Secure Coding mailing list archives

Fw: Join us for today's live webcast, "5 Hidden Tactics for Secure Programming"


From: "Greenarrow 1" <Greenarrow1 () msn com>
Date: Wed, 29 Sep 2004 14:23:52 +0100

I am forwarding the below WebCast if anyone is interested in attending.  I 
am not indorsing this webcast but I have attended previous ones and they do 
provide knowledgeable information.  One must register for the Webcast.

Regards,
George
Greenarrow1
InNetInvestigations-Forensics


----- Original Message ----- 
From: "Information Security magazine" 
<[EMAIL PROTECTED]>
To: "Information Security Magazine" 
<[EMAIL PROTECTED]>
Sent: Tuesday, September 28, 2004 7:16 AM
Subject: Join us for today's live webcast, "5 Hidden Tactics for Secure 
Programming"


As a valued Information Security magazine subscriber, you're invited
to join us for this month's exclusive live webcast "Five Hidden
Tactics for Secure Programming" with one of our top contributing
editors, James C. Foster, Deputy-Director of Global Security Solution
Development for CSC.

Attend and discover the five fundamental steps on how to
cost-effectively and efficiently address the root cause of the
biggest security exposures in uncompiled code: design flaws. Also,
you get inside expertise on user input, improper calls, component
integration, data exchange, the idea behind "borrowed code" and more.

The webcast goes live today, September 28 at 12:00 p.m. EDT (1600
GMT). Log in right here to join your fellow subscribers and
SearchSecurity.com members for this complimentary webcast sponsored
by Ounce Labs:
http://searchSecurity.com/r/0,,33313,00.htm?track=NL-347&ad=493005


More About Today's Webcast:
Why is it so important to address the root cause of design flaws in
uncompiled code? Statistics show that it's 6.5 times more expensive
to fix a security problem in the implementation phase than in the
design phase of a software rollout and 100 times more expensive in
the maintenance phase. Attend and find out how to correct existing
flaws and adopt proper techniques and management tasks to finally
ensure secure coding practices.

About Today's Webcast Expert:
In addition to being a contributing editor to Information Security
magazine, James C. Foster is the Deputy-Director of Global Security
Solution Development for CSC. He was previously the Director of
Research and Development at Foundstone, subsequent to working at
Guardent (acquired by Verisign) and the Department of Defense. A
published author, Foster has been seen in Hacking Exposed 4th
Edition, Snort 2.0 and 2.1, Hacking the Code, Special Ops Security,
and Intrusion Detection and Prevention.




____________________________________________________________________

To unsubscribe from this newsletter, reply to this e-mail with REMOVE
in the Subject line.

Please note, unsubscribe requests may take up to 24 hours to process;
you may receive additional mailings during that time. A confirmation
e-mail will be sent when your request has been successfully
processed.

Contact us:
TechTarget
Member Services
117 Kendrick Street, Suite 800
Needham, MA 02494









Current thread: