  
Zur Person
  
Größere Projekte
  
IT Incident Response
  
Publikationen
  
PGP-Schlüssel
  
Impressum
|
FIRST Conference on Computer Security Incident Handling & Response 1999
Die Arbeit
|
Teams
|
Konferenzen
|
Bibliographie
2001
2000
1999 
1998
1997
1996
1995
1994 
1993
1992
1991
1990
1989
Veranstaltungsort:
Brisbane, Australien.
Datum:
13. - 18. Juni 1999
Primary Tutorial Track:
-
Walter Belgers (Origin, NL) /
Black Hats Session
-
Jeffrey J. Carpenter (CERT/CC, USA),
Brian P. Dunphy (ASSIST, USA) /
Will the real owner of this IP address please stand up?
-
Steve Acheson (Cisco Systems, USA) /
Secure Shell (SSH)
-
Sandy Sparks (CIAC, USA),
Marianne Swanson (NIST, USA),
Judith A. Spencer (FedCIRC, USA) /
Creating an Incident Response Team
Advanced Tutorial Track:
-
George Mohay (Queensland University of Technology, AU),
Rodney McKemmish (Queensland Forensic Computing Examination Unit, AU),
Alison Anderson (Queensland University of Technology, AU),
Byron Collie (Directorate of Information Warfare, Headquarters Air Command, AU),
Olivier de Vel (Defense Science and Technology Organization, AU) /
Computer Forensics
-
William J. Orvis (CIAC, USA) /
Computer Virus Operation and New Directions
-
Bob Ayers (Admiral Management Services, UK) /
Risk Avoidance and Risk Management : Phrenology in Cyberspace
Plenary:
- Welcoming Address:
Senator the Honourable Amanda Vanstone (Minister for Justice and Customs, AU)
- Keynote Speaker:
Prof. William Caelli (Queensland University of Technology, AU)
- Endnote Speaker:
Steve Orlowski (Special Advisor on IT Security
Policy, Australian Federal Attorney-General's Department, AU)
CSIRT Foundation: Gaining and Operating "Trust":
-
Teams in the Asian / Pacific Area (Panel)
Vorträge von Vertretern von
CERTCC-KR, JPCERT/CC und SINGCERT.
-
Teun Nijssen (Tilburg University & CERT-NL, NL),
Stefan Kelm (University of Hamburg & DFN-PCA) /
Setting up a Policy Certification Authority
Vulnerability Prevention and Insurance:
-
Topher Hughes (Cisco Systems, USA) /
Assessing Network Security for Insurability
-
Dr. Brian Denehy (SecureGate Limited, AU),
Jeremy Hamlyn (SecureGate Limited, AU) /
On the Management of Secure Gateways
-
Dr. Wietse Venema (IBM, USA)
Bugs per Amount of Code
Workshop
- Jeffrey J. Carpenter (CERT/CC, USA),
Katherine T. Fithen (CERT/CC, USA) /
A Case Study in Incident and Vulnerability Handling Coordination
[Carpenter, Fithen 1999]
Vulnerability Handling:
-
Jane M. Lemmer (World Wide Digital Security, Inc., USA) /
Vulnerability Assessment Using SAINT
-
Christina Serban (AT&T Laboratories, USA) /
Security Issues for "Always-On" Devices: ADSL and Cable Modem Access
-
Marko Laakso (University of Oulu, FI) /
A tiger team approach to resolving vulnerability cases
What Incident Response Personnel need to know about today's hacker world (Panel):
- Diskussionsrunde mit
Wietse Venema (IBM, USA),
Mowgli Assor (OSU-IRT, USA),
Byron Collie (Directorate of Information Warfare, Headquarters Air Command, AU),
und Walter Belgers (Origin, NL)
Intrusion Detection:
- Midori Asaka (Information-technology Promotion Agency, JP) /
The Implementation of IDA: An Intrusion Detection Agent System
- Michael L. Puldy (IBM ERS, USA) /
Lessons Learned in the Implementation of a Multi-Location
Network Based Real-Time Intrusion System
"Year 2000" (Panel):
- Diskussionsrunde mit mehreren Vertretern verschiedener Teams
Incident Handling:
- Chaeho Lim (CERTCC-KR) /
Semi-Auto Intruder Retracing Using Autonomous Intrusion Analysis Agent
- Jed M. Pickel (CERT/CC, USA),
Chris Rouland (ISS, USA) /
Automating Incident Reporting [Pickel, Rouland 1999]
"Ask the Experts" (Panel):
- Diskussionsrunde mit mehreren Vertretern verschiedener Teams
|