wireless network makes information access much easier
TRANSCRIPT
-
8/14/2019 Wireless Network Makes Information Access Much Easier
1/3
WWEE SSPPEECCIIAALLIIZZEE IINN IITTNNEETTWWOORRKK
VVUULLNNEERRAABBIILLIITTYYAASSSSEESSSSMMEENNTT AAUUDDIITT
Date: August 14, 2008 (Thursday)
Time: 8:30 AM - 5:30 PM Venue: Tiara Oriental Hotel, 7248 Malugay St., Makati City
Seminar Description:
The seminar is a structured program that systematically informs the attendees aboutthe threats to the organizations network. It clearly shows that the security of
important data or information can be compromised. It also covers the variety ofactivities involved in the how-tos and the proper maintenance and use, as well as the
disposition of network access.
The seminar will emphasize the value of having a well-organized and secure network
resulting in a safer and more efficient operation. It will also boost the integrity of your
network, promoting a sense of security and peace of mind.
Specific Objectives:
At the end of the one-day seminar, participants will be able to:
1. Indentify the priority of raising corporate-wide awareness of the need to protectinformation.
2. Fully understand the exposure level to losses caused by information securitybreaches.
3. Develop policies for a comprehensive implementation of security based on generallyaccepted standards.
4.Comprehend the rationale of applying network security solutions to keep theintegrity of information.
5. Know how to implement and sustain the network security programs.6. Realize the fact that the weakest link in any security program could be a poorly
trained employee.
Who Should Attend This Seminar?
1. CEO/COO/President2. CIO3. CTO4. IT Directors5. IT Managers6. IT Security Officers/Administrators/Analysts/Engineers7. IT Consultants8. IT Auditors9. IT Forensic Officers10.Network Administrators/Analysts/Engineers11.System Programmers/Architects/Administrators/Analysts12.Owners/Entrepreneurs who have IT networks
BBIITTSSHHIIEELLDD SSeeccuurriittyy CCoonnssuullttiinngg,, IInncc
Tel: 466-1307, 466-1308Fax: 893-8527Call/Text: 0906 802 8273
0928 946 5381Email:[email protected]
ARE YOU SAFE AND SECURE?An introduction to IT Security Seminar towards understanding the
vulnerabilities of network and the safety of precious
data/information/trade secrets
WWaattcchh oouutt ffoorr
uuppccoommiinngg BBIITTSSHHIIEELLDDeevveennttss oonn mmoosstt
eeffffeeccttiivvee IITT SSeeccuurriittyySSoolluuttiioonnss aavvaaiillaabbllee
ttooddaayy!!
RRiisskk AAsssseessssmmeennttVVuullnneerraabbiilliittyyAAsssseessssmmeennttPPeenneettrraattiioonn TTeessttiinnggSSeeccuurriittyy PPoolliicciieess aannddPPrroocceedduurreessDDeevveellooppmmeennttRReegguullaattoorryy CCoommpplliiaanncceeSSeerrvviicceessSSeeccuurriittyy AArrcchhiitteeccttuurreeDDeessiiggnn
SSeeccuurriittyy EEdduuccaattiioonn aannddTTrraaiinniinngg
mailto:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected] -
8/14/2019 Wireless Network Makes Information Access Much Easier
2/3
-
8/14/2019 Wireless Network Makes Information Access Much Easier
3/3
About The Speakers:
Module 1: Enterprise Security combines organizational, physical and information security in a corporateenvironment. Security involves prevention, detection, response, monitoring and review measures toreduce perceived risks to acceptable levels.
Muhammad Islam,Master of IT, CEH (Certified Ethical Hacker), ECSA (EC-Certified Security Analyst)
With almost 10 years of experience in designing networks and IT Security InfrastructureWith extensive knowledge and hands-on experience on Information Security for mission criticalenvironments
Implemented high-end Security Products & Policies based on ISO 17799 & BS 7799 standards for morethan 25 enterprises & various mid-level enterprises all around the worldAwarded as Master of IT by Juniper Networks in 2006,http://www.masterofit.net
Has been in consulting for various products like: Cisco Security Appliances, UTM Appliances (Firewall,IDS, AntiSPAM, Antivirus), Astaro Security Linux Appliances, etc., Juniper, Snort / SAM / ACID to name afew
"Mr. Islam is something of an expert when it comes to evaluating security products."
- Juniper Networks, 2006
Module 2: Wireless Within Corporate Network - Being connected to a wireless network makes informationaccess much easier but making the network more susceptible to risks. Range of measures must beimplemented and security practices must be observed.
Darwin B. Luzuriaga,ECE
With over 7 years of extensive hands-on experience in telecommunications industryWith certifications on Cisco Advanced Wireless LAN Field Specialist, Cisco Certified Network Associate and
Certified Internet ProfessionalHas been trained on Licensed Penetration Tester, Vulnerability Assessment, Certified Ethical Hacking andCountermeasures, Computer Hacking Forensics Investigator and Drive-By Pharming
Has vast knowledge and experience in wireless networkingHas been a resource speaker and trainer for various wireless networking trainings and seminars
Module 3: Information Leakage occurs when a website reveals sensitive data which may aid an attacker in
exploiting the system. While leakage does not necessarily represent a breach in security, it does givean attacker useful guidance for future exploitation.
Wilbert B. Ontoy,CEH (Certified Ethical Hacker), CISSP (Certified Information Systems Security Professional),
MCTS (Microsoft Certified Technology Specialist)
Has spent over a decade as a consultant and trainer, delivering solutions to tens of thousands of ITprofessionals from the most prestigious organizations and corporations around the worldHas been involved in the design, implementation, and evaluation of data communications,internetworking, security, and network management products for over 20 yearsHas advised companies large and small regarding security needs, product assessment, and the use ofemerging technologies and best practices
Proficient in Vulnerability and other security research, VPN, SSL and other security protocols andtopology, Firewalls and IDS TCP/IP implementation, Vulnerability Assessment, Penetration Testing, RiskAssessment and Analysis, Disaster Recovery, Data and Databases advanced security
http://www.masterofit.net/http://www.masterofit.net/http://www.masterofit.net/http://www.masterofit.net/