e-Security 2017

March 16, 2017   Webinar

e-Security 2017 will be held on March 16, 2017.

e-Security 2017 is an event that covers topics such as:

  • Security Architecture
    • Security principles (least privilege)
    • Security policy: firewall policy, e-mail and Internet policy, security architecture
    • Division of duties
    • Technical security measures: network segmentation, firewalls, intrusion detection, secure configurations, secure application architectures
    • Security architecture components
  • Why e-Security 2017 is necessary
    • Security goals
    • Threats to e-business
    • Spoofing
    • Quantitative and technical analysis of threats
    • Sniffing, hacking
    • Denial-of-service attacks
  • Securing Websites (inbound access)
    • Server security: web server, application and data(base) servers, WAP server and DNS server
    • Website architectures
    • Transaction security
  • Firewalls
    • Router, bastion host
    • Firewall architectures
    • Packet filtering
    • DeMilitarised Zone (DMZ)
    • Application level filtering
  • Identification, authentication, authorisation and encryption techniques
    • Directory Services
    • Public Key Infrastructure (PKI) concepts
    • Trusted Third Party
    • Single Sign-On (SSO)
  • Secure Internet Use (outbound access)
    • Mailserver security
    • Internet and e-mail usage policy
    • Scanning: e-mail traffic for viruses, browser connections (Java applets, Java script, ActiveX)
    • Proxy server
  • Legal Issues
    • Securing personal data
    • Outsourcing contracts (site development, site hosting, content management, personnel)
    • Legal aspects of e-commerce
    • Computer crime
  • Security Management
    • Security management processes
    • Security organisation: information strategy, plan, policy, security roles and responsibilities
    • Setting up security logging, monitoring and reporting
    • Preventive, detective and corrective security measures
    • Questions and answers
  • Dealing with Hackers
    • Collecting evidence
    • Policy and legal measures
    • `Honey pots` and their uses
    • Using intrusion detection

Important

Please, check the official conference website for possible changes, before you make any traveling arrangements

Prices are for evaluation only.

Find Similar Events by Category

People interested in this event are also interested in:

CeBIT Australia 2017
May 23-25, 2017
Sydney, Australia
Predictive Analytics World London 2017
October 11-12, 2017
London, United Kingdom
Digital Cream Singapore 2017
November 23, 2017
Singapore, Singapore

Featured Conferences & Exhibitions