tag:blogger.com,1999:blog-4088979.post5286542877315212427..comments2023-10-16T06:06:25.012-04:00Comments on TaoSecurity Blog: Black Hat DC 2009 Wrap-Up, Day 1Richard Bejtlichhttp://www.blogger.com/profile/13512184196416665417noreply@blogger.comBlogger3125tag:blogger.com,1999:blog-4088979.post-80792153914487694782009-02-23T11:28:00.000-05:002009-02-23T11:28:00.000-05:00Public CNCI briefing by Boeing http://www.fairfaxc...Public CNCI briefing by Boeing <BR/><BR/>http://www.fairfaxchamber.org/clientuploads/FtBelvoirPresentations/FtBelvoir-Alexander.pdfAnonymousnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-19164220040085297852009-02-23T00:14:00.000-05:002009-02-23T00:14:00.000-05:00Richard, What is a "cyber Katrina"? My vision is ...Richard,<BR/> What is a "cyber Katrina"? My vision is lots of kinetic effects occuring simultaneously. The amount of coordination for that would be incredible, probably easier/cheaper to blow stuff up.<BR/>Moderate to wide-spread BGP route spoofing could be just as bad for e-commerce. What's your take?Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-19808642049487555622009-02-22T22:58:00.000-05:002009-02-22T22:58:00.000-05:00Thanks for doing this rundown, Richard. Your recap...Thanks for doing this rundown, Richard. Your recap of Paul Kurtz's session in particular just made my night since he basically recapped our Project Grey Goose focus since last August.<BR/><BR/>I'm also looking forward to reading more about your innovative TCP/IP Weapons School 2.0 course.Anonymousnoreply@blogger.com