DATANET SECURITY 97 PROGRAM

Conference program Datanet Security 1997 Annual International Conference and Exhibition on Wide Area Network Security FEBRUARY 17 - 18 - 19 - 20, 1997 HYATT REGENCY MIAMI HOTEL & CONVENTION CENTER All lectures and presentations have been confirmed Keynote speakers: Monday February 17, 1997 The 1997 Datanet Security conference will be opened with a keynote address by Dr. Ruth A. David, Deputy Director Science & Technology of the Central Intelligence Agency. Following the opening address, Mr. Stuart A. Baker will deliver a keynote speech "Legal Aspects of Network Security". Stuart Baker is partner with Steptoe & Johnson in Washington DC, and former lead counsel for the National Security Agency. Keynote speakers: Tuesday February 18, 1997 The second day of the Annual Datanet Security Conference is highlighted with a presentation by Dr. Rob Kolstad "Non-Security Issues Affecting the Future of the Internet". Rob Kolstad is President of BSDI Inc. "What's Slowing down Deployment of Security ?" is the title of the next keynote address by Novell's Chief Security Architect, Dr. Radia Perlman. She was featured in the 20th anniversary edition of Data Communications magazine as one of 20 most influential people in the field of computer networking. Keynote speaker: Wednesday February 19, 1997 This conference day we feature Mr. Scott Charney as a prominent keynote speaker. Scott Charney is the principal government authority on computer crime. He heads the federal prosecutors and leads the Computer Crime and Intellectual Properties Section within the Department of Justice. ADVANCED TECHNOLOGY PROGRAM Monday February 17, 1997 ELECTRONIC INTELLIGENCE "Intelligence Behind the Journal Intelligence" - Olivier Schmidt Olivier Schmidt is founding editor of several important international professional news journals and expert publications. Among these "Parapolitics", "Intelligence Newsletter" and "Intelligence". He co-authored "Intelligences Secretes" and "OSS et la Resistance Francaise". He lives and works in Paris, France. "The King of Secret Readers: Edgar Allen Poe, William Friedman, and the Logic of the Cold War" - Professor Shawn Rosenheim Shawn J. Rosenheim is Associate Professor of English at Williams College (Williamstown, Mass.), and a founding member of the Communications Technologies Research Group. His most recent publication is "The Cryptographic Imagination: Secret Writing from Edgar Poe to the Internet" (Johns Hopkins University Press, 1996) DISCUSSION PANEL Traditional versus New Technologies: A Challenge for the Intelligence Communities Session and Panel Chairman - David Whipple David Whipple is Executive Director of the Association of Former Intelligence Officers, AFIO. As no other Mr. Whipple is able to illustrate the traditional methods of information gathering. INTERNET SECURITY The Changing Role of the Firewall - Stephen Flaig Mr. Flaig is Vice President for LanOptics Inc., developers of the Guardian firewall. Network Access Flexibility through RADIUS - David Dawson David Dawson is General Manager Network Security Business Unit for Ascend Communications Inc. Previously he was Chief Executive Officer of Morningstar Technologies Inc. He holds a BS in Electrical Engineering from the US Military Academy at West Point. Internet Security and the IBM Firewall - Peter Crotty Peter Crotty is worldwide responsible for IBM's technical firewall support program. Secure Access: If you don't have security everywhere, you don't have it anywhere ! - Doug LaBorde Mr. LaBorde is Manager with the Network Security Business Unit of Ascend Communications. NT SECURITY Windows NT Security: Networked Perspectives - Charles Rutstein Charles Rutstein is Principal Consultant with Price Waterhouse, and has extensive front line computer and network security experience. He authored several books on computer viruses. His latest work, dealing with Windows NT security, has just been released. NT Internet Security - Firewalls, Web-servers, and Vulnerabilities - Bill Stout Bill Stout is network security analyst and senior systems administrator with Hitachi Data Systems. He specializes in Windows NT security issues. VIRUSES Viruses and the Internet; email, Java, Active-X; the new virus carriers - Thierry Giron Thierry Giron holds a Computer Science Hon. degree from Middlesex University (London, UK), and a Business degree from ESC in Reims, France. He joined Trend Micro in Taiwan in 1992, and is since Trend's Customer Engineering Manager for the North American offices. Minimizing the Virus Threat - Glenn Jordan Glenn Jordan is the leading virus technology expert with Dr. Solomon, and is an established member of the Computer Anti-virus Research Organization, an international network of anti-virus researchers. Mr. Jordan is a graduate of the University of North Carolina. Tuesday February 18, 1997 INTERNET SECURITY Cyber Thieves - Gregg Lebovitz Gregg Lebovitz is Director of Security Products at BBN Planet. Mr. Lebovitz spent 15 years at Carnegy-Mellon University, designing, implementing and deploying network routers and distributed applications. Accounting for Square-Root Attacks in Cryptographic Design - Michael Wiener Michael Wiener is senior cryptologist with Entrust Technologies (formerly Nortel Secure Networks). His expertise is in the area of cryptanalysis, authentication, and key-exchange protocols, public-key infrastructures, design of cryptographic systems, and high-speed implementations of public-key cryptosystems. He is agraduate of the University of Waterloo (Canada). Virtual Private Networking: Integrating Internet and Intranet Security - Tony Rosati Tony Rosati is co-founder and Vice President for TimeStep Corporation. He leads design teams ranging from the development of public-key and DES based integrated circuits to the development of system level communications security solutions utilizing cryptographic techniques. Approaching End-to-End Security - Paul Ferguson Paul Ferguson is a senior expert with Cisco Systems. His principal disciplines are Internet security, large-scale routing and design architecture. NETWORK SECURITY Assurance in Products for the Internet - Alan Borrett Alan Borrett is member of the UK IT Evaluation & Certification Scheme, under authority of Her Majestys Government Communications Headquarters (GCHQ) Computer Security in the Third World: The Mexican Case - Prof. Guillermo Mallen Professor Mallen teaches and researches at the Ibero-Americana University in Mexico. He is a former President of the Mexican Academy of Informatics. Single Point Security: The Unisys Vision for Enterprise Security Administration - William Buffam William Buffam is software architect with Unisys Corp. His background is in operating systems, networking, and solution engineering. He holds a Computer Science degree from the University of Manchester. Security Solutions for the Internet - Eli Herscovitz Mr. Herscovitz is founder of RadGuard Ltd., provider of secure datanetwork systems. He chairs the Networking Security Standardization Committee of the Standards Institute of Israel. TUTORIAL Hacker Tools & Techniques and Intrusion Testing - A dual presentation by Edward Skoudis and Cynthia Cullen Cynthia Cullen is a senior consultant with Bell Communications Research Security and Fraud Management. Edward Skoudis is a senior expert in network security issues with Bellcore's Navesink Research Center. Wednesday February 19, 1997 COMPUTER CRIME Network Security's Future - Glenn Gianino Glenn Gianino is Vice President of Advanced Technology with Computer Associates International. His responsibilities included all systems software and hardware including micro, midrange, and mainframe systems, as well as all networking, SNA, wide area networks and Internet services. His most recent assignment involves networking security on all platforms and operating systems. Mining the Information Klondike: CINet, a tool to fight organized crime - Robert Heibel Robert Heibel is Director of the research/intelligence analyst program at Mercyhurst College (PA). A 25-year veteran of the Federal Bureau of Investigation, he served as its Deputy Chief of Counterterrorism. Mr. Heibel is also Executive Director of the Center for Information Research, Analysis, and Training at Mercyhurst. Mr. Heibel is a graduate of Georgetown University. Digital Cash is hard to regulate - Prof. Michael Froomkin Professor Michael Froomkin is associate professor at the University of Miami, School of Law at Coral Gables. He specializes in Internet law and related aspects. Professor Froomkin is a graduate of the Yale Law School, and has a M.Phil. in history of international relations from Cambridge University (UK). He is a Fellow of the Cyberspace Law Institute. Smart Cards: the Coming Wave - James Chen James Chen is founder and President of V-One Corp., a provider of network and internetwork security solutions. Previously Mr Chen was head of the ground network engineering division for Intelsat, responsible for satellite launches. Electronic Commerce on the Internet - Tom Carty Tom Carty is Director of CyberTrust, a division of GTE. Mr. Carty was responsible for the information security privacy organization and architecting key management systems with GTE. He is a graduate of the University of Connecticut and Boston University. ATM: An Emerging Network Technology - Michael Guzelian Michael Guzelian has over 15 years experience in and knowledge of authentication, bandwidth-on-demand, and security issues that face large public networks. DISCUSSION PANEL High Integrity/Mission Critical Systems Session and Panel Chairman - Donald L. Evans Presentations by: Donald Evans, Timothy Stacey and Robert Smock Donald Evans is senior security engineer and senior member of the Johnson Space Center Mission Operations Directorate AIS Security Engineering Team, providing assistance to NASA in developing and maintaining the IS security program for the Space Station and Shuttle ground based programs. He is an advisory board member for the NSA Systems Security Engineering Capability Maturity Model, and a member of the Presidential Sub-committee of the US Security Policy Board. Timothy Stacey was involved with security development for NASA's Space Shuttle and Space Station programs and software engineering in support of NASA and the US Air Force Space Command Systems. He is currently a information security expert with SAIC Space Operations. Robert Smock is head of Flight Operations Information Security Program at United Space Alliance, responsible for providing the primary government contractor support for the protection of NASA's ground-based information resources, which support Space Shuttle and Space Station flight operations at the Johnson Space Center in Houston, Texas.Mr Smock holds a degree in Computer Science. TUTORIAL Network Security: PRIVATE Communication in a PUBLIC World Dr. Radia Perlman and Charlie Kaufman Radia Perlman is Chief Security Architect for Novell, Inc. She is known for the invention of the spamming tree algorithm used by bridges, and many of the algorithms used for routing, including the design of a network that can withstand a denial of service attack. She is the author of two textbooks. She has a PhD from MIT. Charlie Kaufman is security architect for Lotus Notes/Domino. He is the chair of the web transaction security working group of the IETF. He is on the National Academy of Sciences expert panel on computer system trustworthiness. He is coauthor with Radia Perlman, of the book "Network Security: Private Communications in a Public World". Thursday February 20, 1997 INTERNET SECURITY Fighting Piracy on the Net - Peter Beruk Peter Beruk is Director of Domestic Anti-Piracy with the Software Publishers Association. Internet and Server Security - Joshua Peleg Joshua Peleg is the Director of Technical services with Memco Software. Mr. Pelegs expertise is in security, disaster recovery and system level programming. Joshua gained much of his experience while in the Israeli military defense forces. Is your Company a Hackers Help Desk ? - Steve Ritger Steve Ritger is security engineer with SRA International. His expertise is information and network security as well as fraud detection and prevention. JAVA SECURITY Security and "Live" content: A Java Perspective - Peter Coffee Peter Coffee is advanced technologies analyst for PC Week Labs. He has taught information systems management, management science and expert systems development for Pepperdine University, Chapman College, and UCLA. He is the author of "How to program Java". Mr. Coffee is a graduate of MIT and Pepperdine University. TUTORIAL World Wide Web Security Arthur Donkers Arthur Donkers is founder of Le Reseau, an independent security consulting firm in The Netherlands (Europe). He is a graduate of Delft University of Technology, and holds a degree in Electrical Engineering. He authors a monthly column on system administration and security aspects in SysAdmin Magazine. ------------0---------------- Datanet Security 97 is sponsored by the National Association of Webmasters, SysAdmin Magazine, Sprint, and CMP Network Computing Magazine. ---------------------------0-------------------------- Participation in Datanet Security 97 is $ 845. This includes admission to all conference sessions, tutorials and discussion panels, as well as lunches during the four days, a banquet, and a cruise to the Bahama islands (including breakfast, lunch, dinner and show). You can pay on-line via a secure web transaction with all major credit cards. A special hotel arrangement has been made with Hyatt Regency Miami, making discounted room rates available to all participants. The web page with full information is available at http://www.datasec.net Alternatively you can fax 941 775 1533, or email ds97@datasec.net. =========================================================================
participants (1)
-
korinne@datasec.net