[sacm] sacm - New Meeting Session Request for IETF 104

IETF Meeting Session Request Tool <session-request@ietf.org> Fri, 08 February 2019 15:47 UTC

Return-Path: <session-request@ietf.org>
X-Original-To: sacm@ietf.org
Delivered-To: sacm@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id A181E1279E6; Fri, 8 Feb 2019 07:47:22 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: IETF Meeting Session Request Tool <session-request@ietf.org>
To: <session-request@ietf.org>
Cc: sacm-chairs@ietf.org, kodonog@pobox.com, sacm@ietf.org, kaduk@mit.edu
X-Test-IDTracker: no
X-IETF-IDTracker: 6.91.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <154964084258.31088.1483085408593065910.idtracker@ietfa.amsl.com>
Date: Fri, 08 Feb 2019 07:47:22 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/wy2ptlo5BoJEHG0d8xpISOZhWTs>
Subject: [sacm] sacm - New Meeting Session Request for IETF 104
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.29
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 08 Feb 2019 15:47:23 -0000


A new meeting session request has just been submitted by Karen O&#39;Donoghue, a Chair of the sacm working group.


---------------------------------------------------------
Working Group Name: Security Automation and Continuous Monitoring
Area Name: Security Area
Session Requester: Karen O&#39;Donoghue

Number of Sessions: 1
Length of Session(s):  1.5 Hours
Number of Attendees: 50
Conflicts to Avoid: 
 First Priority: anima cfrg core dots i2nsf ipsecme mile ntp saag tictoc secevent
 Second Priority: tls oauth



People who must be present:
  Karen O&#39;Donoghue
  Christopher Inacio
  Benjamin Kaduk

Resources Requested:

Special Requests:
  
---------------------------------------------------------