Bugtraq mailing list archives
Security Conference Announcement - Black Hat Briefings
From: dominique.brezinski () CYBERSAFE COM (Dominique Brezinski)
Date: Mon, 9 Jun 1997 18:33:11 -0700
<bigger>This is only being posted once, and I think it will be of some interest to the readers of this list (which I am one of). Dominique ______________________________________________________________________ BLACK HAT Briefings announcement July 9th and 10th, Las Vegas Nevada http://www.defcon.org/blackhat/ It's late. You're in the office alone, catching up on database administration. Behind you, your network servers hum along quietly, reliably. Life is good. Life is secure. Or is it? A wave of unease washes over you. The air seems cold and frighteningly still. Your hands turn clammy as a sixth sense tells you, suddenly, you're not alone. They're out there. Worse, they're trying to get in. But who? And how? And what can you do to stop them? Presented by DEF CON Communications and Cambridge Technology Partners, the Black Hat Briefings have been organized to put an end to nightmares like these. While many conferences focus on information and network security, only the Black Hat Briefings will put your engineers and software programmers face-to-face with today's cutting edge computer security experts and "hackers". Only the Black Hat Briefings will provide your people with the tools and understanding they need to thwart those lurking in the shadows of your firewall. The reality is, they are out there. The choice is yours. You can live in fear of them. Or, you can learn from them. Conference Overview Spanning two days with two separate tracks, the Black Hat Briefings will focus on the vital security issues facing organizations with large enterprise networks and mixed network operating systems. Topics will include denial of service attacks, secure programming techniques, and tool selection for creating and effectively monitoring secure networks. From PEX systems to Java and ActiveX, from Unix to Windows NT and Netware, intensive sessions will cover the intricate security problems confronting organizations seeking to leverage the full power of emerging technologies. CIO's are welcome, but they better bring the people implementing their network strategies and building their applications, because this conference is for them. Wednesday, July 9th 09:00 - 09:45 Keynote Address: Ira Winkler, NCSA. 10:00 - 11:30 Track A Auditing and Risk Analysis of Windows NT. Track B Internet Attack Methodologies. 11:40 - 13:10 Track A How Firewalls Fit into the Corporate Landscape. Track B Secure programming practices and source code analysis. 13:20 - 14:20 Lunch 14:25 - 15:20 Ray Kaplan: Meet the Enemy Session 15:30 - 17:00 Track A TCP/IP Internals: Everything You Wanted to Know About Hacking the TCP/IP Stack. Track B Secure Implementations of ActiveX in a Corporate Environment. 17:10 - 18:40 Track A Counter survailence expert. Thursday, July 10th 09:00 - 09:45 Keynote Address: Richard Thieme. 10:00 - 11:30 Track A Why Cryptography is Harder Than it Looks. Track B A Review and Implementation of Free Utilities & Software Packages for Maintaining, Monitoring, and Securing Systems and Networks. 11:40 - 13:10 Track A Novell Security, Auditing, Detection and Prevention. Track B Denial of Service Attacks and Defensive Strategies 13:20 - 14:20 Lunch 14:25 - 15:20 15:30 - 17:00 Track A CIFS and Microsoft Security Track B SNMP Security Consideration and Implementation Notable speakers and "hackers" Dominique Brezinski - Windows NT security expert. Ray Kaplan - Corporate security expert. Myles Connley - Firewall expert. Peter Shipley - Unix security and auditing expert. Bruce Schneier - Cryptography expert, author of Applied Cryptography. Mudge - Expert of secure programming techniques and originator of many CERT advisories. Route - Editor of Phrack magazine, the underground's largest electronic journal of computer hacking. TCP/IP guru. Kore - Novell security, auditing, detection and prevention specialist. QMaster - Expert in secure ActiveX and Internet application development. Sluggo - Security defense strategy expert. Hobbit - NT CIFS Security. Jeremy - SNMP and SNMP2 security implications. Richard Thieme - Internet Visionary. Richard K. - Counter survailence specialist. Ira Winkler - NCSA, author of "Corporate Espionage" Chris Goggans - Wheel Group, Ex-LOD and past editor of Phrack. Fees & Registration: Program fees are $995. To register or for more information, contact: William Brittingham Cambridge Technology Partners 304 Vassar Street Cambridge, MA 02139 617.374.8580 or e-mail wbritt () ctp com http://www.defcon.org/blackhat/ Hotel Information The Black Hat Briefings will take place July 9th and 10th at the Aladdin Hotel & Casino in Las Vegas, Nevada. To take advantage of conference rates reservations must be made prior to June 9. When making arrangements, please reference the CTP-DC Communications conference. The Aladdin Hotel and Casino, 3667 Las Vegas Blvd., South Las Vegas, NV 89109 Phone: 800.634.3424 DEF CON Communications DEF CON Communications is an independent organization providing multiple services around computer network security and security auditing. In addition to The Black Hat Briefings, DEF CON organizes one of the largest gatherings for computer security minded individuals with topics ranging from computer culture to network security to personal privacy. DEF CON V will be help July 11-13 at the Aladdin Hotel. Via it's speakers, it's programs, and it's full complement of consulting services, DEF CON demonstrates there are people in this world more paranoid than you. All Black Hat attendees recieve free admission to DEF CON V should they decide to stay the weekend. Cambridge Technology Partners http://ctp.com/ Cambridge Technology Partners is a new breed of systems integrator. We have applied our unique core values to the application development market to fundamentally reinvent the way information technology solutions are delivered. We combine process innovation, custom and package software deployment, and training to rapidly deliver end-to-end business systems that create immediatebottom-line impact for our clients. We do it fast. We do it for a fixed price. And we do it on time. Additional Sponsors Aventail Corporation http://www.aventail.com/ Founded in February 1996, Aventail Corporation is the leading vendor of next-generation Internet security systems. Its software allows organizations to secure their networks, manage their employees' access to the Internet and build Virtual Private Networks (VPNs). Creating a VPN gives organizations the ability to dynamically create a private communication or data channel over the Internet. Aventail's adherence to open security standards simplifies VPN deployment, enables interoperability, and leverages corporations' existing network investments. Its VPN solutions allow companies to extend the reach of their corporate Intranets to customers, partners, remote offices, and worldwide employees. National Computer Security Association http://www.ncsa.com/ NCSA is an independent organization offering objective views and opinions on computer security issues. We strive to improve computer security through the sharing of knowledge, dissemination of information, and certification of security products. </bigger> Dominique Brezinski ---------------------------------------------------- My opinions expressed here, and in any public forum, are my own and do not represent those of my employer or its clients. I am an individual, and I will retain those rights of free speech granted to me, regardless of my employment status.
Current thread:
- Security Conference Announcement - Black Hat Briefings Dominique Brezinski (Jun 09)