IDS: FW: ShadowCon October 1999

=?iso-8859-2?Q?Tak=E1cs_Istv=E1n?= (istvan.takacs@szerencsejatek.hu)
Sun, 28 Feb 1999 16:22:52 +0100

UNSUBSCRIBE: email "unsubscribe ids" to majordomo@uow.edu.au
HELP: email questions to ids-owner@uow.edu.au
NOTE: Remove this section when replying otherwise it will be filtered.
SPAM: DO NOT send unsolicted mail to this list.
----------------------------------------------------------------------------


> -----Original Message-----
> From: Ken Williams [mailto:jkwilli2@UNITY.NCSU.EDU] 
> Sent: Saturday, February 27, 1999 8:29 PM
> To: BUGTRAQ@NETSPACE.ORG
> Subject: ShadowCon October 1999
> 
> 
> ShadowCon October 1999
> 
> Preliminary Announcement and Call for Proposals
> ShadowCon Oct 26 - 27 1999
> Naval Surface Warfare Center, Dahlgren Va
> 
> http://www.nswc.navy.mil/ISSEC/CID/
> 
> Please mark your calendars for this DoD sponsored Intrusion Detection
> and Information Assurance conference and workshop. There will be no
> charge for attendees, but even though it is free we will make sure it
> is a high-value two days. Please pass this one to people who would be
> interested.
> 
> Oct 26 will be a vendor show and high quality talks by experts in the
> field. If you are interested in presenting, please send email to:
> shadow@nswc.navy.mil
> 
> On Oct 27 we will have a workshop from 0800 - 1600. It is entitled
> "Where's the depth?". This will explore the "last mile" problem in
> implementing a defense in depth strategy focusing on issues related to
> instrumenting and protecting desktop computer systems. Once 
> an attacker
> is inside a facility either by circumventing a firewall, using insider
> access, or exploiting a backdoor there is little chance they will be
> stopped or even detected. There are a number of approaches including
> personal firewalls and host based intrusion detection 
> systems. Even so,
> we have a long way to go before our desktops are truly a 
> sensor network,
> or before we can actually protect these systems. Workshop 
> topics will be
> divided between pragmatic and research solutions and challenges. The
> workshop is invitation only. There will be a limited number 
> of observer
> seats for funding agencies, but this is primarily for active 
> participants.
> If you wish to particpate send a proposal describing what you 
> can bring
> to the table to shadow@nswc.navy.mil
> 
> There may also be a workshop for issues facing Information System
> Security Managers.
> 
> 
> Hope to see you there!
> 
> The Shadow Team
> 
> ---------------
> 
> Ken Williams
> jkwilli2@csc.ncsu.edu
> 
> Packet Storm Security                 
http://packetstorm.genocide2600.com/
Trinux: Linux Security Toolkit http://www.trinux.org/
ftp://ftp.trinux.org
PGP DH/DSS/RSA Public Keys
http://packetstorm.genocide2600.com/pgpkey/
E.H.A.P. VP & Head of Operations http://www.ehap.org/
tattooman@ehap.org
NCSU Computer Science      http://www.csc.ncsu.edu/
jkwilli2@csc.ncsu.edu