The DC3 is a technology, technique, and information sharing conference specifically for the US Department of Defense and law enforcement officials (LEO). Few outside of that community are privileged to attend; even as a knowledgeable SME of a large contractor, I was lucky to have been able to go last year. The goal is to keep costs down so that our civil service employees can afford to attend, and the vendor-sponsored gimmicks are generally kept to a minimum. Last year's conference rated as a "pretty good," on my scale from "would rather have been auditing" to "first SANS experience." Others who attended and presented, like Taosecurity's Richard Bejtlich, also had some good things to say, after a well-justified rant about how poor Alan Paller's keynote was. Keynote speakers weren't so hot, and presentations ranged from thinly-veiled sales pitches that I walked out of, to incredible demonstrations by Dr. Memon (Fornet and Reassembly of Fragmented Files) and Kevin Mandia (Performing Malware Analysis). But the "good" made putting up with the "bad" worthwhile.
Our presentation is Wednesday morning, 1/24/2007. The lecture title is Advanced Attacks from the Front Line: How our Adversaries Threaten Mission Success (currently misspelled on the webpage). For a bit of insight, in case anyone reading this can attend, the abstract is as follows: