ICANN ICANN Email List Archives

[dssa]


<<< Chronological Index >>>    <<< Thread Index >>>

[dssa] MP3 & AC Recording / DSSA 23 August 2012

  • To: DSSA WG <dssa@xxxxxxxxx>
  • Subject: [dssa] MP3 & AC Recording / DSSA 23 August 2012
  • From: Nathalie Peregrine <nathalie.peregrine@xxxxxxxxx>
  • Date: Thu, 23 Aug 2012 12:59:53 -0700


Dear All,



Please find the Mp3 recording from the DSSA-WG call on Thursday, 23 August 2012 
at:

http://audio.icann.org/gnso/gnso-dssa-20120823-en.mp3





 Please find the Adobe room presentation recording here:    
http://icann.adobeconnect.com/p88dn57ll3j/


A transcript of the AC Chat can be found at the bottom of this email.



Transcript and Presentation will be posted shortly on:

http://gnso.icann.org/en/calendar/#aug


Attendees on the call:



At Large Members

. Olivier Crépin-Leblond (ALAC) (co-chair)

. Julie Hammer (ALAC)
. Cheryl Langdon-Orr (ALAC)




ccNSO Members

. Wim Degezelle, (CENTR)

. Takayasu Matsuura. Jp

. Katrina Sataki.lv

. Jacques Latour.ca

.Joerg Schweiger (cCNSO co-chair)



GNSO Members

. Mikey O'Connor - (CBUC) (co-chair)
. George Asare-Sakyi (NCSG)

 . Don Blumenthal - - (RySG)

. George Asare-Sakyi - (NCSG)



NRO Members

Mark Kosters (ARIN)





SSAC members:

. Jim Galvin (SSAC Vice Chair)

. Warren Kumari


ICANN Staff:

. Julie Hedlund

. Nathalie Peregrine



Apologies:

. Rick Koeller, .ca (CIRA)







** Please let me know if your name has been left off the list **



Link to Working Group Wiki space: 
https://community.icann.org/display/AW/Joint+DNS+Security+and+Stability+Analysis+Working+Group



Let me know if you have any questions.



Thank you.

Kind regards,

Nathalie Peregrine for



GNSO Secretariat

gnso-secs@xxxxxxxxx<mailto:gnso-secs@xxxxxxxxx>





AC Chat transcript 23 August 2012:


  Jim:Does anyone know how to change a name once you are logged in?

  Don Blumenthal:I  just got dropped

  Julie Hammer:Don, are you connected again?

  Nathalie  Peregrine:Don, do you need a dial out?

  Joerg Schweiger:How would you define compliance monitoring in our context?

  Jim Galvin:Isn't the public an important part of compliance monitoring?

  Don Blumenthal:Thanks, Nathalie.  I'm back in through Adobe Connect.

  Jacques Latour:for an enterprise you can have PCI (credit card) or SOX  
compliance, with defined controls and actions, or event the internal security 
policy compliance.  you need a security policy to comply with in order to have 
compliance.

  Julie Hammer:Monitoring compliance with specified security laws, policies, 
procedures?

  Nathalie  Peregrine:Perfect Don, thank you for confirming.

  Don Blumenthal:PIR for me

  Don Blumenthal:Compliance can be used for finger pointing but I know of more 
than one instance from consultihng where the process identified problems.

  Jacques Latour:or if you have an exception that need to be notified to public 
(i.e. password breach)

  Don Blumenthal:True, although breach detection and response programs were 
subsets of larger security programs.

  Julie Hammer:I'm not seeing anything on the screen

  Cheryl Langdon-Orr:ok

  Julie Hammer:Thanks Mikey

  Katrina Sataki:thanks! bye!

  Jim Galvin:Thanks!  Bye everyone

  Cheryl Langdon-Orr:bye



<<< Chronological Index >>>    <<< Thread Index >>>

Privacy Policy | Terms of Service | Cookies Policy