Risk
2/13/2014
01:46 PM
Connect Directly
RSS
E-Mail
50%
50%

Internet Pioneer And ICANN Chairman Of The Board To Keynote Black Hat Asia 2014

Dr. Steve Crocker has been involved with the Internet since its inception

SAN FRANCISCO, CA -- February 13, 2014 – Today, Black Hat, the world's leading family of information security events, announced that Dr. Steve Crocker, Chairman of the Board, Internet Corporation of Assigned Names and Numbers (ICANN) and one of the Internet's pioneers will present the keynote address at Black Hat Asia 2014. Black Hat Asia will take place March 25-28, 2014 at the Marina Bay Sands in Singapore. For more information and to register, click here.

Dr. Crocker has been involved with the Internet since its inception. While a graduate student at UCLA, he was part of the team that developed the protocols for the Arpanet, laying the foundation for today's Internet. He also organized the Networking Group, which was the forerunner of the modern Internet Engineering Task Force (IETF). Adding to his distinguished list of accomplishments, Dr. Crocker is also the creator of the seminal Request for Comment (RFC) series of notes through which protocol designs are documented and shared. For his pioneering work and contribution to the creation and development of the Internet, Dr. Crocker was awarded the 2002 IEEE Internet Award and was inducted to the Internet Hall of Fame in 2012.

Today Dr. Crocker is the CEO and co-founder of Shinkuro, Inc., a startup company focused on the dynamic sharing of information across the Internet and on the deployment of improved security protocols. His vast experience includes research management at DARPA, USC/ISI and The Aerospace Corporation, Vice President of Trusted Information Systems, and co-founder of CyberCash, Inc. and Longitude Systems, Inc.

His prior public service includes serving as the first area director for security in the Internet Engineering Task Force (IETF), the Internet Architecture Board (IAB), the IETF Administrative Oversight Committee (IAOC) and service on the Board of the Internet Society.

Black Hat Asia will welcome Dr. Crocker to the stage on March 27, 2014. His keynote, "Let's Fix the Mess," will look at how the explosive growth since the development of the Arpanet 45 years ago has led to a myriad of security problems and Internet governance issues. Dr. Crocker will discuss not only the early history of the Internet including the creation of the Request for Comments (RFC) but also current activities such as DNSSEC and rPKI that hold great promise to improve the game.

"Dr. Crocker helped forge the way for what we now know as our modern Internet and has offered countless contributions to the research community and today's online infrastructure," explained Nicole Garbolino, Global Events Director, Black Hat. "We couldn't be more thrilled to have him join us for Black Hat Asia this year to share his experiences and lessons learned with our attendees."

For more information and to register before regular registration pricing ends March 21, please click here.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0607
Published: 2014-07-24
Unrestricted file upload vulnerability in Attachmate Verastream Process Designer (VPD) before R6 SP1 Hotfix 1 allows remote attackers to execute arbitrary code by uploading and launching an executable file.

CVE-2014-1419
Published: 2014-07-24
Race condition in the power policy functions in policy-funcs in acpi-support before 0.142 allows local users to gain privileges via unspecified vectors.

CVE-2014-2360
Published: 2014-07-24
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules allow remote attackers to execute arbitrary code via packets that report a high battery voltage.

CVE-2014-2361
Published: 2014-07-24
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules, when BreeZ is used, do not require authentication for reading the site security key, which allows physically proximate attackers to spoof communication by obtaining this key after use of direct hardware access or manual-setup mode.

CVE-2014-2362
Published: 2014-07-24
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules rely exclusively on a time value for entropy in key generation, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by predicting the time of project creation.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Sara Peters hosts a conversation on Botnets and those who fight them.