|Line 98:||Line 98:|
|Paul Moore, HP
|Paul Moore, HP
Revision as of 23:42, 25 July 2010
This is the schedule for the Linux Security Summit 2010, to be held in Boston in conjunction with Linuxcon on Monday, August 9th. The format of the event is a series of selected presentations, followed by a Q&A panel, and lightning talks. This schedule is subject to change: check this page for updates.
|08:30||LinuxCon Registration and setup||The registration desk will be open from 8am. Please arrive early enough to register (there may be queues) and get settled: we plan to start at 9am sharp.|
Presentation sessions are 30 minutes in length, including discussion.
|09:00||Recent Advances in the SELinux Sandbox||Dan Walsh, Red Hat|
|09:30||in ur webserver, writin ur logs||Joshua Brindle, Tresys|
|10:00||Integrating Security into Vyatta||Stephen Hemminger, Vyatta|
|11:00||MSF Security Framework Overview||Elena Reshetova, Nokia|
|11:30||Access Control in the MSF Security Framework||Janne Karhunen, Nokia|
|12:00||lunch (self-funded at nearby location)|
|13:00||Linux Security in 10 Years||Brad Spengler, grsecurity|
|13:30||Using EVM to protect security extended attributes||Mimi Zohar, IBM|
|14:00||Secstate: Integrating SCAP and Puppet for System Lockdown||Karl MacMillan, Tresys|
|15:00||Widely Used But Out-Of-Tree||Kees Cook, Canonical|
|15:30||Linux Security Usability: Restricting Programs Using SELinux, AppArmor and FBAC-LSM||Z. Cliffe Schreuders, Murdoch University|
|16:00||System Security Services Daemon (SSSD)||Stephen Gallagher, Red Hat|
The panel session will start with a discussion topic, followed by open Q&A. Members of the panel will be determined closer to the event.
|17:00||The viability of a standard Linux security API||Kees Cook, Serge Hallyn, Stephen Smalley||Casey Schaufler, Smack Project|
|17:20||Open Q&A||Paul Moore, HP|
Lightning talks and closing
From approximately 18:00 to 18:30, we'll hold lightning talks and wrap up the event.
|18:00||Lightning Talks (5mins each)||Joshua Brindle, Tresys|
Lightning talks will be five minutes in length, with up to six slots. Topics will be accepted on the day, with priority given to topics not accepted as main presentations.