| 8:30 | Registration and Check-in | |
| 9:00 | Welcoming Remarks | |
| 9:10 | Detection of and Trends in Windows IRC DCC Bots | Phil Rodrigues (University of Connecticut) |
| 10:05 | Detecting Detectors: Layer 2 Wireless Intrusion Analysis |
Joshua Wright (Johnson & Wales University) |
| 11:00 | Break | |
| 11:20 | The Dartmouth murder case and Daniel Pearl case from the forensic standpoint |
SA Kevin Swindon (Boston FBI) |
| 12:30 | Lunch | |
| 1:30 | Introduction to Cryptography and Cryptographic services on z/OS |
Frank LeBlanc (Boston University) |
| 2:30 | So, you think you’re hosting a software pirate? |
Linda LeBlanc and Leigh Heyman (MIT) |
| 3:30 | Break | |
| 3:50 | Database Best Practices |
Paul Ruais (Boston University), |
| 4:50 | Closing remarks |
