Sia che siate in vacanza, sia che siate ancora/già al lavoro, probabilmente in questo periodo avrete un po’ di tempo libero in più del solito. Il mio personale invito è sicuramente quello di usarlo per ritemprarvi nel corpo e nello spirito, ma se qualcuno volesse approfittarne per un aggiornamento sugli aspetti di sicurezza della piattaforma Microsoft potrebbe valutare la visione di una serie di video seminari tratti dai recenti eventi pubblici di Microsoft (Technet Spotlight): ho selezionato per voi quelli in ambito security (ovviamente)
- Windows Security Boundaries – Mark Russinovich – 07/08/2008
In this session, learn what constitutes a security boundary; get a tour through core Windows technologies, including user sessions, Code Integrity, PatchGuard, Service Security Hardening, and User Account Control, to learn where Windows currently defines such boundaries; and gain insight into why application compatibility and user experience make defining boundaries much more difficult than it might seem.
- Virtualization and Security: What Does It Mean for Me? – Steve Riley – 07/08/2008
Virtualization is the Next Big Thing, and certainly you’ve at least examined it, and probably are using several virtualized servers already. How are you handling the security of your images? How are you securing the guest and host operating systems, and the applications you’re running? Virtualization raises certain unique security requirements, and provides some interesting security capabilities, too. Join Steve Riley as he explores the interesting aspects of virtualization and security.
- Securing Your IT Infrastructure with Windows Server 2008 – John Weston – 07/16/2008
Windows Server 2008 offers rich capabilities for securing your IT Infrastructure and proving tools to ease with compliance mandates. This session discusses the Windows security and compliance features such as Network Access Protection, Right Management Services, and Active Directory Federation Service subsystem. In addition we will discuss why auditing is important and how to configure an audit policy with Windows Server 2008.
- Windows Logins Revealed – Mark Minasi – 07/08/2008
Every day we log into our Windows systems. But what really happens when we do? How DO our workstations and our domain controllers exchange logon information without revealing our passwords? Security hardening guides talk about how scary old-style LM, NTLM and NTLMv2 logons are, but why EXACTLY do they say that-particularly when it’s practically impossible to keep all of the old-style logins from happening even in the most modern network? How DOES AD’s favorite logon protocol, Kerberos, work? How is it more secure than the old guys, and where should you look more closely at securing it?
- Introduction to Microsoft Forefront Code Name "Stirling" – Brad Wright – 07/08/2008
Forefront code name "Stirling" is a single product that delivers comprehensive, coordinated protection with unified security management and reporting across clients, server applications, and the network edge. In this session, learn what Stirling is all about-from the infrastructure, to the protection, to the reporting-and how we’re integrating with the System Center platform to provide increased protection and easier management of security. Get your questions answered in this session and meet the team behind development of Forefront code name "Stirling."
- A Hackers Diary: How I Can Hack Your Vulnerable Services and How You Can Stop Me – Marcus Murray – 07/08/2008
This live session demonstrates how a hacker will try to exploit vulnerable applications in order to compromise remote systems and how you can defend yourself from such attacks. Marcus Murray and Hasain Alshakarti of the TrueSec Security Team expose the latest and greatest in exploitation frameworks using live demonstrations and at the same time demonstrate and talk about countermeasures that are effective in the real world. The countermeasures discussion includes a step-by-step-approach using the latest technology from Microsoft, as well as the processes needed for a successful security implementation. After this session you will understand the impact of exploitation frameworks and how to protect from them.
- The Spy Who Hacked Me! – Alex Smolen,Rudolph Araujo – 07/08/2008
Come sempre succede, la scoperta di questi video ha aperto un mondo di altre risorse video in area security che, anche se meno recenti, meritano comunque di essere portate alla vostra attenzione: appena possibile li aggiungerò al mio Microsoft Security Portal e vi avviserò con un post specifico.
Se invece siete interessati anche a temi non-security vi riporto i link degli eventi recenti da cui ho tratto questi video:
Altri post/risorse correlate: