The demilitarized zone (DMZ) is a standard defense mechanism employed by numerous organizations to shield their internal networks. While it's a commendable practice to segregate public-facing servers from critical assets, it's crucial to question the efficacy of your DMZ setup. Could it inadvertently be a gateway for unauthorized access to the very network it's meant to protect? In this presentation, we will dissect a DMZ configuration highlighting such a scenario. Attendees will gain insights into best practices and architectural strategies to fortify their DMZ setups. Secure it, don't just set it and forget it.

Summit Speaker

John Cuzzola

Director of Information Security, Thompson Rivers University

John Cuzzola is the information security director for Thompson Rivers University (TRU), where he has also taught computer science courses as sessional faculty. John has co-authored 17 research papers and holds two patents as lead inventor. Before TRU, John was the information technology director for the Kamloops-Thompson School District. He holds a MSc. in Information Systems and security certifications of Certified Ethical Hacker (CEH) Master and COMPTIA PenTest+.

Summit Speaker

Obiora (Obi) Akachukwu

Intermediate Information Security Analyst, Thompson Rivers University

Obi is an intermediate information Security Analyst at Thompson Rivers University with over 10 years of experience information security. He has acquired Knowledge & skills in network security, governance and security operations.

View slide deck

Technology Track

Session Format
Speaker Presentation (45 minutes)