[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

DATANET SECURITY 97 PROGRAM




Conference program Datanet Security 1997
Annual International Conference and Exhibition on Wide Area Network Securit=
y

FEBRUARY 17 - 18 - 19 - 20, 1997
HYATT REGENCY MIAMI
HOTEL & CONVENTION CENTER

All lectures and presentations have been confirmed

Keynote speakers:   Monday  February 17, 1997
The 1997 Datanet Security conference will be opened with a keynote address
by Dr. Ruth A. David, Deputy Director Science & Technology of the Central
Intelligence Agency.
=20
Following the opening address, Mr. Stuart A. Baker will deliver a keynote
speech "Legal Aspects of Network Security".  Stuart Baker is partner with
Steptoe & Johnson in Washington DC, and former lead counsel for the
National Security Agency.

Keynote speakers: Tuesday February 18, 1997
The second day of the Annual Datanet Security Conference is highlighted
with a presentation by Dr. Rob Kolstad "Non-Security Issues Affecting the
Future of the Internet". Rob Kolstad is President of BSDI Inc.

"What's Slowing down Deployment of Security ?" is the title of the next
keynote address by Novell's Chief Security Architect, Dr. Radia Perlman.
She was featured in the 20th anniversary edition of Data Communications
magazine as one of 20 most influential people in the field of computer
networking.=20

Keynote speaker:  Wednesday February 19, 1997
This conference day we feature Mr. Scott Charney as a prominent keynote
speaker.  Scott Charney is the principal government authority on computer
crime. He heads the federal prosecutors and leads the Computer Crime and
Intellectual Properties Section within the Department of  Justice.=20


ADVANCED TECHNOLOGY PROGRAM
Monday February 17, 1997

ELECTRONIC INTELLIGENCE
"Intelligence Behind the Journal Intelligence"  - Olivier Schmidt
Olivier Schmidt is founding editor of several important international
professional news journals and expert
publications. Among these "Parapolitics", "Intelligence Newsletter" and
"Intelligence". He co-authored
"Intelligences Secretes" and "OSS et la Resistance Francaise". He lives and
works in Paris, France.

"The King of Secret Readers: Edgar Allen Poe, William Friedman, and the
Logic of the Cold War" -
Professor Shawn Rosenheim
Shawn J. Rosenheim is Associate Professor of English at Williams College
(Williamstown, Mass.), and a founding  member of the Communications
Technologies Research Group. His most recent publication is "The
Cryptographic Imagination: Secret Writing from Edgar Poe to the Internet"
(Johns Hopkins University Press, 1996)

DISCUSSION PANEL
Traditional versus New Technologies: A Challenge for the Intelligence
Communities
Session and Panel Chairman - David Whipple
David Whipple is Executive Director of the Association of Former
Intelligence Officers, AFIO. As no other Mr. Whipple is able to illustrate
the traditional methods of information gathering.=20

INTERNET SECURITY
The Changing Role of the Firewall - Stephen Flaig
Mr. Flaig is Vice President for LanOptics Inc., developers of the Guardian
firewall.

Network Access Flexibility through RADIUS - David Dawson
David Dawson is General Manager Network Security Business Unit for Ascend
Communications Inc.
Previously he was Chief Executive Officer of Morningstar Technologies Inc.
He holds a BS in Electrical
Engineering from the US Military Academy at West Point.

Internet Security and the IBM Firewall - Peter Crotty
Peter Crotty is worldwide responsible for IBM's technical firewall support
program.

Secure Access: If you don't have security everywhere, you don't have it
anywhere ! - Doug LaBorde
Mr. LaBorde is Manager with the Network Security Business Unit of Ascend
Communications.

NT SECURITY
Windows NT Security: Networked Perspectives - Charles Rutstein
Charles Rutstein is Principal Consultant with Price Waterhouse, and has
extensive front line computer and
network security experience. He authored several books on computer viruses.
His latest work, dealing with
Windows NT security, has just been released.

NT Internet Security - Firewalls, Web-servers, and Vulnerabilities - Bill
Stout
Bill Stout is network security analyst and senior systems administrator
with Hitachi Data Systems. He
specializes in Windows NT security issues.

VIRUSES
Viruses and the Internet; email, Java, Active-X; the new virus carriers -
Thierry Giron
Thierry Giron holds a Computer Science Hon. degree from Middlesex
University (London, UK), and a
Business degree from ESC in Reims, France. He joined Trend Micro in Taiwan
in 1992, and is since Trend's Customer Engineering Manager for the North
American offices.

Minimizing the Virus Threat - Glenn Jordan
Glenn Jordan is the leading virus technology expert with Dr. Solomon, and
is an established member of the
Computer Anti-virus Research Organization, an international network of
anti-virus researchers. Mr. Jordan is a graduate of the University of North
Carolina.

Tuesday February 18, 1997

INTERNET SECURITY
Cyber Thieves - Gregg Lebovitz
Gregg Lebovitz is Director of Security Products at BBN Planet. Mr. Lebovitz
spent 15 years at
Carnegy-Mellon University, designing, implementing and deploying network
routers and distributed
applications.

Accounting for Square-Root Attacks in Cryptographic Design - Michael Wiener
Michael Wiener is senior cryptologist with Entrust Technologies (formerly
Nortel Secure Networks). His
expertise is in the area of cryptanalysis, authentication, and key-exchange
protocols, public-key infrastructures, design of cryptographic systems, and
high-speed implementations of public-key cryptosystems. He is agraduate of
the University of Waterloo (Canada).=20

Virtual Private Networking: Integrating Internet and Intranet Security -
Tony Rosati
Tony Rosati is co-founder and Vice President for TimeStep Corporation. He
leads design teams ranging from the development of public-key and DES based
integrated circuits to the development of system level
communications security solutions utilizing cryptographic techniques. =20

Approaching End-to-End Security - Paul Ferguson
Paul Ferguson is a senior expert with Cisco Systems. His principal
disciplines are Internet security, large-scale routing and design
architecture.

NETWORK SECURITY
Assurance in Products for the Internet - Alan Borrett
Alan Borrett is member of the UK IT Evaluation & Certification Scheme,
under authority of Her Majesty=92s Government Communications Headquarters (=
GCHQ)

Computer Security in the Third World: The Mexican Case - Prof. Guillermo
Mallen
Professor Mallen teaches and researches at the Ibero-Americana University
in Mexico. He is a former
President of the Mexican Academy of Informatics.=20

Single Point Security: The Unisys Vision for Enterprise Security
Administration - William Buffam
William Buffam is software architect with Unisys Corp. His background is in
operating systems, networking, and solution engineering. He holds a
Computer Science degree from the University of Manchester.

Security Solutions for the Internet - Eli Herscovitz
Mr. Herscovitz is founder of RadGuard Ltd., provider of secure datanetwork
systems. He chairs the
Networking Security Standardization Committee of the Standards Institute of
Israel.

TUTORIAL
Hacker Tools & Techniques and Intrusion Testing - A dual presentation by
Edward Skoudis and Cynthia Cullen
Cynthia Cullen is a senior consultant with Bell Communications Research
Security and Fraud Management.  Edward Skoudis is a senior expert in
network security issues with Bellcore's Navesink Research Center.

Wednesday February 19, 1997

COMPUTER CRIME
Network Security's Future - Glenn Gianino
Glenn Gianino is Vice President of Advanced Technology with Computer
Associates International. His
responsibilities included all systems software and hardware including
micro, midrange, and mainframe systems, as well as all networking, SNA,
wide area networks and Internet services. His most recent assignment
involves networking security on all platforms and operating systems.

Mining the Information Klondike: CINet, a tool to fight organized crime -
Robert Heibel
Robert Heibel is Director of the research/intelligence analyst program at
Mercyhurst College (PA). A 25-year veteran of the Federal Bureau of
Investigation, he served as its Deputy Chief of Counterterrorism. Mr.
Heibel is also Executive Director of the Center for Information Research,
Analysis, and Training at Mercyhurst. Mr. Heibel is a graduate of
Georgetown University.

Digital Cash is hard to regulate - Prof. Michael Froomkin
Professor Michael Froomkin is associate professor at the University of
Miami, School of Law at Coral Gables. He specializes in Internet law and
related aspects. Professor Froomkin is a graduate of the Yale Law School,
and has a M.Phil. in history of international relations from Cambridge
University (UK). He is a Fellow of the Cyberspace Law Institute.

Smart Cards: the Coming Wave - James Chen
James Chen is founder and President of V-One Corp., a provider of network
and internetwork security
solutions. Previously Mr Chen was head of the ground network engineering
division for Intelsat, responsible for satellite launches.=20

Electronic Commerce on the Internet - Tom Carty
Tom Carty is Director of CyberTrust, a division of GTE. Mr. Carty was
responsible for the information
security privacy organization and architecting key management systems with
GTE. He is a graduate of the
University of Connecticut and Boston University.

ATM: An Emerging Network Technology - Michael Guzelian
Michael Guzelian has over 15 years experience in and knowledge of
authentication, bandwidth-on-demand, and security issues that face large
public networks.

DISCUSSION PANEL
High Integrity/Mission Critical Systems
Session and Panel Chairman - Donald L. Evans
Presentations by: Donald Evans, Timothy Stacey and Robert Smock
Donald Evans is senior security engineer and senior member of the Johnson
Space Center Mission Operations Directorate AIS Security Engineering Team,
providing assistance to NASA in developing and maintaining the IS security
program for the Space Station and Shuttle ground based programs. He is an
advisory board member for the NSA Systems Security Engineering Capability
Maturity Model, and a member of the Presidential Sub-committee of the US
Security Policy Board.
Timothy Stacey was involved with security development for NASA's Space
Shuttle and Space Station
programs and software engineering in support of NASA and the US Air Force
Space Command Systems. He is currently a information security expert with
SAIC Space Operations.
Robert Smock is head of Flight Operations Information Security Program at
United Space Alliance, responsible for providing the primary government
contractor support for the protection of NASA's ground-based information
resources, which support Space Shuttle and Space Station flight operations
at the Johnson Space Center in Houston, Texas.Mr Smock holds a degree in
Computer Science.

TUTORIAL
Network Security: PRIVATE Communication in a PUBLIC World
Dr. Radia Perlman and Charlie Kaufman
Radia Perlman is Chief Security Architect for Novell, Inc. She is known for
the invention of the spamming tree algorithm used by bridges, and many of
the algorithms used for routing, including the design of a network that can
withstand a denial of service attack. She is the author of two textbooks.
She has a PhD from MIT.
Charlie Kaufman is security architect for Lotus Notes/Domino. He is the
chair of the web transaction security working group of the IETF. He is on
the National Academy of Sciences expert panel on computer system
trustworthiness. He is coauthor with Radia Perlman, of the book "Network
Security: Private Communications in a Public World".

Thursday February 20, 1997

INTERNET SECURITY
Fighting Piracy on the Net - Peter Beruk
Peter Beruk is Director of Domestic Anti-Piracy with the Software
Publishers Association.

Internet and Server Security - Joshua Peleg
Joshua Peleg is the Director of Technical services with Memco Software. Mr.
Pelegs expertise is in security, disaster recovery and system level
programming. Joshua gained much of his experience while in the Israeli
military defense forces.

Is your Company a Hackers Help Desk ? - Steve Ritger
Steve Ritger is security engineer with SRA International. His expertise is
information and network security as well as fraud detection and prevention.

JAVA SECURITY
Security and "Live" content: A Java Perspective - Peter Coffee
Peter Coffee is advanced technologies analyst for PC Week Labs. He has
taught information systems
management, management science and expert systems development for
Pepperdine University, Chapman
College, and UCLA. He is the author of "How to program Java". Mr. Coffee is
a graduate of MIT and
Pepperdine University.

TUTORIAL
World Wide Web Security
Arthur Donkers
Arthur Donkers is founder of Le Reseau, an independent security consulting
firm in The Netherlands
(Europe). He is a graduate of Delft University of Technology, and holds a
degree in Electrical Engineering. He authors a monthly column on system
administration and security aspects in SysAdmin Magazine.


------------0----------------
=20
Datanet Security 97 is sponsored by the National Association of Webmasters,
SysAdmin Magazine, Sprint, and CMP Network Computing Magazine.=20


---------------------------0--------------------------
Participation in Datanet Security 97 is $ 845. This includes admission to
all conference sessions, tutorials and discussion panels, as well as
lunches during the four days, a banquet, and a cruise to the Bahama islands
(including breakfast, lunch, dinner and show).  You can pay on-line via a
secure web transaction with all major credit cards. A special hotel
arrangement has been made with Hyatt Regency Miami, making discounted room
rates available to all participants.

The web page with full information is available at http://www.datasec.net
Alternatively you can fax 941 775 1533, or email [email protected].

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D