Black Hat USA 2011

Black Hat USA 2011 //Uplink Live Stream Schedule

Caesars Palace Las Vegas, NV - July 30 - August 4

   day one /USA2011 Live Stream( August 3 )

TRACK //Threat Intel //Turbo Tracks //Black Hat Underwriters
0850 - 0900 +  Jeff Moss: Welcome & Introduction to Black Hat USA 2011
0900 - 0950 +  keynote speaker
0950 - 1000 +  break
1000 - 1100 Macs in the Age of the APT by Alex Stamos Assemblage I Killing the Myth of Cisco IOS Diversity: Towards Reliable, Large-Scale Exploitation of Cisco IOS by Ang Cui
Heap spray detection with Heap Inspector by Aaron LeMasters
Qualys
0950 - 1000 +  break
1115 - 1230 Weapons of Targeted Attack: Modern Document Exploit Techniques by Sung-ting Tsai Assemblage II IEEE Software Taggant System by Mark Kennedy
The Troika of E-Discovery: Ethics, ESI, and Expertise in a Web 2.0 World by Richard Costa
iOS 4 Data Protection Internals by Andrey Belenko
How to Combat Advanced Persistent Threats at the Application Layer - Security Gateway deployment patterns for APT By Intel & Independent Security Expert, Gunnar Peterson
1230 - 1345 +  lunch
1345 - 1500 The Rustock Botnet Takedown by Julia Wolf Assemblage III From Microsoft with Love! by Katie Moussouris
SSH as the next back door. Are you giving hackers root access? by Joe Skehan
A Closer Look at Key Management: Strategies for Email Encryption by Ken Liao, Sr. Product Marketing Manager, Proofpoint, Inc.
1500 - 1515 +  break
1515 - 1630 Tamper Evident Seals - Design and Security by Data Gram Assemblage IV The Ultimate Study of Real-Life SSL Issues by Ivan Ristic
Function Rerouting from Kernel Land "Hades" by Jason Raber
OAuth – Securing the Insecure by Khash Kiani
1630 - 1645 +  break
1645 - 1800 Aerial Cyber Apocalypse: If we can do it... they can too. by Richard Perkins & Mike Tassey Assemblage V Familiarity Breeds Contempt: The Honeymoon Effect and the Role of Legacy Code in Zero-Day Vulnerabilities by Sandy Clark
Affiliate Programs: Legitimate Business or Fuelling Cybercrime? by Bradley Anstis
PPI-Geolocation: The next generation of 802.11 visualization and geo-location by Johnny Cache[3]
1815 - 1900 +  pwnie awards

   day two /USA2011 Live Stream( August 4 )

TRACK //Enterprise Concerns //Building 127.0.0.1 //Black Hat Underwriters *On-Demand
0850 - 0950 +  keynote speaker
0950 - 1000 +  break
1000 - 1100 Virtualization under attack: Breaking out of KVM by Nelson Elhage Microsoft Vista: NDA-less The Good, The Bad, and The Ugly by Chris Paget Qualys
1100 - 1115 +  break
1115 - 1230 Corporate Espionage for Dummies: The Hidden Threat of Embedded Web Servers by Michael Sutton Staring into the Abyss: The Dark Side of Secuirity and Professional Intelligence by Richard Thieme How to Combat Advanced Persistent Threats at the Application Layer - Security Gateway deployment patterns for APT By Intel & Independent Security Expert, Gunnar Peterson
1230 - 1345 +  break
1345 - 1500 Inside Apple's MDM Black Box by David Schuetz WORKSHOP 225- InfoSec 2021 - A Career Odyssey by Lee Kushner A Closer Look at Key Management: Strategies for Email Encryption by Ken Liao, Sr. Product Marketing Manager, Proofpoint, Inc.
1500 - 1515 +  break
1515 - 1630 a crushing blow at the heart of SAP J2EE Engine by Alexander Polyakov WORKSHOP 225- InfoSec 2021 - A Career Odyssey by Lee Kushner Continued
1630 - 1645 +  break
1645 - 1800 David Litchfield: Hacking and Forensicating an Oracle Database Server WORKSHOP 225- InfoSec 2021 - A Career Odyssey by Lee Kushner Continued