📄 Extracted Text (598 words)
From: "jeffrey E." <[email protected]>
To: Vincenzo lozzo
Subject: Re: Speech at the EU parliament
Date: Mon, 28 Sep 2015 10:39:52 +0000
great
On Mon, Sep 28, 2015 at 6:36 AM, Vincenzo Iozzo < > wrote:
Yeah good point, will run through it and simplify!
Btw a fancier way of saying the market for lemon thing is that attackers are adaptive players, so "back testing"
on previous data doesn't give you a good indication of whether the product will protect you in the future or not
Anyway thanks again for reading it! You alright?
Sent from my Iphone
On Sep 28, 2015, at 18:33, jeffrey E. <jeevacation®gmail.com> wrote:
try to make the talk more to a 6th gradee level.. overly long complex sentences put people to sleep
On Mon, Sep 28, 2015 at 6:31 AM, Vincenzo lozzo < > wrote:
Thanks for reading it. Noted on sentences, I tend to write overly long ones :1
Cost center: with the exception of anti-fraud and stuff that boosts customers confidence, people buy
(defensive) security stuff either because of fear, regulation or because they might lose money/IP otherwise.
Market for lemons: for most products it's impossible to tell whether they work or not because it's
impossible to fully predict what a new attack will look like. Which means that you cannot really test them
Sent from my Iphone
On Sep 28, 2015, at 18:23, jeffrey E. <[email protected]> wrote:
Security is a cost center for
nearly all organizations and it is also a perfect market for lemons.?? sentences shuld be simplified
On Sun, Sep 27, 2015 at 9:30 PM, Vincenzo lozzo wrote:
Jeffrey,
I'm giving a 15min speech at the EU parliament next week on the regulation of intrusion/surveillance
software.
Attached my notes for the talk, if you have time to go through them and have some feedback that
would be great. I think you'd be a good example of the target audience. Thank you!
EFTA00845023
How are things otherwise?
Take care,
Vincenzo
Sent from my Iphone
please note
The information contained in this communication is
confidential, may be attorney-client privileged, may
constitute inside information, and is intended only for
the use of the addressee. It is the property of
JEE
Unauthorized use, disclosure or copying of this
communication or any part thereof is strictly prohibited
and may be unlawful. If you have received this
communication in error, please notify us immediately by
return e-mail or by e-mail to [email protected], and
destroy this communication and all copies thereof,
including all attachments. copyright -all rights reserved
please note
The information contained in this communication is
confidential, may be attorney-client privileged, may
constitute inside information, and is intended only for
the use of the addressee. It is the property of
JEE
Unauthorized use, disclosure or copying of this
communication or any part thereof is strictly prohibited
and may be unlawful. If you have received this
communication in error, please notify us immediately by
return e-mail or by e-mail to [email protected], and
destroy this communication and all copies thereof,
including all attachments. copyright -all rights reserved
please note
The information contained in this communication is
confidential, may be attorney-client privileged, may
EFTA00845024
constitute inside information, and is intended only for
the use of the addressee. It is the property of
JEE
Unauthorized use, disclosure or copying of this
communication or any part thereof is strictly prohibited
and may be unlawful. If you have received this
communication in error, please notify us immediately by
return e-mail or by e-mail to [email protected], and
destroy this communication and all copies thereof,
including all attachments. copyright -all rights reserved
EFTA00845025
ℹ️ Document Details
SHA-256
bc0f793701c104edb00bc4548cc61de899f0353b8b4e930f5b7672d22e914419
Bates Number
EFTA00845023
Dataset
DataSet-9
Document Type
document
Pages
3
Comments 0