2013 conferences
Prior conferences
• 2012
• 2011
• 2010
• 2009
• 2008
• 2007
• 2006
• 2005

• 2004
• 2003
• 2002
• 2001
• 2000
• 1999
• 1998
Upcoming conference
More about us

Security and Privacy
February 9-10, 2004 in Austin, Texas



overview speakers agenda

Topics include:
• Human factors
• Risk assessment
• Actual vs. perceived threats
• Digital identity/identity management
• Trusted systems
• The changing legal landscape
• Terrorism and security
• Digital rights management
• Economic and political issues

conference overview
The integrity of information technology within organizations is threatened by a constant barrage of worms, viruses and security breaches. Organizations are concerned about hackers gaining access to web sites, and malicious worms continue to infect servers. Security flaws and system failures are not only tolerated, but expected. Security is traded for convenience, convenience for privacy, and privacy for benefits. Cryptography and encryption appear to work, but don’t seem to be used on a truly large scale.

The larger issue of creating and implementing an overall layered security strategy to minimize vulnerabilities and attacks seems paramount now. However, the cost and effort required to create a secure enterprise can be daunting.

Is there an agreed-upon meaning for “security”? How many layers of security are needed to protect our vital data? Are access controls, firewall technologies, and intrusion detection systems enough? What will it take to protect systems against malevolent insiders, unsecured machines, and unsuspecting users?

Human factors will loom large in solving these technology-created problems. The sheer complexity of the Internet, ever-larger operating systems, and a maze of applications make systems difficult to defend.
If perfect security is unattainable, what is the appropriate balance between the cost of security countermeasures and the financial and political losses associated with security breaches?

We’ll examine questions surrounding privacy, including surveillance, rights, and trust. With the prevalence of large and sometime disparate databases, we’ll look at the twin issues of data authenticity and ownership.

back to top

Mr. Phillip Bevis, Founder and CEO, Arundel Books
Mr. David Birch, Director, Consult Hyperion
Mr. Jon Callas, CTO and CSO, PGP Corporation
Mr. Bill Cheswick, Chief Scientist, Lumeta Corp.
Dr. Fred Cohen, Principal Analyst, Burton Group
Dr. Steve Crocker, CEO and Co-founder, Shinkuro, Inc.
Dr. Carl Ellison, Security Architect, Secure Business Unit, Microsoft
Dr. Edward Felten, Director, Secure Internet Programming Laboratory, Princeton University
Dr. Prabhu Goel, Founder and CEO, iPolicy Networks
Mr. Mark Graff, Chief Cyber Security Officer, Lawrence Livermore National Laboratory
Dr. Steve Hofmeyr, Founder and Chief Scientist, Sana Security
Mr. Mark Ishikawa, CEO and CTO, BayTSP
Mr. Bill Neugent, Chief Engineer, Center for Integrated Intelligence Systems, MITRE Corporation
Dr. Peter G. Neumann, Principal Scientist, SRI International Computer Science Laboratory
Dr. Avi Rubin, Technical Director, Information Security Institute, Johns Hopkins University
Mr. Seth Schoen, Staff Technologist, Electronic Frontier Foundation
Dr. Keith Still, Director, Crowd Dynamics Ltd.

back to top


home about us activities and deliverables contact faqs copyright