ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

MALCON 2016 - 11th IEEE International Conference on Malicious and Unwanted Software

Date2016-10-11 - 2016-10-14


VenueFajardo, Puerto Rico Puerto Rico



Topics/Call fo Papers

The 11th International Conference on Malicious and Unwanted Software (MALCON 2016) will be held at the Waldorf Astoria El Conquistador Resort, Fajardo, Puerto Rico, USA, October 11-14th, 2016 (October 20th, 2016 - optional). The Focus of the conference this year is twofold - (1) Security architectures & reformulated solutions, and (2) The demise of traditional end-point protection. The topics are described in the paragraphs below. click here For the CFP.
Security Architectures & Reformulated Solutions
In the past, the security protection model that most organizations applied to protect their infrastructure was simply the "Everything but the Kitchen Sink" model—meaning, add devices that protect the enterprise network perimeter (Trusted Zone), add devices that protect your mobile device, add devices that protect your data base., and on, and on.. In essence, this model simply amounted to the accumulation of security devices. Given the increased number, scope, and frequency of breaches in the last few years, it is clear that this model has failed.
In addition, the idea that cyber-attacks can be stopped at the periphery of the network has become a fool's errand. In today's circa 2020 computing environment and cyber-threat landscape, individuals as well as corporations have recognized the fact that (i) threats are often distributed both in time and space, making detection extremely difficult, and (ii) the working assumption is not that you can prevent infections (the goal of 100% prevention is no longer practical), but rather, given that your "system" will be compromised, how quickly can you
detect the breach and how do you minimize the impact of such an event? In the future, the basis of competition for security products and services will be the ability to provide early warnings and execute countermeasures that minimize both products vulnerability and damage from cyber-attackers.
Security products are no longer about single or even multiple independent security devices each providing close-as-we-can-get-to-perfect standalone protection. Rather, information from all your security products and services needs to be correlated, scrutinized and transformed into
wide-angle actionable information applicable to your specific enterprise environment. We call this approach the “Fabric of Security” , see [Colon Osorio].This approach has led to the specification of several new (and revived) security architectures. Some are “open” (e.g., Blue Coat Open Architecture) while others are more proprietary, such as the Security Control Framework (SCF) and SAFE architectures from Cisco
The conference organizers encourage participants to submit manuscripts evaluating alternate security architectures including analyses of their practical effectiveness when actually deployed.

Last modified: 2016-05-29 11:45:32