Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 09 Jul 2002 10:44:50 -0400
From:      "B.K. DeLong" <bkdelong@pobox.com>
To:        security@FreeBSD.ORG
Subject:   Black Hat Briefings Keynotes Include NSA Director and Special Advis. to Bush
Message-ID:  <5.1.0.14.2.20020709104351.03b198e0@pop.earthlink.net>

next in thread | raw e-mail | index | archive | help
FYI - I thought this may be of interest to several list members since a few 
of the topics (namely the Apache "vulnerabilities") are related to 
discussions at the show.

Look me up if you're going.

----------------------------------------------------------------

For Immediate Release

Contacts

B.K. DeLong
press@blackhat.com
+1.617.877.3271

BLACK HAT BRIEFINGS 2002 KEYNOTES INCLUDE
NSA DIRECTOR AND SPECIAL ADVISOR TO THE PRESIDENT

NSA Security Evaluations Group Technical Director Richard George & Richard 
Clarke - Special Advisor to the President for Cyberspace Security

http://www.blackhat.com/ -- Black Hat Inc. today announced the keynote 
speakers for this summer's Black Hat Briefings and Training 2002, the 
annual conference and workshop designed to help computer professionals 
better understand the security risks to their computer and information 
infrastructures by potential threats. This year's show will focus on 8 
tracks of hot topics including Wireless, Firewalls, Access Control, PKI & 
Single Signon, Routing and Infrastructure, Application Security, Intrusion 
Detection, Incident Response & Computer Forensics, Privacy & Anonymity, 
Web, Mail and Other Related Servers, and Deep Knowledge. The event is being 
held 31 July through 1 August 2002 at the Caesars Palace Hotel and Casino 
in the heart of Las Vegas.

Top-notch speakers will deliver to the conference's core audience of IT & 
network security experts, consultants and administrators the newest 
developments on the vital security issues facing organizations using large 
networks with a mix of operating systems.

"Black Hat USA 2002 will be unlike any other security conference in the 
world- we will be showcasing the work of over 45 of the most knowledgeable 
and renown security professionals, hosting a gala reception with an 
unrivaled book signing event that will run concurrent with the 
never-before-seen Hacker Court," says Jeff Moss, founder of Black Hat Inc. 
"Black Hat USA 2002 promises to offer an unparalleled networking 
opportunity in the security arena."

The keynote speakers for this year's Black Hat Briefings include:

          -- Richard George joined the National Security Agency as a 
mathematician in 1970 and has worked in the Information Assurance 
Directorate (or its predecessor organizations) for 32 years as a 
cryptomathematician. He currently serves as the Technical Director of the 
Security Evaluations Group which is responsible for evaluating security 
solutions used by the Department of Defense and Intelligence Community.

          -- Richard Clarke, Special Advisor to the President for 
Cyberspace Security. Clarke has served in several senior national security 
posts. Most recently he served as National Coordinator for Security, 
Infrastructure Protection, and Counter-terrorism on the National Security 
Council. As National Coordinator, he led the U.S. government's efforts on 
counter-terrorism, cyber security, continuity of government operations, 
domestic preparedness for weapons of mass destruction, and international 
organized crime. In 1992, General Scowcroft appointed Mr. Clarke to the 
National Security Council staff. He continued as a member of the NSC staff 
throughout the Clinton Administration.

This year's Luncheon Speaker will be Jeff Jonas, President and founder of 
Systems Research & Development (SRD). Jonas will be talking about 
Non-Obvious Relationship Awareness (NORA) technology, how this technology 
is used to catch gaming cheats in the nearby casinos, and how it is being 
used to catch terrorists these days.

Other Black Hat Briefings 2002 speakers include:

         -- Thomas Akin, Founding Director, Southeast Cybercrime Institute. 
Akin is a Certified Information Systems Security Professional (CISSP) who 
has worked in Information Security for almost a decade. He is the founding 
director of the Southeast Cybercrime Institute where he also serves as 
chairman for the Institute's Board of Advisors. He is an active member of 
the Georgia Cybercrime Task Force where he heads up the Task Force's 
Education committee. Thomas also works with Atlanta's ISSA, InfraGard, and 
HTCIA professional organizations.

         -- Don Cavender, Senior Special Agent, FBI Academy. SSA Cavender 
has twelve years experience as an FBI Agent. The past seven years he has 
been involved in high technology investigations and digital forensics. He 
is presently responsible for instruction in Internet and Network 
Investigations for FBI, Federal, State and Local Law Enforcement 
Investigators, case support and consultation and research.

         -- Sean Convery, Network Architect, Cisco. Convery is a network 
architect in Cisco's VPN and security business unit. Sean works primarily 
on the SAFE blueprint, and is an author several of its whitepapers. Prior 
to his four years at Cisco, Sean held various positions in both IT and 
security consulting during his 11 years in networking.

         -- Mark Eckenwiler, Senior Counsel in the Computer Crime & 
Intellectual Property Section, Criminal Division, U.S. Department of 
Justice. Eckenwiler is Senior Counsel in the Computer Crime and 
Intellectual Property Section, Criminal Division, U.S. Department of 
Justice. His areas of responsibility include federal wiretap law, computer 
search and seizure, and online investigations. An Internet veteran for 
almost two decades, Mark has written and spoken widely on such issues as 
anonymity and free speech, e-mail stalking laws, Internet jurisdiction, 
electronic privacy, and the Fifth Amendment implications of cryptographic 
keys.

         -- Carole Fennelly, Partner, Wizard's Keys Corporation. With 20 
years as a Unix systems administrator and security consultant, Carole has a 
wealth of experience in both technical and managerial procedure. Her rather 
caustic articles, both technical and editorial, have been widely published 
and she has been quoted in numerous trade publications.

         -- Halvar Flake, Reverse Engineer, Black Hat Consulting. 
Originating in the fields of copy protection and digital rights management, 
he gravitated more and more towards network security over time as he 
realized that constructive copy protection is more or less fighting 
windmills. After writing his first few exploits he was hooked and realized 
that reverse engineering experience is a very handy asset when dealing with 
COTS software. With extensive experience in reverse engineering, network 
security, penetration testing and exploit development he recently joined 
BlackHat as their primary reverse engineer.

         -- Dr. Ian Goldberg is internationally recognized as one of the 
world's leading cryptographers and cypherpunks. Dr. Goldberg is a founder 
of Berkeley's Internet Security, Applications, Authentication and 
Cryptography group. In addition to developing many of the leading network 
software titles for the Palm Pilot, he is known for his part in cracking 
the first RSA Secret Key Challenge in three and a half hours; breaking 
Netscape's implementation of the encryption system SSL; and breaking the 
cryptography in the GSM cellular phone standard. In November 1998, Wired 
magazine selected Dr. Goldberg as one of the "Wired 25" - the twenty-five 
people who in 1998 are "about to change the rules all over again." In 
December 2000 he obtained his Ph.D. from UC Berkeley for his thesis "A 
Pseudonymous Communications Infrastructure for the Internet," which 
examined the technical and social issues involved in designing the Freedom 
Network.

         -- Jesse Kornblum, Chief, Research and Development, Air Force 
Office of Special Investigations. SA Kornblum is the Chief of Research and 
Development for the Air Force Office of Special Investigations Computer 
Investigations and Operations
Branch . A graduate of the Massachusetts Institute of Technology, he has 
experience running intrusion investigations and supporting other agents in 
more traditional investigations. He is currently responsible for developing 
tools and techniques to allow agents to conduct investigations.

         -- David Litchfield, Managing Director & Co-Founder, Next 
Generation Security Software. Litchfield is a world-renowned security 
expert specializing in Windows NT and Internet security. His discovery and 
remediation of over 100 major vulnerabilities in products such as 
Microsoft's Internet Information Server and Oracle's Application Server 
have lead to the tightening of sites around the world. David Litchfield is 
also the author of Cerberus' Internet Scanner (previously NTInfoscan), one 
of the world's most popular free vulnerability scanners. In addition to 
CIS, David has written many other utilities to help identify and fix 
security holes. David is the author of many technical documents on security 
issues including his tutorial on Exploiting Windows NT Buffer Overruns 
referenced in the book "Hacking Exposed".


A limited number of books will be available for purchase from our official 
on-site bookseller, Breakpoint, during the USA 2002 Briefings. Meet and 
speak with the authors:

         * Thomas Akin, author of "Hardening Cisco Routers"

         * Stuart McClure, author of "Web Hacking: Attacks and Defense" ^

         * Paul Proctor, author of "The Secured Enterprise: Protecting Your 
Information Assets" and "The Practical Intrusion     Detection Handbook"

         * Honeynet Project on their book "Know Your Enemy Revealing the 
Security Tools, Tactics, and Motives of the Blackhat"

         * Ryan Russell and Dan Kaminsky, best-selling authors of "Hack 
Proofing Your Network, Second Edition"

         * Debra Littlejohn Shinder, best-selling author of "Scene of the 
Cybercime: Computer Forensics Handbook" ^

         * Dr. Thomas W. Shinder, bestselling author of "Configuring ISA 
Server 2000" and the forthcoming "InfoWar for MCSEs: Defending Your 
Microsoft Enterprise Network"

         * Robert Shimonski, author of "Sniffer Network Optimization and 
Troubleshooting Handbook"

         * Rick Smith, author of "Authentication: From Passwords to Public 
Keys"

         * Mike Schiffman, Hacker's Challenge: Test Your Incident Response 
Skills Using 20 Scenarios


         ^ Denotes a NEW BOOK- be one of the first to get a copy BEFORE it 
hits the bookstores!


All paid Briefings attendees will receive free admission to the DEF CON 
conference (http://www.defcon.org), being held August 2, 3, and 4th at the 
Alexis Park Hotel. Conference-goers also get a free book: "Hack Proofing 
Your Ecommerce Site" by Ryan Russell, compliments of our official book 
sponsor, Syngress Publishing. There will also be access to a wireless 
network during the show; for those without wireless cards, we will be 
selling them on-site from the BlackHat Store

To register for BlackHat Briefings, visit the Web site at 
http://www.blackhat.com or register at the conference. Direct any 
conference-related questions to info@blackhat.com.

For press registration, contact B.K. DeLong at +1.617.877.3271 or
via email at press@blackhat.com.

(For the DEF CON conference, ALL PRESS MUST PRE-REGISTER or pay the $75 
entrance fee on-site. For more details regarding media passes to DEF CON, 
please read this page: http://www.defcon.org/dcx-press.html)

About Black Hat Inc.

Black Hat Inc. was originally founded in 1997 by Jeff Moss to fill the need 
for computer security professionals to better understand the security risks 
and potential threats to their information infrastructures and computer 
systems. Black Hat accomplishes this by assembling a group of 
vendor-neutral security professionals and having them speak candidly about 
the problems businesses face and their solutions to those problems. Black 
Hat Inc. produces 5 briefing & training events a year on 3 different 
continents. Speakers and attendees travel from all over the world to meet 
and share in the latest advances in computer security. For more 
information, visit their Web site at
http://www.blackhat.com

###


--
B.K. DeLong
bkdelong@pobox.com
617.877.3271

http://www.brain-stream.com              Play.
http://www.the-leaky-cauldron.org       Potter.
http://www.attrition.org                      Security.
http://www.artemisiabotanicals.com    Herb.


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?5.1.0.14.2.20020709104351.03b198e0>