TechEd Europe 2014 Content Catalog

Use the controls below to explore the sessions and labs that will be presented at TechEd. Search by keyword or filter the results by Product, Track, Session Level, or Speaker to find sessions that interest you.

NOTE: The content catalog will continue to grow as the event gets closer. To easily find the recently added sessions, select Recently Added in the SORT Field. The recently added sessions will display the word NEW! next to them.

Already registered? LOGIN HERE to access Schedule Builder and create your personalized TechEd Schedule.

CLICK HERE to download a full session schedule.

CLICK HERE to view the latest schedule changes

Showing 0 to 0 of 0
Page
First Previous 0 Next Last
Retrieving Sessions
Thursday, October 30 8:30 AM - 9:45 AM Room: Hall 8.0 Room C1
Speaker(s): Paula Januszkiewicz
Track:
Session Type:
Topic: Security, Trustworthy Computing
OK, so an attacker got into your infrastructure, used server’s misconfiguration, created themselves an account and… Exactly! And what? Or maybe you would like to know where to gather information about activities in an operating system. In both cases, this session is for you! This is the moment that we wonder what else could happen beyond what we can see, and if it is possible to trace hacker’s activities in our systems. Yes it is! By performing several analyses we are able to get enough evidence of performed malicious actions. This type of monitoring can also be useful when performing the regular investigation of what happened in the system, not only from the attacker’s perspective. Come and see what it means to be hacked and that nothing can be completely hidden! During this session, become familiar with tracing system-related situations and how to establish informative monitoring that can alarm you if something goes wrong in your environment. This session is a real deep-dive into the monitoring world so be prepared for a hard-core technical ride!
Showing 0 to 0 of 0
Page
First Previous 0 Next Last