|
Making a Security Policy Workable
|
|
Disaster Planning Revisited: An Update on Recovery
Strategies for Uncertain Times
|
In this presentation, you will explore the challenges
of disaster recovery planning during uncertain times of high alert
and learn why business enterprises must now reassess disaster
planning recovery strategies. The session will touch upon:
information storage — keeping data and processes secure; the
importance of online accessibility to established recovery plans;
recent real-world examples of disaster planning and recovery; and
how the merger of business processes with technology now mandates
new approaches to disaster planning and recovery.
|
|
Harry Ebbighausen |
|
Note: Large file - Approx. 1 MB; Navigation and search bookmarks in .pdf
file are not functional. |
|
|
The State of Intrusion Detection
|
The increased dependence of corporations and
government agencies on the Internet as a vehicle for communications
and commerce has spawned a proliferation of attacks and misuse of
networks worldwide. Threats of attacks are becoming more complex and
severe, leaving traditional security measures ill-equipped to manage
them. Many companies are turning to Intrusion Detection Systems
(IDS) to provide defense in depth. This session will teach you to
identify which IDS is right for you, and when and how to deploy it.
|
|
Martin Roesch |
|
Approx. 190 kB; Navigation and search bookmarks in .pdf
file are not functional. |
|
|
Getting Down to Business with Security
|
What does it take to secure your business? How do you
justify the allocation of resources? What factors impact risk? This
session will guide you through the ins and outs of security
management, starting with a description of the "Two A's and Four
Disciplines of Security Management" and rounding out with guidance
on allocating resources based on anticipated risk and best
practices. |
|
Pete Lindstrom |
|
Approx.
116 kB; Navigation and search bookmarks in .pdf file are not
functional. |
|
|
De-Evolution of the Hacker: Past, Present and Future Trends
|
What forms of cyberterrorism do you need to protect
your network from? In this session, an expert from the FBI will
discuss emerging technology threats. The instructor will explain the
new types of cyberterrorism that are being seen and what defensive
measures you can take to ensure that you're not caught off guard. |
|
David Rhoades |
|
Note: Large file - Approx. 1.6 MB; Navigation and search bookmarks in .pdf
file are not functional. |
|
|
Architecting for Secure Network Management
|
As businesses depend more and more on the Internet,
IT management faces complicated challenges in ensuring network
security and data integrity. This session will show how to achieve
complete data protection within the enterprise. The instructor will
map out an architecture that protects against a myriad of threats;
he will describe a platform that blends secure connection offload
with content acceleration, uses transport layer security (TLS)
protocol to enable secure connections between Web clients and
backend servers and manages public key certificates, secure content
caching and switching. Learn how network and/or security managers
can quickly and cost-effectively implement a secure networking
platform that incorporates and automates sound security principles.
|
|
Rod Murchison |
|
Approx. 676 kB; Navigation and search bookmarks in .pdf
file are not functional. |
|