Everything you wish your Mother Told you About Network Access Control (NAC)
- James D. Brown, CEO StillSecure
- Tuesday, July 16th, 12:30pm - 1:15pm
Most networks are like a Tootsie RollĀ® lollipop: hard shell on the outside, with a soft, chewy, center. Many security tools are designed to keep the bad guys off your network, by fending off any and all frontal assaults. This is a little like putting a wall around the perimeter of your property, itās never a bad idea however; it does little to keep an aggressive trespasser out. So too, the edge network defenses, which are often strong enough to hold off most intruders but the persistent attackers will keep trying to get past them.
And most networks, if you can get behind that strong wall of defenses, are nearly helpless in the face of an attack. Unfortunately, many organizations rely solely on anti-malware and host-based firewalls for endpoint protection. This stops some attacks, but not the most likely ones: spear phishing, zero-day attacks, or unauthorized port access.
So how should companies combat this? This course will cover all the ins and outs of network access control including providing tips and tricks to detect vulnerabilities, offer steps to implement a secure BYOD policy, insight on how to choose the right NAC vendor (and red flags to look out for), as well as debunk common NAC myths.
The following bonus sessions are open to all paid attendees at no additional cost. There are many different types of events that fall into these categories:
- SANS@Night: Evening presentations given after day courses have ended. This category includes Keynotes.
- Special Events: SANS-hosted events and other non-technical recreational offerings. This category includes, but is not limited to, Receptions and Information Tables.
- Vendor: Events hosted by external vendor exhibitors.
- Lunch & Learn: Short presentations given during the lunch break.
Monday, July 15
Tuesday, July 16
|Vendor Showcase||—||Tuesday, July 16th, 10:30am - 10:50am||Vendor Event|
|Fortinet Next Generation Firewalls||Troy Brueckner, CISSP, GISP, VP of Sales and Marketing for Infogressive||Tuesday, July 16th, 12:30pm - 1:15pm||Lunch and Learn|
|Everything you wish your Mother Told you About Network Access Control (NAC)||James D. Brown, CEO StillSecure||Tuesday, July 16th, 12:30pm - 1:15pm||Lunch and Learn|
|Vendor Showcase||—||Tuesday, July 16th, 12:30pm - 1:15pm||Vendor Event|
|Vendor Showcase||—||Tuesday, July 16th, 3:00pm - 3:20pm||Vendor Event|
|Crayons Never Uploaded Our Stuff to the Internet!: Kids and Mobile Applications||Kevin and Brenna Johnson||Tuesday, July 16th, 7:15pm - 8:15pm||SANS@Night|
|APT: It is Time to Act||Dr. Eric Cole||Tuesday, July 16th, 7:15pm - 9:15pm||SANS@Night|
Wednesday, July 17
|OODA - The Secret to Effective Security in Any Environment||Kevin Fiscus||Wednesday, July 17th, 7:15pm - 8:15pm||SANS@Night|
|Infosec Rock Star: How to be a More Effective Security Professional||Ted Demopoulos||Wednesday, July 17th, 7:15pm - 8:15pm||SANS@Night|
|Information Assurance Metrics: Practical Steps to Measurement||James Tarala||Wednesday, July 17th, 8:15pm - 9:15pm||SANS@Night|
Thursday, July 18
Friday, July 19
|Biometrics without Accessories: Helping Android Holders Authenticate (BWA:HAHA)||Jim Goddard, Managing Principal, HP Security Intelligence & Operations Consulting Practice||Friday, July 19th, 12:30pm - 1:15pm||Lunch and Learn|
|An Interdisciplinary Approach to Your Security Program: Good Artists Copy, Great Artists Steal!||Ed Capizzi||Friday, July 19th, 7:15pm - 8:15pm||SANS@Night|