the Future Internet & Network (Security) Architecture
On September 10, LSEC organized a one day seminar on “The Future Internet & Network (Security) Architecture”.
Network Security is still one of the major components of any IT Security environment, and in most cases the most hardware intensive.
Over the last 20 years, the ways that people have been doing business and communicating all together have changed dramatically. Managing information flows has become a challenge in itself, and ensure that you remain under control of your information is even a greater challenge. At the same time those evolutions have brought a great deal of opportunities, not the least in the world of information security. During this seminar, we want to take a look into the future: what are the upcoming infrastructural changes ahead and how can we cope with them from a strategic perspective, to manage them properly and be ahead of the curb when it comes to securing them.
We want to address during this seminar was not only on :
- What are the new network evolutions ahead of us both mobile & fixed : IPv6, Ethernet, NGMN, service and content aware architectures, …
- What are the challenges of these new architectures in terms of security and risk management
- Are there differences in management (in house / outsourced), …
- What about virtualization (virtual appliances, cloud services and architectures, …)
- What about Trusted Computing in the Future Internet Architectures
This day is scheduled to take place in Leuven, Kasteelpark Arenberg from 12 until 7 pm, with drinks, lunch and networking facilities included.
12.00h : Welcome & Registration - Sandwich Lunch & Networking
13.00h : Introduction by Ulrich Seldeslachts, CEO of LSEC
13.10h : The Future of Borderless Network Security by Michel Kelkeneers, Cisco Technical Solutions Architect
Abstract : “Borderless Networks”, does this term signifiy a new network architecture built for new cloud computing requirements or is it just a new label for today’s LANs, WANs, and public network infrastructure? While market cynicism is certainly understandable, borderless networks isn’t a Madison Avenue creation; rather, this trend is extremely important and already well underway. It involves the current evolving use of the Internet such as the heavy use of rich internet content and video, mobile users and devices and consumerization of IT. According to analyst ESG, Current security defenses are a mismatch for borderless network security requirements, Borderless network security demands an architectural approach, Borderless network security architecture demands strong leadership and industry cooperation effort and The borderless network architecture will evolve in phases.
14.00h : The Next Step : Application Aware Firewalling, by Stijn Rommens; Palo Alto Networks
Abstract: For most enterprises Network Security has become a sprawl of solutions and appliances. Stitching all of these technologies together whilst maintaining a uniform security policy along all, has become impossible. Many trade-offs need to be made, being it less security, less throughput or higher latency. A consistent view on what applications and possible threat vectors exist on your network is based on estimations or based on very expensive and complex correlation solutions. Complexity is not the only issue, cost might even be a bigger concern. Different vendors, different contracts, different licenses and all on a different cycle… Today you have a choice to have one simple policy and control tool that effectively can implement an abstract policy like ‘Marketing people should have access to Facebook all day long with a guaranteed bandwidth and via a preferred Internet connection whilst other people can have read-only access to Facebook at lunch time, only via the Cable or DSL connection.’
About : Stijn Rommens has over 10 years of experience in designing, teaching and maintaining Network Security solutions. Stijn has taken the path of the field, through support and education to pre-sales. Over the last 6 years, Stijn held the position of Systems Engineer at ISS, now part of IBM, Juniper Networks and today Palo Alto Networks. The red line through his career is the thru network security evolution. The result of that journey till today is his dedication to the Next Generation Network Security solutions.
Abstract:Most network managers dream of reducing the complexity of their network infrastructure and the associated management effort, while having to cope with fading network frontiers. Be it the consolidation of secret, confidential and restricted networks on a single carrier or a flexible response to ever changing demands to adapt the networks ad hoc to the business requirements while increasing the security level, a community of interest based approach Today can bring that dream to reality. Community of interest virtual networks can be provisioned based on the identity and the role of a user and remove the most of the need to reconfigure the physical network.
About : Luc Leysen has over 18 years of experience in designing and managing Information Technology and Security solutions. He is an expert in the area of building Information Security Architectures.
Prior to joining Unisys, Luc held architect and management positions in both the Belgian Armed Forces and the private sector. Within the Armed Forces he designed and managed networks and systems in a high security environment and represented his nation in international working groups related to intelligence coalition networks. In the private sector he assumed the roles of information risk manager and later security architect. In the past 8 years he has been working as Security Expert within Unisys driving Security Business Development and delivery in Europe with a focus on Identity & Access management.
15.30h : Coffee Break & Networking
16.00h : How will our future networks and infrastructures be affected by malware? 80% spam and a zillion botnets?, by Patrik Runald, Senior Manager, Security Research,Websense Security Labs
What is the expected evolution of malware and “internet threats” in the future? Even more common attacks and increase in complexity of customized zero-day attacks? Or will we be able to defeat the bad guys in time?
Real time (content) security, not just a luxury, but a necessity.
- Why real time security beats traditional solutions.
- What is real time security according to Websense.
- Websense Triton, simplifying management, closing the point solution gap.
- True hybrid security solutions, cloud based scaling and knowledge, with on-premises power.
About : Patrik Runald is a Senior Manager, Security Research at Websense Security Labs and has worked in the IT security field since 1995. Before joining Websense in 2009, Patrik did extensive research in the antivirus field and he was part of the team that made world wake up to the Conficker threat in 2008. He heads-up the US Websense Security Labs, the team within Websense that ensures that our 45 million customers are protected against all type of web- and email based threats
16.45h : Is there a place for a UTM in this new world? by Malay Upadhyay, Cyberoam Senior Security Consultant
Abstract : Globalization, convergence, virtualization, mobile/wireless-based web devices, social networking and Web 2.0/Web 3.0 are some of the future trends that will take the online world by storm.
As a result, an organization’s network security architecture (NSA) will have to be reengineered to address newer forms of Internet threats.
The following topics will be covered during this session:
- Current Security Scenario
o Security Timeline from past till now
o Limitations of Existing Security
- Future Security Trends
o Scalable and Extensible Security Architecture
o Role of Application Layer Control
o Cloud Computing Challenges
o Mobile Malware
o Social Networking
And many more
- Desired Elements in Security Architecture
About : Working as a Sr. Presales Security Consultant in Cyberoam International Presales team, Malay Upadhyay is providing on-site, online technical support related to network deployments/installations, defining security loop holes and overriding them. He also conducts USP/webinar on various Cyberoam products Cyberoam UTM, Cyberoam EPDP, Cyberoam I-View, Cyberoam SSL VPN, Cyberoam central console and on technological presentations for distributors/partners/resellers.
Since his Bachelor in Computer Science in India followed by a Master in Internetworking in Sydney, Malay has 3 years of experience in Network Security, Routing & Switching that includes hand on experience on UTM (Firewall, VPN, Anti virus, Anti Spam, Multi link manager, Load balance & failover), various routers, switches & Security tools. He has been working as a part of International team handling Europe, Middle East & Africa. Malay has also experience in ethical hacking, Security Analysis, Internetworking.
17.30h : Secure DNS and the future secure network infrastructures by Jan Janssens, Managing Partner Sensirius
18.00h : Closing Panel & Notes, Networking Reception
19.00h : Close of Event
Thanks for attending.
Are you a
leader in Security ? Do you want to share your expertise and join the
Leaders in Security as a Core Expert Member ?
Contact us via email! Or call +188.8.131.52.41 for a direct contact and more information.
An information set and your Membership Welcome Pack awaits you.
Copyright LSEC vzw 2007-2008 with the support of the IWT.
LSEC vzw Kasteelpark 10 - 3001 Heverlee - VAT BE BE 478 045 395 - fax. +184.108.40.206.69 - info @ lsec.be