Information Security News mailing list archives

Black Hat 2002 Speakers Announced


From: InfoSec News <isn () c4i org>
Date: Thu, 6 Jun 2002 04:26:04 -0500 (CDT)

Forwarded from: B.K. DeLong <bkdelong () pobox com>

For Immediate Release

Contacts

B.K. DeLong
press () blackhat com
+1.617.877.3271

BLACK HAT BRIEFINGS 2002 SESSIONS EXAMINE BEST PRACTICES & THE BEST TOOLS

Top Security Experts Address the Real Issues in Computer Security -
Richard Clarke to Keynote

http://www.blackhat.com/ -- Black Hat Inc. announced today preliminary
speaker sessions for this summer's Black Hat Briefings and Training
2002, the annual conference and workshop designed to help computer
professionals better understand the security risks to their computer
and information infrastructures by potential threats. This year's show
will focus on several tracks of hot topics including Wireless,
Firewalls, Access Control, PKI & Single Signon, Routing and
Infrastructure, Application Security, Intrusion Detection, Incident
Response & Computer Forensics, Privacy & Anonymity, Web, Mail and
Other Related Servers, and Deep Knowledge. The event is being held 31
July through 1 August 2002 at the Caesars Palace Hotel and Casino in
the heart of Las Vegas.

Top-notch speakers will deliver to the conference's core audience of
IT & network security experts, consultants and administrators the
newest developments on the vital security issues facing organizations
using large networks with a mix of operating systems.

"Our goal is to present a vendor-neutral environment where conference
attendees can receive key intelligence in a face-to-face environment
with the people developing the tools used by and against hackers,"
says Jeff Moss, founder of Black Hat Inc. "Our speakers discuss the
strategies involved in correcting existing problems and inform
attendees on upcoming issues, preparing them for the future."

Richard Clarke, Special Advisor to President Bush for Cyberspace
Security, will be one of the keynotes headlining the event. Mr. Clarke
has served in several senior national security posts. Most recently he
served as National Coordinator for Security, Infrastructure
Protection, and Counter-terrorism on the National Security Council. As
National Coordinator, he led the U.S.  government's efforts on
counter-terrorism, cyber security, continuity of government
operations, domestic preparedness for weapons of mass destruction, and
international organized crime. He will be speaking about our nation's
strategy for securing cyberspace.


The lineup of Black Hat Briefings presenters for 2002 include:


         -- Thomas Akin, Founding Director, Southeast Cybercrime
Institute.  Akin is a Certified Information Systems Security
Professional (CISSP) who has worked in Information Security for almost
a decade. He is the founding director of the Southeast Cybercrime
Institute where he also serves as chairman for the Institute's Board
of Advisors. He is an active member of the Georgia Cybercrime Task
Force where he heads up the Task Force's Education committee. Thomas
also works with Atlanta's ISSA, InfraGard, and HTCIA professional
organizations.

          -- Ofir Arkin, Managing Security Architect, @stake. Prior to
joining @stake, Arkin has worked as a consultant for several European
finance institutes where he played the rule of Senior Security
Analyst, and Chief Security Architect in major projects. His
experience includes working for a leading European Swiss bank
architecting the security of the bank's E-banking project.

         -- Rebecca Bace, President/CEO, Infidel Inc. Bace provides
strategic and operational consulting services for clients that include
security point product developers, legal firms, and Internet solutions
providers. She is also a noted author on topics in intrusion detection
and network security, with credits including the white paper series
for ICSA's Intrusion Detection Consortium. Her book on Intrusion
Detection was published by Macmillan Technical Publishing in January,
2000.

         -- Don Cavender, Senior Special Agent, FBI Academy. SSA
Cavender has twelve years experience as an FBI Agent. The past seven
years he has been involved in high technology investigations and/or
digital forensics.  He is presently responsible for instruction in
Internet and Network Investigations for FBI, Federal, State and Local
Law Enforcement Investigators, case support and consultation and
research.

         -- Sean Convery, Network Architect, Cisco. Convery is a
network architect in Cisco's VPN and security business unit. Sean
works primarily on the SAFE blueprint, and is an author several of its
whitepapers. Prior to his four years at Cisco, Sean held various
positions in both IT and security consulting during his 11 years in
networking.

         -- Mark Eckenwiler, Senior Counsel in the Computer Crime &
Intellectual Property Section, Criminal Division, U.S. Department of
Justice. Eckenwiler is Senior Counsel in the Computer Crime and
Intellectual Property Section, Criminal Division, U.S. Department of
Justice. His areas of responsibility include federal wiretap law,
computer search and seizure, and online investigations. An Internet
veteran for almost two decades, Mark has written and spoken widely on
such issues as anonymity and free speech, e-mail stalking laws,
Internet jurisdiction, electronic privacy, and the Fifth Amendment
implications of cryptographic keys.

         -- Halvar Flake, Reverse Engineer, Black Hat Consulting.  
Originating in the fields of copy protection and digital rights
management, he gravitated more and more towards network security over
time as he realized that constructive copy protection is more or less
fighting windmills. After writing his first few exploits he was hooked
and realized that reverse engineering experience is a very handy asset
when dealing with COTS software. With extensive experience in reverse
engineering, network security, penetration testing and exploit
development he recently joined BlackHat as their primary reverse
engineer.


         -- Dr. Ian Goldberg is internationally recognized as one of
the world's leading cryptographers and cypherpunks. Dr. Goldberg is a
founder of Berkeley's Internet Security, Applications, Authentication
and Cryptography group. In addition to developing many of the leading
network software titles for the Palm Pilot, he is known for his part
in cracking the first RSA Secret Key Challenge in three and a half
hours; breaking Netscape's implementation of the encryption system
SSL; and breaking the cryptography in the GSM cellular phone standard.
In November 1998, Wired magazine selected Dr. Goldberg as one of the
"Wired 25" - the twenty-five people who in 1998 are "about to change
the rules all over again." In December 2000 he obtained his Ph.D. from
UC Berkeley for his thesis "A Pseudonymous Communications
Infrastructure for the Internet," which examined the technical and
social issues involved in designing the Freedom Network.


         -- Jennifer Granick, Litigation Director, Center for Internet
and Society, Stanford Law School. Ms. Granick's work focuses on the
interaction of free speech, privacy, computer security, law and
technology. She is on the Board of Directors for the Honeynet Project
and has spoken at the NSA, to law enforcement and to computer security
professionals from the public and private sectors in the United States
and abroad. Before coming to Stanford Law School, Ms. Granick
practiced criminal defense of unauthorized access and email
interception cases nationally. She has published articles on wiretap
laws, workplace privacy and trademark law.


         -- The Honeynet Project is a non-profit, all volunteer
security research organization dedicated to researching the blackhat
community, and sharing the lessons learned. Made up of thirty security
professional, the Project deploys Honeynet around the world to capture
and analyze blackhat activity. These lessons are then shared with the
security community. The Honeynet Project began in 1999 and continues
to grow with the founding of the Honeynet Research Alliance.

         -- Jesse Kornblum, Chief, Research and Development, Air Force
Office of Special Investigations. SA Kornblum is the Chief of Research
and Development for the Air Force Office of Special Investigations
Computer Investigations and Operations Branch . A graduate of the
Massachusetts Institute of Technology, he has experience running
intrusion investigations and supporting other agents in more
traditional investigations. He is currently responsible for developing
tools and techniques to allow agents to conduct investigations.

         -- Larry Leibrock, Associate Dean and Technology Officer,
University of Texas McCombs Business School. Leibrock has held or
currently holds clinical teaching and research appointments at McCombs
Business School, Institute for Advanced Technology, The University of
Texas Law School, Emory University, Helsinki School of Economics and
Monterrey Technologica in Mexico City and Monterrey. He is a member of
IEEE, ACM, Internet Society, FIRST and USENIX/SAGE. He is also a
member of the Department of Defense Software Engineering Institute and
a participant in the Air Force Software Technology Conference.

         -- David Litchfield, Managing Director & Co-Founder, Next
Generation Security Software. Litchfield is a world-renowned security
expert specializing in Windows NT and Internet security. His discovery
and remediation of over 100 major vulnerabilities in products such as
Microsoft's Internet Information Server and Oracle's Application
Server have lead to the tightening of sites around the world. David
Litchfield is also the author of Cerberus' Internet Scanner
(previously NTInfoscan), one of the world's most popular free
vulnerability scanners. In addition to CIS, David has written many
other utilities to help identify and fix security holes. David is the
author of many technical documents on security issues including his
tutorial on Exploiting Windows NT Buffer Overruns referenced in the
book "Hacking Exposed".


         -- Dr. William Tafoya, Senior Member of the Executive Staff,
Computer Sciences Corporation Federal Sector - Defense Group. Tafoya
is formerly Director of the Information System Security and Education
Center, Washington, DC. Prior to that he was Professor of Criminal
Justice at Governors State University and before that he was Director
of Research for the Office of International Criminal Justice at the
University of Illinois at Chicago. He is a retired Special Agent of
the Federal Bureau of Investigation.

A full list of speakers can be found at:
http://www.blackhat.com/html/bh-usa-02/bh-usa-02-speakers.html

Black Hat Inc. will also conduct computer security training for
several different topics the two days prior to the briefings - 29
through 30 July.

Subjects include:

         -- Hacking by Numbers
         -- Secure Development of Data-Driven Web Applications
         -- System and Process for Digital Evidence Ramp-Up Course
         -- Forensics Tools and Processes for Windows 2000 and Windows XP 
            Platforms
         -- Using Active Directory to Manage Security
         -- Advanced Scanning with ICMP
         -- Securing Solaris and Locking Down Linux
         -- NSA InfoSec Assessment Methodology Course
         -- Ultimate Hacking: Black Hat Edition
         -- Analyzing Software for Security Vulnerabilities
         -- Infrastructure Attacktecs & Defentec "Hacking into a Cisco Network"



The instructors for the training segment of this year's Black Hat are
some of the top experts in their field and are fully active in the
computer security community. You won't find most of these speakers
anywhere else and these handpicked security gurus will train
participants in understanding the real threats to any network and how
to keep them from being exploited.

To register for BlackHat Briefings, visit the Web site at
http://www.blackhat.com. Direct any conference-related questions to
info () blackhat com.

For press registration, contact B.K. DeLong at +1.617.877.3271 or via
email at press () blackhat com.

About Black Hat Inc.

Black Hat Inc. was originally founded in 1997 by Jeff Moss to fill the
need for computer security professionals to better understand the
security risks and potential threats to their information
infrastructures and computer systems. Black Hat accomplishes this by
assembling a group of vendor-neutral security professionals and having
them speak candidly about the problems businesses face and their
solutions to those problems. Black Hat Inc. produces 5 briefing &
training events a year on 3 different continents. Speakers and
attendees travel from all over the world to meet and share in the
latest advances in computer security. For more information, visit
their Web site at http://www.blackhat.com

###

--
B.K. DeLong
Press Coordinator
Black Hat Briefings
and
Def Con X
+1.617.877.3271

bkdelong () blackhat com
http://www.blackhat.com



-
ISN is currently hosted by Attrition.org

To unsubscribe email majordomo () attrition org with 'unsubscribe isn'
in the BODY of the mail.


Current thread: