Held: Jul 08 2010 6:00 am
Presenting: Mark Henshaw, Director ISACA London, Chairman ISACA Winchester
Intrusion Prevention- are we joking?
- When your business is a target, can you really prevent sponsored intrusion?
Held: Jul 08 2010 12:00 pm
Presenting: Mike Fratto; Network Computing, Editor
Before you can prevent an attack, you have to detect it. Traditional signature based IDS's are prone to false positives and can only detect malicious traffic it has signatures for.
When: Jun 03 2010 2:00 pm
Presenting: Dow A. Williamson; SCIPP International, Executive Director, CISSP, CSSLP
From "start-up" through "acquisition & development", "implementation", and "operations & maintenance" to "decommissioning", it's far too easy to lay the responsibility for the secure software life cycle at the feet of the application developers.
12 Jan 2010 4:00 am Presenting Maria Papadaki, University of Plymouth, Lecturer in Network Security
Intrusion Prevention Systems
Held: Jul 08 2010 4:00 pm
Presenting: C. Matthew Curtin, Interhack, Founder
Intrusion prevention technology is understandably focused on using network data to detect and to stop intrusions in progress. When (not if) intrusion prevention systems fail to prevent intrusions, can they provide any value to the management of an incident?
When: Jun 03 2010 12:00 pm
Presenting: Michael Coates; Mozilla, Web Security Engineer
Michael has extensive experience in application security, security code review and penetration assessments. He has conducted numerous security assessments for financial, enterprise and cellular customers world-wide.
12 Jan 2010 6:00 am Presenting Siraj Ahmed Shaikh, Coventry University, Senior Lecturer
Intrusion Detection: Scalability Challenges
Recorded: 28 Jan 2010
Presenting: Dennis Boas, Security Solutions, Enterasys Networks
Abstract: In today's networked world, critical data is stolen in real time. Bots, viruses and denial of service attacks propagate at network speeds. Escalating adoption of wireless, social networking, cloud computing and virtualization technologies increases your security risk. The only effective threat mitigation strategy is an automated real time response that stops the attack and prevents the attacker from trying again. This webinar discusses effective, automated threat mitigation and IPS solutions for enterprise networks and cyber-speed threats.
When: Jun 03 2010 4:00 am
Presenting: Justin Clarke, UK Chapter Leader, OWASP
One of the core difficulties in ensuring your organisation's software development process (whether in-house or outsourced) builds in an appropriate level of security is a lack of research, standards and accepted practice in this area.
12 Jan 2010 10:00 am Presenting Sokratis Katsikas, University of Piraeus, Professor of Digital Systems
A common problem of almost all categories of IDSs is the huge number of alerts they produce and the high percentage of false ones.
When: Jun 04 2010 8:00 am
Presenting: Sebastien Giora, French Chapter Leader, OWASP
The OWASP Top Ten provides a powerful awareness document for web application security. The OWASP Top Ten represents a broad consensus about what the most critical web application security flaws are.
When: May 06 2010 1:00 pm
Presenting: Robert Whiteley, Research Director, Forrester; Chris Witeck, Director of Product Management, SonicWall
Join SonicWall and Forrester Research Director, Robert Whiteley to learn how 2010 will usher in a new wave of investment in mobility technologies among savvy enterprises. Robert Whiteley will discuss findings from Forrester's extensive studies into the work habits and mobility needs of information workers, task workers and a growing class of workers - the "mobile wannabe" - who, together, are making up a larger and larger portion of your workforce.
12 Jan 2010 11:00 am Presenting Heather Axworthy; University of Massachussets,Lead Security Specialist
Introduce Intrusion Prevention, how it works, and best practices for deployment.