black hat home
/
usa home
/
training
/
briefings
/
schedule
/
special events
/
sponsors
Black Hat USA 2011
//Uplink Live Stream Schedule
Caesars Palace Las Vegas, NV - July 30 - August 4
day one
/USA2011 Live Stream
(
August 3
)
TRACK
//Threat Intel
//Turbo Tracks
//Black Hat Underwriters
0850 - 0900
+
Jeff Moss: Welcome & Introduction to Black Hat USA 2011
0900 - 0950
+
keynote speaker
0950 - 1000
+
break
1000 - 1100
Macs in the Age of the APT by Alex Stamos
Assemblage I Killing the Myth of Cisco IOS Diversity: Towards Reliable, Large-Scale Exploitation of Cisco IOS by Ang Cui
Heap spray detection with Heap Inspector by Aaron LeMasters
Qualys
0950 - 1000
+
break
1115 - 1230
Weapons of Targeted Attack: Modern Document Exploit Techniques by Sung-ting Tsai
Assemblage II IEEE Software Taggant System by Mark Kennedy
The Troika of E-Discovery: Ethics, ESI, and Expertise in a Web 2.0 World by Richard Costa
iOS 4 Data Protection Internals by Andrey Belenko
How to Combat Advanced Persistent Threats at the Application Layer - Security Gateway deployment patterns for APT By Intel & Independent Security Expert, Gunnar Peterson
1230 - 1345
+
lunch
1345 - 1500
The Rustock Botnet Takedown by Julia Wolf
Assemblage III From Microsoft with Love! by Katie Moussouris
SSH as the next back door. Are you giving hackers root access? by Joe Skehan
A Closer Look at Key Management: Strategies for Email Encryption by Ken Liao, Sr. Product Marketing Manager, Proofpoint, Inc.
1500 - 1515
+
break
1515 - 1630
Tamper Evident Seals - Design and Security by Data Gram
Assemblage IV The Ultimate Study of Real-Life SSL Issues by Ivan Ristic
Function Rerouting from Kernel Land "Hades" by Jason Raber
OAuth – Securing the Insecure by Khash Kiani
1630 - 1645
+
break
1645 - 1800
Aerial Cyber Apocalypse: If we can do it... they can too. by Richard Perkins & Mike Tassey
Assemblage V Familiarity Breeds Contempt: The Honeymoon Effect and the Role of Legacy Code in Zero-Day Vulnerabilities by Sandy Clark
Affiliate Programs: Legitimate Business or Fuelling Cybercrime? by Bradley Anstis
PPI-Geolocation: The next generation of 802.11 visualization and geo-location by Johnny Cache[3]
1815 - 1900
+
pwnie awards
day two
/USA2011 Live Stream
(
August 4
)
TRACK
//Enterprise Concerns
//Building 127.0.0.1
//Black Hat Underwriters *On-Demand
0850 - 0950
+
keynote speaker
0950 - 1000
+
break
1000 - 1100
Virtualization under attack: Breaking out of KVM by Nelson Elhage
Microsoft Vista: NDA-less The Good, The Bad, and The Ugly by Chris Paget
Qualys
1100 - 1115
+
break
1115 - 1230
Corporate Espionage for Dummies: The Hidden Threat of Embedded Web Servers by Michael Sutton
Staring into the Abyss: The Dark Side of Secuirity and Professional Intelligence by Richard Thieme
How to Combat Advanced Persistent Threats at the Application Layer - Security Gateway deployment patterns for APT By Intel & Independent Security Expert, Gunnar Peterson
1230 - 1345
+
break
1345 - 1500
Inside Apple's MDM Black Box by David Schuetz
WORKSHOP 225- InfoSec 2021 - A Career Odyssey by Lee Kushner
A Closer Look at Key Management: Strategies for Email Encryption by Ken Liao, Sr. Product Marketing Manager, Proofpoint, Inc.
1500 - 1515
+
break
1515 - 1630
a crushing blow at the heart of SAP J2EE Engine by Alexander Polyakov
WORKSHOP 225- InfoSec 2021 - A Career Odyssey by Lee Kushner Continued
1630 - 1645
+
break
1645 - 1800
David Litchfield: Hacking and Forensicating an Oracle Database Server
WORKSHOP 225- InfoSec 2021 - A Career Odyssey by Lee Kushner Continued
home
/
archives
/
community
/
about
/
contact
2011 black hat ™