Monday
|
Optional
ISC^2 Exam
|
Tuesday
|
7:30-8:45
|
9:00-10:15 |
10:30-11:45 |
11:45-12:45
|
12:45-1:45
|
2:00-3;15 |
3:30-4:45 |
Track
A
|
Continental Breakfast
|
InfraGard: Guarding the Nation's Infrastructure
|
Attacking and Defending Web
Services
|
Lunch |
Rob Rosenberger
|
Unifying & Strengthening
America Through
Prudent Action to Combat Terrorism Part 1
|
Unifying & Strengthening
America Through
Prudent Action to Combat Terrorism Part 2 |
Track
B
|
Managing and Securing
Windows Service
Accounts
|
Security Overview for
Windows Vista
|
Reading Hex Packets
|
Track
C
|
Forensics and Electronic
Discovery:
Investigations, Litigation Support and More…
|
Integrated, Holistic Threat
Detection
|
Scanning for $
|
Track
D
|
Automating Risk Assessment
|
Web Site Authentication,
Complying with
OCC 2005-35
|
Making IT Security
Accountable Through
Risk Management
|
|
Wednesday
|
8:00-8:45
|
9:00-10:15
|
10:30-11:45
|
11:45-12:45
|
12:45-1:45
|
2:00-3:15
|
3:30-4:45
|
Track
A
|
Continental Breakfast
|
The bright future of the
Extensible
Configuration Checklist Description
Format (XCCDF) and its friends
|
The State of Messaging
Security: Defenses
are Getting Stronger as Evil Doers Morph
|
Lunch
|
James Phillips
|
Zombies
|
Fiddling with Fiddler -
Testing web
applications with Fiddler and other free tools
|
Track
B
|
Open
|
Open
|
Information Risk
|
3rd Party Risk
|
Track
C
|
CobiT and IT Governance -
building in security from the top, down and the bottom, up
|
The Pursuit of ISO 27001
Certification
|
Oval & XCCDF Tutorial
|
Auditing Linux
|
Track
D
|
Acting the Part: Required Non-Technical Skills for Security Managers
|
From the Lab to the
Boardroom: How to
Perform a Security Risk Assessment like a Professional
|
Confronting the Threat
Inside the Castle
Walls: Addressing the Growing Insider Threat
|
Cyber Forensics – The Basics
|
|
Thursday
|
8:00-8:45
|
9:00-10:15
|
10:30-11:45
|
11:45-12:45
|
12:45-1:45
|
2:00-3:15
|
3:30-4:45
|
Track
A
|
Continental Breakfast
|
MS Threat Modeling
|
The information Security Management Process based on ISO 270001
|
Lunch
|
John
M. "Mike" Gipson
|
The Evolution of the CISO
Role in the Coming
Decade
|
|
Track
B
|
Cyber Forensics – Windows
Remnants
|
Cyber Forensics –
Intermediate Topics
|
Forensic Analysis of
Volatile Data Stores
|
Cyber Forensics - Hands On
|
Track
C
|
Open
|
Microsoft Windows XP
Hardening |
The Security Silver Bullet
|
Outsourcing Auth and Auth
|
Track
D
|
Leadership Management
|
Value Equation
|
The Sky is Falling:
Surviving an external PCI
Audit
|
Spyware Removal for
Fun and Profit
|
Friday & Saturday
|
Optional
NSA IAM Training
|