Betting Sites Not On Gamstop UK 2025Betting Sites Not On GamstopCasino Not On GamstopNon Gamstop Casinos UKBest Casinos Not On Gamstop
NSS Group logo
Spotlight on� Internet Security

29/30 November 2001, Rome

Grand Hotel Plaza, Via Del Corso 126, 00186 Rome, Italy

��������
Should you wish to participate in these reports or would like additional information, please contact [email protected].�
Agenda
Thursday 29th November
10:00 onwards Welcome desk open for registration
1:00 pm Welcome drinks & lunch
2:30-2:35 pm Welcome & Introduction, NetEvents,
2:35-3:05 pm Round Table 1 - "Combating the DDOS Attack"
Chaired by the NSS Group

With Distributed Denial of Service (DDOS) attacks on the increase, it is becoming more and more difficult to protect against them. And the victims are twofold - the target of the attack obviously suffers, but those machines that are used as "zombies" are also affected.

Who is to blame? The user, for allowing a zombie to be installed? The security administrator, for not preventing such incursions at the network perimeter? Or the ISP, for not filtering traffic effectively before it gets to our gateway? What can the ISP do once a DDOS attack has swamped our bandwidth? Could ISPs be more proactive in stopping DDOS attacks altogether?

Or perhaps the ISP would maintain that it is entirely our responsibility. In which case, how effective are perimeter firewalls, personal firewalls, anti virus mechanisms and Intrusion Detection Systems at protecting us against full-blown attacks, or the insertion of zombies onto our networks?

3:05-3:35 pm Round Table II - "Battle of the Virtual Private Networks"
Chaired by Michael Howard, Founder and Principal Analyst,
Infonetics Research, Inc.

It's like two freight trains heading for each other at top speed. IPsec has been the protocol of choice for virtual private networking, guaranteeing cryptographic authentication of each end of the VPN tunnel to each other, as well as encrypting the data traffic so that spies can't tap into or spoof critical business data. But then comes along MPLS, or Multi Protocol Label Switching, which brings ATM-like quality of service and circuit-based routing to the carrier networks and, someday, perhaps to the public Internet. MPLS may not have built-in encryption and authentication methods, but it does have the advantage of robust traffic engineering, genuine quality of service, and the ability to turn a non-deterministic IP network into the model of efficiency and reliability. MPLS, heavily promoted by router vendors like Juniper and Cisco, is tailor made for helping carriers provision VPNs. But what about companies like CheckPoint, Avaya, Alcatel, and others, who have been successfully selling their IPsec-based VPN gear into enterprises and carriers? They're arguing that MPLS isn't secure enough, and that everyone should stick with the tried-and-true IPsec technology. The carriers are caught in the middle, and customers are confused. We'll dig down and discover the truth.

3:35-3:55 pm Coffee break
3:55-4:25 pm

Round Table III - "Wire Speed Security"
Chaired by the NSS Group

Networks are getting faster, yet some security products seem rooted in the days of 10Mbit Ethernet. Whilst such products are fine when all they have to address is a slow Internet connection, they must also be able to handle 100Mbit or even 1000Mbit LANs when installed on an intranet.

How much of a problem is a firewall that only has 100Mbit throughput when installed on a Gigabit backbone? How effective is an IDS that cannot handle a heavily loaded Fast Ethernet segment? Does it matter if packets are dropped, attacks are missed? Is it possible to perform true wire-speed analysis up to Gigabit speeds or should we always bank on having to install multiple IDS engines to cope with such situations?

The NSS Group will present the findings of its latest IDS Group Test, where intrusion detection products were put through their paces on heavily loaded high speed networks.

4:25-4:55 pm Round Table IV - "Mobile/Wireless Security Issues"
Chaired by the NSS Group

The whole world is going wireless, it seems. But what is the effect on security? The mobile user has always presented a challenge to the security administrator, but just as we get to grips with securing remote connections from a few laptops to head office, along comes the Internet-enabled PDA. And, of course, the smart phone.

Now everyone wants access from their own hand-held device. What sort of management and security challenges does this present? How easy is it to hack into our PDAs? Does the "always on" nature of the next generation mobile phones present a hacker with an easy route into our corporate data? Is Bluetooth a hacker's dream? How soon will we need firewalls and AV scanners on our mobile phones? And how quickly can the software vendors oblige?

4:55-5:55 pm Afternoon tea and Press 'Open Meeting' session.
7:00 pm

Pre-dinner cocktail reception

7:15 pm Dinner
Friday 30th November
7:30-8:30 am Breakfast 'Open Meetings'
8:30-10:20 am Three individually scheduled press briefing sessions for each vendor
10:20-10:40 am Coffee break
10:40-12:40 pm Final three scheduled one-to-one press briefing sessions with vendors
12:40 pm Lunch
2:00 pm Close of Internet Security Press Spotlight

Click here to view Past Events

Send mail to webmaster with questions or�
comments about this web site.

Copyright � 1991-2002 The NSS Group.
All rights reserved.

Featured sites