Funny. He told me he needed someone to hold your hand through the event.
Something about you're "slow"... On Nov 11, 2009, at 5:53 PM, "Jarred White" <[email protected]> wrote: > I actually told Dayle you weren't interested. He agreed it would > probably be best for all if you weren't involved. > > Something about your odor... > > -----Original Message----- > From: [email protected] [mailto:[email protected]] > On Behalf Of Brad Bendily > Sent: Wednesday, November 11, 2009 2:51 PM > To: [email protected] > Subject: Re: [brlug-general] FW: TigerTrap.org > > I signed up. > Should be fun. > > On Wed, Nov 11, 2009 at 2:37 PM, Dustin Puryear <[email protected] > > wrote: >> Looks fun! >> >> -----Original Message----- >> From: Dayle Alsbury [mailto:[email protected]] >> Sent: Thursday, November 05, 2009 12:10 PM >> To: Dustin Puryear; [email protected]; >> [email protected] >> Subject: TigerTrap.org >> >> Dustin: >> Please forward this information to any of your IT pros that may >> want to >> participate in the upcoming Tiger Trap cybersecurity event. I have >> added Tome Frazier and Stacy Manning to this email. If you need more >> information or documents, we will be happy to help. You can find >> information on the rules, scenarios, schedules and sign up contacts >> at >> http://www.tigertrap.org . >> >> >> As a fellow IT Professional, I want to reach out to you and extend an >> invitation to participate in the upcoming 2010 Tiger Trap >> cybersecurity >> event. This FREE cybersecurity learning exercise will be held in >> Baton >> Rouge next spring. It is an exciting and extremely valuable >> opportunity >> to learn and train with cybersecurity professionals from across the >> state. Tiger Trap is annual Louisiana InfraGard sponsored 'Capture >> the >> Flag' cybersecurity event designed as an information sharing and >> hands-on learning opportunity for business, university, state & local >> government, law enforcement and defense agencies. Participants are >> vetted by FBI and come from the information security field in such >> specialties as cyberwarfare, systems & network management, computer >> programming, intrusion & incident management, digital forensics, >> penetration testing, IT auditing, & communications security, engage >> in a >> real-world hack and defend exercise. >> >> How does it work? >> >> Each annual event simulates current cyber warfare and cybercrime >> scenarios which threaten critical cyber assets, information & >> infrastructure security. The Attack (Red) teams seek to breach >> target >> systems constructed by (White Team) subject matter experts in an >> effort >> to hijack & control critical systems or steal sensitive information >> while the defense (Blue) teams attempt to actively defend the >> network, >> determine if breach(s) have occurred and counter-attack the Red Team. >> The annual Tiger Trap learning exercises conclude with classroom >> instruction by the White Team and round-table discussion on the >> successful tools & techniques to use and pitfalls to avoid in real >> world >> computing environments. >> >> The event is designed to foster networking with regional peers on the >> latest tools, resources and techniques in Information Security. We >> bring together Technology Professionals from across the state to >> teach >> them how to better protect their computer systems from cyber >> thieves & >> organized crime. For our 2010 event we have chosen the training >> theme >> to involve a fictional brewery because of the unique mixture of >> computing devices native to such an environment >> (Windows/Unix/SCADA/etc). The event will culminate with a half-day >> training session, distribution of a Live CD toolbox, professional >> networking and a keynote presentation by Billy Austin, CTO of SAINT >> Corp. SAINT and our other sponsors are contributing prizes and >> resources, so we expect this event to be both fun and competitive. >> >> You can find information on the rules, scenarios, schedules and >> sign up >> contacts at http://www.tigertrap.org . >> >> If you have any questions, please feel free to contact me at >> 225-229-0925 or you can email us at [email protected]. >> >> If someone on your team may be interested in participating, please >> forward this message to them. >> >> Thank YOU! >> >> >> Dayle Alsbury >> Tiger Trap Planning Committee Secretary >> http://www.tigertrap.org >> [email protected] >> [email protected] >> >> >> >> _______________________________________________ >> General mailing list >> [email protected] >> http://mail.brlug.net/mailman/listinfo/general_brlug.net >> >> > > > > -- > Have Mercy & Say Yeah > > _______________________________________________ > General mailing list > [email protected] > http://mail.brlug.net/mailman/listinfo/general_brlug.net > > > --- > --- > --- > --- > --- > --- > --- > --- > --- > --- > --- > -------------------------------------------------------------------- > Pursuant to IRS Circular 230 and IRS regulations we inform you that > any federal tax advice > contained in this communication is not intended or written to be > used, and cannot be used, > for the purpose of avoiding penalties imposed under the Internal > Revenue Code. > > --- > --- > --- > --- > --- > --- > --- > --- > --- > --- > --- > --- > --- > --- > --- > --------------------------------------------------------------------- > Postlethwaite & Netterville Implements New Email Encryption Software > to Further Protect Confidential Data > > Confidentiality is a hallmark of the accounting profession and it is > of the utmost importance to our client > relationships. At P&,, we are committed to keeping your data > confidential which is why we are implementing > new email encryption software. This software inspects all outbound > emails from our firm. Emails that > contain attachments will require you to enter a password to download > the file. This ensures that your > confidential data cannot be read by anyone other than the intended > recipient. > > Emails with attachments will include a link to a secure web server. > Click on the link to download the attachment. > The first time you receive a secure email from the firm you will be > required to setup a password. This will > be your password to access future attachments. For our clients and > others, there will be a small step to > download the encrypted files; however, we believe the added > confidentiality benefits far outweigh the few > seconds that are required to access the attachment. > > If you have questions regarding this new process or if you forget > your password, please contact Jessica Aymond, > P& Network Administrator, at 225.922.4600. > === > === > === > === > === > === > === > === > === > === > === > ==================================================================== > > > > _______________________________________________ > General mailing list > [email protected] > http://mail.brlug.net/mailman/listinfo/general_brlug.net _______________________________________________ General mailing list [email protected] http://mail.brlug.net/mailman/listinfo/general_brlug.net
