Half-Day
Hassan Takabi, University of Pittsburgh
M3: Keeping Your Web Apps Secure: The OWASP Top 10 & BeyondHalf-Day
Robert H'obbes' Zakon, Zakon Group LLC
M5: Contemporary CryptographyCANCELLED
Dr. Rolf Oppliger, eSECURITY Technologies
TF1: Tracer FIRE – Adversarial-based, Defensive Forensics Situational Awareness ExerciseKevin Nauer, Benjamin Anderson, and Ted Reed, Sandia National Laboratories
Layered Assurance Workshop (LAW)Workshop Chair: Rance J. DeLong, Santa Clara University
Program Chair: Gabriela Ciocarlie, SRI International
Panel Chair: Peter G. Neumann, SRI International
Half-Day
Nancy Mead, Software Engineering Institute
M4: Security Metrics and Risk Analysis of Enterprise Networks: Techniques and ChallengesHalf-Day
Anoop Singhal, NIST and Xinming (Simon) Ou, Kansas State University
M5: Contemporary CryptographyCANCELLED
TF1: Tracer FIRE – Adversarial-based, Defensive Forensics Situational Awareness Exercise(see above)
Layered Assurance Workshop (LAW)(see above)
Full-Day
Mr. John A. Ortiz, Crucial Security Inc., Harris Corporation
T7: Software Assurance Methods in Support of Cyber SecurityHalf-Day
Dr. Carol Woody, Software Engineering Institute
T9: Windows Digital Forensics and Incident ResponseFull-Day
Ms. Jamie Levy, Terremark Worldwide
TF2: Tracer FIRE – Adversarial-based, Defensive Forensics Situational Awareness ExerciseKevin Nauer, Benjamin Anderson, and Ted Reed, Sandia National Laboratories
Cloud Computing Workshop (CCW) Harvey H. Rubinovitz Layered Assurance Workshop (LAW)(see above)
(see above)
T8: Systems Resilience and Metrics: A Cyber Security PerspectiveHalf-Day
Marco M. Carvalho, Richard Ford, and Liam M. Mayron, Harris Institute for Assured Information, Florida Institute of Technology
T9: Windows Digital Forensics and Incident Response(see above)
TF2: Tracer FIRE – Adversarial-based, Defensive Forensics Situational Awareness Exercise(see above)
Cloud Computing Workshop (CCW)(see above)
Layered Assurance Workshop (LAW)(see above)
Ron Ross, Fellow, National Institute of Standards and Technology
Opening up a Second Front on Risk Management: Integrating Cyber Security Requirements into Main Stream Organizational Mission and Business Processes
Content Management Systems - the last frontier for Data Loss Prevention
Tamer Abuelsaad, IBM
Case Study of a Novel Application using the ISO/IEC Software Tagging Standard (ISO/IEC 19770-2) for Software Security
Dan Wolf/Ron Ball, Cyber Pack Ventures, Inc.
Security Paintings: Creating Useful Security Reports When You Don't Know What's Really Happening
Jonathan Grier, Vesaria
Nirav Dave, SRI International
Rance DeLong, Santa Clara University
Roger Schell, Aesec
Olin Sibert, Oxford Systems
TR1: Cybersecurity in the Acquisition Process: The Transformed Lifecycle Risk Management ProcessRon Ross, NIST and Daniel Faigin, Aerospace
Ian Bryant, UK Trustworthy Software Initiative Joe Jarzombek, US Department of Homeland Security Dr Carol Woody, Software Engineering Institute
TR1: Cybersecurity in the Acquisition Process: The Transformed Lifecycle Risk Management Process(see above)
Selections of work from the 2012 New Security Paradigms Workshop
Holographic Vulnerability Studies: Vulnerabilities as Fractures in Interpretation as Information Flows Across Abstraction Boundaries
Beyond the Blacklist: Modeling Malware Spread and the Effect of Interventions
TR1: Cybersecurity in the Acquisition Process: The Transformed Lifecycle Risk Management Process(see above)
(see above)
Ross Anderson, Author and Professor, University of Cambridge, UK
Security Economics - A Personal Perspective
Security Economics - A Personal Perspective Ross AndersonSusan Alexander, Director, Safe and Secure Operations, IARPA
Trust Engineering — Rejecting the Tyranny of the Weakest Link
Trust Engineering - Rejecting the Tyranny of the Weakest Link Susan AlexanderMobile Attacks Survey and Taxonomy
Wei Wang and Cristina Serban, AT&T
Forensically Important Artifacts Resulting from Usage of Cloud Client Services
Dr. Gaurav Gupta, Indraprastha Institute of Information Technology
Test and Evaluation of the PEASOUP security prototpe
Dr. David Melski, GrammaTech, Inc.
Ron Ross, NIST
David Wheeler, Institute for Defense Analyses
Kris Britton, NSA
Jeremy Epstein, National Science Foundation
Ian Bryant, UK Trustworthy Software Initiative
TR3: Risk Assessment using NIST SP 800-30 and SP 800-39Marshall Abrams, MITRE
Christopher Clifton, Perdue University
David Farber, U. of Pennsylvania
Sherry Burs-Howard, MITRE
TR3: Risk Assessment using NIST SP 800-30 and SP 800-39(see above)
Eran Feigenbaum, Director of Security, Google Enterprise
Is Cloud Computing the End of Security and Privacy As We Know It?
Michael McEvilley, MITRE Corp.
Ron Ross, NIST
Daniel Faigin, Aerospace Corp.
Giveaways too, so don't plan on leaving early!
Show seating is at 5:30pm. The Cirque du Soleil theatre is located on the far side of Downtown Disney - across the street from the hotel.
Pre-purchased tickets may be picked up at the ACSAC registration desk.