San Diego, CA (PRWEB) August 31, 2004
The 6th annual Toorcon Information Security Conference is bringing something new to the table this year, its 'Deep Knowledge Seminar' (DKS) line-up, highlighting five of the best and brightest security insiders that will be delivering in-depth insight over a diverse set of key topics regarding today's security issues. Jon Callas, the CTO of PGP Corporation, has been selected as the keynote speaker, and his message is focused on the importance of 'Message Security'.
Starting the line-up is Jim Butterworth, an investigative forensic expert from Guidance Software, who will be providing insight to 'The Ultimate Network Defense'. This is a lesson in the pivotal role of profiling programs, protocols, ports, packets and payload in the detection, investigation and prevention of network intrusions.
SAIC offers Scott Kennedy, CCISP and Chief Security Engineer of the InfoSec division teaching the class on 'Mobile Cyber Warfare Training'. This is an informative lecture on how SAIC takes the approach of developing a portable training system enabling on-site training for your 'Cyber War Fighter' guarding your company network.
Secure Science Corporation introduces Tom St Denis, one of their resident cryptographers, who will be speaking on the intricate details of Cryptanalysis (e.g. how to break ciphers), the role it plays in research and design, and how customers can apply it in their security development of new technology.
The final Deep Knowledge presenter will be Dan Kaminsky, a Senior Security Specialist for Avaya's Enterprise Security Practice. Mr. Kaminsky is the inventor of ScanRand, the fastest available network scanner, and will show the applications of this scanner in network surveillance, as well as network forensics and deployment of this tool in a productive environment.
For more information or to register please visit the ToorCon website at http://www.ToorCon.org .
To interview any of the 'Men of ToorCon', please contact:
Holly White at 760.630.4585 or by email at email@example.com
INTERVIEW TOPICS INCLUDING BUT NOT LIMITED TO:
--CyberCrime is at an all time high
- Hackers can listen to your voicemail and spoof caller id!
--The Black Ops of DNS
- People can be using DNS servers on your company's network to store files
- Hackers are getting free access at pay-per-use hotspots through DNS
--Honeynets for the Masses: The Honeynet Project's Honeywall
- Security experts are catching hackers with network booby traps!
--Wireless Weapons of Mass Destruction for Windows
- Hackers can attack your cell phones and bluetooth devices from 1 mile away.
- Hackers can find your AP from anywhere in the world.
--Rage against the platform: PalmOS
- Hackers can release a virus that can attack your PDA or cell phone.
--Advanced Google Hacking
- Hackers are using Google to hack websites.
--Privacy Implications of Magstripes
- Hackers can steal your private information from your magstripes.
--Wireless Location Services
- Hackers can track your location if you carry any wireless devices
Please contact Holly White & Associates for Additional Topics or Specific Topic Requests
September 24th, 2004: Deep Knowledge Seminar $300.00 (includes inclusion in activities through the 26th)
September 25-26th, 2004: Toorcon Security Conference $75.00
TOORCON 2004 CONTACT:
PRESS RELEASE FROM TOORCON 2003
Holly White & Associates
# # #