LinuxSecuritySummit2010/Schedule

From Linux Security Wiki (obsolete)
(Difference between revisions)
Jump to: navigation, search
Line 31: Line 31:
 
|''10:30''
 
|''10:30''
 
|''break''
 
|''break''
|
+
|b
 
|-
 
|-
 
|11:00
 
|11:00
Line 43: Line 43:
 
|''12:00''
 
|''12:00''
 
|''lunch (self-funded at nearby location)''
 
|''lunch (self-funded at nearby location)''
|
+
|l
 
|-
 
|-
 
|13:00
 
|13:00
Line 58: Line 58:
 
|''14:30''
 
|''14:30''
 
|''break''
 
|''break''
|
+
|b
 
|-
 
|-
 
|15:00
 
|15:00
Line 67: Line 67:
 
|[[LinuxSecuritySummit2010/Abstracts/Schreuders_FBAC|Linux Security Usability: Restricting Programs Using SELinux, AppArmor and FBAC-LSM]]
 
|[[LinuxSecuritySummit2010/Abstracts/Schreuders_FBAC|Linux Security Usability: Restricting Programs Using SELinux, AppArmor and FBAC-LSM]]
 
|Z. Cliffe Schreuders, Murdoch University
 
|Z. Cliffe Schreuders, Murdoch University
 +
|-
 
|16:00
 
|16:00
 
|[[LinuxSecuritySummit2010/Abstracts/Gallagher_SSSD|System Security Services Daemon (SSSD)]]
 
|[[LinuxSecuritySummit2010/Abstracts/Gallagher_SSSD|System Security Services Daemon (SSSD)]]
Line 72: Line 73:
 
|''16:30''
 
|''16:30''
 
|''break''
 
|''break''
|
+
|b
 
|}
 
|}

Revision as of 10:43, 15 June 2010

*** DRAFT ***

Overview

This is the schedule for the Linux Security Summit 2010, to be held in Boston in conjunction with Linuxcon on Monday, August 9th.

The format of the event will be selected presentations with discussion, followed by a Q&A panel, and lightning talks.

Presentations

Presentation sessions are 30-minutes in length, including discussion.


Time Title Presenter
09:00 Recent Advances in the SELinux Sandbox Dan Walsh, Red Hat
09:30 in ur webserver, writin ur logs Joshua Brindle, Tresys
10:00 Integrating Security into Vyatta Stephen Hemminger, Vyatta
10:30 break b
11:00 MSF Security Framework Overview Elena Reshetova, Nokia Meego
11:30 Access Control in the MSF Security Framework Janne Karhunen, Nokia Meego
12:00 lunch (self-funded at nearby location) l
13:00 Linux Security in 10 Years Brad Spengler, grsecurity
13:30 Using EVM to protect security extended attributes Mimi Zohar, IBM
14:00 Secstate: Integrating SCAP and Puppet for System Lockdown Karl MacMillan, Tresys 14:30 break b
15:00 Widely Used But Out-Of-Tree Kees Cook, Canonical
15:30 Linux Security Usability: Restricting Programs Using SELinux, AppArmor and FBAC-LSM Z. Cliffe Schreuders, Murdoch University
16:00 System Security Services Daemon (SSSD) Stephen Gallagher, Red Hat 16:30 break b
Personal tools