Internet Security Operations and Intelligence 6

(ISOI6)

The Evolution of Security Intelligence

January 29 - 30, 2009
Dallas, Texas

Host: The University of Texas at Dallas

Location: Check email or write to Randy via contact@isotf.org

Lodging information: Write to Randy for hotel special rates.

Agenda:

Title

Speaker(s)

29 Jan Time Duration
Registration 08:00 :25
The Deaf Note address
Dan Hubbard
08:25 :05
Are we ready for AV cloud evolution?
Wei Yan
Trend Micro
08:30 :30

Exploitation of MS08-067 by malware
Pierre-Marc Bureau
Eset

09:00 :30
The Verizon Breach Report
Marcus Sachs
Verizon
09:30 :30
Break 10:00 :30
The Web, the web, the web is on fire.
Dan Hubbard
Websense
10:30 :30

Proposal for a Pilot Project:
Using DKIM to Create a Email Trust Channel
Dave Crocker
Brandenburg InternetWorking

11:00 :30

Panel

11:30 :30
Lunch 12:00 1:00
Ready, Fire, Aim
Rick Wesson
Support Intelligence
13:00 :30
Softlayer Brief
Sam Fleitman
Softlayer
13:30 :15

All your malice are belong to us
Randy Vaughn
Baylor

13:45 :15
Panel: Establishing Response Triage
Paul Ferguson, Rick Wesson,...
14:00 :30
Break 14:30 :30
Evidence gathering and sharing
Pat Cain
15:00 :30
Briefing: McColo
Alex Lanstein
FireKEye
15:30 :30
Panel: emergent law enforcement - network security

Erin Kenneally, Marcus Sachs,...

16:00 :30
Proactive Fraud Detection via Active and Passive DNS
Andrew Fried
Internet Systems Consortium (ISC)
16:30 :30
Rooting out evil domains
Rod Rasmussen
Internet Identity
17:00 :30

Counterpoint: Russo-Georgia Cyberwarfare
Don Jackson
SecureWorks

17:30 :30
End of Day 18:00
Reception - Pizza 19:00

Title

Speaker(s)

30 Jan Time Duration
Registration 08:00 :15
LA Traffic: Minor Internal Incident; Major External Possibilities
John O'Leary
08:15 :15

Abuzo sustainable hosting in 5 minutes
Hillar Aarelaid
Estonia CERT

8:30 :20
Sleep is overrated:
A current series of attacks that might be of interest
Michael Hammer
American Greetings
08:50 :20

Adventures in Reinventing the Wheel
Lysa Myers
West Coast Labs

9:10 0:30
CAIDA Briefing
Emile Aben
9:40 0:20
Break 10:00 :30

08-27: A Case Study in an AF Network Intrusion
Lt Nick Brownhiem
Mr. Brian McKinney
Air Force CERT

10:30 :30

Lessons Learned from the Worldwide Deployment of SGNET
in the WOMBAT Project
Corrado Leita
Symantec Research Labs Europe

11:00 :30
Pwning Phishing Filters and Security Toolbars
Dr. Saeed Abu Nimeh
SMU
Websense
11:30 :15

Something mumbled in an uncomprehensible Israeli accent
Gadi Evron

11:45 :15
Lunch 12:00 1:00
Demonetizing Botnets
Joe Stewart
SecureWorks
13:00 :30
PDF exploits, mechanics and detection
Roel Schouwenberg
Kaspersky
13:30 :30
Cool Movies I've seen this year
Steve Santorelli
Team Cymru
14:00 :30
Break 14:30 :30

Why I am being forced to talk about Sandboxing
Righard Zwienenberg
Norman

15:00 :30
Analysis of socially-engineered apps and infected documents
Chad Loeven,Brian Jack
Sunbelt-Software
15:30 :30
Panel: Joe Stewart, Righard Zwienerberg,... 16:00 :30

Lightning Talks

16:30 :30
Panel 17:00 :30
Gadi 17:30 :30
End of Day 2 18:00
For more information mail Gadi or Randy at contact@isotf.org
Sponsors:
The University of Texas at Dallas
The University of Texas at Dallas


Sunbelt Software

Management Information Systems, Baylor University