Difference between revisions of "Lecture 7"

From CyberSecurity
Jump to: navigation, search
 
Line 17: Line 17:
 
==Discussion==
 
==Discussion==
 
Participate in the [http://cubist.cs.washington.edu/CyberSecurity/index.php/Talk:Lecture_7 wiki-discussion].
 
Participate in the [http://cubist.cs.washington.edu/CyberSecurity/index.php/Talk:Lecture_7 wiki-discussion].
 
 
Readings:
 

Latest revision as of 01:38, 20 October 2005

Using information technology to attack – or to amplify attacks on – various elements of the nation’s critical infrastructure

Speakers

Ed Lazowska, UW: Assessing Cyber-Vulnerabilities: PITAC and Beyond Phil Venables, CISO, Goldman Sachs: The Resilient Enterprise: Convergence of Security, Compliance, Redundancy and Risky Kirk Bailey, ex-CISO, City of Seattle: Cyber-attacks and cyber-defense in the City of Seattle Ernie Hayden, CISO, Port of Seattle: Cyber-attacks and cyber-defense at the Port of Seattle

Readings

Discussion

Participate in the wiki-discussion.