11:50am–12:30pm Friday, 07/23/2010
DNSSEC has become critical to government and large corporate
infrastructure since the plans to sign the root zone and the US
governments DNSSEC mandate. But the technical requirements of DNSSEC
seem to remain clouded in relative obscurity. ISC's DNSSEC experts will walk you through the basics of DNSSEC and setting it up to serve your own network's signed zones.
1:30pm–5:00pm Monday, 07/19/2010
This tutorial explores new concepts in web security. After a solid grounding in well-known exploits, I'll demonstrate how traditional exploits are being combined together and with other technologies to launch sophisticated attacks that penetrate firewalls, target users, and spread like worms. I'll then discuss some ideas for the future to help you provide a better, more secure user experience.
10:40am–11:20am Thursday, 07/22/2010
Open source applications are consistently requested because they offer an impressive set of functionality at the right price point. However, when deploying these applications you must be aware that they can pose a grave threat to your security integrity. This presentation details the security game-changer that is open source and examines how to lash closed the security threats they can create.
9:10am–9:30am Tuesday, 07/20/2010
One of the hottest topics in cloud is security. But is much of the cloud security debate simply FUD or are there some real consequences of this change? How does cloud change traditional security models, can they they be re-used or is it back to the drawing board?
2:30pm–3:10pm Wednesday, 07/21/2010
You already use the open source Apache Tomcat servlet container to serve your web applications, and this presentation will show you how to secure your web application running on Tomcat. We'll cover security fixes that will give your web application production-ready security when running on Tomcat. Improve your web site's security through these best practice techniques.
Presented by: Brian Lavender
This presentation will review the techniques for using a Genetic Algorithm for the development of rules for use in a network intrusion detection system and the integration of these rules into the monitoring tool, nProbe written by Luca Deri.