RSA Security Conference Day 1
Jimmy Ray will be prowling the conference floor here at the Moscone Center today while I host 6 different security guests on our main stage. I am not entirely sure what Jimmy Ray may dig up…more on that later…but our little booth stage will be busy – Here is the agenda:11:15 AM – Siva Mandalam joins me to chat about the Cisco Virtual Office and the realities of the technology12:00 – Both Martin Pueblas and Don Hamilton, Design and Architecture engineers who have been hard at work re-crafting SAFE will share what has changed as we now launch SAFE version 21:00 – Greg Carter, (fellow Texan) Security Services Product Manager is all wound up and ready to share new and updated security services we are offering around the marriage of security and compliance via the IT GRC framework.2:00 – Samantha Madrid is stepping in to talk Web Security with me. Great new stuff on the power of reputation services and the parallel malware signature scanning3:00 – Dual guests on the subject of ‘Secure Remote Access’ with Laure Andrieux and Matt Kaneko. Couple of crazy geeks that have always been fun to present with in the past. 4:00 – Mei Huang is bringing our high end IPS skillz’ down to the SMB (Cisco AIP SSC-5 on ASA 5505)5:00 – Nick Edwards, made famous in one of our early episodes, TWTV 24, gives us the lowdown on how succesful we are being (or not being?) with stopping email threats today. Tomorrow could EASILY be even bigger than today…did you know we are going to stream live as the ‘opening act’ for John Chambers keynote?Crime Still Pays: Winning the Network Security Arms RaceTaping Date: Live from RSA on April 22, 2009 (sign up here to watch the live stream!)‘How to Avoid Being ‘Fat, Dumb and Hacked”Even in a recession, one industry continues to expand: cybercrime. How can you protect your network and your organization from hackers, botnets, and other constantly evolving threats?Get the inside story, as we reverse-engineer the newest attacks you face, like the insidious Conficker Bot, highlight what makes them so successful, and show you how to control them. Discover how you can apply the “wisdom of crowds” to implement a dynamic solution that continually learns from the threats experienced by others. See how the latest architectural approaches to network security can provide greater protection than point products and maximize the value of your existing technology investments by evolving with your business. Learn how you can avoid being “fat, dumb, and hacked” as we reveal: • Why deep packet inspection is no longer dependable• How to turn infrastructure access control lists (iACLs) into one of your most valuable defenses• How standard methodologies can enable you to identify and control even threats you don’t understand• New BotNet enhancements for the Cisco ASA (Adaptive Security Appliance)• The advantages of the newly released Cisco SAFE Blueprint for SecurityLive Q&AOur expert guests will be available to answer your network security questions during the broadcast.Agenda:Segment 1: Reading the Tea Leaves of the bots we are seeing todayGuest: Pat PetersonSegment 2: The Architectural Approach to Modern Security IssuesWe break down the Campus Edge Security model from the updated SAFE documentationSegment 3: Polymorphism and the limitations of URL FilteringGuest: Kevin KennedySegment 4: Is the Firewall Dead? (Dude. Where’s my firewall?)Pre-Existing Episodes you should watch:Stopping E-Mail ThreatsSpam, spyware, phishing, and other e-mail scams are using up your valuable IT resources. Now, learn how you can finally control these costly problems. Discover how reputation filtering combined with context-based scoring can eliminate the broadest range of known and emerging e-mail threats. See how the unique two-layer solution developed by IronPort can reduce your e-mail bandwidth consumption by as much as 80 percent.Invisible Attackers: Stop the Bot!Massive distributed-denial-of-service (DDoS) and phishing attacks might get the headlines, but invisible attackers pose a far more common threat to your network. Learn how botnets work, how attackers avoid detection, and the top five threats you face today. Discover how to defend your network without buying additional hardware or software. Learn six simple things you can do today to severely limit your exposure to these silent threats.