Computer giant Dell and Linux developer and open source champion
Red Hat will co-host the first Open Source Security Summit at
Georgetown University in Washington, D.C., on Oct. 29.
The summit will provide an open forum to discuss and explore how
open source technologies, methodologies, tools, and support
processes meet the challenges of securing networks and computer
Keynote speakers, panelists and attendees will explore the
assertion that the open source development model--based on code
access, community resources and peer-to-peer design review--results
in a more secure software product.
Other topics to be discussed include security innovation and
homeland defense; mandates of the open source community in relation
to software; integrity, design quality and responsiveness; impact
of collaboration and standardization on vulnerability; and
accountability and responsiveness.
"Building a stable yet accessible infrastructure to protect
critical enterprise data and systems is a daunting challenge for
most organizations," said Paul Cormier, executive vice president of
engineering at Red Hat. "Solutions which are architected using open
source technologies are meeting the challenges of securing systems
and delivering to customers the highest level of security. Many of
these open source technologies are in production today."
The summit program will feature speakers including Marcus Sachs,
the White House Office of Cyberspace Security; Bill Caelli,
Queensland School of Software Engineering and Data Communications;
Rob Walker, Defense Information Systems Agency (DISA); Steve
Christey, MITRE Corp.; and Shawn Hernan, CERT Coordination
"Conventional perceptions of security are predicated on the
assumption that hidden is secure," said Stacey Quandt of the Giga
Group. "Newspaper headlines on security vulnerabilities in many of
the markets established by proprietary operating environments
underscore the fact that hackers can and do find and exploit back
doors and code vulnerabilities. Today some of the most secure
operating systems are based on the open source model. The question
begs how can you be sure that your environment is secure if you are
running a proprietary operating system that cannot be examined or
verified for secure coding?"
Information about the summit can be obtained at
Some of the products that appear on this site are from companies from which QuinStreet receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. QuinStreet does not include all companies or all types of products available in the marketplace.