2009 September - Server Virtualization - Security & Auditing
Time: 8:30 - 4:30
How to measure confidentiality, integrity, and availability in the virtual environment
Single-point of failure considerations and protections
Clustering – what makes sense and what is a risk
Best Practices in the IT World
Data Isolation – isolating data from other ‘guest’ virtual machines
Hypervisors and kernels – how to protect and configure
VM Escape – how to prevent applications/users/services from bypassing the VM layer to gain full access to the host system.
Network Security – firewalling and port configuration on the host
Patching, Services, and Configuration – what makes sense?
Speaker Bio: Greg Shields, is an independent author, instructor, and IT consultant based in Denver, Colorado, and a co-founder of Concentrated Technology. With nearly 15 years of experience in information technology, Greg has developed extensive experience in systems administration, engineering, and architecture specializing in Microsoft systems management, remote application, and virtualization technologies. Greg is a Contributing Editor for Redmond Magazine, MCPmag.com, and Virtualization Review Magazine and is the author of five books, including Windows Server 2008: What’s New / What’s Changed. Greg is also a highly sought-after instructor and speaker, speaking regularly at conferences like TechMentor Events, and producing computer-based training curriculum for CBT Nuggets. Greg is a recipient of Microsoft "Most Valuable Professional" award with a specialization in Windows Terminal Services.
Directions to RTI Building 08 Multipurpose Room