Security Tactics for Servers and Wireless Networks

T21 Tactics in Keeping Bad Hardware Off Your Network

August 23rd, 2012

4:15pm - 5:30pm

Mike Danseglio

Mike Danseglio

Principal Technologist

Next Direction Technologies

From the CEO with her iPad to the IT guru with the latest laptop technology to the intern with a new Android media player, users love to bring their personal electronics to work and connect them to corporate assets. Most users never think that connecting a phone or ebook reader could pose a security risk to the entire network. But it most certainly can. And regardless of written security policy, users continue to do it. Join Mike Danseglio, CISSP, former security authority at Microsoft and world-renowned security expert, as he shows how this happens every day along with the impact of each occurrence. For each type of vulnerability, Mike will explain potential data compromise, impact to the business, and more. But you don’t want to know just the pain. You also want the solution! Mike won’t let you go without detailed demonstrations of protecting corporate assets from those nasty devices using off-the-shelf hardware and software tools.

You will learn:

  • The features of Windows Server that enable device blocking and permitting
  • How to identify and map approved devices
  • How to say "yes" to unapproved devices without compromising corporate security