This page contains a Flash digital edition of a book.
TRACK SESSIONS TRACK SESSIONS
HOSTS (CONTINuED) NETWORKS (CONTINuED)
Printing and Data Security, Day: Tuesday 28th October Use of Deep Packet Inspection in Day: Monday 27th October
an Often Overlooked Vulnerability
Start: 17.15 End: 18.15 ID: HOST-208
Network-Based Security Appliances
Start: 16.00 End: 17.00 ID: NET-108
Network data fl owing to a printer is often in cleartext and
Bob Rasmussen, President,
Computer security threats have moved from TCP/IP attacks to the
Klaus Mochalski, CEO, Ipoque
vulnerable to sniffi ng. Sensitive printouts sitting in a printer output
Rasmussen Software, Inc.
application layer. The session discusses the application of DPI
tray can be seen by unauthorised parties and multi-function (deep packet inspection) in network-based security appliances
printers are subject to hacking. This session presents an overview
IT
that have emerged to counter these threats and describes
of issues, techniques for security in printing, and unmet needs. the challenges associated with doing DPI at current network
IT
bandwidths for dozens of complex layer 7 protocols.
How Virtualisation Impacts Audit & Compliance Day: Wednesday 29th October
Virtualisation is showing extremely compelling ROI and the ability
Start: 09.00 End: 10.00 ID: HOST-301
Don’t Be Blind, Use Network Telemetry Day: Wednesday 29th October
to transform the way corporate IT provisions and administers not
John Suit, Principal Founder & Chief
and Flow Analysis to Detect Attacks
Start: 09.00 End: 10.00 ID: NET-301
only the data centre but the user desktop experience. This session
Technology Offi cer, Fortisphere
Routers and switches collect a wealth of information about network
discusses the challenges to IT compliance enterprises should
Eric Vyncke, Distinguished Engineer,
traffi c. This fl ow information (NetFlow or IPFIX) can be analysed
consider when thinking about the mapping of policy, guidance
Cisco Systems
IT
to detect network behaviour anomalies, such as denial of service
and resulting controls through the layers of virtualisation.
or worm propagation. This session explains the deployment of this
IT
telemetry with real case examples and cost analysis.
Virtual HIPS are Growing - Whether You Like It, or Not Day: Wednesday 29th October
The dynamic nature of virtualised environments presents new
Start: 10.30 End: 11.30 ID: HOST-302
NAC 2.0 - Unifying Network Security Day: Wednesday 29th October
challenges for intrusion prevention. This session analyses three
Brian O’Higgins, CTO, Third Brigade
As today’s high-performance businesses leverage IT as a strategic
Start: 10.30 End: 11.30 ID: NET-302
approaches to virtualised intrusion prevention, including host
competitive asset, access to networks and applications must
intrusion prevention systems (HIPS). It discusses the advantages
be pervasive yet secure and controlled. The mission of Network
Steve Hanna, Co-Chair,
and disadvantages in the management and architecture of each
Access Control (NAC) has evolved beyond simply managing
Trusted Network Connect Work Group,
approach and includes attack demonstrations on virtual machines.
S
network access and ensuring endpoint policy assessment.
Trusted Computing Group IT
Virtualisation: Floor Wax, Dessert Topping & Day: Wednesday 29th October
Don’t Bother About IPv6? Beware: Day: Wednesday 29th October
the End of Network Security As We Know It
Start: 11.45 End: 12.45 ID: HOST-303 It is Already in Your Network!
Start: 11.45 End: 12.45 ID: NET-303
Virtualisation impacts every aspect of information security today.
Christofer Hoff, Chief Architect, Security
IPv6 is the next generation of IPv4 and is already enabled by default
Blurring the lines of operational responsibility and obfuscating visibility
Eric Vyncke, Distinguished Engineer,
Innovation, Unisys
in several OS: Microsoft Vista, Linux, etc. Transition mechanisms are
from security at both host and network layers, virtualisation questions
Cisco Systems
also in place and allow IPv6 to run into tunnels over your existing IPv4
how and where we invest and how security architectures must
IT
network. This session explains the transition mechanisms, the threats
TF
change to embrace this disruptive force in our data centres.
and proposes mitigation techniques.
NETWORKS
PRoFESSIonAL DEVELoPMEnT
Regardless of Tips on Reducing IDS/IPS Deployment Complexities Day: Monday 27th October
Learn about Managing Your Own Security Career Day: Monday 27th October
communications
and Risks - Using Real-Life Case Studies
Start: 11.30 End: 12.30 ID: NET-105
individuals’ technical
Careers in information security are diffi cult to navigate with the
media (wired – copper,
Start: 11.30 End: 12.30 ID: PROF-105
As security vendors continue to provide solutions to counter
and business/
industry changing more and more radically every year.
fi ber optic; wireless –
Hemendra Godbole, Sr. Product
new threats, customers with fi nite IT and security resources
management
This session addresses important skills, traits and knowledge
Chris Batten, Managing Director, Acumin
Bluetooth, IR, 802.11x,
Manager, IPS Solutions, NOKIA
face growing concerns about the evaluation, deployment and
training and career
that a security professional needs – not just the usual stuff (like
satellite), network-level
management of emerging solutions. This session presents a
development, as well
“get certifi ed”) - but real-world knowledge that will get you a job
security devices and
ApD
network security approach designed to close the gap between
IT
as staff and personnel
that keeps you challenged, growing and well compensated.
issues (fi rewalls, IDS/
rising complexity and resource constraints.
management in
IPS), interconnectivity
the Professional
devices (routers,
Professional Concern: Day: Monday 27th October
switches, hubs),
VoIP Threats & Countermeasures Day: Monday 27th October
Development track.
Information Security in a Flat World
Start: 13.15 End: 14.15 ID: PROF-106
protocols and trends
For VoIP to thrive, it must be secured. As hackers become savvier
Start: 13.15 End: 14.15 ID: NET-106 Tom Friedman’s best selling book “The World is Flat”, tells us
John O’Leary, President,
will be examined in
to VoIP, expect VoIP attacks and threats to increase. This session
Click here for all
David Endler, Senior Director of Security
Track Session
that innovations and connectivity have levelled the playing fi eld
O’Leary Management Education
this track.
highlights present and near-term security threats to VoIP, as well as
for businesses worldwide. But what of security in this fl at world?
a longer-term projection of things to come. It also discusses what
Research, TippingPoint
IT
information
We use actual examples to examine issues and give you practical
approaches for dealing with fl at world security.
bF
Click here for all
the VoIP Security Alliance is doing to help address these threats.
Track Session
information
Enterprise Hidden Threats Exposed Day: Monday 27th October
You’ve Got a Security Credential - Now What? Day: Monday 27th October
- Inspecting Encrypted Communications
Start: 14.30 End: 15.30 ID: NET-107
What does it mean to you? What does it mean to your
Start: 14.30 End: 15.30 ID: PROF-107
SSL - the ubiquitous choice to secure web-based transactions,
Daniel Proch, Director, Product
organisation? How does the HR / recruitment industry view
email and VPNs - has become a favourite vehicle for infi ltrating
your credentials? What is happening on the regulatory front
Dave Cullinane, CISO, eBay
Management, Netronome Systems
corporate computing resources. Security applications and
ApD
with regards to credentials?
appliances are blind to the contents of SSL encrypted fl ows.
The session discusses how SSL is used to hide spam, spyware
IT
RE
G
IS
TE
R
b
y
and viruses and describes ways to combat this threat.
Ethical Dilemma: Welcome Back Hackers Day: Monday 27th October
This session puts an end to a general, fundamental misconception
Start: 16.00 End: 17.00 ID: PROF-108
26
TH
S
EP
T
EM
B
E
R
1
0
0
RE
G
regarding hackers, their motivation and the value of their work.
& S
A
v
E £
N
IS
TE
OW
R Armin Graefe, Secu Security Cononssuulltant,
Profi Engineering Systems AG
ICpD
Register now at www.rsaconference.com/2008/europe/pb1
CL
ICK
H
E
R
E
by 26th September and save £100 off the Full Conference standard registration rate
Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18
Produced with Yudu - www.yudu.com. Publish online for free with YUDU Freedom - www.yudufreedom.com.