Spanning two days, the Black Hat Briefings will focus on the vital security issues facing organizations with large enterprise networks and mixed network operating systems. Speakers will include leading security professionals with extensive practical expertise, researchers and those who know the "Underground". You will learn about techniques applied by hackers and the methods to combat against them.
The Black Hat Briefings conference series is designed to assist computer professionals in developing a better understanding in order to defend their computer and information infrastructures against potential risks. During the conference, we will assemble a group of vendor-neutral security professionals in the same room and let them talk candidly about the problems businesses face by current security threats and concrete solutions they see to those problems. No gimmicks, just straight talk by people who make it their business to explore the ever-changing security space.
A strong way to counter security threats is to stay in communication with others, exchanging experiences and ways of counteraction. Supporting this idea, an informal get together at the Krasnapolsky Hotel Bar will be held on 13 May 2003 at 19:00. At this informal cocktail reception you can meet other Black Hat Briefings participants and make contact with personnel from different companies that share your background and concerns, as well as the conference presenters.
The following evening, 14 May 2003 will be a more formal reception with food and drink. These receptions are a tradition to any Black Hat Briefings Conference and has always provided a strong kickoff to the conference festivities. Again, the exchange on security issues can be intensified. Discussions with the speakers that began in the conference sessions can be continued in a more casual atmosphere.
All the talks offered at the Black Hat Briefings 2003 Amsterdam will be distributed as printed material and CD-ROM. The CD-ROM will contain all the presented slides in electronic format (the same materials will be made available after the conference in the Black Hat archives). A selection of practical tools that have been presented by the speakers will be made available on the CD-ROM as well.
Who is this Conference For? CIOs, CSO, MIS and IT managers as well as the people responsible for systems security. Anyone dealing with the security functions in your company whom are looking for a deeper insight into the security space.
|