Annual Computer Security Applications Conference (ACSAC) 2012

At-a-Glance Program

Monday, 3 December
07:30–08:30Breakfast
08:30–12:00M1: Authentication & Authorization Standards for the Cloud
 M3: Keeping Your Web Apps Secure: The OWASP Top 10 & Beyond
 M5: Contemporary Cryptography
 TF1: Tracer FIRE – Adversarial-based, Defensive Forensics Situational Awareness Exercise
 Layered Assurance Workshop (LAW)
12:00–13:30Lunch
13:30–17:00M2: Software Security Requirements Engineering
 M4: Security Metrics and Risk Analysis of Enterprise Networks: Techniques and Challenges
 M5: Contemporary Cryptography
 TF1: Tracer FIRE – Adversarial-based, Defensive Forensics Situational Awareness Exercise
 Layered Assurance Workshop (LAW)
 
Tuesday, 4 December
07:30–08:30Breakfast
08:30–12:00T6: Sophisticated Steganography
 T7: Software Assurance Methods in Support of Cyber Security
 T9: Windows Digital Forensics and Incident Response
 TF2: Tracer FIRE – Adversarial-based, Defensive Forensics Situational Awareness Exercise
 Cloud Computing Workshop (CCW)
 Layered Assurance Workshop (LAW)
12:00–13:30Lunch
13:30–17:00T6: Sophisticated Steganography
 T8: Systems Resilience and Metrics: A Cyber Security Perspective
 T9: Windows Digital Forensics and Incident Response
 TF2: Tracer FIRE – Adversarial-based, Defensive Forensics Situational Awareness Exercise
 Cloud Computing Workshop (CCW)
 Layered Assurance Workshop (LAW)
18:00–20:00Reception
 
Wednesday, 5 December
07:30–08:30Breakfast
08:30–08:45Welcome Session
08:45–10:00Distinguished Practitioner Keynote
10:00–10:30Break
10:30–12:00Web Security
 Case Studies 1
 Panel: The Future of Application Trustworthiness
 TR1: Cybersecurity in the Acquisition Process: The Transformed Lifecycle Risk Management Process
12:00–13:30Lunch
13:30–15:00Mobile Security
 Hardware Security
 Panel: Growing the Skills Required for Trustworthy Software
 TR1: Cybersecurity in the Acquisition Process: The Transformed Lifecycle Risk Management Process
15:00–15:30Break
15:30–16:30Passwords
 Botnets
 Panel: The NSPW Experience
 TR1: Cybersecurity in the Acquisition Process: The Transformed Lifecycle Risk Management Process
16:30–16:45Short Break
16:45–17:45Works-in-Progress
 TR1: Cybersecurity in the Acquisition Process: The Transformed Lifecycle Risk Management Process
17:45–18:45Classic Book Keynote
19:15–22:00Conference Dinner
 
Thursday, 6 December
07:30–08:30Breakfast
08:30–08:45Opening Remarks
08:45–10:00Invited Essayist Keynote
10:00–10:30Break
10:30–12:00Authentication
 Code Analysis Techniques
 Case Studies 2
 TR2: Security and Privacy Controls for Federal Information Systems and Organizations, NIST SP 800-53 Revision 4
12:00–13:30Lunch
13:30–15:00Cloud Security
 Intrusion Detection
 Panel: Software Assurance Technology Gaps
 TR3: Risk Assessment using NIST SP 800-30 and SP 800-39
15:00–15:30Break
15:30–16:50Policy
 Protection Mechanisms
 Panel: Security and Privacy: Are they Two Sides of the Same Coin?
 TR3: Risk Assessment using NIST SP 800-30 and SP 800-39
16:50–17:00Short Break
17:00–18:00Industry Keynote
18:15–21:00Reception and Poster Session
 
Friday, 7 December
07:30–08:30Breakfast
08:30–10:00Malware Analysis and Classification
 Software Security
 TR4: Continuous Assessment
10:00–10:30Break
10:30–12:00Social Networking Security
 Systems Security
 "On The Horizon" Panel
12:00–12:30Closing and Awards
12:30–17:15Free Time
17:30–19:30Social Event: Cirque du Soleil's "La Nouba"

 

Powered by OpenConf®
Copyright ©2002-2012 Zakon Group LLC