[52] in Best-of-Security

home help back first fref pref prev next nref lref last post

BoS: Second Annual Hackers, Crackers & Sniffers Conference (fwd)

daemon@ATHENA.MIT.EDU (Richard Jones)
Fri Feb 28 23:31:06 1997

Date: Thu, 27 Feb 1997 23:53:02 +1100 (EST)
From: richard@deep-thought.org (Richard Jones)
Reply-To: best-of-security@suburbia.net
Errors-To: best-of-security-request@suburbia.net
To: best-of-security@suburbia.net
Resent-From: best-of-security@suburbia.net

Path: news.aus.world.net!nsw1.news.telstra.net!news.telstra.net!psgrain!iafrica.com!uct.uni.net.za!csir.uni.net.za!wits.uni.net.za!howland.erols.net!news.sprintlink.net!news-peer.sprintlink.net!uunet!in1.uu.net!204.245.3.50!news.primenet.com!valor
From: Christian Valor <valor@primenet.com>
Newsgroups: comp.security.firewalls
Subject: Second Annual Hackers, Crackers & Sniffers Conference
Date: 26 Feb 1997 12:37:03 -0700
Organization: Primenet (602)416-7000
Lines: 198
Message-ID: <5f23cv$197@nnrp1.news.primenet.com>
X-Posted-By: valor@206.165.5.106 (valor)
X-Cache: nntpcache 1.0.2 (cf. ftp://nntpcache.org/nntpcache)
Approved: proff@suburbia.net


Second Annual Hackers, Crackers & Sniffer Symposium
"Perils of the Internet and Practical Solutions"

The Ashford Club
Atlanta, GA - April 22-24, 1997


[Please visit our web site for similar conferences scheduled this year in 
San Diego [3/97], Boston [5/97], Biloxi, Norfolk, Las Vegas,
Washington, D.C., Cleveland, Melbourne, and others at:
http://www.newdimensions.net]


Co-Sponsored by:
Information Systems Audit & Control Association
National Computer Security Association
Internet Security Systems
Delta Airlines and Transquest
Security First Technologies
HomeCom
and a Community of Interests


Featuring

EMERGING INITIATIVES IN COMPUTER SECURITY
Dr. Peter Tippett - President, National Computer Security Association

INFORMATION WARFARE - CYBERTERRORISM
Winn Schwartau - Noted Author and International Authority

IMPROVING SECURITY BY VULNERABILITY ANALYSIS
Tom Noonan - President, Internet Security Systems

INTRUDER IMPACT AND EMERGING SECURITY DIRECTIONS
Dr. John Alger, Dean, Information Warfare Institute, National Defense
	University
Scott Charney, Chief of Computer Crimes Unit, U.S. Department of Justice
Brent Mead, Network and Computer Security Manager, Jet Propulsion Laboratory

Workshops presented by leading Expert Practitioners
Special Presentation by Christopher Klaus, Founder, ISS


Fee $495.00

Symposium Coordinator
NEW DIMENSIONS INTERNATIONAL
P.O. Box 897  Cardiff, CA  92007
T - (619) 436-5618   F - (619) 436-2475
E-mail  <ndi@aol.com>
http://www.newdimensions.net



ATLANTA WORKSHOPS

0800-0930 & 1000-1130

W1 - Cybercrime
This presentation is a revealing discussion of the nature of the criminal
element and intrusions into computer systems. Presentation describes
statistics and modus operandi. Key cases are addresses: Mitnick, Russian
Citibank Hacker, Masters of Deception, and others.

W2 - Computer and Network Security
A technical manager's description of incident details and assessment of
the impact by intruders on project development and support activities.
Guidelines and management details are discussed that require responses to
incidents and an investigative protocol.

W3 - The Hacker Underground
Understand the Hacker Underground and meet those who are a part of it.
Who Hackers are: Find out
Why they hack: Ask them
How they hack: They will demonstrate

This is a VERY penetrating session presented by members of the Hacker
Underground who reveal hacking secrets and describe culture and tricks.
They are well-known within the community and will provide candid answers
and pointers on protection methods and Hacker Techniques.

W4 - ActiveX and JAVA
A veteran security expert addresses facts and myths about potential
dangers from executable content. Increase of JAVA applets, JAVA Script
and ActiveX has generated interest about Internet security. Will
JAVA-based business and science applications prove too risky? Find out at
this presentation by HomeCom, one of the premier Internet Web application
development firms.


1300-1430 & 1500-1630

W5 - NT Security
One of the most challenging new system security concerns. The key components, 
security weaknesses, policies and applications are identified. As NT is more 
widely used, security holes and precautions must be addressed. This session 
addresses "the holes," policies, implementation and options.

W6 - Security Industry Presentations
This workshop is a series of presentations by respective members of the
regional security industry. Presentation address the various security
software, hardware and devices. In addition, there will be selected
exhibits of advanced security  technologies. Key presentation by Security
First Technologies.

W7 - "How to" Scan for Vulnerabilities
In this workshop, ISS will demonstrate how to scan for vulnerabilities
and present a hands-on experience in a laboratory setting. You will have
the chance to see how a scan is conducted step-by-step!

W8 - Technology Protection and Control
Presented by a leading practitioner in the field. Provides DoD, NASA and
industry guidance used to identify and protect critical and competitive
technology. Military and NASA hi-tech applications and the use of the
Military Critical Technologies List are used as guidance to control
technology disclosures. Recent examples of competitive espionage tactics
through email and system intrusion are presented. A popular presentation.


TENTATIVE AGENDA

TUESDAY APRIL 22, 1997

0830   	WELCOME - Symposium Planning Committee
	Jim Sorrell, ISACA

0845	INTRODUCTIONS AND OVERVIEW
	Fred J. Villella, New Dimensions International

0900 	Keynote Address - EMERGING INITIATIVES IN COMPUTER SECURITY
	Dr. Peter Tippett, President, National Computer Security Association

1020	BREAK

1045	Featured Presentation - IMPROVING SECURITY THROUGH VULNERABILITY
				ANALYSIS
	Tom Noonan, President, Internet Security Systems, Inc.

1130	LUNCHEON 
	Security Awareness - Michael Clancy, Transquest, and Jim Sorrell,
	ISACA

1315	INTRUDER IMPACT AND EMERGING SECURITY DIRECTIONS - A Panel
	Dr. John Alger, Dean, Information Warfare Institute, National
		Defense University
	Scott Charney, Chief of Computer Crimes Unit, U.S. Department of
		Justice
	Brent Mead, Network and Computer Security Manager, Jet Propulsion
		Laboratory

1630	ADJOURN

1700	WELCOME RECEPTION hosted by ISS
	Presentation by Christopher Klaus, Founder of ISS


WEDNESDAY, APRIL 23, 1997 - Concurrent Practical Workshops

W1   0800-0930 & 1000-1130 - Cybercrime
W2   0800-0930 & 1000-1130 - Computer and Network Security
W3   0800-0930 & 1000-1130 - The Hacker Underground
W4   0800-0930 & 1000-1130 - ActiveX and JAVA

1130-1300	LUNCHEON hosted by Secure Computing

W5   1300-1430 & 1500-1630 - NT Security
W6   1300-1430 & 1500-1630 - Security Industry Presentations
W7   1300-1430 & 1500-1630 - "How to" Scan for Vulnerabilities
W8   1300-1430 & 1500-1630 - Technology Protection and Control


THURSDAY, APRIL 24, 1997 - FEATURED PRESENTATION

0800-1130	PROTECTING AGAINST AN "ELECTRONIC PEARL HARBOR"
		Winn Schwartau, author of "Information Warfare:
		Cyberterrorism"

1200	ADJOURN


Experienced professionals address the exploding nature of intrusions into
computer systems and emphasize the actions needed to protect private,
proprietary and sensitive information from increasing intrusions into
business and government computer systems.

Practical workshops provide technical and managerial options to mitigate
losses from menacing and malicious intruders. Technologies are needed to
protect privacy and electronic commerce over the hazardous electronic
superhighway - the Internet.

A dramatic finale on potential Cyberterrorism intrusions into vital
computer systems across the country will be presented by the
internationally-recognized leader in the field, Winn Schwartau, author of
"Information Warfare" and the National Information Warfare policy.


home help back first fref pref prev next nref lref last post