REGISTER

Information Security

ISACA

Held: Jul 08 2010 6:00 am

Presenting: Mark Henshaw, Director ISACA London, Chairman ISACA Winchester

Intrusion Prevention- are we joking?
- When your business is a target, can you really prevent sponsored intrusion?

NetworkComputing

Held: Jul 08 2010 12:00 pm

Presenting: Mike Fratto; Network Computing, Editor

Before you can prevent an attack, you have to detect it. Traditional signature based IDS's are prone to false positives and can only detect malicious traffic it has signatures for.

SCIPP International

When: Jun 03 2010 2:00 pm

Presenting: Dow A. Williamson; SCIPP International, Executive Director, CISSP, CSSLP

From "start-up" through "acquisition & development", "implementation", and "operations & maintenance" to "decommissioning", it's far too easy to lay the responsibility for the secure software life cycle at the feet of the application developers.

systemsov

12 Jan 2010 4:00 am Presenting Maria Papadaki, University of Plymouth, Lecturer in Network Security

Intrusion Prevention Systems

Interhack

Held: Jul 08 2010 4:00 pm

Presenting: C. Matthew Curtin, Interhack, Founder

Intrusion prevention technology is understandably focused on using network data to detect and to stop intrusions in progress. When (not if) intrusion prevention systems fail to prevent intrusions, can they provide any value to the management of an incident?

Mozilla

When: Jun 03 2010 12:00 pm

Presenting: Michael Coates; Mozilla, Web Security Engineer

Michael has extensive experience in application security, security code review and penetration assessments. He has conducted numerous security assessments for financial, enterprise and cellular customers world-wide.

12 Jan 2010 6:00 am Presenting Siraj Ahmed Shaikh, Coventry University, Senior Lecturer

Intrusion Detection: Scalability Challenges

enterasyslogo

Recorded: 28 Jan 2010

Presenting: Dennis Boas, Security Solutions, Enterasys Networks

Abstract: In today's networked world, critical data is stolen in real time. Bots, viruses and denial of service attacks propagate at network speeds. Escalating adoption of wireless, social networking, cloud computing and virtualization technologies increases your security risk. The only effective threat mitigation strategy is an automated real time response that stops the attack and prevents the attacker from trying again. This webinar discusses effective, automated threat mitigation and IPS solutions for enterprise networks and cyber-speed threats.

OWASP

When: Jun 03 2010 4:00 am

Presenting: Justin Clarke, UK Chapter Leader, OWASP

One of the core difficulties in ensuring your organisation's software development process (whether in-house or outsourced) builds in an appropriate level of security is a lack of research, standards and accepted practice in this area.

reducingfp

12 Jan 2010 10:00 am Presenting Sokratis Katsikas, University of Piraeus, Professor of Digital Systems

A common problem of almost all categories of IDSs is the huge number of alerts they produce and the high percentage of false ones.

OWASP

When: Jun 04 2010 8:00 am

Presenting: Sebastien Giora, French Chapter Leader, OWASP

The OWASP Top Ten provides a powerful awareness document for web application security. The OWASP Top Ten represents a broad consensus about what the most critical web application security flaws are.

SonicWall

When: May 06 2010 1:00 pm

Presenting: Robert Whiteley, Research Director, Forrester; Chris Witeck, Director of Product Management, SonicWall

Join SonicWall and Forrester Research Director, Robert Whiteley to learn how 2010 will usher in a new wave of investment in mobility technologies among savvy enterprises. Robert Whiteley will discuss findings from Forrester's extensive studies into the work habits and mobility needs of information workers, task workers and a growing class of workers - the "mobile wannabe" - who, together, are making up a larger and larger portion of your workforce.

insandouts

12 Jan 2010 11:00 am Presenting Heather Axworthy; University of Massachussets,Lead Security Specialist

Introduce Intrusion Prevention, how it works, and best practices for deployment.

Log in

Please Login to download this file

Username *
Password *
Remember Me
Go to top