Black Hat Digital Self Defense
main speakers schedule sponsors training hotel
briefings details
Black Hat thanks our sponsors.
Black Hat USA speaker presentations are now online.

If you missed any of the talks or was not able to attend, audio and video is available from The Sound of Knowledge. Go To Sound of Knowledge

Black Hat USA 2002 Briefings and Training
Caesars Palace, Las Vegas, NV, USA
Training: July 29-30, 2002
Briefings: July 31-August 1, 2002
Paid Briefings attendees receive free admission to Defcon 10.

BONUS! All paid Briefings attendees will receive a complimentary book: Hack Proofing Your Ecommerce Site by Ryan Russell, compliments of our official book sponsor, Syngress Publishing. Ryan will be available to sign your copy during the gala reception on Weds, July 31.

NEWLY ADDED PANEL: Panel: Vulnerability Disclosure: What the Feds Think to be held during the gala reception on Weds, July 31.
Panel speakers will consist of: Michael I. Morgenstern (Global InterSec) (Moderator), Richard George (National Security Agency), Marcus H. Sachs (Office of Cyber space Security), O. Sami Saydjari (SRI International), Steve Lipner (Microsoft Corp), Tom Parker (Global InterSec)

Current Black Hat USA 2002 Briefings Schedule. There will be eight different tracks over two days.

Currently selected Black Hat USA 2002 Briefings speakers.

Learn more about who our Black Hat USA 2002 Briefings sponsors and media partners are. Black Hat welcomes its newest sponsor: Procinct.

Black Hat USA 2002 Training: 12 courses will be offered including several new classes. New courses in forensics, reverse engineering, solaris/linux and cisco router security will be offered . Register Early to attend the classes of your choice! Last year, many courses were oversold. Complete Trainining Course Descriptions are available.

Training Update: All classes are now sold out.

BOOK SIGNINGS! Limited number of books will be available for purchase from our official onsite bookseller Breakpoint during the USA 2002 Briefings. Purchase books BEFORE the reception for the best chance at getting a copy signed.

Book signings will be held at the Black Hat Gala Reception, Weds, July 31 from 18:00-18:45. Meet and speak with the authors!

Hotel and Venue information for Black Hat USA 2002 Briefings and Training. Reserve your hotel room on-line at the same time you register for the conference.

briefings overview
It's late. You're in the office alone, catching up on database administration.  Behind you, your network servers hum along quietly, reliably.  Life is good.  No one can get to your data or disrupt your WAN. The network is secure. Or is it? 

Security is crucial. Everywhere you look, you will find misconfigured systems and exploits for every type of network. At the Black Hat Briefings you will be placed right on the front lines. Exploits are discussed, reviewed, changed, and even discovered on site at the show. We provide an artillery of knowledge to protect yourself and increase your security.

When choosing speakers for the conference we find engineers and developers who are researching security from a practical hands-on standpoint. We try to select the speakers that are doing unique research, writing the security tools, or finding the bugs. No vendor pitches. Just straight talk from people who are knowledgable from both a practical and theoretical standpoint. The sessions are intense, informative and cutting edge.

Spanning two days with eight separate tracks, this conference will explore in greater detail the technologies, tools, and techniques needed by system administrators and security experts to stay on the cutting edge.

Wireless: 802.11x, CDPD, BlueTooth, WAP, C/TDMA, GSM, SMS, 3G and two-way paging. Everything is going wireless.

Firewalls, Access Control, PKI & Single Signon: These talks will explore the latest technologies in defeating, auditing or implementing these technologies.

Routing and Infrastructure: This track will focus on the technologies that are the bare bones of an Internet presence.

Application Security: Auditing web applications, reverse engineering binaries, an evaluation or overview of application level proxies, secure coding practices, and buffer overflow / stress testing tools.

Intrusion Detection, Incident Response & Computer Forensics: The latest technologies and techniques used in detecting and investigating a suspected computer break in.

Privacy & Anonymity: In the ever increasing surveillance of the public net, what are the issues privacy conscious people and administrators should be aware of?

Web, Mail & Other Related Servers: This track will deal with security issues surrounding “critical” services such as mail, web, and network availability.

Deep Knowledge: Talks from the above tracks that require twice the normal time to explore.

Black Hat Logo
(c) 1996-2007 Black Hat