PROGRAMM
VERANSTALTUNGSORT
NEWS / PRESSE
HACKING TRAINING
ANMELDUNG
KONTAKT/IMPRESSUM
AGENDA
VORTRÄGE
REFERENTEN
SPECIALS
IT-DEFENSE
 
     
 
VORTRÄGE – IT-DEFENSE 2004
 

Die bekannten Security-Profis werden an zwei Kongresstagen die aktuellen Probleme der IT-Sicherheit diskutieren und Einblick in Strategien und Sicherheitskonzepte geben.

Following the Money or Why Security Has so Little to Do With Security
Bruce Schneier
The strangest thing about security is how little it has to do with security. Why did firewalls succeed in the marketplace when e-mail encryption failed? Why don't companies regularly install patches? Why is software of such poor quality? The reasons have little to do with security, and everything to do with the incentives of the players involved. Economics, politics, laws, even social constraints matter much more than security concerns. This talk attempts to peel back the security talk and explain what really goes on when someone makes a security decision. The results might surprise you.

Spies, Lies and Audiotape
James Bamford
The United States and Britain are engaged in a war based largely on phony intelligence. How could this happen? Where were the checks and balances? What was real and what was not? How much was the intelligence politicized? As the United States fights its war on terrorism and looks to other possible conflicts, such as in Iran and North Korea, it is critical that intelligence not be misused and manipulated. But is this possible with a White House determined to go to war?

Protecting Databases
Aaron Newman
This presentation addresses some of the most overlooked topics on database security and presents a view of the database from a hacker's perspective. It also focuses on generic attacks as well as those specific to Oracle, Microsoft SQL Server, Sybase, and DB2. We will be performing some live attacks and discussing how to prevent this from happening to you.

Honeypots: The Latest Advances
Lance Spitzner
Over the past several years, honeypots have demonstrated their tremendous potential as a new security technology. Not only do they have dramatic detection capabilities, but can also be used for information gathering, incident response, and targeting the insider threat. Lance Spitzner will cover in this presentation the latest developments in honeypots, and what to expect in the next 6 to 12 months.

Real-time Network Awareness
Martin Rösch
One of the inherent issues with traditional intrusion detection systems is that a fundamental lack of information leads to a great deal of
ambiguity sensors operate with virtually no knowledge of the composition of the network components that they are defending. Mr. Roesch will discuss the truth about implementing an intrusion detection system and what problems usually occur, like evasion, insertion & denial of service. He will illustrate his concept of the “contextual vacuum” and how current systems are flawed. Solutions are then offered by defining the parameters for improving IDS with full understand of the network and that results in higher quality data.

Advanced Network Reconnaissance Techniques
Fyodor
Fyodor will present real-life examples of common network and firewall configurations, then demonstrate practical techniques for exploring and mapping those networks. He will cover IDS evasion, „phantom ports“, advanced ping sweeps, service/version detection, firewall circumvention, DNS hackery, IPv6, and more using his free Nmap scanner and many other Open Source tools.

Trusted Computing - Gefahr für IT-Sicherheit und freien Wettbewerb?
Rüdiger Weis
Microsoft und die „Trusted Computing Group“ planen mit einem Aufwand von mehreren hundert Millionen Euro die grundlegenste Änderung der IT Infrastruktur seit der Einführung des Personal Computers. Eine wissenschaftliche Analyse der vorliegenden Vorschläge zeigt zwar insbesondere keine signifikante Erhöhung der Sicherheit gegen die allgegewärtigen Wurm- und Vieren-Epidemien, jedoch eine Reihe von neuen Bedohungsszenarien. Zudem bestehen bei europäischen Regierungen und Industrievertretern nicht von der Hand zu weisende Befürchtungen, dass die Kontrolle von kryptographischen Schlüsseln durch US Firmen und die höchst unuebersichtliche Patentlage, zu erheblichen Wettbewerbsnachteilen insbesondere für kleine und mittlere Unternehmen führen könnten.

Wie entsteht Sicherheit in der Wirtschaft?
Dr. Rudolf Kreutzer
Was versteht man unter Sicherheit in einem Unternehmen?
Wie macht man „normale“ Sicherheit in einem Unternehmen?
Wie entsteht Sicherheit in einem Rechenzentrum?
Wann, wo und wie kann keine Sicherheit entstehen?
Woran scheitern Unternehmen wirklich?
Was macht Unternehmen erfolgreich?
Woran kann man kommende Misserfolge erkennen?
Wie kann man Misserfolge verhindern?
Welche neuen Schwerpunkte entwickeln sich im Risikomanagement?
Was sind die entscheidenden Schlüsselkompetenzen für den Risikomanager der Zukunft?

Lawful Interception of IP: The European Context
Jaya Baloo
Lawful Interception (LI) is currently in development internationally and the area of IP interception poses significant regulatory, as well as implementation, challenges. The presentation attempts to elucidate major legal and technical issues as well as citing the vendors, operators and governments involved in creating the standards and solutions.

In the European context, all EU countries have been mandated to have LI capabilities in place and be able to provide assistance to other member states when tracking transborder criminals. Public Communications Providers must tread warily between privacy concerns and LI requirements. Especially with the new talks concerning Interpol, Enfopol, & Data Retention, communication over public channels is anything but private. The conditions for interception and the framework for oversight are not widely known.

As LI in Europe presents an example for the rest of the world attention should be given to the changing face of EU legislation. This is relevant not only to the EU expansion but also concerns EU influence over her eastern and western allies.

Aktuelle Trends und neue Technologien der IT-Sicherheit
Stefan Strobel
Stefan Strobel wird die neuesten Technologien, die auf dem IT-Security-Markt erhältlich sind, vorstellen. Neue Möglichkeiten im Bereich der IT-Sicherheit werden ebenso ein Thema sein, wie überholte Ansichten und Meinungen.

Alert, Warning und Response
Volker Kozok
Aufgrund der veränderten Bedrohungslage wächst die Notwendigkeit der nationalen und internationalen Zusammenarbeit im Bereich der Abwehr von Angriffen auf kritische Informationsinfrastrukturen. Dabei sind in zukünftigen Auseinandersetzungen nicht mehr nur militärische Ziele bedroht, sondern zunehmend auch Infrastrukturen in Ministerien, Behörden, staatlichen Organisationen und im zivilen Bereich.
Der Vortrag zeigt die Notwendigkeit nationaler und internationaler Kooperation bei der Abwehr und Analyse von Angriffen, bei der Planung und Koordination des Incident Mangements und der Fortsetzung der Diskussion über kritische Infrastukturen.
Der Schluß fasst die zentralen Herausforderungen zusammen und zeigt deutlich die Notwendigkeit eines einheitlichen zivil-militärischen Alarmierungssystems bei netzbasierten Angriffen auf.

The Relationships between Hackers and Spammers
John Draper
The talk will focus on the relationships between hackers and spammers and how the two technology's are merging together to bring new and troubling future threats to the internet.
The speaker will also be providing some interesting trends on how spam is spread, how it correlates with the release of viruses in the wild and how these viruses are now so flexible they can pass any payload to un-suspecting systems without leaving a trace, setting up spam proxies and other hacker friendly trojans.

 

nach oben