![]() |
||
![]() |
||
Introduction
|
Managing Your E-mail from Over-flowing the FloodgatesPat Gimore, CISSP, Treasurer, International Information Systems Security Certification Consortium (ISC2)Synopsis: The protection of vital electronic communications, both inbound and outbound, require technological barricades to guard against intrusions such as DDOS attacks and viruses, as well as the use of encryption and message authentication to ensure confidentiality and integrity. During this presentation, we will look at the flow of information through the enterprise ‘dam’ or firewalls looking at the biggest security incidents in recent history, how the threats are changing, and what we need to do to be pro-active in defending our companies against future attacks on the security of our information and our IT infrastructures.
|