Vulnerability Development mailing list archives

Black Hat Briefings 2003 - Announcement


From: Jeff Moss <jmoss () blackhat com>
Date: Wed, 18 Jun 2003 10:49:18 -0700

Contacts:

B.K. DeLong
press () blackhat com

BLACK HAT BRIEFINGS 2003 SESSIONS HIGHLIGHT NEXT GENERATION SECURITY TECHOLOGY, BEST PRACTICES

Top Academic Researchers & Industry Gurus will Focus on Key Vulnerabilities and Offer Comprehensive Strategies to Todays Security Problems; PGP Creator Phil Zimmermann to Keynote.

http://www.blackhat.com/ -- Black Hat Inc. announced today preliminary speaker sessions for this summer's Black Hat Briefings and Training 2003, the annual conference and workshop designed to help computer professionals better understand the security risks to their computer and information infrastructures by potential threats. This year's show will focus on 10 tracks of hot topics including Incident Response & Computer Forensics, Firewalls, Access Control, Routing & Infrastructure, Application Security, Intrusion Detection, Log Analysis, Privacy & Anonymity, and Law & Society. The Briefings event is being held 30 through 31 July 2003 at the Caesars Palace Hotel and Casino in the heart of Las Vegas, with two days of training preceding it.

Top-notch speakers will deliver to the conference's core audience of IT & network security experts, consultants and administrators the newest developments on the vital security issues facing organizations using large networks with a mix of operating systems.

"Our goal is to present a vendor-neutral environment where conference attendees can receive key intelligence in a face-to-face environment with the people developing the tools used by and against hackers," says Jeff Moss, founder of Black Hat Inc. "Our speakers discuss the strategies involved in correcting existing problems and inform attendees on upcoming issues, preparing them for the future."

Phil Zimmermann, cryptographic technologist, will be one of the keynotes headlining the event. Zimmermann is the creator of Pretty Good Privacy and currently a special advisor and consultant for the PGP Corporation. He is best known for being the target of a three-year criminal investigation, because the US Government held that export restrictions for cryptographic software were violated when PGP was spread around the world following its 1991 publication as freeware. Zimmermann currently consults for a number of companies and industry organizations on matters cryptographic, and is also a Fellow at the Stanford Law School's Center for Internet and Society. Before founding PGP Inc, Zimmermann was a software engineer with more than 20 years of experience specializing in cryptography and data security, data communications, and real-time embedded systems.

The lineup of Black Hat Briefings presenters for 2003 include:

-- Thomas Akin, Founding Director, Southeast Cybercrime Institute. Akin is a Certified Information Systems Security Professional (CISSP) who has worked in Information Security for almost a decade. He is the founding director of the Southeast Cybercrime Institute a division or Continuing Education at Kennesaw State University. He serves as chairman for the Institute's Board of Advisors and is an active member of the Georgia Cybercrime Task Force.

-- Jay Beale, Senior Research Scientist, George Washington University Cyber Security Policy and Research Institute. Beale is a security specialist focused on host lockdown and security audits. He is the Lead Developer of the Bastille project, which creates a hardening script for Linux, HP-UX, and Mac OS X, a member of the Honeynet Project, and a core participant in the Center for Internet Security.

-- Chris Conacher, Black Hat Consulting. Conacher has over 6 years experience in formal Information Security roles. This time has been spent with the Fortune 500 companies BAE Systems (formerly British Aerospace and Marconi Space Systems), BAE Systems Airbus and Intel Corporation. He has also worked for the Information Risk Management consultancy practice of 'Big 5' firm KPMG LLP where he specialized in 'High-Tech' companies. Chris' time in Information Security has seen him working in England, France, Germany, Greece, Russia and the USA. His specialties include the development, deployment and review of corporate information security programs; the secure integration of Mergers & Acquisitions; data protection in disaster recovery planning; and information security business impact analysis.

-- Roger Dingledine, Founder & Owner, Moria Research Labs. Dingledine is a security and privacy researcher. While at MIT under professor Ron Rivest, he developed Free Haven, one of the early peer-to-peer systems that emphasized resource management while retaining anonymity for its users.Currently he consults for the US Navy to design and develop systems for anonymity and traffic analysis resistance. Recent work includes anonymous publishing and communication systems, traffic analysis resistance, censorship resistance, attack resistance for decentralized networks, and reputation.

-- Himanshu Dwivedi, Managing Security Architect, @stake. At @stake, Himanshu leads the Storage Center of Excellence (CoE), which focuses research and training around storage technology, including Network Attached Storage (NAS) and Storage Area Networks (SAN). Himanshu's focus in security is networking technology and storage architecture, specifically Fibre Channel Security.

-- Jennifer Granick, Litigation Director, Center for Internet and Society, Stanford Law School. Ms. Granick's work focuses on the interaction of free speech, privacy, computer security, law and technology. She is on the Board of Directors for the Honeynet Project and has spoken at the NSA, to law enforcement and to computer security professionals from the public and private sectors in the United States and abroad. Before coming to Stanford Law School, Ms. Granick practiced criminal defense of unauthorized access and email interception cases nationally. She has published articles on wiretap laws, workplace
privacy and trademark law.

-- The Honeynet Project is a non-profit, all volunteer security research organization dedicated to researching the blackhat community, and sharing the lessons learned. Made up of thirty security professional, the Project deploys Honeynet around the world to capture and analzye blackhat activity. These lessons are then shared with the security community. The Honeynet Project began in 1999 and continues to grow with the founding of the Honeynet Research Alliance.

-- Larry Leibrock, Associate Dean and Technology Officer, University of Texas McCombs Business School. Leibrock has held or currently holds clinical teaching and research appointments at McCombs Business School, Institute for Advanced Technology, The University of Texas Law School, Emory University, Helsinki School of Economics and Monterrey Technologica in Mexico City and Monterrey. He is a member of IEEE, ACM, Internet Society, FIRST and USENIX/SAGE and is also a member of the Department of Defense Software Engineering Institute and a participant in the Air Force Software Technology Conference.

-- Neel Mehta, Application Vulnerability Researcher, ISS X-Force. Mehta works as an application vulnerability researcher at ISS X-Force, and like many other security researchers comes from a reverse-engineering background. His reverse engineering experience was cultivated through extensive consulting work in the copy protection field, and has more recently been focused on application security. Neel has done extensive research into binary and source-code auditing, and has applied this knowledge to find many vulnerabilities in critical and widely deployed network applications.

-- Richard Salgado, Senior Counsel, Computer Crime and Intellectual Property Section of the United States Department of Justice. Salgado specializes in investigating and prosecuting computer network cases, such as computer hacking, denial of service attacks, illegal sniffing, logic bombs, viruses and other technology-driven privacy crimes. Often such crimes cross international jurisdictions; Mr. Salgado helps coordinate and manage the investigation and prosecution of those cases and participates in policy development relating to emerging technologies such as the growth of wireless networks, voice-over Internet Protocol, surveillance tools and forensic techniques.

Black Hat Inc. will also conduct computer security training for several different topics several days prior to the briefings - 26 through 29 July.

Subjects include:

        -- Infrastructure Attacktecs™ & Defentecs™: "Hacking Cisco Networks"
        -- Aspects of Offensive Root-kit Technology
        -- Network Application Design & Secure Implementation
        -- NSA InfoSec Assessment Methodology Course
        -- OSSTMM Professional Security Analyst (OPSA)
        -- Forensics Tools and Processes for Windows XP® Platforms
        -- Discover the Hidden: Steganography Investigator Training
-- Enterprise Security From Day 1 to Completion: A Practical Approach to Developing an InfoSec Program
        -- Microsoft Ninjitsu: Securely Deploying MS Technologies
        -- Securing Solaris and Locking Down Linux
        -- Ultimate Hacking: Expert Edition

The instructors for the training segment of this year's Black Hat are some of the top experts in their field and are fully-active in the computer security community. You won't find most of these speakers anywhere else and these handpicked security gurus will train participants in understanding the real threats to any network and how to keep them from being exploited.

To register for BlackHat Briefings, visit the Web site at http://www.blackhat.com. Direct any conference-related questions to info () blackhat com.

For press registration, contact B.K. DeLong via email at press () blackhat com.

About Black Hat Inc.

Black Hat Inc. was originally founded in 1997 by Jeff Moss to fill the need for computer security professionals to better understand the security risks and potential threats to their information infrastructures and computer systems. Black Hat accomplishes this by assembling a group of vendor-neutral security professionals and having them speak candidly about the problems businesses face and their solutions to those problems. Black Hat Inc. produces 5 briefing & training events a year on 3 different continents. Speakers and attendees travel from all over the world to meet and share in the latest advances in computer security. In addition to the Briefings, Black Hat has grown to provide training and consulting services. For more information, visit their Web site at http://www.blackhat.com


Current thread: