Tech

Retaliation: Breaking Attack Vectors in the Infrastructure


Expo Theatre (Hall G) October 20, 2009 - Feedback   

Bookmark and Share

Jennifer Jabbusch

2010 will be the beginnings of a new world of network and infrastructure security as new IEEE standards change the landscape of threat models for wired, wireless and wide area networks. Learn how to use these features to stop spoofing, eavesdropping and a host of malicious activity. I’ll give you the knowledge and tools to fight back, secure the network, thwart attackers, prevent data leakage and more. Among other things, this session covers the new MACSec encryption, key exchange, network advertisements and unique device identity (IEEE 802.1X-REV, 802.1AE, .1af, 1AR).