SlideShare a Scribd company logo
1 of 42
Download to read offline
!
!"              #

                            $ %     &

    #       '      ()
                   )*

+ ,                     !

        '
-           '. /




                                2
%   0



                                             !                 "
                        #        $# %                # &       #
         # '                 (                             !       (
          "        )**           %+      ,!               -.           /
        0)         1      2       !                  0
        3            1 44
                        56       !
                        !        768 )96                  6 8 9    !


          "                                          5*
          "         !            )       :       !
               !
         )%+;           *        !               6 8<
            ,!                       "       :
           #
Why BT for Security?

                                             Industry-leading resources
 1,400 global practitioners           Comprehensive event                      Operating 9 world            Over 100 registered patents,
 with over 125 accredited            correlation platforms and                class SOCs globally            190 security papers and
   security professionals                 reporting tools                           24/7/365                     numerous books
         in the US


                                               With proven experience
   6,000 security              BT has delivered                                           Monitoring 550           Filters over 75,000
                              security services to       Over 1,500 firewalls            networks with data
 engagements in the                                                                                                viruses from client
                               over 75% of the           under management             from over 150 countries
   US since 1994                                                                                                  networks each month
                                 Fortune 500                                            and 335,000 devices


                                Delivering an integrated services portfolio
                                                                         Incorporating industry-
                                     From assessment to
                                                                          leading technology &
                                     mitigation, on a global
                                                                       services, with Counterpane
                                              basis
                                                                               at the core


                                                 Third party validation
                                                                                           Many accreditations, including BS
              Leadership position in                     Highest capability                27001/ISO 17799, SAS70-II, FIPS
          Gartner’s 2007 North American                   maturity rating                    140-2, CERT, FIRST, CLAS,
             MSSP Magic Quadrant                            from NSA                                 SANS GIAC
                                                                                                     and CHECK
1
1
           ,
2

1
1   '   3# 4




               5
1


1                 !                       5
    &   ' &                           " % "
              "           "   &               6

                      6
1
                                  6




                              6
1            ! 77
                )


1            !              -           /    & "   &
        !           &                    !             6

            - /                     &
    &                           6

                                    8 0




                        7
1 8 0 9& &

                      -       /
 $                                !           6
 $ 2 , :'
        ;      6
 $                        <
   -)) = => ; ;
   ) =(: 7 = = /
 $
     &            -       /
 $ ?&             "                   &


 $                                        ,   (6:
     .@   ( .@
           6A 6




                              8
18 0


               &

 $ 9
                   ! 6
 $     !
                         ! 6




           9
??? ; ( 7
     ) 67

 ??? ; ($
      )              !        &   ???
    ;( 7
    ) 67
     $ ( .@
        6:
     $ (
    ;( 7
    ) 67
     $ A .@
     $ A:
    ;( 7
    ) 67
     $ ( .@
        6:
     $ 77
    ;( 7
    ) 67
     $ ( .@
        6:
     $ A:
    ;( 7 '
    ) 67
     $ (6:    A .@
     $ B)
        )
                         10
; ( 7& 6 1 '+
 ) 67


 ; ( 7'
  ) 67                                   ???
 1 '+
 $               ;( 7
                  ) 67                         1 '+
 $ 1 '+                  "      '
   B)
    )                                          18 0
 $                           1 '+        !
           &
 1 '+

 $ ?                     &
        1 '+             -
                         1      /
               ;( 7 ,
               ) 67       6

                                    11
!

&       !

<           ! !
    5




                  12
1


    $                    ,
    $
    $       C

    $
    $   !            D




                13
1                          &


                      !$         !
          @   D                  !
1         8 0               6
0                            6
            !     =
    $ 1
    $ +
    $
                                     &   6



                           14
1         ?, &               &   - ? /
                                 1

              !                           6          !    ,       =
    $                            6
    $              6
    $         &        6
E                                             18 0        6
2              :
    $     :                                    '              !
                   F       -F/       6
    $     :                                          <6
2         B'
          (                               !-         B/
                                                      (
    $
    $ 2                          !F           - F/
?&                 " ?
                    1                &
                                     15
1 '+                               -
                                   1              /


 1
 1? 6
 $ 1 !              ;( 7"
                     ) 67          6
 $                                                1? D
 $ ?<                                            G
 8          '                 =1       (6
 1              1 (                                   ??? ; ( 7
                                                           ) 67
 1      '        !  H)                           I
 $     =3
       3        6    6 6 !3    3 &     3)>)3)
                                        ()3;B3           '   '   ' 'H '
                                                                     )    3




                                            16
1


1                                                     "    &
                                           '       ! ! 6
    $ %   &                                    1?
    $ %   &                !- 6
                             6                      1?     /
    $ %   &   +   '        !


1                     1?     =
    $                         ;( J
                               ) 67                  !-        /
                  -           /
    $         !                                !
    $             @           @        &           -F/
    $

                                  17
1       (


                         &          1 '+
                         ???D ; ( 7
                               ) 67
2                                    "'
                                      :       !"
!                    1
                %E               &        ?    -? /

    $   ?            '
    $   ?                !       '            -    '
            /                !




                                     18
1? 4


+                     "
       1?           B")>
                    7()6
+                       "
1?     I    B"))
             )(76




                    19
=            1


"
    ?<


                      ; ( 71 8 0
                       ) 67
    & 6(
     7                         ? &                 - ?/
                                                      6

      &
                  ,          ! 18 0                 &
                        !6
         =3
         3    6              6   3    3   K   K1    K     6

                                 20
?         &                   $                4


                  &                                        6
    $ %               5                                !
              &                                    6
    $         &
                      "                                        & 6
    $
                          "            F   2       " 5
                                                     &     6




                                  21
#                   #
$               3
$                                        !
$                                                !       ?
$           &       '                                &

$   %
$

        &
$           !               &       "
$                                                    18 0
$
$                               '            &
                                    22
0                            !&               6
$               !                                  8 0
        6
    &           "
                             !
$ %
            !                        !6
0 &                 &
$                                            ! "   "
        "   0                    6
0
$                   "                6
$       &                                @             6

                        23
,
$               @                 &                             !
                !&                 !                    6
$                        @
                                                                ?
            6
$                                  @                                6

    ,                                  '                    !
$       ,                         @
                     &                          &   6
$
                "            ?6
$   ,                                       &
    ,            6
                                       24
1       !                                       =
$
$                                         ?6
                             !   &              "
                     !               @
    &                                          ?6
            !                             ,
                         !           ?6




                25
&                     @ -
                        / 8 0
                         1               @   D   !6
                          =
$         18 0                   !   &
$           !        18 0                !
$ &              6




                            26
1



    9                     =
    $       9
    $   9
    $                              - ."   %   " 6/
    $                 3
    $
    $           9
            ?
    $             9       "
                & "



                              27
!$           , 7 6B
                          6 6(


                                  !   ?
$                    -
        /                &            ?6
F
    !
$                -
        /                &            ?6




            28
!

    ,                     !               "
                                      ?       6
        &                 @
        ?&                            !
                                  6
1                =
$                             !                   ?
             !
$       ;( 7
        ) 67
$
$
          ,          76
                      )


                          29
$   , ( 67
                                            6 67

              &       '
                      !
$        "0                    "
        "                      ! " 6
?                 &
                                                    6
    &                                           &
,                              ,            6




                          30
&   $       , > 6B
                                      6 67


                                 "
    &   6
F                                    "        "
        &                        6
$
$   !
            !            !   &

$           3
$               &




                    31
7 67$ 1
         7                                          !


%
             @
$       ,
$                         3                         &       6
F                                 @                 ,       "
             3
            & 6
                  3                            "&
                                           6
F                 @           D                         - , 7 6>
                                                           6 ( /
$                                              &        @
    &                 6
                                      32
1           3                             $       , 7 6:
                                                   6 7

2           3                    &
                     ?
            6
    $            !
                !
    $                    !                        !

        ,                        6
E
    $           3
                6
    $ ?<         3                            3   &
            "                "        &
                     6
                                 33
#                                                     $       , 7 67
                                                               6 7
%                      "                 "        !                     "
                                                          ,
                        @                         6
2                      @            ,
     &
    $ 7 67%
       7
          @        ,                                          3
               &       6
    $ 7 67 F
       7                            @                     ,         "
               3
        & 6
    $ 7 67
       7                   3                     "&
                               6
    $ 7 67 F
       7                   @    D                                 - ,       7 6>
                                                                             ( /
                               &             @                    &             6
                                    34
'
$ L                    !
$
$
        & 6
(             )
$ .
$             ,   ,        6
$ L                    "       =

                  &            &



                  35
!                   !
$ 8
$ 2         +                   &       +        !
$ 9             ;( 7
                 ) 67


$               !                   !                    1
        1                   &           ! &                  !
                !           !


$ 0
$ ?                 '                                <           &
$                   &
                                            36
1


                                      "       "
        !"#"     "                        $   $ 6
    $                         !           6
    $        '                    !


    $    D           &




                         37
1


              1?
               8?
    $ E       !         !             8?
    $                   8?        "
2 1           1     (
    $     1   (
    $




                             38
1                                  %

0
    $       6                  6                                     6    6
1?               !                                               E
    $       =3
            3             !6                6                        6!       6
            !'      -              '                         /
    $       6        ! 6
                      '                                              6    6
        %       0          !
    $       6                      !6   3

    $                &
    $       6         6            3    3       K        6


                                                    39
40
!
                         6
    &                            6
,                            &
        &
                     &               &
            !




                41
#3 $


       !"   "       "        #

 %      &
  6 ! 6   3 3           !
  6   6 3       !




                        42

More Related Content

What's hot

Libro deapoyometminjaresme
Libro deapoyometminjaresmeLibro deapoyometminjaresme
Libro deapoyometminjaresmeadriana barba
 
4. alps computerize motor rewind
4. alps computerize motor rewind4. alps computerize motor rewind
4. alps computerize motor rewindalpsmsi
 
Document1
Document1Document1
Document1M3y3aM
 
A Eficiencia Da Hidroterapia Em Paciente Portador De Artrogripose Multipla Co...
A Eficiencia Da Hidroterapia Em Paciente Portador De Artrogripose Multipla Co...A Eficiencia Da Hidroterapia Em Paciente Portador De Artrogripose Multipla Co...
A Eficiencia Da Hidroterapia Em Paciente Portador De Artrogripose Multipla Co...Acquanews
 
How To Trust The Cloud
How To Trust The CloudHow To Trust The Cloud
How To Trust The CloudNeustar, Inc.
 
23ประชาคมอาเซียนมีผลอย่างไรต่อชีวิตของเรา
23ประชาคมอาเซียนมีผลอย่างไรต่อชีวิตของเรา23ประชาคมอาเซียนมีผลอย่างไรต่อชีวิตของเรา
23ประชาคมอาเซียนมีผลอย่างไรต่อชีวิตของเราพัน พัน
 
Six-Core AMD Opteron launched
Six-Core AMD Opteron launchedSix-Core AMD Opteron launched
Six-Core AMD Opteron launchedYING CHIEH YU
 
Farmer's manual eng
Farmer's manual   engFarmer's manual   eng
Farmer's manual engguestc4cf6a1
 
Alumnes, Programari I Materials
Alumnes, Programari I MaterialsAlumnes, Programari I Materials
Alumnes, Programari I Materialstinoserracompany
 
OECD, Higher education workshop, Helsinki, 2007, Finland
OECD, Higher education workshop, Helsinki, 2007, FinlandOECD, Higher education workshop, Helsinki, 2007, Finland
OECD, Higher education workshop, Helsinki, 2007, FinlandIlkka Kakko
 
Data Citation from the perspective of tracking data reuse
Data Citation from the perspective of tracking data reuseData Citation from the perspective of tracking data reuse
Data Citation from the perspective of tracking data reuseHeather Piwowar
 
04 face- nose- palate development
04 face- nose- palate development04 face- nose- palate development
04 face- nose- palate developmentLE HAI TRIEU
 

What's hot (18)

Susceptibilité familiale et éthnique au paludisme
Susceptibilité familiale et éthnique au paludismeSusceptibilité familiale et éthnique au paludisme
Susceptibilité familiale et éthnique au paludisme
 
Libro deapoyometminjaresme
Libro deapoyometminjaresmeLibro deapoyometminjaresme
Libro deapoyometminjaresme
 
4. alps computerize motor rewind
4. alps computerize motor rewind4. alps computerize motor rewind
4. alps computerize motor rewind
 
Document1
Document1Document1
Document1
 
A Eficiencia Da Hidroterapia Em Paciente Portador De Artrogripose Multipla Co...
A Eficiencia Da Hidroterapia Em Paciente Portador De Artrogripose Multipla Co...A Eficiencia Da Hidroterapia Em Paciente Portador De Artrogripose Multipla Co...
A Eficiencia Da Hidroterapia Em Paciente Portador De Artrogripose Multipla Co...
 
How To Trust The Cloud
How To Trust The CloudHow To Trust The Cloud
How To Trust The Cloud
 
How to Trust the Cloud
How to Trust the CloudHow to Trust the Cloud
How to Trust the Cloud
 
23ประชาคมอาเซียนมีผลอย่างไรต่อชีวิตของเรา
23ประชาคมอาเซียนมีผลอย่างไรต่อชีวิตของเรา23ประชาคมอาเซียนมีผลอย่างไรต่อชีวิตของเรา
23ประชาคมอาเซียนมีผลอย่างไรต่อชีวิตของเรา
 
Aesthetics in Software Testing
Aesthetics in Software TestingAesthetics in Software Testing
Aesthetics in Software Testing
 
Six-Core AMD Opteron launched
Six-Core AMD Opteron launchedSix-Core AMD Opteron launched
Six-Core AMD Opteron launched
 
Colegio Nº 1 - Martín de Moussy
Colegio Nº 1 - Martín de MoussyColegio Nº 1 - Martín de Moussy
Colegio Nº 1 - Martín de Moussy
 
Farmer's manual eng
Farmer's manual   engFarmer's manual   eng
Farmer's manual eng
 
Alumnes, Programari I Materials
Alumnes, Programari I MaterialsAlumnes, Programari I Materials
Alumnes, Programari I Materials
 
OECD, Higher education workshop, Helsinki, 2007, Finland
OECD, Higher education workshop, Helsinki, 2007, FinlandOECD, Higher education workshop, Helsinki, 2007, Finland
OECD, Higher education workshop, Helsinki, 2007, Finland
 
Attività didattiche
Attività didatticheAttività didattiche
Attività didattiche
 
Data Citation from the perspective of tracking data reuse
Data Citation from the perspective of tracking data reuseData Citation from the perspective of tracking data reuse
Data Citation from the perspective of tracking data reuse
 
04 face- nose- palate development
04 face- nose- palate development04 face- nose- palate development
04 face- nose- palate development
 
Green grocersppt
Green grocerspptGreen grocersppt
Green grocersppt
 

Viewers also liked

Rothke rsa 2013 - the five habits of highly secure organizations
Rothke   rsa 2013 - the five habits of highly secure organizationsRothke   rsa 2013 - the five habits of highly secure organizations
Rothke rsa 2013 - the five habits of highly secure organizationsBen Rothke
 
Rothke effective data destruction practices
Rothke   effective data destruction practicesRothke   effective data destruction practices
Rothke effective data destruction practicesBen Rothke
 
The Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - RothkeThe Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - RothkeBen Rothke
 
Rothke rsa 2013 - deployment strategies for effective encryption
Rothke   rsa 2013 - deployment strategies for effective encryptionRothke   rsa 2013 - deployment strategies for effective encryption
Rothke rsa 2013 - deployment strategies for effective encryptionBen Rothke
 
Interop 2011 las vegas - session se31 - rothke
Interop 2011   las vegas - session se31 - rothkeInterop 2011   las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothkeBen Rothke
 
E5 rothke - deployment strategies for effective encryption
E5   rothke - deployment strategies for effective encryptionE5   rothke - deployment strategies for effective encryption
E5 rothke - deployment strategies for effective encryptionBen Rothke
 
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2012   what happens in vegas goes on youtube using social networks...Rothke rsa 2012   what happens in vegas goes on youtube using social networks...
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...Ben Rothke
 
Lessons from ligatt from national cyber security nationalcybersecurity com
Lessons from ligatt   from national cyber security nationalcybersecurity comLessons from ligatt   from national cyber security nationalcybersecurity com
Lessons from ligatt from national cyber security nationalcybersecurity comBen Rothke
 

Viewers also liked (8)

Rothke rsa 2013 - the five habits of highly secure organizations
Rothke   rsa 2013 - the five habits of highly secure organizationsRothke   rsa 2013 - the five habits of highly secure organizations
Rothke rsa 2013 - the five habits of highly secure organizations
 
Rothke effective data destruction practices
Rothke   effective data destruction practicesRothke   effective data destruction practices
Rothke effective data destruction practices
 
The Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - RothkeThe Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - Rothke
 
Rothke rsa 2013 - deployment strategies for effective encryption
Rothke   rsa 2013 - deployment strategies for effective encryptionRothke   rsa 2013 - deployment strategies for effective encryption
Rothke rsa 2013 - deployment strategies for effective encryption
 
Interop 2011 las vegas - session se31 - rothke
Interop 2011   las vegas - session se31 - rothkeInterop 2011   las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothke
 
E5 rothke - deployment strategies for effective encryption
E5   rothke - deployment strategies for effective encryptionE5   rothke - deployment strategies for effective encryption
E5 rothke - deployment strategies for effective encryption
 
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2012   what happens in vegas goes on youtube using social networks...Rothke rsa 2012   what happens in vegas goes on youtube using social networks...
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
 
Lessons from ligatt from national cyber security nationalcybersecurity com
Lessons from ligatt   from national cyber security nationalcybersecurity comLessons from ligatt   from national cyber security nationalcybersecurity com
Lessons from ligatt from national cyber security nationalcybersecurity com
 

Similar to Webinar - Getting a handle on wireless security for PCI DSS Compliance

设计的约定
设计的约定设计的约定
设计的约定chen meng
 
Dramatically increase revenue on verio template
Dramatically increase revenue on verio templateDramatically increase revenue on verio template
Dramatically increase revenue on verio templateJanine Soika
 
Developer Tools, Nokia Platforms Santtu Ahonen
Developer Tools, Nokia Platforms Santtu AhonenDeveloper Tools, Nokia Platforms Santtu Ahonen
Developer Tools, Nokia Platforms Santtu AhonenAshley Walker
 
Science Fiction Sensor Networks
Science Fiction Sensor NetworksScience Fiction Sensor Networks
Science Fiction Sensor NetworksDiego Pizzocaro
 
Km Zonalito Feb 2010
Km Zonalito Feb 2010Km Zonalito Feb 2010
Km Zonalito Feb 2010guest69ba7b
 
Investment in the Silicon Valley Mobile Industry
Investment in the Silicon Valley Mobile IndustryInvestment in the Silicon Valley Mobile Industry
Investment in the Silicon Valley Mobile Industrykateimbach
 
Low Carbon Housing for Non-experts
Low Carbon Housing for Non-expertsLow Carbon Housing for Non-experts
Low Carbon Housing for Non-expertsurbed
 
Development Made Simple with no Coding: Developing Reusable Business Components
Development Made Simple with no Coding: Developing Reusable Business ComponentsDevelopment Made Simple with no Coding: Developing Reusable Business Components
Development Made Simple with no Coding: Developing Reusable Business Componentsdsingleterry
 
ApacheCon NA11 - Apache Celix, Universal OSGi?
ApacheCon NA11 - Apache Celix, Universal OSGi?ApacheCon NA11 - Apache Celix, Universal OSGi?
ApacheCon NA11 - Apache Celix, Universal OSGi?abroekhuis
 
OSGI workshop - Become A Certified Bundle Manager
OSGI workshop - Become A Certified Bundle ManagerOSGI workshop - Become A Certified Bundle Manager
OSGI workshop - Become A Certified Bundle ManagerSkills Matter
 
20110611 expanded intro-to_puppet_for_self
20110611 expanded intro-to_puppet_for_self20110611 expanded intro-to_puppet_for_self
20110611 expanded intro-to_puppet_for_selfgarrett honeycutt
 
Архитектура коммутаторов Cisco Catalyst 6500
Архитектура коммутаторов Cisco Catalyst 6500Архитектура коммутаторов Cisco Catalyst 6500
Архитектура коммутаторов Cisco Catalyst 6500Cisco Russia
 
LAMP_TRAINING_SESSION_6
LAMP_TRAINING_SESSION_6LAMP_TRAINING_SESSION_6
LAMP_TRAINING_SESSION_6umapst
 

Similar to Webinar - Getting a handle on wireless security for PCI DSS Compliance (20)

Pilot Interim Results
Pilot Interim ResultsPilot Interim Results
Pilot Interim Results
 
设计的约定
设计的约定设计的约定
设计的约定
 
Dramatically increase revenue on verio template
Dramatically increase revenue on verio templateDramatically increase revenue on verio template
Dramatically increase revenue on verio template
 
Developer Tools, Nokia Platforms Santtu Ahonen
Developer Tools, Nokia Platforms Santtu AhonenDeveloper Tools, Nokia Platforms Santtu Ahonen
Developer Tools, Nokia Platforms Santtu Ahonen
 
Lenz Karte
Lenz KarteLenz Karte
Lenz Karte
 
EB-85 A
EB-85 AEB-85 A
EB-85 A
 
Science Fiction Sensor Networks
Science Fiction Sensor NetworksScience Fiction Sensor Networks
Science Fiction Sensor Networks
 
Km Zonalito Feb 2010
Km Zonalito Feb 2010Km Zonalito Feb 2010
Km Zonalito Feb 2010
 
Investment in the Silicon Valley Mobile Industry
Investment in the Silicon Valley Mobile IndustryInvestment in the Silicon Valley Mobile Industry
Investment in the Silicon Valley Mobile Industry
 
Low Carbon Housing for Non-experts
Low Carbon Housing for Non-expertsLow Carbon Housing for Non-experts
Low Carbon Housing for Non-experts
 
Development Made Simple with no Coding: Developing Reusable Business Components
Development Made Simple with no Coding: Developing Reusable Business ComponentsDevelopment Made Simple with no Coding: Developing Reusable Business Components
Development Made Simple with no Coding: Developing Reusable Business Components
 
ApacheCon NA11 - Apache Celix, Universal OSGi?
ApacheCon NA11 - Apache Celix, Universal OSGi?ApacheCon NA11 - Apache Celix, Universal OSGi?
ApacheCon NA11 - Apache Celix, Universal OSGi?
 
Javaee glassfish jcertif2010
Javaee glassfish jcertif2010Javaee glassfish jcertif2010
Javaee glassfish jcertif2010
 
All about Apache ACE
All about Apache ACEAll about Apache ACE
All about Apache ACE
 
OSGI workshop - Become A Certified Bundle Manager
OSGI workshop - Become A Certified Bundle ManagerOSGI workshop - Become A Certified Bundle Manager
OSGI workshop - Become A Certified Bundle Manager
 
Device deployment
Device deploymentDevice deployment
Device deployment
 
20110611 expanded intro-to_puppet_for_self
20110611 expanded intro-to_puppet_for_self20110611 expanded intro-to_puppet_for_self
20110611 expanded intro-to_puppet_for_self
 
Архитектура коммутаторов Cisco Catalyst 6500
Архитектура коммутаторов Cisco Catalyst 6500Архитектура коммутаторов Cisco Catalyst 6500
Архитектура коммутаторов Cisco Catalyst 6500
 
Coanda Effect UAV
Coanda Effect UAVCoanda Effect UAV
Coanda Effect UAV
 
LAMP_TRAINING_SESSION_6
LAMP_TRAINING_SESSION_6LAMP_TRAINING_SESSION_6
LAMP_TRAINING_SESSION_6
 

More from Ben Rothke

Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeterBen Rothke
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)Ben Rothke
 
Locking down server and workstation operating systems
Locking down server and workstation operating systemsLocking down server and workstation operating systems
Locking down server and workstation operating systemsBen Rothke
 
Mobile security blunders and what you can do about them
Mobile security blunders and what you can do about themMobile security blunders and what you can do about them
Mobile security blunders and what you can do about themBen Rothke
 
Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeterBen Rothke
 
Lessons from ligatt
Lessons from ligattLessons from ligatt
Lessons from ligattBen Rothke
 
Infosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. HooperInfosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. HooperBen Rothke
 
Rothke computer forensics show 2010
Rothke   computer forensics show 2010Rothke   computer forensics show 2010
Rothke computer forensics show 2010Ben Rothke
 
La nécessité de la dlp aujourd’hui un livre blanc clearswift
La nécessité de la dlp aujourd’hui   un livre blanc clearswiftLa nécessité de la dlp aujourd’hui   un livre blanc clearswift
La nécessité de la dlp aujourd’hui un livre blanc clearswiftBen Rothke
 
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperThe Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperBen Rothke
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)Ben Rothke
 
Infotec 2010 Ben Rothke - social networks and information security
Infotec 2010   Ben Rothke - social networks and information security Infotec 2010   Ben Rothke - social networks and information security
Infotec 2010 Ben Rothke - social networks and information security Ben Rothke
 
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...Ben Rothke
 
Rothke stimulating your career as an information security professional
Rothke  stimulating your career as an information security professionalRothke  stimulating your career as an information security professional
Rothke stimulating your career as an information security professionalBen Rothke
 
Ben Rothke - Effective Data Destruction Practices
Ben Rothke - Effective Data Destruction PracticesBen Rothke - Effective Data Destruction Practices
Ben Rothke - Effective Data Destruction PracticesBen Rothke
 
Virtualization, Cloud Computing And The Pci Dss
Virtualization, Cloud Computing And The Pci DssVirtualization, Cloud Computing And The Pci Dss
Virtualization, Cloud Computing And The Pci DssBen Rothke
 
Ben Rothke RSA PK 2010
Ben Rothke   RSA PK 2010Ben Rothke   RSA PK 2010
Ben Rothke RSA PK 2010Ben Rothke
 
Rothke Using Kazaa To Test Your Security Posture
Rothke   Using Kazaa To Test Your Security PostureRothke   Using Kazaa To Test Your Security Posture
Rothke Using Kazaa To Test Your Security PostureBen Rothke
 
In Sync Network Time Ben Rothke
In Sync Network Time   Ben RothkeIn Sync Network Time   Ben Rothke
In Sync Network Time Ben RothkeBen Rothke
 
Rothke Securing Your Wireless Access Network
Rothke   Securing Your Wireless Access NetworkRothke   Securing Your Wireless Access Network
Rothke Securing Your Wireless Access NetworkBen Rothke
 

More from Ben Rothke (20)

Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeter
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)
 
Locking down server and workstation operating systems
Locking down server and workstation operating systemsLocking down server and workstation operating systems
Locking down server and workstation operating systems
 
Mobile security blunders and what you can do about them
Mobile security blunders and what you can do about themMobile security blunders and what you can do about them
Mobile security blunders and what you can do about them
 
Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeter
 
Lessons from ligatt
Lessons from ligattLessons from ligatt
Lessons from ligatt
 
Infosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. HooperInfosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. Hooper
 
Rothke computer forensics show 2010
Rothke   computer forensics show 2010Rothke   computer forensics show 2010
Rothke computer forensics show 2010
 
La nécessité de la dlp aujourd’hui un livre blanc clearswift
La nécessité de la dlp aujourd’hui   un livre blanc clearswiftLa nécessité de la dlp aujourd’hui   un livre blanc clearswift
La nécessité de la dlp aujourd’hui un livre blanc clearswift
 
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperThe Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White Paper
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
 
Infotec 2010 Ben Rothke - social networks and information security
Infotec 2010   Ben Rothke - social networks and information security Infotec 2010   Ben Rothke - social networks and information security
Infotec 2010 Ben Rothke - social networks and information security
 
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
 
Rothke stimulating your career as an information security professional
Rothke  stimulating your career as an information security professionalRothke  stimulating your career as an information security professional
Rothke stimulating your career as an information security professional
 
Ben Rothke - Effective Data Destruction Practices
Ben Rothke - Effective Data Destruction PracticesBen Rothke - Effective Data Destruction Practices
Ben Rothke - Effective Data Destruction Practices
 
Virtualization, Cloud Computing And The Pci Dss
Virtualization, Cloud Computing And The Pci DssVirtualization, Cloud Computing And The Pci Dss
Virtualization, Cloud Computing And The Pci Dss
 
Ben Rothke RSA PK 2010
Ben Rothke   RSA PK 2010Ben Rothke   RSA PK 2010
Ben Rothke RSA PK 2010
 
Rothke Using Kazaa To Test Your Security Posture
Rothke   Using Kazaa To Test Your Security PostureRothke   Using Kazaa To Test Your Security Posture
Rothke Using Kazaa To Test Your Security Posture
 
In Sync Network Time Ben Rothke
In Sync Network Time   Ben RothkeIn Sync Network Time   Ben Rothke
In Sync Network Time Ben Rothke
 
Rothke Securing Your Wireless Access Network
Rothke   Securing Your Wireless Access NetworkRothke   Securing Your Wireless Access Network
Rothke Securing Your Wireless Access Network
 

Recently uploaded

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 

Recently uploaded (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

Webinar - Getting a handle on wireless security for PCI DSS Compliance

  • 1. !
  • 2. !" # $ % & # ' () )* + , ! ' - '. / 2
  • 3. % 0 ! " # $# % # & # # ' ( ! ( " )** %+ ,! -. / 0) 1 2 ! 0 3 1 44 56 ! ! 768 )96 6 8 9 ! " 5* " ! ) : ! ! )%+; * ! 6 8< ,! " : #
  • 4. Why BT for Security? Industry-leading resources 1,400 global practitioners Comprehensive event Operating 9 world Over 100 registered patents, with over 125 accredited correlation platforms and class SOCs globally 190 security papers and security professionals reporting tools 24/7/365 numerous books in the US With proven experience 6,000 security BT has delivered Monitoring 550 Filters over 75,000 security services to Over 1,500 firewalls networks with data engagements in the viruses from client over 75% of the under management from over 150 countries US since 1994 networks each month Fortune 500 and 335,000 devices Delivering an integrated services portfolio Incorporating industry- From assessment to leading technology & mitigation, on a global services, with Counterpane basis at the core Third party validation Many accreditations, including BS Leadership position in Highest capability 27001/ISO 17799, SAS70-II, FIPS Gartner’s 2007 North American maturity rating 140-2, CERT, FIRST, CLAS, MSSP Magic Quadrant from NSA SANS GIAC and CHECK
  • 5. 1 1 , 2 1 1 ' 3# 4 5
  • 6. 1 1 ! 5 & ' & " % " " " & 6 6 1 6 6
  • 7. 1 ! 77 ) 1 ! - / & " & ! & ! 6 - / & & 6 8 0 7
  • 8. 1 8 0 9& & - / $ ! 6 $ 2 , :' ; 6 $ < -)) = => ; ; ) =(: 7 = = / $ & - / $ ?& " & $ , (6: .@ ( .@ 6A 6 8
  • 9. 18 0 & $ 9 ! 6 $ ! ! 6 9
  • 10. ??? ; ( 7 ) 67 ??? ; ($ ) ! & ??? ;( 7 ) 67 $ ( .@ 6: $ ( ;( 7 ) 67 $ A .@ $ A: ;( 7 ) 67 $ ( .@ 6: $ 77 ;( 7 ) 67 $ ( .@ 6: $ A: ;( 7 ' ) 67 $ (6: A .@ $ B) ) 10
  • 11. ; ( 7& 6 1 '+ ) 67 ; ( 7' ) 67 ??? 1 '+ $ ;( 7 ) 67 1 '+ $ 1 '+ " ' B) ) 18 0 $ 1 '+ ! & 1 '+ $ ? & 1 '+ - 1 / ;( 7 , ) 67 6 11
  • 12. ! & ! < ! ! 5 12
  • 13. 1 $ , $ $ C $ $ ! D 13
  • 14. 1 & !$ ! @ D ! 1 8 0 6 0 6 ! = $ 1 $ + $ & 6 14
  • 15. 1 ?, & & - ? / 1 ! 6 ! , = $ 6 $ 6 $ & 6 E 18 0 6 2 : $ : ' ! F -F/ 6 $ : <6 2 B' ( !- B/ ( $ $ 2 !F - F/ ?& " ? 1 & 15
  • 16. 1 '+ - 1 / 1 1? 6 $ 1 ! ;( 7" ) 67 6 $ 1? D $ ?< G 8 ' =1 (6 1 1 ( ??? ; ( 7 ) 67 1 ' ! H) I $ =3 3 6 6 6 !3 3 & 3)>)3) ()3;B3 ' ' ' 'H ' ) 3 16
  • 17. 1 1 " & ' ! ! 6 $ % & 1? $ % & !- 6 6 1? / $ % & + ' ! 1 1? = $ ;( J ) 67 !- / - / $ ! ! $ @ @ & -F/ $ 17
  • 18. 1 ( & 1 '+ ???D ; ( 7 ) 67 2 "' : !" ! 1 %E & ? -? / $ ? ' $ ? ! ' - ' / ! 18
  • 19. 1? 4 + " 1? B")> 7()6 + " 1? I B")) )(76 19
  • 20. = 1 " ?< ; ( 71 8 0 ) 67 & 6( 7 ? & - ?/ 6 & , ! 18 0 & !6 =3 3 6 6 3 3 K K1 K 6 20
  • 21. ? & $ 4 & 6 $ % 5 ! & 6 $ & " & 6 $ " F 2 " 5 & 6 21
  • 22. # # $ 3 $ ! $ ! ? $ & ' & $ % $ & $ ! & " $ 18 0 $ $ ' & 22
  • 23. 0 !& 6 $ ! 8 0 6 & " ! $ % ! !6 0 & & $ ! " " " 0 6 0 $ " 6 $ & @ 6 23
  • 24. , $ @ & ! !& ! 6 $ @ ? 6 $ @ 6 , ' ! $ , @ & & 6 $ " ?6 $ , & , 6 24
  • 25. 1 ! = $ $ ?6 ! & " ! @ & ?6 ! , ! ?6 25
  • 26. & @ - / 8 0 1 @ D !6 = $ 18 0 ! & $ ! 18 0 ! $ & 6 26
  • 27. 1 9 = $ 9 $ 9 $ - ." % " 6/ $ 3 $ $ 9 ? $ 9 " & " 27
  • 28. !$ , 7 6B 6 6( ! ? $ - / & ?6 F ! $ - / & ?6 28
  • 29. ! , ! " ? 6 & @ ?& ! 6 1 = $ ! ? ! $ ;( 7 ) 67 $ $ , 76 ) 29
  • 30. $ , ( 67 6 67 & ' ! $ "0 " " ! " 6 ? & 6 & & , , 6 30
  • 31. & $ , > 6B 6 67 " & 6 F " " & 6 $ $ ! ! ! & $ 3 $ & 31
  • 32. 7 67$ 1 7 ! % @ $ , $ 3 & 6 F @ , " 3 & 6 3 "& 6 F @ D - , 7 6> 6 ( / $ & @ & 6 32
  • 33. 1 3 $ , 7 6: 6 7 2 3 & ? 6 $ ! ! $ ! ! , 6 E $ 3 6 $ ?< 3 3 & " " & 6 33
  • 34. # $ , 7 67 6 7 % " " ! " , @ 6 2 @ , & $ 7 67% 7 @ , 3 & 6 $ 7 67 F 7 @ , " 3 & 6 $ 7 67 7 3 "& 6 $ 7 67 F 7 @ D - , 7 6> ( / & @ & 6 34
  • 35. ' $ L ! $ $ & 6 ( ) $ . $ , , 6 $ L " = & & 35
  • 36. ! ! $ 8 $ 2 + & + ! $ 9 ;( 7 ) 67 $ ! ! 1 1 & ! & ! ! ! $ 0 $ ? ' < & $ & 36
  • 37. 1 " " !"#" " $ $ 6 $ ! 6 $ ' ! $ D & 37
  • 38. 1 1? 8? $ E ! ! 8? $ 8? " 2 1 1 ( $ 1 ( $ 38
  • 39. 1 % 0 $ 6 6 6 6 1? ! E $ =3 3 !6 6 6! 6 !' - ' / $ 6 ! 6 ' 6 6 % 0 ! $ 6 !6 3 $ & $ 6 6 3 3 K 6 39
  • 40. 40
  • 41. ! 6 & 6 , & & & & ! 41
  • 42. #3 $ !" " " # % & 6 ! 6 3 3 ! 6 6 3 ! 42