Topic: Securing Your Network: The Basics Every Network Administrator Should Know
Abstract:In the current threat landscape, securing the digital network of an organization is of utmost importance. The role of any network and system administrator is to ensure the seamless functioning and security of systems and devices within their network. This webinar highlights the key concepts of network security that are mandatory for every network administrator to know in order to ensure the ceaseless and secure operations of devices in their network. It covers foundational aspects of network security architecture, such as firewall configurations, segmentation strategies, secure remote access, and best practices for monitoring and detecting potential vulnerabilities. It will also address the needs of current administrative professionals and aspiring individuals in the field of network management and security.
Key Takeaways:
- Understanding network threats and common vulnerabilities
- Understanding fundamental concepts of network security
- Best practices for managing network access and control
- Detection, monitoring, and incident response basics
- Best practices for ensuring secure access and implementing (Zero Trust Network Access) ZTNA
Speaker:
Roger Smith, Director, Care Managed IT, Industry Fellow at the Australian Defence Force Academy (Australian Cyber Security Centre).
Bio: Roger Smith helps managers, owners, board members, and C-level executives of NFPs, charities, associations, and SMEs develop and implement a proven and enhanced digital security action plan based on sound security strategies so they can sleep better at night. He believes that good business security is all about having an A.C.T.I.O.N. (asset and risk management, control and standards, teams, integrated systems, operational resilience, and next-gen innovation) plan designed to protect the organization, enabling it to be resilient, adaptable, and profitable.
Business security and cybersecurity are not just putting up a firewall, implementing endpoint protection, and applying the essential 8, then walking away hoping for the best. It is a whole business endeavor that follows the cybersecurity A.C.T.I.O.N. plan, which promotes and creates security in depth.