Funny.  He told me he needed someone to hold your hand through the  
event.

Something about you're "slow"...



On Nov 11, 2009, at 5:53 PM, "Jarred White" <[email protected]> wrote:

> I actually told Dayle you weren't interested. He agreed it would  
> probably be best for all if you weren't involved.
>
> Something about your odor...
>
> -----Original Message-----
> From: [email protected] [mailto:[email protected]]  
> On Behalf Of Brad Bendily
> Sent: Wednesday, November 11, 2009 2:51 PM
> To: [email protected]
> Subject: Re: [brlug-general] FW: TigerTrap.org
>
> I signed up.
> Should be fun.
>
> On Wed, Nov 11, 2009 at 2:37 PM, Dustin Puryear <[email protected] 
> > wrote:
>> Looks fun!
>>
>> -----Original Message-----
>> From: Dayle Alsbury [mailto:[email protected]]
>> Sent: Thursday, November 05, 2009 12:10 PM
>> To: Dustin Puryear; [email protected];
>> [email protected]
>> Subject: TigerTrap.org
>>
>> Dustin:
>> Please forward this information to any of your IT pros that may  
>> want to
>> participate in the upcoming Tiger Trap cybersecurity event.  I have
>> added Tome Frazier and Stacy Manning to this email.  If you need more
>> information or documents, we will be happy to help.  You can find
>> information on the rules, scenarios, schedules and sign up contacts  
>> at
>> http://www.tigertrap.org .
>>
>>
>> As a fellow IT Professional, I want to reach out to you and extend an
>> invitation to participate in the upcoming 2010 Tiger Trap  
>> cybersecurity
>> event.  This FREE cybersecurity learning exercise will be held in  
>> Baton
>> Rouge next spring.  It is an exciting and extremely valuable  
>> opportunity
>> to learn and train with cybersecurity professionals from across the
>> state.  Tiger Trap is annual Louisiana InfraGard sponsored 'Capture  
>> the
>> Flag' cybersecurity event designed as an information sharing and
>> hands-on learning opportunity for business, university, state & local
>> government, law enforcement and defense agencies.  Participants are
>> vetted by FBI and come from the information security field in such
>> specialties as cyberwarfare, systems & network management, computer
>> programming, intrusion & incident management, digital forensics,
>> penetration testing, IT auditing, & communications security, engage  
>> in a
>> real-world hack and defend exercise.
>>
>> How does it work?
>>
>> Each annual event simulates current cyber warfare and cybercrime
>> scenarios which threaten critical cyber assets, information &
>> infrastructure security.  The Attack (Red) teams seek to breach  
>> target
>> systems constructed by (White Team) subject matter experts in an  
>> effort
>> to hijack & control critical systems or steal sensitive information
>> while the defense (Blue) teams attempt to actively defend the  
>> network,
>> determine if breach(s) have occurred and counter-attack the Red Team.
>> The annual Tiger Trap learning exercises conclude with classroom
>> instruction by the White Team and round-table discussion on the
>> successful tools & techniques to use and pitfalls to avoid in real  
>> world
>> computing environments.
>>
>> The event is designed to foster networking with regional peers on the
>> latest tools, resources and techniques in Information Security.  We
>> bring together Technology Professionals from across the state to  
>> teach
>> them how to better protect their computer systems from cyber  
>> thieves &
>> organized crime.  For our 2010 event we have chosen the training  
>> theme
>> to involve a fictional brewery because of the unique mixture of
>> computing devices native to such an environment
>> (Windows/Unix/SCADA/etc).  The event will culminate with a half-day
>> training session, distribution of a Live CD toolbox, professional
>> networking and a keynote presentation by Billy Austin, CTO of SAINT
>> Corp.  SAINT and our other sponsors are contributing prizes and
>> resources, so we expect this event to be both fun and competitive.
>>
>> You can find information on the rules, scenarios, schedules and  
>> sign up
>> contacts at http://www.tigertrap.org .
>>
>> If you have any questions, please feel free to contact me at
>> 225-229-0925 or you can email us at [email protected].
>>
>> If someone on your team may be interested in participating, please
>> forward this message to them.
>>
>> Thank YOU!
>>
>>
>> Dayle Alsbury
>> Tiger Trap Planning Committee Secretary
>> http://www.tigertrap.org
>> [email protected]
>> [email protected]
>>
>>
>>
>> _______________________________________________
>> General mailing list
>> [email protected]
>> http://mail.brlug.net/mailman/listinfo/general_brlug.net
>>
>>
>
>
>
> -- 
> Have Mercy & Say Yeah
>
> _______________________________________________
> General mailing list
> [email protected]
> http://mail.brlug.net/mailman/listinfo/general_brlug.net
>
>
> --- 
> --- 
> --- 
> --- 
> --- 
> --- 
> --- 
> --- 
> --- 
> --- 
> --- 
> --------------------------------------------------------------------
> Pursuant to IRS Circular 230 and IRS regulations we inform you that  
> any federal tax advice
> contained in this communication is not intended or written to be  
> used, and cannot be used,
> for the purpose of avoiding penalties imposed under the Internal  
> Revenue Code.
>
> --- 
> --- 
> --- 
> --- 
> --- 
> --- 
> --- 
> --- 
> --- 
> --- 
> --- 
> --- 
> --- 
> --- 
> --- 
> ---------------------------------------------------------------------
> Postlethwaite & Netterville Implements New Email Encryption Software  
> to Further Protect Confidential Data
>
> Confidentiality is a hallmark of the accounting profession and it is  
> of the utmost importance to our client
> relationships.  At P&,, we are committed to keeping your data  
> confidential which is why we are implementing
> new email encryption software.  This software inspects all outbound  
> emails from our firm.  Emails that
> contain attachments will require you to enter a password to download  
> the file.  This ensures that your
> confidential data cannot be read by anyone other than the intended  
> recipient.
>
> Emails with attachments will include a link to a secure web server.   
> Click on the link to download the attachment.
> The first time you receive a secure email from the firm you will be  
> required to setup a password.  This will
> be your password to access future attachments.  For our clients and  
> others, there will be a small step to
> download the encrypted files; however, we believe the added  
> confidentiality benefits far outweigh the few
> seconds that are required to access the attachment.
>
> If you have questions regarding this new process or if you forget  
> your password, please contact Jessica Aymond,
> P&  Network Administrator, at 225.922.4600.
> === 
> === 
> === 
> === 
> === 
> === 
> === 
> === 
> === 
> === 
> === 
> ====================================================================
>
>
>
> _______________________________________________
> General mailing list
> [email protected]
> http://mail.brlug.net/mailman/listinfo/general_brlug.net

_______________________________________________
General mailing list
[email protected]
http://mail.brlug.net/mailman/listinfo/general_brlug.net

Reply via email to