Program Agenda

Slides are available here.

Monday

  • 6:00pm-8:00pm: Evening Reception

Tuesday

  1. 8:30am: Session 1
    1. Matt Ball, Oracle, Welcome/Icebreaker (15 minutes)
    2. Landon Noll, Cisco Systems, "Introduction to Key Management" (30 minutes)
    3. Marc Massar, Semtek "Key Management In Hostile Environments" (45 minutes)
  2. 10:30am: Session 2
    1. Subhash Sankuratripati, NetApp "The OASIS KMIP Standard: What it is and how it’s used" (60 minutes)
    2. Walt Hubis, LSI "IEEE P1619.3 Key Management" (30 minutes)
  3. 1:30pm: Session 3
    1. Allen Roginsky and Elaine Barker, NIST, "The US Government Transition to Stronger Cryptographic Keys" (45 minutes)
    2. Miles Smid and Elaine Barker, NIST, "A Framework for Designing Cryptographic Key Management Systems" (45 minutes)
  4. 3:30pm: Session 4
    1. Luther Martin, Voltage Security "Federated Key Management as the Basis for Secure Cloud Computing" (30 minutes)
    2. Benjamin Gittins, Synaptic "A survey and low-level comparison of network based symmetric key distribution architectures" (45 minutes)
  5. 4:45pm: End of day ad-hoc presentations (15 minutes)
  6. 6:00pm-8:00pm: Vendor Reception

Wednesday

  1. 8:30am: Session 1
    1. Anthony J. Stieber, Wells Fargo "Enterprise Cryptographic Key Management Realities and Issues" (45 minutes)
    2. Fabian Martins, Crosscut Consulting / FIAP University "Practices and Difficulties of key management on the credit card market" (45 minutes)
  2. 10:30am: Session 2
    1. Jay Jacobs, Target "Updating Shannon’s Maxim" (45 minutes)
    2. Chris Kostick, Ernst & Young "A Maturity Model for Enterprise Key Management" (45 minutes)
  3. 1:30pm: Session 3
    1. Russ Housley, Vigil Security  "IETF Key Management" (30 minutes)
    2. Hannes Tschofenig, Nokia-Siemens "IETF KEYPROV" (30 minutes)
    3. Subhash Sankuratripati, NetApp "Key Management in Federated Namespaces" (30 minutes)
  4. 3:30pm: Session 4
    1. Benjamin Gittins, Synaptic "Rapidly improving Cybersecurity with a new global IdM/CKM design that does not rely on PKC – SLL's response to NIST's call" (45 minutes)
    2. Petrina Gillman, NSA "National Security Agency Perspective on Key Management" (30+ minutes)
    3. End of day ad-hoc presentations (20 minutes or so)
    4. Closing Remarks (5 minutes)
  5. 6:00pm-8:00pm: Dinner
Ċ
Matthew Ball,
May 1, 2010, 1:35 PM
Comments