{"id":18983,"date":"2009-12-10T17:14:04","date_gmt":"2009-12-10T21:14:04","guid":{"rendered":"http:\/\/www.bu.edu\/tech\/security\/events-and-training\/security-camp\/archives\/agenda-5\/"},"modified":"2010-01-07T16:30:38","modified_gmt":"2010-01-07T20:30:38","slug":"sc2005","status":"publish","type":"page","link":"https:\/\/www.bu.edu\/tech\/services\/security\/education\/camp\/archives\/sc2005\/","title":{"rendered":"2005 Agenda"},"content":{"rendered":"<table border=\"0\" cellspacing=\"2\" cellpadding=\"2\" width=\"100%\">\n<tbody>\n<tr bgcolor=\"#f5f5f5\">\n<td>8:30<\/td>\n<td><strong>Registration and Check-in<\/strong><\/td>\n<td><\/td>\n<\/tr>\n<tr bgcolor=\"#ffffff\">\n<td>9:00<\/td>\n<td><strong>Welcome<\/strong><\/td>\n<td><\/td>\n<\/tr>\n<tr bgcolor=\"#f5f5f5\">\n<td>9:05<\/td>\n<td><a href=\"https:\/\/www.bu.edu\/tech\/services\/security\/services\/security\\-events\\-training\/events\\-and\\-training\/camp\/archives\/sc2005\/descriptions\/\">Privacy v. Security<\/a><\/td>\n<td><a href=\"https:\/\/www.bu.edu\/tech\/services\/security\/services\/security\\-events\\-training\/events\\-and\\-training\/camp\/archives\/sc2005\/bios\/\">Susan Landau<\/a><\/td>\n<\/tr>\n<tr bgcolor=\"#ffffff\">\n<td>9:50<\/td>\n<td><a href=\"https:\/\/www.bu.edu\/tech\/services\/security\/services\/security\\-events\\-training\/events\\-and\\-training\/camp\/archives\/sc2005\/descriptions\/\">Building a Linux Distribution<\/a><\/td>\n<td><a href=\"https:\/\/www.bu.edu\/tech\/services\/security\/services\/security\\-events\\-training\/events\\-and\\-training\/camp\/archives\/sc2005\/bios\/\">Matthew Miller<\/a><\/td>\n<\/tr>\n<tr bgcolor=\"#f5f5f5\">\n<td>10:35<\/td>\n<td><strong>Break<\/strong><\/td>\n<td><\/td>\n<\/tr>\n<tr bgcolor=\"#ffffff\">\n<td>11:00<\/td>\n<td><a href=\"https:\/\/www.bu.edu\/tech\/services\/security\/services\/security\\-events\\-training\/events\\-and\\-training\/camp\/archives\/sc2005\/descriptions\/\">Patching Strategies<\/a><\/td>\n<td><a href=\"https:\/\/www.bu.edu\/tech\/services\/security\/services\/security\\-events\\-training\/events\\-and\\-training\/camp\/archives\/sc2005\/bios\/\">Paul Luppino<\/a><\/td>\n<\/tr>\n<tr bgcolor=\"#f5f5f5\">\n<td>11:45<\/td>\n<td><a href=\"https:\/\/www.bu.edu\/tech\/services\/security\/services\/security\\-events\\-training\/events\\-and\\-training\/camp\/archives\/sc2005\/descriptions\/\">Cyber Investigative and Forensic Response<\/a><\/td>\n<td><a href=\"https:\/\/www.bu.edu\/tech\/services\/security\/services\/security\\-events\\-training\/events\\-and\\-training\/camp\/archives\/sc2005\/bios\/\">James Burrell<\/a><\/td>\n<\/tr>\n<tr bgcolor=\"#ffffff\">\n<td>12:30<\/td>\n<td><strong>Lunch<\/strong><\/td>\n<td><\/td>\n<\/tr>\n<tr bgcolor=\"#f5f5f5\">\n<td>1:30<\/td>\n<td><a href=\"https:\/\/www.bu.edu\/tech\/services\/security\/services\/security\\-events\\-training\/events\\-and\\-training\/camp\/archives\/sc2005\/descriptions\/\">Identity Management<\/a><\/td>\n<td><a href=\"https:\/\/www.bu.edu\/tech\/services\/security\/services\/security\\-events\\-training\/events\\-and\\-training\/camp\/archives\/sc2005\/bios\/\">Collin Sampson<\/a><\/td>\n<\/tr>\n<tr bgcolor=\"#ffffff\">\n<td>2:15<\/td>\n<td><a href=\"https:\/\/www.bu.edu\/tech\/services\/security\/services\/security\\-events\\-training\/events\\-and\\-training\/camp\/archives\/sc2005\/descriptions\/\">Two Case Studies<\/a><\/td>\n<td><a href=\"https:\/\/www.bu.edu\/tech\/services\/security\/services\/security\\-events\\-training\/events\\-and\\-training\/camp\/archives\/sc2005\/bios\/\">John A. Grossman<\/a><\/td>\n<\/tr>\n<tr bgcolor=\"#f5f5f5\">\n<td>3:00<\/td>\n<td><strong>Break<\/strong><\/td>\n<td><\/td>\n<\/tr>\n<tr bgcolor=\"#ffffff\">\n<td>3:25<\/td>\n<td><a href=\"https:\/\/www.bu.edu\/tech\/services\/security\/services\/security\\-events\\-training\/events\\-and\\-training\/camp\/archives\/sc2005\/descriptions\/\">Riding the worm: MyDoom.AC<\/a><\/td>\n<td><a href=\"https:\/\/www.bu.edu\/tech\/services\/security\/services\/security\\-events\\-training\/events\\-and\\-training\/camp\/archives\/sc2005\/bios\/\">Rich Graves<\/a><\/td>\n<\/tr>\n<tr bgcolor=\"#f5f5f5\">\n<td>4:10<\/td>\n<td><a href=\"https:\/\/www.bu.edu\/tech\/services\/security\/services\/security\\-events\\-training\/events\\-and\\-training\/camp\/archives\/sc2005\/descriptions\/\">Intrusion Prevention Systems, The Inside Dirt<\/a><\/td>\n<td><a href=\"https:\/\/www.bu.edu\/tech\/services\/security\/services\/security\\-events\\-training\/events\\-and\\-training\/camp\/archives\/sc2005\/bios\/\">David Escalante<\/a><\/td>\n<\/tr>\n<tr bgcolor=\"#ffffff\">\n<td>4:55<\/td>\n<td><strong>Closing<\/strong><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>8:30 Registration and Check-in 9:00 Welcome 9:05 Privacy v. Security Susan Landau 9:50 Building a Linux Distribution Matthew Miller 10:35 Break 11:00 Patching Strategies Paul Luppino 11:45 Cyber Investigative and Forensic Response James Burrell 12:30 Lunch 1:30 Identity Management Collin Sampson 2:15 Two Case Studies John A. Grossman 3:00 Break 3:25 Riding the worm: MyDoom.AC&#8230;<\/p>\n","protected":false},"author":1288,"featured_media":0,"parent":18974,"menu_order":21,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/18983"}],"collection":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/users\/1288"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/comments?post=18983"}],"version-history":[{"count":6,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/18983\/revisions"}],"predecessor-version":[{"id":25020,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/18983\/revisions\/25020"}],"up":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/18974"}],"wp:attachment":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/media?parent=18983"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}