|COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring.|
Aggregated Security Monitoring in 10GB networks
If you have a question about this talk, please contact Mateja Jamnik.
The use of aggregation switch technology to perform ‘out-of-band’ network security monitoring (forensics, data leakage, intrusion detection) in high volume distributed network infrastructure.
Short bio: Nathan Macrides
Nathan graduated from RMIT University in Melbourne, Australia, with Degrees in Computer Science (B App Sci) and Computer Systems Engineering (B Eng) in 2003. Since then, he has been employed in IT as a Solutions Engineer with a focus on Security. He has worked fro various organisation including the European Bank for Reconstruction and Development and BAA and currently works within the Global Banking & Markets Division of RBS .
Short bio: Nick McKenzie
Nick graduated from Curtin University of Technology in Perth, Australia, wit a Bachelor of Commerce (Information Systems) (BCom (IS)) and a Master of E-Commerce (MeCom). He has since been employed by various consulting and financial institutions in Australia and the UK focusing on security assessments, design and architecture reviews. He is currently Head of Security Architecture and Engineering and IS&C Project Support for RBS Global Banking & Markets.
This talk is part of the Computer Laboratory Wednesday Seminars series.
This talk is included in these lists:
Note that ex-directory lists are not shown.
Other listsWorkshop in Microeconomics Cam*Era Cavendish Astrophysics Summary
Other talksDifferential forms and the abundance conjecture Vibro-acoustic modelling for active noise control purposes Title: Exploring the psychological meaning of illness using Cognitive Analytic Therapy Postgraduate Diploma in Entrepreneurship webinar The Uniates and the Invention of Eastern Orthodoxy Late Byzantine and early Ukrainian Advocates of Church Union in the Crossfire between Rome, Constantinople, and Moscow Characterization of Internet Censorship from Multiple Perspectives