|
February 14th-15th Las Vegas |
|
|||
20:00 - 22:00
|
Convention Reception - Informal get together in the lounge and early registration. This is a good time to meet some of the speakers and other attendees in an informal setting. |
|
|||
|
|
|
|
08:00 - 09:00
|
|
||
08:00 - 09:00
|
|
||
09:00 - 09:10
|
Introduction: Jeff Moss - | ||
09:10 - 10:10
|
First Keynote Speech: James Bamford - Researching secrets. | ||
10:10 - 10:30
|
|
||
10:30 - 12:00
|
Macy Bergoon - Host Based Intrusion Detection Using W2K Auditing Features | Erik Birkholz & Clinton Mugge - Terminal Server: The Day of Reckoning | Rooster, Dan Kurc & William Dixon- IPSec in a Windows 2000 World |
12:00 - 13:30
|
|
||
13:30 - 14:30
|
Andrey Malyshev - Analysis of Microsoft Office password protection system. | Todd Sabin - Null Sessions, MSRPC, and Windows 2000. | IPSec in a Windows 2000 World - continued |
14:40 - 16:10
|
JD Glaser & Saumil Shah - Web Hacking | Greg Hoglund - Kernel Mode Rootkits: Stealth and Subversion of Trust. | IPSec in a Windows 2000 World - continued |
16:10 - 16:30
|
|
||
16:30 - 18:00
|
David Litchfield - Remote Web Application Disassembly with ODBC Error Messages | Ofir Arkin - Active & Passive Fingerprinting of Microsoft Based Operating Systems using the ICMP protocol | IPSec in a Windows 2000 World - continued |
18:00 - 20:00
|
|
|
|||
|
|
|
|
08:00 - 09:00
|
|
||
09:00 - 10:10
|
Second Keynote Speech: Chey - Why Government Systems Fail at Security | ||
10:10 - 10:30
|
|
||
10:30 - 12:00
|
Todd Feinman & David Goldman - Safeguarding your Business Assets through the Win32API | Panel Discussion - The Black Hat Time Machine. | Trust Factory - Falling Dominos |
12:00 - 13:30
|
Speaker is Jeff Jonas - Cops and robbers - Cheating Las Vegas |
||
13:30 - 14:30
|
Eric Schultz & David LeBlanc - Defense in Depth: Winning in Spite of Yourself (aka "Foiling JD") | Loki - Virtual Private Problems: A Broken Dream | Trust Factory - Continued |
14:40 - 16:10
|
Mushin - Incident Response in a Microsoft world. | Chip Andrews - MS SQL Server Security Overview | Havlar Flake - Auditing binaries for security vulnerabilities |
16:10 - 16:30
|
|
||
16:30 - 17:30
|
Kate Borten - Healthcare and New Federal Security Protections | Paul T. Mobley Sr - Computer Forensics with an emphasis on the NT operating system. | Havlar Flake - Continued |