Yes.
Sarah Kelley
Senior Cyber Threat Analyst
Multi-State Information Sharing and Analysis Center (MS-ISAC)
31 Tech Valley Drive
East Greenbush, NY 12061
sarah.kelley@cisecurity.org
518-266-3493
24x7 Security Operations Center
SOC@cisecurity.org - 1-866-787-4722
From: "cti@lists.oasis-open.org" <cti@lists.oasis-open.org> on behalf of Sean Barnum <sean.barnum@FireEye.com>
Date: Tuesday, September 26, 2017 at 1:03 PM
To: Trey Darley <trey@newcontext.com>, "cti@lists.oasis-open.org" <cti@lists.oasis-open.org>
Subject: Re: [cti] Today's working call agenda
So, is the referenced table just supposed to be a discussion guide for the call?
Sean Barnum
Principal Architect
FireEye
M: 703.473.8262
E: sean.barnum@fireeye.com
On 9/26/17, 8:53 AM, "Trey Darley" <cti@lists.oasis-open.org on behalf of trey@newcontext.com> wrote:
Hi, y'all -
On today's working call the plan is to:
1) give a brief overview of the Malware SDO for those who don't
normally join the Friday working calls, and
2) discuss features and use cases pertaining to the Event SDO, based
on this table [1] which John Wunder put together.
Hope you can join us on today's call - we need your input!
[1]:
https://docs.google.com/document/d/1kZN9Pc5FvQcoaoLrPmlvDngkzwgyUSu9ms-MCp7uT8A/edit?usp=sharing
--
Cheers,
Trey
++--------------------------------------------------------------------------++
Director of Standards Development, New Context
gpg fingerprint: 3918 9D7E 50F5 088F 823F 018A 831A 270A 6C4F C338
++--------------------------------------------------------------------------++
--
"It is always possible to aglutenate multiple separate problems into a
single complex interdependent solution. In most cases this is a bad
idea." --RFC 1925
This email and any attachments thereto may contain private, confidential, and/or privileged material for the sole use of the intended recipient. Any review, copying, or distribution of this email (or any attachments thereto) by others is strictly prohibited.
If you are not the intended recipient, please contact the sender immediately and permanently delete the original and any copies of this email and any attachments thereto.
.....
This message and attachments may contain confidential information. If it appears that this message was sent to you by mistake, any retention, dissemination, distribution or copying of this message and attachments is strictly prohibited. Please notify the sender
immediately and permanently delete the message and any attachments.