wireless network makes information access much easier

Upload: api-6929342

Post on 30-May-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/14/2019 Wireless Network Makes Information Access Much Easier

    1/3

    WWEE SSPPEECCIIAALLIIZZEE IINN IITTNNEETTWWOORRKK

    VVUULLNNEERRAABBIILLIITTYYAASSSSEESSSSMMEENNTT AAUUDDIITT

    Date: August 14, 2008 (Thursday)

    Time: 8:30 AM - 5:30 PM Venue: Tiara Oriental Hotel, 7248 Malugay St., Makati City

    Seminar Description:

    The seminar is a structured program that systematically informs the attendees aboutthe threats to the organizations network. It clearly shows that the security of

    important data or information can be compromised. It also covers the variety ofactivities involved in the how-tos and the proper maintenance and use, as well as the

    disposition of network access.

    The seminar will emphasize the value of having a well-organized and secure network

    resulting in a safer and more efficient operation. It will also boost the integrity of your

    network, promoting a sense of security and peace of mind.

    Specific Objectives:

    At the end of the one-day seminar, participants will be able to:

    1. Indentify the priority of raising corporate-wide awareness of the need to protectinformation.

    2. Fully understand the exposure level to losses caused by information securitybreaches.

    3. Develop policies for a comprehensive implementation of security based on generallyaccepted standards.

    4.Comprehend the rationale of applying network security solutions to keep theintegrity of information.

    5. Know how to implement and sustain the network security programs.6. Realize the fact that the weakest link in any security program could be a poorly

    trained employee.

    Who Should Attend This Seminar?

    1. CEO/COO/President2. CIO3. CTO4. IT Directors5. IT Managers6. IT Security Officers/Administrators/Analysts/Engineers7. IT Consultants8. IT Auditors9. IT Forensic Officers10.Network Administrators/Analysts/Engineers11.System Programmers/Architects/Administrators/Analysts12.Owners/Entrepreneurs who have IT networks

    BBIITTSSHHIIEELLDD SSeeccuurriittyy CCoonnssuullttiinngg,, IInncc

    Tel: 466-1307, 466-1308Fax: 893-8527Call/Text: 0906 802 8273

    0928 946 5381Email:[email protected]

    [email protected]

    ARE YOU SAFE AND SECURE?An introduction to IT Security Seminar towards understanding the

    vulnerabilities of network and the safety of precious

    data/information/trade secrets

    WWaattcchh oouutt ffoorr

    uuppccoommiinngg BBIITTSSHHIIEELLDDeevveennttss oonn mmoosstt

    eeffffeeccttiivvee IITT SSeeccuurriittyySSoolluuttiioonnss aavvaaiillaabbllee

    ttooddaayy!!

    RRiisskk AAsssseessssmmeennttVVuullnneerraabbiilliittyyAAsssseessssmmeennttPPeenneettrraattiioonn TTeessttiinnggSSeeccuurriittyy PPoolliicciieess aannddPPrroocceedduurreessDDeevveellooppmmeennttRReegguullaattoorryy CCoommpplliiaanncceeSSeerrvviicceessSSeeccuurriittyy AArrcchhiitteeccttuurreeDDeessiiggnn

    SSeeccuurriittyy EEdduuccaattiioonn aannddTTrraaiinniinngg

    mailto:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]
  • 8/14/2019 Wireless Network Makes Information Access Much Easier

    2/3

  • 8/14/2019 Wireless Network Makes Information Access Much Easier

    3/3

    About The Speakers:

    Module 1: Enterprise Security combines organizational, physical and information security in a corporateenvironment. Security involves prevention, detection, response, monitoring and review measures toreduce perceived risks to acceptable levels.

    Muhammad Islam,Master of IT, CEH (Certified Ethical Hacker), ECSA (EC-Certified Security Analyst)

    With almost 10 years of experience in designing networks and IT Security InfrastructureWith extensive knowledge and hands-on experience on Information Security for mission criticalenvironments

    Implemented high-end Security Products & Policies based on ISO 17799 & BS 7799 standards for morethan 25 enterprises & various mid-level enterprises all around the worldAwarded as Master of IT by Juniper Networks in 2006,http://www.masterofit.net

    Has been in consulting for various products like: Cisco Security Appliances, UTM Appliances (Firewall,IDS, AntiSPAM, Antivirus), Astaro Security Linux Appliances, etc., Juniper, Snort / SAM / ACID to name afew

    "Mr. Islam is something of an expert when it comes to evaluating security products."

    - Juniper Networks, 2006

    Module 2: Wireless Within Corporate Network - Being connected to a wireless network makes informationaccess much easier but making the network more susceptible to risks. Range of measures must beimplemented and security practices must be observed.

    Darwin B. Luzuriaga,ECE

    With over 7 years of extensive hands-on experience in telecommunications industryWith certifications on Cisco Advanced Wireless LAN Field Specialist, Cisco Certified Network Associate and

    Certified Internet ProfessionalHas been trained on Licensed Penetration Tester, Vulnerability Assessment, Certified Ethical Hacking andCountermeasures, Computer Hacking Forensics Investigator and Drive-By Pharming

    Has vast knowledge and experience in wireless networkingHas been a resource speaker and trainer for various wireless networking trainings and seminars

    Module 3: Information Leakage occurs when a website reveals sensitive data which may aid an attacker in

    exploiting the system. While leakage does not necessarily represent a breach in security, it does givean attacker useful guidance for future exploitation.

    Wilbert B. Ontoy,CEH (Certified Ethical Hacker), CISSP (Certified Information Systems Security Professional),

    MCTS (Microsoft Certified Technology Specialist)

    Has spent over a decade as a consultant and trainer, delivering solutions to tens of thousands of ITprofessionals from the most prestigious organizations and corporations around the worldHas been involved in the design, implementation, and evaluation of data communications,internetworking, security, and network management products for over 20 yearsHas advised companies large and small regarding security needs, product assessment, and the use ofemerging technologies and best practices

    Proficient in Vulnerability and other security research, VPN, SSL and other security protocols andtopology, Firewalls and IDS TCP/IP implementation, Vulnerability Assessment, Penetration Testing, RiskAssessment and Analysis, Disaster Recovery, Data and Databases advanced security

    http://www.masterofit.net/http://www.masterofit.net/http://www.masterofit.net/http://www.masterofit.net/