Betting Sites Not On Gamstop UK 2025Betting Sites Not On GamstopCasino Not On GamstopNon Gamstop Casinos UKBest Casinos Not On Gamstop
NSS Group logo
Spotlight on� Internet Security

13/14th June 02 - Scotland

St. Andrews Bay Hotel, Fife, Scotland

��������

Should you wish to participate in these reports or would like additional information, please contact [email protected].�
Agenda
Thursday 13th June
10:00 onwards Hospitality desk open for registration. Those who arrive early may take advantage of the opportunity to explore St. Andrews
12:00 - 1:30 pm Lunch
1:30 - 1:40 pm Welcome & Introduction to Internet Security Press Spotlight
1:40 - 2:00 pm Presentation:
Latest Market Forecasts on the Internet Security Sector

The Yankee Group present their latest market forecasts for growth in the internet security sector
2:00 - 2:50 pm Debate: Keeping the Enterprise Network Safe
Analyst Introduction & Chaired by: Bob Walder, Director, NSS Group

There are two ingredients required for state-of-the-art network security: a strong firewall, to keep hackers out, and an effective intrusion detection system, to detect undesirable network traffic that might be generated internally. But even the best firewall and IDS system can't help you if it's misconfigured, or has security flaws of its own. The NSS Group has conducted exhaustive tests on a wide range of leading firewall appliances and IDS software solutions. We'll tell you - and your readers - how well they worked, and share best practices for deploying them safely, securely, and effectively on an enterprise LAN.
2:50 - 3:40 pm Debate: Sorting Through VPN Alternatives
Analyst Introduction & Chaired by: Camille Mendler, Director, The Yankee Group

Everyone seems to be offering VPNs these days. Hardware manufacturers suggest that enterprises just need to buy the right VPN appliances, and all their problems will be solved - or that perhaps they should just install a combination firewall/VPN appliance. Router makers say that their VPN functions do the trick. Carriers want to offer managed point-to-point VPN services, claiming that their offerings are more effective because they don't require customer premises equipment. What's the poor IT manager to do? Buy dedicated hardware, reprogram routers, sign up for a service from the telco? We'll examine the pros and cons of each approach, and offer tested advice for making sure that the VPN is really, truly private.
3:40 - 3:50 pm Coffee & Refreshments
3:50 - 4:05 pm Is Secure E-Commerce Really Secure?
Presentation: Bob Walder, Director, NSS Group

With the growth in use of the Internet for business transactions, the need for confidentiality and positive identification of all parties involved is increasingly vital. Public key cryptography is the perfect solution for ensuring the privacy of data employed in distributed systems of all kinds, but the cost of deploying secret keys for such transactions, however, is high, both in pure financial terms and terms of customer dissatisfaction. And do they work? The NSS Group provides an update to its PKI report which include the evaluation of a wide range of products and services in the public-key infrastructure (PKI) market place, covering PKI software for in-house deployment, managed PKI services, and PKI-related hardware. Do they work? Are they secure? Your readers' business may be riding on these results.
4:05 - 4:45 pm Debate: Identity Management - A Critical Issue for the Next Generation Internet
Identity management is becoming a critical issue for next generation Internet. The authentication and management of up to potentially millions of users breaks down using current technologies which are either too weak or do not scale sufficiently well. Identity management breaks down into 2 camps - Microsoft Passport and Liberty Alliance, although both are now headed in a similar direction as federated identity management models. The task of authenticating within this environment is still critical - technologies in this area include user name and password, tokens, smart cards and biometrics. This panel will discuss identity management models and authentication technologies that support these infrastructures
4:45 - 5:15 pm Debate: Top Emerging Security Risks for 2002 - And Beyond
Is your business really prepared for security problems? Maybe you have firewalls, VPNs, anti-virus software. Passwords have been tightened, intrusion detection systems installed, operating systems and Web browsers patched. Remote users are secured with their own firewalls. Security policies have been reviewed and implemented. Think you're safe? It's what you DON'T know that might hurt you. This panel brings together top experts who can explain where the next enterprise network vulnerabilities will be, and what networks administrators and end users must do to prepare for the next wave of attacks. Can you afford not to find out?
5:15 - 6:30 pm Briefing sessions between press and vendors
7:30 pm Traditional Scottish evening and Entertainment
Friday 14th June
7:00 - 8:00 am

Breakfast 'Open Meetings'

8:00 - 10:00 am

Individually scheduled press briefing sessions between press and vendors

10:00 - 10:15 am Coffee break
10:15 - 12:15 pm

Final set of scheduled one-to-one press briefing sessions with press/analysts

12:20 - 1:20 pm

Lunch

1:20 pm Close of Internet Security Press Spotlight & departures

Previous events:
Nov 2001 - Rome, Italy
Nov 2000 - Monte Carlo, Monaco
Nov 1999 - Carcassonne, France

Send mail to webmaster with questions or�
comments about this web site.

Copyright � 1991-2004 The NSS Group Ltd.
All rights reserved.

Featured sites