<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p>ThreatSTOP CEO Tom Byrnes has been invited to speak at two events in D.C.</p> <!--more--> <p>The first will be at <a title="ISOI9" href="http://isotf.org/isoi9.html">ISOI9</a> on either May 12 or 13th (TBD).&nbsp; He will speak about CAPS, anonymized log sharing, and ThreatSTOP's “Channel 42” on SIE. The <a href="http://www.cyber-ta.org/releases/CTA_Anonymizer/index.html">CYBER-TA</a> Anonymous Alert Publication System (aka CAPS), originally developed by <a href="http://www.csl.sri.com/">SRI</a>, has all the features required for log anonymization but has not been maintained for some years. ThreatSTOP has reached agreement with SRI to take over maintenance of the code. See our <a href="http://blog.threatstop.com/2011/03/14/threatstop-open-sources-caps-anonymization-code/">blog</a> about this. This enables sharing of information among users, which leads to a virtuous cycle as each user becomes a detector, and is how we can move from the Wild West of the current Internet to a civilized society, without requiring centralized control or walled gardens. ThreatSTOP is a member of theSecurity Information Exchange (SIE) run by the <a href="http://www.isc.org/">Internet Systems Consortium</a> (ISC). Through channel 42, ThreatSTOP will provide other SIE members with data from our subscribers once it has been passed through CAPS to ensure anonymity.</p> <p>The second will be at <a href="http://cybersecuritystrategiessummit.com/">Cybersecurity Strategies Summit</a>. This is an event sponsored by <a href="http://securingourecity.org/">Securing our eCity</a>, a private/public partnership dedicated to the mission of helping businesses, governments and individuals learn best practices of cybersecurity and protect themselves against cybercrime.&nbsp; On May 11,Tom will give a&nbsp; tutorial on how small and medium enterprises need to put the policies, procedures and systems in place to protect themselves against the various threats they face.</p></span>