Lecture 10
From CyberSecurity
Defenses – Cyber and WMD
Speakers
- Mark Pustilnik, Security Development Lead, Secure Windows Initiative Attack Team, Microsoft, Getting Vulnerabilities Out of Software.
- Joshua Lackey, Security Software Developer, Microsoft, and ex-Senior Ethical Hacker, IBM Global Services, Ethical Hacking.
- Brian Lopez, LLNL: Identifying and Prioritizing Terrorism Risk. How do homeland security experts use Threat, Vulnerability, & Consequence (TVC) models to identify and protect society’s most critical assets?
Discussion
Participate in the wiki-discussion.