Monday morning at 7AM and your phone is ringing off the hook. You run to the office only to find out that over the weekend three of your production servers have been compromised. How is your incident response team going to react? Where will the forensics begin? Network security is not always just hacking in or defending.
When choosing speakers for the conference we search out engineers and developers who are researching security from a practical hands-on standpoint. We select the speakers that are doing unique research, writing the security tools, or finding the bugs. No vendor pitches. Just straight talk from people who are knowledgeable from both a practical and theoretical standpoint. The sessions are intense, informative and cutting edge.
Last year The Black Hat Asia Briefings was held in Singapore, with 300 people attending from Corporate, Government IT and Military organizations. The feedback was tremendous.
Different than the Black Hat Briefings in the US: The Asia briefing is in its third year and will feature two tracks of speakers. Spanning two days, The Black Hat Briefings will focus on the vital security issues facing organizations with large Enterprise networks and mixed network operating systems. Topics will include: Forensics, Unix Services, Trojans, Infrastructure Security, Web Hacking and more. You will be put face to face with the people developing the tools used against hackers.
The Black Hat Briefing's intense sessions will bring to light the security problems confronting organizations and network administrators, most of which go unnoticed by today's preoccupied system administrators where security gets put off in lieu of constant network growth and upgrades. Our speakers will discuss the strategies involved in correcting existing problems and speak towards what you can expect in the future.
Who is this Conference For? Who is this Conference For? CIOs, CSO, MIS and IT managers as well as the people responsible for systems security. Anyone dealing with the security functions in your company whom are looking for a deeper insight into the security space.
|