Who are the real Black Hats?

Presented at Black Hat USA 1997, Unknown date/time (Unknown duration)

When people hear about computer hacking and industrial espionage they think of those evil genius computer hackers and slick James Bond types.  They think that even if they were a target of these people, there is nothing people can do to stop them.  Nothing is further from the truth.  The real Black Hats are far from smart and slick. 

This presentation tells you who you really have to worry about, and most importantly how you would stop and catch them.  While a fair portion of this talk focuses on the biggest threats, which include simple errors and your own employees, the threats from competitors (both foreign and domestic), foreign countries, and yes those dreaded computer hackers are discussed in detail to put the true threats companies face in perspective.


Presenters:

  • Ira Winkler
    Mr. Winkler, CISSP, is the Director of Technology for the National Computer Security Association.  In his position he provides technical support to vendor and user consortia.  He  also consults to some of the largest companies in the world, helping them to define their security programs.  He has also investigated multi-million dollar computer crimes.  He is considered to be a World Leader in the fields of information warfare, industrial espionage, penetration testing and incident response.  Mr. Winkler sits on several national advisory panels involved with the critical infrastructure protection.  He is also on the faculties of the Johns Hopkins University and the University of Maryland.  He is author of the book, Corporate Espionage, and is in the process of writing a book on incident response for O'Reilley & Associates. Mr. Winkler has appeared on Good Morning America, CNN, C|Net, and Building America.  He has also been on the Derek McGinty Show, and various radio shows throughout the country.  Mr. Winkler has been used as an expert on information related crimes, information warfare, and industrial espionage, and information security in general.

Similar Presentations: