|
Security and Audit-Related Speaking Topics |
Peter
Davis+Associates is pleased to offer the services of our senior staff to
provide keynote speeches, seminars or security awareness for your
company, your organization, your professional association, your academic
institution, your school, or your community group. You can offer
these sessions to heighten security awareness or introduce a new
subject. You can select from these recent sessions or we can develop and customize
one for your organization. Call
for more information. You can schedule an in-house session by contacting PDA at 416-907-4041 or by using the
contact link and sending a message for more information.
Strategies for Auditing Web Servers and Web SitesIf your organization is running a public web site, this session is for you. You will discover the key control points associated with a web server. Also, you will learn how to use commercial and publicly available tools to audit a web server configuration and uncover weaknesses in the underlying operating system and TCP/IP configuration. You will learn about:
IDS: Your Cyber Burglar AlarmYou do not create a good security program by buying a point product such as a firewall. You build a good security program by developing administrative and management processes. Tools provide the data to the process, but you must analyze the data to gather information about your security. In this timely session, you will learn about an effective tool to help manage your security processes—intrusion detection systems. At the end of this session, you will understand the who, what, where, how and why of IDS.
Best Practices for an IIS ConfigurationMicrosoft's Internet Information Server, coming as it does free with Windows NT, is the default for many Web servers. An understanding of the parameters to set in IIS and Windows NT is key to securing your system. In this session, you will learn about:
Security Tools for the NT-Based Internet ServerMaintaining and monitoring Windows NT and IIS security is a full time job, especially in large organizations. Automating these processes will help you in your effort to remain vigilant. In this session, you will learn about administrative tools as well as security and audit tools to help you. You will learn about:
Understanding TCP/IP Security and AuditIf you need to understand TCP/IP this session is for you. You will discover the TCP/IP and OSI models. Also, you will learn how to use commercially and publicly available tools to audit a host running TCP/IP and uncover weaknesses in the underlying protocols. You will learn about:
Protecting Your Privacy on the InternetWith its myriad resources, the Internet has become a valuable tool. However, using the Internet is fraught with dangers. One such danger is the compromise of your privacy. Anytime you visit a site you give up information about yourself you might want to protect. In addition, many sites write information to your system that compromises your privacy. Attend this session and learn how to find a middle course between protecting yourself and using Net resources. This session will cover:
Windows 2000 Server SecurityWith its power, scalability, compatibility, and networking features, it was no wonder that Windows NT was widely used by organizations. Now, Microsoft has improved it and has entered the new century touting Windows 2000 as the operating system of the next century. W2K is richer in security features then Windows NT. In this timely session you will learn how to safeguard your data using the security features of Windows 2000 Server. This session will cover:
Audit and Security of Cisco Routers: An IntroductionCisco routers are used to provide secure, reliable and efficient corporate-wide internetworking. To deploy a Cisco router successfully, audit, security and networking professionals require a thorough understanding of the security and audit features and functions. This important session provides an introduction to Cisco IOS network security. This session will cover:
Information Security for IT ManagersIs information security an important issue within your organization? Many CIOs don’t see security as an important issue in their organizations. Surprised? Well, management’s resistance to costs having uncertain payoffs, and paybacks difficult to quantify, is understandable; however, security has become an important performance parameter. This timely session will introduce you to the chief components of an information security program. This session will cover:
Selling Information Security to Your OrganizationComputer criminals grow more cunning by the minute and no organization can afford to be without a sound information security program. In this practical session you will master proven tactics for raising the organization’s collective consciousness about security and controls, and learn how to implement motivational strategies that make awareness effective. This session will cover:
Countermeasures to Network Security AttacksIn this session, you will learn about some common network and application attacks: IP spoofing, SMURF, DDoS, and spamming. You will discover controls for preventing or mitigating the effects of these attacks. This session will cover:
How to Secure Your Networks for E-BusinessCompanies are engaging in all types of e-business—from electronic publishing to e-commerce. This informative session will look at the basics of e-business. You will learn about:
Understanding PKIEncryption is an important part of a security architecture. Understanding the various types of encryption algorithms and how they are used is essential to your security program. This informative session will cover the following:
Securing Wireless Local Area Networks: Shooting in the Air?Wireless LAN use is growing fast. Research company Dell’Oro Group predicts the worldwide market for all products based on the 802.11 standard by 2006 will grow to $3.1 USD billion in annual revenue, from $1.2 USD billion in 2001. These WLANs are popping up in the government and companies in a manner reminiscent of the first departmental LANs. WLAN technology makes setting up a network relatively simple. But securing them is another matter altogether. They are creating major security and configuration management headaches for IT infrastructure managers. In this state-of-the-art session, you will learn how to improve your control of wireless LANs as we highlight:
To schedulePhone
Fax
|
|