[ISN] CfP: 11th Annual Computer Security Incident Handling Conference

From: mea culpa (jerichot_private)
Date: Tue Oct 06 1998 - 15:00:22 PDT

  • Next message: mea culpa: "[ISN] ISS Acquires March Information Systems"

    Forwarded From: punkis <crasht_private>
    
    **************************************************************
    *                                                            *
    *                  <<<<<  F I R S T  >>>>>                   *
    *                                                            *
    *        FORUM OF INCIDENT RESPONSE AND SECURITY TEAMS       *
    *                                                            *
    * 11th Annual Computer Security Incident Handling Conference *
    *                                                            *
    *                Brisbane(**) , Australia                    *
    *                                                            *
    *        Sunday June 13, 1999  -  Friday June 18, 1999       *
    *                                                            *
    **************************************************************
    
    
    
    C A L L   F O R   P A P E R S
    
    Submission Deadline:  November 1, 1998
    
    "Computer Security Incident Response in the 21st century -
    how will the Internet survive the growing security threat?"
    
    
    The Forum of Incident Response and Security Teams (FIRST) was formed in
    November 1990 to address the problem of an ever increasing number of
    computer and network security related incidents, affecting thousands of
    systems around the world. The Forum is made up of government, private and
    academic Computer Security Incident Response Teams (CSIRTs) from around
    the globe. Its primary goal is to coordinate the efforts of its members in
    order to increase both their individual and collective effectiveness. 
    
    The annual Incident Handling Conference is part of FIRST's ongoing
    educational program, which is aimed at increasing the general awareness of
    security issues and improving expertise when handling computer security
    incidents. 
    
    Until recently the Internet was mainly a technical toy for a minority of
    people in the Western countries. Security threats were awkward to deal
    with, but their consequences fairly modest. 
    
    This is changing dramatically and the turn of the millennium well marks
    this shift, or as some visionaries like to name it: revolution. 
    
    It is not just the technical wizards anymore. The Internet is used for
    literally all sorts of communication, ranging from love letters to
    transfer of medical, economical, military and political data. 
    
    It is not a toy anymore. The Internet serves a wide community of
    professionals, depending on it for their work. 
    
    It is not just for a minority anymore. The Internet is starting to be
    adopted by the whole of society, starting at the age of four. 
    
    It's not exclusive for the Western world anymore. The number of countries
    without any Internet connection is rapidly decreasing. People from
    cultures, religions, races and beliefs all over the world join the
    Internet to communicate. 
    
    In the 21st century an Internet meltdown might well cause Wall Street to
    crash. Internet attacks will be a critical danger to companies, hospitals,
    armies and governments - (inter)national risks even. 
    
    This increase in potential damage is not equaled by an increase in network
    and system security. On the contrary, due to an ever increasing complexity
    of software and a burst in the number of applications and
    interconnections, the state of security is worse than ever before. 
    
    Is the Computer Security Incident Response (CSIR) community reacting to
    this threat and adapting to the situation - or is its existence tied to
    the nineties and is it unable to adapt? 
    
    The conference does not aim at providing a fixed answer to this question -
    what it sets out to achieve is to outline the way the CSIR community is
    adapting itself to the 3rd millennium, in order to remain able to help
    contain the security risk. 
    
    
    Who should attend and why?
    __________________________
    
    All those responsible for any aspect of computer security management
    will benefit from attending this conference. This includes both members
    and non-members of FIRST, law enforcement officials, computer security
    incident response teams, as well as consultants, contractors, vendors
    and individuals involved in the use, maintenance or planning of
    computer systems.
    
    The FIRST Conference is a unique opportunity for those involved in
    computer security to get together and discuss all aspects of the
    subject. The conference will provide the opportunity to listen to
    experts in the fields of computer security incident response and
    vulnerability analysis. They will share their valuable expertise by
    speaking about their experience in dealing successfully with the
    coordination of incidents traversing international boundaries,
    highlighting particular problems where appropriate. There will also be
    the opportunity to hear how other organizations have addressed some
    popular problems related to building protection infrastructures such as
    security policies, firewalls, net wide antivirus or intrusion detection
    systems etcetera. The emphasis of the conference is on practice and
    experience as opposed to experiment and prototype.
    
    There is no other conference dedicated to these topics in the world.
    
    
    CALL FOR PAPERS:
    ________________
    
    The above is not going to happen without experts sharing their
    thoughts, ideas and lessons learned.
    
    You are therefore much encouraged to react to this call and provide the
    outline of a paper or tutorial, or propose a workshop.
    
    You don't have to be sure or even aware of all details now: in the
    first stage, only an abstract is required.
    
    
    Important dates:
    ________________
    
    Abstract/proposals/biographies due:   November  1, 1998
    Authors notified:                     December 15, 1998
    Full materials for proceedings due:   February 15, 1999
    
    
    Format of the conference:
    _________________________
    
    The first day is allocated for parallel tutorial style presentations.
    The remaining four days will consist of conference paper and conference
    style presentations, as well as FIRST business sessions. One evening is
    allocated for participants to hold events devoted to subjects of
    particular interest ("birds of a feather" sessions).
    
    All events will be selected to further the objectives of FIRST and its
    members. Contributions should follow the following guidelines:
    
    Tutorials:      Half or full day tutorial proposals will be considered.
    
    Papers:         Written papers may be as long as desired, but
                    presentations must be limited to 30 minutes.
    
    Workshop:       These informal sessions should either follow a more
                    "hands-on" approach or provide for a high degree of
                    audience participation. They should be tailored to
                    address specific issues and should be from 60 to 90
                    minutes in duration. Panel sessions on a particular
                    topic are acceptable.
    
    
    Example topics:
    _______________
    
    The Program committee is looking for papers/tutorials/workshops
    describing real experiences as well as original works on topics as (in
    random order; other topics may be proposed):
    
    * security policy writing
    * international legal issues
    * liability issues
    * competition, espionage
    * risk analysis
    * legal and administrative issues in incident handling
    * vulnerability analysis and advisory process
    * coordinating international incidents
    * building perimeter defense infrastructure
    * building security infrastructures against internal attacks
    * Windows NT security
    * incident handling in a truly global Internet society
    * experiences with commercial tools such as firewalls, IDS, scanners
    * how to protect an incident response team site
    * experiences with secure operating systems
    * interviewing/hiring incident response team staff
    * experiences with virus/antivirus
    * programming securely
    * experience with authentication systems
    * intrusion detection, response and analysis
    * experience with Public Key infrastructures
    * secure network administration
    * Java/ActiveX security
    * proactive tools
    * statistics and workflowmanagement tools
    * the changing nature of the "hack"
    * Internet service providers and security
    * vendor session
    * collecting evidence
    * Y2K issues
    * team or service certification
    
    
    Submission information:
    _______________________
    
    Submissions should include an abstract, proposed length and single page
    of notes describing the content and style of the presentation. Special
    audio/visual requirements (other than one microphone and one overhead
    projector) should be described. Panel session proposals should include
    a list of panelists who have agreed to participate, including at least
    their names, e-mail addresses and affiliation. Submissions should
    be sent to the contact address given at the end of this document. The
    preferred submission mechanism is via electronic mail in ASCII, HTML
    or PostScript formats. Submissions via Facsimile transmission or the
    postal service will, however, be accepted. Submissions must be received
    November 1, 1998. Submissions received after this date may
    not be considered for inclusion in the program.
    
    Please use the appended form for your submissions.
    
    Authors will be notified around December 15, 1998 of the status of
    their presentation (accepted/stand-by/rejected). The final version of
    the material used for the presentation (overheads, papers, slides) must
    be delivered to the organizers before February 15, 1999 for inclusion
    in the proceedings.
    
    
    E-mail:
    _______
    
    Please use the e-mail address  first-pc99t_private  for submissions
    or questions regarding this Call for Papers.
    
    
    WWW:
    ____
    
    The Conference WWW page is accessible from the FIRST webserver:
    
            http://www.first.org/conference/1999/
    
    
    Program Committee:
    __________________
    
     Wolfgang Ley                DFN-CERT
     Sandy Sparks                CIAC
     Wietse Venema
     Sharon Sandstrom            GEIS
     Jed Pickel                  CERT/CC
     Mats Skoogsberg             TELIA
     Ruben Martinez              CERT REDIRIS
     Peter Bivesand              Linkopings Universitet
     Troy Bollinger              IBM
     Fran Nielsen                NIST
     Walter Belgers              Origin
     Hironobu Suzuki
     Danny Smith                 SUN Microsystems
     Klaus-Peter Kossakowski     SECUNET
     Danilo Bruschi (vice chair) CERT-IT
     Don Stikvoort (chair)       M&I/STELVIO
    
    
    (**) Planned conference location:
         ____________________________
    
    Brisbane, Australia,
    
    in the process of formalizing contracts.
    
    
    Dates:
    ______
    
    All dates below A.D. 1999 :
    
    Sunday June 13      - registration and welcome reception;
    Monday June 14      - tutorials (parallel streams);
    Tuesday June 15 to
    Friday June 18      - conference.
    
    
    Planned conference host:
    ________________________
    
    The University of Queensland, Brisbane, Australia,
    
    in the process of formalizing contracts.
    
    
    The conference is sponsored by  First.Org Inc.
    
    
    Contact information:
    ____________________
    
    E-mail:                 first-pc99t_private
    
    Postal Address:         Attn: FIRST 1999 PC
                                  P/a M&I/STELVIO
                                  P.O. Box 1179
                                  NL - 3818 NN Amersfoort
                                  The Netherlands
    
    Facsimile:              +31 334 220 341
                            subject: FIRST 1999 PC
    
    
    =======================================================================
    
    
    ABSTRACT / PROPOSAL  SUBMISSION SHEET
    
    FIRST 1999
    
    
     Name    __________________________________________________________
    
     Address __________________________________________________________
             __________________________________________________________
             __________________________________________________________
    
     Phone   ____________________           Fax _______________________
    
     E-mail  ____________________           URL _______________________
    
     Title of Presentation ____________________________________________
    
     Presentation Type ( please tick one )
            ( ) Paper               ( ) Half-day Tutorial
            ( ) Workshop            ( ) Full-day Tutorial
            ( ) Panel
    
     Presentation Length (in minutes, excluding breaks)  ______
    
     Presentation media requirements
     (other than one overhead projector and a microphone) :
     _____________________________________________________________________
     _____________________________________________________________________
     _____________________________________________________________________
     _____________________________________________________________________
     _____________________________________________________________________
    
    
     Abstract (75-100 words) :                                         (*)
     _____________________________________________________________________
     _____________________________________________________________________
     _____________________________________________________________________
     _____________________________________________________________________
     _____________________________________________________________________
     _____________________________________________________________________
     _____________________________________________________________________
     _____________________________________________________________________
     _____________________________________________________________________
     _____________________________________________________________________
     _____________________________________________________________________
     _____________________________________________________________________
     _____________________________________________________________________
     _____________________________________________________________________
     _____________________________________________________________________
     _____________________________________________________________________
     _____________________________________________________________________
     _____________________________________________________________________
     _____________________________________________________________________
     _____________________________________________________________________
     _____________________________________________________________________
     _____________________________________________________________________
     _____________________________________________________________________
    
    
     FIRST is granted a non exclusive right to copy and redistribute
     conference material including the submissions of the author(s). This
     includes potential distribution on a conference CD and/or the FIRST
     website.
    
     Brief biography (50-75 words) - for each author/panelist :        (*)
     _____________________________________________________________________
     _____________________________________________________________________
     _____________________________________________________________________
     _____________________________________________________________________
     _____________________________________________________________________
     _____________________________________________________________________
     _____________________________________________________________________
     _____________________________________________________________________
     _____________________________________________________________________
     _____________________________________________________________________
    
    
     (*) If accepted abstract and biography/biographies will be
         included in the conference proceedings.
    
    
    =======================================================================
    =======================================================================
    
    
    -----BEGIN PGP SIGNATURE-----
    Version: PGP for Business Security 5.5
    
    iQEKAwUBNhk07yvALmDvU5ZvAQEXbgeoioriczHFvsuUNTXUevjAC12r6f1CMoiS
    +XZxTOa5iaOuvFvk7Y1WQeQPup96UTPOEr+jYjxcBPpsjEnxCocYmzHRr8vmn2i4
    //1ZdxMTEFRoy5N7CCRoHhe/lwGL5Jl2AXUxieDEbwOiZwpKUzZg4/1EhLwjGyEJ
    VNxUmHZ6Pg/TLAWneOlhSz8hBXkw3tmaGAv9mQW53a8DdiyFJjyIiTSzTrjeQglx
    xgvty4fpvflCE+kK2UxlkoUDeh8K0qXgHL0BXr7TN48j98D9OyOa7dR+e949m/ZZ
    q1NN8oWtBFcEee33KP3V1EuFD4wNulKa467Rp0o=
    =6x8D
    -----END PGP SIGNATURE-----
    -- 
    Ir. W.H.B. Belgers, Firewall/Directory Specialist     phone: +31 40 2782753
    Origin TIS-INS, Building VN-504   E-mail: Walter.Belgerst_private
    P.O. Box 218, 5600 MD Eindhoven, Netherlands            fax: +31 40 2784697
    non-business e-mail waltert_private website http://www.iae.nl/users/gigawalt
    
    
    -o-
    Subscribe: mail majordomot_private with "subscribe isn".
    Today's ISN Sponsor: Repent Security Incorporated [www.repsec.com]
    



    This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 13:06:38 PDT