[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: 10th FIRST




-------------------------------------------------------------------------
The following message is forwarded to you by "William H. Geiger III"
<[email protected]> (listed as the From user of this message).  The
original sender (see the header, below) was Vicente Garcia
<[email protected]> and has been set as the "Reply-To" field of
this message.
-------------------------------------------------------------------------
>From: Vicente Garcia <[email protected]>
>Newsgroups: comp.security.pgp.resources
>Subject: 10th FIRST
>Date: Tue, 20 Jan 1998 18:38:39 -0600
>Organization: ITESM Campus Monterrey . DINF-DTCI
>Lines: 371
>Message-ID: <[email protected]>
>NNTP-Posting-Host: vangelis.mty.itesm.mx
>Mime-Version: 1.0
>Content-Type: text/plain; charset=us-ascii
>Content-Transfer-Encoding: 7bit
>X-Trace: news.mty.itesm.mx 885343029 6704 (None) 131.178.17.111
>X-Complaints-To: [email protected]
>X-Mailer: Mozilla 4.01 [en] (Win95; I)
>X-Priority: 3 (Normal)
>Path: edison.dotstar.net!pull-feed.internetmci.com!opus.ies-energy.com!news.cs.utwente.nl!cosy.sbg.ac.at!wuff.mayn.de!Cabal.CESspool!bofh.vszbr.cz!cpk-news-hub1.bbnplanet.com!news.bbnplanet.com!cs.utexas.edu!news.uh.edu!news.mty.itesm.mx!not-for-mail



-----BEGIN PGP SIGNED MESSAGE-----


        *************************************************************
        *                                                           *
        *   Forum of Incident Response and Security Teams (FIRST)   *
        *                                                           *
        * Tenth Annual Computer Security Incident Handling Workshop *
        *                                                           *
        *                     Monterrey, Mexico                     *
        *                                                           *
        *   Monday 22-Jun-1998 to Friday 26-Jun-1998 (inclusive)    *
        *                                                           *
        *************************************************************


                         C A L L   F O R   P A P E R S

                    Submission Deadline:  January 15, 1998

           "The challenges of incident handling in a diverse world"


The Forum of Incident Response and Security Teams (FIRST) was formed in
November 1990 to address the problem of an ever increasing number of
computer and network security related incidents, affecting thousands of
systems around the world. The forum is made up of government, private and
academic Computer Security Incident Response Teams from around the world.
Its primary goal is to coordinate the efforts of its members in order to

increase both their individual and collective effectiveness.

The annual Incident Handling Workshop is part of FIRST's ongoing
educational
program, which is aimed at increasing the general awareness of security
issues and improving expertise when handling computer security incidents.

Specific security problems can affect many individuals and organizations

around the world, possibly involving many different technological
environments. Each of the parties involved must tailor its actions to the
context in which the problem is experienced. Factors which must be taken

into account include:

 * Cultural: The way in which a problem is tackled can be highly
influenced
   by the historical development of the community in question. Examples
   are the ability for open communication about problems or values
regarding
   privacy.

 * Professional: Today the Internet is open to the masses. The ease of
   communication, the advent of electronic commerce, and the
availability of
   information, makes it a playground and a library for the masses. It is
   also a key business tool which professionals depend upon.

 * Political: Political decisions of individual countries concerning key

   areas of computer security, e.g. restrictions in the use and export of
   cryptological technology, may change the way that security problems
   must be approached. Legalities pertaining to diverse use of computer
   systems vary widely between countries.

 * Technological: Different technologies, covering a wide spectrum that
   includes mainframes, unix workstations, personal computers and network
   computers are connected to the same network simultaneously.


Who should attend?
__________________

All those responsible for any aspect of computer security management will
benefit from attending this workshop. This includes both members and
non-members of FIRST, law enforcement officials, computer security
incident
response teams, as well as consultants, contractors, vendors and
individuals
involved in the use, maintenance or planning of computer systems.


Why attend?
___________

The character of the Internet is changing rapidly. Not only has the
commercial community discovered new possibilities offered by "direct"
marketing and advertisement. Governmental and non-academic organizations

have also turned their attentions to the potential of the Internet.
Incident Handling must adapt to the changing user base of the Internet.

In addition to the opportunity for those involved in computer security to
get together and discuss all aspects of the subject, the workshop will
provide the opportunity to listen to experts in the fields of computer
security incident response and vulnerability analysis. They will share
their
valuable expertise by speaking about their experience in dealing
successfully
with the coordination of incidents traversing international boundaries,
highlighting particular problems where appropriate.
There is no other workshop dedicated to this topic in the world.


Important Dates:
________________

Abstract/Proposals Due:              January  15, 1998
Authors Notified:                    February 10, 1998
Full Materials for Proceedings Due:  April     1, 1998


Format of the workshop:
_______________________

The first day is allocated for parallel tutorial style presentations. The
remaining four days will consist of conference paper and workshop style
presentations, as well as FIRST business sessions. One evening is
allocated
for participants to hold events devoted to subjects of particular interest
("birds of a feather" sessions).

All events will be selected to further the objectives of FIRST and its
members. They may involve topics such as computer security incident
handling,
team and incident response coordination, tools, international issues, or

work in progress.

A list of example topics can be found at the end of this announcement.
Contributions should follow the following guidelines:

Tutorials:      Half or full day tutorial proposals will be considered.

Papers:         Written papers may be as long as desired, but
presentations
                must be limited to 30 minutes.

Workshop:       These informal sessions should either follow a more
                "hands-on" approach or provide for a high degree of
                audience participation. They should be tailored to address
                specific issues and should be from 60 to 90 minutes
                in duration. Panel Sessions on a particular topic are
                acceptable.


Submission information:
_______________________

Submissions should include an abstract, proposed length and single page of
notes describing the content and style of the presentation. Special
audio/visual requirements (other than one microphone and one overhead
projector) should be described. Panel session proposals should include a
list of panelists who have agreed to participate. Submissions should be
sent to the contact address given at the end of this document. The
preferred submission mechanism is via electronic mail in ASCII, HTML or
PostScript formats. Submissions via Facsimile transmission or the postal
service will, however, be accepted. Submissions must be received by the
January 15, 1998. Submissions received after this date may not be
considered for inclusion in the program.

Please use the appended form for your submissions.

Authors will be notified by the February 10, 1998 of the status of their

presentation (accepted/rejected). The final version of the material used

for the presentation (overheads, papers, slides) must be delivered to the
organizers by the April 1, 1998 for inclusion in the proceedings.


Email:
______

Please use the email address [email protected] for submissions or
questions regarding the call for papers.


WWW:
____

The Workshop WWW page is accessible from the FIRST webserver:

        http://www.first.org/workshops/1998/


Program Committee:
__________________

Wolfgang Ley, DFN-CERT, Germany (Program Chair)
Brian Dunphy, ASSIST, USA
Eric A. Fisch, Trident Data Systems, USA
Eric Halil, AUSCERT, Australia
Stephen Hansen, Stanford University, USA
Ahmet Koltuksuz, IZMIR Inst. of Technology, Turkey
Sherman O. Loges, Boeing, USA
Paul Mauvais, CIAC, USA
Fran Nielsen, NIST, USA
Steve Romig, Ohio State, USA
Roger Safian, Northwestern University, USA
Miguel J. Sanchez, SGI, USA
Sandy Sparks, CIAC, USA
Don Stikvoort, CERT-NL, Netherlands
Wietse Venema, TU Eindhoven, Netherlands
Mark Zajicek, CERT Coordination Center, USA


Conference Location:
____________________

Monterrey, Mexico


Dates:
_____

Mon June 22, 1998 - tutorials (parallel streams)
Tue June 23, 1998 to Fri June 26, 1998 (workshop).


Conference Host:
________________

Instituto Tecnologico y de Estudios Superiores de Monterrey (ITESM),
Mexican CERT (MxCERT). The workshop is sponsored by First.Org Inc.


Contact Information:
____________________

Electronic Mail:        [email protected]
Postal Address:         Attn:   Wolfgang Ley
                                DFN-CERT
                                Univ. of Hamburg
                                Vogt-Koelln-Str. 30
                                22527 Hamburg
                                Germany
Facsimile:              +49 40 5494 2241
                        Subject: FIRST 1998 Workshop

Example Topics (other topics may be considered):

    Dealing with the increasing diversity in all areas
    International Legal Issues
    Legal and Administrative Issues in Incident Handling
    Coordinating International Incidents
    Incident Handling and the Internet
    Security on Large Networks other than the Internet
    How to Protect an Incident Response Team Site
    Interviewing/Hiring Incident Response Team Staff
    Outsourcing an Incident Response Team
    Vulnerability/Advisory Processes
    New Tools for Incident Handling
    Statistic Tools
    Informational Resources
    Programming Securely
    Preventing Incidents
    Intrusion/Vulnerability Detection Tools
    System/Network Monitoring Tools
    The Changing Nature of the "hack"
    Internet Service Providers and Security
    Vendor Session
    Collecting Evidence


===========================================================================

ABSTRACT / PROPOSAL  SUBMISSION SHEET

FIRST 1998


 Name    __________________________________________________________

 Address __________________________________________________________
         __________________________________________________________
         __________________________________________________________

 Phone   ____________________           Fax _______________________

 E-mail  ____________________           URL _______________________

 Title of Presentation ____________________________________________

 Presentation Type ( please tick one )
        ( ) Paper               ( ) Half-day Tutorial
        ( ) Workshop            ( ) Full-day Tutorial
        ( ) Panel

 Presentation Length (in minutes)  ______

 Presentation Media Requirement (other than one overhead projector and
 a microphone):
 _____________________________________________________________________
 _____________________________________________________________________
 _____________________________________________________________________
 _____________________________________________________________________
 _____________________________________________________________________

 Abstract ( 75-100 words )
 _____________________________________________________________________
 _____________________________________________________________________
 _____________________________________________________________________
 _____________________________________________________________________
 _____________________________________________________________________
 _____________________________________________________________________
 _____________________________________________________________________
 _____________________________________________________________________
 _____________________________________________________________________
 _____________________________________________________________________
 _____________________________________________________________________
 _____________________________________________________________________
 _____________________________________________________________________
 _____________________________________________________________________
 _____________________________________________________________________
 _____________________________________________________________________
 _____________________________________________________________________
 _____________________________________________________________________
 _____________________________________________________________________
 _____________________________________________________________________
 _____________________________________________________________________
 _____________________________________________________________________
 _____________________________________________________________________

 FIRST is granted an non exclusive right to copy and redistribute
 conference material including the submissions of the author(s). This
 includes possible distribution on a conference CD and/or the FIRST
 website.

 Brief Biography ( 50-75 words )
 _____________________________________________________________________
 _____________________________________________________________________
 _____________________________________________________________________
 _____________________________________________________________________
 _____________________________________________________________________
 _____________________________________________________________________
 _____________________________________________________________________
 _____________________________________________________________________
 _____________________________________________________________________
 _____________________________________________________________________




-----BEGIN PGP SIGNATURE-----
Version: 2.6.2i

iQCVAwUBNHit6QQmfXmOCknRAQFQQQP6Ao1CYieDoeHK1BFqypC6QjVKXeNLEjY+
jq2HgNBSvxuysHH1fNnqNxMRJSHWyFw+yEJJk3TFXL6tyIOIojbfnzH88crtdMah
yzMYZL+APdTf3JppF8ipeIO8HygwMVt/BuRtW7JUCPvN5b7Vj1jDfc8pqOE786np
eAExY1mgrSk=
=LqxA
-----END PGP SIGNATURE-----



--------------------------------------------------------------------
MR/2 PGP Signature Check  22 Jan 1998 22:58:34
--------------------------------------------------------------------


Key matching expected Key ID 8E0A49D1 not found in file 'pubring.pgp'.

WARNING: Can't find the right public key-- can't check signature
integrity.

--------------------------------------------------------------------
MR/2 PGP Signature Check [Secondary Keyring]  22 Jan 1998 22:58:34
--------------------------------------------------------------------


WARNING: Bad signature, doesn't match file contents!

Bad signature from user "Wolfgang Ley, DFN-CERT <[email protected]>".
Signature made 1997/11/23 22:28 GMT using 1024-bit key, key ID 8E0A49D1

WARNING:  Because this public key is not certified with a trusted
signature, it is not known with high confidence that this public key
actually belongs to: "Wolfgang Ley, DFN-CERT <[email protected]>".

PGPRC=1
PGPRC2=1

-----------------------------------------------------
 -- End of forwarded message
-----------------------------------------------------
-- 
---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
---------------------------------------------------------------
 
Tag-O-Matic: The sad thing about Windows bashing is it's all true.