<<<
Chronological Index
>>> <<<
Thread Index
>>>
[dssa] MP3 & AC Recording / DSSA 23 August 2012
- To: DSSA WG <dssa@xxxxxxxxx>
- Subject: [dssa] MP3 & AC Recording / DSSA 23 August 2012
- From: Nathalie Peregrine <nathalie.peregrine@xxxxxxxxx>
- Date: Thu, 23 Aug 2012 12:59:53 -0700
Dear All,
Please find the Mp3 recording from the DSSA-WG call on Thursday, 23 August 2012
at:
http://audio.icann.org/gnso/gnso-dssa-20120823-en.mp3
Please find the Adobe room presentation recording here:
http://icann.adobeconnect.com/p88dn57ll3j/
A transcript of the AC Chat can be found at the bottom of this email.
Transcript and Presentation will be posted shortly on:
http://gnso.icann.org/en/calendar/#aug
Attendees on the call:
At Large Members
. Olivier Crépin-Leblond (ALAC) (co-chair)
. Julie Hammer (ALAC)
. Cheryl Langdon-Orr (ALAC)
ccNSO Members
. Wim Degezelle, (CENTR)
. Takayasu Matsuura. Jp
. Katrina Sataki.lv
. Jacques Latour.ca
.Joerg Schweiger (cCNSO co-chair)
GNSO Members
. Mikey O'Connor - (CBUC) (co-chair)
. George Asare-Sakyi (NCSG)
. Don Blumenthal - - (RySG)
. George Asare-Sakyi - (NCSG)
NRO Members
Mark Kosters (ARIN)
SSAC members:
. Jim Galvin (SSAC Vice Chair)
. Warren Kumari
ICANN Staff:
. Julie Hedlund
. Nathalie Peregrine
Apologies:
. Rick Koeller, .ca (CIRA)
** Please let me know if your name has been left off the list **
Link to Working Group Wiki space:
https://community.icann.org/display/AW/Joint+DNS+Security+and+Stability+Analysis+Working+Group
Let me know if you have any questions.
Thank you.
Kind regards,
Nathalie Peregrine for
GNSO Secretariat
gnso-secs@xxxxxxxxx<mailto:gnso-secs@xxxxxxxxx>
AC Chat transcript 23 August 2012:
Jim:Does anyone know how to change a name once you are logged in?
Don Blumenthal:I just got dropped
Julie Hammer:Don, are you connected again?
Nathalie Peregrine:Don, do you need a dial out?
Joerg Schweiger:How would you define compliance monitoring in our context?
Jim Galvin:Isn't the public an important part of compliance monitoring?
Don Blumenthal:Thanks, Nathalie. I'm back in through Adobe Connect.
Jacques Latour:for an enterprise you can have PCI (credit card) or SOX
compliance, with defined controls and actions, or event the internal security
policy compliance. you need a security policy to comply with in order to have
compliance.
Julie Hammer:Monitoring compliance with specified security laws, policies,
procedures?
Nathalie Peregrine:Perfect Don, thank you for confirming.
Don Blumenthal:PIR for me
Don Blumenthal:Compliance can be used for finger pointing but I know of more
than one instance from consultihng where the process identified problems.
Jacques Latour:or if you have an exception that need to be notified to public
(i.e. password breach)
Don Blumenthal:True, although breach detection and response programs were
subsets of larger security programs.
Julie Hammer:I'm not seeing anything on the screen
Cheryl Langdon-Orr:ok
Julie Hammer:Thanks Mikey
Katrina Sataki:thanks! bye!
Jim Galvin:Thanks! Bye everyone
Cheryl Langdon-Orr:bye
<<<
Chronological Index
>>> <<<
Thread Index
>>>
|