Re: [Full-disclosure] looking for security community input



A few years ago you would of had no problem getting a bunch of people to
bite on a request like this, but now all of the things you are asking for is
information that is worth allot of money. The security environment is
changing and just like the shift in the bad guy community towards nefarious
deeds for profit, I need to feed and cloth my children and if you want me to
help you its going to cost you, big time. The sponsor of this little shindig
is Microsoft and they have $46 Billion in cash so they can afford it.


Stacksmasher



On 12/10/06, Gadi Evron <ge@xxxxxxxxxxxx> wrote:

Hi guys.

This January a couple hundred people from the net-ops world, anti virus,
anti spam, law enforcement, etc. are getting together.

I'd appreciate if any of you can send me input (off list, if not relevant
to generate discussion) on what the security community at large, rather
than just the security operations community, sees and is pre-occupied by.

Specifically on subjects such as:
1. Attacks.
2. Law enforcement.
3. DDoS.
4. Botnets.
5. Financial fraud.
6. Spam.
7. End users (bots?)
8. Corporate espionage.
9. Incident response
10. Your topic here?

And whats specifically you've had issues with and/or are looking for
solutions for or for what others are doing when it comes to security and
security related issues. Please note, this is about security operations
and Internet-wide threats which affect us all, more than local corporate
security issues.

We will relay information back after the workshop, likely in early
February.

To ask specific questions and/or direct us in specific directions, pick
and choose:
http://isotf.org/isoi2.html

Thanks,

Gadi.

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/




--
"If you see me laughing, you better have backups"
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Relevant Pages

  • VulnWatch.Org Release
    ... Las Vegas, August 1, 2002 - At the Black Hat and Defcon security ... security community volunteers announce two important new ... The second is the Open Source Vulnerability Database. ...
    (NT-Bugtraq)
  • [VulnWatch] VulnWatch.Org Release
    ... Las Vegas, August 1, 2002 - At the Black Hat and Defcon security ... security community volunteers announce two important new ... The second is the Open Source Vulnerability Database. ...
    (VulnWatch)
  • [NEWS] D-Link DWL-1000AP can be Compromised Due to Insecure SNMP Configuration
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... allows an attacker to gain the administrative password using a simple SNMP ... A MIB walk using the read-only SNMP community of 'public' (default ... read-only community for most devices) can allow an attacker access to the ...
    (Securiteam)
  • [Full-Disclosure] VulnWatch.Org Release
    ... Las Vegas, August 1, 2002 - At the Black Hat and Defcon security ... security community volunteers announce two important new ... The second is the Open Source Vulnerability Database. ...
    (Full-Disclosure)
  • Re: How long?
    ... the security community finds these holes before they do, ... vulnerability (It is a new *published* vulnerability, ... On average, yeah, Microsoft take a bloody long time to fix things. ...
    (Security-Basics)