Secure Coding mailing list archives
Fw: Join us for today's live webcast, "5 Hidden Tactics for Secure Programming"
From: "Greenarrow 1" <Greenarrow1 () msn com>
Date: Wed, 29 Sep 2004 14:23:52 +0100
I am forwarding the below WebCast if anyone is interested in attending. I am not indorsing this webcast but I have attended previous ones and they do provide knowledgeable information. One must register for the Webcast. Regards, George Greenarrow1 InNetInvestigations-Forensics ----- Original Message ----- From: "Information Security magazine" <[EMAIL PROTECTED]> To: "Information Security Magazine" <[EMAIL PROTECTED]> Sent: Tuesday, September 28, 2004 7:16 AM Subject: Join us for today's live webcast, "5 Hidden Tactics for Secure Programming"
As a valued Information Security magazine subscriber, you're invited to join us for this month's exclusive live webcast "Five Hidden Tactics for Secure Programming" with one of our top contributing editors, James C. Foster, Deputy-Director of Global Security Solution Development for CSC. Attend and discover the five fundamental steps on how to cost-effectively and efficiently address the root cause of the biggest security exposures in uncompiled code: design flaws. Also, you get inside expertise on user input, improper calls, component integration, data exchange, the idea behind "borrowed code" and more. The webcast goes live today, September 28 at 12:00 p.m. EDT (1600 GMT). Log in right here to join your fellow subscribers and SearchSecurity.com members for this complimentary webcast sponsored by Ounce Labs: http://searchSecurity.com/r/0,,33313,00.htm?track=NL-347&ad=493005 More About Today's Webcast: Why is it so important to address the root cause of design flaws in uncompiled code? Statistics show that it's 6.5 times more expensive to fix a security problem in the implementation phase than in the design phase of a software rollout and 100 times more expensive in the maintenance phase. Attend and find out how to correct existing flaws and adopt proper techniques and management tasks to finally ensure secure coding practices. About Today's Webcast Expert: In addition to being a contributing editor to Information Security magazine, James C. Foster is the Deputy-Director of Global Security Solution Development for CSC. He was previously the Director of Research and Development at Foundstone, subsequent to working at Guardent (acquired by Verisign) and the Department of Defense. A published author, Foster has been seen in Hacking Exposed 4th Edition, Snort 2.0 and 2.1, Hacking the Code, Special Ops Security, and Intrusion Detection and Prevention. ____________________________________________________________________ To unsubscribe from this newsletter, reply to this e-mail with REMOVE in the Subject line. Please note, unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed. Contact us: TechTarget Member Services 117 Kendrick Street, Suite 800 Needham, MA 02494
Current thread:
- Fw: Join us for today's live webcast, "5 Hidden Tactics for Secure Programming" Greenarrow 1 (Sep 29)