Black Hat Briefings Keynotes Include NSA Director and Special Advis. to Bush

From: B.K. DeLong (bkdelongat_private)
Date: Tue Jul 09 2002 - 07:40:18 PDT

  • Next message: Elan Hasson: "hijacking TCP connections on FreeBSD"

    FYI - I thought this may be of interest to several list members since a few 
    of the posters to this list will be speaking. Hope to see you at the show.
    
    ----------------------------------------------------------------
    
    For Immediate Release
    
    Contacts
    
    B.K. DeLong
    pressat_private
    +1.617.877.3271
    
    BLACK HAT BRIEFINGS 2002 KEYNOTES INCLUDE
    NSA DIRECTOR AND SPECIAL ADVISOR TO THE PRESIDENT
    
    NSA Security Evaluations Group Technical Director Richard George & Richard 
    Clarke - Special Advisor to the President for Cyberspace Security
    
    http://www.blackhat.com/ -- Black Hat Inc. today announced the keynote 
    speakers for this summer's Black Hat Briefings and Training 2002, the 
    annual conference and workshop designed to help computer professionals 
    better understand the security risks to their computer and information 
    infrastructures by potential threats. This year's show will focus on 8 
    tracks of hot topics including Wireless, Firewalls, Access Control, PKI & 
    Single Signon, Routing and Infrastructure, Application Security, Intrusion 
    Detection, Incident Response & Computer Forensics, Privacy & Anonymity, 
    Web, Mail and Other Related Servers, and Deep Knowledge. The event is being 
    held 31 July through 1 August 2002 at the Caesars Palace Hotel and Casino 
    in the heart of Las Vegas.
    
    Top-notch speakers will deliver to the conference's core audience of IT & 
    network security experts, consultants and administrators the newest 
    developments on the vital security issues facing organizations using large 
    networks with a mix of operating systems.
    
    "Black Hat USA 2002 will be unlike any other security conference in the 
    world- we will be showcasing the work of over 45 of the most knowledgeable 
    and renown security professionals, hosting a gala reception with an 
    unrivaled book signing event that will run concurrent with the 
    never-before-seen Hacker Court," says Jeff Moss, founder of Black Hat Inc. 
    "Black Hat USA 2002 promises to offer an unparalleled networking 
    opportunity in the security arena."
    
    The keynote speakers for this year's Black Hat Briefings include:
    
              -- Richard George joined the National Security Agency as a 
    mathematician in 1970 and has worked in the Information Assurance 
    Directorate (or its predecessor organizations) for 32 years as a 
    cryptomathematician. He currently serves as the Technical Director of the 
    Security Evaluations Group which is responsible for evaluating security 
    solutions used by the Department of Defense and Intelligence Community.
    
              -- Richard Clarke, Special Advisor to the President for 
    Cyberspace Security. Clarke has served in several senior national security 
    posts. Most recently he served as National Coordinator for Security, 
    Infrastructure Protection, and Counter-terrorism on the National Security 
    Council. As National Coordinator, he led the U.S. government's efforts on 
    counter-terrorism, cyber security, continuity of government operations, 
    domestic preparedness for weapons of mass destruction, and international 
    organized crime. In 1992, General Scowcroft appointed Mr. Clarke to the 
    National Security Council staff. He continued as a member of the NSC staff 
    throughout the Clinton Administration.
    
    This year's Luncheon Speaker will be Jeff Jonas, President and founder of 
    Systems Research & Development (SRD). Jonas will be talking about 
    Non-Obvious Relationship Awareness (NORA) technology, how this technology 
    is used to catch gaming cheats in the nearby casinos, and how it is being 
    used to catch terrorists these days.
    
    Other Black Hat Briefings 2002 speakers include:
    
             -- Thomas Akin, Founding Director, Southeast Cybercrime Institute. 
    Akin is a Certified Information Systems Security Professional (CISSP) who 
    has worked in Information Security for almost a decade. He is the founding 
    director of the Southeast Cybercrime Institute where he also serves as 
    chairman for the Institute's Board of Advisors. He is an active member of 
    the Georgia Cybercrime Task Force where he heads up the Task Force's 
    Education committee. Thomas also works with Atlanta's ISSA, InfraGard, and 
    HTCIA professional organizations.
    
             -- Don Cavender, Senior Special Agent, FBI Academy. SSA Cavender 
    has twelve years experience as an FBI Agent. The past seven years he has 
    been involved in high technology investigations and digital forensics. He 
    is presently responsible for instruction in Internet and Network 
    Investigations for FBI, Federal, State and Local Law Enforcement 
    Investigators, case support and consultation and research.
    
             -- Sean Convery, Network Architect, Cisco. Convery is a network 
    architect in Cisco's VPN and security business unit. Sean works primarily 
    on the SAFE blueprint, and is an author several of its whitepapers. Prior 
    to his four years at Cisco, Sean held various positions in both IT and 
    security consulting during his 11 years in networking.
    
             -- Mark Eckenwiler, Senior Counsel in the Computer Crime & 
    Intellectual Property Section, Criminal Division, U.S. Department of 
    Justice. Eckenwiler is Senior Counsel in the Computer Crime and 
    Intellectual Property Section, Criminal Division, U.S. Department of 
    Justice. His areas of responsibility include federal wiretap law, computer 
    search and seizure, and online investigations. An Internet veteran for 
    almost two decades, Mark has written and spoken widely on such issues as 
    anonymity and free speech, e-mail stalking laws, Internet jurisdiction, 
    electronic privacy, and the Fifth Amendment implications of cryptographic 
    keys.
    
             -- Carole Fennelly, Partner, Wizard's Keys Corporation. With 20 
    years as a Unix systems administrator and security consultant, Carole has a 
    wealth of experience in both technical and managerial procedure. Her rather 
    caustic articles, both technical and editorial, have been widely published 
    and she has been quoted in numerous trade publications.
    
             -- Halvar Flake, Reverse Engineer, Black Hat Consulting. 
    Originating in the fields of copy protection and digital rights management, 
    he gravitated more and more towards network security over time as he 
    realized that constructive copy protection is more or less fighting 
    windmills. After writing his first few exploits he was hooked and realized 
    that reverse engineering experience is a very handy asset when dealing with 
    COTS software. With extensive experience in reverse engineering, network 
    security, penetration testing and exploit development he recently joined 
    BlackHat as their primary reverse engineer.
    
             -- Dr. Ian Goldberg is internationally recognized as one of the 
    world's leading cryptographers and cypherpunks. Dr. Goldberg is a founder 
    of Berkeley's Internet Security, Applications, Authentication and 
    Cryptography group. In addition to developing many of the leading network 
    software titles for the Palm Pilot, he is known for his part in cracking 
    the first RSA Secret Key Challenge in three and a half hours; breaking 
    Netscape's implementation of the encryption system SSL; and breaking the 
    cryptography in the GSM cellular phone standard. In November 1998, Wired 
    magazine selected Dr. Goldberg as one of the "Wired 25" - the twenty-five 
    people who in 1998 are "about to change the rules all over again." In 
    December 2000 he obtained his Ph.D. from UC Berkeley for his thesis "A 
    Pseudonymous Communications Infrastructure for the Internet," which 
    examined the technical and social issues involved in designing the Freedom 
    Network.
    
             -- Jesse Kornblum, Chief, Research and Development, Air Force 
    Office of Special Investigations. SA Kornblum is the Chief of Research and 
    Development for the Air Force Office of Special Investigations Computer 
    Investigations and Operations
    Branch . A graduate of the Massachusetts Institute of Technology, he has 
    experience running intrusion investigations and supporting other agents in 
    more traditional investigations. He is currently responsible for developing 
    tools and techniques to allow agents to conduct investigations.
    
             -- David Litchfield, Managing Director & Co-Founder, Next 
    Generation Security Software. Litchfield is a world-renowned security 
    expert specializing in Windows NT and Internet security. His discovery and 
    remediation of over 100 major vulnerabilities in products such as 
    Microsoft's Internet Information Server and Oracle's Application Server 
    have lead to the tightening of sites around the world. David Litchfield is 
    also the author of Cerberus' Internet Scanner (previously NTInfoscan), one 
    of the world's most popular free vulnerability scanners. In addition to 
    CIS, David has written many other utilities to help identify and fix 
    security holes. David is the author of many technical documents on security 
    issues including his tutorial on Exploiting Windows NT Buffer Overruns 
    referenced in the book "Hacking Exposed".
    
    
    A limited number of books will be available for purchase from our official 
    on-site bookseller, Breakpoint, during the USA 2002 Briefings. Meet and 
    speak with the authors:
    
             * Thomas Akin, author of "Hardening Cisco Routers"
    
             * Stuart McClure, author of "Web Hacking: Attacks and Defense" ^
    
             * Paul Proctor, author of "The Secured Enterprise: Protecting Your 
    Information Assets" and "The Practical Intrusion     Detection Handbook"
    
             * Honeynet Project on their book "Know Your Enemy Revealing the 
    Security Tools, Tactics, and Motives of the Blackhat"
    
             * Ryan Russell and Dan Kaminsky, best-selling authors of "Hack 
    Proofing Your Network, Second Edition"
    
             * Debra Littlejohn Shinder, best-selling author of "Scene of the 
    Cybercime: Computer Forensics Handbook" ^
    
             * Dr. Thomas W. Shinder, bestselling author of "Configuring ISA 
    Server 2000" and the forthcoming "InfoWar for MCSEs: Defending Your 
    Microsoft Enterprise Network"
    
             * Robert Shimonski, author of "Sniffer Network Optimization and 
    Troubleshooting Handbook"
    
             * Rick Smith, author of "Authentication: From Passwords to Public 
    Keys"
    
             * Mike Schiffman, Hacker's Challenge: Test Your Incident Response 
    Skills Using 20 Scenarios
    
    
             ^ Denotes a NEW BOOK- be one of the first to get a copy BEFORE it 
    hits the bookstores!
    
    
    All paid Briefings attendees will receive free admission to the DEF CON 
    conference (http://www.defcon.org), being held August 2, 3, and 4th at the 
    Alexis Park Hotel. Conference-goers also get a free book: "Hack Proofing 
    Your Ecommerce Site" by Ryan Russell, compliments of our official book 
    sponsor, Syngress Publishing. There will also be access to a wireless 
    network during the show; for those without wireless cards, we will be 
    selling them on-site from the BlackHat Store
    
    To register for BlackHat Briefings, visit the Web site at 
    http://www.blackhat.com or register at the conference. Direct any 
    conference-related questions to infoat_private
    
    For press registration, contact B.K. DeLong at +1.617.877.3271 or
    via email at pressat_private
    
    (For the DEF CON conference, ALL PRESS MUST PRE-REGISTER or pay the $75 
    entrance fee on-site. For more details regarding media passes to DEF CON, 
    please read this page: http://www.defcon.org/dcx-press.html)
    
    About Black Hat Inc.
    
    Black Hat Inc. was originally founded in 1997 by Jeff Moss to fill the need 
    for computer security professionals to better understand the security risks 
    and potential threats to their information infrastructures and computer 
    systems. Black Hat accomplishes this by assembling a group of 
    vendor-neutral security professionals and having them speak candidly about 
    the problems businesses face and their solutions to those problems. Black 
    Hat Inc. produces 5 briefing & training events a year on 3 different 
    continents. Speakers and attendees travel from all over the world to meet 
    and share in the latest advances in computer security. For more 
    information, visit their Web site at
    http://www.blackhat.com
    
    ###
    
    
    --
    B.K. DeLong
    bkdelongat_private
    617.877.3271
    
    http://www.brain-stream.com               Play.
    http://www.the-leaky-cauldron.org        Potter.
    http://www.attrition.org                       Security.
    http://www.artemisiabotanicals.com     Herb.
    



    This archive was generated by hypermail 2b30 : Tue Jul 09 2002 - 09:53:04 PDT