From: “William H. Geiger III” <whgiii@invweb.net>
To: cypherpunks@einstein.ssz.com
Message Hash: e430b0b17d7f71bf632df0f16bc43744f184df63f8c5b41180c56554c744b437
Message ID: <199801230522.AAA07920@users.invweb.net>
Reply To: N/A
UTC Datetime: 1998-01-23 05:12:31 UTC
Raw Date: Fri, 23 Jan 1998 13:12:31 +0800
From: "William H. Geiger III" <whgiii@invweb.net>
Date: Fri, 23 Jan 1998 13:12:31 +0800
To: cypherpunks@einstein.ssz.com
Subject: Re: 10th FIRST
Message-ID: <199801230522.AAA07920@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain
-------------------------------------------------------------------------
The following message is forwarded to you by "William H. Geiger III"
<whgiii@invweb.net> (listed as the From user of this message). The
original sender (see the header, below) was Vicente Garcia
<vggarcia@campus.mty.itesm.mx> and has been set as the "Reply-To" field of
this message.
-------------------------------------------------------------------------
>From: Vicente Garcia <vggarcia@campus.mty.itesm.mx>
>Newsgroups: comp.security.pgp.resources
>Subject: 10th FIRST
>Date: Tue, 20 Jan 1998 18:38:39 -0600
>Organization: ITESM Campus Monterrey . DINF-DTCI
>Lines: 371
>Message-ID: <34C5438D.F8F99029@campus.mty.itesm.mx>
>NNTP-Posting-Host: vangelis.mty.itesm.mx
>Mime-Version: 1.0
>Content-Type: text/plain; charset=us-ascii
>Content-Transfer-Encoding: 7bit
>X-Trace: news.mty.itesm.mx 885343029 6704 (None) 131.178.17.111
>X-Complaints-To: news@news.mty.itesm.mx
>X-Mailer: Mozilla 4.01 [en] (Win95; I)
>X-Priority: 3 (Normal)
>Path: edison.dotstar.net!pull-feed.internetmci.com!opus.ies-energy.com!news.cs.utwente.nl!cosy.sbg.ac.at!wuff.mayn.de!Cabal.CESspool!bofh.vszbr.cz!cpk-news-hub1.bbnplanet.com!news.bbnplanet.com!cs.utexas.edu!news.uh.edu!news.mty.itesm.mx!not-for-mail
-----BEGIN PGP SIGNED MESSAGE-----
*************************************************************
* *
* Forum of Incident Response and Security Teams (FIRST) *
* *
* Tenth Annual Computer Security Incident Handling Workshop *
* *
* Monterrey, Mexico *
* *
* Monday 22-Jun-1998 to Friday 26-Jun-1998 (inclusive) *
* *
*************************************************************
C A L L F O R P A P E R S
Submission Deadline: January 15, 1998
"The challenges of incident handling in a diverse world"
The Forum of Incident Response and Security Teams (FIRST) was formed in
November 1990 to address the problem of an ever increasing number of
computer and network security related incidents, affecting thousands of
systems around the world. The forum is made up of government, private and
academic Computer Security Incident Response Teams from around the world.
Its primary goal is to coordinate the efforts of its members in order to
increase both their individual and collective effectiveness.
The annual Incident Handling Workshop is part of FIRST's ongoing
educational
program, which is aimed at increasing the general awareness of security
issues and improving expertise when handling computer security incidents.
Specific security problems can affect many individuals and organizations
around the world, possibly involving many different technological
environments. Each of the parties involved must tailor its actions to the
context in which the problem is experienced. Factors which must be taken
into account include:
* Cultural: The way in which a problem is tackled can be highly
influenced
by the historical development of the community in question. Examples
are the ability for open communication about problems or values
regarding
privacy.
* Professional: Today the Internet is open to the masses. The ease of
communication, the advent of electronic commerce, and the
availability of
information, makes it a playground and a library for the masses. It is
also a key business tool which professionals depend upon.
* Political: Political decisions of individual countries concerning key
areas of computer security, e.g. restrictions in the use and export of
cryptological technology, may change the way that security problems
must be approached. Legalities pertaining to diverse use of computer
systems vary widely between countries.
* Technological: Different technologies, covering a wide spectrum that
includes mainframes, unix workstations, personal computers and network
computers are connected to the same network simultaneously.
Who should attend?
__________________
All those responsible for any aspect of computer security management will
benefit from attending this workshop. This includes both members and
non-members of FIRST, law enforcement officials, computer security
incident
response teams, as well as consultants, contractors, vendors and
individuals
involved in the use, maintenance or planning of computer systems.
Why attend?
___________
The character of the Internet is changing rapidly. Not only has the
commercial community discovered new possibilities offered by "direct"
marketing and advertisement. Governmental and non-academic organizations
have also turned their attentions to the potential of the Internet.
Incident Handling must adapt to the changing user base of the Internet.
In addition to the opportunity for those involved in computer security to
get together and discuss all aspects of the subject, the workshop will
provide the opportunity to listen to experts in the fields of computer
security incident response and vulnerability analysis. They will share
their
valuable expertise by speaking about their experience in dealing
successfully
with the coordination of incidents traversing international boundaries,
highlighting particular problems where appropriate.
There is no other workshop dedicated to this topic in the world.
Important Dates:
________________
Abstract/Proposals Due: January 15, 1998
Authors Notified: February 10, 1998
Full Materials for Proceedings Due: April 1, 1998
Format of the workshop:
_______________________
The first day is allocated for parallel tutorial style presentations. The
remaining four days will consist of conference paper and workshop style
presentations, as well as FIRST business sessions. One evening is
allocated
for participants to hold events devoted to subjects of particular interest
("birds of a feather" sessions).
All events will be selected to further the objectives of FIRST and its
members. They may involve topics such as computer security incident
handling,
team and incident response coordination, tools, international issues, or
work in progress.
A list of example topics can be found at the end of this announcement.
Contributions should follow the following guidelines:
Tutorials: Half or full day tutorial proposals will be considered.
Papers: Written papers may be as long as desired, but
presentations
must be limited to 30 minutes.
Workshop: These informal sessions should either follow a more
"hands-on" approach or provide for a high degree of
audience participation. They should be tailored to address
specific issues and should be from 60 to 90 minutes
in duration. Panel Sessions on a particular topic are
acceptable.
Submission information:
_______________________
Submissions should include an abstract, proposed length and single page of
notes describing the content and style of the presentation. Special
audio/visual requirements (other than one microphone and one overhead
projector) should be described. Panel session proposals should include a
list of panelists who have agreed to participate. Submissions should be
sent to the contact address given at the end of this document. The
preferred submission mechanism is via electronic mail in ASCII, HTML or
PostScript formats. Submissions via Facsimile transmission or the postal
service will, however, be accepted. Submissions must be received by the
January 15, 1998. Submissions received after this date may not be
considered for inclusion in the program.
Please use the appended form for your submissions.
Authors will be notified by the February 10, 1998 of the status of their
presentation (accepted/rejected). The final version of the material used
for the presentation (overheads, papers, slides) must be delivered to the
organizers by the April 1, 1998 for inclusion in the proceedings.
Email:
______
Please use the email address first-pc98@first.org for submissions or
questions regarding the call for papers.
WWW:
____
The Workshop WWW page is accessible from the FIRST webserver:
http://www.first.org/workshops/1998/
Program Committee:
__________________
Wolfgang Ley, DFN-CERT, Germany (Program Chair)
Brian Dunphy, ASSIST, USA
Eric A. Fisch, Trident Data Systems, USA
Eric Halil, AUSCERT, Australia
Stephen Hansen, Stanford University, USA
Ahmet Koltuksuz, IZMIR Inst. of Technology, Turkey
Sherman O. Loges, Boeing, USA
Paul Mauvais, CIAC, USA
Fran Nielsen, NIST, USA
Steve Romig, Ohio State, USA
Roger Safian, Northwestern University, USA
Miguel J. Sanchez, SGI, USA
Sandy Sparks, CIAC, USA
Don Stikvoort, CERT-NL, Netherlands
Wietse Venema, TU Eindhoven, Netherlands
Mark Zajicek, CERT Coordination Center, USA
Conference Location:
____________________
Monterrey, Mexico
Dates:
_____
Mon June 22, 1998 - tutorials (parallel streams)
Tue June 23, 1998 to Fri June 26, 1998 (workshop).
Conference Host:
________________
Instituto Tecnologico y de Estudios Superiores de Monterrey (ITESM),
Mexican CERT (MxCERT). The workshop is sponsored by First.Org Inc.
Contact Information:
____________________
Electronic Mail: first-pc98@first.org
Postal Address: Attn: Wolfgang Ley
DFN-CERT
Univ. of Hamburg
Vogt-Koelln-Str. 30
22527 Hamburg
Germany
Facsimile: +49 40 5494 2241
Subject: FIRST 1998 Workshop
Example Topics (other topics may be considered):
Dealing with the increasing diversity in all areas
International Legal Issues
Legal and Administrative Issues in Incident Handling
Coordinating International Incidents
Incident Handling and the Internet
Security on Large Networks other than the Internet
How to Protect an Incident Response Team Site
Interviewing/Hiring Incident Response Team Staff
Outsourcing an Incident Response Team
Vulnerability/Advisory Processes
New Tools for Incident Handling
Statistic Tools
Informational Resources
Programming Securely
Preventing Incidents
Intrusion/Vulnerability Detection Tools
System/Network Monitoring Tools
The Changing Nature of the "hack"
Internet Service Providers and Security
Vendor Session
Collecting Evidence
===========================================================================
ABSTRACT / PROPOSAL SUBMISSION SHEET
FIRST 1998
Name __________________________________________________________
Address __________________________________________________________
__________________________________________________________
__________________________________________________________
Phone ____________________ Fax _______________________
E-mail ____________________ URL _______________________
Title of Presentation ____________________________________________
Presentation Type ( please tick one )
( ) Paper ( ) Half-day Tutorial
( ) Workshop ( ) Full-day Tutorial
( ) Panel
Presentation Length (in minutes) ______
Presentation Media Requirement (other than one overhead projector and
a microphone):
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
Abstract ( 75-100 words )
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
FIRST is granted an non exclusive right to copy and redistribute
conference material including the submissions of the author(s). This
includes possible distribution on a conference CD and/or the FIRST
website.
Brief Biography ( 50-75 words )
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
-----BEGIN PGP SIGNATURE-----
Version: 2.6.2i
iQCVAwUBNHit6QQmfXmOCknRAQFQQQP6Ao1CYieDoeHK1BFqypC6QjVKXeNLEjY+
jq2HgNBSvxuysHH1fNnqNxMRJSHWyFw+yEJJk3TFXL6tyIOIojbfnzH88crtdMah
yzMYZL+APdTf3JppF8ipeIO8HygwMVt/BuRtW7JUCPvN5b7Vj1jDfc8pqOE786np
eAExY1mgrSk=
=LqxA
-----END PGP SIGNATURE-----
--------------------------------------------------------------------
MR/2 PGP Signature Check 22 Jan 1998 22:58:34
--------------------------------------------------------------------
Key matching expected Key ID 8E0A49D1 not found in file 'pubring.pgp'.
WARNING: Can't find the right public key-- can't check signature
integrity.
--------------------------------------------------------------------
MR/2 PGP Signature Check [Secondary Keyring] 22 Jan 1998 22:58:34
--------------------------------------------------------------------
WARNING: Bad signature, doesn't match file contents!
Bad signature from user "Wolfgang Ley, DFN-CERT <ley@cert.dfn.de>".
Signature made 1997/11/23 22:28 GMT using 1024-bit key, key ID 8E0A49D1
WARNING: Because this public key is not certified with a trusted
signature, it is not known with high confidence that this public key
actually belongs to: "Wolfgang Ley, DFN-CERT <ley@cert.dfn.de>".
PGPRC=1
PGPRC2=1
-----------------------------------------------------
-- End of forwarded message
-----------------------------------------------------
--
---------------------------------------------------------------
William H. Geiger III http://users.invweb.net/~whgiii
Geiger Consulting Cooking With Warp 4.0
Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html
---------------------------------------------------------------
Tag-O-Matic: The sad thing about Windows bashing is it's all true.
Return to January 1998
Return to ““William H. Geiger III” <whgiii@invweb.net>”
1998-01-23 (Fri, 23 Jan 1998 13:12:31 +0800) - Re: 10th FIRST - “William H. Geiger III” <whgiii@invweb.net>