23rd National Information Systems Security Conference
Overview of the Program
Last update October 2, 2000


Thursday, October 19
Room(s) Time / Topic for Sessions and Events
8:30 - 10:00 10:30 - 12:00 1:00 - 6:00
301-303 Collusion Detection Las Vegas Style Post-Conference Workshops

Investigating Computer Virus and Other Malware Incidents

Staying Ahead of the Hackers: Network Vulnerability Testing

Information System Survival School

Cryptography for Beginners: What is it and how can I use it?

Introduction to the National Certification and Accreditation Approach (The NIACAP) Attack Techniques and Defenses

Introduction to the Common Criteria (CC), Common Evaluation Methodology (CEM), and Common Criteria Toolbox

307 Multi-level Security (MLS) and Its Evolution to Date Closing Plenary
308 Tracking the Virus Writer – The Legal Ramifications Closing Plenary
309 Anonymity in the Information Age Closing Plenary
310 Information Assurance Technologies: 10 Years Past, Present, & Future Closing Plenary
327-329 Computer Security From the Trojan War to Now
330 Paper Session: Operating Systems and Their Effects on Information Security
paper 1:
An Operating System Analog to the Perl Data Tainting Functionality

paper 2:
A Taxonomy of Organizational Security Policies

paper 3:
Policy-Enhanced Linux

331-332 Smart Card Security Users Group Protection Profile & Projects
 
Close this Window