Καλώς ορίσατε στο dotNETZone.gr - Σύνδεση | Εγγραφή | Βοήθεια
σε

 

Αρχική σελίδα Ιστολόγια Συζητήσεις Εκθέσεις Φωτογραφιών Αρχειοθήκες

Εκδήλωση: CyberCrime Security Forum 2008

Îåêßíçóå áðü ôï ìÝëïò George J. Capnias. Τελευταία δημοσίευση από το μέλος George J. Capnias στις 27-07-2008, 22:12. Υπάρχουν 0 απαντήσεις.
Ταξινόμηση Δημοσιεύσεων: Προηγούμενο Επόμενο
  •  27-07-2008, 22:12 43718

    Εκδήλωση: CyberCrime Security Forum 2008

    Νομίζετε ότι ξέρετε από networking security; Μπορείτε να εισβάλλετε σε ένα δίκτυο υπολογιστών; Μπορείτε να αντιληφθείτε έγκαιρα ότι ο εισβολέας βρίσκεται ήδη μέσα στο δίκτυό σας; Μπορείτε να σπάσετε την προστασία ενός δικτύου;

    Το CyberCrime Security Forum 08 σας προσκαλεί σε αυτή την εκδήλωση, που διοργανώνεται για πρώτη φορά στην Ελλάδα από την ελληνική πύλη για IT Pros, το Autoexec.Gr.

    Κεντρικός ομιλητής σε αυτή την εκδήλωση διάρκειας 2 ημερών θα είναι ο Marcus Carey, ο οποίος έρχεται για πρώτη φορά στην Ελλάδα, έχοντας διοργανώσει παρόμοια events σε ολόκληρη την Ευρώπη. O Marcus Carey έχει εργαστεί στο παρελθόν για την NSA (National Security Agency), ενώ οι εκδηλώσεις που διοργανώνει σε ολόκληρο τον κόσμο με την επωνυμία Dive Deeper Events γίνονται sold out αρκετό καιρό πριν την έναρξή τους.

    Μέσα από αυτές τις σελίδες μπορείτε να δείτε επιπλέον πληροφορίες σχετικά με τους ομιλητές της εκδήλωσης, το πρόγραμμα, αλλά και να δηλώσετε συμμετοχή. Για τους συμμετέχοντες εκτός Αθηνών έχει εξασφαλιστεί ειδική προνομιακή τιμή για την κράτηση δωματίου στο ξενοδοχείο Mistral στον Πειραιά.

    Σας περιμένουμε στον Πειραιά στις 29 Νοεμβρίου του 2008!

    Πρόγραμμα παρουσιάσεων

    Who do you think you are? How I can Steal your Identity in 30 Mins!

    Social Engineering otherwise known as, Phishing or Identity fraud has now become one of the world's most popular means of obtaining information in order to carry out criminal activities. With small pieces of information thieves can do a lot of damage from going on spending sprees using your credit card to using your name and Social Security number, to open new credit card accounts or worse?


    Once a criminal has your identity, he literally has the keys to your kingdom. In this hard hitting 75 min session Andy Malone investigates the concepts and causes of identity fraud and more importantly how to defend yourself.

    • Introductions
    • Identity Fraud from a Historical Perspective
    • The Art of Deception!
    • How ID Theft Occurs!
    • What to do if you're Identity is stolen.
    • How to Minimize Risk!
    • Physical Vs Electronic detection Methods
    • Protecting Yourself and your Family on the Internet!
    • Tools to Combat Identity Theft!
    • Defence strategies
    • Conclusion & Discussion

    Know Your Assets - Information Assurance and Risk Management

    Information Assurance is all about managing risk. Many organizations waste money and resources for perceived security. Knowing exactly what your assets are can save your organization loads of money as well as ensure that they are protected.
    In this session we will discuss the following topics.

    • The Human Resource
    • Confidentiality
    • Integrity
    • Availability
    • Information Assessment Methodology
    • Risk Analysis
    • Assets, Vulnerabilities, Threats, and Countermeasures
    • Policy, Standards, and Procedures
    • Conclusion & Discussion

    Hacking Methodology

    Hackers utilize a variety of resources in order to launch a cyber attack. In this discussion we will take a look at methodology used these attackers. This session will demonstrate many of the free tools and resources that hackers utilize to find holes in your network. You will walk out of this session able to use penetration testing techniques used by the professionals. By understanding these techniques this will help both administrators and IT professionals to secure their networks.
    The session will feature the following topics and tools:

    • Reconnaissance
    • Exploitation
    • Extraction
    • Google Hacking
    • Port Scanning
    • Vulnerability Scanning
    • NMAP
    • Nessus
    • Metasploit

    Hack to the Future! - The Ultimate Guide to Securing Windows Server 2008!

    With so much focus on Security it's critical for administrators and IT professionals to have a clear understanding of the new security features in Windows Server 2008. This 2hr session will uncover the new features and provide greater clarity for both administrators and IT professional. If IT security is your concern this session is an absolute must.

    • This Session Will Cover:
    • The Windows Server Security Architecture!
    • Microsoft Forefront Technologies! - Malware & Virus Protection
    • Branch Office Protection!
    • Deploying a Read Only Domain Controller
    • Introducing Active Directory Identity Management Tools
    • Deploying Active directory Right Management Services
    • Managing User Account Control
    • Deploying & Managing Full Volume Encryption using Bitlocker
    • Protecting your Interests: Hardware Group Policies & More!
    • Protecting your Network with Network Access Protection!
    • Conclusions!

    Building an In-Depth IT Defence Strategy!

    Implementing an in depth Defence strategy is critical for an organisations survival. Adopting a layered security strategy can save organisation millions in costs, damaged business reputation and lost productivity.

    While most organizations have deployed a layered approach to tackle security issues at the infrastructure level -- utilizing intrusion detection and prevention, firewalls, antivirus, antispyware and anti spam. Evidence clearly shows that many companies still have problems at the physical or organisational level. This Session introducing the "In-depth concept" and suggests ways in which IT Professionals can implement this approach using the least cost.
    From prevention to disaster recovery this session provides an in-depth look at how to defend and recover from disaster.

    • Introduction
    • Designing an In depth Defence strategy
    • Protecting your Assets!
    • Permissions Vs Encryption.
    • Understanding Windows Server Security Logs
    • Network Security!
    • Creating a Windows server 2008 Backup & Restore Strategy!
    • Building a recovery Crash Cart
    • Introducing System Centre - Data Protection Manager!
    • Conclusions & Q&A Session

    Incident Handling and Computer Forensics

    So you think you've been hacked. How can you find out what happened and determine your next steps? The discussion looks at the six phases of incident handling.

    • Phase 1: Preparation
    • Phase 2: Identification
    • Phase 3: Containment
    • Phase 4: Eradication
    • Phase 5: Recovery
    • Phase 6. Follow-up

    In this session we will demonstrate the following tools and techniques as they apply to

    • incident handling
    • Computer Forensics
    • Network Sniffer
    • Protocol Analysis
    • Intrusion Detection
    • Wireshark
    • Snort
    • Autopsy
    • Sleuthkit

    Ομιλητές

    Marcus J. Carey CISSP, MScMarcus

    Researcher and Instructor Defense Cyber Crime Center (DC3)
    Marcus J. Carey CISSP is an employee for Computer Sciences Corp. (CSC) Global Security Solutions (GSS) organization. Mr. Carey is currently assigned to the DC3's Defense Cyber Crime Investigations Training Academy (DCITA) as a Researcher and Instructor. Mr. Carey's specialty is Network Intrusions and Forensics.

    Prior to joining CSC, Mr. Carey served over eight years in the U.S. Navy Cryptologic Security Group. Mr. Carey ended his naval service by being assigned to the National Security Agency (NSA) where he engineered, monitored, and defended DOD secure networks.
    Mr. Carey has been employed by CSC for over five years and has provided network engineering and security on numerous state and federal contracts. Mr. Carey holds several IT certifications including CISSP and earned a Master of Science in Network Security from Capitol College in Laurel, Maryland.

    Andy Malone Microsoft MVP, MCT,MCSE

    Andy Malone is the Managing Director of Quality Training Ltd. Based in Scotland, Andy is a motivated technical trainer, Microsoft speaker, and technology evangelist with over 14 years experience in IT training and consultancy. Andy was also the 2006 winner of tAndyhe TechEd: IT Forum Speaker Idol contest.

    Having been a Microsoft Certified Trainer since 1994, Andy brings a wealth of real-world experience to his courses and teaches to a consistently high standard. His knowledge stems from early editions of Windows NT, Exchange, and the Office platforms to Windows Vista, Windows Server 2008 and beyond.

    Andy's recent speaker engagements include TechEd IT Forum 07, The MCT Summit 2007 (EMEA) in Zurich, IT Pro Connections Amsterdam. During 2007 Andy has delivered content to over 2500 delegates in Madrid, Barcelona, Stockholm, Copenhagen, Oslo, Stavanger, Amsterdam, Brussels and Reykjavik. For 2008 Andy is scheduled to deliver content in the US, Berlin and Dubai to name but a few. Andy's blog: http://blogs.quality-training.co.uk/blog


    George J. Capnias: Χειροπρακτικός Υπολογιστών, Ύψιστος Γκουράρχης της Κουμπουτερολογίας
    w: capnias.org, t: @gcapnias, l: gr.linkedin.com/in/gcapnias
    dotNETZone.gr News
    Δημοσίευση στην κατηγορία: , , , ,
Προβολή Τροφοδοσίας RSS με μορφή XML
Με χρήση του Community Server (Commercial Edition), από την Telligent Systems