<html><head>
<meta http-equiv="Content-Type" content="text/html; charset=Windows-1252"><title>Call for Participation--ICANN DNSSEC Workshop 14 March 2012</title>
</head>
<body>
<font face="Calibri, Verdana, Helvetica, Arial"><span style="font-size:11pt"><b>Call for Participation -- ICANN DNSSEC Workshop 14 March 2012<br>
</b></span></font><blockquote><font face="Calibri, Verdana, Helvetica, Arial"><span style="font-size:11pt"><br>
</span></font></blockquote><font face="Calibri, Verdana, Helvetica, Arial"><span style="font-size:11pt">The DNSSEC Deployment Initiative, in cooperation with the ICANN Security and Stability Advisory Committee (SSAC), is planning a DNSSEC Workshop at the ICANN meeting in San Jose, Costa Rica on 14 March 2012. The DNSSEC Workshop has been a part of ICANN meetings for several years and has provided a forum for both experienced and new people to meet, present and discuss current and future DNSSEC deployments. For reference, the most recent session was held at the ICANN Dakar meeting on 26 October 2011. The presentations and transcripts of the presentations are available at <font color="#0000FF"><u><a href="http://dakar42.icann.org/node/26937">http://dakar42.icann.org/node/26937</a></u></font>.<br>
<br>
We are seeking presentations on the following topics:<br>
<br>
1. DNSSEC activities in Latin America<br>
This is a key panel and we are seeking participation from those who have been involved in DNSSEC deployment in Latin America as well as those who have a keen interest in the challenges and benefits of deployment. Key questions are to consider include: what would help to promote DNSSEC deployment? What are the challenges you have faced when you deployed DNSSEC? Can DNSSEC make the information users receive more reliable? <br>
<br>
2. The realities of running DNSSEC<br>
Now that DNSSEC has become an operational norm for many registries and registrars, what have we learned about how we manage DNSSEC? What's best practice around key rollovers? How often do you review your disaster recovery procedures? Is there operational familiarity within your customer support teams? Has DNSSEC made DNS more 'brittle' or is it just a run-of-the-mill operational practice?<br>
<br>
3. DNSSEC and the Finance Industry<br>
DNSSEC has always been seen as a huge benefit to organizations looking to protect their identity and security on the Web. The finance industry is an obvious target for DNS hackers and DNSSEC provides an ideal solution to this challenge. Take-up of DNSSEC in this sector has been slower than anticipated, but with Paypal signing all of their global domains, we are starting to see real progress. This session aims to look at the benefits and challenges of deploying DNSSEC for banks and the financial service industry. Topics for discussion:<br>
</span></font><ul><li><font face="Calibri, Verdana, Helvetica, Arial"><span style="font-size:11pt">What's the current status of DNSSEC deployment amongst financial services businesses?
</span></font><li><font face="Calibri, Verdana, Helvetica, Arial"><span style="font-size:11pt">What plans to the major banks have for their DNSSEC roadmaps?
</span></font><li><font face="Calibri, Verdana, Helvetica, Arial"><span style="font-size:11pt">What are the challenges to deployment for these organizations? Do they foresee raising awareness of DNSSEC with their customers?<br>
</span></font></ul><font face="Calibri, Verdana, Helvetica, Arial"><span style="font-size:11pt"><br>
3. When unexpected DNSSEC events occur<br>
What have we learned from some of the operational outages that we have seen over the past 18 months? Are there lessons that we can pass on to those just about to implement DNSSEC? How do you manage dissemination of information about the outage? What have you learned about communications planning? Do you have a route to ISPs and registrars? How do you liaise with your CERT community?<br>
<br>
4. DNSSEC in the wild<br>
What operational statistics have we gathered about DNSSEC? Is it changing DNS patterns? How are our nameservers handling DNSSEC traffic? Is the volume as expected? Have we seen anything unusual? Are there experiences being documented in the form of best practices, or something similar, for transfer of signed zones?<br>
<br>
5. DANE and other DNSSEC applications<br>
Using DNSSEC as a means of authentication for http transactions is an exciting development of DNSSEC. What is the progress of the DNS-Based Authentication of Named Entities (DANE) initiative? (See <font color="#0000FF"><u><a href="http://datatracker.ietf.org/wg/dane/">http://datatracker.ietf.org/wg/dane/</a>.</u></font>) How soon could DANE become a deployable reality and what will be the impact of such a deployment, e.g. impact on traditional certification authorities (CAs)?<br>
<br>
In addition, we welcome suggestions for additional topics. If you are interested in participating, please send a brief (1-2 sentence) description of your proposed presentation. Here are the relevant deadlines:<br>
<br>
<b>13 January 2012 </b>— Deadline to submit brief description of presentation from interested participants<br>
<b>13 February 2012</b> — Deadline to submit presentation slides<br>
<br>
Please respond to <font color="#0000FF"><u><a href="dnssec-costa-rica@shinkuro.com">dnssec-costa-rica@shinkuro.com</a></u></font><u><font color="#0000F9"> </font></u>no later than 13 January as indicated above. We hope that you can join us.<br>
<br>
Thank you,<br>
<br>
Julie Hedlund<br>
<br>
On behalf of the DNSSEC Workshop Program Committee:<br>
Luis Diego Espinoza, NIC .cr<br>
Steve Crocker, Shinkuro<br>
Simon McCalla, Director of IT, Nominet UK<br>
Russ Mundy, Cobham<br>
Lance Wolak, Vice President, Marketing & Sales, .ORG, The Public Interest Registry<br>
</span></font>
</body>
</html>