Black Hat Briefings 2002 Keynotes Include NSA Director And Special Advisor To The President
NSA Security Evaluations Group Technical Director Richard George & Richard Clarke – Special Advisor to the President for Cyberspace Security
http://www.blackhat.com/ — Black Hat Inc. today announced the keynote speakers for this summer’s Black Hat Briefings and Training 2002, the annual conference and workshop designed to help computer professionals better understand the security risks to their computer and information infrastructures by potential threats. This year’s show will focus on 8 tracks of hot topics including Wireless, Firewalls, Access Control, PKI & Single Signon, Routing and Infrastructure, Application Security, Intrusion Detection, Incident Response & Computer Forensics, Privacy & Anonymity, Web, Mail and Other Related Servers, and Deep Knowledge. The event is being held 31 July through 1 August 2002 at the Caesars Palace Hotel and Casino in the heart of Las Vegas.
Top-notch speakers will deliver to the conference’s core audience of IT & network security experts, consultants and administrators the newest developments on the vital security issues facing organizations using large networks with a mix of operating systems.
“Black Hat USA 2002 will be unlike any other security conference in the world- we will be showcasing the work of over 45 of the most knowledgeable and renown security professionals, hosting a gala reception with an unrivaled book signing event that will run concurrent with the never-before-seen Hacker Court,” says Jeff Moss, founder of Black Hat Inc. “Black Hat USA 2002 promises to offer an unparalleled networking opportunity in the security arena.”
The keynote speakers for this year’s Black Hat Briefings include:
— Richard George joined the National Security Agency as a mathematician in 1970 and has worked in the Information Assurance Directorate (or its predecessor organizations) for 32 years as a cryptomathematician. He currently serves as the Technical Director of the Security Evaluations Group which is responsible for evaluating security solutions used by the Department of Defense and Intelligence Community.
— Richard Clarke, Special Advisor to the President for Cyberspace Security. Clarke has served in several senior national security posts. Most recently he served as National Coordinator for Security, Infrastructure Protection, and Counter-terrorism on the National Security Council. As National Coordinator, he led the U.S. government’s efforts on counter-terrorism, cyber security, continuity of government operations, domestic preparedness for weapons of mass destruction, and international organized crime. In 1992, General Scowcroft appointed Mr. Clarke to the National Security Council staff. He continued as a member of the NSC staff throughout the Clinton Administration.
This year’s Luncheon Speaker will be Jeff Jonas, President and founder of Systems Research & Development (SRD). Jonas will be talking about Non-Obvious Relationship Awareness (NORA) technology, how this technology is used to catch gaming cheats in the nearby casinos, and how it is being used to catch terrorists these days.
Other Black Hat Briefings 2002 speakers include:
— Thomas Akin, Founding Director, Southeast Cybercrime Institute. Akin is a Certified Information Systems Security Professional (CISSP) who has worked in Information Security for almost a decade. He is the founding director of the Southeast Cybercrime Institute where he also serves as chairman for the Institute’s Board of Advisors. He is an active member of the Georgia Cybercrime Task Force where he heads up the Task Force’s Education committee. Thomas also works with Atlanta’s ISSA, InfraGard, and HTCIA professional organizations.
— Don Cavender, Senior Special Agent, FBI Academy. SSA Cavender has twelve years experience as an FBI Agent. The past seven years he has been involved in high technology investigations and digital forensics. He is presently responsible for instruction in Internet and Network Investigations for FBI, Federal, State and Local Law Enforcement Investigators, case support and consultation and research.
— Sean Convery, Network Architect, Cisco. Convery is a network architect in Cisco’s VPN and security business unit. Sean works primarily on the SAFE blueprint, and is an author several of its whitepapers. Prior to his four years at Cisco, Sean held various positions in both IT and security consulting during his 11 years in networking.
— Mark Eckenwiler, Senior Counsel in the Computer Crime & Intellectual Property Section, Criminal Division, U.S. Department of Justice. Eckenwiler is Senior Counsel in the Computer Crime and Intellectual Property Section, Criminal Division, U.S. Department of Justice. His areas of responsibility include federal wiretap law, computer search and seizure, and online investigations. An Internet veteran for almost two decades, Mark has written and spoken widely on such issues as anonymity and free speech, e-mail stalking laws, Internet jurisdiction, electronic privacy, and the Fifth Amendment implications of cryptographic keys.
— Carole Fennelly, Partner, Wizard’s Keys Corporation. With 20 years as a Unix systems administrator and security consultant, Carole has a wealth of experience in both technical and managerial procedure. Her rather caustic articles, both technical and editorial, have been widely published and she has been quoted in numerous trade publications.
— Halvar Flake, Reverse Engineer, Black Hat Consulting. Originating in the fields of copy protection and digital rights management, he gravitated more and more towards network security over time as he realized that constructive copy protection is more or less fighting windmills. After writing his first few exploits he was hooked and realized that reverse engineering experience is a very handy asset when dealing with COTS software. With extensive experience in reverse engineering, network security, penetration testing and exploit development he recently joined BlackHat as their primary reverse engineer.
— Dr. Ian Goldberg is internationally recognized as one of the world’s leading cryptographers and cypherpunks. Dr. Goldberg is a founder of Berkeley’s Internet Security, Applications, Authentication and Cryptography group. In addition to developing many of the leading network software titles for the Palm Pilot, he is known for his part in cracking the first RSA Secret Key Challenge in three and a half hours; breaking Netscape’s implementation of the encryption system SSL; and breaking the cryptography in the GSM cellular phone standard. In November 1998, Wired magazine selected Dr. Goldberg as one of the “Wired 25” – the twenty-five people who in 1998 are “about to change the rules all over again.” In December 2000 he obtained his Ph.D. from UC Berkeley for his thesis “A Pseudonymous Communications Infrastructure for the Internet,” which examined the technical and social issues involved in designing the Freedom Network.
— Jesse Kornblum, Chief, Research and Development, Air Force Office of Special Investigations. SA Kornblum is the Chief of Research and Development for the Air Force Office of Special Investigations Computer Investigations and Operations Branch . A graduate of the Massachusetts Institute of Technology, he has experience running intrusion investigations and supporting other agents in more traditional investigations. He is currently responsible for developing tools and techniques to allow agents to conduct investigations.
— David Litchfield, Managing Director & Co-Founder, Next Generation Security Software. Litchfield is a world-renowned security expert specializing in Windows NT and Internet security. His discovery and remediation of over 100 major vulnerabilities in products such as Microsoft’s Internet Information Server and Oracle’s Application Server have lead to the tightening of sites around the world. David Litchfield is also the author of Cerberus’ Internet Scanner (previously NTInfoscan), one of the world’s most popular free vulnerability scanners. In addition to CIS, David has written many other utilities to help identify and fix security holes. David is the author of many technical documents on security issues including his tutorial on Exploiting Windows NT Buffer Overruns referenced in the book “Hacking Exposed”.
A limited number of books will be available for purchase from our official on-site bookseller, Breakpoint, during the USA 2002 Briefings. Meet and speak with the authors:
* Thomas Akin, author of “Hardening Cisco Routers”
* Stuart McClure, author of “Web Hacking: Attacks and Defense” ^
* Paul Proctor, author of “The Secured Enterprise: Protecting Your Information Assets” and “The Practical Intrusion Detection Handbook”
* Honeynet Project on their book “Know Your Enemy Revealing the Security Tools, Tactics, and Motives of the Blackhat”
* Ryan Russell and Dan Kaminsky, best-selling authors of “Hack Proofing Your Network, Second Edition”
* Debra Littlejohn Shinder, best-selling author of “Scene of the Cybercime: Computer Forensics Handbook” ^
* Dr. Thomas W. Shinder, bestselling author of “Configuring ISA Server 2000” and the forthcoming “InfoWar for MCSEs: Defending Your Microsoft Enterprise Network”
* Robert Shimonski, author of “Sniffer Network Optimization and Troubleshooting Handbook”
* Rick Smith, author of “Authentication: From Passwords to Public Keys”
* Mike Schiffman, Hacker’s Challenge: Test Your Incident Response Skills Using 20 Scenarios
^ Denotes a NEW BOOK- be one of the first to get a copy BEFORE it hits the bookstores!
All paid Briefings attendees will receive free admission to the DEF CON conference (http://www.defcon.org), being held August 2, 3, and 4th at the Alexis Park Hotel. Conference-goers also get a free book: “Hack Proofing Your Ecommerce Site” by Ryan Russell, compliments of our official book sponsor, Syngress Publishing. There will also be access to a wireless network during the show; for those without wireless cards, we will be selling them on-site from the BlackHat Store
To register for BlackHat Briefings, visit the Web site at http://www.blackhat.com or register at the conference. Direct any conference-related questions to email@example.com.
For press registration, contact B.K. DeLong at +1.617.877.3271 or via email at firstname.lastname@example.org.
(For the DEF CON conference, ALL PRESS MUST PRE-REGISTER or pay the $75 entrance fee on-site. For more details regarding media passes to DEF CON, please read this page: http://www.defcon.org/dcx-press.html)
About Black Hat Inc.
Black Hat Inc. was originally founded in 1997 by Jeff Moss to fill the need for computer security professionals to better understand the security risks and potential threats to their information infrastructures and computer systems. Black Hat accomplishes this by assembling a group of vendor-neutral security professionals and having them speak candidly about the problems businesses face and their solutions to those problems. Black Hat Inc. produces 5 briefing & training events a year on 3 different continents. Speakers and attendees travel from all over the world to meet and share in the latest advances in computer security. For more information, visit their Web site at http://www.blackhat.com