[200] in Best-of-Security
BoS: Black Hat Briefings
daemon@ATHENA.MIT.EDU (Bill Brittingham)
Thu May 29 06:54:42 1997
Date: Wed, 28 May 1997 20:24:21 -0700
From: Bill Brittingham <wbritt@ctp.com>
Errors-To: best-of-security-request@suburbia.net
To: best-of-security@suburbia.net
Resent-From: best-of-security@suburbia.net
BLACK HAT Briefings announcement
July 9th and 10th, Las Vegas Nevada
It's late. You're in the office alone, catching up on database administration.
Behind you, your network servers hum along quietly, reliably. Life is good.
Life is secure. Or is it?
A wave of unease washes over you. The air seems cold and frighteningly still.
Your hands turn clammy as a sixth sense tells you, suddenly, you're not alone.
They're out there. Worse, they're trying to get in. But who? And how? And
what can you do to stop them?
Presented by DEF CON Communications and Cambridge Technology Partners, the
Black Hat Briefings have been organized to put an end to nightmares like
these. While many conferences focus on information and network security,
only the Black Hat Briefings will put your engineers and software programmers
face-to-face with today's cutting edge computer security experts and
"hackers". Only the Black Hat Briefings will provide your people with the
tools and understanding they need to thwart those lurking in the shadows of
your firewall.
The reality is , they are out there. The choice is yours. You can live in fear
of them. Or, you can learn from them.
Conference Overview
Spanning two days with two separate tracks, the Black Hat Briefings will focus
on the vital security issues facing organizations with large enterprise
networks and mixed network operating systems. Topics will include denial of
service attacks, secure programming techniques, and tool selection for
creating and effectively monitoring secure networks. From PEX systems to Java
and ActiveX, from Unix to Windows NT and Netware, intensive sessions will
cover the intricate security problems confronting organizations seeking to
leverage the full power of emerging technologies. CIO's are welcome, but they
better bring the people implementing their network strategies and building
their applications, because this conference is for them.
Wednesday, July 9th
09:00 - 09:45 Keynote Address: Ira Winkler, NCSA.
10:00 - 11:30 Track A Auditing and Risk Analysis of Windows NT.
Track B Internet Attack Methodologies.
11:40 - 13:10 Track A How Firewalls Fit into the Corporate Landscape.
Track B Secure Implementations of ActiveX in a Corporate
Environment.
13:20 - 14:20 Lunch
14:25 - 15:20 Ray Kaplan: Meet the Enemy Session
15:30 - 17:00 Track A TCP/IP Internals: Everything You Wanted to Know
About Hacking the TCP/IP Stack.
Track B Secure programming practices and source code
analysis.
17:10 - 18:40 Track A Counter survailence expert.
Thursday, July 10th
09:00 - 09:45 Keynote Address: Richard Thieme.
10:00 - 11:30 Track A Why Cryptography is Harder Than it Looks.
Track B A Review and Implementation of Free Utilities &
Software Packages for Maintaining, Monitoring,
and Securing
Systems and Networks.
11:40 - 13:10 Track A Novell Security, Auditing, Detection and Prevention.
Track B Denial of Service Attacks and Defensive Strategies
13:20 - 14:20 Lunch
14:25 - 15:20
15:30 - 17:00 Track A CIFS and Microsoft Security
Track B SNMP Security Consideration and Implementation
Notable speakers and "hackers"
Dominique Brezinski - Windows NT security expert
Yobie Benjamin - Chief Knowledge Officer, Cambridge Management Labs
(a division of Cambridge Technology Partners)
Ray Kaplan - Corporate security expert
Myles Connley - Firewall expert
Peter Shipley - Unix security and auditing expert.
Bruce Schneier - Cryptography expert, author of Applied Cryptography
Mudge - Expert and secure programming techniques and finder of
many bugs
Route - Editor of Phrack magazine, the underground's largest
electronic journal of computer hacking
Kore - Novell security, auditing, detection and prevention
specialist
QMaster - Expert in secure ActiveX and Internet application
development
Sluggo - Security defense strategy expert
Hobbit - NT CIFS Security
Jeremy - SNMP
Richard Thieme - Techno-Philosopher
Richard K. - Counter electronics specialist
Ira Winkler - NCSA, author
Chris Goggans - Wheel Group, Ex-LOD and past editor of Phrack
Fees & Registration: Program fees are $995. To register or for more
information, contact:
William Brittingham
Cambridge Technology Partners
304 Vassar Street
Cambridge, MA 02139
617.374.8580 or e-mail wbritt@ctp.com
http://www.defcon.org/blackhat/
Hotel Information
The Black Hat Briefings will take place July 9th and 10th at the Aladdin
Hotel & Casino in Las Vegas, Nevada. To take advantage of conference rates
reservations must be made prior to June 9. When making arrangements, please
reference the CTP-DC Communications conference.
The Aladdin Hotel and Casino,
3667 Las Vegas Blvd., South
Las Vegas, NV 89109
Phone: 800.634.3424
DEF CON Communications
DEF CON Communications is an independent organization providing multiple
services around computer network security and security auditing. In addition
to The Black Hat Briefings, DEF CON organizes one of the largest gatherings
for computer security minded individuals with topics ranging from computer
culture to network security to personal privacy. DEF CON V will be help July
11-13 at the Aladdin Hotel. Via it's speakers, it's programs, and it's full
complement of consulting services, DEF CON demonstrates there are people in
this world more paranoid than you. All Black Hat attendees recieve free
admission to DEF CON V should they decide to stay the weekend.
Cambridge Technology Partners
Cambridge Technology Partners is a new breed of systems integrator. We have
applied our unique core values to the application development market to
fundamentally reinvent the way information technology solutions are
delivered. We combine process innovation, custom and package software
deployment, and training to rapidly deliver end-to-end business systems that
create immediatebottom-line impact for our clients. We do it fast. We do it
for a fixed price. And we do it on time.
Additional Sponsors
Aventail Corporation
Founded in February 1996, Aventail Corporation is the leading vendor of
next-generation Internet security systems. Its software allows organizations
to secure their networks, manage their employees' access to the Internet and
build Virtual Private Networks (VPNs). Creating a VPN gives organizations the
ability to dynamically create a private communication or data channel over
the Internet. Aventail's adherence to open security standards simplifies
VPN deployment, enables interoperability, and leverages corporations'
existing network investments. Its VPN solutions allow companies to extend
the reach of their corporate Intranets to customers, partners, remote
offices, and worldwide employees.
National Computer Security Association
NCSA is an independent organization offering objective views and opinions on
computer security issues. We strive to improve computer security through the
sharing of knowledge, dissemination of information, and certification of
security products.