TechEd IT Forum: Security Track - Top 5 Sessions

Here are the top 5 sessions for the Data Management track according to Michael Anderberg track owner.

Internet Safety for Kids: Global Cases, Predator Tactics and Protection Methods

Kimmy Sharpe is not alive today. She is a fictitious victim who was approached by 9 predators within her first 10 minutes online. This presentation examines global case studies, various online predator tactics (luring and befriending techniques), the “Perfect Victim,” performing a reconnaissance on your child’s online information, fictitious victim chat logs, offender profiles, tips from a sex exploitation unit law enforcement officer, and parental resources. This presentation is part of the Internet Safety Program launched by Laura Chappell and Brenda Czech of the Protocol Analysis Institute in March of 2005. Free book, presenter materials and resources are online at www.packet-level.com/kids.

It's 11:00 PM. Do You Know Where Your Data Is?

Long gone are the days when you knew your data was safe because it resided only in your data center. The explosive proliferation of laptops, notebooks, handheld computers, smartphones, removable drives, and Internet file storage demands that we rethink how we protect information. Because it's the information the bad guys are after, and because the information flows so freely from device to device, our obligation is to protect the information. People want to work wherever they can find a computer and an Internet connection. How can you do this safely? Steve Riley considers strategies and explore technologies to help you solve a number of thorny problems: how to classify mobile data, how to keep track of where it is, and how to control its movement. We explore the new Data Encryption Toolkit for Mobile PCs, technical guidance and deployment tools that help you plan and implement EFS and BitLocker™ throughout your enterprise, with lower cost and extended centralized management and control. One question we will ponder: maybe it's time to do away with the locked-down desktop?

Making the Tradeoff: Be Secure or Get Work Done

Are you the kind of security person who enables a setting just because it's there? Do your users constantly seek ways to bypass all your fine-tuned security, just so they can do their jobs? Every security decision your organization makes ought to consider the security-usability (or even the security-usability-cost) tradeoff. While perfect security seems an admirable goal, in reality we must remember that usability often will trump our strongest desires. If people can't get work done, they'll either circumvent the security (without understanding they just created new attack vectors) or your company will simply lose out to your competitors. Steve Riley discusses several examples of real-world tradeoffs and helps you learn how to navigate the tradeoff in your own organization.

Threat Research and Response Today at Microsoft

As today’s threat landscape continues to evolve and Microsoft’s commitment to a secure ecosystem solidifies itself, it’s important for the Microsoft Security Research and Response Team (a.k.a. MSAV) to evolve and provide even greater support to the Microsoft Forefront, OneCare, Defender and Windows customers. In addition, our growing presence in the security industry requires us to participate at an even greater level with our partners day-to-day. This session is designed to update our customers and partners as to our new direction not only in anti-virus and anti-spyware but also in the area of vulnerability assessment, content and URL filtering and as an information provider. We look at the current trends provided by our vast submission process and also review our upcoming roadmap's in addition to how we operate on a day-to-day basis around the world.

How the Evolution of Military Strategy can be applied to Information Security Strategies in the Enterprise

Throughout the years, military strategy has evolved even though the tactical operations might look the same. However, information security in the Enterprise has not evolved when compared to the changes in the threat landscape.
This session will cover the evolution and the different protection mechanisms trying to give the audience food for thought in building protection for the future, instead of protecting current environments against past problems. With ad-hoc hardening, typical attacks have been working.
To illustrate the reasoning in this session imagine this; It is the year 2003 again, Blaster will be released in 6 hours - what will you be doing? It is the year 2004 again, Sasser will be released in 3 hours - what will you be doing? It is the year 2007 - something is out there, what will you be doing?

 

Want to know which other sessions that have been planned at the event? Check out the Content Search tool.

 

Technorati tags: Security, IT Forum, Bitlocker, Vista, Windows Server 2008