Tuesday, April 8 | |
10:00 a.m. - 12:30 p.m. | Pre-Event Sessions: Faculty Presentations and Demos - to run concurrently |
Stewart Center, Room 314 | |
10:00 - 10:25 | Christian F. Hempelmann - Demo
Natural Language Information Assurance and Security |
10:30 - 10:55 | Pascal Meunier - Demo Demonstration of Vulnerability Management with the ELISA System |
11:00 - 11:25 | Mikhail Atallah - Presentation Secure Supply Chain Protocols |
11:30 - 11:55 | Christopher Clifton - Presentation Secure Distributed Data Mining |
12:00 - 12:25 | Carla Brodley - Presentation What Data Mining Currently Can and Can't Do for Intrusion Detection |
Stewart Center, Room 322 | |
10:00 - 10:25 | Kihong Park - Demo Scalable Denial of Service Attack Prevention on the Internet |
10:30 - 10:55 | Gregg Gunsch - Presentation Outsourcing Information Technology and The Insider Threat |
11:00 - 11:25 | Bharat Bhargava - Presentation Detecting Service Violation in Internet and Mobile Ad hoc Networks |
11:30 - 11:55 | Melissa Dark - Presentation Information Security Awareness, Training, and Education; A Look at the CERIAS Programs |
12:00 - 12:25 p.m. | Pascal Meunier - Demo Matching Faculty, Students and Industry for Grants, Internships, Assistantships, Fellowships and other opportunities with the CERIAS INFORMS system |
Lunch break | On Own |
Purdue Memorial Union, South Ballroom | |
1:30 | Welcome and State of the Center |
1:30 - 4:00 | Poster Session |
4:00 - 6:00 | Symantec Award Reception |
Dinner break | On Own |
Krannert Auditorium | |
7:30 | Keynote Speaker Lance Hoffman, Distinguished Research Professor of Computer Science at The George Washington University From Walk-Through Computers to Implantable Computers: Lessons Learned from Dealing with Security and Policy Issues We examine computer security research and education from the creation of the first computer security courses in universities (in the 1970s), through religious debates (Proofs of Correctness Considered Harmful) and true innovations (public key cryptography) to the present day, where we are starting to spend a lot of money without knowing where we want to end up, or how best to get there. Will wearable, trackable computers lead to a Big Brother society, where many people and things are always on? Will technology innovation continue to outpace the law, thus dooming security practitioners to always occupy uncomfortable positions? What are the sleeperresearch areas with big payoffs, and are we educating people the right way to work in them? How can we as a field and as individuals make a difference in shaping this future? And who is doing this already, in Washington and elsewhere? This talk will address these questions and try to give some initial answers. |
Wednesday, April 9 | |
Stewart Center, Room 218 | |
8:00 a.m. | Continental Breakfast |
8:30 | Welcome |
9:00 - 10:15 | Panel Session 1: CERIAS Affiliates |
10:30 - 11:30 | Panel Session 2: Computer Forensics |
North Ballroom, Purdue Memorial Union | |
11:45 - 1:15 | Lunch Speaker: Carl Landwehr, Program Director for Trusted Computing, National Science Foundation |
Stewart Center, Room 218 | |
1:30 - 2:30 | Panel Session 3: The Social Shaping of Technology |
2:45 - 3:45 | Panel Session 4: Valuing Infosec within Organizations |
4:00 - 5:30 | Roundtable Discussion Freedom to Teach, Freedom to Learn: Information Security as a Sensitive Topic. Moderator, Gene Spafford Some national authorities are increasingly concerned about potential terrorists posing as students so as to study sensitive topics. The recent arrest of a Saudi citizen for alleged terrorist activities while studying for his PhD at one of the NSA's Center of Excellence schools is cited by some as justification for these concerns. Meanwhile, scholars are increasingly concerned about the negative impact such restrictions will have on academic freedom and our ability to conduct advanced research. Faculty at some major universities and leaders of scientific societies issued statements voicing their concerns with new visa and research restrictions. |
Krannert Auditorium | |
5:45 - 7:00 | Keynote Speaker Speaker: Howard Schmidt, Acting Chair, President's Critical Infrastructure Board, Special Advisor to the President for Cyberspace Security (Acting) Securing our critical infrastructures includes protecting our computing and communications enterprises. Recently, the White House released a report recommending strategy to protect these enterprises. Building on input provided by experts in government, industry, and academia, the report discusses 5 priorities for action. In this talk, Mr. Schmidt will discuss the report, needed steps to carry out the recommendations, and some of the initial results obtained since the release of the report. In particular, Mr. Schmidt will discuss some of the role of academic centers of expertise, such as CERIAS at Purdue, can play in these critical tasks. |