Network Segmentation Best Practices for Defense
- Tuesday, September 30th, 2014 at 1:00 PM EDT (17:00:00 UTC)
- James Tarala and Isabelle Dumont
You can now attend the webcast using your mobile device!
Network segmentation has been a security best practice in financial services for a very long time. Most institutions know that segmenting systems is the right thing to do, but organizations still most often do not use the defenses at their disposal. With the proliferation of mobile computing, cloud computing, and innovative use for the Internet, no organization should take yesterday's segmentation best practices for granted. Whether it's to isolate highly sensitive data within the data center, to ensure better protection around offices that are in high-risk geographies, or to isolate mobile devices internally, maintaining good segmentation might require a different approach today than just five years ago. This webinar will cover typical use cases in financial services, best and worst practices, and offer ideas to get started if you feel you have fallen behind.
Isabelle leads industry initiatives at Palo Alto Networks with special focus on healthcare, government, critical infrastructure, and financial services. She has extensive experience in enterprise infrastructure, analytics, mobile computing and innovative, disruptive technologies in general. Prior to joining Palo Alto Networks in 2012, she held strategic marketing positions at Oracle, CollabNet, SEVEN Networks and IRI Software. Isabelle holds a Master of Artificial Intelligence.
James Tarala is a principal consultant with Enclave Hosting, LLC and is based out of Venice, FL. He is a regular speaker and senior instructor with the SANS Institute as well as a courseware author and editor for many of their auditing and security courses. As a consultant he has spent the past few years architecting large enterprise IT security and infrastructure architectures, specifically working with many Microsoft based, directory services, e-mail, terminal services, and wireless technologies. He has also spent a large amount of time consulting with organizations to assist them in their security management, operational practices, and regulatory compliance issues and often times performs independent security audits and assists internal audit groups to develop their internal audit programs. James completed his undergraduate studies at Philadelphia Biblical University, his graduate work at the University of Maryland, and holds numerous professional certifications.