My blog has moved and can now be found at http://blog.aniljohn.com

No action is needed on your part if you are already subscribed to this blog via e-mail or its syndication feed.

Monday, June 14, 2004
« XP Service Pack 2 - Security Related Ite... | Main | PAG Smart Client Architecture Guide is n... »

Essentials of Security (Part 1) - Security and Defense - Level 200
June 14, 2004, 9:00AM-10:00AM Pacific Time (GMT-7, US & Canada)
http://msevents.microsoft.com/CUI/EventDetail.aspx?EventID=1032253084&Culture=en-US

How does a security plan affect the commerce of the business it is supposed to protect? How can you be sure your security plan implements the right kind of security for each type of vulnerability? This webcast presents a defense-in-depth model that can help provide protection for each layer of an infrastructure. The discussion also includes strategies for security response, common attack scenarios, and best practices. During this webcast we will walk through two demonstrations: Internet Connection Firewall and Protecting IIS 5.0.

.NET Framework Security (Part 2) - Code Access and Role-Based Security - Level 300
June 14, 2004, 1:00PM-1:45PM Pacific Time (GMT-7, US & Canada)
http://msevents.microsoft.com/CUI/EventDetail.aspx?EventID=1032253116&Culture=en-US

This webcast is the second of a 3-part series about the importance of Application Security and its best practices and guidelines. This part specifically addresses Authentication in the context of secure application development. After an overview of the costs of inadequate security and the benefits of developing secure applications, we concentrate on Authentication as part of a larger security solution, examining specific Authentication techniques and best practices in IIS. The webcast includes two demonstrations: Buffer Overruns and IIS Authentication Techniques.

Essentials of Application Security (Part 3) - Authorization - Level 300
June 16, 2004, 9:00AM-9:45AM Pacific Time (GMT-7, US & Canada)
http://msevents.microsoft.com/CUI/EventDetail.aspx?EventID=1032253123&Culture=en-US

This webcast is the third of a 3-part series about the importance of Application Security and its best practices and guidelines. This part specifically addresses Authorization in the context of secure application development. After an overview of the costs of inadequate security and the benefits of developing secure applications, we concentrate on Authorization as part of a larger security solution, examining Trusted Subsystem Model Authorization techniques and best practices. The webcast includes two demonstrations: Buffer Overruns and Trusted Subsystem Model Authorization Techniques.

Writing Security - Threat Defense - Level 300
June 18, 2004, 9:00AM-10:30AM Pacific Time (GMT-7, US & Canada)
http://msevents.microsoft.com/CUI/EventDetail.aspx?EventID=1032253126&Culture=en-US

In this session for experienced developers, you will build upon existing knowledge of secure coding best practices to learn about analyzing, mitigating and modeling threats. The session will discuss established threat modeling methodologies and tools and show how they can be applied with other best practices to minimize vulnerabilities and limit damage from attacks.

 

Tags:: Security
6/14/2004 3:26 AM Eastern Daylight Time  |  Comments [0]  |  Disclaimer  |  Permalink   
Comments are closed.