With the proliferation of mobile devices as well as the flexibility of delivering mixed topology implementations of Lync, Exchange and other dependent systems, optimizing your security architecture has never been more important. Derek and team will cover: _x000D_ _x000D_ Security Framework: Confidentiality, Integrity and Availability _x000D_ Telecom and network security best practices _x000D_ Trends in authentication: Mobile devices, 2-Factor Authentication _x000D_ Encryption TLS and sRTP_x000D_ Resilient certificate management _x000D_ Mitigating the risk of denial of Service attacks _x000D_ Basic steps for protecting against minute theft _x000D_ Real life edge and reverse proxy scenarios_x000D_
In this session we will take a look how the Hyper-V platform provides a high level of resiliency for the virtualized workloads. We will take a look at clustering technologies and shared VHDX technology.
In preparation for the event, we recommend that you download the free, full-featured version of Microsoft Hyper-V Server 2012 R2 as well these other free evaluations available for download:
Acquiring and analyzing physical memory as done by forensics professionals is a skill crucial to understanding how an operating system works or worked during the incident. For hobbyists, working with memory can be useful to perform troubleshooting and understand how certain solutions work. Just as it is crucial to understand operating system internals and security aspects, it is equally critical to understand what's in the operating system's memory. The valuable content contains evidence of user actions, hacker's tasks, malicious code behaviors, and the story of what happened on a system. During this session Paula explains and shows the techniques for memory acquisition, techniques for grabbing the juicy data, and why it is so amazing to find someone's memory dump! This session is really intense but practical at the same time, as always it is packed with a lot of live demos and stories!