Introduction
Agenda
Registration
Fees
Venue
Sponsorship
Demonstrations
Contacts
Directory Plugfest

Previous conferences
Our home page
Plenary Day 1 - Monday 3rd February

Boundaryless Information Flow: Keeping IT Secure

An International Perspective on Securing Information Flow

Key government security speakers from the United States, Japan and the European Community address the evolving policies and issues in information security

9:05–9:35

Andy Purdy, Deputy to the Vice Chair, Senior Advisor, IT Security and Privacy, The President's Critical Infrastructure Protection Board.

9:35 –10:00

Japanese Information Security Status – Environment and Policies
Kei Harada, Senior Researcher, IT Security Center, Information-technology Promotion Agency (IPA is an affiliated organization to the Japanese Ministry of Economy, Trade and Industry)

10:00–10:30

Trust and security in the Ambient Intelligence space
Andrea Servida
, Head of Sector, European Commission, DG INFSO C4.

10:30 - 11:00

Break

Industry Strategies for Securing Boundaryless Information

A group of key figures from IT and security industry consortia address the issue of securing the flow of information in the boundaryless enterprise. They outline the consortia strategies for implementing policies, procedures and standards that will assist industry or government bodies in achieving a secure information environment

11:00 - 11:15

Managing Your E-mail from Over-flowing the Floodgates
Pat Gilmore, Treasurer, International Information Systems Security Certification Consortium (ISC2)

11:15 - 11:30

Charles Le Grand, Assistant Vice President, Technology Practices, The Institute of Internal Auditors

11:30 - 11: 45

Dr Bill Hancock, Chairman ISA

11: 45 - 12:00

Laura Lundin, Senior Director, BITS

12:00 - 12:15

Candy Alexander
,VP of International Relations, ISSA
12:15 - 12:30

Deb Frazer (from NOI Group/APL Limited), ISACA

12:30 - 1:00

Q&A Consortia Panel Session

1:00 – 2:00

Lunch

Workshop

A workshop staging detection of an Intrusion Attack on a corporate IT system, the corporation’s responses to the attack, and the potential consequences of those responses.

2:00 – 3:45

Saving Private Data – Act 1

Written, Directed and Produced by: Bob Blakley: Chief Scientist for Security and Privacy at IBM Tivoli Software, and Jane Hill: Barrister, Chambers of Benet Hytner Q.C. London.

Act1 simulates intrusion into the corporation’s information system and the corporation’s response procedures, focusing particularly on actions to restore system operation, to prevent damage to company assets, and to collect evidence for possible prosecution (or other court proceedings).

3:45 - 4:15

Break

Cybersecurity on the Front Line

DCS Len Hynds, and Dr. Bill Hancock, present sessions from the cybersecurity front line. Dr. Bill shares his experience of dealing with 200-400 attacks a month on half a million online systems, and DCS Len Hynds warns of the growing international threat posed by IT organized crime.

4:15 - 4:45

Detective Chief Superintendent Len Hynds, Head of National Hi-Tech Crime Unit, England and Wales. [Synopsis]

4:45 - 5:15

Dr. Bill Hancock, CISSP, Vice President Security and Chief Security Officer, Cable & Wireless.
[Synopsis]

Plenary Day 2 - Tuesday 4th February

Boundaryless Information Flow: Keeping IT Secure

Securing Information Flow on Critical Networks

8:30–9:00

Boundaryless Information Flow: Creating the Framework
A progress statement and call for action.
Terry Blevins
, The Open Group, and Elliot Solomon

9.00 - 9:30
Cyber Risk Management and National Strategy to Secure Cyberspace
Emily Q. Freeman
, ARM, AU, Vice President-Western Region & Executive Director of Consulting, AIG eBusiness Risk Solutions
9:30 - 10 - 15
Secure Internet Communications, and Why Yours Probably are Not
Bill Cheswick, Chief Scientist, LUMETA Corporation
10:15-10:45

Break

Workshop

A workshop staging detection of an Intrusion Attack on a corporate IT system, the corporation’s responses to the attack, and the potential consequences of those responses.

10:45–12:45

Saving Private Data – Act 2

Act 2 - The issues raised include reluctance of organisations to report losses or bring claims for fear of damage to their reputation; their duty/ liability to customers, business partners etc.; the effects of bringing proceedings (or defending claims) – evidential issues relating to discovery/ disclosure etc.; defining and quantifying loss; the role of security policies/audits etc.; and the role of insurance.

12:45 – 2:00

Lunch


Home · Contacts · Legal · Copyright · Members · News
© The Open Group 1995-2012  Updated on Monday, 3 February 2003