Hacker Halted Conference-2010

Hacker Halted Conference-2010
Hacker Halted USA is a complete and comprehensive information security conference, with information security experts from all around the world presenting intriguing topics and discussing global security threats, as well as world class trainers leading top notch security training classes @ Hacker Halted | Academy.
The objective of Hacker Halted is to raise the awareness towards increased education and ethics in information security.
The global series of Hacker Halted is owned by EC-Council, a leading information security certification body, and the creators of the world-renowned Certified Ethical Hacker program as well as other certification programs.
World Renowned IT Security Training | Hacker Halted Academy:

With leading courses like the [FONT="]Certified Ethical Hacker[/FONT], [FONT="]Computer Hacking Forensic Investigator,[/FONT] and the [FONT="]EC-Council Certified Security Analyst[/FONT], the [FONT="]Training and Hacker [/FONT]Briefing format is the best value for your training dollar this year. Pre [FONT="]Hacker[/FONT] Con Classes run 3 to 4 days, followed by 2 days of [FONT="]Hacker[/FONT] Halted Briefings from top security leaders around the globe.
[FONT="]Keynote Speakers[/FONT][FONT="]:[/FONT]
[FONT="]Joe Jarzombek[/FONT][FONT="],[/FONT][FONT="] [/FONT]Director for Software Assurance, National Cyber Security Division (NSCD), U.S. Department of Homeland Security. Joe leads government interagency public/private collaboration efforts with industry, academia, and standards organizations to shift the security paradigm away from patch management by addressing security needs in work force education and training, more comprehensive diagnostic capabilities, software security automation, and security-enhanced development and acquisition practices.
[FONT="] [/FONT]
[FONT="] [/FONT][FONT="]Christien Rioux[/FONT][FONT="],[/FONT] Co-Author L0phtCrack, Co-Founder/Chief Scientist, Veracode.[FONT="] [/FONT]Mr. Rioux founded @stake, a security consultancy, as well as L0pht Heavy Industries, a renowned security think tank. Mr. Rioux was a research scientist at @stake, where he was responsible for developing new software analysis techniques and for applying cutting edge research to solve difficult security problems. He also led and managed the development for a new enterprise security product in 2000 known as the SmartRisk Analyzer (SRA), a binary analysis tool and its patented algorithms, and has been responsible for its growth and development for the past five years.
[FONT="] [/FONT][FONT="][/FONT]
[FONT="]Jerry L. Davis, [/FONT]CISSP, Deputy CIO, IT Security, NASA. He is the Deputy Chief Information Officer (DCIO), IT Security for the National Aeronautics and Space Administration (NASA). In 2009, Jerry was voted the North America Information Security Executive of the Year and also in 2009 voted as one of the 50 most Important People in Information Technology. Jerry’s role is to provide risk management thought leadership and oversee all aspects of Information Security and privacy for the Agency to include the development and implementation of enterprise-wide IT security engineering and architecture, IT security governance and IT security operations capabilities. Jerry’s division generates IT and data security solutions and services to the Agency’s Space Operations, Science, Exploration Systems and Aeronautics Research Mission Directorates programs and projects, while proactively defending $1.66 billion in annual IT investments.
[FONT="] [/FONT][FONT="][/FONT]
[FONT="] [/FONT]
Hacker Halted Impressive list of speakers includes the likes of:
[FONT="] [/FONT]
· [FONT="]Jeff Bardin -[/FONT][FONT="]CSO/VP, IT Solutions.[/FONT][FONT="]
[/FONT]
· [FONT="]Angus Blitter[/FONT][FONT="] -[/FONT] PackerMaster, [FONT="]Meshco.[/FONT][FONT="]
[/FONT]
· Ganesh Devarajan[FONT="] -[/FONT]Senior Security Architect, [FONT="]Go Daddy.[/FONT][FONT="]
[/FONT]

· Lars Ewe[FONT="]- [/FONT]CTO and VP of Engineering,[FONT="] Cenzic.[/FONT][FONT="]
[/FONT]

· [FONT="]Doug Farre- [/FONT][FONT="]President, LockSport International.[/FONT][FONT="]
[/FONT]
· Scott Gerlach[FONT="] -[/FONT]IT Security Operations Manager, [FONT="]Go Daddy.[/FONT][FONT="] [/FONT]

· Barnaby Jack -Director of Security Research, [FONT="]IOActive[/FONT][FONT="].[/FONT]
[FONT="] [/FONT]· Michael Malin-[FONT="] [/FONT]EVP/CFO, [FONT="]Mandiant.[/FONT][FONT="] [/FONT]

· Gunter Ollmann[FONT="] -[/FONT]VP of Research, [FONT="]Damballa.[/FONT][FONT="]
[/FONT]

· Brad Smith[FONT="] -[/FONT]Director- [FONT="]Computer Institute of the Rockies.[/FONT][FONT="]
[/FONT]

· Richard Stiennon[FONT="] -[/FONT]Chief Research Analyst, [FONT="]IT Harvest.[/FONT][FONT="]
[/FONT]

· Fabian Rothschild | Peter Greko[FONT="]-[/FONT] Lead Malware Researcher | Security Researcher, [FONT="]HackMiami[/FONT][FONT="].[/FONT]

[FONT="]
[/FONT]

Replies

  • ms_cs
    ms_cs
    whether the conference videos will be made available>?

You are reading an archived discussion.

Related Posts

Summer training on VLSI design and fabrication: [FONT="] Organized by AIT, Govt. of NCT Delhi, GGSIP University in collaboration with "SYNOPSYS"[/FONT][FONT="][/FONT]​ Venue-Ambedkar Institute of Technology,Govt of NCT Delhi. Geeta colony,...
hello! i would appreciate the efforts in resolving my query: "Is non-existence is equal to vacuum?"
Hi, I want to know how to configure active directory user isolation of FTP in windows server 2008.
Looks like Yahoo's following Google which is stealing Bing's ideas. Well, not exactly; but Yahoo mail has finally sporting a new login page that's colorful! See what I got today...
If you want to use Google;s Hacker Search Page , just hover the link.. Google