[Appendix A] A.6 Conferences

Building Internet Firewalls

Building Internet FirewallsSearch this book
Previous: A.5 Response Teams and Other OrganizationsAppendix A
Resources
Next: A.7 Papers
 

A.6 Conferences

Although there are many other conferences, these are the ones you will probably find the most interesting from a firewalls and Internet security point of view.

A.6.1 USENIX Association Conferences

http://www.usenix.org/events/

The USENIX Association and SAGE sponsor a number of good conferences every year, including the USENIX Security Symposium, the USENIX System Administration (LISA) Conference, and the USENIX Technical Conferences. For information about any of them, contact USENIX:

A.6.1.1 USENIX UNIX Security Symposium

The USENIX UNIX Security Symposium is one of the best venues for learning about practical solutions to UNIX and network security issues. From the announcement for the 1995 symposium:

The goal of this symposium is to bring together security practitioners, researchers, system administrators, systems programmers, and others with an interest in computer security as it relates to networks and the UNIX operating system.

A.6.1.2 USENIX System Administration (LISA) Conference

Jointly sponsored by SAGE and USENIX, the USENIX System Administration (LISA) Conference is the premier conference for UNIX system and network administrators. It covers a wide range of topics, including host and network security. If you are a UNIX system or network administrator, and you only get to go to one conference a year, this should be it. From the announcement for the 1995 conference:

The USENIX Systems Administration (LISA) Conference is widely recognized as the leading technical conference for system administrators. Historically, LISA stood for "Large Installation Systems Administration," back in the days when having a large installation meant having over 100 users, over 100 systems, or over one gigabyte of disk storage. Today, the scope of the LISA conference includes topics of interest to system administrators from sites of all sizes and kinds. What the conference attendees have in common is an interest in solving problems that cannot be dealt with simply by scaling up well-understood solutions appropriate to a single machine or a small number of workstations on a LAN.

A.6.1.3 USENIX Technical Conferences

The main USENIX Technical Conferences are less focused on practical security issues than the Security or LISA conferences, but you can still learn a lot and make many valuable contacts there. If you have an opportunity to attend one, you should certainly consider it.

A.6.2 UNIX System Administration, Networking, and Security (SANS) Conference

This conference is sponsored by the Open Systems Conference Board, with the cooperation of SAGE and USENIX, and is usually held in Washington, DC. According to the conference documentation, this annual event:

...is a technical conference offering system administrators, security administrators, and network managers a unique forum in which to gain up-to-date information about immediately useful tools and techniques, in addition to sharing ideas and experiences and network with peers.

For information, contact the conference office:

A.6.3 Internet Society Symposium on Network and Distributed System Security (SNDSS)

http://www.isoc.org/

The Internet Society sponsors an annual symposium on network security. From the 1995 symposium announcement:

The symposium will bring together people who are building software and/or hardware to provide network and distributed system security services. The symposium is intended for those interested in the more practical aspects of network and distributed system security, focusing on actual system design and implementation, rather than on theory. We hope to foster the exchange of technical information that will encourage and enable the Internet community to apply, deploy, and advance the state of the available security technology.

For more information, contact the Internet Society:


Previous: A.5 Response Teams and Other OrganizationsBuilding Internet FirewallsNext: A.7 Papers
A.5 Response Teams and Other OrganizationsBook IndexA.7 Papers