Day 1 February 7, 2002 |
08:00 - 09:00 |
Registration and Breakfast |
09:00 - 09:15 |
Introduction, Jeff Moss |
09:15 - 10:15 |
Keynote: Windows Security Configuration Guide
Tony Sager, National Security Agency
|
10:15 - 10:30 |
Coffee Service |
|
General |
Network |
MS Apps |
10:30 - 12:00 |
Mobile Computing Security
Jesper Johansson
|
Routing and Tunneling Protocol Attacks
FX
|
The Devil Inside: Planning Security in Active Directory Design
Laura A. Robinson
|
12:00 - 13:30 |
Lunch |
13:30 - 14:45 |
Bi-directional Communications in a Heavily Protected Environment
Roelof Temmingh & Haroon Meer
|
Protecting Your Cisco Infrastructure Against the Latest "Attacktecs"
Stephen Dugan
|
Attacking and Defending DNS
Jay Beale & Andrew Hintz
|
14:45 -15:00 |
Break |
15:00 - 16:15 |
How to Stay Up-To-Date On Security Patches
Eric Schultze
|
Taranis
Jonathan Wilkins
|
NIST Recommendations for System Administrators for Securing Windows 2000 Professional
Tony Harris & Murugiah Souppaya
|
16:15 - 16:30 |
Coffee Service |
16:30 - 18:00 |
The Deep Technical Audit: How to Mitigate the Risks Presented in Other Sessions
David Goldman & Todd Feinman & Joe Nocera
|
VoIP: The Next Generation of Phreaking
Ofir Arkin
|
Deploying and Securing Microsoft Internet Security and Acceleration Server
Thomas Shinder & Jim Harrison
|
18:00 - 20:00 |
Reception
Book Signing with Dr. Thomas Shinder, author of Configuring ISA Server 2000: Building Firewalls with Windows 2000 |