You are on page 1of 3

ARE YOU SAFE AND SECURE?

An introduction to IT Security Seminar towards understanding the


WWEE SSPPEECCIIAALLIIZZEE IINN IITT
vulnerabilities of network and the safety of precious
NNEETTWWOORRKK
data/information/trade secrets VVUULLNNEERRAABBIILLIITTYY
AASSSSEESSSSMMEENNTT AAUUDDIITT
Date: August 14, 2008 (Thursday)
Time: 8:30 AM - 5:30 PM
Venue: Tiara Oriental Hotel, 7248 Malugay St., Makati City

Seminar Description:

The seminar is a structured program that systematically informs the attendees about
the threats to the organization’s network. It clearly shows that the security of
important data or information can be compromised. It also covers the variety of Risk Assessment
activities involved in the how-to’s and the proper maintenance and use, as well as the Vulnerability
disposition of network access. Assessment
Penetration Testing
The seminar will emphasize the value of having a well-organized and secure network Security Policies and
resulting in a safer and more efficient operation. It will also boost the integrity of your Procedures
network, promoting a sense of security and peace of mind.
Development
Regulatory Compliance
Specific Objectives: Services
Security Architecture
At the end of the one-day seminar, participants will be able to: Design
1. Indentify the priority of raising corporate-wide awareness of the need to protect
Security Education and
information. Training
2. Fully understand the exposure level to losses caused by information security
breaches.
3. Develop policies for a comprehensive implementation of security based on generally
accepted standards.
4. Comprehend the rationale of applying network security solutions to keep the
integrity of information. BITSHIELD Security Consulting, Inc.
5. Know how to implement and sustain the network security programs.
6. Realize the fact that the weakest link in any security program could be a poorly Tel: 466-1307, 466-1308
trained employee. Fax: 893-8527
Call/Text: 0906 802 8273
Who Should Attend This Seminar? 0928 946 5381
Email: sales@bitshieldsecurity.com
1. CEO/COO/President info@bitshieldsecurity.com
2. CIO
3. CTO
4. IT Directors
5. IT Managers
Watch out for
6. IT Security Officers/Administrators/Analysts/Engineers upcoming BITSHIELD
7. IT Consultants events on most
8. IT Auditors effective IT Security
9. IT Forensic Officers Solutions available
10. Network Administrators/Analysts/Engineers today!
11. System Programmers/Architects/Administrators/Analysts
12. Owners/Entrepreneurs who have IT networks
Benefits Of This Program To The Organization:
By attending this program, you will:

1. Realize the network security nightmare your organization is facing.


2. Increase confidence that despite the vulnerabilities of your network, it can still be solved.
3. Increase awareness of the need to have regular network vulnerability assessment audit.
4. Provide the employees with management direction, support and guidance towards information security.
5. Be able to define roles and responsibilities with respect to information security.
6. Reduce expenditures due to early detection of security breaches and their mitigation.
7. Prevent future security breaches whether procedural, technological or human-related.
8. Gain security edge over competitors.

Seminar Outline:

Module 1: Morning (Enterprise Security)

1. Why Should You Care About Security?


2. Terminologies And Common Misconceptions
3. Real-World Attacks And Countermeasures (Including Programs That Invite Attacks On The System)
4. Practical Prevention Techniques And Tools
5. Steps To An Effective Security Program
6. Physical Security
7. The Neglected Factor: Employees Who Can Be A Security Risk

Module 2 & 3: Afternoon (Wireless within Corporate Network and Information Leakage)

1. How To Secure
2. Vulnerability Assessment
3. Penetration Testing
4. Developing The Audit Team
5. Spot The Difference Exercise: Audit Exercise

Reserve your seats NOW and SAVE P2,000 (prior to July 31, 2008)!

P5,000 - pay on or before July 31, 2008


P6,000 - pay on or before seminar date
P7,000 - walk-in attendees payable at the registration table

and deposit your payment at:


Name of Bank Banco de Oro
Account Name: Bitshield Security Consulting, Inc.
Account No: 417800-9134
Account Branch: Reposo-Makati Branch
Address: J. P. Rizal cor. Reposo St., Poblacion, Makati City

After you made the deposit, please fax at 893-8527 or email to us at <info@bitshieldsecurity.com> your
completed registration form and payment details in the following format:

Name of Attendees:
Bank Name/Branch:
Date/Time: 
can be found in the deposit slip (email the scanned copy of deposit slip)
Deposit Type:
Amount of Deposit:

SECURITY INVESTMENT INCLUDES: A "Fun-filled" Learning Experience, complete with


Handouts, Certificates plus... Sumptuous Lunch & Snacks!!!
About The Speakers:

Module 1: Enterprise Security – combines organizational, physical and information security in a corporate
environment. Security involves prevention, detection, response, monitoring and review measures to
reduce perceived risks to acceptable levels.

Muhammad Islam, Master of IT, CEH (Certified Ethical Hacker), ECSA (EC-Certified Security Analyst)

With almost 10 years of experience in designing networks and IT Security Infrastructure


With extensive knowledge and hands-on experience on Information Security for mission critical
environments
Implemented high-end Security Products & Policies based on ISO 17799 & BS 7799 standards for more
than 25 enterprises & various mid-level enterprises all around the world
Awarded as Master of IT by Juniper Networks in 2006, http://www.masterofit.net
Has been in consulting for various products like: Cisco Security Appliances, UTM Appliances (Firewall,
IDS, AntiSPAM, Antivirus), Astaro Security Linux Appliances, etc., Juniper, Snort / SAM / ACID to name a
few

"Mr. Islam is something of an expert when it comes to evaluating security products."


- Juniper Networks, 2006

Module 2: Wireless Within Corporate Network - Being connected to a wireless network makes information
access much easier but making the network more susceptible to risks. Range of measures must be
implemented and security practices must be observed.

Darwin B. Luzuriaga, ECE

With over 7 years of extensive hands-on experience in telecommunications industry


With certifications on Cisco Advanced Wireless LAN Field Specialist, Cisco Certified Network Associate and
Certified Internet Professional
Has been trained on Licensed Penetration Tester, Vulnerability Assessment, Certified Ethical Hacking and
Countermeasures, Computer Hacking Forensics Investigator and Drive-By Pharming
Has vast knowledge and experience in wireless networking
Has been a resource speaker and trainer for various wireless networking trainings and seminars

Module 3: Information Leakage – occurs when a website reveals sensitive data which may aid an attacker in
exploiting the system. While leakage does not necessarily represent a breach in security, it does give
an attacker useful guidance for future exploitation.

Wilbert B. Ontoy, CEH (Certified Ethical Hacker), CISSP (Certified Information Systems Security Professional),
MCTS (Microsoft Certified Technology Specialist)

Has spent over a decade as a consultant and trainer, delivering solutions to tens of thousands of IT
professionals from the most prestigious organizations and corporations around the world
Has been involved in the design, implementation, and evaluation of data communications,
internetworking, security, and network management products for over 20 years
Has advised companies large and small regarding security needs, product assessment, and the use of
emerging technologies and best practices
Proficient in Vulnerability and other security research, VPN, SSL and other security protocols and
topology, Firewalls and IDS TCP/IP implementation, Vulnerability Assessment, Penetration Testing, Risk
Assessment and Analysis, Disaster Recovery, Data and Databases advanced security

You might also like