TechFire March 2017…


BurningQuestion

MainLogo-WebRes

Paul-at-desk

“Today’s attacks can target any layer of application availability, leaving organisations vulnerable, irrespective of the strength of their cloud platform.”

Paul Hearns, Editor, TechPro magazine

Hackers are experts in distraction and confusion. They often use one technique to distract from the use of another.

However phishing, encryption malware and DDoS attacks — though garnering much attention — are often poorly understood as being narrowly focused on one aspect of operation. In truth, today’s attacks can target any layer of application availability, leaving organisations vulnerable, irrespective of the strength of their cloud platform — public, hybrid or private.

The first TechFire briefing of 2017 on 1 March examined the nature of today’s attacks with respect to protecting the entire application infrastructure, across clouds and down to the premises.

From the viewpoint of a high-profile finance application, David Cahill, security strategy and architecture manager at AIB spoke about how the bank’s applications are monitored by web application firewalls as they are made available across the Web to customers, providing end-to-end protection. He described how maturing solutions allow the bank to develop new services and capabilities rapidly, while retaining a high level of security, resilience and availability across various platforms.

Slide background
Slide background
Slide background
Slide background
Slide background
Slide background
Slide background
Slide background
Slide background
Slide background
Slide background
Slide background
Slide background
Slide background
Slide background

Expert speakers from F5 Networks joined the panel discussion and showed that a complete application protection solution can and must have the ability to protect across all layers of infrastructure and platforms — providing complete protection for the organisation.

Moderator Paul Hearns led the discussion. Click the PDF links to view/download the presentations:

presentation-icon

P.Hearns

presentation-icon

T.Liverpool

presentation-icon

M.Ward-Bopp

 

ExpertPanel

client1-pic

DAVID CAHILL, Security strategy & architecture manager, AIB

David Cahill has oversight of a variety of technical projects across AIB Group, including Cloud Services adoption, Advanced Malware protection, Mobile Device Management and IDS deployments. He described how maturing solutions allow the bank to develop new services and capabilities rapidly while retaining a high level of security, resilience and availability across various platforms.

sponsor1-pic

MARK WARD-BOPP, Systems Engineer, F5 Networks

With more than 16 years of experience in the IT industry, most of Mark Ward-Bopp’s career has been focused on large network and security design for financial services and retail customers. He posed the question: “Do you really know who your users are?” *Hint* They might not even be human.

sponsor2-pic

TRISTAN LIVERPOOL, Director of systems engineering UK & Irl, F5 Networks

The app is king, so how do you make sure you protect it — no matter where that app may reside? It’s widely known that the traditional security perimeter is no longer effective: Tristan Liverpool discussed the importance of securing the application, retaining a consistent and strong security posture wherever apps may reside.

 

IN ASSOCIATION WITH F5 NETWORKSF5networks-logo-web