Inc. |
An
Introduction to Consequence-Based Risk Assessment,
G. Jelen, G-J Consulting |
The
Healthcare Vertical Turns its Eyes on Security - The Impact of HIPAA and
other Legislation on Security Engineering,
L. Gallagher, Exodus Security Services |
Information
Security Year in Review - Computer Crime,
M. E. Kabay, Adario, Inc. |
Computer
Security from the Trojan War to Now,
C. Pfleeger, Exodus Security Services |
|
|