Dominique
______________________________________________________________________
BLACK HAT Briefings announcement
July 9th and 10th, Las Vegas Nevada
http://www.defcon.org/blackhat/
It's late. You're in the office alone, catching up on database
administration.
Behind you, your network servers hum along quietly, reliably. Life is
good.
Life is secure. Or is it?
A wave of unease washes over you. The air seems cold and frighteningly
still.
Your hands turn clammy as a sixth sense tells you, suddenly, you're not
alone.
They're out there. Worse, they're trying to get in. But who? And how?
And
what can you do to stop them?
Presented by DEF CON Communications and Cambridge Technology Partners,
the
Black Hat Briefings have been organized to put an end to nightmares
like
these. While many conferences focus on information and network
security,
only the Black Hat Briefings will put your engineers and software
programmers
face-to-face with today's cutting edge computer security experts and
"hackers". Only the Black Hat Briefings will provide your people with
the
tools and understanding they need to thwart those lurking in the shadows
of
your firewall.
The reality is, they are out there. The choice is yours. You can live
in
fear of them. Or, you can learn from them.
Conference Overview
Spanning two days with two separate tracks, the Black Hat Briefings will
focus
on the vital security issues facing organizations with large enterprise
networks and mixed network operating systems. Topics will include denial
of
service attacks, secure programming techniques, and tool selection for
creating and effectively monitoring secure networks. From PEX systems to
Java
and ActiveX, from Unix to Windows NT and Netware, intensive sessions
will
cover the intricate security problems confronting organizations seeking
to
leverage the full power of emerging technologies. CIO's are welcome, but
they
better bring the people implementing their network strategies and
building
their applications, because this conference is for them.
Wednesday, July 9th
09:00 - 09:45 Keynote Address: Ira Winkler, NCSA.
10:00 - 11:30 Track A Auditing and Risk Analysis of Windows NT.
Track B Internet Attack Methodologies.
11:40 - 13:10 Track A How Firewalls Fit into the Corporate
Landscape.
Track B Secure programming practices and source code
analysis.
13:20 - 14:20 Lunch
14:25 - 15:20 Ray Kaplan: Meet the Enemy Session
15:30 - 17:00 Track A TCP/IP Internals: Everything You Wanted to
Know
About Hacking the TCP/IP Stack.
Track B Secure Implementations of ActiveX in a
Corporate
Environment.
17:10 - 18:40 Track A Counter survailence expert.
Thursday, July 10th
09:00 - 09:45 Keynote Address: Richard Thieme.
10:00 - 11:30 Track A Why Cryptography is Harder Than it Looks.
Track B A Review and Implementation of Free Utilities
& Software Packages for Maintaining, Monitoring, and
Securing
Systems and Networks.
11:40 - 13:10 Track A Novell Security, Auditing, Detection and
Prevention.
Track B Denial of Service Attacks and Defensive
Strategies
13:20 - 14:20 Lunch
14:25 - 15:20
15:30 - 17:00 Track A CIFS and Microsoft Security
Track B SNMP Security Consideration and Implementation
Notable speakers and "hackers"
Dominique Brezinski - Windows NT security expert.
Ray Kaplan - Corporate security expert.
Myles Connley - Firewall expert.
Peter Shipley - Unix security and auditing expert.
Bruce Schneier - Cryptography expert, author of Applied
Cryptography.
Mudge - Expert of secure programming techniques and
originator of many CERT advisories.
Route - Editor of Phrack magazine, the underground's
largest
electronic journal of computer hacking. TCP/IP
guru.
Kore - Novell security, auditing, detection and
prevention
specialist.
QMaster - Expert in secure ActiveX and Internet application
development.
Sluggo - Security defense strategy expert.
Hobbit - NT CIFS Security.
Jeremy - SNMP and SNMP2 security implications.
Richard Thieme - Internet Visionary.
Richard K. - Counter survailence specialist.
Ira Winkler - NCSA, author of "Corporate Espionage"
Chris Goggans - Wheel Group, Ex-LOD and past editor of Phrack.
Fees & Registration: Program fees are $995. To register or for more
information, contact:
William Brittingham
Cambridge Technology Partners
304 Vassar Street
Cambridge, MA 02139
617.374.8580 or e-mail wbritt@ctp.com
http://www.defcon.org/blackhat/
Hotel Information
The Black Hat Briefings will take place July 9th and 10th at the
Aladdin
Hotel & Casino in Las Vegas, Nevada. To take advantage of conference
rates
reservations must be made prior to June 9. When making arrangements,
please
reference the CTP-DC Communications conference.
The Aladdin Hotel and Casino,
3667 Las Vegas Blvd., South
Las Vegas, NV 89109
Phone: 800.634.3424
DEF CON Communications
DEF CON Communications is an independent organization providing
multiple
services around computer network security and security auditing. In
addition
to The Black Hat Briefings, DEF CON organizes one of the largest
gatherings
for computer security minded individuals with topics ranging from
computer
culture to network security to personal privacy. DEF CON V will be help
July
11-13 at the Aladdin Hotel. Via it's speakers, it's programs, and it's
full
complement of consulting services, DEF CON demonstrates there are people
in
this world more paranoid than you. All Black Hat attendees recieve
free
admission to DEF CON V should they decide to stay the weekend.
Cambridge Technology Partners
Cambridge Technology Partners is a new breed of systems integrator. We
have
applied our unique core values to the application development market to
fundamentally reinvent the way information technology solutions are
delivered. We combine process innovation, custom and package software
deployment, and training to rapidly deliver end-to-end business systems
that
create immediatebottom-line impact for our clients. We do it fast. We
do it
for a fixed price. And we do it on time.
Additional Sponsors
Aventail Corporation
Founded in February 1996, Aventail Corporation is the leading vendor of
next-generation Internet security systems. Its software allows
organizations
to secure their networks, manage their employees' access to the Internet
and
build Virtual Private Networks (VPNs). Creating a VPN gives
organizations the
ability to dynamically create a private communication or data channel
over
the Internet. Aventail's adherence to open security standards
simplifies
VPN deployment, enables interoperability, and leverages corporations'
existing network investments. Its VPN solutions allow companies to
extend
the reach of their corporate Intranets to customers, partners, remote
offices, and worldwide employees.
National Computer Security Association
NCSA is an independent organization offering objective views and opinions
on
computer security issues. We strive to improve computer security through
the
sharing of knowledge, dissemination of information, and certification
of
security products.
</bigger>
Dominique Brezinski
----------------------------------------------------
My opinions expressed here, and in any public forum,
are my own and do not represent those of my employer
or its clients. I am an individual, and I will
retain those rights of free speech granted to me,
regardless of my employment status.