{"id":18985,"date":"2009-12-10T17:14:05","date_gmt":"2009-12-10T21:14:05","guid":{"rendered":"http:\/\/www.bu.edu\/tech\/security\/events-and-training\/security-camp\/archives\/agenda-6\/"},"modified":"2010-01-11T15:36:09","modified_gmt":"2010-01-11T19:36:09","slug":"sc2004","status":"publish","type":"page","link":"https:\/\/www.bu.edu\/tech\/services\/security\/education\/camp\/archives\/sc2004\/","title":{"rendered":"2004 Agenda"},"content":{"rendered":"<table border=\"0\" cellspacing=\"2\" cellpadding=\"2\" width=\"100%\">\n<tbody>\n<tr bgcolor=\"#f5f5f5\">\n<td>8:30<\/td>\n<td>Registration and Check-in<\/td>\n<td>Please see our archives for the previous event.<\/td>\n<\/tr>\n<tr bgcolor=\"#ffffff\">\n<td>9:00<\/td>\n<td>Welcoming Remarks<\/td>\n<td><\/td>\n<\/tr>\n<tr bgcolor=\"#f5f5f5\">\n<td>9:10<\/td>\n<td><a href=\"https:\/\/www.bu.edu\/tech\/services\/security\/services\/security\\-events\\-training\/events\\-and\\-training\/camp\/archives\/sc2004\/nhtc_furfari\/\">Privacy vs. Security<\/a><\/td>\n<td>Jeanne Furfari (New Hampshire Community Technical College)<\/td>\n<\/tr>\n<tr bgcolor=\"#ffffff\">\n<td>10:00<\/td>\n<td><a href=\"https:\/\/www.bu.edu\/tech\/services\/security\/services\/security\\-events\\-training\/events\\-and\\-training\/camp\/archives\/sc2004\/fbi_day\/\">The always informative FBI update<\/a><\/td>\n<td>SA Nenette Day (Boston FBI)<\/td>\n<\/tr>\n<tr bgcolor=\"#f5f5f5\">\n<td>10:50<\/td>\n<td><strong>Break<\/strong><\/td>\n<td><\/td>\n<\/tr>\n<tr bgcolor=\"#ffffff\">\n<td>11:10<\/td>\n<td><a href=\"https:\/\/www.bu.edu\/tech\/services\/security\/services\/security\\-events\\-training\/events\\-and\\-training\/camp\/archives\/sc2004\/bu_gauthier\/\">Life on a University Network: Architecture for Automatically Detecting, Isolating, and Cleaning Infected Hosts<\/a><\/td>\n<td>Eric Gauthier (Boston University)<\/td>\n<\/tr>\n<tr bgcolor=\"#f5f5f5\">\n<td>12:00<\/td>\n<td><strong>Lunch<\/strong><\/td>\n<td><\/td>\n<\/tr>\n<tr bgcolor=\"#ffffff\">\n<td>1:00<\/td>\n<td><a href=\"https:\/\/www.bu.edu\/tech\/files\/pdf\/cornell_adinolfi.pdf\">How to Create Firewall Service on the Cheap: Using Router ACLs to Help Secure Departmental Subnet<\/a><\/td>\n<td>Daniel Adinolfi (Cornell)<\/td>\n<\/tr>\n<tr bgcolor=\"#f5f5f5\">\n<td>1:50<\/td>\n<td><a href=\"https:\/\/www.bu.edu\/tech\/services\/security\/services\/security\\-events\\-training\/events\\-and\\-training\/camp\/archives\/sc2004\/bu_shockley\/\">Linux on z\/Series<\/a><\/td>\n<td>Gerard Shockley, Arthur Rosata (Boston University)<\/td>\n<\/tr>\n<tr bgcolor=\"#ffffff\">\n<td>2:40<\/td>\n<td><strong>Break<\/strong><\/td>\n<td><\/td>\n<\/tr>\n<tr bgcolor=\"#f5f5f5\">\n<td width=\"5%\" height=\"42\">3:00<\/td>\n<td><a href=\"https:\/\/www.bu.edu\/tech\/services\/security\/services\/security\\-events\\-training\/events\\-and\\-training\/camp\/archives\/sc2004\/baystate_didonato\/\">Implementing HIPAA Security (It&#8217;s More than a Compliance Issue)<\/a><\/td>\n<td>James DiDonato (Baystate Health Systems)<\/td>\n<\/tr>\n<tr bgcolor=\"#ffffff\">\n<td>3:50<\/td>\n<td><a href=\"https:\/\/www.bu.edu\/tech\/services\/security\/services\/security\\-events\\-training\/events\\-and\\-training\/camp\/archives\/sc2004\/harvard_laporte\/\">De-worming Harvard<\/a><\/td>\n<td>Bill Terwilliger, David LaPorte (Harvard University)<\/td>\n<\/tr>\n<tr bgcolor=\"#f5f5f5\">\n<td>4:40<\/td>\n<td>Closing remarks<\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>8:30 Registration and Check-in Please see our archives for the previous event. 9:00 Welcoming Remarks 9:10 Privacy vs. Security Jeanne Furfari (New Hampshire Community Technical College) 10:00 The always informative FBI update SA Nenette Day (Boston FBI) 10:50 Break 11:10 Life on a University Network: Architecture for Automatically Detecting, Isolating, and Cleaning Infected Hosts Eric&#8230;<\/p>\n","protected":false},"author":1288,"featured_media":0,"parent":18974,"menu_order":22,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/18985"}],"collection":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/users\/1288"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/comments?post=18985"}],"version-history":[{"count":5,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/18985\/revisions"}],"predecessor-version":[{"id":25707,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/18985\/revisions\/25707"}],"up":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/18974"}],"wp:attachment":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/media?parent=18985"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}