Archiv:Security bei Kerzenschein: Unterschied zwischen den Versionen
KKeine Bearbeitungszusammenfassung |
MiKa (Diskussion | Beiträge) SBC 12 fixed date, restored "upcoming" (please leave it that way or leave a note on the discussion page) |
||
Zeile 43: | Zeile 43: | ||
== Upcoming Meetings == | |||
{| border="1" cellspacing="0" cellpadding="2" width="100%" style="border-collapse:collapse;" | |||
|width="25"| # ||width="280"| Date || Topic and Host(s) | |||
|- | |||
| #13 || [[Security_bei_Kerzenschein/SBC13_TBA|TBA]] || TBA | |||
|- | |||
|} | |||
== Next Meeting == | == Next Meeting == | ||
Zeile 49: | Zeile 55: | ||
|width="25"| # ||width="280"| Date || Topic and Host(s) | |width="25"| # ||width="280"| Date || Topic and Host(s) | ||
|- | |- | ||
| #12 || [[ | | #12 || [[Security_bei_Kerzenschein/SBC12_IPv6_Security|2010-03-15 Mon 19:30]] || Security Mechanisms in IPv6: What's new, what' cool and what's annoying <br> | ||
Security Mechanisms in IPv6: What's new, what' cool and what's annoying | Hosted by [[Benutzer:Lynx|Lynx]] and [[User:MiKa|MiKa]] | ||
|- | |- | ||
|} | |} | ||
Zeile 67: | Zeile 73: | ||
| #9 ||width="280"| [[Security_bei_Kerzenschein/SBC9_Plumbercon|2009-08-07 Fr 19:30]] || Security by Candlelight at [http://plumbercon.org/ PlumberCon]. Plumbercon is a security mini-con at the werkzeugH in the 5th district of Vienna. <br> | | #9 ||width="280"| [[Security_bei_Kerzenschein/SBC9_Plumbercon|2009-08-07 Fr 19:30]] || Security by Candlelight at [http://plumbercon.org/ PlumberCon]. Plumbercon is a security mini-con at the werkzeugH in the 5th district of Vienna. <br> | ||
Planned Topics: We would like to continue with our "Seven Layers of Insecurity" focusing on physical security, a topic which is often neglected when IT security is implemented.<br> | Planned Topics: We would like to continue with our "Seven Layers of Insecurity" focusing on physical security, a topic which is often neglected when IT security is implemented.<br> | ||
|- | |- | ||
| #8 || [[Security_bei_Kerzenschein/SBC8_What's_the_Risk|2009-07-23 Thu 19:30]] || We were able to schedule another "Security by Candlelight" before the the [http://plumbercon.org/ PlumberCon]. This time we have the following topics: Security Management and Risk Management. Now that we know about our possible enemies we will go the next step and evaluate how security breaches can affect information systems and which steps are apropriate to "mitigate" (dt.: abschwächen, mildern) any risks. Doing too much is expensive, doing too little is dangerous - finding the right balance is an art (and a science).<br> | | #8 || [[Security_bei_Kerzenschein/SBC8_What's_the_Risk|2009-07-23 Thu 19:30]] || We were able to schedule another "Security by Candlelight" before the the [http://plumbercon.org/ PlumberCon]. This time we have the following topics: Security Management and Risk Management. Now that we know about our possible enemies we will go the next step and evaluate how security breaches can affect information systems and which steps are apropriate to "mitigate" (dt.: abschwächen, mildern) any risks. Doing too much is expensive, doing too little is dangerous - finding the right balance is an art (and a science).<br> |