Awhile back, I mentioned the Technology forum in NYC and they are seeking 
speakers. Of course there are some constraints to whom may sign up. A "sponsor" 
may serve on a panel but otherwise, the speakers need to be from end-customer 
enterprises and not from software vendors or consulting firms. If you know of 
folks that can speak on their successes, they should definetely be encouraged 
to participate. 
 
NOTE: There is strong demand for Secure Coding Practices...
 
-----Original Message-----
From: Victoria Adams-TechForum [mailto:[EMAIL PROTECTED]
Sent: Monday, April 02, 2007 5:10 PM
To: McGovern, James F (HTSC, IT)
Subject: Need Sec Forum speakers-let us know by Wed. if interested



TechForum members: Need speakers for panels-please let us know by Wednesday 
afternoon 
------------------------------------------------------------------------ 
Dear Members of Technology Managers Forum : 
Based on your votes, we've narrowed down the topics for the May 17th  
<http://www.techforum.com/sf2007_1/index.html> Security Forum and are now 
looking for TF member speakers for the panels, or your recommendations for a 
colleague at your company. Please take a look at the topics below and let us 
know which ones, if any, you would be willing and able to speak on. We would 
like to hear back from you by Wednesday afternoon if possible. Also, let us 
know if you have anyone to recommend from your firm. 
Here are the top ranked topics (we will distill the topics into 4 panels 
eventually). Please let us know which topics you would be able to speak 
on--your first and second choice. If you have been on a panel very recently, we 
definitely still want you to volunteer, but we may ask you to be backup for a 
panel since we also like to give new members a chance to participate. 
(One note: "Human Engineering: Is Information Security a Social Problem?" was 
the top-ranked topic, but we thought we'd address this question within the 
context of every panel).

1: Secure Coding Practices & Strategic Applications: Which Comes First? 
2:Enterprise Security and Individual Privacy: When Two Worlds Collide 
3: The Forensic Edge: Will Security Event Monitoring Pay for Itself? 
4: Risk Management: Is Information Security the Whole Sandwich? 
5:Encryption: For some of the data, all of the time
6: Friendly Fire: Protecting the Network from its Own Endpoints
7: Secure Voice & Video: Miles to Go Before We Sleep
8: Security Is as Security Does: Dealing with the Insider Threat 



*************************************************************************
This communication, including attachments, is
for the exclusive use of addressee and may contain proprietary,
confidential and/or privileged information.  If you are not the intended
recipient, any use, copying, disclosure, dissemination or distribution is
strictly prohibited.  If you are not the intended recipient, please notify
the sender immediately by return e-mail, delete this communication and
destroy all copies.
*************************************************************************

_______________________________________________
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
_______________________________________________

Reply via email to