A common pattern adversaries are using are to exploit weaknesses in an organization, and then leverage credential theft to obtain more privileged access in the organization. Join Cybersecurity Architect Chris Jackson ("The App Compat Guy") for a tour of the architectures for secure usage and administration that are making organizations safer today, and a review of changes to the platform that simplify this for tomorrow.
Windows continues to innovate on its implementation of core operating system security. To achieve the conflicting goals of security and compatibility, it can be complex. How do you understand how it works? Join "The App Compat Guy" for a deep dive into the operating system internals where security decisions begin. This is an operating system internals session, and not a packaged software session.