Search This Blog

Tuesday, October 25, 2005

Wireless Security Webcast with IBM, Trapeze & AirDefense: Protect Against Next-Generation Threats



Webcast: Best Practices for Securing Wireless Networks Against Next-Generation Threats

Online Webcast
Date: Nov 8, 2005   
Time: 2:00 - 3:30 PM ET 
  [Register Here]

AirDefense is pleased to invite you to a 90-minute educational webcast with featured speaker Gartner analyst John Girard and executives from IBM and Trapeze Networks to discuss end-to-end approaches to wireless LAN security and compliance. Attend this complimentary webcast to understand the new and emerging risks and how a layered approach to security is essential in ensuring risk-free deployments. This webcast will draw upon actual enterprise case studies and new security methodologies that highlight common mistakes and successful WLAN deployments.

 Webcast Agenda
 

Managing Enterprise Risk in a Wireless World
- John Girard, Vice President Distinguished Analyst, Gartner

   
  • Key Challenges in deploying & securing WLANs
  • The Compliance Conundrum: how HIPAA, SoX, DoD 8100.2, GLBA
        are affecting wireless security decisions
  • Layered Approach to wireless LAN security and compliance
  • Best Practices for wireless LAN deployment, security and management
  •  

    Wireless Security Panel – Open Discussion with live Q&A
    - John Girard - Gartner,
          IBM, Trapeze Networks, AirDefense Customers & AirDefense

        Topics will include:
       
  • Evolving Wireless LAN Threats & Attack Sophistication
  • How to ensure compliance with regulatory standards
  • Emergence of new wireless threats at public hotspots
  • Protecting against wireless phishing – anywhere
  • Why part-time monitoring solutions are not sufficient
  • Why signature-based detection isn't enough
  • Why Encryption, Authentication and VPNs are not enough security
  • Role of Forensic & Incident Analysis
  • How to eliminate false positives
  • Design for an effective managed wireless security solution
         for policy compliance, threat analysis and rogue detection




  • No comments: