Here is more information about the "Building end-to-end Infrastructure security" sessions in the Security track during the Dev & IT Pro days.
Join John Craddock and Sally Storey for a holistic approach to implementing security.
Like many IT professionals, you might have attended security seminars and sessions over the years and gained an appreciation of the various security technologies available. But when, where and how these technologies can and should be leveraged can often be confusing.
Infrastructure security is frequently only considered once server roles and network connectivity has been implemented, a problem made worse by inadequate training. When security technologies are not deployed until late in a project, the result can be poor implementation, weak documentation and compliance testing.
Presenter: John CraddockJohn Craddock has designed and implemented computing systems ranging from embedded high-speed industrial controllers through to distributed IT solutions. John lectures internationally and has written and presented technical sessions at MTB, MEC, Tech·Ed, Microsoft IT Forum, JDP and deployment conferences.
Demos by: Sally StoreySally is ITIL qualified and specialises in building process that keep systems highly available and secure.
Don't miss these sessions and register for the Dev & IT Pro Days 2007