[June 28, 2005] Technet Webcast: Security Myths

Start Time:  Tuesday, June 28, 2005 11:00 AM (GMT-08:00) Pacific Time (US & Canada)  End Time:  Tuesday, June 28, 2005 12:30 PM (GMT-08:00) Pacific Time (US & Canada)  Event Description  Products: Security Recommended Audience: IT Professional. Language: English-American Description:  Do you know whether the things you are doing to increase security is actually improving security? Are you sure that your security efforts map to any realistic threats – threats that you have decided to mitigate as part of your overall risk management strategy? In this webcast, we cover the top ten things that security professionals do that don’t have any … Continue reading [June 28, 2005] Technet Webcast: Security Myths

eEye and IIS – Implementing a Multi-Layered Security Solution to Best Address Spyware, Phishing and Zero Day Attacks

Event: eEye and IIS – Implementing a Multi-Layered Security Solution to Best Address Spyware, Phishing and Zero Day Attacks Date and time: Tuesday, June 14, 20052:00 pm Pacific Daylight Time (GMT -07:00, San Francisco) Duration: 1 hour Description: Today’s organizations are challenged with securing their corporate network from unauthorized access, and protecting themselves from security vulnerabilities. Spyware, phishing and identity theft concerns are now threatening business continuity. The securing of a borderless network to implement wireless security policies is time consuming and complex. A better security solution is now available from IIS and eEye. Join eEye to learn how Integrated … Continue reading eEye and IIS – Implementing a Multi-Layered Security Solution to Best Address Spyware, Phishing and Zero Day Attacks

[June 16, 2005] eEye Digital Security Vulnerability Expert Forum

Event: eEye Digital Security Vulnerability Expert Forum Date and time: Thursday, June 16, 20057:30 am  Pacific Daylight Time (GMT -07:00, San Francisco) Duration: 1 hour   Description: The VEF provides valuable insight regarding new vulnerabilities that are discovered and the actions that need to be taken as a result. By making this information available, eEye reduces the workload faced by security administrators by clearly presenting all required information for informed decision-making – allowing for improved patching prioritisation. The VEF is a quick way to get up to speed on current potential risks to your organisation, exploring the impact high-risk vulnerabilities and exploits have … Continue reading [June 16, 2005] eEye Digital Security Vulnerability Expert Forum

[June 22, 2005] Defense-in-Depth Against Malicious Software

Start Time: Wednesday, June 22, 2005 11:00 AM (GMT-08:00) Pacific Time (US & Canada)  End Time: Wednesday, June 22, 2005 12:30 PM (GMT-08:00) Pacific Time (US & Canada) Event Description   Products: OtherRecommended Audience: IT Professional Language: English-American  Description:    Malicious software has become increasingly advanced; worms and viruses can propagate more quickly and evade detection more effectively than ever before. This webcast describes how a defense-in-depth approach to antivirus solution design can help protect various components of a computing infrastructure, including client computers, servers and networking devices, from malicious software attacks. This webcast will show how to implement an effective … Continue reading [June 22, 2005] Defense-in-Depth Against Malicious Software

[June 21, 2005] Security360 with Mike Nash

Security360 with Mike Nash: Understanding the Business Value of Security Start Time:  Tuesday, June 21, 2005 9:00 AM (GMT-08:00) Pacific Time (US & Canada)  End Time: Tuesday, June 21, 2005 10:00 AM (GMT-08:00) Pacific Time (US & Canada) Event Description   Products: SecurityRecommended Audience: Technology Decision MakerLanguage: English-American Description:   In this month’s Security360 webcast, host Mike Nash, security executive at Microsoft, explores the business rationale for security investments. Receive guidance from industry and Microsoft experts on the role security plays in furthering business objectives and achieving operational excellence. This webcast provides you with the information you need to make effective … Continue reading [June 21, 2005] Security360 with Mike Nash

[June 14, 2005] How Microsoft IT Utilizes Governance

Start Time:   Tuesday, June 14, 2005 9:00 AM (GMT-08:00) Pacific Time (US & Canada)  End Time:   Tuesday, June 14, 2005 10:00 AM (GMT-08:00) Pacific Time (US & Canada) Event Description  Products: Security Recommended Audience: IT Professional Language: English-American  Description:    Governance is a critical element of effective information security programs. It can occur at multiple levels on focused tasks or initiatives, or it can be more broadly applied as part of an enterprise security strategy. In this webcast, Microsoft security director Pete Boden discusses approaches to information security governance. He will show how shared goals, metrics and visibility across business units improves … Continue reading [June 14, 2005] How Microsoft IT Utilizes Governance

[June 13, 2005] Security Risk Management

Start Time:   Monday, June 13, 2005 9:00 AM (GMT-08:00) Pacific Time (US & Canada)  End Time:   Monday, June 13, 2005 10:30 AM (GMT-08:00) Pacific Time (US & Canada) Event Description  Products: Other Recommended Audience: IT Professional Language: English-American  Description:    When establishing security for your network, you must take risk assessment, cost-benefit analysis, and implementation of security countermeasures into consideration. The Security Risk Management Guide, designed by Microsoft, can help your organization establish the ongoing process of security risk management. This 90-minute webcast presents a qualitative approach to risk management, incorporating best practices from the industry as well as those learned and … Continue reading [June 13, 2005] Security Risk Management

[June 9, 2005] Value of Licensing: Education

Start Time:   Thursday, June 09, 2005 10:00 AM (GMT-08:00) Pacific Time (US & Canada)  End Time:   Thursday, June 09, 2005 11:00 AM (GMT-08:00) Pacific Time (US & Canada) Event Description  Products: Other Recommended Audience: Education Language: English-American  Description:    Join us to learn about our subscription licensing programs for education customers, Campus Agreement and School Agreement. Designed to reduce the costs of acquiring, upgrading, maintaining and managing software for multiple computers, the latest Academic Volume Licensing programs provide simple yet flexible volume-based pricing. These exciting programs allow you to right to run a selection of Microsoft products, and any upgrades or downgrades … Continue reading [June 9, 2005] Value of Licensing: Education

[June 8, 2005] Security Policies? Ugh, Just Give Me a Firewall

Start Time:   Wednesday, June 08, 2005 7:15 AM (GMT-08:00) Pacific Time (US & Canada)  End Time:   Wednesday, June 08, 2005 8:30 AM (GMT-08:00) Pacific Time (US & Canada) Event Description  Products: Security Recommended Audience: IT Professional Language: English-American  Description:    Start | Programs | Firewall | Rules | Add rule | Permit all hosts destination port 4695/tcp. Um, why did you just do that? Was there a business justification for creating that hole, and was the decision backed up by your security policy? You do have an up-to-date, regularly reviewed policy, right? Surprisingly (or not), security policies in many organizations are hidden, … Continue reading [June 8, 2005] Security Policies? Ugh, Just Give Me a Firewall

[June 8, 2005] Tips and Tricks to Running Windows with Least Privilege

Start Time:   Wednesday, June 08, 2005 5:30 AM (GMT-08:00) Pacific Time (US & Canada)  End Time:   Wednesday, June 08, 2005 6:45 AM (GMT-08:00) Pacific Time (US & Canada) Event Description  Products: Windows Recommended Audience: IT Professional Language: English-American Description:    The security principle of “least privilege” is well understood: Software should run with the smallest set of privileges needed to perform its tasks. However, Windows users who are allowed to administer their own machines usually run with Administrator privileges all the time. Email, Web browsing, and instant messaging do not require administrative privileges, and are common avenues for malicious code to attack … Continue reading [June 8, 2005] Tips and Tricks to Running Windows with Least Privilege