exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

ISOI-2007-cfp.txt

ISOI-2007-cfp.txt
Posted Oct 20, 2006
Site isotf.org

The second Internet Security Operations and Intelligence (ISOI) DA workshop will take place on the 25th and 26th of January, 2007. It will be hosted by the Microsoft Corporation, in Redmond WA. An after-party dinner will be hosted by Trendmicro. The call for papers is now open to the public. The main subject of interest is vulnerabilities and 0day exploits used in the wild. Secondary subjects are DDoS, phishing and general botnet subjects.

tags | paper, vulnerability, conference
SHA-256 | 669e54de218bb16532988610c786ca340672bcaae385d66f0953e184c3db008e

ISOI-2007-cfp.txt

Change Mirror Download
[Apologies to those who receive this message multiple times]

The second Internet Security Operations and Intelligence (ISOI) DA
workshop will take place on the 25th and 26th of January, 2007. It will be
hosted by the Microsoft Corporation, in Redmond WA. An after-party dinner
will be hosted by Trendmicro.

This workshop's main topic is BotMaster Operational Tactics - the use of
vulnerabilities and 0day exploits in the wild. (by spyware, phishing and
botnets for their businesses).
Secondary subjects include DDoS, phishing and general botnet subjects.

The workshop's purpose is to bring together members of the Internet
security operations community at large and DA and MWP specifically, and
share information, as well as plan our future operations.
It is open only to the following vetted communities: DA, MWP (and sister
communities such as routesec), OARC, NSP-SEC, FIRST. MAAWG, anti virus
vetted groups and the honey net project.

Among the attendees are:
Professionals from Internet Service Providers (ISPs), Anti Virus vendors,
Anti Spam vendors and projects, CERT teams, Law Enforcement, Academia,
etc. coming together to work on the most recent technology, intelligence
and operations being done online today for the security of the Internet.

No reporters are allowed.

CFP:
The call for papers is now open to the public. The main subject of
interest is vulnerabilities and 0day exploits used in the wild. Secondary
subjects are DDoS, phishing and general botnet subjects.

Submission is simple, email us directly with your topic and some data to
back it up by December 10th, to contact@isotf.org.

For more information please visit:
http://isotf.org/isoi2.html

For the agenda of our previous workshop hosted by Cisco Systems, Inc.,
please visit:
http://isotf.org/isoi.html

Gadi Evron,
ISOI/DA coordinator and organizer.

Login or Register to add favorites

File Archive:

June 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    18 Files
  • 2
    Jun 2nd
    13 Files
  • 3
    Jun 3rd
    0 Files
  • 4
    Jun 4th
    0 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    0 Files
  • 7
    Jun 7th
    0 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    0 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close