ISOI 4

February 28 - 29, 2008
Sunnyvale, CA

Yahoo! Building D, Classroom 4
701 First Avenue
Sunnyvale CA

Map and Hotels - Yahoo! Maps

Hotels and Map- the other guys

Agenda

28-FebTimePersonLengthTopic
10:00Gadi0:10Gadi
10:10Fred Cohen0:25Distributed Coordination Attacks - past, present, and future
10:35Dave Piscitello
ICANN
0:10Fast Flux and DNS policy brief
10:45Julia Wolf
FireEye
0:20Informatic-based Malware Analysis
11:05Panel0:45Paul Vixie, Mark Seiden, Gadi Evron, Marcus Sachs
11:50Patrick Peterson
IronPort/Cisco
0:20Inside the My Canadian Pharmacy spam gang
12:10Sun Clausewitz0:20Whole Internet Visualizations for Security Research - IPv4 and IPv6
12:30Jim Binkley
PSU
0:15PSU's Experience with Ourmon and Botnet Detection
12:45Dan Hubbard
WebSense
0:20What's in a name? Lexi-reputation:Scoring the likelihood of machine
versus man domain and host name generation in
order to determine maliciousness.
13:05Lunch1:00
14:05Rick Wesson
Support Intelligence
0:20Abuse Vectors mapped on Space Filling Curves
14:25Daniel Schwalbe
University Washington
0:20Gig-speed packet captures - Drinking from the network fire-hose
14:45Righard Zwienenberg
Norman
0:15TBA - The Best Advice
15:00Pat Cain
APWG
0:15XML IODEF:Less filling, same great taste
15:15Panel0:45Steve Crocker, Avi Freedman, Gadi Evron, Dan Hubbard, Righard Zwienenberg
16:00Oliver Friedrichs
Symantec
0:20Cybercrime and the Electoral System
16:20Dave Dittrich
University Washington
0:20Nugache
16:40Nicholas Bourbaki0:15The 7 percent solution: "free" tools for winbox cleanup and consumer education
16:55Juraj Malcho
ESET
0:20The life of a drive-by exploit chain
17:15Panel0:45Mark Seiden, Barry Greene, Matt Jonkman, Mike Johnson
18:00John O'Leary0:15Psychological Analysis of Social Engineering Attacks
18:15Ross Stapleton-Gray
Packet Clearing House
0:15INOC-DBA R&D Initiatives
18:30Ziv Mador
Microsoft
0:25Fighting the Storm: Data from the MSRT
18:55DismissalSorry, no boxing.
We have replaced it with paint ball.
Come shoot at Gadi.
Listen to him scream.


Party following
29-FebTimePersonLengthTopic
9:30Levi Gundert
Cymru
0:30A Case study or two
10:00DoD0:15DoD briefing
10:15Sean Zadig0:15NASA briefing
10:30Panel0:30Levi Gundert, LEO, DoD
11:00Michael Hammer
AG Interactive
0:15Strong SPF Assertions, DKIM Signing and Phishing Mitigation
11:15Paul Vixie0:15ISC Security Information Exchange
11:30Richard Perlotto
ShadowServer
0:15TheSoapbox Presentation
11:45Adrien de Beaupre
Bell Canada Security
0:15Security Incident Management Capability Maturity Model
12:00Panel0:30Richard Perlotto, Adrien de Beaupre,
12:30Lunch1:00Lunch
13:30Spamhaus0:20Hot or Not
13:50Fengmin Gong
FireEye
0:20Extracting Accurate Botnet Intelligence Using A VM-Based Approach
14:10Paul Sop
Prolexic
0:20HTTP DDoS Attack Evolution
14:30David Moore
CAIDA
0:15Strange Things Found in an Open Resolver Survey
14:45Adam O'Donnell
Cloudmark
0:15When Malware Attacks (anything but Windows)!(?)
15:00Panel0:30Gadi