The Black Hat Briefings '98, July 29-30th Las Vegas
The Black Hat Briefings '98, July 29-30th Las Vegas

Speakers
Hotel Info
Registration
Sponsors
Speaking Schedule

The Black Hat Briefings will be Wed. July 29 to Thurs. July 30th
Track A will be more general, Track B will be more technical.



 Wednesday, July 29th

08:30 - 09:00  Breakfast

09:00 - 09:45
Keynote Address: Marcus Ranum - How to REALLY secure the Internet.

10:00 - 11:30
Track A  Jennifer Granick - What's different about evidence in computer crime litigation.
Track B  Dominique Brezinski - Penetrating NT Networks through Information leaks and policy weaknesses.

11:40 - 13:10
Track A  Ira Winkler - Information Security: Beyond the Hype.
Track B  Tom Ptacek - Problems with Intrusion Detection Systems.

13:20 - 14:20 Lunch 

14:25 - 15:20 (Shortened Session)
Track A  Panel: The benefits and problems of commercial security software.
Track B  John Bailey - SOCKS, PPTP & IPSec: Implementation & Futures.

15:30 - 17:00
Track A  Karan Khanna & Paul Leach - Business Value of Security (20 min) & The NTLM++ protocol (1 hr 20) mins.
Track B  Ian Goldberg - Cell phone security: a history and the state of the art.

17:05 - 18:00
Track A  Ray Kaplan - Meet the Enemy Session.
Track BK0re - Hacking Novell Netware 3.x and 4.x

18:30 -  20:00 Reception


Thursday, July 30th

08:30 - 09:00   Breakfast

09:00 - 09:45
Keynote Address: Bruce Schneier -Mistakes and Blunders: A Hacker Looks at Cryptography.

09:50 - 10:20 Richard Thieme -  Convergence -- Every Man (and Woman) a Spy.

10:30 - 12:00
Track A  Patrick Richard - Open Network PKI Design Issues or ãBusiness as Usualä
Track B  Dr. Mudge -Problems with VPN technologies.

12:20 - 13:40
Track A  Bruce K. Marshall - Statistical analysis of reusable password systems and their alternatives.
Track B  Peter Shipley -  An overview of a TCP/IP internals and its security strengths and weaknesses.

13:40 - 15:00 Lunch 

15:00 - 16:20
Track A Winn Schwartau - Introducing the Time Based Security model and applying military strategies to network and infrastructural securitues.  A/K/A Humbug.
Track B Paul McNabb: The use of trusted operating systems technology.

16:30 - 18:00
Track A  Meet the FED panel - Ray Kaplan has introduced you to "The Enemy", now it is time to meet the Feds.
Track B  Theo DeRaadt - A discussion of secure coding issues, problems with maintaining OS source trees, and secure program design philosophies.

17:35 - 
Closing