InvestorsHub Logo
Followers 86
Posts 6674
Boards Moderated 0
Alias Born 07/23/2003

Re: None

Wednesday, 03/17/2004 8:55:07 AM

Wednesday, March 17, 2004 8:55:07 AM

Post# of 249400
WAVE is Gold Sponsor of Microsoft Security Summit. This Summit Events will be in 20 U.S. Cities from April 6 to June 22!

WEBY'S prayer for an educational blitz of Trusted Computing and WAVE's role in it IS ABOUT TO TAKE TO THE ROAD!!!!



http://www.microsoft.com/seminar/securitysummit/sponsors.mspx


Events in 20 U.S. Cities from April 6 to June 22


Security Summit space is limited.


Register today!


· Anaheim (6/8)

· Atlanta (5/5)

· Boston (6/2)

· Charlotte (4/21)

· Chicago (4/14)

· Dallas (4/30)

· Denver (4/14)

· Detroit (5/12)

· Houston (6/9)

· Minneapolis (4/13)

· New York (4/6)

· New York (4/7)

· Orlando (4/28)

· Philadelphia (5/4)

· Phoenix (5/12)

· Raleigh (4/8)

· San Francisco (6/22)

· Santa Clara (6/3)

· Seattle (6/22)

· St. Louis (5/12)

· Washington, D.C. (4/8)


· Other Security Training

Gold Sponsors
--------------------------------------------------------------------------------
AMD64

processors combined with the upcoming Microsoft Windows XP Service Pack 2 (SP2) help computers to better withstand attacks from certain classes of viruses and worms. The combination of the AMD64 processor and Windows XP SP2 technologies will help provide customers enhanced security, enabling home and business users to experience safer e-mail and Internet browsing, and increased network and memory protection. All AMD64 processors, including AMD Opteron and AMD Athlon 64 processors shipped in 2003, are enabled with AMD's Enhanced Virus Protection for the upcoming Windows XP SP2. AMD64 processors are currently supported by more than 1000 global OEMs and hardware and software companies.
http://www.amd.com

WAVE

Consumers and businesses are demanding a computing environment that is more trusted, private, safe, and secure. Wave Systems Corp. is a leader in delivering trusted computing applications and services with advanced products, infrastructure, and solutions across multiple trusted platforms from a variety of vendors. The Wave Trust Alliance Program (TAP) provides targeted benefits to software developers, resellers, and OEMs. Wave holds a portfolio of significant fundamental patents in security and e-commerce applications and employs some of the world's leading security systems architects and engineers. For more information, please visit the Wave Systems website.
http://www.wave.com


Microsoft Security Summit

6/3/2004 8:00 AM - 6/3/2004 5:00 PM
Welcome Time: 7:30 AM
Language: English-American

Santa Clara Convention Center

5001 Great America Parkway
Santa Clara California 95054
United States

General Event Information
Products: Other.

Recommended Audience: Developer and IT Professional.

Whether you’re managing an IT infrastructure, writing code, or developing applications, you’re serious about security. So are we. That’s why we’re hosting a FREE Microsoft® Security Summit in Santa Clara. Come connect with Microsoft security experts and your peers. Learn how to better protect your IT infrastructure and applications against security threats, both today and in the future.
In addition to our special Panel Discussion, The Security Summit features a special keynote address featuring Charlie McNerney, General Manager, Security Business Unit. Choose from three technical tracks of breakout sessions for IT Professionals and Developers. Each breakout session is presented by a security specialist, and is designed to provide information and free tools to help you take immediate action and address your security challenges.

The Security Summit Agenda:
7:30-8:30 Registration and Breakfast
8:30-9:30 Keynote Presentation
Trustworthy Computing: Progress and Commitment

Microsoft executives will kick off this content-packed day with an industry perspective on security. You’ll hear about the long-term direction of trustworthy computing as well as find out the Microsoft plan for response to security threats.

9:45-11:00 Breakout Session One
11:15-12:30 Breakout Session Two
12:30-1:15 Lunch Break
1:15-2:30 Breakout Session Three
2:45-4:00 Breakout Session Four
4:00-5:00 Panel Discussion
7:30 a.m.-3:00 p.m. Partner Pavilion Open

Attendees can choose from the following three tracks of breakout sessions:




IT Professional Track Level 200 6/3/2004 9:45 AM - 6/3/2004 4:00 PM
Description: Presented by IT security specialists, these Level 200 sessions will provide information about how to help lock down servers, workstations, and your network infrastructure, as well as design and deploy a proactive patch management strategy. Breakout Session 1: Essentials of Security Gain knowledge and skills essential for the design and implementation of a more secure computing environment. Learn how to assess your current security status, identify system priorities, and deploy a framework for improved security in the future. Breakout Session 2: Implementing Security Patch Management Learn how to apply security best practices and use available tools and technologies to implement a patch management process and strategy within your organization. Breakout Session 3: Implementing Server Security on Microsoft Windows® 2000 and Windows Server™ 2003 Discover how to apply detailed host hardening guidance to enhance server security in legacy, enterprise client, and high-security environments. Breakout Session 4: Implementing Client Security on Windows 2000 and Windows XP Professional. Identify best practices for clients in extreme high-security locations by familiarizing yourself with steps to help secure client computers in Windows Server 2003, Windows 2000, and Windows NT® 4.0 server environments.


IT Professional Track Level 300 6/3/2004 9:45 AM - 6/3/2004 4:00 PM
Description: Presented by IT security specialists, these 300-level sessions are designed for IT Professionals looking to build upon their existing knowledge of server, client, network, and Windows security. Breakout Session 1: Implementing Perimeter and Network Security Learn how to apply best practices to implement perimeter and network defenses. Discuss the use of hardware and software firewalls for network and application filtering and how to implement intrusion detection mechanisms. Breakout Session 2: Implementing Application and Data Security Learn how to enhance security for applications and Microsoft Windows Server System™ components, including Microsoft SQL Server™, Exchange Server, and Windows Small Business Server. Breakout Session 3: Implementing Advanced Server and Client Security Receive advanced prescriptive guidance to help secure servers and clients in high-security environments. Observe demonstrations of the technologies and practices that help enhance security for local and remote clients. Breakout Session 4: Applied Security Strategies Learn practical strategies for implementing security best practices across your environment, including how to troubleshoot problems with existing security configurations. Discuss best practices for enhancing security across heterogeneous environments, including legacy and third-party systems.


Developer Track Level 200 6/3/2004 9:45 AM - 6/3/2004 4:00 PM
Description: Development training sessions will provide you with guidance and free tools that help foster a deeper understanding of security concerns that are relevant to the authors of today’s applications, including some critical security issues around unicode, denial of service, and cryptography. You will also learn how to better analyze security threats using toolkits, threat modeling, and the latest tools available on the Microsoft .NET Framework. Breakout Session 1: Essentials of Application Security Learn why implementing security at every stage of the development process is so vital—plus how to use various technologies to help secure data and communications. Breakout Session 2: Writing Secure Code — Threat Defense Identify effective strategies and best practices for defending common security threats such as buffer overruns, cross-site scripting, SQL injection, and denial of service attacks. Breakout Session 3: Writing Secure Code — Best Practices Study established threat modeling methodologies and tools and how they can be applied with other best practices to help minimize vulnerabilities and limit damage from attacks. Breakout Session 4: Implementing Application Security Using the .NET Framework Learn how to use the cryptographic provider support in the .NET Framework to help encrypt and sign data, how to better secure ASP.NET-built Web applications and Web services, plus receive tips for writing more secure code with the .NET Framework.



Last Updated: Wednesday, March 17,





WAVEs EMBASSY = THE COMMON DENOMINATOR "SWISS" DEFACTO PLATFORM FOR TRUSTED WEB SERVICES

Join InvestorsHub

Join the InvestorsHub Community

Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.