Difference between revisions of "Lecture 10"
From CyberSecurity
(No difference)
|
Revision as of 05:09, 3 November 2005
November 2: Defenses – Cyber and WMD
Mark Pustilnik, Security Development Lead, Secure Windows Initiative Attack Team, Microsoft, Getting Vulnerabilities Out of Software. Joshua Lackey, Security Software Developer, Microsoft, and ex-Senior Ethical Hacker, IBM Global Services, Ethical Hacking. Brian Lopez, LLNL: Identifying and Prioritizing Terrorism Risk. How do homeland security experts use Threat, Vulnerability, & Consequence (TVC) models to identify and protect society’s most critical assets?