* [gen-16862] Invitation to the CERT Vendor Meeting 2022 (June 6)
@ 2022-04-29 17:43 cert+donotreply
0 siblings, 0 replies; only message in thread
From: cert+donotreply @ 2022-04-29 17:43 UTC (permalink / raw)
To: gcc
While it's unusual for us to hold meetings so close together, it's been an unusual couple of years, and we are holding a full day, hybrid event on June 6 2022, the Monday of RSAC 2022. The meeting will be held from 9 AM to 5 PM PDT, in person at the Marriott Marquis in San Francisco, CA, US, and online via Zoom Webinar.
Register here: <https://cert-vendor-meeting-2022-jun.eventbrite.com/>
Registration options include in-person, virtual, or both.
Questions/issues about registration, logistics, etc: <vul-event-rsvp@cert.org>
Topical discussion: <vendor-meetings@cert.org>
We actively seek ideas for topics that are of interest to you, and we welcome those wishing to speak or lead a discussion topic or participate on a panel. The draft/working list topics includes:
* UEFI vulnerability analysis
* Linux Vendor Firmware Service (LVFS), possibly connected to the UEFI topic, probably also with supply chain/SBOM implications
* A CVD protocol
* CVE
* SBOM, VEX
* Government regulations impacting CVD
While we're more or less happy to decide the agenda ourselves, we'd be happier with your input, and you might be too.
Regards,
- Art
This e-mail was sent to you as a user of our VINCE service, in accordance with our privacy policy. Please advise us if you believe you have received this e-mail in error.
^ permalink raw reply [flat|nested] only message in thread
only message in thread, other threads:[~2022-04-29 17:43 UTC | newest]
Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2022-04-29 17:43 [gen-16862] Invitation to the CERT Vendor Meeting 2022 (June 6) cert+donotreply
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).