The Black Hat Briefings '00, July 26-27th Las Vegas
The Black Hat Briefings '00, July 26-27th Las Vegas

Speakers
Hotel Information
Registration
Sponsors
Back
Speaking Schedule

The Black Hat Briefings will be Wednesday July 26th to Thursday July 27th

The first track will be more technical  talks surrounding the implementation of security.
The second track will be more general discussions surrounding security policy and trends.
The third track will be the White Hat track focused towards CIO / CEO needs.
The fourth track will be the Deep Knowledge track.

There will be 24 speakers and 4 keynote talks, plus two lunch talks.
NOTE: Speakers are not in their final time slots.

Tuesday, July 25th
20:00 - 22:00
Convention Reception - Informal get together in the lounge and early registration.  This is a good time to meet some of the speakers and other attendees in an informal setting.
 
Wednesday, July 26th
Technical
More Technical
White Hat
Deep Knowledge
08:00 - 09:00
Registration opens
08:00 - 09:00
Breakfast
09:00 - 09:10
Introduction: Jeff Moss - 
09:10 - 09:40
First Keynote Speech: White Hat - Marcus Ranum - Full Disclosure and Open Source.
09:40 - 10:10
Second Keynote Speech: Technical - Bruce Schneier - The Internet and the Death of Security.
10:10 - 10:30
Coffee Break
10:30 - 12:00
Jeremy Rauch - The security of network devices. Kingpin & Brian Oblivion - Secure Hardware Design. Ian Poynter - The truth about ASPs. Continuation of MJR's keynote speech.
12:00 - 13:30
Lunch
Speaker is Richard Thieme - The Strategies of Sun Tzu and Multiple Levels of Deception: How to play chess while the board is disappearing.
13:30 - 14:30
Jericho and Munge - Hard-core web defacement statistics trends and analysis. John McDonald - Real life penetration of FireWall-1. Lee Kushner - The state of employment in the information security industry. Continuation of Kingpin & Brian Oblivion
14:40 - 16:10
Jeff Thompson - Making Unix secure for the Internet with Trusted Operating Systems. Simple Nomad - Strategies for Defeating Distributed Attacks. Edward G. Schwartz - Data Privacy: What should the CIO and CISO be doing? Continuation of John McDonald's group talk.
16:10 - 16:30
Coffee Break
16:30 - 17:30
Padgett Peterson - Securing E-Mail Gateways from Attack - what to do while waiting for vendors to respond to the latest virus / worms. Job De Haas - Getting rooted and never knowing it. Diana Kelly - From Policy to Technology, Translating U.S. Privacy Regulations for Implementation. Greg Hoglund - Advanced Buffer Overflow Techniques.
18:00 - 20:00
Reception
 
Thursday, July 27th
Technical
More Technical
White Hat
Deep Knowledge
08:00 - 09:00
Breakfast
09:00 - 09:30
First Keynote Speech: White Hat - Arthur Money, Assistant Secretary of Defense & CIO of the DoD.
09:40 - 10:10
Second Keynote Speech: Technical - Dominique Brezinski - Anatomy of Common 
10:10 - 10:30
Coffee Break
10:30 - 12:00
David Litchfield - Compromising web servers, and defensive techniques. David LeBlanc - Real world techniques in network security management. Jennifer Granick and Mark Eckenwiler What Internet Service Providers Need to Know About the Law. Rooster & J.D. Glaser - Defending your network with Active Directory Services.
12:00 - 13:30
Lunch
Speaker is Hal McConnell - Threats from Organized Crime and Terrorists.
13:30 - 14:30
Ron Gula - Bypassing Intrusion Detection Systems. Joey - Advanced Windows NT/2K Security (II). Terry Losonsky - National Information Assurance Partnership. Continuation of Rooster & J.D. Glaser
14:40 - 16:10
Ron Moritz - Proactive Defense Against Malicious Code. Mudge - An analysis of tactics used in discovering "passive" monitoring devices.  Scott Blake - The Pros and Cons of Hiring Hackers.
16:10 - 16:30
Coffee Break
16:30 - 17:30
Mark Kadrich - Intrusion detection in high speed networks. Jason Garms - Defending Windows 2000 on the Internet.
Gordon Reichard Jr. - Trust, Security, Partnership:. Strategies in Selecting a managed service provider.
Continuation of Mudge