I am forwarding the below WebCast if anyone is interested in attending. I am not indorsing this webcast but I have attended previous ones and they do provide knowledgeable information. One must register for the Webcast.
Regards, George Greenarrow1 InNetInvestigations-Forensics ----- Original Message ----- From: "Information Security magazine" <[EMAIL PROTECTED]> To: "Information Security Magazine" <[EMAIL PROTECTED]> Sent: Tuesday, September 28, 2004 7:16 AM Subject: Join us for today's live webcast, "5 Hidden Tactics for Secure Programming" > As a valued Information Security magazine subscriber, you're invited > to join us for this month's exclusive live webcast "Five Hidden > Tactics for Secure Programming" with one of our top contributing > editors, James C. Foster, Deputy-Director of Global Security Solution > Development for CSC. > > Attend and discover the five fundamental steps on how to > cost-effectively and efficiently address the root cause of the > biggest security exposures in uncompiled code: design flaws. Also, > you get inside expertise on user input, improper calls, component > integration, data exchange, the idea behind "borrowed code" and more. > > The webcast goes live today, September 28 at 12:00 p.m. EDT (1600 > GMT). Log in right here to join your fellow subscribers and > SearchSecurity.com members for this complimentary webcast sponsored > by Ounce Labs: > http://searchSecurity.com/r/0,,33313,00.htm?track=NL-347&ad=493005 > > > More About Today's Webcast: > Why is it so important to address the root cause of design flaws in > uncompiled code? Statistics show that it's 6.5 times more expensive > to fix a security problem in the implementation phase than in the > design phase of a software rollout and 100 times more expensive in > the maintenance phase. Attend and find out how to correct existing > flaws and adopt proper techniques and management tasks to finally > ensure secure coding practices. > > About Today's Webcast Expert: > In addition to being a contributing editor to Information Security > magazine, James C. Foster is the Deputy-Director of Global Security > Solution Development for CSC. He was previously the Director of > Research and Development at Foundstone, subsequent to working at > Guardent (acquired by Verisign) and the Department of Defense. A > published author, Foster has been seen in Hacking Exposed 4th > Edition, Snort 2.0 and 2.1, Hacking the Code, Special Ops Security, > and Intrusion Detection and Prevention. > > > > > ____________________________________________________________________ > > To unsubscribe from this newsletter, reply to this e-mail with REMOVE > in the Subject line. > > Please note, unsubscribe requests may take up to 24 hours to process; > you may receive additional mailings during that time. A confirmation > e-mail will be sent when your request has been successfully > processed. > > Contact us: > TechTarget > Member Services > 117 Kendrick Street, Suite 800 > Needham, MA 02494 > > >