Tuesday, April 8
10:00 a.m. - 12:30 p.m. Pre-Event Sessions: Faculty Presentations and Demos - to run concurrently
Stewart Center, Room 314
10:00 - 10:25 Christian F. Hempelmann - Demo
Natural Language Information Assurance and Security
10:30 - 10:55 Pascal Meunier - Demo
Demonstration of Vulnerability Management with the ELISA System
11:00 - 11:25 Mikhail Atallah - Presentation
Secure Supply Chain Protocols
11:30 - 11:55 Christopher Clifton - Presentation
Secure Distributed Data Mining
12:00 - 12:25 Carla Brodley - Presentation
What Data Mining Currently Can and Can't Do for Intrusion Detection
Stewart Center, Room 322
10:00 - 10:25 Kihong Park - Demo
Scalable Denial of Service Attack Prevention on the Internet
10:30 - 10:55 Gregg Gunsch - Presentation
Outsourcing Information Technology and The Insider Threat
11:00 - 11:25 Bharat Bhargava - Presentation
Detecting Service Violation in Internet and Mobile Ad hoc Networks
11:30 - 11:55 Melissa Dark - Presentation
Information Security Awareness, Training, and Education; A Look at the CERIAS Programs
12:00 - 12:25 p.m. Pascal Meunier - Demo
Matching Faculty, Students and Industry for Grants, Internships, Assistantships, Fellowships and other opportunities with the CERIAS INFORMS system
Lunch break On Own
Purdue Memorial Union, South Ballroom
1:30 Welcome and State of the Center
1:30 - 4:00 Poster Session
4:00 - 6:00 Symantec Award Reception
Dinner break On Own
Krannert Auditorium
7:30 Keynote Speaker
Lance Hoffman, Distinguished Research Professor of Computer Science at The George Washington University

From Walk-Through Computers to Implantable Computers: Lessons Learned from Dealing with Security and Policy Issues

We examine computer security research and education from the creation of the first computer security courses in universities (in the 1970s), through religious debates (Proofs of Correctness Considered Harmful) and true innovations (public key cryptography) to the present day, where we are starting to spend a lot of money without knowing where we want to end up, or how best to get there.

Will wearable, trackable computers lead to a Big Brother society, where many people and things are always on? Will technology innovation continue to outpace the law, thus dooming security practitioners to always occupy uncomfortable positions? What are the sleeperresearch areas with big payoffs, and are we educating people the right way to work in them?

How can we as a field and as individuals make a difference in shaping this future? And who is doing this already, in Washington and elsewhere?

This talk will address these questions and try to give some initial answers.

Wednesday, April 9
Stewart Center, Room 218
8:00 a.m. Continental Breakfast
8:30 Welcome
9:00 - 10:15 Panel Session 1: CERIAS Affiliates
10:30 - 11:30 Panel Session 2: Computer Forensics
North Ballroom, Purdue Memorial Union
11:45 - 1:15 Lunch
Speaker: Carl Landwehr, Program Director for Trusted Computing, National Science Foundation
Stewart Center, Room 218
1:30 - 2:30 Panel Session 3: The Social Shaping of Technology
2:45 - 3:45 Panel Session 4: Valuing Infosec within Organizations
4:00 - 5:30 Roundtable Discussion
Freedom to Teach, Freedom to Learn: Information Security as a Sensitive Topic.
Moderator, Gene Spafford
Some national authorities are increasingly concerned about potential terrorists posing as students so as to study sensitive topics. The recent arrest of a Saudi citizen for alleged terrorist activities while studying for his PhD at one of the NSA's Center of Excellence schools is cited by some as justification for these concerns. Meanwhile, scholars are increasingly concerned about the negative impact such restrictions will have on academic freedom and our ability to conduct advanced research. Faculty at some major universities and leaders of scientific societies issued statements voicing their concerns with new visa and research restrictions.
Krannert Auditorium
5:45 - 7:00 Keynote Speaker
Speaker: Howard Schmidt, Acting Chair, President's Critical Infrastructure Board, Special Advisor to the President for Cyberspace Security (Acting)

Securing our critical infrastructures includes protecting our computing and communications enterprises. Recently, the White House released a report recommending strategy to protect these enterprises. Building on input provided by experts in government, industry, and academia, the report discusses 5 priorities for action.

In this talk, Mr. Schmidt will discuss the report, needed steps to carry out the recommendations, and some of the initial results obtained since the release of the report. In particular, Mr. Schmidt will discuss some of the role of academic centers of expertise, such as CERIAS at Purdue, can play in these critical tasks.