Lecture 10

From CyberSecurity
Jump to: navigation, search

Defenses – Cyber and WMD

Speakers

  • Mark Pustilnik, Security Development Lead, Secure Windows Initiative Attack Team, Microsoft, Getting Vulnerabilities Out of Software.
  • Joshua Lackey, Security Software Developer, Microsoft, and ex-Senior Ethical Hacker, IBM Global Services, Ethical Hacking.
  • Brian Lopez, LLNL: Identifying and Prioritizing Terrorism Risk. How do homeland security experts use Threat, Vulnerability, & Consequence (TVC) models to identify and protect society’s most critical assets?

Discussion

Participate in the wiki-discussion.