Time |
Track1 |
Track2 |
Track3 |
09:30-10:0 |
Opening Plenary |
||
10:00-10:30 |
Keynote speech: “Information Security in Carsten Casper,
ENISA. |
||
10:30-11:00 |
Keynote speech: “Vendor Strategies for Maximizing
Evaluation Process under the Common Criteria” Jane Medefesser,
Sun Microsystems. |
||
11:00-11:30 |
Coffee Break |
||
11:30-12:30 |
Panel Discussion “IT Security and IT security Certification Policies” Security policies to drive the security of the IT environment. Trade-offs between policy issue and policy compliance. Approaches to solve the compliance bottleneck. Market forces and policy issue. Chaired by: Mr. Luis Jiménez, CCN. Participants: Mr. Bernd Kowalski, BSI. Mr. Carsten Casper, Enisa. Mr. Haruki Tabuchi, IPA. Ms. Audrey Dale, NIAP. Ms. Jane Medefesser, Sun Microsystems. |
||
12:30-13:00 |
“CCRA
progress and status” Report from the CC Management Committee |
||
13:00-14:30 |
Lunch |
||
14:30-15:00 |
The current state of Common Criteria Development - a report from the CCDB, David Martin, CCDB chair. |
Ways to CC evaluation cost reduction: beyond CC
V3, Francoise Forge, Gemplus. |
|
15:00-15:30 |
Trial Use Results of the Site Certification
Process, Thomas Borsch, BSI. |
Product Vendors Guide to Planning for Government Required Validations, Matthew L. Keller, Corsec Security, Inc. |
|
15:30-16:00 |
How to Write Site Security Targets, Gerald Krummeck, atsec information security. |
Update on the SP scheme, Luis Jiménez, CCN. |
Impacts of Third Party Consultants on Common Criteria Assurances, James L. Arnold Jr., SAIC Common Criteria Testing Laboratory |
16:00-16:30 |
Coffee Break |
||
16:30-17:00 |
Analysis of the composition problems in CC v3.0 with some suggested solutions, Dr.Albert Jeng, Taiwan Telecom Technology Center. |
Update on the UK scheme, Nigel Jones, CESG. |
Vulnerabilities, Vulnerabilities,
Vulnerabilities, Simon Milford,
LogicaCMG Security Practice. |
17:00-17:30 |
Formal Specifications of Security Policy Models,
Dr. Wolfgang Thumser,
T-Systems GEI GmbH. |
A brief update on the U.S. scheme and some policies implemented this year, Audrey Dale, NIAP. |
How the Common Criteria requirements could be used for the development of
secure software, Boutheina Chetali, Axalto. |
17:30-18:00 |
Development of Informal Security Policy Models,
Erin Connor, EWA-Canada. |
Update on the IT scheme, Elin Wedlund,
OCSI. |
Build a CC assurance package dedicated to your risk assessment, Francois Guérin, Axalto. |
Time |
Track1 |
Track2 |
Track3 |
09:00-09:30 |
Developing a CC EAL7 Multi-Level Security
Capability, Chris Walsh, Tenix Datagate Pty Ltd. |
Design and Development of a Knowledge-based Tool
for ST Developers Based on CC v3, Guillermo
Horacio Ramirez Caceres, |
|
09:30-10:00 |
Meaningful vulnerability analysis with v3: by-product or the product of evaluation?, Denise Cater, BT |
Protection Profile for Network-Based Anti-Spam Mail System, June-ho Lee, Young-tae Kim, KISA. |
Requirements-Driven Development for IT Security Products, Mark
Gauvreau, EWA-Canada. |
10:00-10:30 |
Applying the Draft CC Version 3.0 to Linux -
Experience from a Trial Evaluation, Helmut
Kurth, atsec
information security. |
Document Security - Understanding and minimising the risks, Peter
Plested, Sharp Digital Document Systems. |
|
10:30-11:15 |
Coffee Break |
||
11:15-12:15 |
Closing Panel “Roundup of events at the 7thICCC” |
||
12:15-12:45 |
Closing Plenary |
||
12:45-13:00 |
Announcement of 8th ICCC |
||
13:15-14:45 |
Lunch |