On 20.11.2015 07:56:46, Tony Rutkowski wrote: > > etc. GSMA has long planned to create within itself > a structured means for exchanging this information. > Hi, Tony - Ivan and I are trying to be strategic in our CybOX 3.0 work. We want to get a vastly improved work product out the door ASAP, then pivot into working on more specific use cases in subsequent point releases. Put another way, we envisage CybOX 3.0 including a refactored Core (ie, the datatypes CybOX objects are built upon) and a good swath of the current CybOX objects (including those people are actually using today and some that people probably *would* use if the objects structures were easier to work with.) But then you might see something like: * CybOX 3.1 - network forensics focused * CybOX 3.2 - endpoint forensic focused * CybOX 3.3 - mobile focused * CybOX 3.4 - virtualization focused The idea being that for each of these narrower use cases, we would assemble a group of subject matter experts from the communities of interest to help us go deeply into domains that are outside Ivan and my areas of specialization. In the case of mobile, we'll go ahead and reach out to the GSMA Fraud and Security Group to get them on board. In the case of virtualization, ditto the NFV SEC. Tony, would you be so kind as to make the appropriate introductions on behalf of Ivan and myself? Again, just to set realistic expectations, we're trying not to bite off more than we can chew at the moment, but we definitely want to flesh out these additional use cases ASAP. -- Cheers, Trey -- Trey Darley Senior Security Engineer 4DAA 0A88 34BC 27C9 FD2B A97E D3C6 5C74 0FB7 E430 Soltra An FS-ISAC & DTCC Company
www.soltra.com -- "There are only two hard things in Computer Science: cache invalidation and naming things." --Phil Karlton Attachment: signature.asc Description: PGP signature