International Conference on
|
Tuesday, 11.
September
2007
|
||||
Time | Presentation | Speaker | ||
10:45 | Registration/Coffee | |||
11:15 | Greeting and Introduction | |||
11:30 | Key Note About the Role of IT Security in The Information Society |
Klaus Brunnstein, IFIP President | ||
12:15 | A Common Process Model for Incident Response and Computer Forensics | Felix Freiling, University of Mannheim and
Bastian Schwittay, Symantec GmbH |
||
13:00 | Lunch | |||
14:00 | IT Incident Management and Structured Documentation | Sandra Frings, Fraunhofer Institut fuer Arbeitswirtschaft und Organisation (IAO) | ||
14:45 | Proposal Of A System For Computer-Based Case And Evidence Management |
Fritjof Haft, Pascal Hassenpflug, Hans Lecker ,Normfall GmbH |
||
15:30 | Break | |||
16:00 | Information-Sharing System for Vulnerability Information Dissemination in Large-Scale Organization | Tohru SATO, Jumpei Watase,
NTT Information Sharing Platform Laboratories |
||
16:45 | Conclusion | |||
17:00 | Meeting of GI SIG SIDAR (open for all interested attendees) | Detlef Günther | ||
17:30 | End of day 1 | |||
19:00 | Social event | |||
Wednesday,
12.
September
2007
|
||||
Time | Presentation | Speaker | ||
09:30 | Coffee | |||
10:00 | Greeting and Introduction | |||
10:15 | Invited Speaker IT based crime: Evidence Collection & Legal Restrictions in Investigation Cases |
Jens Gruhl, Oberstaatsanwalt, Staatsanwaltschaft Konstanz |
||
11:00 | A Case Study on Constructing a Security Event Management System |
Vijay Gurbani, Debra L.
Cook, Lawrence E. Menten, |
||
11:45 | Taxonomy of Anti-Computer Forensics Threats | Joseph Sremack, LECG | ||
12:30 | Lunch | |||
13:30 |
Testing Forensic Hash Tools onSparse Files |
Felix Freiling,
University of Mannheim, |
||
14:15 | Towards Reliable Rootkit Detection in Live Response |
Felix Freiling,
University of Mannheim, |
||
15:00 | Break | |||
15:30 | Key Note The Security Landscape in a Converged IP World |
Carlos C. Solari, VP Security
Solutions Group Bell Laboratories Alcatel-Lucent |
||
16:15 | Conclusion | |||
16:30 | End of day 2 | |||
Thursday,
13.
September
2007 - Workshop Day
|
||||
Time | Workstream 1 | Workstream 2 | ||
09:15 | Greeting and Introduction | |||
09:30 | Asset, and Vulnerability EvaluationSM" Christian Paulsen, DFN-CERT Services GmbH |
Steven Wood, Alste Technologies.GmbH |
||
11:00 | Break | |||
11:30 | Security architecture for systems providing end-to-end communications", Suhasini Sabnis, Alcatel-Lucent |
Andreas Schuster, Deutsche Telekom AG |
||
13:00 | Lunch | |||
14:00 | Ralf Moll, LKA Baden-Württemberg / Holger Morgenstern, IT-Service / Sachverständigenbüro Morgenstern |
|||
15:30 | End |