Security Conference Announcement - Black Hat Briefings

Dominique Brezinski (dominique.brezinski@CYBERSAFE.COM)
Mon, 09 Jun 1997 18:33:11 -0700

<bigger>This is only being posted once, and I think it will be of some
interest to the readers of this list (which I am one of).

Dominique

______________________________________________________________________

BLACK HAT Briefings announcement

July 9th and 10th, Las Vegas Nevada

http://www.defcon.org/blackhat/

It's late. You're in the office alone, catching up on database
administration.

Behind you, your network servers hum along quietly, reliably. Life is
good.

Life is secure. Or is it?

A wave of unease washes over you. The air seems cold and frighteningly
still.

Your hands turn clammy as a sixth sense tells you, suddenly, you're not
alone.

They're out there. Worse, they're trying to get in. But who? And how?
And

what can you do to stop them?

Presented by DEF CON Communications and Cambridge Technology Partners,
the

Black Hat Briefings have been organized to put an end to nightmares
like

these. While many conferences focus on information and network
security,

only the Black Hat Briefings will put your engineers and software
programmers

face-to-face with today's cutting edge computer security experts and

"hackers". Only the Black Hat Briefings will provide your people with
the

tools and understanding they need to thwart those lurking in the shadows
of

your firewall.

The reality is, they are out there. The choice is yours. You can live
in

fear of them. Or, you can learn from them.

Conference Overview

Spanning two days with two separate tracks, the Black Hat Briefings will
focus

on the vital security issues facing organizations with large enterprise

networks and mixed network operating systems. Topics will include denial
of

service attacks, secure programming techniques, and tool selection for

creating and effectively monitoring secure networks. From PEX systems to
Java

and ActiveX, from Unix to Windows NT and Netware, intensive sessions
will

cover the intricate security problems confronting organizations seeking
to

leverage the full power of emerging technologies. CIO's are welcome, but
they

better bring the people implementing their network strategies and
building

their applications, because this conference is for them.

Wednesday, July 9th

09:00 - 09:45 Keynote Address: Ira Winkler, NCSA.

10:00 - 11:30 Track A Auditing and Risk Analysis of Windows NT.

Track B Internet Attack Methodologies.

11:40 - 13:10 Track A How Firewalls Fit into the Corporate
Landscape.

Track B Secure programming practices and source code

analysis.

13:20 - 14:20 Lunch

14:25 - 15:20 Ray Kaplan: Meet the Enemy Session

15:30 - 17:00 Track A TCP/IP Internals: Everything You Wanted to
Know

About Hacking the TCP/IP Stack.

Track B Secure Implementations of ActiveX in a
Corporate

Environment.

17:10 - 18:40 Track A Counter survailence expert.

Thursday, July 10th

09:00 - 09:45 Keynote Address: Richard Thieme.

10:00 - 11:30 Track A Why Cryptography is Harder Than it Looks.

Track B A Review and Implementation of Free Utilities
& Software Packages for Maintaining, Monitoring, and
Securing

Systems and Networks.

11:40 - 13:10 Track A Novell Security, Auditing, Detection and
Prevention.

Track B Denial of Service Attacks and Defensive
Strategies

13:20 - 14:20 Lunch

14:25 - 15:20

15:30 - 17:00 Track A CIFS and Microsoft Security

Track B SNMP Security Consideration and Implementation

Notable speakers and "hackers"

Dominique Brezinski - Windows NT security expert.

Ray Kaplan - Corporate security expert.

Myles Connley - Firewall expert.

Peter Shipley - Unix security and auditing expert.

Bruce Schneier - Cryptography expert, author of Applied
Cryptography.

Mudge - Expert of secure programming techniques and

originator of many CERT advisories.

Route - Editor of Phrack magazine, the underground's
largest

electronic journal of computer hacking. TCP/IP
guru.

Kore - Novell security, auditing, detection and
prevention

specialist.

QMaster - Expert in secure ActiveX and Internet application

development.

Sluggo - Security defense strategy expert.

Hobbit - NT CIFS Security.

Jeremy - SNMP and SNMP2 security implications.

Richard Thieme - Internet Visionary.

Richard K. - Counter survailence specialist.

Ira Winkler - NCSA, author of "Corporate Espionage"

Chris Goggans - Wheel Group, Ex-LOD and past editor of Phrack.

Fees & Registration: Program fees are $995. To register or for more

information, contact:

William Brittingham

Cambridge Technology Partners

304 Vassar Street

Cambridge, MA 02139

617.374.8580 or e-mail wbritt@ctp.com

http://www.defcon.org/blackhat/

Hotel Information

The Black Hat Briefings will take place July 9th and 10th at the
Aladdin

Hotel & Casino in Las Vegas, Nevada. To take advantage of conference
rates

reservations must be made prior to June 9. When making arrangements,
please

reference the CTP-DC Communications conference.

The Aladdin Hotel and Casino,

3667 Las Vegas Blvd., South

Las Vegas, NV 89109

Phone: 800.634.3424

DEF CON Communications

DEF CON Communications is an independent organization providing
multiple

services around computer network security and security auditing. In
addition

to The Black Hat Briefings, DEF CON organizes one of the largest
gatherings

for computer security minded individuals with topics ranging from
computer

culture to network security to personal privacy. DEF CON V will be help
July

11-13 at the Aladdin Hotel. Via it's speakers, it's programs, and it's
full

complement of consulting services, DEF CON demonstrates there are people
in

this world more paranoid than you. All Black Hat attendees recieve
free

admission to DEF CON V should they decide to stay the weekend.

Cambridge Technology Partners

http://ctp.com/

Cambridge Technology Partners is a new breed of systems integrator. We
have

applied our unique core values to the application development market to

fundamentally reinvent the way information technology solutions are

delivered. We combine process innovation, custom and package software

deployment, and training to rapidly deliver end-to-end business systems
that

create immediatebottom-line impact for our clients. We do it fast. We
do it

for a fixed price. And we do it on time.

Additional Sponsors

Aventail Corporation

http://www.aventail.com/

Founded in February 1996, Aventail Corporation is the leading vendor of

next-generation Internet security systems. Its software allows
organizations

to secure their networks, manage their employees' access to the Internet
and

build Virtual Private Networks (VPNs). Creating a VPN gives
organizations the

ability to dynamically create a private communication or data channel
over

the Internet. Aventail's adherence to open security standards
simplifies

VPN deployment, enables interoperability, and leverages corporations'

existing network investments. Its VPN solutions allow companies to
extend

the reach of their corporate Intranets to customers, partners, remote

offices, and worldwide employees.

National Computer Security Association

http://www.ncsa.com/

NCSA is an independent organization offering objective views and opinions
on

computer security issues. We strive to improve computer security through
the

sharing of knowledge, dissemination of information, and certification
of

security products.

</bigger>

Dominique Brezinski

----------------------------------------------------

My opinions expressed here, and in any public forum,

are my own and do not represent those of my employer

or its clients. I am an individual, and I will

retain those rights of free speech granted to me,

regardless of my employment status.