Presented at
The Last HOPE (2008),
July 20, 2008, 3 p.m.
(60 minutes).
Proper network infrastructure configuration is a crucial step in a successful in depth defense strategy for any organization. The fact that the network fabric is susceptible to these attacks years after their initial discovery is alarming and disgusting at the same time. This discussion revisits these attacks using contemporary techniques and tools and also offers equally contemporary solutions to mitigate or foil these malicious network attacks as the case may be. Networking professionals will be able to walk away from this presentation with solid remedies to these issues and with a reinforcement that they actually still exist and are pertinent to a network security strategy that will function now and in the future.
Presenters:
-
Kevin Figueroa
Kevin Figueroa is CEO and information security engineer for K&T International Consulting, providing a spectrum of services like security analysis, penetration testing, compliance audit, wireless security assessment, and reverse engineering analysis. Over the last ten years he has worked for CitiGroup and CNN/money.
-
Marco Figueroa
Marco Figueroa is CEO and senior security analyst with MAF Consulting Inc, a New York City information security consulting firm. His expertise includes reverse engineering malware, incident handling, hacker attacks and defenses. He has performed numerous security assessments, and responded to computer attacks for clients in market verticals.
-
Anthony L. Williams
Anthony Williams is the CEO and information security architect for IRON::Guard Security, LLC where he performs penetration testing, vulnerability assessments, audits, and incident response. His experience as an information security professional with over 13 years of IT experience includes proficiency in regulatory environments including Sarbanes-Oxley and the Health Insurance Portability and Accountability Act with an extensive background in IT audits using ISO/BS 17799 and COBIT. Anthony is a member of the FBI Infragard, Information Systems Security Association, and Information Systems Audit and Control Association.
Links:
Similar Presentations: