Interesting things in APWG statistics
Patrick Cain, Boston College

We did some historical trending to see how phish changed over the years (type, collector, domain, etc). These are our results.

Slides from the presentation

Information Security Threats for 2011
Roy Wattanasin, MIT

This year brings IT professionals a lot of security challenges and concerns. What are the current attack vectors? What is being used in the wild? How is it being used? Why is it being used?

As defined by Searchsecurity.com, an attack vector is, “a path or means by which a hacker (or cracker) can gain access to a computer or network server in order to deliver a payload or malicious outcome.” Join Roy in this discussion as he walks you through some of the items. We should be proactively looking for them and be ready at all times; if you’re not already looking for them at your organization. Remember to bring your own questions and scenarios regarding your own issues. By proactively looking for them, it will help keep your organization and your end users better prepared and more secure.

Slides from the presentation

Forensically Speaking
Quinn Shamblin, Boston University

Common situations in which an internal forensics program may be valuable and things to consider when starting one.

Slides from the presentation

Securing Campus Data through Encryption and Data Loss Prevention
Ryan Clark, Symantec Corporation

iPads, iPhones, Androids, Netbooks, laptops , USB’s ,Removable Media…how do you protect and secure every new device on campus?? Discovering and securing confidential data is a challenge every school faces. How often do we hear about a lost or stolen laptop that contains student information? This session will address the latest in email, smartphone, USB and whole disk encryption. We’ll also talk about data loss and leakage prevention…important if you want to avoid the bad press of a data breach. Discover where confidential student records are stored and protect “Data at rest” and “Data in motion”. This is an interactive session so bring your own questions and scenarios.

Slides from the presentation not available (yet)

Achieving Critical Mass
Jay Carter, Harvard University

Recently Harvard underwent an IT transformation, creating a new IT organization to serve Central Administration and the Faculty of Arts and Sciences. This unique moment in time provided an opportunity to bring together Information Security professionals from several IT groups and create a central IT Security organization. Planning considerations and lessons learned will be shared.

Slides from the presentation

A First Responder’s Course for Drive By Download Attacks
Oliver Day, Akamai Technologies

In the medical field, a first responder is the first medically trained responder to arrive on scene. This course will provide some basic training on how to provide this level, and urgency, of care to victims of drive by download attacks. The talk will cover propagation methods, common symptoms, diagnostic tools, and some basic first aid (common fixes) for this modern form of computer infection.

Slides from the presentation

Conventional Defenses + Unconventional Adversaries = ???
Joshua Corman, Akamai Technologies

With the rise of APTs, adaptive persistent adversaries, and chaotic actors like Anonymous, the stakes have never been higher. 2010′s stunning trinity of Operation Aurora, Stuxnet, and WikiLeaks has been eclipsed by 2011′s more than a breach-a-week (including security vendors). This escalation has proven to too few of us, that conventional security cannot stand up to the unconventional, modern adversaries. While the beltway often says “We need to Private sector to lead the way” for cyber, how can we lead the way, when we’ve lost our way? Our research shows a pronounced schism has formed between the majority who “fear the auditor more than the attacker”, and the minority who attempt to solve for both. With the bulk of vendor investments and market spending on dated, ineffective, compliance driven security, we aim to help the SINET community better identify capable and relevant security – giving us the best possible fighting chance… where it matters the most. We’ll use a zombie apocalypse to reveal effective strategies and requirements for adapting to defend ourselves in the face of extreme circumstances.

Slides from the presentation