Directions Re the meeting: http://crime.zotconsulting.com/directions.php3 Speaker(s): Jeff Cole and Scott Lupro -- SilentRunner, Inc. Title: Network Security Analysis - from the war room to the board room Topic: As the line continues to blur between external and internal network security threats, -a new network defense layer, Network Security Analysis has emerged as a strategic security decision-support tool, providing an unprecedented view into what's really happening on the network. Network Security Analysis applications include: Incident Response, Forensics Investigations (both real time and post), Virtual Network sequencing and mapping, Policy visualization, and the graphical analysis/correlation of IDS, Firewall and other logs. NSA provides closed circuit television for your network. The discussion will have meaning for executives who must ensure the welfare of their electronic assets and the successful management of their enterprise networks. To law enforcement: -a complete forensics evidence trail, leading to quicker prosecution and resolution of cases, and arguably an ability to cover more ground. To businesses: -exponential insight into what's happening on their networks, resulting in quicker interdiction to suspicious events across platforms, and deeper security coverage. To regulated industries: -the ability to confidently demonstrate to regulators, customers, partners, suppliers and shareholders that appropriate steps have been taken to ensure the integrity and privacy of business-critical data.
This archive was generated by hypermail 2b30 : Sun May 26 2002 - 11:43:06 PDT