------------------------------------------------------------------------- The following message is forwarded to you by "William H. Geiger III" <whgiii@invweb.net> (listed as the From user of this message). The original sender (see the header, below) was Vicente Garcia <vggarcia@campus.mty.itesm.mx> and has been set as the "Reply-To" field of this message. -------------------------------------------------------------------------
From: Vicente Garcia <vggarcia@campus.mty.itesm.mx> Newsgroups: comp.security.pgp.resources Subject: 10th FIRST Date: Tue, 20 Jan 1998 18:38:39 -0600 Organization: ITESM Campus Monterrey . DINF-DTCI Lines: 371 Message-ID: <34C5438D.F8F99029@campus.mty.itesm.mx> NNTP-Posting-Host: vangelis.mty.itesm.mx Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit X-Trace: news.mty.itesm.mx 885343029 6704 (None) 131.178.17.111 X-Complaints-To: news@news.mty.itesm.mx X-Mailer: Mozilla 4.01 [en] (Win95; I) X-Priority: 3 (Normal) Path: edison.dotstar.net!pull-feed.internetmci.com!opus.ies-energy.com!news.cs.utwente.nl!cosy.sbg.ac.at!wuff.mayn.de!Cabal.CESspool!bofh.vszbr.cz!cpk-news-hub1.bbnplanet.com!news.bbnplanet.com!cs.utexas.edu!news.uh.edu!news.mty.itesm.mx!not-for-mail
-----BEGIN PGP SIGNED MESSAGE----- ************************************************************* * * * Forum of Incident Response and Security Teams (FIRST) * * * * Tenth Annual Computer Security Incident Handling Workshop * * * * Monterrey, Mexico * * * * Monday 22-Jun-1998 to Friday 26-Jun-1998 (inclusive) * * * ************************************************************* C A L L F O R P A P E R S Submission Deadline: January 15, 1998 "The challenges of incident handling in a diverse world" The Forum of Incident Response and Security Teams (FIRST) was formed in November 1990 to address the problem of an ever increasing number of computer and network security related incidents, affecting thousands of systems around the world. The forum is made up of government, private and academic Computer Security Incident Response Teams from around the world. Its primary goal is to coordinate the efforts of its members in order to increase both their individual and collective effectiveness. The annual Incident Handling Workshop is part of FIRST's ongoing educational program, which is aimed at increasing the general awareness of security issues and improving expertise when handling computer security incidents. Specific security problems can affect many individuals and organizations around the world, possibly involving many different technological environments. Each of the parties involved must tailor its actions to the context in which the problem is experienced. Factors which must be taken into account include: * Cultural: The way in which a problem is tackled can be highly influenced by the historical development of the community in question. Examples are the ability for open communication about problems or values regarding privacy. * Professional: Today the Internet is open to the masses. The ease of communication, the advent of electronic commerce, and the availability of information, makes it a playground and a library for the masses. It is also a key business tool which professionals depend upon. * Political: Political decisions of individual countries concerning key areas of computer security, e.g. restrictions in the use and export of cryptological technology, may change the way that security problems must be approached. Legalities pertaining to diverse use of computer systems vary widely between countries. * Technological: Different technologies, covering a wide spectrum that includes mainframes, unix workstations, personal computers and network computers are connected to the same network simultaneously. Who should attend? __________________ All those responsible for any aspect of computer security management will benefit from attending this workshop. This includes both members and non-members of FIRST, law enforcement officials, computer security incident response teams, as well as consultants, contractors, vendors and individuals involved in the use, maintenance or planning of computer systems. Why attend? ___________ The character of the Internet is changing rapidly. Not only has the commercial community discovered new possibilities offered by "direct" marketing and advertisement. Governmental and non-academic organizations have also turned their attentions to the potential of the Internet. Incident Handling must adapt to the changing user base of the Internet. In addition to the opportunity for those involved in computer security to get together and discuss all aspects of the subject, the workshop will provide the opportunity to listen to experts in the fields of computer security incident response and vulnerability analysis. They will share their valuable expertise by speaking about their experience in dealing successfully with the coordination of incidents traversing international boundaries, highlighting particular problems where appropriate. There is no other workshop dedicated to this topic in the world. Important Dates: ________________ Abstract/Proposals Due: January 15, 1998 Authors Notified: February 10, 1998 Full Materials for Proceedings Due: April 1, 1998 Format of the workshop: _______________________ The first day is allocated for parallel tutorial style presentations. The remaining four days will consist of conference paper and workshop style presentations, as well as FIRST business sessions. One evening is allocated for participants to hold events devoted to subjects of particular interest ("birds of a feather" sessions). All events will be selected to further the objectives of FIRST and its members. They may involve topics such as computer security incident handling, team and incident response coordination, tools, international issues, or work in progress. A list of example topics can be found at the end of this announcement. Contributions should follow the following guidelines: Tutorials: Half or full day tutorial proposals will be considered. Papers: Written papers may be as long as desired, but presentations must be limited to 30 minutes. Workshop: These informal sessions should either follow a more "hands-on" approach or provide for a high degree of audience participation. They should be tailored to address specific issues and should be from 60 to 90 minutes in duration. Panel Sessions on a particular topic are acceptable. Submission information: _______________________ Submissions should include an abstract, proposed length and single page of notes describing the content and style of the presentation. Special audio/visual requirements (other than one microphone and one overhead projector) should be described. Panel session proposals should include a list of panelists who have agreed to participate. Submissions should be sent to the contact address given at the end of this document. The preferred submission mechanism is via electronic mail in ASCII, HTML or PostScript formats. Submissions via Facsimile transmission or the postal service will, however, be accepted. Submissions must be received by the January 15, 1998. Submissions received after this date may not be considered for inclusion in the program. Please use the appended form for your submissions. Authors will be notified by the February 10, 1998 of the status of their presentation (accepted/rejected). The final version of the material used for the presentation (overheads, papers, slides) must be delivered to the organizers by the April 1, 1998 for inclusion in the proceedings. Email: ______ Please use the email address first-pc98@first.org for submissions or questions regarding the call for papers. WWW: ____ The Workshop WWW page is accessible from the FIRST webserver: http://www.first.org/workshops/1998/ Program Committee: __________________ Wolfgang Ley, DFN-CERT, Germany (Program Chair) Brian Dunphy, ASSIST, USA Eric A. Fisch, Trident Data Systems, USA Eric Halil, AUSCERT, Australia Stephen Hansen, Stanford University, USA Ahmet Koltuksuz, IZMIR Inst. of Technology, Turkey Sherman O. Loges, Boeing, USA Paul Mauvais, CIAC, USA Fran Nielsen, NIST, USA Steve Romig, Ohio State, USA Roger Safian, Northwestern University, USA Miguel J. Sanchez, SGI, USA Sandy Sparks, CIAC, USA Don Stikvoort, CERT-NL, Netherlands Wietse Venema, TU Eindhoven, Netherlands Mark Zajicek, CERT Coordination Center, USA Conference Location: ____________________ Monterrey, Mexico Dates: _____ Mon June 22, 1998 - tutorials (parallel streams) Tue June 23, 1998 to Fri June 26, 1998 (workshop). Conference Host: ________________ Instituto Tecnologico y de Estudios Superiores de Monterrey (ITESM), Mexican CERT (MxCERT). The workshop is sponsored by First.Org Inc. Contact Information: ____________________ Electronic Mail: first-pc98@first.org Postal Address: Attn: Wolfgang Ley DFN-CERT Univ. of Hamburg Vogt-Koelln-Str. 30 22527 Hamburg Germany Facsimile: +49 40 5494 2241 Subject: FIRST 1998 Workshop Example Topics (other topics may be considered): Dealing with the increasing diversity in all areas International Legal Issues Legal and Administrative Issues in Incident Handling Coordinating International Incidents Incident Handling and the Internet Security on Large Networks other than the Internet How to Protect an Incident Response Team Site Interviewing/Hiring Incident Response Team Staff Outsourcing an Incident Response Team Vulnerability/Advisory Processes New Tools for Incident Handling Statistic Tools Informational Resources Programming Securely Preventing Incidents Intrusion/Vulnerability Detection Tools System/Network Monitoring Tools The Changing Nature of the "hack" Internet Service Providers and Security Vendor Session Collecting Evidence =========================================================================== ABSTRACT / PROPOSAL SUBMISSION SHEET FIRST 1998 Name __________________________________________________________ Address __________________________________________________________ __________________________________________________________ __________________________________________________________ Phone ____________________ Fax _______________________ E-mail ____________________ URL _______________________ Title of Presentation ____________________________________________ Presentation Type ( please tick one ) ( ) Paper ( ) Half-day Tutorial ( ) Workshop ( ) Full-day Tutorial ( ) Panel Presentation Length (in minutes) ______ Presentation Media Requirement (other than one overhead projector and a microphone): _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ Abstract ( 75-100 words ) _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ FIRST is granted an non exclusive right to copy and redistribute conference material including the submissions of the author(s). This includes possible distribution on a conference CD and/or the FIRST website. Brief Biography ( 50-75 words ) _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ -----BEGIN PGP SIGNATURE----- Version: 2.6.2i iQCVAwUBNHit6QQmfXmOCknRAQFQQQP6Ao1CYieDoeHK1BFqypC6QjVKXeNLEjY+ jq2HgNBSvxuysHH1fNnqNxMRJSHWyFw+yEJJk3TFXL6tyIOIojbfnzH88crtdMah yzMYZL+APdTf3JppF8ipeIO8HygwMVt/BuRtW7JUCPvN5b7Vj1jDfc8pqOE786np eAExY1mgrSk= =LqxA -----END PGP SIGNATURE----- -------------------------------------------------------------------- MR/2 PGP Signature Check 22 Jan 1998 22:58:34 -------------------------------------------------------------------- Key matching expected Key ID 8E0A49D1 not found in file 'pubring.pgp'. WARNING: Can't find the right public key-- can't check signature integrity. -------------------------------------------------------------------- MR/2 PGP Signature Check [Secondary Keyring] 22 Jan 1998 22:58:34 -------------------------------------------------------------------- WARNING: Bad signature, doesn't match file contents! Bad signature from user "Wolfgang Ley, DFN-CERT <ley@cert.dfn.de>". Signature made 1997/11/23 22:28 GMT using 1024-bit key, key ID 8E0A49D1 WARNING: Because this public key is not certified with a trusted signature, it is not known with high confidence that this public key actually belongs to: "Wolfgang Ley, DFN-CERT <ley@cert.dfn.de>". PGPRC=1 PGPRC2=1 ----------------------------------------------------- -- End of forwarded message ----------------------------------------------------- -- --------------------------------------------------------------- William H. Geiger III http://users.invweb.net/~whgiii Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html --------------------------------------------------------------- Tag-O-Matic: The sad thing about Windows bashing is it's all true.