Suche innerhalb des Archivs / Search the Archive All words Any words

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[infowar.de] Black Hat Briefings: Redner u.a. von NSA und Weissem Haus



Infowar.de, http://userpage.fu-berlin.de/~bendrath/liste.html
-------------------------------------------------------------

Die Briefings finden statt vom 31 Juli bis 1. August in Las Vegas,
unmittelbar vor der ebenfalls dort stattfindenden DEF CON
Hackerkonferenz, vgl. http://www.defcon.org.
RB

Black Hat Briefings Keynotes Include NSA Director and Special Advis.to
Bush

For Immediate Release

Contacts

B.K. DeLong
press -!
- blackhat -
 com
+1.617.877.3271

BLACK HAT BRIEFINGS 2002 KEYNOTES INCLUDE
NSA DIRECTOR AND SPECIAL ADVISOR TO THE PRESIDENT

NSA Security Evaluations Group Technical Director Richard George &
Richard Clarke - Special Advisor to the President for Cyberspace
Security

http://www.blackhat.com/ -- Black Hat Inc. today announced the keynote
speakers for this summer's Black Hat Briefings and Training 2002, the
annual conference and workshop designed to help computer professionals
better understand the security risks to their computer and information
infrastructures by potential threats. This year's show will focus on 8
tracks of hot topics including Wireless, Firewalls, Access Control,
PKI & Single Signon, Routing and Infrastructure, Application Security,
Intrusion Detection, Incident Response & Computer Forensics, Privacy &
Anonymity, Web, Mail and Other Related Servers, and Deep Knowledge.
The event is being held 31 July through 1 August 2002 at the Caesars
Palace Hotel and Casino in the heart of Las Vegas.

Top-notch speakers will deliver to the conference's core audience of
IT & network security experts, consultants and administrators the
newest developments on the vital security issues facing organizations
using large networks with a mix of operating systems.

"Black Hat USA 2002 will be unlike any other security conference in
the world- we will be showcasing the work of over 45 of the most
knowledgeable and renown security professionals, hosting a gala
reception with an unrivaled book signing event that will run
concurrent with the never-before-seen Hacker Court," says Jeff Moss,
founder of Black Hat Inc.  "Black Hat USA 2002 promises to offer an
unparalleled networking opportunity in the security arena."

The keynote speakers for this year's Black Hat Briefings include:

          -- Richard George joined the National Security Agency as a
mathematician in 1970 and has worked in the Information Assurance
Directorate (or its predecessor organizations) for 32 years as a
cryptomathematician. He currently serves as the Technical Director of
the Security Evaluations Group which is responsible for evaluating
security solutions used by the Department of Defense and Intelligence
Community.

          -- Richard Clarke, Special Advisor to the President for
Cyberspace Security. Clarke has served in several senior national
security posts. Most recently he served as National Coordinator for
Security, Infrastructure Protection, and Counter-terrorism on the
National Security Council. As National Coordinator, he led the U.S.
government's efforts on counter-terrorism, cyber security, continuity
of government operations, domestic preparedness for weapons of mass
destruction, and international organized crime. In 1992, General
Scowcroft appointed Mr. Clarke to the National Security Council staff.
He continued as a member of the NSC staff throughout the Clinton
Administration.

This year's Luncheon Speaker will be Jeff Jonas, President and founder
of Systems Research & Development (SRD). Jonas will be talking about
Non-Obvious Relationship Awareness (NORA) technology, how this
technology is used to catch gaming cheats in the nearby casinos, and
how it is being used to catch terrorists these days.

Other Black Hat Briefings 2002 speakers include:

         -- Thomas Akin, Founding Director, Southeast Cybercrime
Institute.  Akin is a Certified Information Systems Security
Professional (CISSP) who has worked in Information Security for almost
a decade. He is the founding director of the Southeast Cybercrime
Institute where he also serves as chairman for the Institute's Board
of Advisors. He is an active member of the Georgia Cybercrime Task
Force where he heads up the Task Force's Education committee. Thomas
also works with Atlanta's ISSA, InfraGard, and HTCIA professional
organizations.

         -- Don Cavender, Senior Special Agent, FBI Academy. SSA
Cavender has twelve years experience as an FBI Agent. The past seven
years he has been involved in high technology investigations and
digital forensics. He is presently responsible for instruction in
Internet and Network Investigations for FBI, Federal, State and Local
Law Enforcement Investigators, case support and consultation and
research.

         -- Sean Convery, Network Architect, Cisco. Convery is a
network architect in Cisco's VPN and security business unit. Sean
works primarily on the SAFE blueprint, and is an author several of its
whitepapers. Prior to his four years at Cisco, Sean held various
positions in both IT and security consulting during his 11 years in
networking.

         -- Mark Eckenwiler, Senior Counsel in the Computer Crime &
Intellectual Property Section, Criminal Division, U.S. Department of
Justice. Eckenwiler is Senior Counsel in the Computer Crime and
Intellectual Property Section, Criminal Division, U.S. Department of
Justice. His areas of responsibility include federal wiretap law,
computer search and seizure, and online investigations. An Internet
veteran for almost two decades, Mark has written and spoken widely on
such issues as anonymity and free speech, e-mail stalking laws,
Internet jurisdiction, electronic privacy, and the Fifth Amendment
implications of cryptographic keys.

         -- Carole Fennelly, Partner, Wizard's Keys Corporation. With
20 years as a Unix systems administrator and security consultant,
Carole has a wealth of experience in both technical and managerial
procedure. Her rather caustic articles, both technical and editorial,
have been widely published and she has been quoted in numerous trade
publications.

         -- Halvar Flake, Reverse Engineer, Black Hat Consulting.  
Originating in the fields of copy protection and digital rights
management, he gravitated more and more towards network security over
time as he realized that constructive copy protection is more or less
fighting windmills. After writing his first few exploits he was hooked
and realized that reverse engineering experience is a very handy asset
when dealing with COTS software. With extensive experience in reverse
engineering, network security, penetration testing and exploit
development he recently joined BlackHat as their primary reverse
engineer.

         -- Dr. Ian Goldberg is internationally recognized as one of
the world's leading cryptographers and cypherpunks. Dr. Goldberg is a
founder of Berkeley's Internet Security, Applications, Authentication
and Cryptography group. In addition to developing many of the leading
network software titles for the Palm Pilot, he is known for his part
in cracking the first RSA Secret Key Challenge in three and a half
hours; breaking Netscape's implementation of the encryption system
SSL; and breaking the cryptography in the GSM cellular phone standard.
In November 1998, Wired magazine selected Dr. Goldberg as one of the
"Wired 25" - the twenty-five people who in 1998 are "about to change
the rules all over again." In December 2000 he obtained his Ph.D. from
UC Berkeley for his thesis "A Pseudonymous Communications
Infrastructure for the Internet," which examined the technical and
social issues involved in designing the Freedom Network.

         -- Jesse Kornblum, Chief, Research and Development, Air Force
Office of Special Investigations. SA Kornblum is the Chief of Research
and Development for the Air Force Office of Special Investigations
Computer Investigations and Operations Branch . A graduate of the
Massachusetts Institute of Technology, he has experience running
intrusion investigations and supporting other agents in more
traditional investigations. He is currently responsible for developing
tools and techniques to allow agents to conduct investigations.

         -- David Litchfield, Managing Director & Co-Founder, Next
Generation Security Software. Litchfield is a world-renowned security
expert specializing in Windows NT and Internet security. His discovery
and remediation of over 100 major vulnerabilities in products such as
Microsoft's Internet Information Server and Oracle's Application
Server have lead to the tightening of sites around the world. David
Litchfield is also the author of Cerberus' Internet Scanner
(previously NTInfoscan), one of the world's most popular free
vulnerability scanners. In addition to CIS, David has written many
other utilities to help identify and fix security holes. David is the
author of many technical documents on security issues including his
tutorial on Exploiting Windows NT Buffer Overruns referenced in the
book "Hacking Exposed".


A limited number of books will be available for purchase from our
official on-site bookseller, Breakpoint, during the USA 2002
Briefings. Meet and speak with the authors:

* Thomas Akin, author of "Hardening Cisco Routers"

* Stuart McClure, author of "Web Hacking: Attacks and Defense" ^

* Paul Proctor, author of "The Secured Enterprise: Protecting Your
  Information Assets" and "The Practical Intrusion Detection Handbook"

* Honeynet Project on their book "Know Your Enemy Revealing the
  Security Tools, Tactics, and Motives of the Blackhat"

* Ryan Russell and Dan Kaminsky, best-selling authors of "Hack
  Proofing Your Network, Second Edition"

* Debra Littlejohn Shinder, best-selling author of "Scene of the
  Cybercime: Computer Forensics Handbook" ^

* Dr. Thomas W. Shinder, bestselling author of "Configuring ISA Server
  2000" and the forthcoming "InfoWar for MCSEs: Defending Your 
  Microsoft Enterprise Network"

* Robert Shimonski, author of "Sniffer Network Optimization and 
  Troubleshooting Handbook"

* Rick Smith, author of "Authentication: From Passwords to Public 
  Keys"

* Mike Schiffman, Hacker's Challenge: Test Your Incident Response 
  Skills Using 20 Scenarios


^ Denotes a NEW BOOK- be one of the first to get a copy BEFORE it 
  hits the bookstores!


All paid Briefings attendees will receive free admission to the DEF
CON conference (http://www.defcon.org), being held August 2, 3, and
4th at the Alexis Park Hotel. Conference-goers also get a free book:
"Hack Proofing Your Ecommerce Site" by Ryan Russell, compliments of
our official book sponsor, Syngress Publishing. There will also be
access to a wireless network during the show; for those without
wireless cards, we will be selling them on-site from the BlackHat
Store

To register for BlackHat Briefings, visit the Web site at
http://www.blackhat.com or register at the conference. Direct any
conference-related questions to info -!
- blackhat -
 com -
 

For press registration, contact B.K. DeLong at +1.617.877.3271 or via
email at press -!
- blackhat -
 com -
 

(For the DEF CON conference, ALL PRESS MUST PRE-REGISTER or pay the
$75 entrance fee on-site. For more details regarding media passes to
DEF CON, please read this page: http://www.defcon.org/dcx-press.html)

About Black Hat Inc.

Black Hat Inc. was originally founded in 1997 by Jeff Moss to fill the
need for computer security professionals to better understand the
security risks and potential threats to their information
infrastructures and computer systems. Black Hat accomplishes this by
assembling a group of vendor-neutral security professionals and having
them speak candidly about the problems businesses face and their
solutions to those problems. Black Hat Inc. produces 5 briefing &
training events a year on 3 different continents. Speakers and
attendees travel from all over the world to meet and share in the
latest advances in computer security. For more information, visit
their Web site at http://www.blackhat.com

###


--
B.K. DeLong
Press Coordinator
Black Hat Briefings
and
Def Con X
+1.617.877.3271

bkdelong -!
- blackhat -
 com
http://www.blackhat.com

---------------------------------------------------------------
Liste verlassen: 
Mail an infowar -
 de-request -!
- infopeace -
 de mit "unsubscribe" im Text.