Vital to the Nation’s security and everyday life, the information
technology (IT) infrastructure of the United States is highly vulnerable
to disruptive domestic and international attacks, the President’s
Information Technology Advisory Committee (PITAC) argues in a new
report. While existing technologies can address some IT security
vulnerabilities, fundamentally new approaches are needed to address the
more serious structural weaknesses of the IT infrastructure.
Call for Papers
The 5th Annual Digital Forensics Research Workshop
DFRWS 2005
August 17-19, 2005
New Orleans, LA
IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference on Security Management, Integrity, and Internal Control in Information Systems
December 1-2, 2005
Fairfax, Virginia
21th Annual Computer Security Applications Conference
December 5-9, 2005
Tucson, Arizona
ARDA Exploratory Program Seeking Workshop Proposals
CALL FOR PAPERS
SECURECOMM 2005
First International Conference on Security and Privacy for
Emerging Areas in Communication Networks
Aug/Sept. 2005
Location: Athens, Greece
www.securecomm.org
By request, the deadline for the IEEE WETICE Security Technologies for Collaborative Architectures (STCA) Workshop has been extended to February 25th, 2005.
IIT’s 3rd Annual Computer and Network Security Workshop
Planning phase and registration online at http://www.cpd.iit.edu/netsecure05
The Norwich University Journal of Information Assurance (NUJIA) was created by
Norwich University to fill an essential function in the field of information assurance, specifically, to publish peer-reviewed articles on practical aspects of information assurance. The mission of the NUJIA is to advance understanding within the information assurance field by publishing original, high-quality, practical research into the management of information assurance.
Abstracts Due Feb. 7
Conference April 27-28
http://www.homelandsecurityresearchconference.org/