While security risks on the Internet continue to exist in many areas, one increasingly exploited threat is the global rise of botnets.
A botnet infection can lead to the monitoring of a consumer's personal information and communication, and exploitation of that consumer's computing power and Internet access.
To address the problems created by botnets, the botnet lifecycle must be disrupted and the malware on the devices removed or made impotent. Companies, organizations and governments around the world have been developing policies, high-level principles and solutions.
NIST seeks to engage all stakeholders to identify the available and needed technologies and tools to recognize, prevent, and remediate botnets; explore current and future efforts to develop botnet metrics and methodologies for measuring and reporting botnet metrics over time; and, understand where ecosystem stakeholders are in terms of roles and responsibilities.
Date: Wednesday, May 30, 2012
Location: 100 Bureau Dr. Gaithersburg, MD. 20899 (Building 101 - Green Auditorium)
Registration: Online registration
Panel 1: Current and Future Efforts and Challenges
This panel will discuss the various efforts ongoing in this area. The panel will also address issues and challenges related to the prevention, detection, notification, and remediation of botnets. Panel members will discuss the impact of botnets, the characteristics and threats that make botnets a unique problem, and what it will take to effectively counter them. The panel will focus on the environment and ecosystem in which botnets function and the gaps in developing solutions.
Panel 2: Metrics, Measurements and Reporting
This panel will focus on opportunities and methods for measuring and reporting botnets. Panelists will examine what metrics work, how they should be reported, if they need to be standardized, where they should be employed, and the major challenges. The panel will discuss current and future efforts to develop metrics and potential methodologies for evaluating and reporting botnets over time.
Panel 3: Technologies, Tools, and Resources
This panel will explore the various technologies, tools and resources that are needed to effectively detect, prevent and remediate botnets. Panel members will examine their effectiveness, existing gaps or areas needing improvement, and those characteristics that make them most useful.
Panel 4: Roles and Responsibilities
The botnet ecosystem has many players. In this panel, government and private sector representatives will share their perspectives on what roles the various stakeholders (e.g. ISPs, browser providers, security firms, search engines, users, etc.) play and what their responsibilities are or could be. Panelists will discuss trends, gaps, and opportunities in the current environment.
Please note that there are now additional requirements for visitor vehicles entering the campus. When a Guest/Visitor checks in at the NIST Visitor Center at Gate A and intends to drive into the campus, they will have to show two documents: a Photo ID (State issued driver's license, Federal ID or passport) and a Vehicle Registration card. If a guest does not have a valid vehicle registration, they will be required to park at the Visitor Center and take the NIST Campus Shuttle. Visitors driving rental cars can show their rental agreement in lieu of vehicle registration.
Once you leave the Visitor Center, you will be asked to show the name badge you picked up and a photo ID before being admitted onto the campus.
The NIST Conference office coordinates security instructions with registered attendees directly.