Track: TMC University: IP Network Security (TMCU4)
VoIP Security Myths & Realities
|Wednesday - 09/17/08, 9:00-9:45am|
With Unified Communication deployments increasing in number and size in enterprises across the US, there is a growing clamor over VoIP security. The openness of the Internet enables amazing new forms of end-to-end communications but also unlocks the door for criminals and causal hackers to compromise IP-based interactive communications. Amidst this clamor, what are people really afraid of? What are the real risks and how can they be mitigated or controlled? This session will establish a VoIP security framework to identify the risks, understand the impacts and assess the cost of controlling or mitigating these risks.
Director of Product Marketing
Broadcast Engineering, VoIP Princess Blog
Best Practices in VoIP Security
|Wednesday - 09/17/08, 10:00-10:45am|
As VoIP deployment accelerates over the next two to three years, VoIP networks are going to become an increasingly attractive target for would-be hackers and attacks. As a discipline, VoIP security is still in its infancy making it exceedingly difficult for security professionals with enterprises with stringent security and privacy requirements to accurately assess new threats, trends and issues in the market. The end result is a new security discipline that requires constant monitoring and intelligence in order to separate fact from fiction and determine what action really needs to be taken. This session will showcase research conducted in real-life labs and best practices from the data security world.
Vice President Security
Mark Hayden (Moderator)
Deloitte Financial Advisory Services LLP
Security Considerations for the Enterprise
|Wednesday - 09/17/08, 11:00-11:45am|
As the worldwide business spotlight on communications and data security has gotten brighter, experts agree technology alone cannot provide secure premises or communications. Even if technology is the “most encrypted in the world,” it can often be ineffectual without sound, well-executed security processes behind it. Same thing when planning and implementing security processes and integrating the people in an organization: Do so completely and consistently enterprise-wide, and your workforce can actually strengthen security measures. Don’t, and employees can be your greatest weakness. The most stalwart security program therefore is one that combines the best of technology, the most stringent security processes possible for business systems and data, and people who understand and abide by those processes. Come to this session to learn more.
Vice President Product Management
Deploying Secure Wireless VoIP
|Wednesday - 09/17/08, 12:45-1:30pm|
We all have heard the rumors that VoIP is not as secure as legacy telephony. We have also seen the vast improvement over the past several years that effectively removed this gap (or barrier). So what’s next and how do enterprises keep their technology ahead of the curve? In this presentation the speakers will address the latest threat drivers in mobility and Internet telephony, what the industry is doing to protect against these threats, what kind of impact is this having to the overall operational environment, what are the cost impacts, and what does the crystal ball say about the future.
Product Marketing Offer Lead for Self-Service Solutions
Rapid Link, Inc.
TMC University Exam
|Wednesday - 09/17/08, 1:45-2:30pm|