International Conference on
|
Tuesday, 11.
September
2007
|
||||
Time | Presentation | Speaker | ||
10:45 | Registration/Coffee | |||
11:15 | Greeting and Introduction | |||
11:30 | Key Note About the Role of IT Security in The Information Society |
![]() |
Klaus Brunnstein, IFIP President | |
12:15 | A Common Process Model for Incident Response and Computer Forensics | ![]() |
Felix Freiling, University of Mannheim and
Bastian Schwittay, Symantec GmbH |
|
13:00 | Lunch | |||
14:00 | IT Incident Management and Structured Documentation | ![]() |
Sandra Frings, Fraunhofer Institut fuer Arbeitswirtschaft und Organisation (IAO) | |
14:45 | Proposal Of A System For Computer-Based Case And Evidence Management |
Fritjof Haft, Pascal Hassenpflug, Hans Lecker ,Normfall GmbH |
||
15:30 | Break | |||
16:00 | Information-Sharing System for Vulnerability Information Dissemination in Large-Scale Organization | ![]() |
Tohru SATO, Jumpei Watase,
NTT Information Sharing Platform Laboratories |
|
16:45 | Conclusion | |||
17:00 | Meeting of GI SIG SIDAR (open for all interested attendees) | Detlef Günther | ||
17:30 | End of day 1 | |||
19:00 | Social event | |||
Wednesday,
12.
September
2007
|
||||
Time | Presentation | Speaker | ||
09:30 | Coffee | |||
10:00 | Greeting and Introduction | |||
10:15 | Invited Speaker IT based crime: Evidence Collection & Legal Restrictions in Investigation Cases |
![]() |
Jens Gruhl, Oberstaatsanwalt, Staatsanwaltschaft Konstanz |
|
11:00 | A Case Study on Constructing a Security Event Management System | ![]() |
Vijay Gurbani, Debra L.
Cook, Lawrence E. Menten, |
|
11:45 | Taxonomy of Anti-Computer Forensics Threats | ![]() |
Joseph Sremack, LECG | |
12:30 | Lunch | |||
13:30 |
Testing Forensic Hash Tools onSparse Files |
![]() |
Felix Freiling,
University of Mannheim, |
|
14:15 | Towards Reliable Rootkit Detection in Live Response | ![]() |
Felix Freiling,
University of Mannheim, |
|
15:00 | Break | |||
15:30 | Key Note The Security Landscape in a Converged IP World |
![]() |
Carlos C. Solari, VP Security
Solutions Group Bell Laboratories Alcatel-Lucent |
|
16:15 | Conclusion | |||
16:30 | End of day 2 | |||
Thursday,
13.
September
2007 - Workshop Day
|
||||
Time | Workstream 1 | Workstream 2 | ||
09:15 | Greeting and Introduction | |||
09:30 | ![]() Asset, and Vulnerability EvaluationSM" Christian Paulsen, DFN-CERT Services GmbH |
![]() Steven Wood, Alste Technologies.GmbH |
||
11:00 | Break | |||
11:30 | ![]() Security architecture for systems providing end-to-end communications", Suhasini Sabnis, Alcatel-Lucent |
![]() Andreas Schuster, Deutsche Telekom AG |
||
13:00 | Lunch | |||
14:00 | ![]() Ralf Moll, LKA Baden-Württemberg / Holger Morgenstern, IT-Service / Sachverständigenbüro Morgenstern |
|||
15:30 | End |