exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

ISOI-2007-cfp.txt

ISOI-2007-cfp.txt
Posted Oct 20, 2006
Site isotf.org

The second Internet Security Operations and Intelligence (ISOI) DA workshop will take place on the 25th and 26th of January, 2007. It will be hosted by the Microsoft Corporation, in Redmond WA. An after-party dinner will be hosted by Trendmicro. The call for papers is now open to the public. The main subject of interest is vulnerabilities and 0day exploits used in the wild. Secondary subjects are DDoS, phishing and general botnet subjects.

tags | paper, vulnerability, conference
SHA-256 | 669e54de218bb16532988610c786ca340672bcaae385d66f0953e184c3db008e

ISOI-2007-cfp.txt

Change Mirror Download
[Apologies to those who receive this message multiple times]

The second Internet Security Operations and Intelligence (ISOI) DA
workshop will take place on the 25th and 26th of January, 2007. It will be
hosted by the Microsoft Corporation, in Redmond WA. An after-party dinner
will be hosted by Trendmicro.

This workshop's main topic is BotMaster Operational Tactics - the use of
vulnerabilities and 0day exploits in the wild. (by spyware, phishing and
botnets for their businesses).
Secondary subjects include DDoS, phishing and general botnet subjects.

The workshop's purpose is to bring together members of the Internet
security operations community at large and DA and MWP specifically, and
share information, as well as plan our future operations.
It is open only to the following vetted communities: DA, MWP (and sister
communities such as routesec), OARC, NSP-SEC, FIRST. MAAWG, anti virus
vetted groups and the honey net project.

Among the attendees are:
Professionals from Internet Service Providers (ISPs), Anti Virus vendors,
Anti Spam vendors and projects, CERT teams, Law Enforcement, Academia,
etc. coming together to work on the most recent technology, intelligence
and operations being done online today for the security of the Internet.

No reporters are allowed.

CFP:
The call for papers is now open to the public. The main subject of
interest is vulnerabilities and 0day exploits used in the wild. Secondary
subjects are DDoS, phishing and general botnet subjects.

Submission is simple, email us directly with your topic and some data to
back it up by December 10th, to contact@isotf.org.

For more information please visit:
http://isotf.org/isoi2.html

For the agenda of our previous workshop hosted by Cisco Systems, Inc.,
please visit:
http://isotf.org/isoi.html

Gadi Evron,
ISOI/DA coordinator and organizer.

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close