Professional Documents
Culture Documents
Seminar Description:
The seminar is a structured program that systematically informs the attendees about
the threats to the organization’s network. It clearly shows that the security of
important data or information can be compromised. It also covers the variety of Risk Assessment
activities involved in the how-to’s and the proper maintenance and use, as well as the Vulnerability
disposition of network access. Assessment
Penetration Testing
The seminar will emphasize the value of having a well-organized and secure network Security Policies and
resulting in a safer and more efficient operation. It will also boost the integrity of your Procedures
network, promoting a sense of security and peace of mind.
Development
Regulatory Compliance
Specific Objectives: Services
Security Architecture
At the end of the one-day seminar, participants will be able to: Design
1. Indentify the priority of raising corporate-wide awareness of the need to protect
Security Education and
information. Training
2. Fully understand the exposure level to losses caused by information security
breaches.
3. Develop policies for a comprehensive implementation of security based on generally
accepted standards.
4. Comprehend the rationale of applying network security solutions to keep the
integrity of information. BITSHIELD Security Consulting, Inc.
5. Know how to implement and sustain the network security programs.
6. Realize the fact that the weakest link in any security program could be a poorly Tel: 466-1307, 466-1308
trained employee. Fax: 893-8527
Call/Text: 0906 802 8273
Who Should Attend This Seminar? 0928 946 5381
Email: sales@bitshieldsecurity.com
1. CEO/COO/President info@bitshieldsecurity.com
2. CIO
3. CTO
4. IT Directors
5. IT Managers
Watch out for
6. IT Security Officers/Administrators/Analysts/Engineers upcoming BITSHIELD
7. IT Consultants events on most
8. IT Auditors effective IT Security
9. IT Forensic Officers Solutions available
10. Network Administrators/Analysts/Engineers today!
11. System Programmers/Architects/Administrators/Analysts
12. Owners/Entrepreneurs who have IT networks
Benefits Of This Program To The Organization:
By attending this program, you will:
Seminar Outline:
Module 2 & 3: Afternoon (Wireless within Corporate Network and Information Leakage)
1. How To Secure
2. Vulnerability Assessment
3. Penetration Testing
4. Developing The Audit Team
5. Spot The Difference Exercise: Audit Exercise
Reserve your seats NOW and SAVE P2,000 (prior to July 31, 2008)!
After you made the deposit, please fax at 893-8527 or email to us at <info@bitshieldsecurity.com> your
completed registration form and payment details in the following format:
Name of Attendees:
Bank Name/Branch:
Date/Time:
can be found in the deposit slip (email the scanned copy of deposit slip)
Deposit Type:
Amount of Deposit:
Module 1: Enterprise Security – combines organizational, physical and information security in a corporate
environment. Security involves prevention, detection, response, monitoring and review measures to
reduce perceived risks to acceptable levels.
Muhammad Islam, Master of IT, CEH (Certified Ethical Hacker), ECSA (EC-Certified Security Analyst)
Module 2: Wireless Within Corporate Network - Being connected to a wireless network makes information
access much easier but making the network more susceptible to risks. Range of measures must be
implemented and security practices must be observed.
Module 3: Information Leakage – occurs when a website reveals sensitive data which may aid an attacker in
exploiting the system. While leakage does not necessarily represent a breach in security, it does give
an attacker useful guidance for future exploitation.
Wilbert B. Ontoy, CEH (Certified Ethical Hacker), CISSP (Certified Information Systems Security Professional),
MCTS (Microsoft Certified Technology Specialist)
Has spent over a decade as a consultant and trainer, delivering solutions to tens of thousands of IT
professionals from the most prestigious organizations and corporations around the world
Has been involved in the design, implementation, and evaluation of data communications,
internetworking, security, and network management products for over 20 years
Has advised companies large and small regarding security needs, product assessment, and the use of
emerging technologies and best practices
Proficient in Vulnerability and other security research, VPN, SSL and other security protocols and
topology, Firewalls and IDS TCP/IP implementation, Vulnerability Assessment, Penetration Testing, Risk
Assessment and Analysis, Disaster Recovery, Data and Databases advanced security