Available as an ICS file - with thanks to Stephen Usher.
Foyer | 08:30–09:15 | Registration | Tea and coffee and pastries |
Session 1 — Chair: Jeremy Worth, ICTF Chairman | |||
Theatre | 09:15–09:20 | Introduction | Jeremy Worth, ICTF Chairman |
Theatre | 09:20–10:00 | The Malware Oscars | Chas Tomlin, Team Cymru |
10:00–10:10 | Break | For moving rooms. No refreshments provided. | |
See right | 10:10–10:50 | Workshop A | ES(9)Room Booking System: MRBS |
Foyer | 10:50–11:20 | Tea and coffee |
Session 2 — Chair: Sarah Lawson, Secretary to ICTF | |||
Theatre | 11:20–12:00 | The Myth of Vulnerabilities in Software | Ed Gibson, Microsoft UK |
12:00–12:10 | Break | Shake your legs, talk to your neighbour while laptops plugs are pushed and pulled. | |
Theatre | 12:10–12:50 | Social Networking: A new frontier for malware, spam and identity theft | Graham Cluley, Sophos |
Foyer | 13:00–13:55 | Lunch |
Session 3 — Chair: Sarah Lawson, Secretary to ICTF | |||
See right | 14:00–14:40 | Workshop B | RR(6)Pros & Cons of MySource Matrix NM(7)Digital photography and media ES(8)Demystifying Plone RT(18)Customising Request Tracker LT4(20)Identity Management with the Core User Directory SRB(22)The New WebLearn Service |
14:40–14:50 | Break | For moving rooms. No refreshments provided. | |
See right | 14:50–15:30 | Workshop C | ES(4)Erewhon – Geo-Spatial Services and Mobile Computing in Oxford LT4(5)An Introduction to NAT logging SRB(10)Enhancing learning and teaching through the use of technology RR(15)How to Use Your Supercomputing Centre RT(19)AppleLab at OUCS NM(21)Groupware migration |
Foyer | 15:30–16:00 | Tea and coffee |
Session 4 — Chair: Jeremy Worth, ICTF Chairman | |||
See right | 16:00–16:40 | Workshop D | RT(1)Up the Steeple: Streamlining Enterprise-Level Podcasting for HE ES(2)Libraries' IT: Who does what LT4(3)Best practice key management for enterprise-wide encryption implementations NM(12)Green Desktop Computing RR(13)Update of the new HR Information System SRB(23)Sysdev & BSP: Tying together SSO and OSS |
16:40–16:50 | Break | For moving rooms. No refreshments provided. | |
Theatre | 16:50–17:00 | ICT Forum | |
Theatre | 17:00–17:40 | IT and High Performance Computing at Renault F1 | Graeme Hackland, Renault F1 |
Foyer | 17:40–19:00 | Evening Reception | Wine and light refreshments |
The Malware Oscars | Chas Tomlin, Team Cymru | |
This talk will take a look at some of today's more common malware and the effect it has on end user systems. |
The Myth of Vulnerabilities in Software | Ed Gibson, Microsoft UK | |
Despite the mutating threats of cyber attacks, online extortion, or spam, a well-structured information security strategy can safeguard your business and ensure that risks are managed with commitment and understanding. Given the current economic times customers need that little bit of extra assurance they are taking the rights steps to protect their electronic landscape from Insiders, Harvesters, Social Engineers, Organized Criminals and State Sponsors. But as the internet is not territorial or jurisdictionally bound our real world responses to increasingly sophisticated attacks are not as effective. So who do you trust? Using examples from his 20 year career as an FBI Special Agent (including the most recent 5 years when he was assigned as a Diplomat to US Embassy London in charge of the FBI's UK and Ireland cyber hi-tech investigations) Ed Gibson will describe why he believes Microsoft is the only company with the necessary global reach to change the online security posture of the Internet. He brings security alive and makes it personal. |
Social Networking: A new frontier for malware, spam and identity theft | Graham Cluley, Sophos | [PDF] |
Financially motivated hackers are increasingly exploiting social and business networks (i.e., Facebook, Twitter, MySpace and LinkedIn) to seize computers, commit identity theft, and install malware on victims' PCs. This talk covers how attacks have evolved, how social networking sites are trying to defend against exploitation, and what companies and people can do to protect themselves. |
IT and High Performance Computing at Renault F1 | Graeme Hackland, Renault F1 | [PDF] |
In 2008, the ING Renault Formula 1 Team invested in a 38TFlop supercomputer to contribute to the Team's key performance area of Aerodynamics. Find out how the ING Renault Formula 1 Team achieved what Bob Bell, Technical Director, described as "a rarity in large-scale projects these days - delivery on time and under budget". |
Lunch menu | ||
Savoury Tart Lunch with juice and water
Meat
- Salami, Tomato & Mozzarella focaccia
- Croque monsieur
- Smoked chicken, leek & cheddar tart |