- Conference Overview
- Fees, Discounts and Packages
- Who Attends
- Conference at a Glance
- Executive Summit
(900K PDF file)
- Real World Linux Business Resource
- Select a Track
Canadian Association of Exposition Management
Society of Independent Show Organizers
Track at a Glance
Session Registration Hours
|April 13 - 8:00 am to 5:00 pm|
|April 14 - 7:30 am to 6:00 pm|
|April 15 - 7:30 am to 5:00 pm|
Security Track Information
To view specific session information, click on the session number or title in the table below.
|Wednesday, April 14|
|201||8:30 am-9:30 am||BATTLING SPAM AND VIRUSES AT THE SERVER||Abstract: A report from Nucleus Research states the average cost of spam to business is $874.00 per employee, per year. This is only the case when the employee receives a mere 13.3 spams per day, not including the cost of damage and lost productivity caused by viruses! This seminar focuses on proven tools and strategies for combating both spam and viruses with your Linux server, while leaving the end user in control of their own mail flow. Whether a large organization, SMB, ISP, or a user with a small home network, you will learn, how mail administrators can combine collections of freely available tools to make spam only a minor annoyance in your business.
Bonus! Attend this seminar and have the chance to win one of Dee Ann LeBlanc's books
Speaker(s): Dee-Ann LeBlanc -
|206||11:00 am-11:50 am||OPEN SOURCE VERSUS COMMERCIAL CODE - A COMPARISON||Abstract: Proponents of Open Source software claim that their code is of higher quality than the equivalent commercial software. Opponents of OS argue that OS software is unreliable. This seminar is a comprehensive comparison. The OS model represents a different approach to the way software is developed, sold, and maintained, therefore encouraging activities that are not common in the development of commercial code. Jasper will examine these activities and compare them to the commercial software development approach. Based upon several software inspections of OS code, including Apache V2.1, Tomcat version 4.1.24 and the Linux TCP/IP stack, Jasper will test the theory that the OS model produces better quality software than commercial software. You will learn specific metrics of each software analysis and details of the defect reports understanding why this is an important measure of code quality.
Speaker(s): Jasper Kamperman - Reasoning, Inc.
|211||3:00 pm-4:00 pm||SECURITY ENHANCEMENTS BY RED HAT||Abstract: Security is a big issue in the deployment of Internet and intranet servers. Valuable and secret data must be protected. There is only
that much a system administrator can do alone. Regular updates and good configuration cannot help against zero-day exploits of the (unfortunately) inevitably existing bugs in used the applications.
To achieve better security, the ways in which the application bugs can be misused must be limited. This is one of the goals for the Red Hat Enterprise Linux v.4 release. The biggest piece of the puzzle is the use of the SELinux framework. But there are other possibilities.
This talk will introduce the additional methods Red Hat Enterprise Linux v.4 will deploy that
drastically limit the negative effects. It will also explain the attack vectors and implemented counter measures, and how to use the techniques for one's own application, which is especially
interesting for ISVs aiming for the Enterprise Linux market.
Speaker(s): Ulrich Drepper - Red Hat
|216||4:15 pm-5:15 pm||USING LINUX TO PROVIDE QUALITY OF SERVICE FOR NETWORK INFRASTRUCTURES||Abstract: The Internet has become the infrastructure of choice for businesses and consumers for an increasing array of communications technologies. However, as organizations shift more mission-critical commerce applications to their IP infrastructure, maintaining end-to-end quality of service becomes critical. Based on the Differentiated Services RFC, Linux can solve these QoS issues. This seminar will examine case studies and address end-to-end quality of service, methodologies and implications under Linux, the technical issues for administrators and network providers, and state-of-the-art technologies for Linux. Case studies include DNS Online, a full-service ISP in northern Indiana providing dial-up, Web hosting, co-location and wireless services http://www.dnsonline.net and Mid America National Bank, a regional bank based in Canton, Illinois with multiple branches in southern Illinois. http://www.midnatbank.com
Speaker(s): Doug Hass - ImageStream Internet Solutions
|Thursday, April 15|
|301||8:30 am-9:30 am||CONTROLLING YOUR SECURITY DESTINY||Abstract: The key problem with security today is that it is driven by factors outside of our control. The common themes of, reduce and eliminate vulnerabilities and improve security admin response time are either impracticable or unreasonable. We must address the root causes not the symptoms to achieve success. The process of looking at security from a basis of control is new to the security industry. However, the model is familiar to the business world and engineering disciplines. This seminar will teach you how to use this approach and how to identify the key causal factors in the security problems you face and determine who is in control of those factors. At the end of the program, you will have a clearer vision of how to meet security challenges and win.
Speaker(s): Terry Stuart - Cylant
|306||11:00 am-11:50 am||SECURITY IN A LINUX ENVIRONMENT||Abstract: The threat is real! Today's businesses and organizations are experiencing an alarming number of security attacks resulting in financial losses. The complexity of today's IT networks means implementing a security-rich solution in any environment is a major challenge requiring extensive expertise in a variety of highly specialized disciplines. In this drill down seminar, you will learn:
· what Linux-based solutions are available to meet your security challenges
· why Linux is a securable environment
· importance of assessing your environment
· stages of implementing a secure Linux environment
Speaker(s): David Safford - IBM
|314||4:15 pm-5:15 pm||PROS AND CONS OF USING OPEN SOURCE FOR PERIMETER DEFENSE||Abstract: When hardware and software are used to enforce security, some argue that "best in breed" individual applications, from firewall to user authentication, should be put into place so that every function is fulfilled by the most technically advanced technology. A fine strategy if you have a large budget. Executives concerned with costs can look at policies, integrated solutions and Open Source software where multiple functions and modules are collected into a single network server. Learn:
· the challenges of implementing and maintaining OS security projects while keeping costs down
· Open Source for security versus proprietary
· advantages and limitations of using OS for perimeter defense
· how security is handled in the OS, insights into the Netfilter project, the packet filtering aspect of Linux
Speaker(s): Jan Hichert - Astro AG
* Visionary sessions are free with conference registration.
All conference programs take place at the Metro Toronto Convention Centre, North Building, 255 Front Street West, Toronto.
April 13: Tutorials & Workshops
April 14 – 15: Seminars
April 14 – 15: Keynote and Visionary presenters
April 14: Birds of a Feather
Trade Show Schedule
April 13, 11:00am - 6:00 pm
April 14, 11:00am - 5:00 pm