{"id":18977,"date":"2009-12-10T17:14:02","date_gmt":"2009-12-10T21:14:02","guid":{"rendered":"http:\/\/www.bu.edu\/tech\/security\/events-and-training\/security-camp\/archives\/agenda-2\/"},"modified":"2010-01-07T16:32:06","modified_gmt":"2010-01-07T20:32:06","slug":"sc2008","status":"publish","type":"page","link":"https:\/\/www.bu.edu\/tech\/services\/security\/education\/camp\/archives\/sc2008\/","title":{"rendered":"2008 Agenda"},"content":{"rendered":"<table border=\"0\" cellspacing=\"2\" cellpadding=\"2\" width=\"100%\">\n<tbody>\n<tr bgcolor=\"#f5f5f5\">\n<td width=\"5%\">8:30<\/td>\n<td width=\"55%\"><strong>On Site Registration and Check-in<\/strong><\/td>\n<td width=\"40%\"><\/td>\n<\/tr>\n<tr bgcolor=\"#ffffff\">\n<td width=\"5%\">9:00<\/td>\n<td width=\"55%\"><strong>Welcome<\/strong><\/td>\n<td width=\"40%\"><\/td>\n<\/tr>\n<tr bgcolor=\"#f5f5f5\">\n<td>9:10<\/td>\n<td><a href=\"https:\/\/www.bu.edu\/tech\/services\/security\/services\/security\\-events\\-training\/events\\-and\\-training\/camp\/archives\/sc2008\/descriptions\/\">Higher Education Copyright and Bandwidth Practices<\/a><\/td>\n<td><a href=\"https:\/\/www.bu.edu\/tech\/services\/security\/services\/security\\-events\\-training\/events\\-and\\-training\/camp\/archives\/sc2008\/bios\/\">Elliot Kendall (Brandeis University)<\/a><\/td>\n<\/tr>\n<tr bgcolor=\"#ffffff\">\n<td>9:55<\/td>\n<td><a href=\"https:\/\/www.bu.edu\/tech\/services\/security\/services\/security\\-events\\-training\/events\\-and\\-training\/camp\/archives\/sc2008\/descriptions\/\">Automated DMCA Complaint Processing<\/a><\/td>\n<td><a href=\"https:\/\/www.bu.edu\/tech\/services\/security\/services\/security\\-events\\-training\/events\\-and\\-training\/camp\/archives\/sc2008\/bios\/\">Joel Rosenblatt (Columbia University)<\/a><\/td>\n<\/tr>\n<tr bgcolor=\"#f5f5f5\">\n<td>10:40<\/td>\n<td><strong>Break<\/strong><\/td>\n<td><\/td>\n<\/tr>\n<tr bgcolor=\"#ffffff\">\n<td>11:00<\/td>\n<td><a href=\"https:\/\/www.bu.edu\/tech\/services\/security\/services\/security\\-events\\-training\/events\\-and\\-training\/camp\/archives\/sc2008\/descriptions\/\">Security Breach Notification Laws<\/a><\/td>\n<td><a href=\"https:\/\/www.bu.edu\/tech\/services\/security\/services\/security\\-events\\-training\/events\\-and\\-training\/camp\/archives\/sc2008\/bios\/\">Ron Weikers, Esq. (Weikers &amp; Co. | Software-Law.com)<\/a><\/td>\n<\/tr>\n<tr bgcolor=\"#f5f5f5\">\n<td>12:00<\/td>\n<td><strong>Lunch<\/strong><\/td>\n<td><\/td>\n<\/tr>\n<tr bgcolor=\"#ffffff\">\n<td>13:30<\/td>\n<td><a href=\"https:\/\/www.bu.edu\/tech\/services\/security\/services\/security\\-events\\-training\/events\\-and\\-training\/camp\/archives\/sc2008\/descriptions\/\">Computer Intrusion and Cyber Crime Investigations<\/a><\/td>\n<td><a href=\"https:\/\/www.bu.edu\/tech\/services\/security\/services\/security\\-events\\-training\/events\\-and\\-training\/camp\/archives\/sc2008\/bios\/\">Jim Burrell (Federal Bureau of Investigation)<\/a><\/td>\n<\/tr>\n<tr bgcolor=\"#f5f5f5\">\n<td>14:15<\/td>\n<td><a href=\"https:\/\/www.bu.edu\/tech\/services\/security\/services\/security\\-events\\-training\/events\\-and\\-training\/camp\/archives\/sc2008\/descriptions\/\">Web Application Attack Vectors<\/a><\/td>\n<td><a href=\"https:\/\/www.bu.edu\/tech\/services\/security\/services\/security\\-events\\-training\/events\\-and\\-training\/camp\/archives\/sc2008\/bios\/\">Sherri Davidoff (Intelguardians)<\/a><\/td>\n<\/tr>\n<tr bgcolor=\"#ffffff\">\n<td height=\"29\">15:00<\/td>\n<td><strong>Break<\/strong><\/td>\n<td><\/td>\n<\/tr>\n<tr bgcolor=\"#f5f5f5\">\n<td>15:15<\/td>\n<td><a href=\"https:\/\/www.bu.edu\/tech\/services\/security\/services\/security\\-events\\-training\/events\\-and\\-training\/camp\/archives\/sc2008\/descriptions\/\">DIY Web Application Assessments<\/a><\/td>\n<td><a href=\"https:\/\/www.bu.edu\/tech\/services\/security\/services\/security\\-events\\-training\/events\\-and\\-training\/camp\/archives\/sc2008\/bios\/\">Phil Rodrigues (NET2S)<\/a><\/td>\n<\/tr>\n<tr bgcolor=\"#ffffff\">\n<td>&#8211;:&#8211;<\/td>\n<td><a href=\"https:\/\/www.bu.edu\/tech\/services\/security\/services\/security\\-events\\-training\/events\\-and\\-training\/camp\/archives\/sc2008\/descriptions\/\">PCI and Departmental Security Review<\/a><\/td>\n<td><a href=\"https:\/\/www.bu.edu\/tech\/services\/security\/services\/security\\-events\\-training\/events\\-and\\-training\/camp\/archives\/sc2008\/bios\/\">Randy Marchany (Virginia Tech)<\/a><\/td>\n<\/tr>\n<tr bgcolor=\"#f5f5f5\">\n<td>16:00<\/td>\n<td>Building Security Standards<\/td>\n<td>Daniel Adinolfi (Cornell University) and Brian Smith Sweeney (New York University)<\/td>\n<\/tr>\n<tr bgcolor=\"#f5f5f5\">\n<td>16:45<\/td>\n<td><strong>Closing<\/strong><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>8:30 On Site Registration and Check-in 9:00 Welcome 9:10 Higher Education Copyright and Bandwidth Practices Elliot Kendall (Brandeis University) 9:55 Automated DMCA Complaint Processing Joel Rosenblatt (Columbia University) 10:40 Break 11:00 Security Breach Notification Laws Ron Weikers, Esq. (Weikers &amp; Co. | Software-Law.com) 12:00 Lunch 13:30 Computer Intrusion and Cyber Crime Investigations Jim Burrell (Federal&#8230;<\/p>\n","protected":false},"author":1288,"featured_media":0,"parent":18974,"menu_order":18,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/18977"}],"collection":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/users\/1288"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/comments?post=18977"}],"version-history":[{"count":6,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/18977\/revisions"}],"predecessor-version":[{"id":25022,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/18977\/revisions\/25022"}],"up":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/18974"}],"wp:attachment":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/media?parent=18977"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}