Shaila Sharmin has more than 10 years of working experience in ISP, Bank and WiMAX Network Architecture. She is a seasoned Operations Engineer and Management professional in the field of IP Core and System Security, and possesses extensive hands-on experience in Core and Enterprise Routing and Switching Technologies with major vendors. Shaila has in depth knowledge of cybersecurity and privacy principles, cyber threats types and vulnerabilities, security risks assessment and emerging technologies.
Shaila was educated in Bangladesh completing a Master’s Degree in Computer Science with a Bachelor’s Degree in Computer science and engineering. Furthermore, she has some vendor certifications (e.g. CISM, CCNP, NSE4 etc.) at her credit. Shaila actively speaks and volunteers at bdNOG, APNIC events.
Areas of Interests: SDN, IPv6, Routing and Switching, MPLS, BGP, Network and Information Security and Internetworking, Internet Governance and technical Policy.
Shaila shares his knowledge as a volunteer community trainer for APNIC.
Swapneel is a network security engineer & CEO at Shreshta IT and has been working in the Information Security field for 15+ years. He regularly conducts workshops on Information Security, Network Security Monitoring and DNS/DNSSEC Security.
He is also a board member of India Internet Engineering Society and has been Program Committee member of INNOG group, and actively participates at the various Network Operator Groups (NOGs) and security community in the Asia Pacific region.
Swapneel shares his knowledge as a volunteer community trainer for APNIC.
Having worked in Information Technology for over a decade, Richard has provided security consulting services throughout Australia to state and local government agencies and to large enterprise organisations. He has been responsible for assessing and guiding remediation on critical infrastructure. He has extensive experience across many areas of Cyber Security, including delivering web, API and infrastructure penetration testing, cloud and on-premise security architecture reviews, security operation centre maturity gap analysis and process mapping, information security management system gap analysis, threat risk assessments for business process software and system architecture implementations, and business mapping and modelling of managed service providers.
Identifying Suspicious Traffic with DASH
This course will introduce APNIC’s DASH (Dashboard for Autonomous System Health), which is a portal that allows APNIC members to identify suspicious traffic going out of their networks. The course will also cover a specific use case and a demo.
Community Insights Program:
This course will cover the following topics:
- What DASH is (and what it’s not)
- Where the data about suspicious traffic comes from
- A specific use case – Preventing DDoS attacks
- DASH’s key features
- DASH Demo