|
Microsoft - Agilent Security BoF
25 Feb 2004, Kuala Lumpur, Malaysia
Securing your system is becoming an urgent
concern in today's world. The threat of attacks on your system, though
hackers, worm & virus attacks is growing daily. Securing your IP system
can appear to be a daunting prospect. We see there are 2 steps to the
process
" Designing a secure network infrastructure
" Designing secure operational procedures
" Designing a secure system can include many steps.
Firstly you need to establish what services you need to secure. Finding
a security appliance vendor, or vendors can be an arduous process, especially
if you need evaluate vendors' equipment for functionality and performance.
Performance figures can affect the degree of fit out in your network.
Too few firewalls may introduce bottlenecks, and too many may blow your
budget. Finally, after you assemble your secured network, does its work.
Designing operational procedures are important.
Even with a secure network, it only takes 1 infected user to bring down
your trusted network. How do you establish procedures to ensure that users
are screened before they are connected to the trusted network. How do
you ensure that users' machines have the latest patches to protect them
from new attacks.
In this BoF session Agilent and Microsoft join with you to discuss these
2 aspects to securing your network, and more importantly, hear what you
are experiencing as you go through the process of in securing your networks.
We'll kick off with a short presentation from Agilent on evaluating security
appliances, and established systems.
Microsoft will then talk about operational procedures for maintaining
the hard fought for, secure system.
But, mainly we want to hear from you.....your experiences in going through
this process is what drives our product development, and we can all learn
from what people have been through in securing their systems.
Security Testing BoF gathers people from the region struggling with the
task of securing their networks
" To share experiences
" To share best practices
" To find ways to help out
Agenda
1800-1805: Agenda bashing (5mins)
1805-1810: Welcome and Introduction (5mins)
Presentations (30mins each)
1810-1840 Evaluating security network equipment, and testing
secured systems
Anthony Adamo, Agilent Technologies
1840-1900 Implementing secure procedures in IP systems - Meng Chow Kang,
Microsoft
1900-2000 Open Discussion
|