|It's late. You're in the office alone, catching up on database administration. Behind you, your network servers hum along quietly, reliably. Life is good. No one can get to your data or disrupt your WAN. The network is secure. Or is it?
Security is crucial. Everywhere you look, you will find misconfigured systems and exploits for every type of network. At the Black Hat Briefings you will be placed right on the front lines. Exploits are discussed, reviewed, changed, and even discovered on site at the show. We provide an artillery of knowledge to protect yourself and increase your security.
When choosing speakers for the conference we find engineers and developers who are researching security from a practical hands-on standpoint. We try to select the speakers that are doing unique research, writing the security tools, or finding the bugs. No vendor pitches. Just straight talk from people who are knowledgable from both a practical and theoretical standpoint. The sessions are intense, informative and cutting edge.
Spanning two days with eight separate tracks, this conference will explore in greater detail the technologies, tools, and techniques needed by system administrators and security experts to stay on the cutting edge.
Wireless: 802.11x, CDPD, BlueTooth, WAP, C/TDMA, GSM, SMS, 3G and two-way paging. Everything is going wireless.
Firewalls, Access Control, PKI & Single Signon: These talks will explore the latest technologies in defeating, auditing or implementing these technologies.
Routing and Infrastructure: This track will focus on the technologies that are the bare bones of an Internet presence.
Application Security: Auditing web applications, reverse engineering binaries, an evaluation or overview of application level proxies, secure coding practices, and buffer overflow / stress testing tools.
Intrusion Detection, Incident Response & Computer Forensics: The latest technologies and techniques used in detecting and investigating a suspected computer break in.
Privacy & Anonymity: In the ever increasing surveillance of the public net, what are the issues privacy conscious people and administrators should be aware of?
Web, Mail & Other Related Servers: This track will deal with security issues surrounding critical services such as mail, web, and network availability.
Deep Knowledge: Talks from the above tracks that require twice the normal time to explore.