[MNASIS-L] Computer Society - Information Security Seminar

Janet M. Arth arth at tc.umn.edu
Mon Sep 9 17:12:55 EDT 2002


          The Twin Cities IEEE Computer Society
                  Invites You to Attend:

          "A Seminar on Information Security"

               Saturday, September 21, 2002
                   8:30am until 4:00pm
                          at the
                   Radisson Hotel South
                      (I-494 and 100)
                  Minneapolis, Minnesota

To register: http://www.comp.tc-ieee.org/register.html
                 (or email the registration below)

Cost: $20 for full time undergraduate students
       $30 for Computer Society Members
       $35 for non-members

       Pay at the door, cash or check are gladly accepted.
       Sorry, we cannot process credit cards at this time.

Program Schedule:
      0830:0900 Registration
      0900:0915 Opening remarks and introductions
      0915:1015 G. Jelatis - Overview of Information Security Principles 
and Technologies
      1015:1030 break
      1030:1130 A. Odlyzko - Economics and Cryptography on the Internet
      1130:1230 lunch
      1230:1245 N. Clark   - IEEE PACE Presentation
      1245:1345 R. Smith   - Authentication Techniques
      1345:1400 break
      1400:1500 K. Wilson  - IS from a Small Business/Home User Perspective
      1500:1545 all        - Panel Discussion on IS topics
      1545:1600 Closing remarks and presentations

About the Presentations:
(Note: please check the Website for complete program details and
  speaker biographies)

The increased power and interconnectivity of computer systems available 
today means that Information Security has become one of the most crucial 
set of technologies in the computing industry.  Join us for this seminar 
where we will look at the latest research, results and ideas in Information 
Security from several perspectives.

-------------------------------------------------------------------
Overview of Information Security Principles and Technologies

Information systems and the Internet are, today, integral to business, 
pofessional and even many personal activities.  The flexibility and 
increased functionality they provide, however, expose our information 
resources to a dangerous world where threats are numerous and any 
vulnerabilities are likely to be exploited.  How can we take advantage of 
cutting-edge information and network technologies when the risk seems so 
great?  This talk will provide a brief overview of information security 
principles, threats and vulnerabilities, and the technologies that are 
available to reduce the risks of operating in such a dangerous environment.

George D. Jelatis is an information security architect and consultant.  He 
is a frequent speaker and lecturer on security topics, and a Certified 
Information Systems Security Professional (CISSP). He has provided 
information security consulting and design services to clients as diverse 
as universities, banks, health care providers, manufacturers, DoD 
contractors, DARPA and the US Air Force.

He was most recently the Director of E-business Initiatives and "security 
evangelist" for Secure Computing Inc, after several years as a security 
consultant and researcher.  His career has also included management of 
multi-national technical projects, research in distributed systems and 
local area network protocols, and both applications and systems programming.

He has been active in information security since IBM was known for 
mainframes, not PCs.  He even has fond memories of 80-column Hollerith 
punch cards and paper tape. He has a Bachelor of Physics and an MS in 
Computer Science, both from the University of Minnesota.

-------------------------------------------------------------------
Economics and cryptography on the Internet

Mathematical cryptography has provided a variety of interesting and 
important tools for e-commerce. The impact of these tools was widely 
expected to be revolutionary.  Yet so far, although some of these 
mathematical techniques do play a vital role, many of the early 
expectations have been disappointed.  The reason for this, which will be 
explored in this lecture, is that many of these tools conflict with the 
economic incentives that govern how e-commerce is conducted.

Andrew Odlyzko is Director of the interdisciplinary Digital Technology 
Center and an Assistant Vice President for Research at the University of 
Minnesota.  Prior to assuming that position in 2001, he devoted 26 years to 
research and research management at Bell Labs and AT&T Labs. He has written 
over 150 technical papers and has three patents.  He has managed projects 
in diverse areas, such as security, formal verification methods,
parallel and distributed computation, and auction technology.  In recent 
years he has also been working on electronic publishing, electronic 
commerce, and economics of data networks.

-------------------------------------------------------------------
An Overview of Authentication Techniques

Based on the book "Authentication: From Passwords to Public Keys," this 
talk looks at the practical benefits, drawbacks, strengths and weaknesses 
of today's authentication techniques. First we look at how to make the most 
out of password-based systems without overestimating their capabilities. 
Then we review the benefits and limitations of biometrics. Finally, we 
examine token-based techniques, including one-time password calculators, 
smart cards, and more sophisticated devices. For each technique we compare 
their resistance against attacks like trial-and-error guessing and  we 
examine practical aspects of user enrollment and day-to-day operation.

Dr. Rick Smith is a writer, lecturer, and consultant in information systems 
security. He has written two books: "Authentication: From Passwords to 
Public Keys" and "Internet Cryptography."  He also spent twelve years as a 
security architect, researcher, and software engineer at Secure Computing 
Corporation.  He is a Certified Information
Systems Security Professional (CISSP), a lecturer at St. Thomas University 
in St. Paul, Minnesota, and a contributing writer for Information Security 
magazine.

-------------------------------------------------------------------
Information Security from the Small Business/Home User Perspective

Kris Wilson is a private consultant.  He is a Virtual CIO for small 
business, specializing in computer systems and network installation, 
integration, and support.  He is a member and past chair of the Twin Cities 
IEEE Consultants Network.

-------------------------------------------------------------------
Panel Discussion on Information Security Technologies and Issues:

Join our speakers in a wide open discussion of issues, debates, and 
controversies in the Information Security field.  We will let the audience 
direct the discussion toward any areas if interest.
-------------------------------------------------------------------
Email registration:

Full name:              _____________________________
Organization:           _____________________________
Email address:          _____________________________
Phone:                  _____________________________
ACM/IEEE Member Number: _____________________________
Special Meal Request:   _____________________________

Please indicate which of the following applies:
   _____  IEEE Computer Society Member
   _____  IEEE Member
   _____  ACM Member
   _____  Full Time Undergraduate Student
   _____  Non-Member

Please complete and email to mailto:compsoc at tc-ieee.org on or
before Wednesday, September 18, 2002.  Register on the Web at:
http://www.comp.tc-ieee.org/register.html
Please register as it helps us to plan a successful event.

For further information on this and other upcoming Twin Cities
IEEE Events, see our web page at http://www.comp.tc-ieee.org/

If you've attended a recent CompSoc Event, please take a moment
to submit a feedback form at http://www.comp.tc-ieee.org/feedback.html/
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://mail.asis.org/pipermail/mnasis-l/attachments/20020909/a6e5b9a2/attachment.html 


More information about the MNASIS-L mailing list