> I thought it was about ROSI all over again? Having been to and spoken at > several CISO conferences, I stayed away from this book up to now. >
Actually, Andy hits that in the preface "Mercifully, the ROI fad has gone the way of the Macarena" Instead the book (and conference) are about - how to measure security, how to analyze the data, and how to tell a story -gp >> http://www.amazon.com/Security-Metrics-Replacing-Uncertainty-Doubt/dp/032134 >> 9989 >> >> I am halfway through and it is excellent so far, will post a review soon. >> Not sure how the security industry as we know it will get by without fud. > > Pretty good! Thank you very much. The problem of teaching security > practitioners on how to "speak" without FUD, even if they don't see it as > FUD, is just as great. > > Gadi. > >> >> -gp >> >> On 4/24/07 7:32 PM, "Gary McGraw" <[EMAIL PROTECTED]> wrote: >> >>> Plus, check out Andrew Jaquith's excellent book: >>> >>> -----Original Message----- >>> From: Gunnar Peterson [mailto:[EMAIL PROTECTED] >>> Sent: Tue Apr 24 20:14:53 2007 >>> To: Secure Mailing List >>> Subject: [SC-L] MetriCon 2.0 CFP >>> >>> Last year's conference, MetriCon 1.0 featured a software security metrics >>> track ( http://securitymetrics.org/content/Wiki.jsp?page=Metricon1.0), >>> including: >>> >>> * A Metric for Evaluating Static Analysis Tools - Chess & Tsipenyuk, Fortify >>> * An Attack Surface Metric - Manadhata & Wing, Carnegie-Mellon >>> * "Good enough" Metrics - Epstein, WebMethods >>> * Software Security Patterns and Risk - Heyman & Huygens, U of Leuven >>> * Code Metrics - Chandra, Secure Software >>> >>> -gp >>> >>> Second Workshop on Security Metrics (MetriCon 2.0) < Call for Papers >>> MetriCon 2.0 CFP >>> >>> August 7, 2007 Boston, MA >>> >>> Overview >>> >>> Do you cringe at the subjectivity applied to security in every manner? If >>> so, MetriCon 2.0 may be your antidote to change security from an artistic >>> "matter of opinion" into an objective, quantifiable science. The time for >>> adjectives and adverbs has gone; the time for hard facts and data has come. >>> >>> MetriCon 2.0 is intended as a forum for lively, practical discussion in the >>> area of security metrics. It is a forum for quantifiable approaches and >>> results to problems afflicting information security today, with a bias >>> towards practical, specific implementations. Topics and presentations will >>> be selected for their potential to stimulate discussion in the Workshop. >>> >>> MetriCon 2.0 will be a one-day event, Tuesday, August 7, 2007, co-located >>> with the 16th USENIX Security Symposium in Boston, MA, USA >>> (http://www.usenix.org/events/sec07/). Beginning first thing in the morning, >>> with meals taken in the meeting room, and extending into the evening. >>> Attendance will be by invitation and limited to 60 participants. All >>> participants will be expected to "come with findings" and be willing to >>> address the group in some fashion, formally or not. Preference given to the >>> authors of position papers/presentations who have actual work in progress. >>> >>> Each presenter will have 10-15 minutes to present his or her idea, followed >>> by 15-20 minutes of discussion with the workshop participants. Panels and >>> groups of related presentations may be proposed to present different >>> approaches to selected topics, and will be steered by what sorts of >>> proposals come in response to this Call. >>> >>> >>> Goals and Topics >>> >>> The goal of the workshop is to stimulate discussion of and thinking about >>> security metrics and to do so in ways that lead to realistic, early results >>> of lasting value. Potential attendees are invited to submit position papers >>> to be shared with all. Such position papers are expected to address security >>> metrics in one of the following categories: >>> >>> Benchmarking >>> Empirical Studies >>> Metrics Definitions >>> Financial Planning >>> Security/Risk Modeling >>> Tools, Technologies, Tips, and Tricks >>> Visualization >>> Practical implementations, real world case studies, and detailed models will >>> be preferred over broader models or general ideas. >>> >>> How to Participate >>> >>> Submit a short position paper or description of work done/ongoing. Your >>> submission must be no longer than five(5) paragraphs or presentation slides. >>> Author names and affiliations should appear first in/on the submission. >>> Submissions may be in PDF, PowerPoint, HTML, or plaintext email and must be >>> submitted to MetriCon AT securitymetrics.org. >>> >>> Presenters will be notified of acceptance by June 22, 2007 and expected to >>> provide materials for distribution by July 22, 2007. All slides and position >>> papers will be made available to participants at the workshop. No formal >>> proceedings are intended. Plagiarism constitutes dishonesty. The organizers >>> of this Workshop as well as USENIX prohibit these practices and will take >>> appropriate action if dishonesty of this sort is found. Submission of >>> recent, previously published work as well as simultaneous submissions to >>> multiple venues is acceptable but please so indicate in your proposal. >>> >>> Location >>> >>> MetriCon 2.0 will be co-located with the 16th USENIX Security Symposium >>> (Security ยน07). (http://www.usenix.org/events/sec07/) >>> Cost >>> >>> $200 all-inclusive of meeting space, materials preparation, and meals for >>> the day. >>> Important Dates >>> >>> Requests to participate: by May 11, 2007 >>> Notification of acceptance: by June 22, 2007 >>> Materials for distribution: by July 22, 2007 >>> Workshop Organizers >>> >>> Fred Cohen, Fred Cohen & Associates >>> Jeremy Epstein, webMethods >>> Dan Geer, Geer Risk Services >>> Andrew Jaquith, Yankee Group >>> Elizabeth Nichols, ClearPoint Metrics, Co-Chair >>> Gunnar Peterson, Arctec Group, Co-Chair >>> Russell Cameron Thomas, Meritology >>> >>> >>> >>> _______________________________________________ >>> Secure Coding mailing list (SC-L) SC-L@securecoding.org >>> List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l >>> List charter available at - http://www.securecoding.org/list/charter.php >>> SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com) >>> as a free, non-commercial service to the software security community. >>> _______________________________________________ >>> >>> >> >> -- >> Gunnar Peterson, Managing Principal, Arctec Group >> http://www.arctecgroup.net >> >> SOA, Web Services and XML Security & Web Application Security Training >> >> Schedule of Public Classes >> May 7 Washington/Baltimore (WSSC Conference) >> May 15 Milan (OWASP App Sec Conference) >> July 17-19 Washington/Baltimore >> >> Details and registration info on Arctec Group and Aspect Security classes >> http://www.aspectsecurity.com/public_training.htm >> >> Blog: http://1raindrop.typepad.com >> >> >> >> _______________________________________________ >> Secure Coding mailing list (SC-L) SC-L@securecoding.org >> List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l >> List charter available at - http://www.securecoding.org/list/charter.php >> SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com) >> as a free, non-commercial service to the software security community. >> _______________________________________________ >> > -- Gunnar Peterson, Managing Principal, Arctec Group http://www.arctecgroup.net SOA, Web Services and XML Security & Web Application Security Training Schedule of Public Classes May 7 Washington/Baltimore (WSSC Conference) May 15 Milan (OWASP App Sec Conference) July 17-19 Washington/Baltimore Details and registration info on Arctec Group and Aspect Security classes http://www.aspectsecurity.com/public_training.htm Blog: http://1raindrop.typepad.com _______________________________________________ Secure Coding mailing list (SC-L) SC-L@securecoding.org List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l List charter available at - http://www.securecoding.org/list/charter.php SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com) as a free, non-commercial service to the software security community. _______________________________________________