Dailydave mailing list archives

Re: Morning hilarity


From: Brian Snow <briansnow () comcast net>
Date: Thu, 9 Feb 2012 23:48:53 +0000 (UTC)





Certainly in the early years of the RSA conference (and still a major focus in my view), was the INTENSE focus on 
networking and "cutting deals" in the halls and side-rooms. The advertized talks were an added benefit, but not the 
major benefit. 

  

Brian 


----- Forwarded Message -----




From: "Dave Aitel" <dave.aitel () gmail com> 
To: dailydave () lists immunityinc com 
Sent: Thursday, February 9, 2012 8:45:27 AM 
Subject: [Dailydave] Morning hilarity 


So I'm talking at RSA - which I've never been to. From what I can tell RSA is less about the talks than the furious 
"back to back" meetings people set up during the conference. I've never participated in said debauchery but I am adding 
some content to the talk, and I think I hint at it in the below MPEG-Layer-3 audio file. 

Podcast:  http://rsa.edgeboss.net/download/rsa/rsaconference/2012/us/podcasts/rsac_02-01-12-ht1-402-edit.mp3 




-dave 





Session Code:           HT1-402 

Session Title:          The Three Myths of Cyberwar 
Speaker:                Dave Aitel  Chief Technology Officer 
Immunity Inc 

Scheduled Date(s)/Time(s):              Friday, March 02 10:10 a.m. 
Room 102 
Session Length:                 50 minutes 
Session Abstract:               Many sources for cyber strategy, and the policies that affect those strategies, focus 
on three facets of the cyber domain: cyber attacks are asymmetric, cyber attacks are unattributable and cyber attacks 
are non-kinetic. This talk will explain why none of these facets are true. 
Prerequisite knowledge          Generally it helps if you have been keeping up with news in the cyber war area. This 
session will be using terms such as exploit, vulnerabilities and buffer overflow that should be familiar. 
Session learning objectives             

    • Understand what sort of metrics make sense with cyber war (aka, how does one truly think about cyber war without 
relying on gut feelings) 
    • Develop a framework to judge policy both at the high level and the corporate enterprise level, when it comes to 
facing well funded cyber war threats 





_______________________________________________ 
Dailydave mailing list 
Dailydave () lists immunityinc com 
http://lists.immunityinc.com/mailman/listinfo/dailydave 
_______________________________________________
Dailydave mailing list
Dailydave () lists immunityinc com
http://lists.immunityinc.com/mailman/listinfo/dailydave

Current thread: