Not that it's my favorite topic but it seems like 2. Realistic Risk Assessment: How to honestly gauge the value of your information assets. and 3. Documenting Security: writing documentation and reports to encourage and sell security. could be combined into a 'how to get security projects initiated, approved, funded and completed.' It could cover valuation of assets, identifying threats & risks, determining loss potential for risks, evaluating countermeasures, reducing assigning or accepting the risk, etc, etc. But that's a lot for an hour. I'd be interested in seeing something about honeypot/nets; legal issues, practical use and a roundup of current honeypot software/technology. Jeff
This archive was generated by hypermail 2b30 : Wed Feb 19 2003 - 22:10:31 PST