TechEd North America 2013
-
- New Orleans
- June 3 - 6, 2013
- Speakers at TechEd North America 2013
TechEd North America 2013. Earn achievements as you plan, attend and give feedback about the conference. Be part of the event experience!
Featured
-
Keynote Presentation
- Brad Anderson
- Keynote
- Keynote
- 200 - Intermediate
- Key01
- Day 1
- June 3, 2013 from 8:30AM to 10:30AM
-
40
Despite sea changes in cloud computing, device proliferation, and the explosion of data, IT pros and developers still live for one simple thing: to deliver amazing experiences for their customers and end-users. In this keynote, Brad Anderson will unveil a broad set of new capabilities across the full...
- List
- Schedule
- Most Viewed
- All
-
Lessons from the Field: Useful Hacker Techniques for Administrators
- Hasain Alshakarti, Paula Januszkiewicz, Marcus Murray
- Architecture & Trustworthy Computing
- Pre-Conference Seminar
- Security, Identity and Access, Pre-Conference Seminar, Access
- 300 - Advanced
- PRC07
- Room 288
- June 2, 2013 from 9:00AM to 5:00PM
-
21
Pre-Conference Seminars require an additional registration fee. If you have not pre-registered for a Pre-Con, please visit TechEd North America Registration to add this to your registration record.
This pre-conference seminar teaches infrastructure security concepts, including the techniques for how to... -
Security Experts Panel Discussion: Security for Hackers (BYOD)
- Paula Januszkiewicz, Andy Malone, Marcus Murray, Frank Simorjay, Mark Simos
- Architecture & Trustworthy Computing
- Breakout
- Security, Identity and Access, Breakout, Access & Information Protection
- 300 - Advanced
- ATC-B312
- Day 2
- La Nouvelle Ballroom C
- June 4, 2013 from 10:15AM to 11:30AM
-
8
In this session, hear from industry experts on how they protect their environments from hackers. This panel offers a great chance to learn and gain insight into the minds of experts, and their ideal protection techniques. The panel discusses the technical details of recent security events, including...
-
Hackers (Not) Halted (repeats on 6/6 at 2:45pm)
- Paula Januszkiewicz
- Architecture & Trustworthy Computing
- Breakout
- Security, Identity and Access, Breakout, Access & Information Protection
- 300 - Advanced
- ATC-B307
- Day 3
- La Nouvelle Ballroom B
- June 5, 2013 from 5:00PM to 6:15PM
-
8
It is a hard time for penetration testers. Technologies are so advanced today, that we really need to struggle to do something malicious. We keep trying new tricks, and the system administrators keep adding new technologies to the field so that it is barely possible to fight against cryptography and...
-
Raiders of the Elevated Token: Understanding User Account Control and App Capabilities in Windows 8
- Raymond Comvalius, Erdal Ozkaya
- Windows Client, Access & Management
- Breakout
- Security, Windows, Breakout
- 300 - Advanced
- WCA-B335
- Day 3
- Room 391
- June 5, 2013 from 5:00PM to 6:15PM
-
2
After its debut in Windows Vista, User Account Control has had major improvements. Still, lots of people tend to turn it off. In Windows 8 User Account Control is here to stay. Why are some applications still requesting elevation? Can I still turn off User Account Control in Windows 8 and should I? This...
-
Adventures in Underland: What Passwords Do When No One Is Watching
- Paula Januszkiewicz
- Architecture & Trustworthy Computing
- Breakout
- Security, Identity and Access, Breakout, Access & Information Protection
- 300 - Advanced
- ATC-B301
- Day 4
- La Nouvelle Ballroom B
- June 6, 2013 from 8:30AM to 9:45AM
-
12
Wherever and whenever you enter your password in the password field, there is at least one mechanism that must know it to use it later for the designed purpose. The common knowledge is that when we set up our password in Windows it is hashed and stored either in SAM or ntds.dit database in Active Directory....
-
P0wn3d! What’s Next?
- Raymond Comvalius, Erdal Ozkaya
- Windows Client, Access & Management
- Breakout
- Breakout
- 200 - Intermediate
- WCA-B220
- Day 4
- Room 272
- June 6, 2013 from 8:30AM to 9:45AM
-
1
Let's face it, Windows machines can get hijacked if you happen to be on the wrong place at the wrong time. Fortunately, Microsoft has built numerous tools into Windows so administrators and power users can analyze systems to determine whether and how they've been compromised. But many of us are not even...
-
Hackers (Not) Halted (repeated from 6/5 at 5pm)
- Paula Januszkiewicz
- Architecture & Trustworthy Computing
- Breakout
- Security, Identity and Access, Breakout, Access & Information Protection
- 300 - Advanced
- ATC-B307-R
- Day 4
- Room 276
- June 6, 2013 from 2:45PM to 4:00PM
-
3
It is a hard time for penetration testers. Technologies are so advanced today, that we really need to struggle to do something malicious. We keep trying new tricks, and the system administrators keep adding new technologies to the field so that it is barely possible to fight against cryptography and...
Event Homepage
TechEd North America 2013Currently Filtered By
-
Speaker:
- Erdal Ozkaya
- Paula Januszkiewicz