ASIA Main Page
Call for Papers
Best Paper Awards
NYS Cyber Security Conf.
Directions & Parking
UAlbany Business Website
Want to Sponsor?
Years for Selection: 2006 - 2007 - 2008 - 2009 - 2010 - 2011 - 2012 - 2013 - 2014 - 2015|
Billy Rios, Microsoft Corporation
Biography: Billy is currently a Security Engineer for Microsoft, helping secure software used by millions of people across the world. Before his current role as a Security Engineer, Billy was a Senior Security Consultant for VeriSign, where he broke into the information systems of various clients in the Fortune 500 and helped them understand existing and emerging security risks. Before his life as a consultant, Billy helped defend Department of Defense networks as an Information Assurance Analyst. He looked at packets, monitored for suspicious network activity, took apart malicious code, and formally reported network and security incidents of all shapes and sizes. Before attacking and defending networks, he was an active duty Marine Officer (Semper Fi!). Billy spent some time in a hot desert, carried a side arm (sometimes a machine gun), and got real up-close and personal with physical and operational security… Billy has an undergraduate degree in Business (with a formal concentration in Information Systems) from the University of Washington and a M.S. Degree in Information Systems (with Distinction) from Hawaii Pacific University. Billy is currently pursing his MBA at Texas A&M (Commerce).
Phishing Underground: A New Look at an Old Problem
John Crain, ICANN
Biography: John Crain is the Chief Technical Officer of ICANN. ICANN is responsible for coordinating domain names, addresses, and other unique Internet identifiers. John has been contributing his technical expertise and leadership to ICANN for over three years. In this role, he has taken on the task of enhancing and improving the professional technical operations of ICANN and will lead the organization's root management, website development and information services functions. John enjoys an excellent and respected reputation with the global technical community. He conducts much of ICANN's liaison work with the global technical community in order to facilitate and listen to discussion on the many technical-based issues facing ICANN. John, a native of the United Kingdom and fluent in Dutch and English, spent a significant portion of his professional career working in the Netherlands for the RIPE NCC as part of the senior management team and was responsible for infrastructure, software development and operations. Prior to RIPE NCC, John worked as a design engineer in research, design and development of advanced materials.Securing the Internet Infrastructure: Myths & Truths
Abstract: The Internet has become a part of our everyday lives. It is only a half a century old, but it is difficult to imagine life without it. It has become a world in itself. We have postal addresses on the Internet just like in real life. What will happen when we run out of addresses? Who owns the Internet? How secure is it? How likely would it be for terrorists to disable it and how do we go about preventing this? We need to seriously consider these questions rather than waiting for them to become a larger problem. The talk busts a lot of myths about the Internet and provides a balanced perspective on its reliability and security around the world.
I do not fear computers. I fear the lack of them.
- Isaac Asimov
Just as drivers who share the road must also share responsibility for safety, we all now share the same global network, and thus must regard computer security as a necessary social responsibility. To me, anyone unwilling to take simple security precautions is a major, active, part of the problem.
- Fred Langa
In theory, one can build provably secure systems. In theory, theory can be applied to practice, but in practice, it can’t.
- M. Dacier