Sunday, July 3, 2011

AusCERT2011 - Overexposed

(galaxy s,samsung galaxy s,samsung tab,galaxy tab,samsung galaxy tab,samsung android,android,samsung galaxy s2,galaxy s2,samsung galaxy 2,nokia,nokia mobiles,samsung mobiles,mobiles in india,sony mobiles,nokia mobile,sony ericsson,sony ericsson mobiles,nokia india,samsung mobile)
The Australian Computer Emergency Response Team is hosting AusCERT2011, the AusCERT Information Security Conference, from 15th - 20th May 2011 at the RACV Royal Pines Resort on Queensland's Gold Coast.(galaxy s,samsung galaxy s,samsung tab,galaxy tab,samsung galaxy tab,samsung android,android,samsung galaxy s2,galaxy s2,samsung galaxy 2,nokia,nokia mobiles,samsung mobiles,mobiles in india,sony mobiles,nokia mobile,sony ericsson,sony ericsson mobiles,nokia india,samsung mobile)

With a theme of “Overexposed” and a warning from a recent delegate update email that the social events “are not suitable for children” this year promises to be one of the most interesting in the 10 year history of the conference.
There are a number of strong presentations and keynotes on the schedule, available at http://conference.auscert.org.au/conf2011/program_main.html. Professor Ross Anderson from Cambridge University, and Amit Klein, CTO of Trusteer are joined by British writer and Comedian Bennett Arron to deliver the conference keynotes, and each day is separated into four programme streams.
Day one, Monday 16th May
SCADA Stream, Technology, 2 Vendor Stream
Highlights will include Rob Lamb (IBM) discussing the current threat landscape, walking the audience through highlights from the latest IBM X-Force Trend and Risk Report. The report gathers facts from numerous intelligence sources, including the real-time monitoring of 13 billion security events every day across more than 130 countries.
Later in the day John Harrison and Trent Prasser from Brisbane City Council will discuss the impact of recent natural disasters on disaster recovery capabilities and business continuity plans. They plan to cover some of the topics which need to be considered in disaster planning and response, learnt through recent natural disaster events.
Day two, Tuesday 17th May
Internet Infrastructure Stream, Cybercrime Stream, 2 Vendor Streams
Kicking off with Amit Klein (Trusteer) talking about the risks and threats of Mobile Banking, day two continues after morning tea with presentations which include Eugene Kaspersky, founder of Kaspersky Labs and an overview of PCI attack trends from computer forensics expert Nick Klein and Mike Ryan (Vectra Corporation).
Geoff Huston’s (APNIC) talk on the role of addresses and routing, which includes an update on the progress of a project to establish a secure framework for addresses and their use in the Internet, is followed by Mark Newton’s (Internode) thoughts on securing IPv6.
The Gala Dinner incorporating the Australian SC Information Security Awards and AusCERT Awards will be hosted by Corinne Grant from 7pm. And, back by popular demand from AusCERT2008, Australian Music Comedy Sensations Tripod with Yon, Scod and Gatesy contrast quick change artists and magicians Soul Mystique.
Day three, Wednesday 18th May
2 Managing Technology Streams, 2 Vendor Streams
Microsoft, infoblox, Lockstep and Statsec follow Ross Anderson’s keynote address on the Dependability of Complex Socio-Technical Infrastructure. An early thinker around Peer to Peer networks Ross will talk discuss frauds against payment networks, investing in smart grids and draw on a recent major study Ross was involved in for European Network and Information Security Agency (ENISA) about the resilience of the Internet interconnect.
Days four and five include the Executive Program (hosted by Ross Anderson, Karl Hanmore, Gail Holt, and Marcus Sachs) and a number of full day and two day tutorials. These include:
VOIP Security Testing presented by Chris Gatford and Peter WesleyWeb Application Security Testing and Practical Secure Application Development presented by Jason Edelstein, Kaan Kivilcim and Phil Taylor, Sense of SecuritySecure Coding with OWASP Application Security Verification Standard presented by Andrew Van Der Stock, Pure HackingBehaviors and Patterns: Introduction to Practical Malware Analysis presented by Aaron Hackworth and Ross KinderCEHv7 Advanced – Hands on Workshop presented by Haja Mohideen, Technical Director of EC-Council and the creator of CEH certification
AusCERT2011 has attracted around 70 sponsors and top level sponsorship from IBM, Kaspersky Lab, NetWitness and Symantec. The conference programme concludes just before 4pm on Wednesday afternoon.
searchSecurity.com.au is attending the conference with the support of AusCERT.

View the original article here

No comments:

Post a Comment