Agenda
Thursday
13th June |
10:00 onwards |
Hospitality desk open for
registration. Those who arrive early may take advantage of the
opportunity to explore St. Andrews |
12:00 - 1:30
pm |
Lunch |
1:30 - 1:40 pm |
Welcome
& Introduction to Internet Security Press Spotlight |
1:40 - 2:00 pm |
Presentation:
Latest Market Forecasts on the Internet Security Sector
The Yankee Group present their latest market forecasts for growth
in the internet security sector |
2:00 - 2:50 pm |
Debate:
Keeping the Enterprise Network Safe
Analyst Introduction & Chaired by: Bob Walder, Director,
NSS Group
There are two ingredients required for state-of-the-art network
security: a strong firewall, to keep hackers out, and an effective
intrusion detection system, to detect undesirable network traffic
that might be generated internally. But even the best firewall and
IDS system can't help you if it's misconfigured, or has security
flaws of its own. The NSS Group has conducted exhaustive tests on
a wide range of leading firewall appliances and IDS software
solutions. We'll tell you - and your readers - how well they
worked, and share best practices for deploying them safely,
securely, and effectively on an enterprise LAN. |
2:50 - 3:40 pm |
Debate:
Sorting Through VPN Alternatives
Analyst Introduction & Chaired by: Camille Mendler,
Director, The Yankee Group
Everyone seems to be offering VPNs these days. Hardware
manufacturers suggest that enterprises just need to buy the right
VPN appliances, and all their problems will be solved - or that
perhaps they should just install a combination firewall/VPN
appliance. Router makers say that their VPN functions do the
trick. Carriers want to offer managed point-to-point VPN services,
claiming that their offerings are more effective because they
don't require customer premises equipment. What's the poor IT
manager to do? Buy dedicated hardware, reprogram routers, sign up
for a service from the telco? We'll examine the pros and cons of
each approach, and offer tested advice for making sure that the
VPN is really, truly private. |
3:40 - 3:50 pm |
Coffee &
Refreshments |
3:50 - 4:05 pm |
Is
Secure E-Commerce Really Secure?
Presentation: Bob Walder, Director, NSS Group
With the growth in use of the Internet for business transactions,
the need for confidentiality and positive identification of all
parties involved is increasingly vital. Public key cryptography is
the perfect solution for ensuring the privacy of data employed in
distributed systems of all kinds, but the cost of deploying secret
keys for such transactions, however, is high, both in pure
financial terms and terms of customer dissatisfaction. And do they
work? The NSS Group provides an update to its PKI report which
include the evaluation of a wide range of products and services in
the public-key infrastructure (PKI) market place, covering PKI
software for in-house deployment, managed PKI services, and PKI-related
hardware. Do they work? Are they secure? Your readers' business
may be riding on these results. |
4:05 - 4:45 pm |
Debate:
Identity Management - A Critical Issue for the Next Generation
Internet
Identity management is becoming a critical issue for next
generation Internet. The authentication and management of up to
potentially millions of users breaks down using current
technologies which are either too weak or do not scale
sufficiently well. Identity management breaks down into 2 camps -
Microsoft Passport and Liberty Alliance, although both are now
headed in a similar direction as federated identity management
models. The task of authenticating within this environment is
still critical - technologies in this area include user name and
password, tokens, smart cards and biometrics. This panel will
discuss identity management models and authentication technologies
that support these infrastructures |
4:45 - 5:15 pm |
Debate:
Top Emerging Security Risks for 2002 - And Beyond
Is your business really prepared for security problems? Maybe you
have firewalls, VPNs, anti-virus software. Passwords have been
tightened, intrusion detection systems installed, operating
systems and Web browsers patched. Remote users are secured with
their own firewalls. Security policies have been reviewed and
implemented. Think you're safe? It's what you DON'T know that
might hurt you. This panel brings together top experts who can
explain where the next enterprise network vulnerabilities will be,
and what networks administrators and end users must do to prepare
for the next wave of attacks. Can you afford not to find out? |
5:15 - 6:30 pm |
Briefing
sessions between press and vendors |
7:30 pm |
Traditional
Scottish evening and Entertainment |
Friday
14th June |
7:00 - 8:00 am |
Breakfast 'Open Meetings'
|
8:00 - 10:00 am |
Individually scheduled press
briefing sessions between press and vendors
|
10:00 - 10:15
am |
Coffee break |
10:15 - 12:15
pm |
Final set of scheduled one-to-one
press briefing sessions with press/analysts
|
12:20 - 1:20
pm |
Lunch
|
1:20 pm |
Close of Internet Security Press
Spotlight & departures |
Previous events:
Nov
2001 - Rome, Italy
Nov 2000 -
Monte Carlo, Monaco
Nov 1999 -
Carcassonne, France
|