It's late. You're in the office alone, catching up on database administration. Behind you, your network servers hum along quietly, reliably. Life is good. No one can get to your data or disrupt your WAN. The network is secure. Or is it?
In almost every environment there are windows servers. These servers become our web fronts, our databases, even our firewalls. Security in these situations becomes crucial. Everywhere you look, you will find misconfigured systems and windows exploits for every type of network. At the Black Hat Windows Security Briefings you will be placed right on the front lines. Exploits are discussed, reviewed, changed, and even discovered on site at the show. The misconfigured systems are reconfigured to be more secure. We provide an artillery of knowledge to protect yourself and increase your security.
When choosing speakers for the conference we find engineers and developers who are researching securtiy from the Windows standpoint. This means that our speakers will be releasing current "never before seen" tactics and tools for Windows compromise. We try to select the speakers that are doing unique research, writing the security tools, or finding the bugs. No vendor pitches. Just straight talk from people who are knowleedgable from both a practical and theoretical standpoint. The sessions are intense, informative and cutting edge.
Spanning two days with six separate tracks, this conference will explore in greater detail the technologies, tools, and techniques needed by system administrators and security experts to stay on the cutting edge.
Database - As your business expands your backend database servers become a key piece of your infrastructure. Protecting these databases is essential. The speakers in this track focus on the protection and compromise of these database servers.
Deep Knowledge - The presentations in this track consume the most time because they contain the most complex technical details, are involved and have detailed demonstrations, or cover substantial issues that are quite complex.
General - The speakers in this track will be covering a variety of windows security issues.
MS Apps - The applications that your business relies on our covered in this track. IIS, ISA, and Exchange are just some of the examples of the material discussed.
Network - As your infrastructure grows, various security risks become apparent. From DNS poisoning to hacking Cisco routers, speakers in this track have researched security from the network perspective.
Tools of the Trade - Speakers in this track will be covering the use and application of various tools used for windows security practice. Sometimes being first to familiarize yourself with these tools can save your business.
|