Monumental shifts are hitting the workplace, necessitating changes in how and with whom we communicate and collaborate. For the first time in history, four different generations are working side-by-side in the workplace. Each generation of end users has distinct attitudes, behaviors, expectations, habits, and motivations. Add to that the increasing need for agile communication between every corner of your organization, from the retail store, across the shop floor, to the corporate office and beyond. Office 365 enables IT to unify end users across generations and departments under one technology. The communication and collaboration capabilities in Office 365 help IT meet the varied needs of these end users. In this session, come learn how IT can make the most of these capabilities in Office 365 to support the needs of every end user to help them be more productive at work.
Acquiring and analyzing physical memory as done by forensics professionals is a skill crucial to understanding how an operating system works or worked during the incident. For hobbyists, working with memory can be useful to perform troubleshooting and understand how certain solutions work. Just as it is crucial to understand operating system internals and security aspects, it is equally critical to understand what's in the operating system's memory. The valuable content contains evidence of user actions, hacker's tasks, malicious code behaviors, and the story of what happened on a system.
During this session Paula explains and shows the techniques for memory acquisition, techniques for grabbing the juicy data, and why it is so amazing to find someone's memory dump! This session is really intense but practical at the same time, as always it is packed with a lot of live demos and stories!