Forwarded From: punkis <crasht_private> ************************************************************** * * * <<<<< F I R S T >>>>> * * * * FORUM OF INCIDENT RESPONSE AND SECURITY TEAMS * * * * 11th Annual Computer Security Incident Handling Conference * * * * Brisbane(**) , Australia * * * * Sunday June 13, 1999 - Friday June 18, 1999 * * * ************************************************************** C A L L F O R P A P E R S Submission Deadline: November 1, 1998 "Computer Security Incident Response in the 21st century - how will the Internet survive the growing security threat?" The Forum of Incident Response and Security Teams (FIRST) was formed in November 1990 to address the problem of an ever increasing number of computer and network security related incidents, affecting thousands of systems around the world. The Forum is made up of government, private and academic Computer Security Incident Response Teams (CSIRTs) from around the globe. Its primary goal is to coordinate the efforts of its members in order to increase both their individual and collective effectiveness. The annual Incident Handling Conference is part of FIRST's ongoing educational program, which is aimed at increasing the general awareness of security issues and improving expertise when handling computer security incidents. Until recently the Internet was mainly a technical toy for a minority of people in the Western countries. Security threats were awkward to deal with, but their consequences fairly modest. This is changing dramatically and the turn of the millennium well marks this shift, or as some visionaries like to name it: revolution. It is not just the technical wizards anymore. The Internet is used for literally all sorts of communication, ranging from love letters to transfer of medical, economical, military and political data. It is not a toy anymore. The Internet serves a wide community of professionals, depending on it for their work. It is not just for a minority anymore. The Internet is starting to be adopted by the whole of society, starting at the age of four. It's not exclusive for the Western world anymore. The number of countries without any Internet connection is rapidly decreasing. People from cultures, religions, races and beliefs all over the world join the Internet to communicate. In the 21st century an Internet meltdown might well cause Wall Street to crash. Internet attacks will be a critical danger to companies, hospitals, armies and governments - (inter)national risks even. This increase in potential damage is not equaled by an increase in network and system security. On the contrary, due to an ever increasing complexity of software and a burst in the number of applications and interconnections, the state of security is worse than ever before. Is the Computer Security Incident Response (CSIR) community reacting to this threat and adapting to the situation - or is its existence tied to the nineties and is it unable to adapt? The conference does not aim at providing a fixed answer to this question - what it sets out to achieve is to outline the way the CSIR community is adapting itself to the 3rd millennium, in order to remain able to help contain the security risk. Who should attend and why? __________________________ All those responsible for any aspect of computer security management will benefit from attending this conference. This includes both members and non-members of FIRST, law enforcement officials, computer security incident response teams, as well as consultants, contractors, vendors and individuals involved in the use, maintenance or planning of computer systems. The FIRST Conference is a unique opportunity for those involved in computer security to get together and discuss all aspects of the subject. The conference will provide the opportunity to listen to experts in the fields of computer security incident response and vulnerability analysis. They will share their valuable expertise by speaking about their experience in dealing successfully with the coordination of incidents traversing international boundaries, highlighting particular problems where appropriate. There will also be the opportunity to hear how other organizations have addressed some popular problems related to building protection infrastructures such as security policies, firewalls, net wide antivirus or intrusion detection systems etcetera. The emphasis of the conference is on practice and experience as opposed to experiment and prototype. There is no other conference dedicated to these topics in the world. CALL FOR PAPERS: ________________ The above is not going to happen without experts sharing their thoughts, ideas and lessons learned. You are therefore much encouraged to react to this call and provide the outline of a paper or tutorial, or propose a workshop. You don't have to be sure or even aware of all details now: in the first stage, only an abstract is required. Important dates: ________________ Abstract/proposals/biographies due: November 1, 1998 Authors notified: December 15, 1998 Full materials for proceedings due: February 15, 1999 Format of the conference: _________________________ The first day is allocated for parallel tutorial style presentations. The remaining four days will consist of conference paper and conference style presentations, as well as FIRST business sessions. One evening is allocated for participants to hold events devoted to subjects of particular interest ("birds of a feather" sessions). All events will be selected to further the objectives of FIRST and its members. Contributions should follow the following guidelines: Tutorials: Half or full day tutorial proposals will be considered. Papers: Written papers may be as long as desired, but presentations must be limited to 30 minutes. Workshop: These informal sessions should either follow a more "hands-on" approach or provide for a high degree of audience participation. They should be tailored to address specific issues and should be from 60 to 90 minutes in duration. Panel sessions on a particular topic are acceptable. Example topics: _______________ The Program committee is looking for papers/tutorials/workshops describing real experiences as well as original works on topics as (in random order; other topics may be proposed): * security policy writing * international legal issues * liability issues * competition, espionage * risk analysis * legal and administrative issues in incident handling * vulnerability analysis and advisory process * coordinating international incidents * building perimeter defense infrastructure * building security infrastructures against internal attacks * Windows NT security * incident handling in a truly global Internet society * experiences with commercial tools such as firewalls, IDS, scanners * how to protect an incident response team site * experiences with secure operating systems * interviewing/hiring incident response team staff * experiences with virus/antivirus * programming securely * experience with authentication systems * intrusion detection, response and analysis * experience with Public Key infrastructures * secure network administration * Java/ActiveX security * proactive tools * statistics and workflowmanagement tools * the changing nature of the "hack" * Internet service providers and security * vendor session * collecting evidence * Y2K issues * team or service certification Submission information: _______________________ Submissions should include an abstract, proposed length and single page of notes describing the content and style of the presentation. Special audio/visual requirements (other than one microphone and one overhead projector) should be described. Panel session proposals should include a list of panelists who have agreed to participate, including at least their names, e-mail addresses and affiliation. Submissions should be sent to the contact address given at the end of this document. The preferred submission mechanism is via electronic mail in ASCII, HTML or PostScript formats. Submissions via Facsimile transmission or the postal service will, however, be accepted. Submissions must be received November 1, 1998. Submissions received after this date may not be considered for inclusion in the program. Please use the appended form for your submissions. Authors will be notified around December 15, 1998 of the status of their presentation (accepted/stand-by/rejected). The final version of the material used for the presentation (overheads, papers, slides) must be delivered to the organizers before February 15, 1999 for inclusion in the proceedings. E-mail: _______ Please use the e-mail address first-pc99t_private for submissions or questions regarding this Call for Papers. WWW: ____ The Conference WWW page is accessible from the FIRST webserver: http://www.first.org/conference/1999/ Program Committee: __________________ Wolfgang Ley DFN-CERT Sandy Sparks CIAC Wietse Venema Sharon Sandstrom GEIS Jed Pickel CERT/CC Mats Skoogsberg TELIA Ruben Martinez CERT REDIRIS Peter Bivesand Linkopings Universitet Troy Bollinger IBM Fran Nielsen NIST Walter Belgers Origin Hironobu Suzuki Danny Smith SUN Microsystems Klaus-Peter Kossakowski SECUNET Danilo Bruschi (vice chair) CERT-IT Don Stikvoort (chair) M&I/STELVIO (**) Planned conference location: ____________________________ Brisbane, Australia, in the process of formalizing contracts. Dates: ______ All dates below A.D. 1999 : Sunday June 13 - registration and welcome reception; Monday June 14 - tutorials (parallel streams); Tuesday June 15 to Friday June 18 - conference. Planned conference host: ________________________ The University of Queensland, Brisbane, Australia, in the process of formalizing contracts. The conference is sponsored by First.Org Inc. Contact information: ____________________ E-mail: first-pc99t_private Postal Address: Attn: FIRST 1999 PC P/a M&I/STELVIO P.O. Box 1179 NL - 3818 NN Amersfoort The Netherlands Facsimile: +31 334 220 341 subject: FIRST 1999 PC ======================================================================= ABSTRACT / PROPOSAL SUBMISSION SHEET FIRST 1999 Name __________________________________________________________ Address __________________________________________________________ __________________________________________________________ __________________________________________________________ Phone ____________________ Fax _______________________ E-mail ____________________ URL _______________________ Title of Presentation ____________________________________________ Presentation Type ( please tick one ) ( ) Paper ( ) Half-day Tutorial ( ) Workshop ( ) Full-day Tutorial ( ) Panel Presentation Length (in minutes, excluding breaks) ______ Presentation media requirements (other than one overhead projector and a microphone) : _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ Abstract (75-100 words) : (*) _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ FIRST is granted a non exclusive right to copy and redistribute conference material including the submissions of the author(s). This includes potential distribution on a conference CD and/or the FIRST website. Brief biography (50-75 words) - for each author/panelist : (*) _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ (*) If accepted abstract and biography/biographies will be included in the conference proceedings. ======================================================================= ======================================================================= -----BEGIN PGP SIGNATURE----- Version: PGP for Business Security 5.5 iQEKAwUBNhk07yvALmDvU5ZvAQEXbgeoioriczHFvsuUNTXUevjAC12r6f1CMoiS +XZxTOa5iaOuvFvk7Y1WQeQPup96UTPOEr+jYjxcBPpsjEnxCocYmzHRr8vmn2i4 //1ZdxMTEFRoy5N7CCRoHhe/lwGL5Jl2AXUxieDEbwOiZwpKUzZg4/1EhLwjGyEJ VNxUmHZ6Pg/TLAWneOlhSz8hBXkw3tmaGAv9mQW53a8DdiyFJjyIiTSzTrjeQglx xgvty4fpvflCE+kK2UxlkoUDeh8K0qXgHL0BXr7TN48j98D9OyOa7dR+e949m/ZZ q1NN8oWtBFcEee33KP3V1EuFD4wNulKa467Rp0o= =6x8D -----END PGP SIGNATURE----- -- Ir. W.H.B. Belgers, Firewall/Directory Specialist phone: +31 40 2782753 Origin TIS-INS, Building VN-504 E-mail: Walter.Belgerst_private P.O. Box 218, 5600 MD Eindhoven, Netherlands fax: +31 40 2784697 non-business e-mail waltert_private website http://www.iae.nl/users/gigawalt -o- Subscribe: mail majordomot_private with "subscribe isn". Today's ISN Sponsor: Repent Security Incorporated [www.repsec.com]
This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 13:06:38 PDT