Date / Time: Tuesday, April 19, 2016, 12:00 p.m. ET / 5:00 p.m. London
Cyber security addresses a wide range of issues and solutions related to protecting networks, businesses and subscribers from malicious Internet activity and harmful content. Experts agree that a layered approach is best, and perhaps no layer is as important as the network itself.
Traditional approaches rely on many different solutions installed at the boundary between a "trusted" private business or residential network and the "untrusted" public Internet. Today, residential subscribers and overwhelmed business IT security professionals are demanding a network-based solution that complements these boundary techniques and is specifically engineered for the untrusted environment and threats of the public Internet.
Join Sandvine and Symantec to learn:
- Why the network is often overlooked as a security layer, and why protecting it imposes specific requirements
- Why boundary solutions are a necessary but insufficient part of a layered, end-to-end approach
- How communications service providers can protect the network, subscribers and businesses, and can even grow revenue with value-added "secure pipes" services.
Patrick Donegan, Chief Analyst, Heavy Reading
close this window
Patrick has more than 20 years' experience as a telecom analyst and strategist. His coverage areas at Heavy Reading include mobile backhaul networks and mobile network security. He also authors Heavy Reading's Ethernet Backhaul Market Tracker. Patrick chairs Light Reading's Mobile Network Security Strategies conference series and is co-chair of Light Reading's Backhaul Strategies for Mobile Operators conference series. Patrick joined Heavy Reading in 2005 after five years at Nortel Networks, where he was a senior manager of strategic planning for the company's wireless business – spanning GSM, CDMA, UMTS, WiMax, and other wireless technologies. Prior to Nortel, he spent two years in business research for Motorola's Corporate Strategy Office in EMEA and two years as a wireless analyst for the Yankee Group. As a journalist, he was deputy editor of Public Network Europe from 1990-1995 and editor of Mobile Communications International from 1995-1997. Patrick holds a BA in industrial relations and politics from the University of Kent at Canterbury. He is based in the UK.
Ian Hassard, Senior Product Manager, Sandvine
close this window
Ian Hassard has focused on Sandvine's Policy Enforcement Platform, Cyber Security Portfolio and Element Management System for the past three years. With more than ten years of product management experience, he has extensive experience in hardware-accelerated security platforms, information security, SaaS-based solutions and virtualization. He has spent his entire career in telecom and networking solutions.
Damon Kachurv, Global Business Development, Symantec Corporation
close this window
Mr. Kachur is currently responsible for Global Business Development at Symantec Corporation. For the past 15 years, he has focused solely on cyber security with an emphasis on IoT PKI ecosystems as well as, threat intelligence for mobile and fixed-line networks. Mr. Kachur is member of multiple security working groups for the WiMAX Forum and GSMA. He has spoken at multiple conferences on PKI ecosystem security and is a regular panel participant at cyber security events worldwide.
Based in Northern California, Mr. Kachur has spent his entire career in the Silicon Valley. He holds a B.S in Business Management and Administration from the University of the Pacific in Stockton, CA. In his spare time, Mr. Kachur enjoys spending time with his family, coaching little league baseball and he is a licensed amateur racecar driver.
Jorge Salinger, VP, Access Architecture, Comcast
close this window
Mr. Salinger is responsible for Comcast Cable’s high-speed data, voice, and video access network strategy and architecture. Prior to joining Comcast, he was president of the consulting division at YAS Broadband and served as executive consultant for CableLabs. Jorge served as VP of engineering for high-speed access at Adelphia Communications, director of telecommunications for FSU, and VP of engineering for Systems Engineering Consultants. He has authored more than 25 technical publications and presentations and has co-authored a book on advanced micro-processor design.
Webinar Archive Registration
To register for this webinar, please complete the form below. Take care to provide all required information (indicated in red
). Press Register
to complete your registration. If you have already registered for our site or for one of our webinars, you may login
to register without re-entering your information.
From The Founder
Cisco's Conrad Clemson, recently promoted to head up the company's Service Provider Apps & Platforms developments, talks to Light Reading's Founder and CEO Steve Saunders about how he's bringing cloud video, mobile and virtualization together to empower network operators.
Charting the CSP's Future
Six different communications service providers join to debate their visions of the future CSP, following a landmark presentation from AT&T on its massive virtualization efforts and a look back on where the telecom industry has been and where it's going from two industry veterans.
Upcoming Live Events
May 15-17, 2017, Austin Convention Center, Austin, TX
May 15, 2017, Austin Convention Center - Austin, TX
June 6, 2017, The Joule Hotel, Dallas, TX
All Upcoming Live Events
September 27-28, 2017, Denver, CO
With the mobile ecosystem becoming increasingly vulnerable to security threats, AdaptiveMobile has laid out some of the key considerations for the wireless community.
BETWEEN THE CEOs - Executive Interviews
TEOCO Founder and CEO Atul Jain talks to Light Reading Founder and CEO Steve Saunders about the challenges around cost control and service monetization in the mobile and IoT sectors.
At MWC 2017, Qualcomm's CTO Matt Grob talks to Light Reading's CEO and Founder Steve Saunders about the progress being made in the development of the technologies and standards that will underpin 5G.
Animals with Phones
Working From Home Doesn't Work for Everyone Click Here
You shouldn't nap on your keyboard, for instance.