Actions

ARCS - Agenda: Difference between revisions

From Santa Fe Institute Events Wiki

No edit summary
No edit summary
 
(17 intermediate revisions by the same user not shown)
Line 9: Line 9:




'''Agenda TBA'''
 
<table border="1" cellpadding="4">
<tr>
  <td align=center><b>TIME</b></td>
  <td align=center><b>ACTIVITY</b></td>
<tr bgcolor=#aaaaaa>
  <td><br></td>
  <td align=center><b>Tuesday, October 31</b></td>
</tr>
<tr>
</td>
  <td>6:00-7:30 p.m.</td>
  <td>Informal Welcome Reception, La Fonda Hotel
</td>
<tr>
<tr bgcolor=#aaaaaa>
  <td><br></td>
  <td align=center><b>Wednesday, November 1</b></td>
</tr>
<tr>
</td>
  <td>8:15-8:45 a.m.</td>
  <td>Registration and Continental Breakfast
</td>
<tr>
  <td>8:45-9:00</td>
  <td>''Welcome & Introductory Remarks,''  '''Geoffrey West,''' Santa Fe Institute
  </tr>
  <td>9:00-10:00</td>
  <td>'''Keynote: "Shadows of Cyberspace Revisited: A Ten Years Retrospective on Cyber-Crime and Cyber Security from 1996 to 2006," Richard Power'''</td>
</tr>
</tr>
  <td>10:00-10:30</td>
  <td>Coffee Break</td>
</tr>
</tr>
  <td>10:30-11:15</td>
  <td>''TBA,'' '''Christian Renaud,''' Cisco Systems</td>
</tr>
</tr>
  <td>11:15-12:00 p.m.</td>
  <td>''An Adaptive System to Build Trust of Remote Email Agents,''
'''Hong Li,''' Intel Research Group</td>
</tr>
</tr>
  <td>12:00-1:30</td>
  <td>Buffet Lunch</td>
</tr>
</tr>
  <td>1:30-2:15</td>
  <td>''"Do we need alternative models for computer epidemics?"'' '''Fabrice Saffre,''' BT Labs</td>
</tr>
</tr>
  <td>2:15-3:00</td>
  <td>''Security in US Defense Networks,''  '''Col. Carl Hunt,''' IDA</td>
</tr>
</tr>
  <td>3:00-3:30</td>
  <td>Coffee Break</td>
</tr>
</tr>
<td>3:30-4:30</td>
  <td>''Virus Writers,'' '''Sarah Gordon,''' Symantec </td>
</tr>
</tr>
<td>4:30-5:00</td>
  <td>Round table discussion & Adjourn</td>
</tr>
</tr>
<td>6:00-7:30</td>
  <td>Reception and Dinner, Santa Fe Institute</td>
</tr>
</tr>
<tr bgcolor=#aaaaaa>
  <td><br></td>
  <td align=center><b>Thursday, November 2</b></td>
</tr>
<tr>
  <td>8:15-9:00 a.m.</td>
  <td>Continental Breakfast</td>
</tr>
<tr>
  <td>9:00-10:00</td>
  <td>'''Keynote: "Why we are not winning the Security War," Dr. Richard Ford, Florida Institute of Technology'''</td>
</tr>
<tr>
  <td>10:00-10:30</td>
  <td>Coffee Break</td>
</tr>
<tr>
  <td>10:30-11:15</td>
  <td>''Anti-worm Dynamics in Distributed Detection,'' '''John Mark Agosta,''' Intel</td>
</tr>
<tr>
  <td>11:15-12:00 p.m.</td>
  <td>''Address Space Obfuscation to Tolerate Windows Code Injection Attacks,'' '''Tufan Demir,''' Security Lab, UC Davis</td>
</tr>
<tr>
  <td>12:00-1:30</td>
  <td>Buffet Lunch</td>
</tr>
<tr>
  <td>1:30-2:00</td>
  <td>''Current and Developing Issues in  Information Security in the UK,'' '''Andrew Jones,''' BT Labs</td>
</tr>
<tr>
  <td>2:00-2:45</td>
  <td>''Creating a Model for Computer Network Pathway Analysis: Analogy from Cellular Regulatory Pathways,'' '''Sanjay Goel,''' NYS Center for Information Forensics and Assurance</td>
</tr>
<tr>
  <td>2:45-3:15</td>
  <td>''Resillience in Complex Systems,'' '''Dave Cliff,''' Large Scale Complex IT Systems Institute, UK</td>
</tr>
<tr>
  <td>3:15-3:45</td>
  <td>Coffee</td>
</tr>
<tr>
  <td>3:45-4:30</td>
  <td>''Knowledge Management and Social Networking,'' '''Eleanor Wynn,''' Intel</td>
</tr>
<tr>
  <td>4:30-5:15</td>
  <td>''The Orchids IDS System,'' '''Jean Goubault-Larrecq,''' École Normale Supérieure de Cachan
</td>
</tr>
  <td>5:15-5:30</td>
  <td>Discussion and Wrap-up
</td>
</tr>

Latest revision as of 16:15, 28 October 2006

Workshop Navigation


TIME ACTIVITY

Tuesday, October 31
6:00-7:30 p.m. Informal Welcome Reception, La Fonda Hotel

Wednesday, November 1
8:15-8:45 a.m. Registration and Continental Breakfast
8:45-9:00 Welcome & Introductory Remarks, Geoffrey West, Santa Fe Institute
9:00-10:00 Keynote: "Shadows of Cyberspace Revisited: A Ten Years Retrospective on Cyber-Crime and Cyber Security from 1996 to 2006," Richard Power
10:00-10:30 Coffee Break
10:30-11:15 TBA, Christian Renaud, Cisco Systems
11:15-12:00 p.m. An Adaptive System to Build Trust of Remote Email Agents, Hong Li, Intel Research Group
12:00-1:30 Buffet Lunch
1:30-2:15 "Do we need alternative models for computer epidemics?" Fabrice Saffre, BT Labs
2:15-3:00 Security in US Defense Networks, Col. Carl Hunt, IDA
3:00-3:30 Coffee Break
3:30-4:30 Virus Writers, Sarah Gordon, Symantec
4:30-5:00 Round table discussion & Adjourn
6:00-7:30 Reception and Dinner, Santa Fe Institute

Thursday, November 2
8:15-9:00 a.m. Continental Breakfast
9:00-10:00 Keynote: "Why we are not winning the Security War," Dr. Richard Ford, Florida Institute of Technology
10:00-10:30 Coffee Break
10:30-11:15 Anti-worm Dynamics in Distributed Detection, John Mark Agosta, Intel
11:15-12:00 p.m. Address Space Obfuscation to Tolerate Windows Code Injection Attacks, Tufan Demir, Security Lab, UC Davis
12:00-1:30 Buffet Lunch
1:30-2:00 Current and Developing Issues in Information Security in the UK, Andrew Jones, BT Labs
2:00-2:45 Creating a Model for Computer Network Pathway Analysis: Analogy from Cellular Regulatory Pathways, Sanjay Goel, NYS Center for Information Forensics and Assurance
2:45-3:15 Resillience in Complex Systems, Dave Cliff, Large Scale Complex IT Systems Institute, UK
3:15-3:45 Coffee
3:45-4:30 Knowledge Management and Social Networking, Eleanor Wynn, Intel
4:30-5:15 The Orchids IDS System, Jean Goubault-Larrecq, École Normale Supérieure de Cachan
5:15-5:30 Discussion and Wrap-up