Security Track Sessions
bullet

Making a Security Policy Workable
bullet Organizations need security policies if they hope to achieve some degree of protection. However, what happens too often with a security policy is that it is not broad enough and doesn't account for enough possibilities, it gets entirely too technical, physical aspects are ignored, and management doesn't actively support and champion it.  This exciting session will show you some of the mistakes to avoid as well as how to effectively communicate security policies to your staff and management alike.
bullet

Winn Schwartau

bullet Note: Large file - Approx. 7.5 MB; Navigation and search bookmarks in .pdf file are not functional.

bullet

Disaster Planning Revisited: An Update on Recovery Strategies for Uncertain Times
bullet In this presentation, you will explore the challenges of disaster recovery planning during uncertain times of high alert and learn why business enterprises must now reassess disaster planning recovery strategies. The session will touch upon: information storage keeping data and processes secure; the importance of online accessibility to established recovery plans; recent real-world examples of disaster planning and recovery; and how the merger of business processes with technology now mandates new approaches to disaster planning and recovery.
bullet

Harry Ebbighausen

bullet

Note: Large file - Approx. 1 MB; Navigation and search bookmarks in .pdf file are not functional.

bullet

The State of Intrusion Detection
bullet The increased dependence of corporations and government agencies on the Internet as a vehicle for communications and commerce has spawned a proliferation of attacks and misuse of networks worldwide. Threats of attacks are becoming more complex and severe, leaving traditional security measures ill-equipped to manage them. Many companies are turning to Intrusion Detection Systems (IDS) to provide defense in depth. This session will teach you to identify which IDS is right for you, and when and how to deploy it.
bullet

Martin Roesch

bullet

Approx. 190 kB; Navigation and search bookmarks in .pdf file are not functional.

bullet

Getting Down to Business with Security
bullet What does it take to secure your business? How do you justify the allocation of resources? What factors impact risk? This session will guide you through the ins and outs of security management, starting with a description of the "Two A's and Four Disciplines of Security Management" and rounding out with guidance on allocating resources based on anticipated risk and best practices.
bullet

Pete Lindstrom

bullet

Approx. 116 kB; Navigation and search bookmarks in .pdf file are not functional.

bullet

De-Evolution of the Hacker: Past, Present and Future Trends
bullet What forms of cyberterrorism do you need to protect your network from? In this session, an expert from the FBI will discuss emerging technology threats. The instructor will explain the new types of cyberterrorism that are being seen and what defensive measures you can take to ensure that you're not caught off guard.
bullet

David Rhoades

bullet

Note: Large file - Approx. 1.6 MB; Navigation and search bookmarks in .pdf file are not functional.

bullet

Architecting for Secure Network Management
bullet As businesses depend more and more on the Internet, IT management faces complicated challenges in ensuring network security and data integrity. This session will show how to achieve complete data protection within the enterprise. The instructor will map out an architecture that protects against a myriad of threats; he will describe a platform that blends secure connection offload with content acceleration, uses transport layer security (TLS) protocol to enable secure connections between Web clients and backend servers and manages public key certificates, secure content caching and switching. Learn how network and/or security managers can quickly and cost-effectively implement a secure networking platform that incorporates and automates sound security principles.
bullet

Rod Murchison

bullet

Approx. 676 kB; Navigation and search bookmarks in .pdf file are not functional.

 

Return to COMNET 2003 Home Page

 

Return to Security Webtorials

 

Please note: By downloading this information, you acknowledge that the sponsor(s) of this information may contact you, providing that they give you the option of opting out of further communications from them concerning this information.  Also, by your downloading this information, you agree that the information is for your personal use only and that this information may not be retransmitted to others or reposted on another web site.  Please encourage colleagues to download their own copy after registering at http://www.webtorials.com/reg/.

 

All trademarks and COMNET presentation content herein are the property of the respective owners/presenters. All rights reserved.