I am forwarding the below WebCast if anyone is interested in attending.  I 
am not indorsing this webcast but I have attended previous ones and they do 
provide knowledgeable information.  One must register for the Webcast.

Regards,
George
Greenarrow1
InNetInvestigations-Forensics


----- Original Message ----- 
From: "Information Security magazine" 
<[EMAIL PROTECTED]>
To: "Information Security Magazine" 
<[EMAIL PROTECTED]>
Sent: Tuesday, September 28, 2004 7:16 AM
Subject: Join us for today's live webcast, "5 Hidden Tactics for Secure 
Programming"


> As a valued Information Security magazine subscriber, you're invited
> to join us for this month's exclusive live webcast "Five Hidden
> Tactics for Secure Programming" with one of our top contributing
> editors, James C. Foster, Deputy-Director of Global Security Solution
> Development for CSC.
>
> Attend and discover the five fundamental steps on how to
> cost-effectively and efficiently address the root cause of the
> biggest security exposures in uncompiled code: design flaws. Also,
> you get inside expertise on user input, improper calls, component
> integration, data exchange, the idea behind "borrowed code" and more.
>
> The webcast goes live today, September 28 at 12:00 p.m. EDT (1600
> GMT). Log in right here to join your fellow subscribers and
> SearchSecurity.com members for this complimentary webcast sponsored
> by Ounce Labs:
> http://searchSecurity.com/r/0,,33313,00.htm?track=NL-347&ad=493005
>
>
> More About Today's Webcast:
> Why is it so important to address the root cause of design flaws in
> uncompiled code? Statistics show that it's 6.5 times more expensive
> to fix a security problem in the implementation phase than in the
> design phase of a software rollout and 100 times more expensive in
> the maintenance phase. Attend and find out how to correct existing
> flaws and adopt proper techniques and management tasks to finally
> ensure secure coding practices.
>
> About Today's Webcast Expert:
> In addition to being a contributing editor to Information Security
> magazine, James C. Foster is the Deputy-Director of Global Security
> Solution Development for CSC. He was previously the Director of
> Research and Development at Foundstone, subsequent to working at
> Guardent (acquired by Verisign) and the Department of Defense. A
> published author, Foster has been seen in Hacking Exposed 4th
> Edition, Snort 2.0 and 2.1, Hacking the Code, Special Ops Security,
> and Intrusion Detection and Prevention.
>
>
>
>
> ____________________________________________________________________
>
> To unsubscribe from this newsletter, reply to this e-mail with REMOVE
> in the Subject line.
>
> Please note, unsubscribe requests may take up to 24 hours to process;
> you may receive additional mailings during that time. A confirmation
> e-mail will be sent when your request has been successfully
> processed.
>
> Contact us:
> TechTarget
> Member Services
> 117 Kendrick Street, Suite 800
> Needham, MA 02494
>
>
> 


Reply via email to