E N D
1. 1 Blue Sky Storm for Network Security Solutions The Marshes Golf Club
May 22, 2003
4:00 – 7:00 pm
Hosted by Brain Storm Associates Copyright Laura Lea Macaulay April, 2002
Copyright Laura Lea Macaulay April, 2002
2. 2 Our Sponsors
3. 3 Major Enablers
4. 4 Secured Online Information Systems Security Association
Tenebris
Radialink
Network Connections Plus
Technology Due Diligence
Circumference Software SolutionsInformation Systems Security Association
Tenebris
Radialink
Network Connections Plus
Technology Due Diligence
Circumference Software Solutions
5. 5 More Secured Online Elliptic Semi Conductor
ADDSecure
HITEElliptic Semi Conductor
ADDSecure
HITE
6. 6 Objective of the Event Highlight Ottawa as a home of world class network security technology companies
Discuss challenges for
Network security industry growth
Ottawa companies’ growth
Brainstorm suggestions for action and improvement
Copyright Laura Lea Macaulay April, 2002
Copyright Laura Lea Macaulay April, 2002
7. 7 Agenda 4:00 – 4:30 Networking
4:30 – 4:35 Welcome – Hugh Dysart, Master of Ceremonies
4:35 – 4:45 Presentation – Laura Lea Macaulay,
Brain Storm Associates
4:45 – 5:00 Keynote address – Francois Cosquer, Alcatel
5:00 – 5:05 Introducing the Panel
5:05 – 6:20 Panel Discussion – Prof. Tim Lethbridge, Facilitator
Panelist positions:
“What network security means to my company.”
Planned questions / Audience interaction
6:20 – 6:25 Recap of the event
6:25 – 6:30 Door Prizes
6:30 – 7:00 Networking & meeting the panel
Copyright Laura Lea Macaulay April, 2002
Copyright Laura Lea Macaulay April, 2002
8. 8 Laura Lea Macaulay
Founder and Managing Director before we introduce our keynote speaker or this fine group of panelists to talk about Network Security, I’m going to tell you a little bit about what we do at Brain Storm Associates. before we introduce our keynote speaker or this fine group of panelists to talk about Network Security, I’m going to tell you a little bit about what we do at Brain Storm Associates.
9. 9 What we do Brain Storm Associates deliver a unique approach to validate information technology opportunities We have a database of over 200 local consultants to complement our clients’ internal teams, spanning a broad IT spectrum.
Brain Storm Associates is the Information Technology Think-Tank Connection
We have a database of over 200 local consultants to complement our clients’ internal teams, spanning a broad IT spectrum.
Brain Storm Associates is the Information Technology Think-Tank Connection
10. 10 Why us Multiple specialized consultants
Vendor-agnostic approach
Customized model
Client management control
High return The benefits to the client and its internal teams are:
talking to more than one consultant
adds efficiency to each specialist’s time
shorten the cycles in the research phase
multi-perspective, diversity of thought, reduces tunnel vision
customized to each client’s needs
Internal management owns the process
high return on investment for low initial cost
we stretch the consulting dollar by arriving at the first stage of the solutions process for a fraction of the cost of a single consultant.
The benefits to the client and its internal teams are:
talking to more than one consultant
adds efficiency to each specialist’s time
shorten the cycles in the research phase
multi-perspective, diversity of thought, reduces tunnel vision
customized to each client’s needs
Internal management owns the process
high return on investment for low initial cost
we stretch the consulting dollar by arriving at the first stage of the solutions process for a fraction of the cost of a single consultant.
11. 11 Solutions follow Evaluate broadband alternatives for a rural community
Add efficiency to a VPN that operates on a multi-vendor platform
Design a component or product
Develop a website
Secure your network
12. 12 Contact info Laura Lea Macaulay
lauralea@brainstormassociates.com
613-836-0185
www.brainstormassociates.com
13. 13 Francois Cosquer Director Security Research
Alcatel Copyright Laura Lea Macaulay April, 2002
Copyright Laura Lea Macaulay April, 2002
14. 14 The Panelists Copyright Laura Lea Macaulay May 2003
Copyright Laura Lea Macaulay May 2003
15. 15 Panelist presentations Cross section of Ottawa companies
“What network security means to my company.”
Diverse perspectives – dialogue
Summary of views
Discussion questions Copyright Laura Lea Macaulay April, 2002
Copyright Laura Lea Macaulay April, 2002
16. 16 Panelist / Audience discussion Planned questions alternating with audience questions
Audience participation is expected!
Please identify yourself and say who the question is posed to Copyright Laura Lea Macaulay April, 2002
Copyright Laura Lea Macaulay April, 2002
17. 17 Six Planned questions: 1,2,3 What can you tell us about website privacy and risk management?
What is the future direction of managed security services?
How will corporations and citizens interact with e-government authentication programs?
Copyright Laura Lea Macaulay April, 2002
Copyright Laura Lea Macaulay April, 2002
18. 18 Six Planned questions: 4, 5, 6 What are the methods and tools used by hackers to penetrate networks?
Are there significant new developments in Network Security technologies, or is the bulk of activity a matter of applying known best practices to a widening market as enterprises awaken to their vulnerabilities?
How do you secure stored data?
19. 19 Recap of the event Copyright Laura Lea Macaulay April, 2002
Copyright Laura Lea Macaulay April, 2002
20. 20 Door Prizes Contributed by:
The Marshes Golf Club
Brain Storm Associates Copyright Laura Lea Macaulay April, 2002
Copyright Laura Lea Macaulay April, 2002
21. 21 Networking &meet the panel