1 / 20

Blue Sky Storm for Network Security Solutions

dorit
Download Presentation

Blue Sky Storm for Network Security Solutions

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


    1. 1 Blue Sky Storm for Network Security Solutions The Marshes Golf Club May 22, 2003 4:00 – 7:00 pm Hosted by Brain Storm Associates Copyright Laura Lea Macaulay April, 2002 Copyright Laura Lea Macaulay April, 2002

    2. 2 Our Sponsors

    3. 3 Major Enablers

    4. 4 Secured Online Information Systems Security Association Tenebris Radialink Network Connections Plus Technology Due Diligence Circumference Software SolutionsInformation Systems Security Association Tenebris Radialink Network Connections Plus Technology Due Diligence Circumference Software Solutions

    5. 5 More Secured Online Elliptic Semi Conductor ADDSecure HITEElliptic Semi Conductor ADDSecure HITE

    6. 6 Objective of the Event Highlight Ottawa as a home of world class network security technology companies Discuss challenges for Network security industry growth Ottawa companies’ growth Brainstorm suggestions for action and improvement Copyright Laura Lea Macaulay April, 2002 Copyright Laura Lea Macaulay April, 2002

    7. 7 Agenda 4:00 – 4:30 Networking 4:30 – 4:35 Welcome – Hugh Dysart, Master of Ceremonies 4:35 – 4:45 Presentation – Laura Lea Macaulay, Brain Storm Associates 4:45 – 5:00 Keynote address – Francois Cosquer, Alcatel 5:00 – 5:05 Introducing the Panel 5:05 – 6:20 Panel Discussion – Prof. Tim Lethbridge, Facilitator Panelist positions: “What network security means to my company.” Planned questions / Audience interaction 6:20 – 6:25 Recap of the event 6:25 – 6:30 Door Prizes 6:30 – 7:00 Networking & meeting the panel Copyright Laura Lea Macaulay April, 2002 Copyright Laura Lea Macaulay April, 2002

    8. 8 Laura Lea Macaulay Founder and Managing Director before we introduce our keynote speaker or this fine group of panelists to talk about Network Security, I’m going to tell you a little bit about what we do at Brain Storm Associates. before we introduce our keynote speaker or this fine group of panelists to talk about Network Security, I’m going to tell you a little bit about what we do at Brain Storm Associates.

    9. 9 What we do Brain Storm Associates deliver a unique approach to validate information technology opportunities We have a database of over 200 local consultants to complement our clients’ internal teams, spanning a broad IT spectrum. Brain Storm Associates is the Information Technology Think-Tank Connection We have a database of over 200 local consultants to complement our clients’ internal teams, spanning a broad IT spectrum. Brain Storm Associates is the Information Technology Think-Tank Connection

    10. 10 Why us Multiple specialized consultants Vendor-agnostic approach Customized model Client management control High return The benefits to the client and its internal teams are: talking to more than one consultant adds efficiency to each specialist’s time shorten the cycles in the research phase multi-perspective, diversity of thought, reduces tunnel vision customized to each client’s needs Internal management owns the process high return on investment for low initial cost we stretch the consulting dollar by arriving at the first stage of the solutions process for a fraction of the cost of a single consultant. The benefits to the client and its internal teams are: talking to more than one consultant adds efficiency to each specialist’s time shorten the cycles in the research phase multi-perspective, diversity of thought, reduces tunnel vision customized to each client’s needs Internal management owns the process high return on investment for low initial cost we stretch the consulting dollar by arriving at the first stage of the solutions process for a fraction of the cost of a single consultant.

    11. 11 Solutions follow Evaluate broadband alternatives for a rural community Add efficiency to a VPN that operates on a multi-vendor platform Design a component or product Develop a website Secure your network

    12. 12 Contact info Laura Lea Macaulay lauralea@brainstormassociates.com 613-836-0185 www.brainstormassociates.com

    13. 13 Francois Cosquer Director Security Research Alcatel Copyright Laura Lea Macaulay April, 2002 Copyright Laura Lea Macaulay April, 2002

    14. 14 The Panelists Copyright Laura Lea Macaulay May 2003 Copyright Laura Lea Macaulay May 2003

    15. 15 Panelist presentations Cross section of Ottawa companies “What network security means to my company.” Diverse perspectives – dialogue Summary of views Discussion questions Copyright Laura Lea Macaulay April, 2002 Copyright Laura Lea Macaulay April, 2002

    16. 16 Panelist / Audience discussion Planned questions alternating with audience questions Audience participation is expected! Please identify yourself and say who the question is posed to Copyright Laura Lea Macaulay April, 2002 Copyright Laura Lea Macaulay April, 2002

    17. 17 Six Planned questions: 1,2,3 What can you tell us about website privacy and risk management? What is the future direction of managed security services? How will corporations and citizens interact with e-government authentication programs? Copyright Laura Lea Macaulay April, 2002 Copyright Laura Lea Macaulay April, 2002

    18. 18 Six Planned questions: 4, 5, 6 What are the methods and tools used by hackers to penetrate networks? Are there significant new developments in Network Security technologies, or is the bulk of activity a matter of applying known best practices to a widening market as enterprises awaken to their vulnerabilities? How do you secure stored data?

    19. 19 Recap of the event Copyright Laura Lea Macaulay April, 2002 Copyright Laura Lea Macaulay April, 2002

    20. 20 Door Prizes Contributed by: The Marshes Golf Club Brain Storm Associates Copyright Laura Lea Macaulay April, 2002 Copyright Laura Lea Macaulay April, 2002

    21. 21 Networking & meet the panel

More Related