Here are some interesting upcoming security webcasts

TechNet Webcast: Network Isolation Using Group Policy and IPsec (Part 1 of 3) (Level 300)

Monday, February 20, 2006 - 9:00 AM - 10:00 AM Pacific Time

Matthew Hester, TechNet Presenter, Microsoft Corporation

Data Isolation: How can it make your information technology (IT) infrastructure safer, and how do you use Group Policy and Internet Protocol security (IPsec) to implement it? This three-part webcast series shows how to implement data isolation in your organization using Group Policy and IPsec. This first webcast provides an overview of the nature of Internet Protocol security. Learn how IPsec can help manage the challenges to secure network communication and the various ways you can implement IPsec to achieve different types of secure communication. The second webcast of this series continues the discussion with a look at how to use IPsec to create network isolation zones.

 

TechNet Webcast: Security in SQL Server 2005 (Level 200)

Monday, February 20, 2006 - 11:00 AM - 12:30 PM Pacific Time

Keith Combs, TechNet Presenter, Microsoft Corporation

This webcast highlights security concepts that are new to Microsoft SQL Server 2005, such as encryption and user-schema separation, and looks at how SQL Server 2005 breaks security down into several distinct areas. We discuss security from the perspective of the server, the database, and database objects, and examine some of the different options you can use at each level to help secure your data. We also show you some of the tools you can use to monitor the security of your SQL Server implementation.

 

TechNet Webcast: Network Isolation Using Group Policy and IPSec (Part 2 of 3) (Level 300)

Wednesday, February 22, 2006 - 9:00 AM - 10:00 AM Pacific Time

John Baker, TechNet Presenter, Microsoft Corporation

Building on the overview of Internet Protocol Security (IPSec) provided in Part One of this three-part series, Part Two shows how to use IPSec to create network isolation zones. Topics include the advantages and limitations of network isolation, where network isolation fits into a defense-in-depth scheme, and how to use group policies and Microsoft Active Directory groups to restrict access to specific servers. Part Three offers guidance on how best to apply these concepts in the context of several network isolation scenarios.

 

TechNet Webcast: Network Isolation Using Group Policy and IPsec (Part 3 of 3) (Level 300)

Friday, February 24, 2006 - 9:00 AM - 10:00 AM Pacific Time

Matthew Hester, TechNet Presenter, Microsoft Corporation

Building on the overview of Internet Protocol security (IPsec) that we presented in Part One of this series, this second webcast shows how to use IPsec to create network isolation zones. Topics include the advantages and limitations of network isolation, where network isolation fits into a defense-in-depth scheme, and how to use Group Policy and Microsoft Active Directory groups to restrict access to specific servers. The series concludes in Part Three by offering guidance on how best to apply these concepts in the context of several network isolation scenarios.

 

TechNet Webcast: Implementing Multifactor Authentication Using Smart Cards (Level 200)

Monday, February 27, 2006 - 9:00 AM - 10:30 AM Pacific Time

Kai Axford, Security Specialist, Microsoft Corporation

Do user name and password combinations provide enough security for your organization's network resources? Many users choose passwords that can easily be compromised. This particular security vulnerability can be difficult to control. To address this issue, multifactor authentication uses a combination of components that are external to the user and password combination, providing more secure access to network resources. Deploying a smart card solution is an increasingly popular way to implement multifactor authentication. Join this webcast to understand the challenge of securing critical administrator accounts and remote access logon sessions, and learn how to implement multifactor authentication using smart card technology.