Conference Program Friday February 16
Speaker: Brad C. Johnsson, Vice President of Consulting – SystemExperts Corporation
This session will be useful for anyone with any type of TCP/IP-based system.
Whether network-based host intrusions come from Internet, an Extranet, or an Intranet, they typically follow a common methodology: reconnaissance, vulnerability research and exploitation. This session will review a few of the tools and techniques hackers (determined intruders) use to perform these activities.
The session will focus primarily on tools that exploit many of the common TCP/IP based protocols (such as TCP, WWW, SSL, DNS and SNMP) which underlie virtually all of the Internet applications. This course will concentrate on examples drawn from public domain tools because these tools are wide-ly available and commonly used (and are available for you to use for free!).
Speaker: Assar Westerlund, SICS
Assar Westerlund is one of the main people behind Heimdal, the international Kerberos implementation.
This talk will include how the Kerberos system works, how it is used today in Solaris, Windows 2000, and other systems, how it compares and interacts with other security systems, and some on the future of Kerberos.
Speaker: Staffan Olsén, Trend Micro
Staffan Olsén is working as Sales Engineer in the Nordic Region at Trend Micro. Main responsibilities is supporting resellers and distributors with presale and design.
The content problem:
What areas do we need to protect and why?
Chairman: Eric Allman, Sendmail Inc
See Keynote page
Page maintaned by Jan