Final Week to Get an iPad Pro w/ Smart Keyboard, HP ProBook, or $350 Off with OnDemand and vLive Training!

Webcasts

To attend this webcast, login to your SANS Account or create your Account.

Best Practices for Network Security Resilience

  • Thursday, March 28th, 2019 at 9:30 AM EDT (13:30:00 UTC)
  • Jon Oltsik and Keith Bromley
This webcast has been archived. You can view the webcast presentation by logging into your SANS Portal Account or creating an Account. Click the Register Now button after you have logged in to view the Webcast. The slides for this webcast are not available for download.
This webcast has been archived. You can view the webcast presentation and download the slides by logging into your SANS Portal Account or creating an Account. Click the Register Now button after you have logged in to view the Webcast.

Sponsor

  • Ixia

You can now attend the webcast using your mobile device!

Overview

Its not a question of IF your network will be breached, but WHEN. News broadcasts for the last several years have shown that most enterprise networks will be hacked at some point. In addition, the time it takes for most IT departments to notice the intrusion usually takes monthsover six months according to the Ponemon Institute. This gives hackers plenty of time to find what they want and exfiltrate whatever information they want. There are some clear things that you can do to minimize your corporate risk and the potential costs of a breach. One new approach is to create a resilient security architecture model. The intent of this model is to create a solution that gets the network back up and running after a breach has occurred, as fast as possible. While prevention should always be a key security architecture goal, a resilient architecture goal focusses on recognizing the breach, investigating the breach, and then remediating the damage as quickly as possible.

At this webinar you'll learn:

  •    What network security resilience is
  •    The benefits of this security technique
  •    Examples of visibility and security solutions that you can implement to reduce the time to remediation

Speaker Bios

Jon Oltsik

Jon Oltsik is an ESG senior principal analyst and the founder of the firm’s cybersecurity service. With almost 30 years of technology industry experience, Jon is widely recognized as an expert in all aspects of cybersecurity and is often called upon to help customers understand a CISO's perspective and strategies.

Jon was named one of the top 100 cybersecurity influencers for 2015 by Onalytica, and is active as a committee member of the Cybersecurity Canon, a project dedicated to identifying a list of must-read books for all cybersecurity practitioners.

Often quoted in the business and technical press, Jon also publishes articles on The Cipher Brief, a digital, security-based conversation platform that connects the private sector with the world’s leading security experts, and is also engaged in cybersecurity issues, legislation, and technology discussions within the U.S. government.


Keith Bromley

Keith Bromley is a senior solutions marketing manager at Keysight Technologies, with over twenty-five years of industry experience in marketing and engineering. Keith is responsible for marketing activities for Keysight's network visibility and security solutions.

As a spokesperson for the industry, Keith is a subject matter expert on network monitoring, network security, management systems, cloud computing, unified communications, IP telephony, SIP, wireless and wireline infrastructure.

Keith joined Keysight (through the acquisition of Ixia) in 2017 and has written many industry whitepapers covering topics on network monitoring, network visibility, IP telephony drivers, SIP, unified communications, as well as discussions around ROI and TCO for IP solutions.

Need Help? Visit our FAQ page or email webcast-support@sans.org.

Not able to attend a SANS webcast? All Webcasts are archived so you may view and listen at a time convenient to your schedule. View our webcast archive and access webcast recordings/PDF slides.