|
Plenary
Day 1 - Monday 3rd February
Boundaryless Information Flow: Keeping IT Secure
|
An International
Perspective on Securing Information Flow
Key government security speakers from the United States,
Japan and the European Community address the evolving policies and
issues in information security |
9:05–9:35 |
Andy Purdy,
Deputy to the Vice Chair, Senior Advisor, IT Security and Privacy,
The President's Critical Infrastructure Protection Board. |
9:35 –10:00 |
Japanese
Information Security Status – Environment and Policies
Kei Harada, Senior Researcher,
IT Security Center, Information-technology Promotion Agency (IPA
is an affiliated organization to the Japanese Ministry of Economy,
Trade and Industry) |
10:00–10:30 |
Trust and security
in the Ambient Intelligence space
Andrea Servida, Head of Sector, European
Commission, DG INFSO C4. |
10:30 - 11:00 |
Break |
Industry Strategies for Securing Boundaryless
Information
A group of key figures from IT and security industry
consortia address the issue of securing the flow of information
in the boundaryless enterprise. They outline the consortia strategies
for implementing policies, procedures and standards that will assist
industry or government bodies in achieving a secure information
environment |
11:00 - 11:15 |
Managing
Your E-mail from Over-flowing the Floodgates
Pat Gilmore, Treasurer,
International Information Systems Security Certification Consortium
(ISC2) |
11:15 - 11:30 |
Charles Le Grand,
Assistant Vice President, Technology Practices, The Institute of
Internal Auditors |
11:30 - 11: 45 |
Dr
Bill Hancock, Chairman ISA |
11: 45 - 12:00 |
Laura Lundin, Senior Director,
BITS |
12:00 - 12:15 |
Candy Alexander,VP of International Relations, ISSA |
12:15 - 12:30 |
Deb Frazer
(from NOI Group/APL Limited), ISACA |
12:30 - 1:00 |
Q&A Consortia Panel Session |
1:00 – 2:00 |
Lunch |
Workshop
A workshop staging
detection of an Intrusion Attack on a corporate IT system, the
corporation’s responses to the attack, and the potential consequences
of those responses.
|
2:00 – 3:45 |
Written, Directed and Produced
by: Bob Blakley: Chief Scientist for Security and
Privacy at IBM Tivoli Software, and Jane Hill:
Barrister, Chambers of Benet Hytner Q.C. London.
Act1 simulates intrusion into the corporation’s information system
and the corporation’s response procedures, focusing particularly
on actions to restore system operation, to prevent damage to company
assets, and to collect evidence for possible prosecution (or other
court proceedings). |
3:45 - 4:15 |
Break |
Cybersecurity on the Front Line
DCS Len Hynds, and Dr. Bill Hancock, present sessions
from the cybersecurity front line. Dr. Bill shares his experience
of dealing with 200-400 attacks a month on half a million online
systems, and DCS Len Hynds warns of the growing international threat
posed by IT organized crime. |
4:15 - 4:45 |
Detective Chief Superintendent
Len Hynds, Head of National Hi-Tech Crime Unit, England
and Wales. [Synopsis]
|
4:45 - 5:15 |
Dr.
Bill Hancock, CISSP, Vice President Security and Chief
Security Officer, Cable & Wireless.
[Synopsis]
|
Plenary
Day 2 - Tuesday 4th February
Boundaryless Information Flow: Keeping IT Secure |
Securing Information Flow on Critical Networks
|
8:30–9:00 |
Boundaryless Information Flow:
Creating the Framework
A progress statement and call for action.
Terry Blevins, The Open Group, and Elliot Solomon
|
9.00 - 9:30 |
Cyber Risk Management
and National Strategy to Secure Cyberspace
Emily Q. Freeman, ARM, AU, Vice President-Western Region
& Executive Director of Consulting, AIG eBusiness Risk Solutions
|
9:30 - 10 - 15 |
Secure Internet
Communications, and Why Yours Probably are Not
Bill Cheswick, Chief Scientist,
LUMETA Corporation |
10:15-10:45 |
Break |
Workshop
A workshop staging detection of an Intrusion Attack
on a corporate IT system, the corporation’s responses to the attack,
and the potential consequences of those responses.
|
10:45–12:45 |
Act 2 - The issues raised include reluctance of organisations to
report losses or bring claims for fear of damage to their reputation;
their duty/ liability to customers, business partners etc.; the
effects of bringing proceedings (or defending claims) – evidential
issues relating to discovery/ disclosure etc.; defining and quantifying
loss; the role of security policies/audits etc.; and the role of
insurance. |
12:45 – 2:00 |
Lunch |
|