Awhile back, I mentioned the Technology forum in NYC and they are seeking speakers. Of course there are some constraints to whom may sign up. A "sponsor" may serve on a panel but otherwise, the speakers need to be from end-customer enterprises and not from software vendors or consulting firms. If you know of folks that can speak on their successes, they should definetely be encouraged to participate. NOTE: There is strong demand for Secure Coding Practices... -----Original Message----- From: Victoria Adams-TechForum [mailto:[EMAIL PROTECTED] Sent: Monday, April 02, 2007 5:10 PM To: McGovern, James F (HTSC, IT) Subject: Need Sec Forum speakers-let us know by Wed. if interested
TechForum members: Need speakers for panels-please let us know by Wednesday afternoon ------------------------------------------------------------------------ Dear Members of Technology Managers Forum : Based on your votes, we've narrowed down the topics for the May 17th <http://www.techforum.com/sf2007_1/index.html> Security Forum and are now looking for TF member speakers for the panels, or your recommendations for a colleague at your company. Please take a look at the topics below and let us know which ones, if any, you would be willing and able to speak on. We would like to hear back from you by Wednesday afternoon if possible. Also, let us know if you have anyone to recommend from your firm. Here are the top ranked topics (we will distill the topics into 4 panels eventually). Please let us know which topics you would be able to speak on--your first and second choice. If you have been on a panel very recently, we definitely still want you to volunteer, but we may ask you to be backup for a panel since we also like to give new members a chance to participate. (One note: "Human Engineering: Is Information Security a Social Problem?" was the top-ranked topic, but we thought we'd address this question within the context of every panel). 1: Secure Coding Practices & Strategic Applications: Which Comes First? 2:Enterprise Security and Individual Privacy: When Two Worlds Collide 3: The Forensic Edge: Will Security Event Monitoring Pay for Itself? 4: Risk Management: Is Information Security the Whole Sandwich? 5:Encryption: For some of the data, all of the time 6: Friendly Fire: Protecting the Network from its Own Endpoints 7: Secure Voice & Video: Miles to Go Before We Sleep 8: Security Is as Security Does: Dealing with the Insider Threat ************************************************************************* This communication, including attachments, is for the exclusive use of addressee and may contain proprietary, confidential and/or privileged information. If you are not the intended recipient, any use, copying, disclosure, dissemination or distribution is strictly prohibited. If you are not the intended recipient, please notify the sender immediately by return e-mail, delete this communication and destroy all copies. *************************************************************************
_______________________________________________ Secure Coding mailing list (SC-L) SC-L@securecoding.org List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l List charter available at - http://www.securecoding.org/list/charter.php SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com) as a free, non-commercial service to the software security community. _______________________________________________