Microsoft Belgium – TechNet Briefing: Security Strategies with Steve Riley

Microsoft Belgium Event
TechNet Briefing: Security Strategies with Steve Riley



Speaker : Steve Riley – Senior Security Strategist – Microsoft Corporation

When : May 27th – full day event

Where : Utopolis Mechelen

Audience : IT Professionals, Security TDM’s

Registration Link :

Event Overview

It’s 11:00 PM, do you know where your data is?

Long gone are the days when you knew your data was safe because it resided only in your data center. The explosive proliferation of laptops, notebooks, handheld computers, smartphones, removable drives, and Internet file storage demands that we rethink how we protect information. Because it’s the information the bad guys are after, and because the information flows so freely from device to device, our obligation is to protect the information. People want to work wherever they can find a computer and an Internet connection. How can you make this work? Steve Riley will consider strategies and explore technologies to help you solve a number of thorny problems: how to classify mobile data, how to keep track of where it is, and how to control its movement.

Microsoft security intelligence report

The Microsoft Security Intelligence Report (SIR) provides an in-depth perspective on the changing threat landscape including software vulnerability disclosures and exploits, malicious software, and potentially unwanted software. Using data derived from more than 450 million Windows users, and some of the busiest online services on the Internet, this report provides an in-depth perspective on trends in software vulnerability disclosures as well as trends in the malicious and potentially unwanted software landscape, and an update on trends in software vulnerability exploits. The scope of this report has been expanded to include a focus on privacy and breach notifications, and a look at Microsoft’s work supporting law enforcement agencies worldwide in the fight against cyber criminals. The purpose of the SIR is to keep Microsoft’s customers informed of the major trends in the threat landscape and to provide valuable insights and security guidance designed to help customers improve their security posture in the face of these threats.

The fortified data center in your future: Build it now and they will come

Relax for a moment. Let your mind wander to thoughts of your corporate network—with its myriad authentication schemes, its haphazard collection of client computers in various states of (non)conformance, its proliferation of access methods, its data centers with too many ways in and out. Feel like you want to just burn it all down and start over? Well, perhaps you should—and when you do, you can implement something that’s simpler, more secure, well managed, and less expensive. Over the years, Steve Riley has hinted at this idea, advocating the demise of the traditional corporate network, with its no longer useful distinction between “inside” and “outside.” Instead, organizations should move toward using the Internet as their infrastructure, where all clients and a physically and electronically fortified data center live “live on the ‘net.” The question, then, is how to build this data center? Effective security and management are absolutely essential to realize this vision. Steve will show how combining the Microsoft ForeFront family of security products with the System Center family of management solutions provides the necessary foundation for building your data center of the future—today. Don’t delay, because your business competitors are already doing it!

Oh no, we’ve been hacked, now what? Developing an incident response process

Sooner or later, the unimaginable becomes the inevitable: your information security will get breached and your systems will get attacked. It might be a mild brief denial of service or a full-on concerted effort to wipe you off the Internet, but it will happen. There’s only one real question you need to answer: are you ready? Do you have the skills, techniques, tools, and organization to respond and recover? Fact is, most of us fail to plan for such a fateful day—leading to panic, indecision, and mistakes. Our jobs as defenders of information fall into three overarching categories of protection, detection, reaction. Mobilizing an organized team with a well-designed and tested reaction plan is the only effective way to recover from the attack and quickly return to business as usual. Steve Riley will show you how to build such a team and how to prepare it for success.

08.30 – 09.00 Welcome and Registration

09.00 – 10.30 It’s 11:00 PM, do you know where your data is?

10.30 – 10.45 Break

10.45 – 12.00 Microsoft security intelligence report

12.00 – 13.00 Lunch

13.00 – 14.30 The fortified data center in your future: Build it now and they will come

14.30 – 14.45 Break

14.45 – 16.00 Oh no, we’ve been hacked, now what? Developing an incident response process

Speaker : Steve Riley – Senior Security Strategist – Microsoft

Steve Riley is a senior strategist and worldwide security evangelist in Microsoft’s Trustworthy Computing Group. Steve specializes in the process of information security, including policies, networks, and hosts.

Steve is a frequent and popular speaker at conferences worldwide, working to spread a better understanding of security science. He also spends time with individual customers to learn the security pain they face and show how some of that pain can be eliminated. Having been born with an Ethernet cable attached to his belly button, Steve grew up in networking and telecommunications. Besides lurking in the Internet’s dark alleys and secret passages, he enjoys freely sharing his opinions about the intersection of technology and culture.


Leave a Reply

Please log in using one of these methods to post your comment: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s