[52] in Best-of-Security
BoS: Second Annual Hackers, Crackers & Sniffers Conference (fwd)
daemon@ATHENA.MIT.EDU (Richard Jones)
Fri Feb 28 23:31:06 1997
Date: Thu, 27 Feb 1997 23:53:02 +1100 (EST)
From: richard@deep-thought.org (Richard Jones)
Reply-To: best-of-security@suburbia.net
Errors-To: best-of-security-request@suburbia.net
To: best-of-security@suburbia.net
Resent-From: best-of-security@suburbia.net
Path: news.aus.world.net!nsw1.news.telstra.net!news.telstra.net!psgrain!iafrica.com!uct.uni.net.za!csir.uni.net.za!wits.uni.net.za!howland.erols.net!news.sprintlink.net!news-peer.sprintlink.net!uunet!in1.uu.net!204.245.3.50!news.primenet.com!valor
From: Christian Valor <valor@primenet.com>
Newsgroups: comp.security.firewalls
Subject: Second Annual Hackers, Crackers & Sniffers Conference
Date: 26 Feb 1997 12:37:03 -0700
Organization: Primenet (602)416-7000
Lines: 198
Message-ID: <5f23cv$197@nnrp1.news.primenet.com>
X-Posted-By: valor@206.165.5.106 (valor)
X-Cache: nntpcache 1.0.2 (cf. ftp://nntpcache.org/nntpcache)
Approved: proff@suburbia.net
Second Annual Hackers, Crackers & Sniffer Symposium
"Perils of the Internet and Practical Solutions"
The Ashford Club
Atlanta, GA - April 22-24, 1997
[Please visit our web site for similar conferences scheduled this year in
San Diego [3/97], Boston [5/97], Biloxi, Norfolk, Las Vegas,
Washington, D.C., Cleveland, Melbourne, and others at:
http://www.newdimensions.net]
Co-Sponsored by:
Information Systems Audit & Control Association
National Computer Security Association
Internet Security Systems
Delta Airlines and Transquest
Security First Technologies
HomeCom
and a Community of Interests
Featuring
EMERGING INITIATIVES IN COMPUTER SECURITY
Dr. Peter Tippett - President, National Computer Security Association
INFORMATION WARFARE - CYBERTERRORISM
Winn Schwartau - Noted Author and International Authority
IMPROVING SECURITY BY VULNERABILITY ANALYSIS
Tom Noonan - President, Internet Security Systems
INTRUDER IMPACT AND EMERGING SECURITY DIRECTIONS
Dr. John Alger, Dean, Information Warfare Institute, National Defense
University
Scott Charney, Chief of Computer Crimes Unit, U.S. Department of Justice
Brent Mead, Network and Computer Security Manager, Jet Propulsion Laboratory
Workshops presented by leading Expert Practitioners
Special Presentation by Christopher Klaus, Founder, ISS
Fee $495.00
Symposium Coordinator
NEW DIMENSIONS INTERNATIONAL
P.O. Box 897 Cardiff, CA 92007
T - (619) 436-5618 F - (619) 436-2475
E-mail <ndi@aol.com>
http://www.newdimensions.net
ATLANTA WORKSHOPS
0800-0930 & 1000-1130
W1 - Cybercrime
This presentation is a revealing discussion of the nature of the criminal
element and intrusions into computer systems. Presentation describes
statistics and modus operandi. Key cases are addresses: Mitnick, Russian
Citibank Hacker, Masters of Deception, and others.
W2 - Computer and Network Security
A technical manager's description of incident details and assessment of
the impact by intruders on project development and support activities.
Guidelines and management details are discussed that require responses to
incidents and an investigative protocol.
W3 - The Hacker Underground
Understand the Hacker Underground and meet those who are a part of it.
Who Hackers are: Find out
Why they hack: Ask them
How they hack: They will demonstrate
This is a VERY penetrating session presented by members of the Hacker
Underground who reveal hacking secrets and describe culture and tricks.
They are well-known within the community and will provide candid answers
and pointers on protection methods and Hacker Techniques.
W4 - ActiveX and JAVA
A veteran security expert addresses facts and myths about potential
dangers from executable content. Increase of JAVA applets, JAVA Script
and ActiveX has generated interest about Internet security. Will
JAVA-based business and science applications prove too risky? Find out at
this presentation by HomeCom, one of the premier Internet Web application
development firms.
1300-1430 & 1500-1630
W5 - NT Security
One of the most challenging new system security concerns. The key components,
security weaknesses, policies and applications are identified. As NT is more
widely used, security holes and precautions must be addressed. This session
addresses "the holes," policies, implementation and options.
W6 - Security Industry Presentations
This workshop is a series of presentations by respective members of the
regional security industry. Presentation address the various security
software, hardware and devices. In addition, there will be selected
exhibits of advanced security technologies. Key presentation by Security
First Technologies.
W7 - "How to" Scan for Vulnerabilities
In this workshop, ISS will demonstrate how to scan for vulnerabilities
and present a hands-on experience in a laboratory setting. You will have
the chance to see how a scan is conducted step-by-step!
W8 - Technology Protection and Control
Presented by a leading practitioner in the field. Provides DoD, NASA and
industry guidance used to identify and protect critical and competitive
technology. Military and NASA hi-tech applications and the use of the
Military Critical Technologies List are used as guidance to control
technology disclosures. Recent examples of competitive espionage tactics
through email and system intrusion are presented. A popular presentation.
TENTATIVE AGENDA
TUESDAY APRIL 22, 1997
0830 WELCOME - Symposium Planning Committee
Jim Sorrell, ISACA
0845 INTRODUCTIONS AND OVERVIEW
Fred J. Villella, New Dimensions International
0900 Keynote Address - EMERGING INITIATIVES IN COMPUTER SECURITY
Dr. Peter Tippett, President, National Computer Security Association
1020 BREAK
1045 Featured Presentation - IMPROVING SECURITY THROUGH VULNERABILITY
ANALYSIS
Tom Noonan, President, Internet Security Systems, Inc.
1130 LUNCHEON
Security Awareness - Michael Clancy, Transquest, and Jim Sorrell,
ISACA
1315 INTRUDER IMPACT AND EMERGING SECURITY DIRECTIONS - A Panel
Dr. John Alger, Dean, Information Warfare Institute, National
Defense University
Scott Charney, Chief of Computer Crimes Unit, U.S. Department of
Justice
Brent Mead, Network and Computer Security Manager, Jet Propulsion
Laboratory
1630 ADJOURN
1700 WELCOME RECEPTION hosted by ISS
Presentation by Christopher Klaus, Founder of ISS
WEDNESDAY, APRIL 23, 1997 - Concurrent Practical Workshops
W1 0800-0930 & 1000-1130 - Cybercrime
W2 0800-0930 & 1000-1130 - Computer and Network Security
W3 0800-0930 & 1000-1130 - The Hacker Underground
W4 0800-0930 & 1000-1130 - ActiveX and JAVA
1130-1300 LUNCHEON hosted by Secure Computing
W5 1300-1430 & 1500-1630 - NT Security
W6 1300-1430 & 1500-1630 - Security Industry Presentations
W7 1300-1430 & 1500-1630 - "How to" Scan for Vulnerabilities
W8 1300-1430 & 1500-1630 - Technology Protection and Control
THURSDAY, APRIL 24, 1997 - FEATURED PRESENTATION
0800-1130 PROTECTING AGAINST AN "ELECTRONIC PEARL HARBOR"
Winn Schwartau, author of "Information Warfare:
Cyberterrorism"
1200 ADJOURN
Experienced professionals address the exploding nature of intrusions into
computer systems and emphasize the actions needed to protect private,
proprietary and sensitive information from increasing intrusions into
business and government computer systems.
Practical workshops provide technical and managerial options to mitigate
losses from menacing and malicious intruders. Technologies are needed to
protect privacy and electronic commerce over the hazardous electronic
superhighway - the Internet.
A dramatic finale on potential Cyberterrorism intrusions into vital
computer systems across the country will be presented by the
internationally-recognized leader in the field, Winn Schwartau, author of
"Information Warfare" and the National Information Warfare policy.