8:30 | Registration and Check-in | |
9:00 | Welcome | |
9:05 | Privacy v. Security | Susan Landau |
9:50 | Building a Linux Distribution | Matthew Miller |
10:35 | Break | |
11:00 | Patching Strategies | Paul Luppino |
11:45 | Cyber Investigative and Forensic Response | James Burrell |
12:30 | Lunch | |
1:30 | Identity Management | Collin Sampson |
2:15 | Two Case Studies | John A. Grossman |
3:00 | Break | |
3:25 | Riding the worm: MyDoom.AC | Rich Graves |
4:10 | Intrusion Prevention Systems, The Inside Dirt | David Escalante |
4:55 | Closing |