January Task

Date : 30 January, 2013 1800-2100 hrs
Location : Leslie Dan Pharmacy Building, Room B250, 144 College Street Toronto, Ontario

Talk 1:  The Evolution of the Network Monitoring Switch
Network monitoring security tools are only as good as the traffic they can see.   While previous thinking had many focused on perimeter security, trends like BYOD or USB memory clearly demonstrate not all threats enter through the “front door”.  We can’t only monitor the network ingress/egress points; the zero-trust model tells us we must also manage threats to our internal networks.  The network monitoring challenge is balancing the need for increased monitoring points against the cost of more tools.
This presentation will present a strategy to functionally monitor more of your network while leveraging your existing tools.  The enabler is an evolving technology called a Network Monitoring Switch that provides increased network visibility for tool optimization.  While the technology is tool agnostic, it equally applies to security tools like intrusion detection systems, data recorders, or malware analyzers; or even network/application performance monitoring tools.

The speaker, Clay Wesenberg, is a senior system engineer with Ixia | Anue where he works with enterprise, government, and service providers to optimize network tool deployments.   Prior to this, his career has been closely linked to leveraging tools for increased productivity and resource availability.  He has worked at and consulted with various NEMs (Network Equipment Manufacturers) and network/application tool companies.


Talk 2:  Security Threat Landscape Update: Best Practices for BYOD – Bring Your Own Devices/Darlings to Work !”
Today’s threat landscape is evolving radically and BYOD (Bring Your Own Device) has become all the rage. Social networks and mobile computing are opening up new security vulnerabilities and personal sites and blogs were found to be unwitting hosting grounds for malware, according to the latest Internet Security Threat Report Vol 17. Mobile phone OS vulnerabilities have also nearly doubled since 2010. Learn more about the changing threat landscape and security gaps, and discover how to effectively protect your organization against today’s threats and risks and how to make your BYOD initiative a success with the best practices.

The speaker, Sangameswaran Manikkayam Iyer, is a Sr. Security Specialist with Symantec Canada. He brings with him over 15 years of industry experience in Information Security and Risk in large projects involving infrastructure software and emerging security technology solutions. He has designed IT solutions targeted in the arena of enterprise security, vulnerability assessment, end-point security enforcement & GRC. He has worked with customers across the globe in diverse verticals including: DoD, government, law enforcement agencies, telecom, banking & finance, transportation, energy and education. He is a qualified security expert with leading industry certifications such as GSEC, CISSP, CISM, CRISC, CCSK and VTSP. He has also presented on diverse topics at various security forums and was invited by Interpol to speak at the International Cyber security Conference held in New Delhi, India. Sangameswaran obtained his B.Tech in Electronics & Communication Engineering from University of Calicut and an MBA in Systems & Marketing from TSM.
Source: task

 

 

Posted in Events.