Includes PGP Creator Philip Zimmermann and Dept. of Homeland Security IAIP Cyber Program Director Marcus Sachs.
Black Hat, Las Vegas, NV — July 23, 2003 — http://www.blackhat.com/ – Black Hat Inc. today announced the keynote speakers for this summer’s Black Hat Briefings and Training 2003, the annual conference and workshop designed to help computer professionals better understand the security risks to their computer and information infrastructures by potential threats. This year’s show will focus on 10 tracks of hot topics including Application Security, Routing & Infrastructure, Policy, Law & Society, Firewalls, Access Control, Physical Security, Incident Response & Computer Forensics, Core Services, Privacy & Anonymity and Intrusion Detection. One of the tracks is also dedicated to various panels of industry pundits. The event is being held July 30 - 31, 2003 at the Caesars Palace Hotel and Casino in the heart of Las Vegas.
Top-notch speakers will deliver to the conference’s core audience of IT & network security experts, consultants and administrators the newest developments on the vital security issues facing organizations using large networks with a mix of operating systems.
“Black Hat continues to grow this year by adding a 5th track of speakers and 20% more presentations,” said Jeff Moss, Founder and Organizer of Black Hat Briefings. “Due to the continuing focus on application security, we have added a second track devoted to this topic. This show will be our largest yet, in attendees, sponsors and speakers. With a keynote from Phil Zimmermann and the CSO of Oracle participating on panels; to a real Federal Judge presiding over The Hacker Court – new tool and vulnerability releases at this summer’s Black Hat will be hot.”
The keynote speakers for this year’s Black Hat Briefings include:
– Philip Zimmermann, Creator of Pretty Good Privacy (PGP). He is currently a special advisor and consultant for the PGP Corporation. Zimmermann is best known for being the target of a three-year criminal investigation, because the U.S. Government held that export restrictions for cryptographic software were violated when PGP was spread around the world following its 1991 publication as freeware. Zimmermann currently consults for a number of companies and industry organizations on matters cryptographic, and is also a Fellow at the Stanford Law School’s Center for Internet and Society. Before founding PGP Inc, Zimmermann was a software engineer with more than 20 years of experience specializing in cryptography and data security, data communications, and real-time embedded systems.
Zimmermann will also be participating in a panel highlighting “The Law of Vulnerabilities” put together by Gerhard Eschelbeck, CTO of Qualys Inc. The panel also includes Mary Ann Davidson, Chief Security Officer of Oracle, Black Hat organizer Jeff Moss, Simple Nomad, founder of NMRC and a Senior Security Analyst for BindView Corporation, and JD Glaser, President & CEO, NT OBJECTives, Inc. The panel will be moderated by Black Hat-favorite Richard Thieme.
– Bruce Schneier, Founder and the Chief Technical Officer of Counterpane Internet Security, Inc. Schneier is an internationally renowned security technologist and author of six books on security and cryptography, including the security best seller, “Secrets & Lies: Digital Security in a Networked World.” His first book, “Applied Cryptography,” has sold over 150,000 copies world-wide, and is the definitive work in the field. Schneier will be “Following the Money” in the computer security industry and looking at the influences it has.
– Marcus Sachs, P.E., Cyber Program Director, Information Analysis and Infrastructure Protection, US Department of Homeland Security. Sachs is responsible for developing the implementation plan for the President’s National Strategy to Secure Cyberspace. Marc was previously the Director for Communication Infrastructure Protection in the White House Office of Cyberspace Security and was a staff member of the President’s Critical Infrastructure Protection Board. Marc retired from the United States Army in 2001 after serving over 20 years as a Corps of Engineers officer. He specialized during the later half of his career in computer network operations, systems automation, and information technology. His final assignment in the Army was with the Defense Department’s Joint Task Force for Computer Network Operations where he was the Senior Operations Analyst and Technical Director.
– Dario Forte, CFE, CISM. Forte is Security Advisor for the newly-formed European Electronic Crimes Task Force (EECTF) supported by the U.S. Secret Service in Milan. He has been active in the field of information security since 1992. He is 34 years old, with almost 15 years as Police Investigator in the Drug and Organized Crime Enforcement, CyberCrime Unit. He teaches classes and presents lectures on Information Security Management and Incident Response/Forensics at universities and other accredited institutions worldwide. He is an Intrusion Instructor for the Department of Homeland Security Internet Forensics Training Program given at the Federal Law Enforcement Training Center.
Other Black Hat Briefings 2003 speakers include:
– Thomas Akin, Founding Director, Southeast Cybercrime Institute. Akin is a Certified Information Systems Security Professional (CISSP) who has worked in Information Security for almost a decade. He is the founding director of the Southeast Cybercrime Institute a division or Continuing Education at Kennesaw State University. He serves as chairman for the Institute’s Board of Advisors and is an active member of the Georgia Cybercrime Task Force.
– Jay Beale, Senior Research Scientist, George Washington University Cyber Security Policy and Research Institute. Beale is a security specialist focused on host lockdown and security audits. He is the Lead Developer of the Bastille project, which creates a hardening script for Linux, HP-UX, and Mac OS X, a member of the Honeynet Project, and a core participant in the Center for Internet Security.
– Chris Conacher, Black Hat Consulting. Conacher has over 6 years experience in formal Information Security roles. This time has been spent with the Fortune 500 companies BAE Systems (formerly British Aerospace and Marconi Space Systems), BAE Systems Airbus and Intel Corporation. He has also worked for the Information Risk Management consultancy practice of ‘Big 5’ firm KPMG LLP where he specialized in ‘High-Tech’ companies. Chris’ time in Information Security has seen him working in England, France, Germany, Greece, Russia and the USA. His specialties include the development, deployment and review of corporate information security programs; the secure integration of Mergers & Acquisitions; data protection in disaster recovery planning; and information security business impact analysis.
– Roger Dingledine, Founder & OWner, Moria Research Labs. Dingledine is a security and privacy researcher. While at MIT under professor Ron Rivest, he developed Free Haven, one of the early peer-to-peer systems that emphasized resource management while retaining anonymity for its users. Currently he consults for the US Navy to design and develop systems for anonymity and traffic analysis resistance. Recent work includes anonymous publishing and communication systems, traffic analysis resistance, censorship resistance, attack resistance for decentralized networks, and reputation.
– Himanshu Dwivedi, Managing Security Architect, @stake. Dwivedi is a Managing Security Architect at @stake, Inc. At @stake, Himanshu leads the Storage Center of Excellence (CoE), which focuses research and training around storage technology, including Network Attached Storage (NAS) and Storage Area Networks (SAN). Himanshu’s focus in security is networking technology and storage architecture, specifically Fibre Channel Security.
– Jennifer Granick, Litigation Director, Center for Internet and Society, Stanford Law School. Ms. Granick’s work focuses on the interaction of free speech, privacy, computer security, law and technology. She is on the Board of Directors for the Honeynet Project and has spoken at the NSA, to law enforcement and to computer security professionals from the public and private sectors in the United States and abroad. Before coming to Stanford Law School, Ms. Granick practiced criminal defense of unauthorized access and email interception cases nationally. She has published articles on wiretap laws, workplace privacy and trademark law.
– Honorable Philip M. Pro, Chief United States District Judge for the District of Nevada. Judge Pro was appointed United States District Judge for the District of Nevada, at Las Vegas, on July 23, 1987. Judge Pro also served as United States Magistrate Judge for the District of Nevada, from 1980 until his elevation to the District Court, during which he supervised pretrial proceedings in the MGM Grand Hotel Fire Litigation. Judge Pro received his J.D. degree from Golden Gate University School of Law in June 1972.
– The Honeynet Project is a non-profit, all volunteer security research organization dedicated to researching the blackhat community, and sharing the lessons learned. Made up of thirty security professionals, the Project deploys Honeynet around the world to capture and analyze blackhat activity. These lessons are then shared with the security community. The Honeynet Project began in 1999 and continues to grow with the founding of the Honeynet Research Alliance.
– Larry Leibrock, Associate Dean and Technology Officer, University of Texas McCombs Business School. Leibrock has held or currently holds clinical teaching and research appointments at McCombs Business School, Institute for Advanced Technology, The University of Texas Law School, Emory University, Helsinki School of Economics and Monterrey Technologica in Mexico City and Monterrey. He is a member of IEEE, ACM, Internet Society, FIRST and USENIX/SAGE and is also a member of the Department of Defense Software Engineering Institute and a participant in the Air Force Software Technology Conference.
– Neel Mehta, Application Vulnerability Researcher, ISS X-Force. Mehta works as an application vulnerability researcher at ISS X-Force, and like many other security researchers comes from a reverse-engineering background. His reverse engineering experience was cultivated through extensive consulting work in the copy protection field, and has more recently been focused on application security. Neel has done extensive research into binary and source-code auditing, and has applied this knowledge to find many vulnerabilities in critical and widely deployed network applications.
– Richard Salgado, Senior Counsel, Computer Crime and Intellectual Property Section of the United States Department of Justice. Salgado specializes in investigating and prosecuting computer network cases, such as computer hacking, denial of service attacks, illegal sniffing, logic bombs, viruses and other technology-driven privacy crimes. Often such crimes cross international jurisdictions; Mr. Salgado helps coordinate and manage the investigation and prosecution of those cases and participates in policy development relating to emerging technologies such as the growth of wireless networks, voice-over Internet Protocol, surveillance tools and forensic techniques.
To register for BlackHat Briefings, visit the Web site at http://www.blackhat.com. Please direct any conference-related questions to firstname.lastname@example.org.
For press registration, contact B.K. DeLong via email at email@example.com or phone at +1.617.797.2472. (Please read: http://www.blackhat.com/html/bh-link/pressreg.html for further information regarding media credentials.)
Black Hat Inc. was originally founded in 1997 by Jeff Moss to fill the need for computer security professionals to better understand the security risks and potential threats to their information infrastructures and computer systems. Black Hat accomplishes this by assembling a group of vendor-neutral security professionals and having them speak candidly about the problems businesses face and their solutions to those problems. Black Hat Inc. produces 5 briefing & training events a year on 3 different continents. Speakers and attendees travel from all over the world to meet and share in the latest advances in computer security. For more information, visit their Web site at http://www.blackhat.com
Qualys, the Qualys logo and QualysGuard are proprietary trademarks of Qualys, Inc. All other products or names may be trademarks of their respective companies.
For media inquiries or to find the appropriate spokesperson
Contact: Megan Lamb
For all other matters