These noted security experts will discuss
current IT security issues and provide an insight into strategy
and security concepts during two conference days.
Following
the Money or - Why Security has so Little to do With Security
Bruce Schneier
The strangest thing about security is how little it has to do with
security. Why did firewalls succeed in the marketplace when e-mail
encryption failed? Why don't companies regularly install patches?
Why is software of such poor quality? The reasons have little to
do with security, and everything to do with the incentives of the
players involved. Economics, politics, laws, even social constraints
matter much more than security concerns. This talk attempts to peel
back the security talk and explain what really goes on when someone
makes a security decision. The results might surprise you.
Spies,
Lies and Audiotape
James Bamford
The United States and Britain are
engaged in a war based largely on phony intelligence. How could
this happen? Where were the checks and balances? What was real and
what was not? How much was the intelligence politicized? As the
United States fights its war on terrorism and looks to other possible
conflicts, such as in Iran and North Korea, it is critical that
intelligence not be misused and manipulated. But is this possible
with a White House determined to go to war?
Protecting
Databases
Aaron Newman
This presentation addresses some of the most overlooked topics on
database security and presents a view of the database from a hacker's
perspective. It also focuses on generic attacks as well as those
specific to Oracle, Microsoft SQL Server, Sybase, and DB2. We will
be performing some live attacks and discussing how to prevent this
from happening to you.
Honeypots:
The Latest Advances
Lance Spitzner
Over the past several years, honeypots have demonstrated their tremendous
potential as a new security technology. Not only do they have dramatic
detection capabilities, but can also be used for information gathering,
incident response, and targeting the insider threat. Lance Spitzner
will cover in this presentation the latest developments in honeypots,
and what to expect in the next 6 to 12 months.
Real-time
Network Awareness
Martin Rösch
One of the inherent issues with traditional intrusion detection
systems is that a fundamental lack of information leads to a great
deal of ambiguity sensors operate with virtually no knowledge
of the composition of the network components that they are defending.
Mr. Roesch will discuss the truth about implementing an intrusion
detection system and what problems usually occur, like evasion,
insertion & denial of service. He will illustrate his concept
of the “contextual vacuum” and how current systems are
flawed. Solutions are then offered by defining the parameters for
improving IDS with full understand of the network and that results
in higher quality data.
Advanced
Network Reconnaissance Techniques
Fyodor
Fyodor will present real-life examples of common network and firewall
configurations, then demonstrate practical techniques for exploring
and mapping those networks. He will cover IDS evasion, "phantom
ports", advanced ping sweeps, service/version detection, firewall
circumvention, DNS hackery, IPv6, and more using his free Nmap scanner
and many other Open Source tools.
Trusted
Computing - Threat to IT security and free competition?
Rüdiger Weis
With an investment of several hundred million euros, Microsoft and
the "Trusted Computing Group" are planning the most fundamental
changes to IT infrastructure since the introduction of the personal
computer.
A scientific analysis of these recommendations, however, reveals
no significant increase in security, particularly when seen against
the overall existing worm and virus epidemics, but a range of new
thread scenarios. In addition, there are now a number of justifiable
fears among European governments and industry representatives that
the control of cryptographic keys by U.S. companies and the extremely
confusing patent situation could lead to significant competitive
disadvantages particularly for small and medium companies.
How
is security created in business?
Dr. Rudolf Kreutzer
What is meant by security in a company?
How to enable "normal" security in a company?
How is security created in a data center?
Under what conditions is no security possible?
What really makes companies fail?
What makes companies successful?
How can you recognize signs of future failure?
How can failures be prevented?
What new crucial points are developing in risk management?
What are the most important key competencies for future risk managers?
Lawful
Interception of IP: The European Context
Jaya Baloo
Lawful Interception (LI) is currently in development internationally
and the area of IP interception poses significant regulatory, as
well as implementation, challenges. The presentation attempts to
elucidate major legal and technical issues as well as citing the
vendors, operators and governments involved in creating the standards
and solutions.
In the European context, all EU countries have been mandated to
have LI capabilities in place and be able to provide assistance
to other member states when tracking transborder criminals. Public
Communications Providers must tread warily between privacy concerns
and LI requirements. Especially with the new talks concerning Interpol,
Enfopol, & Data Retention, communication over public channels
is anything but private. The conditions for interception and the
framework for oversight are not widely known.
As LI in Europe presents an example for the rest of the world attention
should be given to the changing face of EU legislation. This is
relevant not only to the EU expansion but also concerns EU influence
over her eastern and western allies.
Alert,
Warning and Response
Volker Kozok
Regarding the changing situation of threat it becomes more and more
important to cooperate nationally and internationally in the defence
of attacks on critical information structures. In future clashes,
not only military aims will be threatened. Increasingly, infrastructures
of ministrys, offices, national organisations and the civil sector
will be under attack. Based on an initiative of NATO, 5 nations
have joined to drive forward the development of “Alert, Warning
and Response” processes together with civil partners.
The lecture shows the necessity of national and international cooperation
in the defence and analysis of attacks, the planning and coordination
of incident management and the continuing discussion on critical
infrastructure.
It closes with a summary of the central challenges and points out
the necessity of a standardized alarming system for both civil and
military sectors against networkbased attacks.
The
Relationships between Hackers and Spammers
John Draper
The talk will focus on the relationships between hackers and spammers
and how the two technology's are merging together to bring new and
troubling future threats to the internet.
The speaker will also be providing some interesting trends on how
spam is spread, how it correlates with the release of viruses in
the wild and how these viruses are now so flexible they can pass
any payload to un-suspecting systems without leaving a trace, setting
up spam proxies and other hacker friendly trojans.
top
|