[PET] Call for Participation: 2nd ACM Workshop on Information Sharing and Collaborative Security (WISCS 2015)

Sander, Tomas (HPL Princeton) tomas.sander at hpe.com
Fri Aug 28 19:19:57 BST 2015


CALL FOR PARTICIPATION         
                               
******************************************************************************
2nd ACM Workshop on Information Sharing and Collaborative Security (WISCS 2015)
   Denver, Colorado, USA
   Oct. 12, 2015
   In conjunction with ACM CCS 
   https://sites.google.com/site/wiscs2015/
******************************************************************************

** Please forward to interested parties **
** Register by Sep. 20 , 2015 to enjoy the early bird discount! **

ABOUT THE WORKSHOP

Sharing of security and threat related data is believed to greatly enhance the 
ability of organizations to defend against sophisticated cyber-attacks. Yet there
are a number  of technical and policy challenges to effective sharing and 
collaboration. Which information exactly should  be shared? How can privacy 
and confidentiality be protected? How can we  create high-fidelity intelligence
from shared data without getting overwhelmed by false positives?

The 2nd Workshop on Information Sharing and Collaborative Security (WISCS 2014)
aims to bring together experts and practitioners from academia, industry and
government to present innovative research, case studies, and legal and policy 
issues in information sharing.  

This one-day workshop precedes the ACM CCS conference and features technical 
presentations  of 6 full papers, 2 short papers and one keynote talk. For more
details see https://sites.google.com/site/wiscs2015/

REGISTRATION

Registration information is available at: 
http://www.sigsac.org/ccs/CCS2015/pro_reg.html

PROGRAM

08:00 - 08:20   Welcoming Remarks
 
08:20 - 09:25   Keynote Address 
- Freddy Dezeure. Real World Information Exchange: Challenges and Insights
 
09:25 - 10:45  Session 1: Automated Intelligence Creation and Blacklists
- Samuel Perl, Bronwyn Woods, Brian Lindauer. Data Mining for Efficient 
Collaborative Information Discovery
- Leigh Metcalf, Jonathan Spring. Blacklist Ecosystem Analysis
 
11:10 - 12:30  Session 2: Information Sharing Case Studies
- Jon Haass, Gail-Joon Ahn, Frank Grimmelmann. ACTRA - A Case Study for 
Threat Information Sharing
- Stuart Murdoch, Nick Leaver. Anonymity vs. Trust in Cyber-Security 
Collaboration
 
02:10 - 03:30  Session 3: Foundations & Economic Models for Information Sharing
- Stefan Laube, Rainer Böhme. Mandatory Security Information Sharing with 
Authorities:  Implications on Investments in Internal Controls
- Sarah Brown, Joep Gommers, Oscar Serrano. From Cyber Security Information 
Sharing to Threat Management

04:00 - 05:20  Session 4: HCI and Actioning of Shared Data 
- Tomas Sander, Joshua Hailpern. UX Aspects of Threat Information Sharing 
Platforms
- Jyoti Verma, Nancy Cam-Winget, Syam Appala, David McGrew. An Actionable 
Threat Intelligence System Using a Publish-Subscribe Communications Model

ADDITIONAL INFORMATION
https://sites.google.com/site/wiscs2015/


More information about the PET mailing list