News


About Trident
Our Partners
TDS Training
A Career at TDS
News
press releases
trident events
industry news
weekly newsletter


Navigational Square

archives

February 4, 1999
Press Invited to Observe Controlled Computer Hack at San Antonio Critical Information Protection Seminar

SAN ANTONIO_Trident Data Systems will perform a controlled computer hack Feb. 9 during a free seminar at the La Mansion del Rio Hotel, 112 College Street. It will demonstrate how an inexperienced hacker is able to infiltrate and exploit a company's network

The hack will take place at approximately 9:30 a.m., during a briefing by Trident security engineer Mike Hall. It will be performed on Trident's local San Antonio network.

The seminar itself, hosted by Trident and Nokia, will address the many facets of information and infrastructure protection, and features, along with the hack, a presentation by network security expert Ira Winkler.

Tuesday's event promises to provide an overview of information and infrastructure protection programs, including policy, technology, compliance and solutions. They will demonstrate cost-effective approaches to managing risk; explain current approaches to security and integrated solutions; answer the questions of how to examine critical information security issues, identifying security weaknesses and applying security controls; and provide leading security products via live demonstrations.

The keynote speaker is Ira Winkler, one of the foremost information security experts in the world. Winkler is formerly of the National Security Agency and National Computer Security Association, and is currently the president of the Internet Security Advisors Group. He is the author of two books, "Corporate Espionage" and the current bestseller "Through the Eyes of the Enemy." He also writes the "Spy Files" column for ZDTV.

The complete seminar agenda follows:
8:30 a.m. Continental Breakfast & Welcome
9:15 a.m. Introduction: Trident Data Systems
9:30 a.m. Trident: "How secure is your network? - An attacker's approach"
10:15 a.m. Keynote Speaker: Ira Winkler - Author of the book "Through the Eyes of the Enemy"
11:00 a.m. Break
11:15 a.m. Nokia: "Securing the Enterprise"
11:45 a.m. Questions & Answers
12:15 p.m. Demonstrations
12:30 p.m. Lunch
1:30 p.m. "Network Attack & Defend" - Hands-on exercises securing your computer network against today's common vulnerabilities
4:30 p.m. Wrap-up

In addition, Trident offers "Through the Eyes of a Hacker," a free network vulnerability assessment. Winners drawn at the seminar will receive a complimentary, one-day network vulnerability assessment. This non-destructive test provides executives with the information a hacker, competitor, industrial espionage agent, information broker, or other computer criminal would see during the first two phases of a network attack, namely Network Reconnaissance and Target Host Identification.

Back to Archives

 

Copyright(c) 1995-1998 Trident Data Systems>
		</TD>
		<TD
			WIDTH	=