macsec - All Articles - CISO Platform2024-03-28T12:40:34Zhttps://www.cisoplatform.com/profiles/blogs/feed/tag/macsecIEEE MACSec and NSA ESS: How to Protect Your WAN, LAN and Cloudhttps://www.cisoplatform.com/profiles/blogs/ieee-macsec-and-nsa-ess-how-to-protect-your-wan-lan-and-cloud2017-05-04T05:30:00.000Z2017-05-04T05:30:00.000ZMeghana Phttps://www.cisoplatform.com/members/MeghanaP<div><p><strong><span class="font-size-5">IEEE MACSec and NSA ESS: How to Protect Your WAN, LAN and Cloud (RSA Conference 2017)</span></strong></p><p><span class="font-size-3">In this technical deep dive, Email Isaakian will explain the details of the protocol, cryptography, key management and vulnerabilities mitigated by MAC Sec/ESS. Additionally he'll show use cases to show how to successfully deploy MAC Sec/ESS technologies (Network Encryptors + NVF) to protect your WAN (MPLS, PBBN, Carrier Ethernet), LAN and cloud infrastructure.</span></p><p></p><p></p><p></p><p><strong><span class="font-size-5">Detailed Presentation:</span></strong></p><p></p><p><iframe width="595" height="485" src="//www.slideshare.net/slideshow/embed_code/key/6dlxxqVYuFMShu" frameborder="0" allowfullscreen=""></iframe></p><div style="margin-bottom:5px;"><span class="font-size-3"><strong><a href="//www.slideshare.net/cisoplatform7/ieee-macsec-and-nsa-ess-how-to-protect-your-wan-lan-and-cloud" title="IEEE MACSec and NSA ESS: How to Protect Your WAN, LAN and Cloud" target="_blank">IEEE MACSec and NSA ESS: How to Protect Your WAN, LAN and Cloud</a></strong> from <strong><a target="_blank" href="https://www.slideshare.net/cisoplatform7">Priyanka Aash</a></strong></span></div><p><span class="font-size-3"><strong>(Source: RSA USA 2017)</strong></span></p><p></p><p></p><p></p><p><strong><span class="font-size-5">Speaker:</span></strong></p><p><span class="font-size-3">Emil Isaakian<br /> <br /></span></p><p><span class="font-size-3">Emil Isaakian has 15+ years experience developing government and commercial cryptographic network security appliances for data in transit and data at rest. He is expert in high performance algorithms, cryptography and network security utilizing state of the art FPGAs, ASIC and x86-64 (HPC) for virtual network functions.</span></p><p></p><p></p><p></p><p></p><p></p><p><a href="https://www.sacon.io/?utm_source=CPBlogRSAGuide2017&utm_campaign=RSATopTalk" target="_blank"><img width="750" src="{{#staticFileLink}}8669813678,original{{/staticFileLink}}" class="align-full" alt="8669813678?profile=original" /></a></p><p></p><p><span class="font-size-7"><a href="https://www.sacon.io/?utm_source=CPBlogRSAGuide2017&utm_campaign=RSATopTalk" target="_blank">Pre Register For SACON - India's First Security Architecture Conference</a></span></p><p></p><p>Join 100+ CISOs and 200+ IT Security Professionals at an exclusive security architecture conference in the Silicon Valley Of India - Bangalore, in November 2017. Pre-Register and get special discount access and talk highlights.</p><p></p><p><span class="font-size-4"><strong><a href="https://www.sacon.io/?utm_source=CPBlogRSAGuide2017&utm_campaign=RSATopTalk" target="_blank">>>Click Here To Pre Register & Avail Special Discounts</a></strong></span></p><p></p><p></p><p></p><p></p><p></p><p></p><p></p><p></p><p></p><p></p><p></p></div>