|
The Black Hat Briefings '00, July 26-27th Las Vegas |
|
||||
20:00 - 22:00
|
Convention Reception - Informal get together in the lounge and early registration. This is a good time to meet some of the speakers and other attendees in an informal setting. |
|
||||
|
|
|
|
|
08:00 - 09:00
|
|
|||
08:00 - 09:00
|
|
|||
09:00 - 09:10
|
Introduction: Jeff Moss - | |||
09:10 - 09:40
|
First Keynote Speech: White Hat - Marcus Ranum - Full Disclosure and Open Source. | |||
09:40 - 10:10
|
Second Keynote Speech: Technical - Bruce Schneier - The Internet and the Death of Security. | |||
10:10 - 10:30
|
|
|||
10:30 - 12:00
|
Jeremy Rauch - The security of network devices. | Kingpin & Brian Oblivion - Secure Hardware Design. | Ian Poynter - The truth about ASPs. | Continuation of MJR's keynote speech. |
12:00 - 13:30
|
Speaker is Richard Thieme - The Strategies of Sun Tzu and Multiple Levels of Deception: How to play chess while the board is disappearing. |
|||
13:30 - 14:30
|
Jericho and Munge - Hard-core web defacement statistics trends and analysis. | John McDonald - Real life penetration of FireWall-1. | Lee Kushner - The state of employment in the information security industry. | Continuation of Kingpin & Brian Oblivion |
14:40 - 16:10
|
Jeff Thompson - Making Unix secure for the Internet with Trusted Operating Systems. | Simple Nomad - Strategies for Defeating Distributed Attacks. | Edward G. Schwartz - Data Privacy: What should the CIO and CISO be doing? | Continuation of John McDonald's group talk. |
16:10 - 16:30
|
|
|||
16:30 - 17:30
|
Padgett Peterson - Securing E-Mail Gateways from Attack - what to do while waiting for vendors to respond to the latest virus / worms. | Job De Haas - Getting rooted and never knowing it. | Diana Kelly - From Policy to Technology, Translating U.S. Privacy Regulations for Implementation. | Greg Hoglund - Advanced Buffer Overflow Techniques. |
18:00 - 20:00
|
|
|
||||
|
|
|
|
|
08:00 - 09:00
|
|
|||
09:00 - 09:30
|
First Keynote Speech: White Hat - Arthur Money, Assistant Secretary of Defense & CIO of the DoD. | |||
09:40 - 10:10
|
Second Keynote Speech: Technical - Dominique Brezinski - Anatomy of Common | |||
10:10 - 10:30
|
|
|||
10:30 - 12:00
|
David Litchfield - Compromising web servers, and defensive techniques. | David LeBlanc - Real world techniques in network security management. | Jennifer Granick and Mark Eckenwiler What Internet Service Providers Need to Know About the Law. | Rooster & J.D. Glaser - Defending your network with Active Directory Services. |
12:00 - 13:30
|
Speaker is Hal McConnell - Threats from Organized Crime and Terrorists. |
|||
13:30 - 14:30
|
Ron Gula - Bypassing Intrusion Detection Systems. | Joey - Advanced Windows NT/2K Security (II). | Terry Losonsky - National Information Assurance Partnership. | Continuation of Rooster & J.D. Glaser |
14:40 - 16:10
|
Ron Moritz - Proactive Defense Against Malicious Code. | Mudge - An analysis of tactics used in discovering "passive" monitoring devices. | Scott Blake - The Pros and Cons of Hiring Hackers. | |
16:10 - 16:30
|
|
|||
16:30 - 17:30
|
Mark Kadrich - Intrusion detection in high speed networks. | Jason Garms - Defending Windows 2000 on the Internet. |
Gordon Reichard Jr. - Trust, Security, Partnership:. Strategies in Selecting a managed service provider. |
Continuation of Mudge |