Secure Coding mailing list archives
Re: More on Cyber War
From: Julie Ryan <jjchryan () gwu edu>
Date: Wed, 23 Jun 2010 09:36:03 -0400
Ben, You're right, and that's the whole point of the conference. You should consider coming next year. I think you'd be particularly interested in the discussions on the Laws of Armed Conflict. In the meantime, conference content is being discussed on linkedin, with a wonderful summary of the Legal and Policy track presentations by Eneken Tikk, in the group Cyber Security Forum Initiative (Law and Policy Division). Also, the conference materials should eventually be made available on the website at http://www.ccdcoe.org/conference2010/ Julie On Jun 22, 2010, at 4:20 PM, Benjamin Tomhave wrote:
On 6/22/10 4:00 PM, Haroon Meer wrote:Hi..Howdy!Would have considered it slightly off-list-topic, but the current thread seems to allow it in :>It's Gary's fault! (we can blame him since he's on vacation:)My slides from the 2010 Conference on Cyber Conflict are now online at [http://blog.thinkst.com/2010/06/conference-on-cyber-conflict-slides.html]An interesting presentation, consistent with others I've seen on the topic. The problem around the "cyberwar" (or "cyber conflict") stuff is definitional. We need to be extremely careful using the word "war" as it tends to have very specific connotations. You also get into issues about defining what is or isn't "critical infrastructure" and the degree of direct responsibility the government should own for responding to, or coordinating response to, a major incident. Putting it in context for this list, one extreme could say that everything considered "critical infrastructure" could be subject from direct government oversight, including requirements for appsec and secure coding, complete with DoD/comparable testing, C&A, etc. fwiw. -ben -- Benjamin Tomhave, MS, CISSP tomhave () secureconsulting net Blog: http://www.secureconsulting.net/ Twitter: http://twitter.com/falconsview LI: http://www.linkedin.com/in/btomhave [ Random Quote: ] "Confidence is contagious. So is lack of confidence." Vince Lombardi _______________________________________________ Secure Coding mailing list (SC-L) SC-L () securecoding org List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l List charter available at - http://www.securecoding.org/list/charter.php SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com) as a free, non-commercial service to the software security community. Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates _______________________________________________
_______________________________________________ Secure Coding mailing list (SC-L) SC-L () securecoding org List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l List charter available at - http://www.securecoding.org/list/charter.php SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com) as a free, non-commercial service to the software security community. Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates _______________________________________________
Current thread:
- Re: More on Cyber War Benjamin Tomhave (Jun 21)
- Re: More on Cyber War Haroon Meer (Jun 23)
- Re: More on Cyber War Benjamin Tomhave (Jun 23)
- Re: More on Cyber War Julie Ryan (Jun 23)
- Re: More on Cyber War Rob Floodeen (Jun 23)
- Re: More on Cyber War Benjamin Tomhave (Jun 23)
- Re: More on Cyber War Haroon Meer (Jun 23)