Difference between revisions of "Lecture 10"
From CyberSecurity
Line 1: | Line 1: | ||
− | + | '''Defenses – Cyber and WMD''' | |
− | Mark Pustilnik, Security Development Lead, Secure Windows Initiative Attack Team, Microsoft, Getting Vulnerabilities Out of Software. | + | ==Speakers== |
− | Joshua Lackey, Security Software Developer, Microsoft, and ex-Senior Ethical Hacker, IBM Global Services, Ethical Hacking. | + | * Mark Pustilnik, Security Development Lead, Secure Windows Initiative Attack Team, Microsoft, Getting Vulnerabilities Out of Software. |
− | Brian Lopez, LLNL: Identifying and Prioritizing Terrorism Risk. How do homeland security experts use Threat, Vulnerability, & Consequence (TVC) models to identify and protect society’s most critical assets? | + | * Joshua Lackey, Security Software Developer, Microsoft, and ex-Senior Ethical Hacker, IBM Global Services, Ethical Hacking. |
+ | * Brian Lopez, LLNL: Identifying and Prioritizing Terrorism Risk. How do homeland security experts use Threat, Vulnerability, & Consequence (TVC) models to identify and protect society’s most critical assets? | ||
+ | |||
+ | ==Discussion== | ||
+ | Participate in the [http://cubist.cs.washington.edu/CyberSecurity/index.php/Talk:Lecture_10 wiki-discussion]. |
Latest revision as of 05:10, 3 November 2005
Defenses – Cyber and WMD
Speakers
- Mark Pustilnik, Security Development Lead, Secure Windows Initiative Attack Team, Microsoft, Getting Vulnerabilities Out of Software.
- Joshua Lackey, Security Software Developer, Microsoft, and ex-Senior Ethical Hacker, IBM Global Services, Ethical Hacking.
- Brian Lopez, LLNL: Identifying and Prioritizing Terrorism Risk. How do homeland security experts use Threat, Vulnerability, & Consequence (TVC) models to identify and protect society’s most critical assets?
Discussion
Participate in the wiki-discussion.