AGENDA |
8.30 -
9.00am |
Registration |
9.00 -
9.15am |
Welcome
Address |
9.15 -
9.45am |
Keynote One:
Network as a Platform for Security Ng Tock
Hiong Director, Systems Engineering Cisco
|
9.45 -
10.15am |
Keynote Two:
Data Leakage Prevention or Cisco IT Security
Kang Meng
Chow Chief Information Security Officer, APAC/Japan Cisco
Meng-Chow
has just joined Cisco Systems in early Feb 2009 as the Chief
Information Security Officer (CISO) for the Asia Pacific and Japan
region. He would like to take this opportunity to share some of his
initial observations and reflection of Cisco's internal information
security risk management policy, practices, and challenges in his
first 30 days on the job, how they fair with other enterprises and
the industry best practices, and some of his thoughts on the way
forward. |
10.15 -
10.45am |
Networking
Coffee Break and Showcase Tour |
To
facilitate our planning for space, please select the tracks/session
you would like to attend. Note that the organizer reserves the right
to change/update the agenda without notice. Register early, as
limited seats are available. |
Track
1: Using Network as the Platform to enable End Point
Security
Track
2: Using Network as the Platform for Security
Management
Track
3: Using Network as the Platform for Application and Content
Security |
Track
1: Using Network as the Platform to enable End Point
Security |
10.45 -
11.30am |
Network
Admission Control: Self-contained End- Point Security Posture
Assessment (Part
1)
Ricky Elias
Security Architect Cisco
Cisco's Network Admission
Control (NAC) is a solution that uses the network infrastructure to
enforce security policies on all devices seeking to access network
computing resources. NAC minimizes the risks associated with
non-compliant devices --regardless of system type, ownership or
access methods--resulting in more resilient and secure networks.
|
11.30 -
12.15pm |
Network
Admission Control: Self-contained End-Point Security Posture
Assessment (Part
2)
Ricky Elias
Security Architect Cisco
NAC RADIUS is a network
architecture which enables you to perform network access,
centralized web authentication and posture validation. It is a
merging of 802.1X, RADIUS-based network access control with the
Cisco NAC Appliance for posture, remediation and guest services.
|
12.15 -
1.30pm |
Networking
Luncheon & Tour of Showcase |
1.30 -
2.15pm |
Presentation
by Comstor
|
2.15 -
3.00pm |
The
Smart Protection Network: Cloud-Client protection in Web
2.0 Anthony Ung
Regional Product Marketing Manager, APAC, Enterprise
Segment, Trend Micro
Time is money. But the time it
takes to protect the network can also impact more than the bottom
line. Enterprises cannot risk delays when it comes to securing
private data, business resources, and company reputation.
Enterprises need a better approach. A faster, more proactive
approach. |
3.00 -
3.30pm |
Networking
Coffee Break & Showcase Tour |
3.30 -
4.15pm |
Cisco
Security Agent: End Point Security Solution
for
Host and Desktop
Ricky Elias
Security Architect Cisco
Cisco. Security Agent 6.0
is the first endpoint security solution that combines zero-update
attack defense, policy-driven data loss prevention, and
signature-based antivirus detection in a single agent. This unique
blend of capabilities defends servers and desktops against
sophisticated day-zero attacks, and enforces acceptable-use and
compliance policies within a simple management infrastructure.
|
4.15 -
5.00pm |
Implementing
Secured and Flexible Remote Access
Using
SSL/ VPN
Ricky Elias
Security Architect Cisco
Today's remote access VPN
deployments require the ability to safely and easily extend
corporate network access beyond managed desktops, to a myriad of
different users, devices and endpoints. The Cisco SSL VPN solution
enables organizations to securely provide network access to a broad
array of users including mobile and fixed endpoints, remote offices,
contractors, and business partners.
|
Track
2: Using Network as the Platform for Security
Management |
10.45 -
11.30am |
Adaptive
Intrusion Prevention using Network Intelligence and Global
Collaboration
Ng Tock
Hiong Systems Engineering Manager Cisco
Cisco's
uniquely effective intelligent detection technology provides
unsurpassed detection capabilities for Cisco intrusion prevention
solutions. Using information gathered by Cisco's global security
intelligence organization and enabled by industry-leading technology
and patented innovations, Cisco intrusion prevention solutions adapt
in real time to detect and block intrusions ranging from
never-before-seen worms to the most sophisticated and subtle
criminal attacks. Innovations include the flexible, multilayer
evasion protection module, vulnerability-focused signatures,
dynamically updated protocol analysis engines, and on-box
correlation capabilities that provide protection you can trust.
|
11.30 -
12.15pm |
The
Need for Advanced Network Security
Testing Michael
Jack Senior Manager of Product Marketing Spirent
Communications
In the Advanced Security Testing
presentation, Michael Jack - Sr. Manager/Product Marketing from
Spirent Communications will discuss the over all areas of concerns
as it relates to advanced networks security and performance. There
is a critical relation between hardened network infrastructures and
application available - learn how testing can get you the highest
performance and most accessible network. |
12.15 -
1.30pm |
Networking
Luncheon & Showcase Tour |
1.30 -
2.15pm |
Presentation
by Datacraft
|
2.15 -
3.00pm |
Introduction
to Cisco TrustSec
Ricky Elias
Security Architect Cisco
As the separation between
public and private networks become increasingly blurred, enterprise
administrators have begun to recognize that they must find better
ways to control access to corporate resources and information.
Isolated best-in-class solutions no longer meet their operational
requirements. Identity authentication needs to be applied across all
access methods in a consistent manner. Access to critical
applications and network resources must be provided to any user on
any device or any platform across a variety of access points. With
so many types of users and access methods, a converged policy engine
is required to manage user roles and access control requirements.
And the integrity and confidentiality of transactions frequently
must be ensured, even within the campus. Cisco TrustSec (Cisco
Trusted Security) makes the network role aware through secure campus
access control, a converged policy framework, and pervasive
integrity and confidentiality. As a result Cisco TrustSec reduces
the operational burden of managing identity and access policy.
|
3.00 -
3.30pm |
Networking
Coffee Break & Showcase Tour |
3.30 -
4.15pm |
Managing
Security Threats using the Network as the
Platform
Ng Tock
Hiong Systems Engineering Manager Cisco
Today's
network is as complex as the human body. To troubleshoot and
identify a single point of attack or vulnerability, can take hours
or days. Cisco Security MARS provides intelligent event detection
and correlation looks at the landscape of events occurring within
your global network. The MARS real-time proactive monitoring, event
correlation and self-learning capability enables you to identify and
mitigate potentially dangerous security threats before they impact
your network. Intelligent correlation can help distinguish between a
legitimate threat and a false-positive. Upon identification of a
legitimate network attack, Cisco MARS shows you what can be done to
isolate the area vulnerable to attack.
|
4.15 -
5.00pm |
Security
Optimisation Services
Chuang
Shyue Hong Network Consulting Engineer Cisco
Maintaining strong defenses to protect your business
applications and assets is a constant challenge, especially while
trying to reduce costs. By taking a proactive approach to security,
you can gain confidence in your security infrastructure and minimize
downtime, loss, and damage to corporate systems.
The Cisco
Security Optimization Service is an integrated service offering
designed to understand, assess, develop, and optimize your security
infrastructure on an ongoing basis. Exploit the synergies of a
global team of security experts to enable your IT department to do
more with less. Reduce costly delays and increase the agility of IT
security in meeting evolving business requirements.
|
Track
3: Using Network as the Platform for Application and Content
Security |
10.45 -
11.30am |
Securing
Enterprise Email and Web Traffic
Steve
Ledzian Senior Corporate Systems Engineer Cisco IronPort
Email and Web Security
Spam, and Malware threats continue to
advance and grow in sophistication. This presentation will cover
some of the mechanisms by which Cisco IronPort Email and Web
Security Appliances protect your network from today's latest
threats. |
11.30 -
12.15pm |
Presentation
by NCS Pte Ltd |
12.15 -
1.30pm |
Networking
Luncheon & Showcase Tour |
1.30 -
2.15pm |
Web
Application Security Threats - Your Network Defense Can't Stop
Them
Ng Wee Kai
Senior Security Consultant PulseSecure Pte Ltd
The
changing face of web-attacks - we look into hackers' new targets and
behavior. We share and demonstrate this threatening new trend on
internet hacking and their attack characteristics. Organization
would realize despite layers of firewalls, IDS and IPS, how
vulnerable they web applications are today. Organizations must know
what are their options in defense. |
2.15 -
3.00pm |
Protecting
Web Applications with Web Application
Firewall
Ong Poh
Seng Data Center Architect Cisco
The shift from
traditional application design to service-oriented architecture
(SOA) principles using Extensible Markup Language (XML) and Web
services promises increased IT agility and reduced technology costs.
However, without secure and effective production-caliber
infrastructure, the benefits available from SOA and Web services
will not be achieved. For SOA-based applications and XML Web
services to work well, network traffic will increase to support
distributed application components; integration with identity and
access management systems is required to identify and secure loosely
coupled services and other elements; and monitoring, auditing, and
control systems are needed to understand and manage dynamically
changing application systems. This session provides an overview of
how the Cisco ACE XML Gateway is able to offload, protect, secure
and accelerate the XML Web Services for SOA-based applications.
|
3.00 -
3.30pm |
Networking
Coffee Break & Showcase Tour |
3.30 -
4.15pm |
Securing
Web Services using a Gateway
Cheng Jang
Thye Business Development Manager Cisco
The shift
from traditional application design to service-oriented architecture
(SOA) principles using Extensible Markup Language (XML) and Web
services promises increased IT agility and reduced technology costs.
However, without secure and effective production-caliber
infrastructure, the benefits available from SOA and Web services
will not be achieved. For SOA-based applications and XML Web
services to work well, network traffic will increase to support
distributed application components; integration with identity and
access management systems is required to identify and secure loosely
coupled services and other elements; and monitoring, auditing, and
control systems are needed to understand and manage dynamically
changing application systems. This session provides an overview of
how the Cisco ACE XML Gateway is able to offload, protect, secure
and accelerate the XML Web Services for SOA-based applications.
|
4.15 -
5.00pm |
Securing
Virtual Machine Belmont
Chia Data Centre Architect Cisco |
END
OF
SESSION |