cid:image001.gif@01C97A70.4EA91740

 

Event Details

Date:

17 March 2009, Tuesday or

18 March 2009

Wednesday

(Please select one only)

Time:

9:00am 5:00pm
(Registration starts at 8.30pm)

Venue:

Cisco

168 Robinson Rd

#28-01

Capital Tower
Singapore 068912

Room:

Learn 1 to 3

MRT:

Tanjong Pagar

Contact: 

Phyllis Teng
Tel: 62971368

AGENDA

8.30 - 9.00am

Registration

9.00 - 9.15am

Welcome Address

9.15 - 9.45am

Keynote One: Network as a Platform for Security
Ng Tock Hiong
Director, Systems Engineering
Cisco

9.45 - 10.15am

Keynote Two: Data Leakage Prevention or Cisco IT Security Kang Meng Chow
Chief Information Security Officer, APAC/Japan
Cisco


Meng-Chow has just joined Cisco Systems in early Feb 2009 as the Chief Information Security Officer (CISO) for the Asia Pacific and Japan region. He would like to take this opportunity to share some of his initial observations and reflection of Cisco's internal information security risk management policy, practices, and challenges in his first 30 days on the job, how they fair with other enterprises and the industry best practices, and some of his thoughts on the way forward.

10.15 - 10.45am

Networking Coffee Break and Showcase Tour

To facilitate our planning for space, please select the tracks/session you would like to attend. Note that the organizer reserves the right to change/update the agenda without notice. Register early, as limited seats are available.


Track 1: Using Network as the Platform to enable End Point Security


Track 2: Using Network as the Platform for Security Management

Track 3: Using Network as the Platform for Application and Content Security

Track 1: Using Network as the Platform to enable End Point Security

10.45 - 11.30am

Network Admission Control: Self-contained End- Point Security Posture Assessment (Part 1)

Ricky Elias
Security Architect
Cisco

Cisco's Network Admission Control (NAC) is a solution that uses the network infrastructure to enforce security policies on all devices seeking to access network computing resources. NAC minimizes the risks associated with non-compliant devices --regardless of system type, ownership or access methods--resulting in more resilient and secure networks.

11.30 - 12.15pm

Network Admission Control: Self-contained End-Point Security Posture Assessment (Part 2)

Ricky Elias
Security Architect
Cisco

NAC RADIUS is a network architecture which enables you to perform network access, centralized web authentication and posture validation. It is a merging of 802.1X, RADIUS-based network access control with the Cisco NAC Appliance for posture, remediation and guest services.

12.15 - 1.30pm

Networking Luncheon & Tour of Showcase

1.30 - 2.15pm

Presentation by Comstor

2.15 - 3.00pm

The Smart Protection Network: Cloud-Client protection in Web 2.0
Anthony Ung
Regional Product Marketing Manager,
APAC, Enterprise Segment,
Trend Micro

Time is money. But the time it takes to protect the network can also impact more than the bottom line. Enterprises cannot risk delays when it comes to securing private data, business resources, and company reputation. Enterprises need a better approach. A faster, more proactive approach.

3.00 - 3.30pm

Networking Coffee Break & Showcase Tour

3.30 - 4.15pm

Cisco Security Agent: End Point Security Solution

for Host and Desktop

Ricky Elias
Security Architect
Cisco

Cisco. Security Agent 6.0 is the first endpoint security solution that combines zero-update attack defense, policy-driven data loss prevention, and signature-based antivirus detection in a single agent. This unique blend of capabilities defends servers and desktops against sophisticated day-zero attacks, and enforces acceptable-use and compliance policies within a simple management infrastructure.

4.15 - 5.00pm

Implementing Secured and Flexible Remote Access

Using SSL/ VPN

Ricky Elias
Security Architect
Cisco

Today's remote access VPN deployments require the ability to safely and easily extend corporate network access beyond managed desktops, to a myriad of different users, devices and endpoints. The Cisco SSL VPN solution enables organizations to securely provide network access to a broad array of users including mobile and fixed endpoints, remote offices, contractors, and business partners.

Track 2: Using Network as the Platform for Security Management

10.45 - 11.30am

Adaptive Intrusion Prevention using Network Intelligence and Global Collaboration

Ng Tock Hiong
Systems Engineering Manager
Cisco

Cisco's uniquely effective intelligent detection technology provides unsurpassed detection capabilities for Cisco intrusion prevention solutions. Using information gathered by Cisco's global security intelligence organization and enabled by industry-leading technology and patented innovations, Cisco intrusion prevention solutions adapt in real time to detect and block intrusions ranging from never-before-seen worms to the most sophisticated and subtle criminal attacks. Innovations include the flexible, multilayer evasion protection module, vulnerability-focused signatures, dynamically updated protocol analysis engines, and on-box correlation capabilities that provide protection you can trust.

11.30 - 12.15pm

The Need for Advanced Network Security Testing
Michael Jack
Senior Manager of Product Marketing
Spirent Communications

In the Advanced Security Testing presentation, Michael Jack - Sr. Manager/Product Marketing from Spirent Communications will discuss the over all areas of concerns as it relates to advanced networks security and performance. There is a critical relation between hardened network infrastructures and application available - learn how testing can get you the highest performance and most accessible network.

12.15 - 1.30pm

Networking Luncheon & Showcase Tour

1.30 - 2.15pm

Presentation by Datacraft

2.15 - 3.00pm

Introduction to Cisco TrustSec

Ricky Elias
Security Architect
Cisco

As the separation between public and private networks become increasingly blurred, enterprise administrators have begun to recognize that they must find better ways to control access to corporate resources and information. Isolated best-in-class solutions no longer meet their operational requirements. Identity authentication needs to be applied across all access methods in a consistent manner. Access to critical applications and network resources must be provided to any user on any device or any platform across a variety of access points. With so many types of users and access methods, a converged policy engine is required to manage user roles and access control requirements. And the integrity and confidentiality of transactions frequently must be ensured, even within the campus. Cisco TrustSec (Cisco Trusted Security) makes the network role aware through secure campus access control, a converged policy framework, and pervasive integrity and confidentiality. As a result Cisco TrustSec reduces the operational burden of managing identity and access policy.  

3.00 - 3.30pm

Networking Coffee Break & Showcase Tour

3.30 - 4.15pm

Managing Security Threats using the Network as the Platform

Ng Tock Hiong
Systems Engineering Manager
Cisco

Today's network is as complex as the human body. To troubleshoot and identify a single point of attack or vulnerability, can take hours or days. Cisco Security MARS provides intelligent event detection and correlation looks at the landscape of events occurring within your global network. The MARS real-time proactive monitoring, event correlation and self-learning capability enables you to identify and mitigate potentially dangerous security threats before they impact your network. Intelligent correlation can help distinguish between a legitimate threat and a false-positive. Upon identification of a legitimate network attack, Cisco MARS shows you what can be done to isolate the area vulnerable to attack.

4.15 - 5.00pm

Security Optimisation Services

Chuang Shyue Hong
Network Consulting Engineer
Cisco

Maintaining strong defenses to protect your business applications and assets is a constant challenge, especially while trying to reduce costs. By taking a proactive approach to security, you can gain confidence in your security infrastructure and minimize downtime, loss, and damage to corporate systems.

The Cisco Security Optimization Service is an integrated service offering designed to understand, assess, develop, and optimize your security infrastructure on an ongoing basis. Exploit the synergies of a global team of security experts to enable your IT department to do more with less. Reduce costly delays and increase the agility of IT security in meeting evolving business requirements.

Track 3: Using Network as the Platform for Application and Content Security

10.45 - 11.30am

Securing Enterprise Email and Web Traffic

Steve Ledzian
Senior Corporate Systems Engineer
Cisco IronPort Email and Web Security

Spam, and Malware threats continue to advance and grow in sophistication. This presentation will cover some of the mechanisms by which Cisco IronPort Email and Web Security Appliances protect your network from today's latest threats.

11.30 - 12.15pm

Presentation by NCS Pte Ltd

12.15 - 1.30pm

Networking Luncheon & Showcase Tour

1.30 - 2.15pm

Web Application Security Threats - Your Network Defense Can't Stop Them

Ng Wee Kai
Senior Security Consultant
PulseSecure Pte Ltd

The changing face of web-attacks - we look into hackers' new targets and behavior. We share and demonstrate this threatening new trend on internet hacking and their attack characteristics. Organization would realize despite layers of firewalls, IDS and IPS, how vulnerable they web applications are today. Organizations must know what are their options in defense.

2.15 - 3.00pm

Protecting Web Applications with Web Application Firewall

Ong Poh Seng
Data Center Architect
Cisco

The shift from traditional application design to service-oriented architecture (SOA) principles using Extensible Markup Language (XML) and Web services promises increased IT agility and reduced technology costs. However, without secure and effective production-caliber infrastructure, the benefits available from SOA and Web services will not be achieved. For SOA-based applications and XML Web services to work well, network traffic will increase to support distributed application components; integration with identity and access management systems is required to identify and secure loosely coupled services and other elements; and monitoring, auditing, and control systems are needed to understand and manage dynamically changing application systems. This session provides an overview of how the Cisco ACE XML Gateway is able to offload, protect, secure and accelerate the XML Web Services for SOA-based applications.

3.00 - 3.30pm

Networking Coffee Break & Showcase Tour

3.30 - 4.15pm

Securing Web Services using a Gateway

Cheng Jang Thye
Business Development Manager
Cisco

The shift from traditional application design to service-oriented architecture (SOA) principles using Extensible Markup Language (XML) and Web services promises increased IT agility and reduced technology costs. However, without secure and effective production-caliber infrastructure, the benefits available from SOA and Web services will not be achieved. For SOA-based applications and XML Web services to work well, network traffic will increase to support distributed application components; integration with identity and access management systems is required to identify and secure loosely coupled services and other elements; and monitoring, auditing, and control systems are needed to understand and manage dynamically changing application systems. This session provides an overview of how the Cisco ACE XML Gateway is able to offload, protect, secure and accelerate the XML Web Services for SOA-based applications.

4.15 - 5.00pm

Securing Virtual Machine
Belmont Chia
Data Centre Architect
Cisco

END OF SESSION

 

 

Organised By:

cid:image001.gif@01C97A70.4EA91740

In Partnership with:

 

cid:image005.jpg@01C99385.2C9C6430           cid:image008.jpg@01C99385.2C9C6430         cid:image003.jpg@01C995D4.DC416B50 

 

cid:image002.jpg@01C991D5.E2A25200        cid:image011.jpg@01C99385.2C9C6430

 

 

 

1992-2009 CISCO SYSTEMS INC. All rights reserved.