TMC University
|
|
Secure Voice Communications:
It's Not Small Talk
8:30 - 9:15 am - Wednesday, September 2, 2009
Are your mobile phone conversations secure? Unless you are
President Obama or another high-level government official,
your conversations are likely to be exposed to eavesdropping
and
intercept, putting the integrity of your conversation at risk.
In this
session, the speaker will cover secure voice
communications
from identifying this active and global threat to
exploring tools
and solutions to remediate.
Secure, Real-Time Enablement of
Unified Communications
9:30 - 10:15 am
Enterprises are embracing VoIP and Unified Communications
(UC) to increase productivity, lower communications costs and
improve collaboration. While UC is being deployed as a simple,
ubiquitous and cost-effective channel for communication,
security and granular control of UC endpoints and control of
enterprise assets are top priorities for the seamless expansion
of UC. The true potential of UC applications, including IM and
video cannot be realized if enterprises deploy applications in a
closed network. Cost-savings, business continuity, employee
mobility and other UC benefits are compelling enterprises to
examine opening up their UC communications beyond the
enterprise perimeter with rapid expansion of SIP remote users
and SIP Trunks.
To make UC a reality, comprehensive security, enablement of
WiFi/dual-mode remote phones, extension mobility, and call
admission control are key requirements. This session will
address:
- Remote worker configurations, and related firewall and NAT issues
- Voice and Data VLAN separation with layer-7 application knowledge
- VoIP/UC-specific vulnerabilities and media anomalies that are risks in all deployments
- Privacy issues that are magnified with road warriors accessing enterprise networks via remote Internet connections
- Fine-grained policy enforcement based on UC network,
user, device and time of day
Secure Threat Mitigation in Enterprise
Telephony Environments
10:30 - 11:15 am
Increasingly, large enterprises in North America are moving
Unified Communications (UC) applications out of the lab and
into production environments. But UC's long-touted benefits
aren't free. The real-time IP technologies and VoIP
infrastructure elements that underlie UC provide many new
inroads for criminal attackers (both inside and outside the
enterprise) and unwitting bearers of malware. Further, it's clear
that many current countermeasures cannot defend the new
attack surfaces presented by real-time VoIP, instant messaging,
video, and collaboration applications.
Failure to quash these new security threats can mean lost
revenue, diminished customer loyalty, corporate brand
devaluation, liability exposure, and regulatory non-compliance
penalties. This session builds a risk assessment taxonomy for
UC security; ranks the criticality and value of UC resources at
risk; rates the reality, imminence, and success probability of
various UC security attacks; and identifies specific technologies
that can be deployed to deflect or mitigate the impact of those
attacks on business-critical applications and networks.
Who's Listening?
The Truth About Enterprise SIP Security
11:30 am - 12:15 pm
Session Initiation Protocol (SIP) has emerged as the
predominant protocol for VoIP deployments. While SIP is gaining
headway in the IP communications market, any new technology
brings with it some inherent security challenges. In this
webinar, we discuss these challenges, the misconceptions
surrounding SIP Security, and examine the tools available to
counter them. This session will also explore robust solutions
that not only tackle security threats, but also empower
businesses to proactively protect their networks from current
and future attacks. Included in this webinar, we will examine
the Interactive Intelligence suite of products as a
communications platform case study that empowers
businesses to tackle security threats while maintaining
affordability and performance.
TMC University Exam
11:15 pm
At the conclusion of the program, you will sit for an exam covering the course topics. Those who receive a passing grade on the exam receive TMC University's Certificate of Achievement, certifying that you have successfully completed the course and received a comprehensive education regarding IP Network Security.
Peter Martin, Sr. Engineer, Network Services-IP Engineering, IPC
Haim Argaman, Owner and Senior Consultant, Crimsonet Technologies
James Brehm, Director of Business Development, Frost & Sullivan