Black Hat Digital Self Defense
Register Now
Registration for Windows Security 2002 Briefings and Training now open. Register On-site.

Media and Press must Pre-Register for all Black Hat events.

Current Organization and Media Sponsors for BlackHat
Windows Security 2002
USA 2002

Interested in sponsorship opportunities? Contact us.

media archives
FREE audio and video of presentations from past conferences.

See our Windows Security 2002 Ad
See our Windows Security 2002 Preview Program

past conventions
Past convention pages. Come here for information on venues, speakers, presentation descriptions

Past Audio & Video is available on MP3 CD, Video, and VHS from the Sound of Knowledge

Black Hat now offers consulting services. Learn more about how e can help you.

Contact us for more information on how we may be able to help you.

about Black Hat
Mission statement and media kit

Need to contact us?

Black Hat Logo
(c) 1996-2007 Black Hat
main speakers schedule sponsors training hotel register
briefings details
Windows Security 2002 Briefings and Training
Radisson Hotel New Orleans, New Orleans, LA
Training: Feb 5-6, 2002
Briefings: Feb 7-8, 2002

Current Windows Security Briefings Schedule

Currently selected Windows Security speakers. Presentation materials and tools are now available for download.

Book Signing with Dr. Thomas Shinder, author of Configuring ISA Server 2000: Building Firewalls with Windows 2000, during the February 7, 2001 Reception

Windows Security Training: Seven courses will be offered including a 2 day NSA InfoSec Assessment Methodology Course that will offer NSA certification on completion.

Learn more about who our Windows Security sponsors and media partners are.

Hotel and Venue information for Windows Security 2002 Briefings and Training. Extraordinary low rates are available from Super Bowl weekend thru Mardi Gras weekend.

briefings overview
It's late. You're in the office alone, catching up on database administration.  Behind you, your network servers hum along quietly, reliably.  Life is good.  No one can get to your data or disrupt your WAN. The network is secure. Or is it? 

In almost every environment there are windows servers. These servers become our web fronts, our databases, even our firewalls. Security in these situations becomes crucial. Everywhere you look, you will find misconfigured systems and windows exploits for every type of network. At the Black Hat Windows Security Briefings you will be placed right on the front lines. Exploits are discussed, reviewed, changed, and even discovered on site at the show. The misconfigured systems are reconfigured to be more secure. We provide an artillery of knowledge to protect yourself and increase your security.

When choosing speakers for the conference we find engineers and developers who are researching securtiy from the Windows standpoint. This means that our speakers will be releasing current "never before seen" tactics and tools for Windows compromise. We try to select the speakers that are doing unique research, writing the security tools, or finding the bugs. No vendor pitches. Just straight talk from people who are knowleedgable from both a practical and theoretical standpoint. The sessions are intense, informative and cutting edge.

Spanning two days with six separate tracks, this conference will explore in greater detail the technologies, tools, and techniques needed by system administrators and security experts to stay on the cutting edge.

Database  - As your business expands your backend database servers become a key piece of your infrastructure. Protecting these databases is essential. The speakers in this track focus on the protection and compromise of these database servers.

Deep Knowledge - The presentations in this track consume the most time because they contain the most complex technical details, are involved and have detailed demonstrations, or cover substantial issues that are quite complex.

General - The speakers in this track will be covering a variety of windows security issues.

MS Apps - The applications that your business relies on our covered in this track. IIS, ISA, and Exchange are just some of the examples of the material discussed.

Network - As your infrastructure grows, various security risks become apparent. From DNS poisoning to hacking Cisco routers, speakers in this track have researched security from the network perspective.

Tools of the Trade - Speakers in this track will be covering the use and application of various tools used for windows security practice. Sometimes being first to familiarize yourself with these tools can save your business.