With this post I want to highlight the different security sessions we planned for the TechDays 2009. I have some good speaker line-up with Steve Riley as one of the main actors.
My preferred session in this track is definitely the Virtualization security one. More and more customers are adopting Hyper-V as a virtualization platform but do you know how to secure your virtual machines or your host operating system. Further we will have a NAP, UAC and Privacy session, here is the complete list of sessions:
Protecting your network: NAP, IPsec and Server and Domain Isolation.
A few years ago, corporate firewalls were considered adequate protection for client computers against the threats from the Internet. Nowadays, especially with mobile computers, that is no longer the case. In this session, we discuss how new technologies such as Network Access Protection (NAP) and Server and Domain Isolation (SDI) can help protect network assets by segmenting your network logically, instead of physically by using firewalls. Several upcoming Microsoft products integrate with NAP, so it is important to understand that technology well.
Speaker: Ronald Beekelaar
Virtualization and security: what does it mean for me?
Virtualization is the Next Big Thing™, and certainly you’ve at least examined it, and probably are using several virtualized servers already. How are you handling the security of your images? How are you securing the guest and host operating systems, and the applications you’re running? Virtualization raises certain unique security requirements, and provides some interesting security capabilities, too. Join Steve Riley as he explores the interesting aspects of virtualization and security.
Speaker: Steve Riley
Understand UAC and make it work for you.
UAC is often spoken of in a negative way even though it’s one of the great security enhancements brought by vista. Looking forward at windows 7 it’s clear that UAC is here to stay. It’s high time to debunk the myths, learn the core of UAC, how you can make it work for you and a best practice with user accounts and rights. During this session well look what UAC is, how it works in the core, how UAC detects the need for elevation, how we can manipulate UAC by using manifests and manage it through group policies.
Speaker: Tom Decaluwe
Privacy: the why, what, and how
Which data breach did you read about this week? Seems like you can’t scan the news without reading about yet another lost laptop, compromised database, or stolen identity. Privacy is suddenly becoming a necessary element of conducting business. It’s mostly viewed as a cost, and indeed that’s true: new government regulations around the world have begun to impose strict and complicated privacy requirements on businesses. But might there also be ways privacy could become a business enabler, perhaps providing competitive differentiation? What kinds of privacy policies, procedures, tools, and techniques are useful? How should people implement these? What’s the link between security and privacy, anyway—are they complimentary or in opposition? Steve Riley will begin providing some answers to these and other thorny issues related to privacy.
Register for the TechDays
in my previous post I highlighted the security sessions at the event, now I wanted to talk about the