The NEbraskaCERT Conference:
was held in August
at the Peter Kiewit Institute's
Scott Conference Center
Omaha, NE USA
Monday
Optional ISC^2 Exam
Tuesday
 7:30-8:45
9:00-10:15 10:30-11:45 11:45-12:45
12:45-1:45
2:00-3;15 3:30-4:45
Track A













Continental Breakfast










InfraGard: Guarding the Nation's Infrastructure




Attacking and Defending Web Services













Lunch













Rob Rosenberger

Unifying & Strengthening America Through Prudent Action to Combat Terrorism Part 1
Unifying & Strengthening America Through Prudent Action to Combat Terrorism Part 2
Track B
Managing and Securing Windows Service Accounts
Security Overview for Windows Vista
Reading Hex Packets
Track C
Forensics and Electronic Discovery: Investigations, Litigation Support and More…
Integrated, Holistic Threat Detection
Scanning for $
Track D
Automating Risk Assessment
Web Site Authentication, Complying with OCC 2005-35
Making IT Security Accountable Through Risk Management

Wednesday
 8:00-8:45
9:00-10:15
10:30-11:45
11:45-12:45
12:45-1:45
2:00-3:15
3:30-4:45
Track A











Continental Breakfast
The bright future of the Extensible Configuration Checklist Description Format (XCCDF) and its friends
The State of Messaging Security: Defenses are Getting Stronger as Evil Doers Morph











Lunch











James Phillips

Zombies
Fiddling with Fiddler - Testing web applications with Fiddler and other free tools
Track B
Open
Open
Information Risk
3rd Party Risk
Track C
CobiT and IT Governance - building in security from the top, down and the bottom, up
The Pursuit of ISO 27001 Certification
Oval & XCCDF Tutorial
Auditing Linux
Track D


Acting the Part: Required Non-Technical Skills for Security Managers
From the Lab to the Boardroom: How to Perform a Security Risk Assessment like a Professional
Confronting the Threat Inside the Castle Walls:  Addressing the Growing Insider Threat
Cyber Forensics – The Basics

Thursday
8:00-8:45
9:00-10:15
10:30-11:45
11:45-12:45
12:45-1:45
2:00-3:15
3:30-4:45
Track A









Continental Breakfast
MS Threat Modeling

The information Security Management Process based on ISO 270001










Lunch









John M. "Mike" Gipson
The Evolution of the CISO Role in the Coming Decade

Track B
Cyber Forensics – Windows Remnants
Cyber Forensics – Intermediate Topics
Forensic Analysis of Volatile Data Stores
Cyber Forensics - Hands On
Track C
Open
Microsoft Windows XP Hardening The Security Silver Bullet
Outsourcing Auth and Auth
Track D

Leadership Management

Value Equation
The Sky is Falling: Surviving an external PCI Audit
Spyware Removal for Fun  and Profit
Friday & Saturday
Optional NSA IAM Training
The NEbraskaCERT Conference was brought to you by NEbraskaCERT
*CERT is a servicemark of Carnegie Mellon University. Used with permission.