Review of Modern Firewalls and the Security implications of Intel's Active Management Technology (AMT)
April 12, 2019 by John NashMonday May 6th, 2019
This month we have Gordon Bader provide an overview of the Security Implications of Intel’s Active Management Technology (AMT) which is an embedded technology in many of the system we all use which provides out-of-band vectors for attack that most companies are not aware of along with John Nash who will be perform a feature round up of modern perimeter firewalls.
Erik Graham will be presenting his popular cyber threat update as usual.
This meeting is free and open to the public, so please invite your friends & bring your best questions. Our goal is to foster the exchange of information between businesses, government and educational institutions.
Free to the public, no RSVP’s, food and drinks provided by our sponsors.
2625 W Baseline Rd, Tempe, AZ 85283 (Map)
**Sponsor: **
At this time we have an open sponsorship slot. If you would like to sponsor this meeting information on our sponsorship page or contact John Nash
AGENDA
Networking, Food and Drinks
- 6:00 to 6:30 pm
- No Entry into the UAT Theater until 6:30 as classes are in session
- No Food or Drink inside the UAT theater at any time
**General Announcements & **Sponsor Segment
- 6:30 to 6:50 pm
- Sponsorship pending
Cyber Threat Updates by Erik Graham
- 6:50 to 7:00 pm
- Erik will be presenting his cyber update in his usual entertaining style.
An overview of the Security Implications of Intel’s Active Management TechnologySecurity Management with Gordon Bader
- 7:00 to 7:45 pm
Intel Active Management Technology (AMT) is hardware and firmware technology for remote out-of-band management of personal computers, running on the Intel Management Engine, a separate microprocessor not exposed to the user, in order to monitor, maintain, update, upgrade, and repair them.
Gordon is a recently retired systems architect with over 40 years of experience in software/systems engineering, with an emphasis in real time embedded systems, as applied to electronic warfare, flight management systems, GPS, GIS systems, encryption systems, satellite communication systems (SBS, Iridium, Celestri, Teledesic) and system security architectures (multiple levels of security (MLS), multiple independent levels of security (MILS), separation and cross domain).
Join Gordon he reviews the security implications of this ubiquitous, but not commonly understood technology.
A Feature Round Up of Modern Perimeter Firewalls with John Nash
- 7:45 to 8:45 pm
John Nash of Phreedom Technologies will present the feature round up of modern perimeter firewalls.
There is a lot of confusion and misconceptions, even among security professionals about what modern firewalls do. Even the terms Next Generation, NGFW or 4th Generation Firewall which are commonly thrown around by vendors can be confusing and misleading. John will break down the features of a sampling of the the leading firewall vendors and allow you to leave with a clear picture of what the proper role of a perimeter firewall plays in your organization and how it ties into your overalls security strategy. This is open to professionals at every stage in their career.
Over the last 34 years, John has worked for Rockwell International in the R&D labs for the GPS system, as a field engineer for communication carriers deploying packet switched technologies and is now VP of Technology for Phreedom Technologies with his business partner Dean Moore.
Wrap Up and Networking
- 8:45 to 9:00 pm