We spoke for almost an hour on all sorts of great discussion points related to Cloud Computing, specifically focusing on Trust (which I define in context as Security, Compliance, Control, Reliability and Privacy.)
This is mostly a cross-post from the official HacKid.org website, but I wanted to drive as many eyeballs to it as possible.
The gist of the idea for HacKid (sounds like “hacked,” get it?) came about when I took my three daughters aged 6, 9 and 14 along with me to the Source Security conference in Boston.
It was fantastic to have them engage with my friends, colleagues and audience members as well as ask all sorts of interesting questions regarding the conference.
It was especially gratifying to have them in the audience when I spoke twice. There were times the iPad I gave them was more interesting, however. 😉
The idea really revolves around providing an interactive, hands-on experience for kids and their parents which includes things like:
Low-impact martial arts/self-defense training
Online safety (kids and parents!)
How to deal with CyberBullies
Gaming competitions
Introduction to Programming
Basic to advanced network/application security
Hacking hardware and software for fun
Build a netbook
Make a podcast/vodcast
Lockpicking
Interactive robot building (Lego Mindstorms?)
Organic snacks and lunches
Website design/introduction to blogging
Meet law enforcement
Meet *real* security researchers 😉
We’re just getting started, but the enthusiasm and offers from volunteers and sponsors has been overwhelming!
If you have additional ideas for cool things to do, let us know via @HacKidCon (Twitter) or better yet, PLEASE go to the Wiki and read about how the community is helping to make HacKid a reality and contribute there!
At the RSA security conference last week I spent some time with Tom Gillis on a live uStream video titled “Securing the Network.”
Tom happens to be (as he points out during a rather funny interlude) my boss’ boss — he’s the VP and GM of Cisco‘s STBU (Security Technology Business Unit.)
It’s an interesting discussion (albeit with some self-serving Cisco tidbits) surrounding how collaboration, cloud, mobility, virtualization, video, the consumerizaton of IT and, um, jet packs are changing the network and how we secure it.
I don’t pay much attention to lists or awards, other than to usually make fun of them (especially when I’m put on one.)
However, this time I’ll make an exception. I was nominated this year for the RSA Security Bloggers Awards in the category of “Most Entertaining blog” and was voted “most likely to do something stupid” (in other words, I won.)
I was up against some stiff competition from the likes of Mike Rothman, Jack Daniel, Erin Jacobs and Adam Shostack (et. al) All these folks are fantastic bloggers and I’m lucky enough to call them all my friends. In between ejecting party crashers and making fun of Rich Mogull during my acceptance speech (the whole one sentence,) it was great to chill with people I only get to see in person at conferences.
Thanks very much to all who voted for me and thanks to the hard work by the judges and those who organized the bloggers meetup. Next year I hope they have a category for “best bouncer for the meetup.” 😉
I’d like to congratulate the winners in the other categories, also:
Best Technical Security Blog – The SANS Internet Storm Center Blog
Best Non-technical Security Blog – Krebs on Security by Brian Krebs
Best Podcast – Pauldotcom
Best Corporate Blog – Jeremiah Grossman, White Hat Security
Here is some of the recent coverage from the last couple of months or so on topics relevant to content on my blog, presentations and speaking engagements. No particular order or priority and I haven’t kept a good record, unfortunately.
‘Cloud Hero’ and ‘Best Cloud Presentation’ – 2009 Cloudies Awards (link), and
2010 RSA Social Security Bloggers Award nomination (link) 😉
[I often get a bunch of guff as to why I make these lists: ego, horn-tooting, self-aggrandizement. I wish I thought I were that important. 😉 The real reason is that it helps me keep track of useful stuff focused not only on my participation, but that of the rest of the blogosphere.]
Here is some of the recent coverage from the last month or so on topics relevant to content on my blog, presentations and speaking engagements. No particular order or priority and I haven’t kept a good record, unfortunately.
Here’s what I’ve got planned for next week at the America’s Growth Capital InfoSec and RSA Security Conferences:
America’s Growth Capital 5th Annual Information Security Conference
Monday, April 20th – Keynote 3:00pm – 3:30pm – The Frogs / Cloud Computing and Virtualization Security Fable
Monday, April 20th – Panel Moderator 3:30 – 4:15pm – Virtualization, Security and Management with: Simon Crosby, CTO, Citrix (CTXS)
Dennis Moreau, CTO, Configuresoft
Jay Litkey, President and CEO, Embotics
Wael Mohamed, President and CEO, Third Brigade
Allwyn Sequeira, VMware (VMW)
RSA Security Conference
Wednesday, April 22nd – 10:40 – 11:40am Panel Discussion – Host 203 Defending & Deconstructing Virtualization Best Practices with: Rob Randell Senior Security Specialist, VMware
Dave Shackleford Chief Security Officer, Configuresoft
Moderator: Chris Farrow Vice President, Configuresoft
Wednesday, April 22nd – 2:45pm – 3:45pm Panelist/Founding Member – Cloud Security Alliance Kick-off
Wednesday, April 22nd – 3:00pm – 6:00pm Panelist Jericho Forum Cloud Computing Event
Thursday, April 23rd – 10:40-11:40 Panel Discussion – FEA 303 VirtSec Cage Match with:
One of my favorite international security conferences is happening April 22nd/23rd in Munich, Germany. It’s run by my good friend Enno Rey and his team at ERNW:
TROOPERS09 – WHAT IS IT?
Troopers09 is an international IT-Security Conference on the 22nd and 23rd of April 2009 in Munich, Germany. This event is created for CISOs, ISOs, IT-Auditors, IT-Sec-Admins, IT-Sec Consultants and everyone who is involved with IT-Security on a professional basis. The goal is to share in-depth knowledge about the aspects of attacking and defending information technology infrastructure and applications. The featured presentations and demonstrations represent the latest discoveries and developments of the global hacking scene and will provide the audience with valuable practical know-how.
Troopers09 is hosted by ERNW GmbH, an independent IT-Security consultancy from Heidelberg, Germany. In the past years, speakers from ERNW were invited all around the world to present their latest IT-Sec research results and to share their knowledge within the global hacking community. With this global experience in mind ERNW decided to launch an international conference in Germany in 2008. After last year’s success of Troopers08 we’re thrilled to do it again. Once more it’s going to be an event unlike all other „Security Conferences“ we have seen in Germany so far: No product presentations, no marketing blabla, no bull*ht-bingo – just pure practical IT-Security. Real answers and practical benefits to meet today´s and tomorrows threats.
Troopers08 was a fantastic event, so I can only imagine that this year’s will be just as good if not better.
Source Boston has officially wound down, but I’m still on Cloud 9 (sorry) following the amazing sessions and interaction I had with my fellow attendees and speakers.
My presentation was well received and with Marcus Ranum, Dan Geer, and Adam Shostack sitting six feet in front of me, I didn’t choke as badly as I could have. I had a ton of fun giving this first run preso and got a lot of great feedback and questions.
One of the most excellent things I got to do was spend some time walking about with Zach Lanier (@quine on Twitter) and interview many of the vendors and speakers extemporaneously on various subjects.
I’ll be updating this post with links to the interviews as I get them cleaned up and uploaded.
Jeremiah Grossman, Whitehat Security, “Get Rich or Die Trying, Making Money the Black Hat Way”
Amrit Williams, BigFix, “The Economics of CyberCrime & the Law of Malware Probability”
Adam Shostack, Microsoft, “The Crisis In Information Security”
Dan Kaminsky, IOActive, “DNS – Toward a Secure Infrastructure”
Chris Weber, Casaba Security, “Exploiting Unicode-Enabled Software”
Rob Cheyne, SafeLight, “The End Of Our Rope: The On-Going Discussion Between Business & Security”
You’ll laugh, you’ll cry, you’ll wonder why people gave me this task…
But seriously, we discuss such mega-issues such as DDoS, Snuggies, Bedazzlers, Zombies and Estonian dissident groups (and that’s in just ONE of the talks.)
I think I’ve found something I absolutely LOVE doing — vlogging (video blogging) and will try and do more of it.
Check back for updates to the links over the weekend.
Here is some of the recent coverage from the last couple of months on topics relevant to content on my blog, presentations and speaking engagements. No particular order or priority.
ZDNet: Security will suffer in the financial crisis
I should note that many of my cloud computing writing is being republished over at the SYSCON Cloud Computing Journal with a self-branded mini-site: ChristoferHoff.Sys-Con.com
Recent Comments