Black Hat Digital Self Defense
briefings
main speakers schedule sponsors training hotel register

detailske me to..
February 6 • Informal gathering at 18:00. Gather at the Registration Desk for light hors 'd ouerves and refreshments.
This is a great time to meet and network with friends, colleagues and the speakers.
Day 1 • February 7, 2002
08:00 - 09:00 Registration and Breakfast
09:00 - 09:15 Introduction, Jeff Moss
09:15 - 10:15

Keynote: Windows Security Configuration Guide

Tony Sager, National Security Agency

10:15 - 10:30 Coffee Service
General Network MS Apps
10:30 - 12:00

Mobile Computing Security

Jesper Johansson

Routing and Tunneling Protocol Attacks

FX

The Devil Inside: Planning Security in Active Directory Design

Laura A. Robinson

12:00 - 13:30 Lunch
13:30 - 14:45

Bi-directional Communications in a Heavily Protected Environment

Roelof Temmingh & Haroon Meer

Protecting Your Cisco Infrastructure Against the Latest "Attacktecs"

Stephen Dugan

Attacking and Defending DNS

Jay Beale & Andrew Hintz

14:45 -15:00 Break
15:00 - 16:15

How to Stay Up-To-Date On Security Patches

Eric Schultze

Taranis

Jonathan Wilkins

NIST Recommendations for System Administrators for Securing Windows 2000 Professional

Tony Harris & Murugiah Souppaya

16:15 - 16:30 Coffee Service
16:30 - 18:00

The Deep Technical Audit: How to Mitigate the Risks Presented in Other Sessions

David Goldman & Todd Feinman & Joe Nocera

VoIP: The Next Generation of Phreaking

Ofir Arkin

Deploying and Securing Microsoft Internet Security and Acceleration Server

Thomas Shinder & Jim Harrison

18:00 - 20:00 Reception
Book Signing with Dr. Thomas Shinder, author of Configuring ISA Server 2000: Building Firewalls with Windows 2000
Day 2 • February 8, 2002
08:00 - 09:15 Breakfast
09:15 - 10:15

Keynote: Digital Rights Management Legal Briefing

Jennifer S. Granick, Attorney At Law

10:15 - 10:30 Coffee Service
Tools of the Trade Database Deep Knowledge
10:30 - 12:00

Cracking NTLMv2 Authentication

Urity

One-Way SQL Hacking: Futility of Firewalls in Web Hacking

JD Glaser

NT/2K Incident Response and Mining for Hidden Data: Post Mortem of a Windows Box
Part 1 of 2

Harlan Carvey

12:00 - 13:30 Lunch
13:30 - 14:45

Web Application Security and Release of "WhiteHat Arsenal"

Jeremiah Grossman

Web Vulnerability and SQL Injection Countermeasures: Securing Your Servers From the Most Insidious of Attacks

Timothy Mullen

NT/2K Incident Response and Mining for Hidden Data: Post Mortem of a Windows Box
Part 2 of 2

Harlan Carvey

14:45 -15:00 Break
15:00 - 16:15

How to Fix a Broken Window
Part 1 of 2

Erik Pace Birkholz

MS SQL Server Security Mysteries Explained

Chip Andrews

Third Generation Exploits on NT/Win2k Platforms
Part 1 of 2

Halvar Flake

16:15 - 16:30 Coffee Service
16:30 - 18:00

How to Fix a Broken Window
Part 2 of 2

Erik Pace Birkholz

Oracle Vulnerabilities

David Litchfield & Sherief Hammad

Third Generation Exploits on NT/Win2k Platforms
Part 2 of 2

Halvar Flake

REGISTER ME NOW!
Note that this schedule is subject to change.

Attendees should wear badges at all times.
Badges and/or conference proceedings that are lost or stolen will incur a $500 replacement fee.

(c) 1996-2002 Black Hat, Inc