To previous page COSAC 2002: International Computer Security Audit and Control Symposium To next page
COSAC 2002 TIMETABLE

When viewing this section, any text in red indicates a clickable link
to either the "Bio" of the speaker, or to details of their session.


ARRIVAL - SUNDAY 8TH SEPTEMBER 2002

TIME DETAILS
1930 - 2000 Registration
1930 - 2000 Cocktail Reception hosted by Inforenz Ltd
2000 onward COSAC Welcome Dinner



MONDAY 9TH SEPTEMBER 2002 - COSAC MASTERCLASSES
Kindly sponsored by Computer Associates

TIME CODE SESSION DETAILS SPEAKER COMPANY
0930 - 1730 M1 The COSAC International Round Table Forum John O'Leary Computer Security Institute
0930 - 1730 M2 Intrusion Detection Dr E. Eugene Schultz Berkeley University
0930 - 1730 M3 How To Design Enterprise Security Architecture David Lynas COSAC Chairman
0930 - 1730 M4 "Pushing Security to the Limits..." Stan Dormer Ink-eMedia Ltd
0930 - 1730 M5 The Insider Threat: Standing On Your Own Foot Peter Wood First Base Technologies
0930 - 1730 M6 Investigating I.T. Fraud Richard Cascarino Compact Business Services
2000 onward     Ernst & Young Dinner



TUESDAY 10TH SEPTEMBER 2002

TIME CODE SESSION DETAILS SPEAKER COMPANY
0930 - 1000     Registration and Coffee
1000 - 1100 PS1 Breaking the DES Michael Wiener ....
1100 - 1130     Morning Coffee
1130 - 1230 A1 "What You Need to Know About Risk
(but They Won't Tell You)"
Jay Heiser UBS AG
B1 Denial is the Corporate Standard:
An Emergency Response Case Study
Krag Brotby E-Sec Corp
C1 Good Ciphers Are Not Enough Tony Sale Codes & Ciphers
1230 - 1400     Lunch
1400 - 1445 A2 Assuring New Business Systems:
Managing the Risks of Launching New Applications
John Sherwood QinetiQ TIM
B2 Windows XP Security Gene Schultz Berkeley University
C2 Whose Hole-In-The-Wall Is It Anyway? Richard Nealon
Andy Clark
- Bank of Ireland
- Inforenz Ltd
1450 - 1535 A3 Process Analysis:
What's that got to do with Security?
Stan Dormer Ink-eMedia Ltd
B3 Secure Content Hosting & eCommerce Application Architectures Simon Pascoe BTExact Technologies
C3 Steganography:
Drawing a Picture of a White Cat in a Snowstorm
Vince Gallo Inforenz Ltd
1535 - 1555     Afternoon Tea
1555 - 1640 A4 Getting it Right First Time
Governance in the Development Process
Gerry O'Neill Barclays PLC
B4 Benefits Realisation Management:
Making a Business Return from IS Security
Denis Kelly Power Genereration ESB
C4 Steganalysis:
Finding a Black Cat in a Coal Cellar
Vince Gallo Inforenz Ltd
1645 - 1745 PS2 "Not-so-secret Ins and Outs" Ray Kaplan Security Curmudgeon @ Large
1845 - 1945 PS3 Issues of the Day: Open Forum Facilitated by
David Lynas
COSAC Chairman
2000 - 2030     Cocktail Reception hosted by Information Security Solutions Ltd
2030 onwards      Information Security Solutions Ltd COSAC Gala Dinner



WEDNESDAY 11TH SEPTEMBER 2002

TIME CODE SESSION DETAILS SPEAKER COMPANY
0930 - 1000     Registration and Coffee (our thanks to QinetiQ Trusted Information Management who are sponsoring today's lunch and breaks.
    They are also our session VIP sponsor of the day
1000 - 1100 PS4 "The Building of Deep Thought 1" Nick Spenceley Inforenz Ltd
1100 - 1130     Morning Coffee
1130 - 1230 D1 Evidence Eliminators:
The Next Hurdle for Forensic Investigators
Andy Clark Inforenz Ltd
E1 Wireless LAN Security Ken Lindup Cylink
F1 A Large Scale 'Warts n All' Project Case Study in Three Words:
"Oh My God"
Cheryl Jackson Thrupoint Corporation
1230 - 1400     Lunch (kindly sponsored by QinetiQ Trusted Information Management)
1400 - 1445 D2 Cyber Crime & Internet Security:
Protecting Your Business & Your Customer
David Spinks EDS
E2 "Pass the Pringles" David Everett Datacard Group
F2 Customer Service for the Information
Security Professional
John O'Leary Computer Security Institute
1450 - 1535 D3 Information Warfare:
A Commercial Perspective
David Love Computer Associates
E3 Voice Communications Security in the
Midst of Network Convergence
Valene Skerpac iBiometrics Inc
F3 Firewalls to Firearms:
The Expanding Role of Enterprise Security Management
John Ceraolo CITRIX
1535 - 1555     Afternoon Tea
1555 - 1640 D4 Information Security & Privacy
in the Age of Terrorism
Mark Rasch Independent Consultant
E4 "Tomorrow's virus writer: Villain or Cyberhero?" Pete Simpson Clearswift Corporation
F4 The Information Security Hokey Kokey: Perils & Pitfalls of
Acquisition, Divestiture, Spin-offs, Partnerships & Outsourcing
Marcus Alldrick Abbey National
1645 - 1745 PS5 September 11th - One Year On
Lessons Learned
Carl Jackson QinetiQ TIM Inc
1845 - 1945 PS6 Issues of the Day:
Open Forum
Facilitated by:
John 'Leary
Computer Security Institute
2000 - 2030     Cockail Reception hosted by QinetiQ Trusted Information Management
2030 onwards     QinetiQ Trusted Information Management Dinner



THURSDAY 12TH SEPTEMBER 2002

TIME CODE SESSION DETAILS SPEAKER COMPANY
0930 - 1000     Registration and Coffee (our thanks to Ernst & Young who are sponsoring today's lunch and breaks.
    They are also our session VIP sponsor of the day
1000 - 1045 G1 Return on Investment Through Legal Duty of Care Ken Lindup Cylink
H1 Is the Internet Secure Enough for Financial Business? Norbert Bielefeld European Savings Bank Group
I1 "Protecting & Enabling Customer Propositions - A Business Reality" Patricia Anderson Royal Bank
of Scotland Group
1045 - 1100     Morning Coffee
1100 - 1145 G2 Can you Justify Security Spend? Aled Miles Symantec Europe
H2 "Web applications: Revenue Generator or Hackers Delight?" Michael Harris Ernst & Young
I2 "I.T. Security is Dead. Long Live Business Risk!" Gerry O'Neill Barclays PLC
1145 - 1200     Morning Tea
1200 - 1300 PS7 Vulnerability Analysis of Fingerprint Systems Professor
Tsutomu Matsumoto
Yokohama
National University
1300 - 1430     Lunch (kindly sponsored by Ernst & Young)
1400 onwards NETWORKING ACTIVITIES

This web site is designed and managed by didilogix.com
All content on this web site © 2001-2002 didilogix.com and COSAC
- All Rights Reserved -