Agenda

The conference takes a highly integrated, enterprise-wide approach to security. The topics are organized around the following four tracks:

Each of the four tracks is examined in its theoretical and practical aspects, namely, through topic presentations and workshops/demonstrations. The presentations in a particular track are offered at a different time slot than the related workshops, so that you can attend all the session in a specific track if you wish.

May 5, 2008
8:30-9:15 Registration – Welcome Coffee
  Thalia 3 Thalia 2
9:15-9:30 Opening Remarks -
9:30-10:15

Identity Theft and Identity Management

Keynote Presentation: "Rethinking Passwords", William R. Cheswick

-
10:15-10:45 "Identity management systems-where are they going?" Prof. Chris Mitchell Security Over the Wire
Workshop: "Cisco Advanced Endpoint Security", George Marinis
10:45-11:15 "Designing federated identity management architectures for addressing the recent attacks against online financial transactions", Dr Christos K. Dimitriadis
11:15-11:45 Coffee Break
11:45-12:15 "Social Networks - information security at the digital coctail party", Giles Hogben Workshop: "Protecting Online Transactions Against Malware", Bruno Rodriguez
12:15-12:45 "Synergies between Enterprise Single Sign-On and other Identity Management Technologies" , Stephane Fymat
12:45-13:45 Lunch Break
13:45-14:30 Security Over the Wire
Keynote Presentation: "Internal and external security requirements to communication service providers and intermediaries. Is Europe asking too much?", Christoph P.M. De Preter
-
14:30-15:00 "Mobile Devices: A Roadwarriors Guide to IT Security", Kaya Kazmirci Identity Theft and Identity Management
Workshop: "Slashing Identity Provisioning Costs", Rami Elron
15:00-15:30 "Network Security: Putting Theory into Practice, the Wrong Way", John Iliadis
15:30-16:00 Coffee Break
16:00-17:00 "Defining and forcing policies for Network Access Authentication", Ronny Bjones Workshop "Faster Identity Truth with Role-Based Authorization and Virtualization", Umut Ceyhan
May 6, 2008
8:30-9:15 Welcome Coffee
  Thalia 3 Thalia 2
9:15-10:00

Deploying Security: the Cost and the Value

"The Business Case for Security", Dr Peter Berlich

-
10:00-10:30 "The compliance journey: what, why, and how", Kyriakos N. Agapaloglou One Step ahead of Attackers: Successful Defense Strategies
Workshop: "Hacking Techniques and How to Stop them", Athanasios Vamvakas
10:30-11:00 "IT Security Role in SOX Compliance", Iordanis Iordanidis
11:00-11:30 Coffee Break
11:30-12:00 "Greek National Network SYZEFXIS - A Secure Administrative Network", Christos Moschonas Workshop: "Building a Secure and Managed Infrastructure", Ronny Bjones
12:00-12:30 "Information Security and the Enterprise Risk Management Process", Dr Michael Vlahakis
12:30-13:30 Lunch Break
13:30-14:15

One Step ahead of Attackers: Successful Defense Strategies

Keynote Presentation: "Lessons from defending Cyberspace - the challenge of addressing the Cyber Risk - for law enforcement, enterprises, nations, and the global community", Andy Purdy

-
14:15-14:45 "Proactive Security Management", Georgios Korellis

Deploying Security: the Cost and the Value

Workshop: " The Insider Threat - Deploying Secure Corporate Networks over Insecure Networks", Andreas Lalos

14:45-15:15 "Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures", Peter Thermos
15:15-15:45 Coffee Break
15:45-16:15    
16:15-16:45  
To Top

Lead Sponsors

Algosystems Logo

ETHER Applications Ltd

Microsoft Logo

To Top


Media Sponsor

Imerisia Logo

To Top


Organizer

Hellenic American Union

To Top


Academic Advisor

 Hellenic American University

 

To Top