UNSUBSCRIBE: email "unsubscribe ids" to majordomo@uow.edu.au HELP: email questions to ids-owner@uow.edu.au NOTE: Remove this section when replying otherwise it will be filtered. SPAM: DO NOT send unsolicted mail to this list. ---------------------------------------------------------------------------- > -----Original Message----- > From: Ken Williams [mailto:jkwilli2@UNITY.NCSU.EDU] > Sent: Saturday, February 27, 1999 8:29 PM > To: BUGTRAQ@NETSPACE.ORG > Subject: ShadowCon October 1999 > > > ShadowCon October 1999 > > Preliminary Announcement and Call for Proposals > ShadowCon Oct 26 - 27 1999 > Naval Surface Warfare Center, Dahlgren Va > > http://www.nswc.navy.mil/ISSEC/CID/ > > Please mark your calendars for this DoD sponsored Intrusion Detection > and Information Assurance conference and workshop. There will be no > charge for attendees, but even though it is free we will make sure it > is a high-value two days. Please pass this one to people who would be > interested. > > Oct 26 will be a vendor show and high quality talks by experts in the > field. If you are interested in presenting, please send email to: > shadow@nswc.navy.mil > > On Oct 27 we will have a workshop from 0800 - 1600. It is entitled > "Where's the depth?". This will explore the "last mile" problem in > implementing a defense in depth strategy focusing on issues related to > instrumenting and protecting desktop computer systems. Once > an attacker > is inside a facility either by circumventing a firewall, using insider > access, or exploiting a backdoor there is little chance they will be > stopped or even detected. There are a number of approaches including > personal firewalls and host based intrusion detection > systems. Even so, > we have a long way to go before our desktops are truly a > sensor network, > or before we can actually protect these systems. Workshop > topics will be > divided between pragmatic and research solutions and challenges. The > workshop is invitation only. There will be a limited number > of observer > seats for funding agencies, but this is primarily for active > participants. > If you wish to particpate send a proposal describing what you > can bring > to the table to shadow@nswc.navy.mil > > There may also be a workshop for issues facing Information System > Security Managers. > > > Hope to see you there! > > The Shadow Team > > --------------- > > Ken Williams > jkwilli2@csc.ncsu.edu > > Packet Storm Security http://packetstorm.genocide2600.com/ Trinux: Linux Security Toolkit http://www.trinux.org/ ftp://ftp.trinux.org PGP DH/DSS/RSA Public Keys http://packetstorm.genocide2600.com/pgpkey/ E.H.A.P. VP & Head of Operations http://www.ehap.org/ tattooman@ehap.org NCSU Computer Science http://www.csc.ncsu.edu/ jkwilli2@csc.ncsu.edu