FALL 2014 Network Training Conference

October 16, 2014

Grizzly Jack's Grand Bear Resort

Utica, IL

Conference Sponsored By:

OneNeck IT Solutions

 

Conference Schedule


With help from our sponsors, the fee for this training conference is only $175.

 

Register Online

 

Sponsorship Opportunities
Online Sponsor Registration

EARLY BIRD registration GIFT

Register for the IVNUA Conference by September 19, 2014 and receive a full-size, foldable wireless optical mouse!

Foldable Optical Wireless Moust

 

ABOUT THIS CONFERENCE

Information security is critical for every organization, large and small. The IVNUA Fall 2014 Conference will focus on information security. The conference includes four 90-minute technical training sessions covering the following topics:

 

The STATE of Computer Security Today

In this presentation we will look at the what keeps security professionals up at night. We will start by taking a look at where to find the information of what attacks are happening today. Next we will look at what groups comprise the hacking going on today, where they are physically located, and analyze what motivates them to do what they do. Lastly, we will look at the role governments are currently playing in this game.

 

The Hackers' Methods and Tools

In this section we will focus on the methods and tools that hackers use to break into your computers and networks. Some of these attacks will surprise you at how easy and vulnerable many networks are. After looking at a specific attack we will look at what can be done to mitigate your risk to that attack.

 

Creating Your Security Methodology - an Important Step Securing Your Computers and Networks

Securing your computers and networks is a tougher job than hacking them. This is because, as a sysadmin, you have to succeed every time to be considered successful, however; a hacker only needs to succeed once to win. In this session we will cover the planning, methodology, and mindset you should have in place before an incident occurs.

 

Tools and Techniques You can Use to Secure your Computers and Networks

In this section we will expand beyond the previous session of planning and methodology with specific tools and steps you can use to secure your computing environment. We will look at hacker tools you can use to assess your network like Metasploit as well as tools like the Microsoft Security Configuration Wizard and Group Policy that can help secure your systems.

 

Featured Presenter:
Brian Lewis, Microsoft IT Pro Evangelist

 

Brian Lewis works as an IT Pro Evangelist for Microsoft Corporation in the Midwest, where he focuses on the IT Pro audience in Illinois, Indiana, and Wisconsin. He is very passionate about technology and has over 18 years of enterprise IT experience. Brian enjoys working with all computer and networking technologies. He enjoys everything from programming and scripting to working with all types of infrastructure. There just isn’t a technology that isn’t interesting to him. Brian enjoys several hobbies outside of computers including rock climbing, trail biking, and swimming.

 

Brian received his Bachelors degree in Management of Information Systems from the University of Wisconsin – Milwaukee. One of Brian’s passions is computer security and he holds the Certified Information Systems Security Professional (CISSP) certification among other computer industry certifications.


For more information, please e-mail us at conference@ivnua.org.

 

CONFERENCE SCHEDULE

Thursday, October 16, 2014

7:30-8:00

REGISTRATION AND BREAKFAST BUFFET

8:00-8:30

Keynote Address

Breakfast Buffet Provided

8:30-10:00

The Current State of Computer Security

Brian Lewis
Microsoft

10:00-10:30

BREAK (Refreshments Provided)

Sponsor Hall Opens

10:30-12:00

Social Engineering

Brian Lewis
Microsoft

12:00-1:00

LUNCH (Provided) -- Lunch

1:00-1:30

Sponsor Hall Open

1:30-3:00

How to Secure Your Windows Servers: Reducing the Attack Surface with the Security Configuration Manager

Brian Lewis
Microsoft

3:00-3:30

BREAK (Refreshments Provided)

3:30-5:00

How to Secure Your Windows Servers: Strategies to Secure Your AD Credentials

Brian Lewis
Microsoft

   
Register Online