Actions

ARCS - Agenda: Difference between revisions

From Santa Fe Institute Events Wiki

No edit summary
No edit summary
Line 25: Line 25:
<tr>
<tr>
   <td>8:45-9:00</td>
   <td>8:45-9:00</td>
   <td>''Welcome & Introductory Remarks'' '''Geoffrey West,''' SFI President & Distinguished Professor
   <td>''Welcome & Introductory Remarks,'' '''Geoffrey West,''' SFI President & Distinguished Professor
   </tr>
   </tr>
   <td>9:00-10:00</td>
   <td>9:00-10:00</td>
   <td>'''Keynote: "Shadows of Cyberspace Revisited: A Ten Years Retrospective on Cyber-Crime and Cyber Security from 1996 to 2006," Richard Power'''</td>
   <td>'''Keynote: "Shadows of Cyberspace Revisited: A Ten Years Retrospective on Cyber-Crime and Cyber Security from 1996 to 2006," Richard Power'''</td>
</tr>
</tr>
  </tr>
  </tr>
Line 35: Line 35:
</tr>
</tr>
  </tr>
  </tr>
   <td>10:30-11:15</td>
   <td>10:30-11:15 p.m.</td>
   <td>''TBA,'' '''Christian Renaud,''' Cisco Systems</td>
   <td>''TBA,'' '''Christian Renaud,''' Cisco Systems</td>
</tr>
</tr>
  </tr>
  </tr>
   <td>11:15-12:00</td>
   <td>11:15-12:00</td>
   <td>''"An Adaptive System to Build Trust of Remote Email Agents,"'' '''Dr. Hong Li,''' Intel Research Group</td>
   <td>''"An Adaptive System to Build Trust of Remote Email Agents,"''  
'''Dr. Hong Li,''' Intel Research Group</td>
</tr>
</tr>
  </tr>
  </tr>
Line 47: Line 48:
</tr>
</tr>
  </tr>
  </tr>
   <td>3:45-4:15</td>
   <td>1:30-2:15</td>
   <td>Discussion</td>
  <td>''"Self-Organizing Defense Systems,"'' '''Dr. Fabrice Saffre,''' BT Labs</td>
</tr>
</tr>
  <td>2:15-3:00</td>
  <td>''"Security in US Defnse Networks,"'' '''Col. Carl Hunt,''' IDA</td>
</tr>
</tr>
  <td>3:00-3:30</td>
  <td>Coffee Break</td>
</tr>
</tr>
<td>3:30-4:15</td>
   <td>''TBA,'' '''Prof. Al Kellie,''' National Center for Atmospheric Research</td>
</tr>
</tr>
  </tr>
  </tr>
  <td>5:00-5:30</td>
<td>4:15-5:00</td>
   <td>Buses depart for SFI</td>
   <td>''"Virus Writers,"'' '''Dr. Sarah Gordon,''' Symantec</td>
</tr>
</tr>
  </tr>
  </tr>
  <td>5:30-8:30</td>
<td>5:00-5:30</td>
   <td>Author's Evening and Dinner at SFI</td>
   <td>Round table discussion & Adjourn</td>
</tr>
</tr>
  </tr>
  </tr>
<tr bgcolor=#aaaaaa>
<tr bgcolor=#aaaaaa>
   <td><br></td>
   <td><br></td>
   <td align=center><b>Saturday, November 4</b></td>
   <td align=center><b>Thursday, November 2</b></td>
</tr>
</tr>
<tr>
<tr>
   <td>8:00-9:00 a.m.</td>
   <td>8:15-9:00 a.m.</td>
   <td>Buffet Breakfast, Inn at Loretto</td>
   <td>Continental Breakfast</td>
</tr>
</tr>
<tr>
<tr>
   <td>9:00-10:00</td>
   <td>9:00-10:00</td>
   <td>''Cultural Diffusion'' or ''The Spread of Religion,'' TBA</td>
   <td>'''Keynote: "Why we are not winning the Security War," Dr. Richard Ford, Florida Institute of Technology'''TBA</td>
</tr>
<tr>
  <td>10:00-10:30 p.m.</td>
  <td>Coffee Break</td>
</tr>
<tr>
  <td>10:30-11:15</td>
  <td>''"Anti-worm Dynamics in Distributed Detection,"'' '''John Mark Agosta,''' Intel</td>
</tr>
<tr>
  <td>11:15-12:00</td>
  <td>''"Address Space Obfuscation to Tolerate Windows Code Injection Attacks,"'' '''Dr. Tufan Demir,''' Security Lab, UC Davis</td>
</tr>
<tr>
  <td>12:00-1:30</td>
  <td>Buffet Lunch</td>
</tr>
<tr>
  <td>1:30-2:00</td>
  <td>''"Current and Developing Issues in  Information Security in the UK,"'' '''Dr. Andrew Jones,''' BT Labs</td>
</tr>
</tr>
<tr>
<tr>
   <td>10:00-12:30 p.m.</td>
   <td>2:00-2:45</td>
   <td>Is Technology Infectious?
   <td>''"Creating a Model for Computer Network Pathway Analysis: Analogy from Cellular Regulatory Pathways,"'' '''Prof. Sanjay Goel,''' NYS Center for Information Forensics and Assurance</td>
*''Technology as a Vector for Infectious Ideas,'' '''Esther Dyson,''' Release 0.9
*''The Psychology of Virus Writers,'' '''Sarah Gordon,''' Symantec
*''Economics of Technology Diffusion,'' '''W. Brian Arthur,''' SFI</td>
</tr>
</tr>
<tr>
<tr>
   <td>12:30-1:30</td>
   <td>2:45-3:15</td>
   <td>Lunch and optional film screening, ''"Mind in the Machine: The Discovery of Artificial Intelligence,"'' by '''Dan Rockmore,''' SFI and Dartmouth (to be confirmed)</td>
   <td>''"Resillience in Complex Systems,"'' '''Prof. Dave Cliff,''' Large Scale Complex IT Systems Institute, UK</td>
</tr>
</tr>
<tr>
<tr>
   <td>1:30-3:00</td>
   <td>3:15-3:45</td>
   <td>New Models of Infection, Contagion and Diffusion
   <td>Coffee</td>
*''Infectivity in Markets:  Thoughts and Evidence,'' '''Michael Mauboussin,''' Legg Mason Capital Management
*''SFI as a Model of Infection in Academia,'' '''Murray Gell-Mann,''' SFI</td>
</tr>
</tr>
<tr>
<tr>
   <td>3:00-5:00</td>
   <td>3:45-4:30</td>
   <td>Business Network Member Breakout Session</td>
   <td>''"Knowledge Management and Social Networking,"'' '''Dr. Eleanor Wynn,''' Intel</td>
</tr>
</tr>
<tr>
<tr>
   <td>5:00-6:00</td>
   <td>4:30-5:15</td>
   <td>Business Network Member Cocktail Hour</td>
  <td>''"The Orchids IDS System,"'' '''Prof. Jean Goubault-Larrecq,''' École Normale Supérieure de Cachan
</td>
</tr>
  <td>5:15-5:30</td>
   <td>Discussion and Wrap-up
</td>
</tr>
</tr>

Revision as of 20:53, 12 September 2006

Workshop Navigation


TIME ACTIVITY

Wednesday, November 1
8:15-8:45 a.m. Registration and Continental Breakfast
8:45-9:00 Welcome & Introductory Remarks, Geoffrey West, SFI President & Distinguished Professor
9:00-10:00 Keynote: "Shadows of Cyberspace Revisited: A Ten Years Retrospective on Cyber-Crime and Cyber Security from 1996 to 2006," Richard Power
10:00-10:30 Coffee Break
10:30-11:15 p.m. TBA, Christian Renaud, Cisco Systems
11:15-12:00 "An Adaptive System to Build Trust of Remote Email Agents," Dr. Hong Li, Intel Research Group
12:30-1:30 Buffet Lunch
1:30-2:15 "Self-Organizing Defense Systems," Dr. Fabrice Saffre, BT Labs
2:15-3:00 "Security in US Defnse Networks," Col. Carl Hunt, IDA
3:00-3:30 Coffee Break
3:30-4:15 TBA, Prof. Al Kellie, National Center for Atmospheric Research
4:15-5:00 "Virus Writers," Dr. Sarah Gordon, Symantec
5:00-5:30 Round table discussion & Adjourn

Thursday, November 2
8:15-9:00 a.m. Continental Breakfast
9:00-10:00 Keynote: "Why we are not winning the Security War," Dr. Richard Ford, Florida Institute of TechnologyTBA
10:00-10:30 p.m. Coffee Break
10:30-11:15 "Anti-worm Dynamics in Distributed Detection," John Mark Agosta, Intel
11:15-12:00 "Address Space Obfuscation to Tolerate Windows Code Injection Attacks," Dr. Tufan Demir, Security Lab, UC Davis
12:00-1:30 Buffet Lunch
1:30-2:00 "Current and Developing Issues in Information Security in the UK," Dr. Andrew Jones, BT Labs
2:00-2:45 "Creating a Model for Computer Network Pathway Analysis: Analogy from Cellular Regulatory Pathways," Prof. Sanjay Goel, NYS Center for Information Forensics and Assurance
2:45-3:15 "Resillience in Complex Systems," Prof. Dave Cliff, Large Scale Complex IT Systems Institute, UK
3:15-3:45 Coffee
3:45-4:30 "Knowledge Management and Social Networking," Dr. Eleanor Wynn, Intel
4:30-5:15 "The Orchids IDS System," Prof. Jean Goubault-Larrecq, École Normale Supérieure de Cachan
5:15-5:30 Discussion and Wrap-up