CRIME meeting 05/14/2002 @ 10AM @ Verizon Airtouch--2nd Call

From: George Heuston (GeorgeH@private)
Date: Fri May 10 2002 - 16:32:22 PDT

  • Next message: George Heuston: "CRIME NIPC Daily Report - 13 May 02"

    Directions Re the meeting: http://crime.zotconsulting.com/directions.php3
    Speaker(s): Jeff Cole and Scott Lupro -- SilentRunner, Inc.
    Title:    Network Security Analysis - from the war room to the board room
     
    Topic:  As the line continues to blur between external and internal network
    security threats, -a new network defense layer, Network Security Analysis
    has emerged as a strategic security decision-support tool, providing an
    unprecedented view into what's really happening on the network.
    Network Security Analysis applications include: Incident Response, Forensics
    Investigations (both real time and post), Virtual Network sequencing and
    mapping, Policy visualization, and the graphical analysis/correlation of
    IDS, Firewall and other logs.  NSA provides closed circuit television for
    your network. 
    The discussion will have meaning for executives who must ensure the welfare
    of their electronic assets and the successful management of their enterprise
    networks.  To law enforcement: -a complete forensics evidence trail, leading
    to quicker prosecution and resolution of cases, and arguably an ability to
    cover more ground.  To businesses: -exponential insight into what's
    happening on their networks, resulting in quicker interdiction to suspicious
    events across platforms, and deeper security coverage.  To regulated
    industries: -the ability to confidently demonstrate to regulators,
    customers, partners, suppliers and shareholders that appropriate steps have
    been taken to ensure the integrity and privacy of business-critical data.
    



    This archive was generated by hypermail 2b30 : Sun May 26 2002 - 11:43:06 PDT