Boston Area Windows Server User Group
Next Meeting:
6:30 PM Wednesday, September 1st
 
 
Location:  Microsoft’s Offices in Waltham, MA:
 
http://www.microsoft.com/mscorp/info/usaoffices/waltham.asp
Pizza and Soda arrive at 6, the meeting begins at 6:30

Securing your Network - Adriel T. Desautels; Founder and CTO of Secure Network Operations, Inc.

The physical and economic risks created by insecure networks worldwide should be our primary security concern. Our nation alone uses roughly 60% of all of the IP addresses in the world. This means that our risk of cyber attack is higher than any other nation. This presentation will talk about the needs, the risks, the vulnerabilities and the solutions to the problem of well-aimed attacks against our networks and against key infrastructure components.

Extending the Usefulness of Group Policy - Kevin Sullivan or AutoProf

This will be a presentation on extending the usefulness of Group Policy. The focus area would be on custom ADM templates, policies vs. preferences, scripting configuration solutions and Client Side Extensions of Group Policy. This topic would be pretty technical and not specific to our solutions but the last section would be essentially why we (AutoProf) focus our attention at extending Group Policy with Client Side Extensions. It is a very hot topic in that Group Policy adoption is gaining momentum currently.


Other Important News (Please read!)
 
The New England Security Group will be meeting Thursday, Sep. 9th this month, Their topic this month is:
"Exposing the Insider Threat:" Justin Bingham, CTO of Intrusic will discuss how malicious hackers slip past perimeter defenses to attack your internal networks and will profile the methods and technologies that are used to exploit your network.  The talk will take attendees through the mission objective of a sophisticated malicious hacker or cyberterrorist.  The first step is to bypass the perimeter, but with legitimate credentials. That’s where "island hopping" comes in. Then, the next step is to establish residency in the network. This is where a malicious hacker would try something like a covert data channel such as a reverse HTTP tunnel. Then they conduct reconnaissance using methods such as Layer 2 sniffing. The last step is actual theft or compromise of data.  See http://www.neisg.org for more information

 
 
As always, you can find all of this information and more on our website, which is updated regularly as things come to our attention.
To unsubscribe, visit: http://www.windowsboston.com/Lists/signup.htm
For more information on the User Group, please visit:  http://www.windowsboston.com/