threat trees and how they relate to our work

Several times during our f2f the question of what to do with the threat 
tree work came up. I'll be putting it on the agenda of a future meeting 
(maybe even the next one). It would be useful to me to have someone who 
has some ideas about what we might do lead the discussion. If you think 
you're that sort of person, drop me a line. Thanks. 

          Mez

Mary Ellen Zurko, STSM, IBM Lotus CTO Office       (t/l 333-6389)
Lotus/WPLC Security Strategy and Patent Innovation Architect

Received on Monday, 4 June 2007 18:04:44 UTC