[ISN] Black Hat Briefings Keynotes Include NSA Director and Special Advis. to Bush

From: InfoSec News (isnat_private)
Date: Wed Jul 10 2002 - 05:14:29 PDT

  • Next message: InfoSec News: "RE: [ISN] Lights' malfunction at airport attributed to computer glitch"

    Forwarded from: "B.K. DeLong" <bkdelongat_private>
    
    For Immediate Release
    
    Contacts
    
    B.K. DeLong
    pressat_private
    +1.617.877.3271
    
    BLACK HAT BRIEFINGS 2002 KEYNOTES INCLUDE
    NSA DIRECTOR AND SPECIAL ADVISOR TO THE PRESIDENT
    
    NSA Security Evaluations Group Technical Director Richard George &
    Richard Clarke - Special Advisor to the President for Cyberspace
    Security
    
    http://www.blackhat.com/ -- Black Hat Inc. today announced the keynote
    speakers for this summer's Black Hat Briefings and Training 2002, the
    annual conference and workshop designed to help computer professionals
    better understand the security risks to their computer and information
    infrastructures by potential threats. This year's show will focus on 8
    tracks of hot topics including Wireless, Firewalls, Access Control,
    PKI & Single Signon, Routing and Infrastructure, Application Security,
    Intrusion Detection, Incident Response & Computer Forensics, Privacy &
    Anonymity, Web, Mail and Other Related Servers, and Deep Knowledge.
    The event is being held 31 July through 1 August 2002 at the Caesars
    Palace Hotel and Casino in the heart of Las Vegas.
    
    Top-notch speakers will deliver to the conference's core audience of
    IT & network security experts, consultants and administrators the
    newest developments on the vital security issues facing organizations
    using large networks with a mix of operating systems.
    
    "Black Hat USA 2002 will be unlike any other security conference in
    the world- we will be showcasing the work of over 45 of the most
    knowledgeable and renown security professionals, hosting a gala
    reception with an unrivaled book signing event that will run
    concurrent with the never-before-seen Hacker Court," says Jeff Moss,
    founder of Black Hat Inc.  "Black Hat USA 2002 promises to offer an
    unparalleled networking opportunity in the security arena."
    
    The keynote speakers for this year's Black Hat Briefings include:
    
              -- Richard George joined the National Security Agency as a
    mathematician in 1970 and has worked in the Information Assurance
    Directorate (or its predecessor organizations) for 32 years as a
    cryptomathematician. He currently serves as the Technical Director of
    the Security Evaluations Group which is responsible for evaluating
    security solutions used by the Department of Defense and Intelligence
    Community.
    
              -- Richard Clarke, Special Advisor to the President for
    Cyberspace Security. Clarke has served in several senior national
    security posts. Most recently he served as National Coordinator for
    Security, Infrastructure Protection, and Counter-terrorism on the
    National Security Council. As National Coordinator, he led the U.S.
    government's efforts on counter-terrorism, cyber security, continuity
    of government operations, domestic preparedness for weapons of mass
    destruction, and international organized crime. In 1992, General
    Scowcroft appointed Mr. Clarke to the National Security Council staff.
    He continued as a member of the NSC staff throughout the Clinton
    Administration.
    
    This year's Luncheon Speaker will be Jeff Jonas, President and founder
    of Systems Research & Development (SRD). Jonas will be talking about
    Non-Obvious Relationship Awareness (NORA) technology, how this
    technology is used to catch gaming cheats in the nearby casinos, and
    how it is being used to catch terrorists these days.
    
    Other Black Hat Briefings 2002 speakers include:
    
             -- Thomas Akin, Founding Director, Southeast Cybercrime
    Institute.  Akin is a Certified Information Systems Security
    Professional (CISSP) who has worked in Information Security for almost
    a decade. He is the founding director of the Southeast Cybercrime
    Institute where he also serves as chairman for the Institute's Board
    of Advisors. He is an active member of the Georgia Cybercrime Task
    Force where he heads up the Task Force's Education committee. Thomas
    also works with Atlanta's ISSA, InfraGard, and HTCIA professional
    organizations.
    
             -- Don Cavender, Senior Special Agent, FBI Academy. SSA
    Cavender has twelve years experience as an FBI Agent. The past seven
    years he has been involved in high technology investigations and
    digital forensics. He is presently responsible for instruction in
    Internet and Network Investigations for FBI, Federal, State and Local
    Law Enforcement Investigators, case support and consultation and
    research.
    
             -- Sean Convery, Network Architect, Cisco. Convery is a
    network architect in Cisco's VPN and security business unit. Sean
    works primarily on the SAFE blueprint, and is an author several of its
    whitepapers. Prior to his four years at Cisco, Sean held various
    positions in both IT and security consulting during his 11 years in
    networking.
    
             -- Mark Eckenwiler, Senior Counsel in the Computer Crime &
    Intellectual Property Section, Criminal Division, U.S. Department of
    Justice. Eckenwiler is Senior Counsel in the Computer Crime and
    Intellectual Property Section, Criminal Division, U.S. Department of
    Justice. His areas of responsibility include federal wiretap law,
    computer search and seizure, and online investigations. An Internet
    veteran for almost two decades, Mark has written and spoken widely on
    such issues as anonymity and free speech, e-mail stalking laws,
    Internet jurisdiction, electronic privacy, and the Fifth Amendment
    implications of cryptographic keys.
    
             -- Carole Fennelly, Partner, Wizard's Keys Corporation. With
    20 years as a Unix systems administrator and security consultant,
    Carole has a wealth of experience in both technical and managerial
    procedure. Her rather caustic articles, both technical and editorial,
    have been widely published and she has been quoted in numerous trade
    publications.
    
             -- Halvar Flake, Reverse Engineer, Black Hat Consulting.  
    Originating in the fields of copy protection and digital rights
    management, he gravitated more and more towards network security over
    time as he realized that constructive copy protection is more or less
    fighting windmills. After writing his first few exploits he was hooked
    and realized that reverse engineering experience is a very handy asset
    when dealing with COTS software. With extensive experience in reverse
    engineering, network security, penetration testing and exploit
    development he recently joined BlackHat as their primary reverse
    engineer.
    
             -- Dr. Ian Goldberg is internationally recognized as one of
    the world's leading cryptographers and cypherpunks. Dr. Goldberg is a
    founder of Berkeley's Internet Security, Applications, Authentication
    and Cryptography group. In addition to developing many of the leading
    network software titles for the Palm Pilot, he is known for his part
    in cracking the first RSA Secret Key Challenge in three and a half
    hours; breaking Netscape's implementation of the encryption system
    SSL; and breaking the cryptography in the GSM cellular phone standard.
    In November 1998, Wired magazine selected Dr. Goldberg as one of the
    "Wired 25" - the twenty-five people who in 1998 are "about to change
    the rules all over again." In December 2000 he obtained his Ph.D. from
    UC Berkeley for his thesis "A Pseudonymous Communications
    Infrastructure for the Internet," which examined the technical and
    social issues involved in designing the Freedom Network.
    
             -- Jesse Kornblum, Chief, Research and Development, Air Force
    Office of Special Investigations. SA Kornblum is the Chief of Research
    and Development for the Air Force Office of Special Investigations
    Computer Investigations and Operations Branch . A graduate of the
    Massachusetts Institute of Technology, he has experience running
    intrusion investigations and supporting other agents in more
    traditional investigations. He is currently responsible for developing
    tools and techniques to allow agents to conduct investigations.
    
             -- David Litchfield, Managing Director & Co-Founder, Next
    Generation Security Software. Litchfield is a world-renowned security
    expert specializing in Windows NT and Internet security. His discovery
    and remediation of over 100 major vulnerabilities in products such as
    Microsoft's Internet Information Server and Oracle's Application
    Server have lead to the tightening of sites around the world. David
    Litchfield is also the author of Cerberus' Internet Scanner
    (previously NTInfoscan), one of the world's most popular free
    vulnerability scanners. In addition to CIS, David has written many
    other utilities to help identify and fix security holes. David is the
    author of many technical documents on security issues including his
    tutorial on Exploiting Windows NT Buffer Overruns referenced in the
    book "Hacking Exposed".
    
    
    A limited number of books will be available for purchase from our
    official on-site bookseller, Breakpoint, during the USA 2002
    Briefings. Meet and speak with the authors:
    
    * Thomas Akin, author of "Hardening Cisco Routers"
    
    * Stuart McClure, author of "Web Hacking: Attacks and Defense" ^
    
    * Paul Proctor, author of "The Secured Enterprise: Protecting Your
      Information Assets" and "The Practical Intrusion Detection Handbook"
    
    * Honeynet Project on their book "Know Your Enemy Revealing the
      Security Tools, Tactics, and Motives of the Blackhat"
    
    * Ryan Russell and Dan Kaminsky, best-selling authors of "Hack
      Proofing Your Network, Second Edition"
    
    * Debra Littlejohn Shinder, best-selling author of "Scene of the
      Cybercime: Computer Forensics Handbook" ^
    
    * Dr. Thomas W. Shinder, bestselling author of "Configuring ISA Server
      2000" and the forthcoming "InfoWar for MCSEs: Defending Your 
      Microsoft Enterprise Network"
    
    * Robert Shimonski, author of "Sniffer Network Optimization and 
      Troubleshooting Handbook"
    
    * Rick Smith, author of "Authentication: From Passwords to Public 
      Keys"
    
    * Mike Schiffman, Hacker's Challenge: Test Your Incident Response 
      Skills Using 20 Scenarios
    
    
    ^ Denotes a NEW BOOK- be one of the first to get a copy BEFORE it 
      hits the bookstores!
    
    
    All paid Briefings attendees will receive free admission to the DEF
    CON conference (http://www.defcon.org), being held August 2, 3, and
    4th at the Alexis Park Hotel. Conference-goers also get a free book:
    "Hack Proofing Your Ecommerce Site" by Ryan Russell, compliments of
    our official book sponsor, Syngress Publishing. There will also be
    access to a wireless network during the show; for those without
    wireless cards, we will be selling them on-site from the BlackHat
    Store
    
    To register for BlackHat Briefings, visit the Web site at
    http://www.blackhat.com or register at the conference. Direct any
    conference-related questions to infoat_private
    
    For press registration, contact B.K. DeLong at +1.617.877.3271 or via
    email at pressat_private
    
    (For the DEF CON conference, ALL PRESS MUST PRE-REGISTER or pay the
    $75 entrance fee on-site. For more details regarding media passes to
    DEF CON, please read this page: http://www.defcon.org/dcx-press.html)
    
    About Black Hat Inc.
    
    Black Hat Inc. was originally founded in 1997 by Jeff Moss to fill the
    need for computer security professionals to better understand the
    security risks and potential threats to their information
    infrastructures and computer systems. Black Hat accomplishes this by
    assembling a group of vendor-neutral security professionals and having
    them speak candidly about the problems businesses face and their
    solutions to those problems. Black Hat Inc. produces 5 briefing &
    training events a year on 3 different continents. Speakers and
    attendees travel from all over the world to meet and share in the
    latest advances in computer security. For more information, visit
    their Web site at http://www.blackhat.com
    
    ###
    
    
    --
    B.K. DeLong
    Press Coordinator
    Black Hat Briefings
    and
    Def Con X
    +1.617.877.3271
    
    bkdelongat_private
    http://www.blackhat.com
    
    
    
    -
    ISN is currently hosted by Attrition.org
    
    To unsubscribe email majordomoat_private with 'unsubscribe isn'
    in the BODY of the mail.
    



    This archive was generated by hypermail 2b30 : Wed Jul 10 2002 - 08:25:38 PDT