Programme

Available as an ICS file - with thanks to Stephen Usher.

Foyer 08:30–09:15 Registration Tea and coffee and pastries
Session 1 — Chair: Jeremy Worth, ICTF Chairman
Theatre 09:15–09:20 Introduction Jeremy Worth, ICTF Chairman
Theatre 09:20–10:00 The Malware Oscars Chas Tomlin, Team Cymru
  10:00–10:10 Break For moving rooms. No refreshments provided.
See right 10:10–10:50 Workshop A

ES(9)Room Booking System: MRBS
SRB(11)Trusted Computing for Trusted Infrastructure
RT(14)iPhone Development Overview
NM(16)Windows 7
RR(17)OeRC: Facilities & Services
LT4(24)NSMS: VMWare High availability dual-site setup

Foyer 10:50–11:20 Tea and coffee  
Session 2 — Chair: Sarah Lawson, Secretary to ICTF
Theatre 11:20–12:00 The Myth of Vulnerabilities in Software Ed Gibson, Microsoft UK
  12:00–12:10 Break Shake your legs, talk to your neighbour while laptops plugs are pushed and pulled.
Theatre 12:10–12:50 Social Networking: A new frontier for malware, spam and identity theft Graham Cluley, Sophos
Foyer 13:00–13:55 Lunch  
Session 3 — Chair: Sarah Lawson, Secretary to ICTF
See right 14:00–14:40 Workshop B
RR(6)Pros & Cons of MySource Matrix
NM(7)Digital photography and media
ES(8)Demystifying Plone
RT(18)Customising Request Tracker
LT4(20)Identity Management with the Core User Directory
SRB(22)The New WebLearn Service
  14:40–14:50 Break For moving rooms. No refreshments provided.
See right 14:50–15:30 Workshop C
ES(4)Erewhon Geo-Spatial Services and Mobile Computing in Oxford
LT4(5)An Introduction to NAT logging
SRB(10)Enhancing learning and teaching through the use of technology
RR(15)How to Use Your Supercomputing Centre
RT(19)AppleLab at OUCS
NM(21)Groupware migration
Foyer 15:30–16:00 Tea and coffee  
Session 4 — Chair: Jeremy Worth, ICTF Chairman
See right 16:00–16:40 Workshop D
RT(1)Up the Steeple: Streamlining Enterprise-Level Podcasting for HE
ES(2)Libraries' IT: Who does what
LT4(3)Best practice key management for enterprise-wide encryption implementations
NM(12)Green Desktop Computing
RR(13)Update of the new HR Information System
SRB(23)Sysdev & BSP: Tying together SSO and OSS
  16:40–16:50 Break For moving rooms. No refreshments provided.
Theatre 16:50–17:00 ICT Forum  
Theatre 17:00–17:40 IT and High Performance Computing at Renault F1 Graeme Hackland, Renault F1
Foyer 17:40–19:00 Evening Reception Wine and light refreshments

Plenary Talks

The Malware Oscars Chas Tomlin, Team Cymru  
This talk will take a look at some of today's more common malware and the effect it has on end user systems.
The Myth of Vulnerabilities in Software Ed Gibson, Microsoft UK  

Despite the mutating threats of cyber attacks, online extortion, or spam, a well-structured information security strategy can safeguard your business and ensure that risks are managed with commitment and understanding.  Given the current economic times customers need that little bit of extra assurance they are taking the rights steps to protect their electronic landscape from Insiders, Harvesters, Social Engineers, Organized Criminals and State Sponsors.  But as the internet is not territorial or jurisdictionally bound our real world responses to increasingly sophisticated attacks are not as effective.  So who do you trust?  Using examples from his 20 year career as an FBI Special Agent (including the most recent 5 years when he was assigned as a Diplomat to US Embassy London in charge of the FBI's UK and Ireland cyber hi-tech investigations) Ed Gibson will describe why he believes Microsoft is the only company with the necessary global reach to change the online security posture of the Internet. He brings security alive and makes it personal. 

Social Networking: A new frontier for malware, spam and identity theft Graham Cluley, Sophos [PDF]
Financially motivated hackers are increasingly exploiting social and business networks (i.e., Facebook, Twitter, MySpace and LinkedIn) to seize computers, commit identity theft, and install malware on victims' PCs. This talk covers how attacks have evolved, how social networking sites are trying to defend against exploitation, and what companies and people can do to protect themselves.
IT and High Performance Computing at Renault F1 Graeme Hackland, Renault F1 [PDF]
In 2008, the ING Renault Formula 1 Team invested in a 38TFlop supercomputer to contribute to the Team's key performance area of Aerodynamics. Find out how the ING Renault Formula 1 Team achieved what Bob Bell, Technical Director, described as "a rarity in large-scale projects these days - delivery on time and under budget".

Menus

Lunch menu    

Savoury Tart Lunch with juice and water

Traditional quiche lorraine on wholemeal pastry
Caramelised onion & rosemary pie
Pancetta, brie & sun blushed tomato tart
Hot new potatoes in lemon oil & dill
Tomato & red onion salad
Green leaf salad
selection of continental breads & unsalted butter
fresh cut fruit platter

Meat - Salami, Tomato & Mozzarella focaccia - Croque monsieur - Smoked chicken, leek & cheddar tart
Fish - Mini fish & chip cones - Prawn, ice berg & wasabi mayo wrap - Salmon & rocket tart
Vegetarian - Egg & cress baguette - Boccaccini, tomato & basil pizza - Leek & smoked cheddar quiche
Kettle Chips, Olives & cherry tomatoes