CYBER CRIME IS AT AN ALL TIME HIGH - Major Players Meeting in San Diego to Discuss as the Information Security Conference, ToorCon, Returns to San Diego September 24-26 at the Manchester Grand Hyatt

Share Article

Company Presidents, Experienced Hackers, and Inquisitive Computer Users Won't Want to Miss Learning the Latest in Computer Security.

The 6th annual Toorcon Information Security Conference is bringing something new to the table this year, its 'Deep Knowledge Seminar' (DKS) line-up, highlighting five of the best and brightest security insiders that will be delivering in-depth insight over a diverse set of key topics regarding today's security issues. Jon Callas, the CTO of PGP Corporation, has been selected as the keynote speaker, and his message is focused on the importance of 'Message Security'.

Starting the line-up is Jim Butterworth, an investigative forensic expert from Guidance Software, who will be providing insight to 'The Ultimate Network Defense'. This is a lesson in the pivotal role of profiling programs, protocols, ports, packets and payload in the detection, investigation and prevention of network intrusions.

SAIC offers Scott Kennedy, CCISP and Chief Security Engineer of the InfoSec division teaching the class on 'Mobile Cyber Warfare Training'. This is an informative lecture on how SAIC takes the approach of developing a portable training system enabling on-site training for your 'Cyber War Fighter' guarding your company network.

Secure Science Corporation introduces Tom St Denis, one of their resident cryptographers, who will be speaking on the intricate details of Cryptanalysis (e.g. how to break ciphers), the role it plays in research and design, and how customers can apply it in their security development of new technology.

The final Deep Knowledge presenter will be Dan Kaminsky, a Senior Security Specialist for Avaya's Enterprise Security Practice. Mr. Kaminsky is the inventor of ScanRand, the fastest available network scanner, and will show the applications of this scanner in network surveillance, as well as network forensics and deployment of this tool in a productive environment.

For more information or to register please visit the ToorCon website at .


To interview any of the 'Men of ToorCon', please contact:

Holly White at 760.630.4585 or by email at


--CyberCrime is at an all time high

  •     Hackers can listen to your voicemail and spoof caller id!

--The Black Ops of DNS

  • People can be using DNS servers on your company's network to store files
  • Hackers are getting free access at pay-per-use hotspots through DNS

--Honeynets for the Masses: The Honeynet Project's Honeywall

  • Security experts are catching hackers with network booby traps!

--Wireless Weapons of Mass Destruction for Windows

  • Hackers can attack your cell phones and bluetooth devices from 1 mile away.
  • Hackers can find your AP from anywhere in the world.

--Rage against the platform: PalmOS

  • Hackers can release a virus that can attack your PDA or cell phone.

--Advanced Google Hacking

  • Hackers are using Google to hack websites.

--Privacy Implications of Magstripes

  • Hackers can steal your private information from your magstripes.

--Wireless Location Services

  • Hackers can track your location if you carry any wireless devices

Please contact Holly White & Associates for Additional Topics or Specific Topic Requests


September 24th, 2004: Deep Knowledge Seminar $300.00 (includes inclusion in activities through the 26th)

September 25-26th, 2004: Toorcon Security Conference $75.00




Media Contact:

Holly White & Associates


# # #

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Holly White
Visit website