ARCS - Agenda: Difference between revisions
From Santa Fe Institute Events Wiki
No edit summary |
No edit summary |
||
| Line 54: | Line 54: | ||
</tr> | </tr> | ||
</tr> | </tr> | ||
<td>12: | <td>12:00-1:30</td> | ||
<td>Buffet Lunch</td> | <td>Buffet Lunch</td> | ||
</tr> | </tr> | ||
Revision as of 17:39, 29 September 2006
| Workshop Navigation |
| TIME | ACTIVITY |
| Tuesday, October 31 | |
| 6:00-7:30 p.m. | Informal Welcome Reception, La Fonda Hotel |
| Wednesday, November 1 | |
| 8:15-8:45 a.m. | Registration and Continental Breakfast |
| 8:45-9:00 | Welcome & Introductory Remarks, Geoffrey West, Santa Fe Institute |
| 9:00-10:00 | Keynote: "Shadows of Cyberspace Revisited: A Ten Years Retrospective on Cyber-Crime and Cyber Security from 1996 to 2006," Richard Power |
| 10:00-10:30 | Coffee Break |
| 10:30-11:15 | TBA, Christian Renaud, Cisco Systems |
| 11:15-12:00 p.m. | An Adaptive System to Build Trust of Remote Email Agents, Hong Li, Intel Research Group |
| 12:00-1:30 | Buffet Lunch |
| 1:30-2:15 | Self-Organizing Defense Systems, Fabrice Saffre, BT Labs |
| 2:15-3:00 | Security in US Defense Networks, Col. Carl Hunt, IDA |
| 3:00-3:30 | Coffee Break |
| 3:30-4:30 | Virus Writers, Sarah Gordon, Symantec |
| 4:30-5:00 | Round table discussion & Adjourn |
| 6:00-7:30 | Reception and Dinner, Santa Fe Institute |
| Thursday, November 2 | |
| 8:15-9:00 a.m. | Continental Breakfast |
| 9:00-10:00 | Keynote: "Why we are not winning the Security War," Dr. Richard Ford, Florida Institute of Technology |
| 10:00-10:30 | Coffee Break |
| 10:30-11:15 | Anti-worm Dynamics in Distributed Detection, John Mark Agosta, Intel |
| 11:15-12:00 p.m. | Address Space Obfuscation to Tolerate Windows Code Injection Attacks, Tufan Demir, Security Lab, UC Davis |
| 12:00-1:30 | Buffet Lunch |
| 1:30-2:00 | Current and Developing Issues in Information Security in the UK, Andrew Jones, BT Labs |
| 2:00-2:45 | Creating a Model for Computer Network Pathway Analysis: Analogy from Cellular Regulatory Pathways, Sanjay Goel, NYS Center for Information Forensics and Assurance |
| 2:45-3:15 | Resillience in Complex Systems, Dave Cliff, Large Scale Complex IT Systems Institute, UK |
| 3:15-3:45 | Coffee |
| 3:45-4:30 | Knowledge Management and Social Networking, Eleanor Wynn, Intel |
| 4:30-5:15 | The Orchids IDS System, Jean Goubault-Larrecq, École Normale Supérieure de Cachan |
| 5:15-5:30 | Discussion and Wrap-up |
