TechEd Europe 2014 Content Catalog

Use the controls below to explore the sessions and labs that will be presented at TechEd. Search by keyword or filter the results by Product, Track, Session Level, or Speaker to find sessions that interest you.

NOTE: The content catalog will continue to grow as the event gets closer. To easily find the recently added sessions, select Recently Added in the SORT Field. The recently added sessions will display the word NEW! next to them.

Already registered? LOGIN HERE to access Schedule Builder and create your personalized TechEd Schedule.

CLICK HERE to download a full session schedule.

CLICK HERE to view the latest schedule changes

Showing 0 to 0 of 0
Page
First Previous 0 Next Last
Retrieving Sessions
Wednesday, October 29 8:30 AM - 9:45 AM Room: Hall 8.0 Room C1
Speaker(s): Paula Januszkiewicz
Track:
Session Type:
Topic: Security, Trustworthy Computing
If there is a weakness in your IT security system, wouldn't it be better to find it before someone else does? The worst thing is that even a small scale security breach could leave your business in poor condition and in the end information security is not an IT department's problem, it is a business issue! As long as we are aware of the value of the resources to be protected, why don't we put ourselves into the hacker's role and perform all the activities they would do as well? Of course, it requires some very specific knowledge that may be hard to learn when our work focuses more on creating than destroying, but the results will give us a perspective on what other people with bad intentions can see. Sometimes it is really surprising how often you can use the same paths to enter the system! During this intensive session, become familiar with the mandatory tasks that are performed by hackers or penetration testers in order to check for misconfigurations and vulnerabilities. Come and join Paula in the journey to the darker side of IT security and use this knowledge for making good decisions in your system. Do not forget to keep the mandatory security check list in your pocket!
Showing 0 to 0 of 0
Page
First Previous 0 Next Last