Click Here to Install Silverlight*
AustraliaChange|All Microsoft Sites
Microsoft
Hosted by our local Chief Security Advisor Peter Watson, leading local and international Microsoft Security experts answer the big Security questions.

Attendance cost is $220 (inc. GST). You'll also receive a valuable DVD Resources Kit plus other useful giveaways.
 
 
  Terms & Conditions
  available at the seminar
 
“Resilient Infrastructure”, “Identity Management”,“Threat Mitigation” and “Data Mobility and Reliability”
- Peter Watson
  Scroll down for full Keynote details
Privacy, Security, and Compliance: What you need to know NOW!
- Rocky Heckman / Graham Elliot

Protect your Applications: Strategies that can be Applied to Applications
- Graham Elliot / Rocky Heckman

Application Development Principles and Best Practices
- Dave Glover

Creating Reliable and Robust Applications with Visual Studio 2005 and SQL Server 2005
- Andrew Coates
  Scroll down for full Track details
 
Building and Managing a resilient Active Directory Infrastructure - Level 300
- Jeff Alexander

Building Identity Provisioning Solutions - Level 400
- Michael Kleef

Server and Domain Isolation: The Next Big Thing in Security and Infrastructure Integrity Assurance
- Jesper Johansson or Steve Riley

Building an Agile Infrastructure to Support Secure Mobility
- Jamie Sharp
  Scroll down for full Track details
Note: Agenda and speakers are subject to change.
 
This Session covers how to establish an effective and efficient security model that supports the business and enables IT, including:
  • Current trends and directions in security
  • What are the components of an Enterprise Security Model
  • How to maintain and evolve an Enterprise Security Model
  • How to position security with the business and get their buy-in
  • How to manage expectations and be on a path towards compliance
  • The overall benefits to IT of doing security properly
  • How to start the journey towards an Enterprise Security Model
  • The core elements and aspects that need to be implemented
 
         
Privacy, Security, and Compliance: What you need to know NOW!
- Rocky Heckman / Graham Elliot
In this session we'll discuss the SDL (Security Development Lifecycle) and the role developers and architects are expected to play during it. We'll also cover potential regulatory requirements that affect the security/privacy needs of an application and drill down into the 'development' challenges, for example, encryption of data.
 
Register now
Protect your Applications: Strategies that Can be Applied to Applications
- Graham Elliot / Rocky Heckman
In this session we'll demonstrate strategic security principals via the process of threat modeling. Discover how threat models gives developers and architects an advantage over hackers by enabling them to document and mitigate against threats and vulnerabilities.
This session will also cover:
  • The threat modeling process employed at Microsoft
  • The tool used to develop these threat models.
     
Application Development Principles and Best Practices
- Dave Glover

.NET Developer Evangelist Microsoft Australia
In this session we'll cover how to identify threats and vulnerabilities posed by an application's design, and how to document mitigations to these vulnerabilities, including the actual 'code' for these mitigation techniques.
 
Register now
Creating Reliable and Robust Applications with Visual Studio 2005 and SQL Server 2005
- Andrew Coates
In this session we'll reveal how tools can take us further down the track to building more secure and reliable applications. This session will highlight reliability and security features in Visual Studio Team System and show how some hacks could have been prevented.
 
Register now
Building and Managing a resilient Active Directory Infrastructure - Level 300
- Jeff Alexander
In this session we'll look at the pieces that are needed to build a resilient infrastructure based on Windows Server 2003, and then look at how to secure the infrastructure with ISA Server 2004; how to monitor events with MOM 2005; and finally, managing change and configuration management with SMS 2003.
 
Register now
Building Identity Provisioning Solutions -  Level 400
- Michael Kleef
Identity Management is becoming ever more important to businesses, whose technical staff need to understand how these solutions work and how to implement them. In this session we'll show how to build these solutions from start to finish. In this session you'll learn:
  • How to get identity data from the HR system to connected directories with minimal effort
  • And how to implement a centralised password management solution.
     
Server and Domain Isolation: The Next Big Thing in Security and Infrastructure Integrity Assurance
- Jesper Johansson or Steve Riley
Got any unmanaged-or, worse, rogue-machines on your network? Of course you do, unless you've consciously built the right technologies into your network to reduce and perhaps even eliminate them. By using Active Directory and IPsec to build an environment that requires domain membership, just like Microsoft's own IT, you can restrict network communications to domain managed machines-thereby creating trusted zones that are far more secure than other methods deployed today. This session will explain in detail how to use this capability that's available to you today in Windows 2000, Windows XP, and Windows Server 2003. Included also is a preview of future uses of IPsec, including becoming the enforcement mechanism for Network Access Protection.
 
Register now
Building an Agile Infrastructure to Support Secure Mobility
- Jamie Sharp
Do your users require access to corporate data anytime from anywhere? Is your current infrastructure preventing you from deploying mobility solutions? Come to this session and learn how to securely publish corporate data to the Internet. The session covers how to securely architect and build an end to end mobility solution using Exchange 2003 SP2 and ISA Server 2004 & Antigen to support OWA (Outlook Web Access), RPC over HTTP, OMA (Outlook Mobile Access), LCS (Live Communications Server) and SharePoint.
 
Register now
 
 Keep up to date with the latest IT Pro News, subscribe to the IT Professional Blog.
 

©2014 Microsoft Corporation. All rights reserved. Contact Us |Terms of Use |Trademarks |Privacy Statement