DEEP KNOWLEDGE SECURITY CONFERENCE

28th september 2005

 

08.00

Registration

09.00

Keynote Address: Internet Explorer Security: Past, Present, and Future

Tony Chor Group Program Manager, Microsoft Internet Explorer, Microsoft Corporation

10:30  

Refreshment Break

 

 

TECHNICAL TRACK

BUSINESS-TECH TRACK

11:00

 

Assessing Server Security - State of the Art

Roelof Temmingh, Founder, Sensepost

 

12:00

Networking Luncheon

13:00

 

STIF-ware Evolution

Meder Kydyraliev and

Fyodor Yarochkin, Co-Authors, X-Probe)

Project Blinkenlights / Arcade

Tim Pritlove (Chaos Computer Club)  

14:00

VoIPhreaking: How to make free phone calls and influence people

The grugq, Independent Anti-Forensics Specialist

How (and Why) to Build a Security Operations Center

Mohammed Haron, Information Security Analyst, Intel Corporation

15:00

Web Hacking Kung-Fu and Art of Defense

Shreeraj Shah, Director

Net-Square Solutions

Corp vs Corp: Profiling Modern Espionage

Roberto Preatoni, Founder Zone-H Defacement Mirror and Fabio Ghioni

16:00

Refreshment Break

16:30

Hacking Windows CE

San, X-Focus China

 

Social Engineering Fundamentals

Anthony Zboralski (Gaius), Founder Hackers Emergency Response Team (HERT) & Dave Mckay, Independent Security Consultant

17:30

Hide-And-Seek: Defining the Roadmap for Malware Detection on Windows

Joanna Rutkowska, Founder, Invisiblethings.org

 

18:30

End of Day One

 

DEEP KNOWLEDGE SECURITY CONFERENCE

29th september 2005

 

08.00

Registration

09.00

Keynote Address: Mobile Malware

Mikko Hypponen, Director of Anti Virus Research, F-Secure Corp.

10:30  

Refreshment Break

 

 

TECHNICAL TRACK

BUSINESS-TECH TRACK

11:00

 

Nematodes - Beneficial Worms

Dave Aitel (Immunity Inc)

 

12:00

Networking Luncheon

13:00

 

Analyzing all that data: Techniques for sifting haystacks and finding needles.

Dr. Jose Nazario, Senior Software Engineer  Arbor Networks 

Cyber Skirmishes

Zubair Khan, Independent Security Consultant

 

14:00

Wi-Fi Hotspot Security

Jim Geovedi Information Security Consultant PT Bellua Asia Pacific.

Phishing Attacks: A Guide to Self Assessment

Aaron Higbee, Principal Consultant, Foundstone, a division of McAfee,Inc.

15:00

Kernel Level Vulnerabilities

Swaraj, Suresec UK

Hacking Internet Banking Applications

Fabrice Marie, Manager, FMA-RMS

16:00

Refreshment Break

16:30

Analyzing Code for Security Defects

Nish Bhalla, VP Consulting Solutions, Security Compass

x.25 (in)security in 2005: WHAT, WHY, WHEN, WHO, HOW

Raoul Chiesa, Telecom Security Task Force (TSTF)

17:30

Java & Secure Programming

Marc Shoenefeld, Freelance Network Security Consultant

Trends in Real World Attacks: A Compilation of Case Studies

Rohyt Belani Director, Red Cliff Consulting

18:30

End of Day Two

:: Return to conference page ::