Annual Symposium on Information Assurance >> ASIA
Navigation Menu ASIA Main Page Call for Papers Organizing Committee Symposium Proceedings Best Paper Awards Keynote Speakers Author/Presenter Information Reviewers NYS Cyber Security Conference Directions & Parking Accomodations OCS Website UAlbany Business Website Pictures Contact Us Want to Sponsor? End of Menu Facebook Twitter Years for Selection: 2006 - 2007 - 2008 - 2009 - 2010 - 2010 - 2011 - 2012 - 2013

Billy Rios, Microsoft Corporation

Biography: Billy is currently a Security Engineer for Microsoft, helping secure software used by millions of people across the world. Before his current role as a Security Engineer, Billy was a Senior Security Consultant for VeriSign, where he broke into the information systems of various clients in the Fortune 500 and helped them understand existing and emerging security risks. Before his life as a consultant, Billy helped defend Department of Defense networks as an Information Assurance Analyst. He looked at packets, monitored for suspicious network activity, took apart malicious code, and formally reported network and security incidents of all shapes and sizes. Before attacking and defending networks, he was an active duty Marine Officer (Semper Fi!). Billy spent some time in a hot desert, carried a side arm (sometimes a machine gun), and got real up-close and personal with physical and operational security… Billy has an undergraduate degree in Business (with a formal concentration in Information Systems) from the University of Washington and a M.S. Degree in Information Systems (with Distinction) from Hawaii Pacific University. Billy is currently pursing his MBA at Texas A&M (Commerce).

Phishing Underground: A New Look at an Old Problem
Abstract: This talk will expose the tools and tactics used by the phishing underground. It's really a new look at an old problem. Follow us as we track real life phishers hiding in the shadiest corners of the Internet, analyze the tools used by phishers, see how phishers 'phish' other phishers, and discover the sites where real life identities are being bought and sold. The specific topics covered by this talk will include: how phishers set up a phishing site, a look at the backdoors used by phishers, determining how phishers get identity information, a thorough look at the tools used by phishers, and a detailed look at the sites used to buy and sell stolen identities.


John Crain, ICANN

Biography: John Crain is the Chief Technical Officer of ICANN. ICANN is responsible for coordinating domain names, addresses, and other unique Internet identifiers. John has been contributing his technical expertise and leadership to ICANN for over three years. In this role, he has taken on the task of enhancing and improving the professional technical operations of ICANN and will lead the organization's root management, website development and information services functions. John enjoys an excellent and respected reputation with the global technical community. He conducts much of ICANN's liaison work with the global technical community in order to facilitate and listen to discussion on the many technical-based issues facing ICANN. John, a native of the United Kingdom and fluent in Dutch and English, spent a significant portion of his professional career working in the Netherlands for the RIPE NCC as part of the senior management team and was responsible for infrastructure, software development and operations. Prior to RIPE NCC, John worked as a design engineer in research, design and development of advanced materials.

Securing the Internet Infrastructure: Myths & Truths

Abstract: The Internet has become a part of our everyday lives. It is only a half a century old, but it is difficult to imagine life without it. It has become a world in itself. We have postal addresses on the Internet just like in real life. What will happen when we run out of addresses? Who owns the Internet? How secure is it? How likely would it be for terrorists to disable it and how do we go about preventing this? We need to seriously consider these questions rather than waiting for them to become a larger problem. The talk busts a lot of myths about the Internet and provides a balanced perspective on its reliability and security around the world.

Important Dates

I do not fear computers. I fear the lack of them.

- Isaac Asimov

Just as drivers who share the road must also share responsibility for safety, we all now share the same global network, and thus must regard computer security as a necessary social responsibility. To me, anyone unwilling to take simple security precautions is a major, active, part of the problem.

- Fred Langa

In theory, one can build provably secure systems. In theory, theory can be applied to practice, but in practice, it can’t.

- M. Dacier