|
|
Conferences
|
|
Track: TMC University: IP Network Security (TMCU4)
|
VoIP Security Myths & Realities (TMCU4-01)
Wednesday - 09/17/08, 9:00-9:45am
With Unified Communication deployments increasing in number and size in enterprises across the US, there is a growing clamor over VoIP security. The openness of the Internet enables amazing new forms of end-to-end communications but also unlocks the door for criminals and causal hackers to compromise IP-based interactive communications. Amidst this clamor, what are people really afraid of? What are the real risks and how can they be mitigated or controlled? This session will establish a VoIP security framework to identify the risks, understand the impacts and assess the cost of controlling or mitigating these risks.
Presented by:
|
|  | Jonathan Zarkower Director of Product Marketing Acme Packet |  | Kevin Corson CEO/Co-Founder HBN Inc. |  | Carolyn Schuk Editor, Blogger Broadcast Engineering, VoIP Princess Blog |
|
Best Practices in VoIP Security (TMCU4-02)
Wednesday - 09/17/08, 10:00-10:45am
As VoIP deployment accelerates over the next two to three years, VoIP networks are going to become an increasingly attractive target for would-be hackers and attacks. As a discipline, VoIP security is still in its infancy making it exceedingly difficult for security professionals with enterprises with stringent security and privacy requirements to accurately assess new threats, trends and issues in the market. The end result is a new security discipline that requires constant monitoring and intelligence in order to separate fact from fiction and determine what action really needs to be taken. This session will showcase research conducted in real-life labs and best practices from the data security world.
Presented by:
|
|  | Avi Chesla Vice President Security Radware |  | Mark Hayden (Moderator) Partner Deloitte Financial Advisory Services LLP |  | Joel Maloff Principal Consultant Maloff NetResults |
|
Security Considerations for the Enterprise (TMCU4-03)
Wednesday - 09/17/08, 11:00-11:45am
As the worldwide business spotlight on communications and data security has gotten brighter, experts agree technology alone cannot provide secure premises or communications. Even if technology is the “most encrypted in the world,” it can often be ineffectual without sound, well-executed security processes behind it. Same thing when planning and implementing security processes and integrating the people in an organization: Do so completely and consistently enterprise-wide, and your workforce can actually strengthen security measures. Don’t, and employees can be your greatest weakness. The most stalwart security program therefore is one that combines the best of technology, the most stringent security processes possible for business systems and data, and people who understand and abide by those processes. Come to this session to learn more.
Presented by:
 | Vincent Paquet Vice President Product Management Switch Communications |  | Billy Chia Training Specialist Digium |
|
Deploying Secure Wireless VoIP (TMCU4-04)
Wednesday - 09/17/08, 12:45-1:30pm
We all have heard the rumors that VoIP is not as secure as legacy telephony. We have also seen the vast improvement over the past several years that effectively removed this gap (or barrier). So what’s next and how do enterprises keep their technology ahead of the curve? In this presentation the speakers will address the latest threat drivers in mobility and Internet telephony, what the industry is doing to protect against these threats, what kind of impact is this having to the overall operational environment, what are the cost impacts, and what does the crystal ball say about the future.
Presented by:
 | Aaron Wellman Product Marketing Offer Lead for Self-Service Solutions Genesys |  | Matt Liotta former CTO Rapid Link, Inc. |
|
TMC University Exam (TMCU4-05)
Wednesday - 09/17/08, 1:45-2:30pm
|
|
| | | | | | | | | | | | | | | |
|
|
|
|