Open Security: Difference between revisions

From Berkman@10
Jump to navigation Jump to search
No edit summary
No edit summary
Line 5: Line 5:
* Jart Armin - StopBadware volunteer, security researcher
* Jart Armin - StopBadware volunteer, security researcher
* Debbie Doerrlamm - StopBadware volunteer
* Debbie Doerrlamm - StopBadware volunteer
* James McQuaid - Snort Inline & Smoothwall  
* James McQuaid - Snort Inline & Smoothwall
* Matt Jonkman - EmergingThreats.net
  James maintains the open source [http://doc.emergingthreats.net/bin/view/Main/SnortConfSamples SnortConfigSamplesProject] at EmergingThreats.net.
  As a contractor working against a large scale hack of a major U.S. university, he provided the university
  with the intruders' name, photograph, address, and online accounts.
  James is now employed by a well known biomedical, charitable organization.





Revision as of 18:01, 3 May 2008

Open Security: Harnessing the Generative Internet for the Public Good

Organizers:

  • Erica George - StopBadware staff
  • Jart Armin - StopBadware volunteer, security researcher
  • Debbie Doerrlamm - StopBadware volunteer
  • James McQuaid - Snort Inline & Smoothwall
 James maintains the open source SnortConfigSamplesProject at EmergingThreats.net.
 As a contractor working against a large scale hack of a major U.S. university, he provided the university 
 with the intruders' name, photograph, address, and online accounts.
 James is now employed by a well known biomedical, charitable organization.


The generativity of the internet is its greatest strength, and also its greatest weakness. How can we harness the collective power of collaborative innovation to combat the uglier side of what openness brings to the net? StopBadware aims to use community action to fight badware. How have StopBadware and other groups used - or could potentially use - the Internet's generativity to help protect users from malware and related issues?

We're planning a flexible, informal workshop.