Anti-Spyware Coalition
HomeDocumentsCommentsNewsEventsAbout ASC
 
 

ASC Public Workshop: Creating a Chain of Trust

May 19th, 2009
at the Grand Hyatt Washington
1000 H Street Northwest
Washington, DC

Press, government, ASC members, educational and nonprofit attendees attend free. Corporate attendees may attend for a registration fee of $250. Registration has ended, but you may please register at the door.

For more information or with questions, email Heather West at asc@cdt.org.

Agenda

9:00am
Introducing the Chain of Trust Initiative, Ari Schwartz, Center for Democracy and Technology
Keynote from Shawn Henry, FBI
Keynote from Jeff Fox of Consumer's Union
Video Part 1:

Video Part 2:

Video Part 3:

10:15am
Who Owns the Problem?
In recent years, the web has become one of the leading methods of spreading malicious software. One of the challenges in fighting this means of distribution is the diversity of groups involved in the fight: security companies, independent researchers, webmasters, registrars, hosting companies, network providers, enforcement agencies, and more. What are reasonable expectations and roles for the various parties involved? What partnerships are effective, and how do we build more of them? What are best practices for information reporting and for responding to abuse complaints?

Moderator: Maxim Weinstein, Stopbadware.org
Jeffrey Troy, Chief of the Cyber Criminal Section, Federal Bureau of Investigation
Sam Fleitman, Chief Operations Officer, SoftLayer Technologies, Inc
Bob Bruen, KnujOn
Kevin Haley, Director of Product Management, Symantec Security Response
Alissa Cooper, Center for Democracy and Technology
Andy Steingruebl, Manager, Secure Development, PayPal Information Risk Management

Video Part 1:

Video Part 2:

Video Part 3:

12:15pm
Lunch keynote from Brian Krebs of the Washington Post, with a reply from Alan Paller of the SANS Institute
This keynote will examine several ideas for changing the economics of cybercrime, by increasing the cyber criminal’s costs, driving up barriers to entering that workforce, and decreasing the level of trust that criminals can maintain in the underground marketplace.
Video:

1:30pm
Stalker Spyware
"Stalker Spyware" programs are often sold online with extensive instructions on how to spy on others without being detected. The FTC has recently taken action against sellers of stalker spyware. Learn about the complaint filed by Guilherme Roscke and the Electronic Privacy Information Center (EPIC) and risks of these types of programs.

Moderator: Heather West, Center for Democracy and Technology
Cindy Southworth, National Network to End Domestic Violence
Guilherme Roschke, InfoAdvocate.org
Brian Zwit, AOL

Video Part 1:

Video Part 2:

3:00pm
Rogue Anti-Spyware
Rogue anti-spyware, and low quality anti-spyware products, masquerade as effective protection for a user's computer, but are in fact useless or actively malicious.

Moderator: Janie Whitty, Lavasoft
Eric Howes, Sunbelt Software
Andy Hayter, ICSA Labs
Jeff Williams, Microsoft
Ethan Arenson, FTC Spam Coordinator

Video Part 1:

Video Part 2:

4:15pm
Malvertising
Malvertising is the intersection of malware and advertising, where ads install malware or redirect users to sites that install malware. This panel will discuss the practice of malvertising, responses, and prevention.

Moderator: Eric Davis, Google
Steve Sullivan, Microsoft
Robert Hansen, SecTheory
Mike Nolet, AppNexus

Video Part 1:

Video Part 2:

 
topwww.antispywarecoalition.org
The content throughout this Web site that originates with CDT can be freely copied and used as long as you make no substantive changes and clearly give us credit. Details.