Zum Inhalt springen

Archiv:Security bei Kerzenschein: Unterschied zwischen den Versionen

Naxx (Diskussion | Beiträge)
MiKa (Diskussion | Beiträge)
K Added table headers, makes it easier to add/edit/swap/move events - Please leave it that way, thx!
Zeile 44: Zeile 44:
== Upcoming Meetings ==
== Upcoming Meetings ==
{|  border="1" cellspacing="0" cellpadding="2" width="100%" style="border-collapse:collapse;"
{|  border="1" cellspacing="0" cellpadding="2" width="100%" style="border-collapse:collapse;"
|width="25"| #12 ||width="280"| To be Announced ||  Host(s) and topics to be announced...
|width="25"| # ||width="280"| Date ||  Topic and Host(s)  
|-
|-
| #12 || TBA || To be Announced
|}
|}


Zeile 52: Zeile 53:
== Next Meeting ==
== Next Meeting ==
{| border="5"  cellspacing="0" cellpadding="2" width="100%" style="border-collapse:collapse;"
{| border="5"  cellspacing="0" cellpadding="2" width="100%" style="border-collapse:collapse;"
|width="25"| #11 ||width="280"| [[ShmooCon2010|2010-02-05 Fri 09.00 PM - 2010-02-07 Sun 08.30 PM]] || SecBC Special: [[ShmooCon2010]]<br>
|width="25"| # ||width="280"| Date ||  Topic and Host(s)
|-
| #11 || [[ShmooCon2010|2010-02-05 Fri 09.00 PM - 2010-02-07 Sun 08.30 PM]] || SecBC Special: [[ShmooCon2010]]<br>
Unser außertourlicher 3-Tages-Marathon anlässlich der ShmooCon in Washington D.C. - mit live stream!
Unser außertourlicher 3-Tages-Marathon anlässlich der ShmooCon in Washington D.C. - mit live stream!
|-
|-
Zeile 60: Zeile 63:


{| border="1" cellspacing="0" cellpadding="2" width="100%" style="border-collapse:collapse;"
{| border="1" cellspacing="0" cellpadding="2" width="100%" style="border-collapse:collapse;"
|width="25"| #10 ||width="280"| [[Security_bei_Kerzenschein/SBC10_Advanced_Network_Security|2010-01-14 Thu 19:45 c.t.]] || Advanced Network Security<br>
|width="25"| # ||width="280"| Date ||  Topic and Host(s)
|-
| #10 || [[Security_bei_Kerzenschein/SBC10_Advanced_Network_Security|2010-01-14 Thu 19:45 c.t.]] || Advanced Network Security<br>
Hosted by Daniel Mende (ERNW Heidelberg)
Hosted by Daniel Mende (ERNW Heidelberg)
|-
|-
|#9 ||width="280"| [[Security_bei_Kerzenschein/SBC9_Plumbercon|2009-08-07 Fr 19:30]] || Security by Candlelight at [http://plumbercon.org/ PlumberCon]. Plumbercon is a security mini-con at the werkzeugH in the 5th district of Vienna. <br>
| #9 ||width="280"| [[Security_bei_Kerzenschein/SBC9_Plumbercon|2009-08-07 Fr 19:30]] || Security by Candlelight at [http://plumbercon.org/ PlumberCon]. Plumbercon is a security mini-con at the werkzeugH in the 5th district of Vienna. <br>
Planned Topics: We would like to continue with our "Seven Layers of Insecurity" focusing on physical security, a topic which is often neglected when IT security is implemented.<br>
Planned Topics: We would like to continue with our "Seven Layers of Insecurity" focusing on physical security, a topic which is often neglected when IT security is implemented.<br>
Hosted by [[Benutzer:Lynx|Lynx]], [[User:Naxx|Naxx]] and [[User:MiKa|MiKa]]
Hosted by [[Benutzer:Lynx|Lynx]], [[User:Naxx|Naxx]] and [[User:MiKa|MiKa]]
|-
|-
| #8 ||width="280"| [[Security_bei_Kerzenschein/SBC8_What's_the_Risk|2009-07-23 Thu 19:30]] || We were able to schedule another "Security by Candlelight" before the the [http://plumbercon.org/ PlumberCon]. This time we have the following topics: Security Management and Risk Management. Now that we know about our possible enemies we will go the next step and evaluate how security breaches can affect information systems and which steps are apropriate to "mitigate" (dt.: abschwächen, mildern) any risks. Doing too much is expensive, doing too little is dangerous - finding the right balance is an art (and a science).<br>
| #8 || [[Security_bei_Kerzenschein/SBC8_What's_the_Risk|2009-07-23 Thu 19:30]] || We were able to schedule another "Security by Candlelight" before the the [http://plumbercon.org/ PlumberCon]. This time we have the following topics: Security Management and Risk Management. Now that we know about our possible enemies we will go the next step and evaluate how security breaches can affect information systems and which steps are apropriate to "mitigate" (dt.: abschwächen, mildern) any risks. Doing too much is expensive, doing too little is dangerous - finding the right balance is an art (and a science).<br>
Hosted again by: [[Benutzer:Lynx|Lynx]], [[User:Naxx|Naxx]] and [[User:MiKa|MiKa]] (as planned, changes possible).
Hosted again by: [[Benutzer:Lynx|Lynx]], [[User:Naxx|Naxx]] and [[User:MiKa|MiKa]] (as planned, changes possible).
|-
|-