The Business Forum

"It is impossible for ideas to compete in the marketplace if no forum for
  their presentation is provided or available."           Thomas Mann, 1896


A Business Forum Round Table Luncheon
The River Place Hotel in Portland, Oregon

Information Security
 
With Experts provided by:  Cisco Systems, Inc.

 
Those accepting our invitation to attend included:  Director of Information Systems - American Steel Corporation * Controller - American Steel Corporation * Software Support Supervisor - Monaco Coach Corporation * State Controller - State of Oregon * Chief Information Security Officer - State of Oregon * Statewide Financial Internal Control Officer - Oregon State Controller's Division * Information Security Officer - State of Oregon - Department of Human Services * Information Security Project Manager � State of Oregon, Department of Human Services * Project Director - Common Management Systems - Humboldt State University * Director, Business Controls - The Regence Group *I.T.Consultant - Senior Care Guide Corporation


Contact for further Information:

Cisco Systems, Inc.

Kevin Flynn
Senior Security Manager
408-526-6877
[email protected]


For the benefit of those of our members and supporters who could not
attend the meeting we present the following white papers, with contacts


Cisco Threat Defense System Guide
How to Provide Effective Worm Mitigation

Contributed by Cisco Systems, Inc.

The network today is a critical business asset. It not only allows the smooth running of business applications, it also enables the easy delivery of data, voice, and video. As a result, companies are increasingly concerned with keeping their network running and applications online while protecting one of their most critical assets — their information. In order to protect your business, you need to protect your network.  In recent years, not only has the number of network and computer attacks been on the rise, but also the level of complexity and sophistication with which they strike. The most commonplace and perhaps most damaging of these attacks are called “worms.”


Building a Self-Defending Network

Contributed by Cisco Systems, Inc.

Increasingly, mission-critical business applications and services are deployed on open networks with substantial connections to the public Internet. Without appropriate security policies, processes, and products, Internet connectivity can compromise the very gains in productivity that help make today’s companies more profitable and that enable them to serve a larger and more diverse customer base.  Security enables enterprises to confidently extend the network to customers, partners, and remote/mobile employees, thus increasing revenues sources, efficiency of business processes and employee productivity.  In some industries, data privacy and the threat of litigation has become a government mandate. U.S. healthcare providers must comply with the Health Insurance Portability and Accountability Act (HIPAA), U.S. financial services providers are governed by the Gramm-Leach-Bliley Act, and U.K. companies must adhere to the Turnbull Report on Internal Control for public companies, as well as the Data Protection Act of 1995.  


Technology Best Practices for Endpoint Security

Contributed by Cisco Systems, Inc.

As technologies such as high-speed networks, switching, and end-to-end encryption are more widely adopted, providing desired security at the network level becomes a major challenge. One important place to enforce security is at the endpoint, where data resides and the potential for damage is greatest. Today, businesses are confronted with the availability of several point products, each attempting to solve a part of the endpoint security problem. These include distributed personal firewalls for protection against network-borne threats, antivirus scanners for detection of file-based threats, and audit or integrity products for detection of malicious configuration activity. These technologies do not address new attacks that are carried over existing protocols to attack applications, or new content-based attacks that attack systems before vendors are able to release and distribute signatures and other responses. This document outlines the technology best practices for endpoint security solutions, to help organizations make informed decisions when choosing endpoint security products.


Network Admission Control

Contributed by Cisco Systems, Inc.

Network Admission Control (NAC), an industry initiative sponsored by Cisco Systems, uses the network infrastructure to enforce security policy compliance on all devices seeking to access network computing resources, thereby limiting damage from viruses and worms. Using NAC, organizations can provide network access to endpoint devices such as PCs, PDAs, and servers that are verified to be fully compliant with established security policy. NAC can also identify noncompliant devices and deny them access, place them in a quarantined area, or give them restricted access to computing resources. NAC is part of the Cisco Self-Defending Network. Its goal is to create greater intelligence in the network to automatically identify, prevent, and adapt to security threats.


Search Our Site

Search the ENTIRE Business Forum site. Search includes the Business
Forum Library, The Business Forum Journal and the Calendar Pages.


Disclaimer

The Business Forum, its Officers, partners, and all other
parties with which it deals, or is associated with, accept
absolutely no responsibility whatsoever, nor any liability,
for what is published on this web site.    Please refer to:

legal description


Home    Calendar    The Business Forum Journal     Features    Concept    History
  Library    Formats    Guest Testimonials    Client Testimonials    Experts    Search  
News Wire
      Join Why Sponsor     Tell-A-Friend     Contact The Business Forum


The Business Forum
9297 Burton Way, Suite 100
 Beverly Hills, CA 90210
 Tel: 310-550-1984 Fax: 310-550-6121
 [email protected]

webmaster: bruceclay.com