Recent data thefts highlight the risk of insecurely deploying enterprise wireless networks. Up to now, the focus of corporate network teams has been to provide wireless connectivity and availability.
Today, however, the Wireless LAN has become a primary attack vector for cybercrimals. The TJX breach, and its estimated cost of more than $250 million to the retailer, attests to the certainty and extent of risk. As a result, wireless networks are becoming a significant point of exposure, and it is imperative that enterprises must focus attention on the security aspect of wireless networking.
Tactical steps include firewalling the wireless network, segmenting guest access from that of employees, monitoring the wireless network for attacks, eliminating rogue access points, and adopting strong wireless encryption. More strategically, organizations should treat wireless networks as "the new Internet," in that it is the preferred access point for hackers and data thieves. Risk assessments and network policy considerations should include specific considerations for wireless networking, and wireless security strategy should be coordinated with broader IT compliance initiatives.
Agenda:
- Why care about wireless security?
- Wireless is a major threat vector.
- Wireless proliferation increases security risks.
- Compliance drives wireless security today.
- Five steps toward wireless security
- Recommendations
Vendors mentioned: Aerohive, Air Defense, Air Tight Networks, Aruba, Bluesocket, Cisco, ConSentry, ISS, Sourcefire, and TippingPoint Technologies
You'll receive an email with dialing and Webex instructions prior to the Webinar.