||The Black Hat Briefings
'98, July 29-30th Las Vegas
The Black Hat Briefings '98, July 29-30th Las Vegas
Tuned! Speeches are being digitized and materials put online!
||It's late. You're in the office alone,
catching up on database administration. Behind you, your network
servers hum along quietly, reliably. Life is good. No one can
get to your data or disrupt your WAN. The
network is secure. Or is it?
The Black Hat Briefings conference has been organized to put an end to concerns like these. While many conferences focus on information and network security, only The Black Hat Briefings will put your engineers and software programmers face-to-face with today's cutting edge computer security experts and "underground" security specialists.
Only the Black Hat Briefings conference will provide your people with the tools and understanding they need to thwart those lurking in the shadows of your firewall.
The reality is, they are out there. The choice is yours. You can live in fear of them. Or, you can learn from them.
The Black Hat Briefings conference series was created to fill the need of computer professionals to better understand the security risks to their computer and information infrastructures by potential threats. To do this we assemble a group of vendor neutral security professionals in the same room and let them talk candidly about the problems businesses face, and the solutions they see to those problems. No gimmicks, just straight talk by people who make it their business to explore the ever changing security space.
Spanning two days with two separate tracks, The Black Hat Briefings will Focus on the vital security issues facing organizations with large Enterprise networks and mixed network operating systems. Topics will Include Intrusion Detection Systems (IDS), denial of service attacks and responses, secure programming techniques and tool selection for creating and effectively monitoring secure networks.
Black Hat's intense sessions will bring to light the security and mis-configuration problems confronting organizations and network administrators, most of which go unnoticed by today's preoccupied system administrators where security gets put off in lieu of constant network growth and upgrades. Our experts will discuss the strategies involved in correcting existing problems and any problems on the horizon.
Current Intrusion Detection Systems and methods of pro-active prevention will be covered so that attendees may learn how to stop these problems before they occur. CIO's are welcome, but they should bring the people implementing their network strategies and building their applications, because this conference is for both policy maker and policy implementor.
Registration costs are $995 US before
July 10th 1998.