On Fri, Oct 24, 2014 at 11:36:37AM -0700, [email protected] wrote: > I am considering doing a talk on two factor authentication using hardware > tokens as a talk for PLUG. > > Are people interested in that? Should I gear this for Advanced Topics or a > regular meeting?
Advanced Topics, please. I am particularly interested in the thinking that goes into identifying and correcting weaknesses, even after the hardware is deployed. And the social engineering that must be done on management to convince them that by the time a vulnerability emerges in the wild, it can be way too late to protect the public. Or protect the corporation that sold the devices from bankrupting lawsuits. I am in the middle of such a problem right now. Keith -- Keith Lofstrom [email protected] _______________________________________________ PLUG mailing list [email protected] http://lists.pdxlinux.org/mailman/listinfo/plug
