The Black Hat Briefings '01, July 11-12th Las Vegas
The Black Hat Briefings '01, July 11-12th Las Vegas

Hotel Information
Speaking Schedule

The Black Hat Briefings will be Wednesday July 11th to Thursday July 12th

The first track will be more technical  talks surrounding the implementation of security.
The second track will be more general discussions surrounding security policy and trends.
The third track will be the Tools of the Trade on Wednesday, and the White Hat track on Thursday.
The fourth track will be the Deep Knowledge track.
Tuesday, July 10th
20:00 - 22:00
Convention Reception - Informal get together in the lounge and early registration.  This is a good time to meet some of the speakers and other attendees in an informal setting.
Wednesday, July 11th
More Technical
Tools of the Trade
Deep Knowledge
07:00 - 08:00
Registration Opens
07:00 - 08:00
08:00 - 08:10
Introduction: Jeff Moss - Welcome to the Fifth Black Hat Briefings.
08:10 - 08:50
Keynote Speech: James Bamford: Researching Secrets, Part II
09:05 - 10:00
Blake: DOG of WAR: Attack Box Design Jose Nazario: The future of internet worms Thomas Olofsson
Building a blind ip spoofed portscanning tool
George Jelatis: Countering the Insider Threat with the Autonomic Distributed Firewall (ADF)
10:00 - 10:15
Coffee Break
10:15 - 12:00
Robert Hansen: Hardening .htaccess scripts in Apache environments Eric Brandwine &
Todd MacDermid
Fnord: A Loadable kernel module for defense and honeypots
Renaud Deraison:
The Nessus Project. Reducing the costs of vulnerability assessment
using Nessus 1.2
Dan Kaminsky: Gateway Cryptography:  Hacking Impossible Tunnels through Improbable Networks with OpenSSH and the GNU Privacy Guard
12:00 - 13:15
Richard Thieme : Defending the Information Web:  New Ways of Thinking About Security
13:30 - 14:30
Steven M. Christey: CVE Behind the Scenes: The Complexity of Being Simple Jay Beale: Attacking and Defending BIND / DJBDNS DNS Servers Simple Nomad &
Todd Sabin: The RAZOR Warez
Halvar Flake: Hit them where it hurts: Finding holes in COTS software
14:40 - 16:10
Andrew van der Stock: Alternatives to honeypots or the dtk Ian Goldberg: Breaking 802.11 WEP Martin Roesch: Snort
16:10 - 16:30
Coffee Break
16:30 - 18:00
Job de Haas: GSM / WAP / SMS Security Marshall Beddoe &  Chris Abad: The Siphon Project. Rain Forest Puppy: New tools at rfp.labs Kevin McPeake & Chris Goggans: Falling Dominos Part III
18:00 - 20:00
James Bamford Book Signing
Winn Schwartau: "CyberEthical Surfivor - The Game"
Thursday, July 12th
More Technical
White Hat
Deep Knowledge
07:00 - 08:00
08:00 - 08:50
Keynote Speech: William Tafoya & Kevin Manson: Career Routing for the Ethical Coder
09:00 - 10:15
Cory Scott: Systems Management in an Untrusted Network. Tim Newsham: Cracking WEP Keys Mandy Andress:
Wireless LAN Security
Walter Gary Sharp: Key Legal Implications of Computer Network Defense
10:15 - 10:30
Coffee Break
10:30 - 12:00
Chip Andrews: SQL Security revisited. Iván Arce & Max Caceres: Automated Penetration Testing Gregory S. Miles:
Computer Forensics: A Critical Process in Your Incident Response Plan
Last Stage of Delirium Research Group: UNIX assembly codes development for vulnerabilities illustration purposes
12:00 - 13:15
Bruce Schneier: Paradigms Lost: Engineering vs. Risk Management.
13:30 - 14:30
Timmothy Mullen: Grabbing User Credentials via W2k ODBC Libraries Daiji Sanai: Promiscuous node detection using ARP packets Brian Martin & B.K. DeLong: Lessons Learned From Ofir Arkin: Introducing X: Playing Tricks with ICMP
14:40 - 16:10
Chad R. Skipper: Polymorphism and Intrusion Detection Systems. Mike Beekey: ARP Vulnerabilities: Indefensible Local Network Attacks? Daniel VanBelleghem: Solving Network Mysteries Lance Spitzner: The Honey Net Project
16:10 - 16:30
Coffee Break
16:30 - 17:30
Palante:Top 25 overlooked security configurations on your switches and routers Jeff Nathan & Kevin Depeugh: Layer 2 Attacks Meet the Press Panel Lance Spitzner: The Honey Net Project