« Top Down and Bottom Up Security Architecture | Main | Book Review: Adam Shostack on Threat Modeling - Give a Person a Gem and You Enrich Them For A Day, Show them how to build a Treasure Map and you Enrich them for their Life »

TrackBack

TrackBack URL for this entry:
http://www.typepad.com/services/trackback/6a00d83451c75869e201a73da6fa64970d

Listed below are links to weblogs that reference IAM Symposium in Detroit & Chicago:

Comments

The comments to this entry are closed.