PROGRAM
LOCATION
REGISTRATION/FEES
CONTACT
IMPRINT
CONFERENCE PROGRAM PRESENTATIONS SPEAKERS SPECIALS
IT-DEFENSE
 
     
 
PRESENTATIONS – IT-DEFENSE 2004
 

These noted security experts will discuss current IT security issues and provide an insight into strategy and security concepts during two conference days.

Following the Money or - Why Security has so Little to do With Security
Bruce Schneier
The strangest thing about security is how little it has to do with security. Why did firewalls succeed in the marketplace when e-mail encryption failed? Why don't companies regularly install patches? Why is software of such poor quality? The reasons have little to do with security, and everything to do with the incentives of the players involved. Economics, politics, laws, even social constraints matter much more than security concerns. This talk attempts to peel back the security talk and explain what really goes on when someone makes a security decision. The results might surprise you.

Spies, Lies and Audiotape
James Bamford
The United States and Britain are engaged in a war based largely on phony intelligence. How could this happen? Where were the checks and balances? What was real and what was not? How much was the intelligence politicized? As the United States fights its war on terrorism and looks to other possible conflicts, such as in Iran and North Korea, it is critical that intelligence not be misused and manipulated. But is this possible with a White House determined to go to war?

Protecting Databases
Aaron Newman
This presentation addresses some of the most overlooked topics on database security and presents a view of the database from a hacker's perspective. It also focuses on generic attacks as well as those specific to Oracle, Microsoft SQL Server, Sybase, and DB2. We will be performing some live attacks and discussing how to prevent this from happening to you.

Honeypots: The Latest Advances
Lance Spitzner
Over the past several years, honeypots have demonstrated their tremendous potential as a new security technology. Not only do they have dramatic detection capabilities, but can also be used for information gathering, incident response, and targeting the insider threat. Lance Spitzner will cover in this presentation the latest developments in honeypots, and what to expect in the next 6 to 12 months.

Real-time Network Awareness
Martin Rösch
One of the inherent issues with traditional intrusion detection systems is that a fundamental lack of information leads to a great deal of
ambiguity sensors operate with virtually no knowledge of the composition of the network components that they are defending. Mr. Roesch will discuss the truth about implementing an intrusion detection system and what problems usually occur, like evasion, insertion & denial of service. He will illustrate his concept of the “contextual vacuum” and how current systems are
flawed. Solutions are then offered by defining the parameters for improving IDS with full understand of the network and that results in higher quality data.

Advanced Network Reconnaissance Techniques
Fyodor
Fyodor will present real-life examples of common network and firewall configurations, then demonstrate practical techniques for exploring and mapping those networks. He will cover IDS evasion, "phantom ports", advanced ping sweeps, service/version detection, firewall circumvention, DNS hackery, IPv6, and more using his free Nmap scanner and many other Open Source tools.

Trusted Computing - Threat to IT security and free competition?
Rüdiger Weis
With an investment of several hundred million euros, Microsoft and the "Trusted Computing Group" are planning the most fundamental changes to IT infrastructure since the introduction of the personal computer.
A scientific analysis of these recommendations, however, reveals no significant increase in security, particularly when seen against the overall existing worm and virus epidemics, but a range of new thread scenarios. In addition, there are now a number of justifiable fears among European governments and industry representatives that the control of cryptographic keys by U.S. companies and the extremely confusing patent situation could lead to significant competitive disadvantages particularly for small and medium companies.

How is security created in business?
Dr. Rudolf Kreutzer
What is meant by security in a company?
How to enable "normal" security in a company?
How is security created in a data center?
Under what conditions is no security possible?
What really makes companies fail?
What makes companies successful?
How can you recognize signs of future failure?
How can failures be prevented?
What new crucial points are developing in risk management?
What are the most important key competencies for future risk managers?

Lawful Interception of IP: The European Context
Jaya Baloo
Lawful Interception (LI) is currently in development internationally and the area of IP interception poses significant regulatory, as well as implementation, challenges. The presentation attempts to elucidate major legal and technical issues as well as citing the vendors, operators and governments involved in creating the standards and solutions.
In the European context, all EU countries have been mandated to have LI capabilities in place and be able to provide assistance to other member states when tracking transborder criminals. Public Communications Providers must tread warily between privacy concerns and LI requirements. Especially with the new talks concerning Interpol, Enfopol, & Data Retention, communication over public channels is anything but private. The conditions for interception and the framework for oversight are not widely known.
As LI in Europe presents an example for the rest of the world attention should be given to the changing face of EU legislation. This is relevant not only to the EU expansion but also concerns EU influence over her eastern and western allies.

Alert, Warning and Response
Volker Kozok
Regarding the changing situation of threat it becomes more and more important to cooperate nationally and internationally in the defence of attacks on critical information structures. In future clashes, not only military aims will be threatened. Increasingly, infrastructures of ministrys, offices, national organisations and the civil sector will be under attack. Based on an initiative of NATO, 5 nations have joined to drive forward the development of “Alert, Warning and Response” processes together with civil partners.
The lecture shows the necessity of national and international cooperation in the defence and analysis of attacks, the planning and coordination of incident management and the continuing discussion on critical infrastructure.
It closes with a summary of the central challenges and points out the necessity of a standardized alarming system for both civil and military sectors against networkbased attacks.

The Relationships between Hackers and Spammers
John Draper
The talk will focus on the relationships between hackers and spammers and how the two technology's are merging together to bring new and troubling future threats to the internet.
The speaker will also be providing some interesting trends on how spam is spread, how it correlates with the release of viruses in the wild and how these viruses are now so flexible they can pass any payload to un-suspecting systems without leaving a trace, setting up spam proxies and other hacker friendly trojans.

 

top