8:30 On Site Registration and Check-in
9:00 Welcome
9:10 Fifteen Minute Forensics David Bowie (Boston College)
10:00 What You Need Before Giving Data To the Cops (or Anyone Else) and Other Legal Pitfalls John A. Grossman (Massachusetts Attorney General’s Office)
11:00 Break
11:20 REN-ISAC Activities Overview, and Distributed Darknet Information Sharing Doug Pearson (REN-ISAC)
Christopher Misra (University of Massachusetts Amherst)
12:15 Lunch
13:30 Surplus Computer Hardware – Forgotten but not Gone Scott Conti (University of Massachusetts Amherst)
14:00 Computer Intrusion and Cyber Crime Investigations James Burrell (Federal Bureau of Investigation)
14:50 Break
15:15 Searching for confidential data with Spider Wyman Miles (Cornell University)
16:00 Securing VoIP Gary S. Miliefsky, CISSP (NetClarity)
16:50 Closing