HOSTS
VENUE
PROGRAM
CALL FOR PAPERS
FELLOWSHIP
ABOUT APRICOT
PAST APRICOTS
ABOUT MALAYSIA
ENTERING MALAYSIA
TRANSPORTATION
ACCOMMODATIONS
SIGHT-SEEING
SITEMAP

APRICOT

APNIC 17

Microsoft - Agilent Security BoF
25 Feb 2004, Kuala Lumpur, Malaysia

Securing your system is becoming an urgent concern in today's world. The threat of attacks on your system, though hackers, worm & virus attacks is growing daily. Securing your IP system can appear to be a daunting prospect. We see there are 2 steps to the process

" Designing a secure network infrastructure
" Designing secure operational procedures
" Designing a secure system can include many steps.

Firstly you need to establish what services you need to secure. Finding a security appliance vendor, or vendors can be an arduous process, especially if you need evaluate vendors' equipment for functionality and performance. Performance figures can affect the degree of fit out in your network. Too few firewalls may introduce bottlenecks, and too many may blow your budget. Finally, after you assemble your secured network, does its work.

Designing operational procedures are important.

Even with a secure network, it only takes 1 infected user to bring down your trusted network. How do you establish procedures to ensure that users are screened before they are connected to the trusted network. How do you ensure that users' machines have the latest patches to protect them from new attacks.

In this BoF session Agilent and Microsoft join with you to discuss these 2 aspects to securing your network, and more importantly, hear what you are experiencing as you go through the process of in securing your networks.

We'll kick off with a short presentation from Agilent on evaluating security appliances, and established systems.

Microsoft will then talk about operational procedures for maintaining the hard fought for, secure system.
But, mainly we want to hear from you.....your experiences in going through this process is what drives our product development, and we can all learn from what people have been through in securing their systems.
Security Testing BoF gathers people from the region struggling with the task of securing their networks

" To share experiences
" To share best practices
" To find ways to help out

Agenda
1800-1805: Agenda bashing (5mins)
1805-1810: Welcome and Introduction (5mins)

Presentations (30mins each)
1810-1840 Evaluating security network equipment, and testing
secured systems
Anthony Adamo, Agilent Technologies

1840-1900 Implementing secure procedures in IP systems - Meng Chow Kang, Microsoft

1900-2000 Open Discussion

 

Site developed and maintained by PIKOM for APRICOT
Please contact webmaster for any queries