First 2006 June 25, 2006 to June 30, 2006, Baltimore,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Exploring the Next Level of Cyber Attacks: Methodologies and Demonstration of Web Application Hacks Matt Fisher N/A
Secure Coding in C and C++ Robert Seacord N/A
Exploring the Next Level of Cyber Attacks: Methodologies and Demonstration of Web Application Hacks (continued) Matt Fisher N/A
Secure Coding in C and C++ (continued) Robert Seacord N/A
Evaluating CSIRT Operations Robin Ruefle , Audrey Dorofee , Chris Alberts N/A
Design Your Network to Aid Forensic Investigation Robert Sisk N/A
Evaluating CSIRT Operations (continued) Robin Ruefle , Audrey Dorofee , Chris Alberts N/A
Design Your Network to Aid Forensic Investigation (continued) Robert Sisk N/A
Log Data Analysis for Incident Response Anton Chuvakin N/A
Next Steps in Bridging the Gap Gary Mcgraw , Kenneth van Wyk N/A
Log Data Analysis for Incident Response (continued) Anton Chuvakin N/A
Next Steps in Bridging the Gap (continued) Gary Mcgraw , Kenneth van Wyk N/A
IT Security Teams and Outsourced Managed Security Services - working together Nicholas Fischbach , Chris Van Breda N/A
Honeypot Technology: Principles and Applications Franck Veysset , Laurent Butti N/A
IT Security Teams and Outsourced Managed Security Services - working together (continued) Chris Van Breda , Nicholas Fischbach N/A
Honeypot Technology: Principles and Applications (continued) Franck Veysset , Laurent Butti N/A
Keynote: Computer Security Incident Response - Past, Present, Future Richard Pethia N/A
Sharing Sensitive Information without Compromising Data Peter Allor N/A
CERT's Virtual Training Environment: A New Model for Security and Compliance Training James Wrubel N/A
If You Don't Know What You Don't Know Arjen De Landgraaf N/A
Risk Analysis Methodology for New IT Service Jun Heo N/A
Reliably Determining the Outcome of Computer Network Attacks David Chaboya , Barry Mullins , Richard Raines , Rusty Baldwin N/A
The Impact of Honeynets for CSIRTs Jan Kohlrausch , Jochen Schönfelder N/A
Automated Extraction of Threat Signatures from Network Flows Piotr Kijewski N/A
A Strategy for Inexpensive Automated Containment of Infected or Vulnerable Systems Steven Leong N/A
Behavioral Study of Bot Obedience using Causal Relationship Analysis Lari Huttunem , Pekka Pietikäinen N/A
Maximizing the Benefits of Intrusion Prevention Systems: Effective Deployment Strategies Calvin Miller , Charles Iheagwara , Farrukh Awan , Yusuf Acar N/A
A Distributed Intrusion Detection System Based on Passive Sensors Rogier J.l. Spoor N/A
Designing and Developing an Application for Incident Response Teams Kees Leune N/A
Netflow Tools NfSen and NFDUMP Peter Haag N/A
Threats of P2P File Sharing Software - a Japanese Situation About "Winny" Keisuke Kamata N/A
Proactive Security Monitoring in a Policy Managed Network Till Dörges N/A
Keynote: Building Effective Relationships between CSIRTs and Law Enforcement Brian Nagel N/A
The Underground Economy Rob Thomas N/A
A Year's Evolution on Attacks Against Online Banking Customers Matthew Pemble N/A
Botnets as Vehicle for Online Crime Aaron Hackworth , Nicholas Ianelli N/A
CarmentiS - a German Early Warning Information System - Challenges and Approaches Jürgen Sander N/A
Building and Deploying Billy Goat: a Worm-Detection System Diego Zamboni , James Riordan , Yann Duponchel N/A
Counter-Forensic Tools: Analysis and Data Recovery Matthew Geiger N/A
RAPIER - A 1st Responders Info Collection Tool Joseph Schwendt N/A
Keynote: Fixing Internet Security by Hacking the Business Climate Bruce Schneier N/A
The Survivability and Information Assurance (SIA) Curriculum Lawrence Rogers N/A
Legal Representatives - CERT Panel Discussion Damir Rajnovic , Chris Painter , Etsuo Doi Presenter , Tara Flanagan , Terence Palfrey N/A
VisFlowConnect-IP : A Link-Based Visualization of NetFlows for Security Monitoring William Yurcik N/A
Effectiveness of Proactive CSIRT Services Klaus-peter Kossakowski , Johannes Wiik , Jose J. Gonzalez N/A
Worm Poisoning Technology and Application Yonglin Zhou , Cui Xiang , Wu Bing , Zou Xin N/A
Proposal of RSS Extension for Security Information Exchange Masato Terada N/A
A Framework for Effective Alert Visualization Jon Ramsey , Uday Banerjee N/A
The Network-Centric Incident Response and Forensics Imperative Richard Bejtlich N/A
Time signatures to Detect Multiheaded Stealthy Attack Tools Jacomo Piccolini N/A