Difference between revisions of "Lecture 10"

From CyberSecurity
Jump to: navigation, search
 
 
Line 1: Line 1:
November 2:  Defenses – Cyber and WMD
+
'''Defenses – Cyber and WMD'''
  
Mark Pustilnik, Security Development Lead, Secure Windows Initiative Attack Team, Microsoft, Getting Vulnerabilities Out of Software.
+
==Speakers==
Joshua Lackey, Security Software Developer, Microsoft, and ex-Senior Ethical Hacker, IBM Global Services, Ethical Hacking.
+
* Mark Pustilnik, Security Development Lead, Secure Windows Initiative Attack Team, Microsoft, Getting Vulnerabilities Out of Software.
Brian Lopez, LLNL:  Identifying and Prioritizing Terrorism Risk.  How do homeland security experts use Threat, Vulnerability, & Consequence (TVC) models to identify and protect society’s most critical assets?
+
* Joshua Lackey, Security Software Developer, Microsoft, and ex-Senior Ethical Hacker, IBM Global Services, Ethical Hacking.
 +
* Brian Lopez, LLNL:  Identifying and Prioritizing Terrorism Risk.  How do homeland security experts use Threat, Vulnerability, & Consequence (TVC) models to identify and protect society’s most critical assets?
 +
 
 +
==Discussion==
 +
Participate in the [http://cubist.cs.washington.edu/CyberSecurity/index.php/Talk:Lecture_10 wiki-discussion].

Latest revision as of 05:10, 3 November 2005

Defenses – Cyber and WMD

Speakers

  • Mark Pustilnik, Security Development Lead, Secure Windows Initiative Attack Team, Microsoft, Getting Vulnerabilities Out of Software.
  • Joshua Lackey, Security Software Developer, Microsoft, and ex-Senior Ethical Hacker, IBM Global Services, Ethical Hacking.
  • Brian Lopez, LLNL: Identifying and Prioritizing Terrorism Risk. How do homeland security experts use Threat, Vulnerability, & Consequence (TVC) models to identify and protect society’s most critical assets?

Discussion

Participate in the wiki-discussion.