{"id":1560,"date":"2015-05-08T23:39:52","date_gmt":"2015-05-09T03:39:52","guid":{"rendered":"http:\/\/adsecurity.org\/?p=1560"},"modified":"2015-05-13T21:12:41","modified_gmt":"2015-05-14T01:12:41","slug":"microsoft-ignite-2015-security-sessions","status":"publish","type":"post","link":"https:\/\/adsecurity.org\/?p=1560","title":{"rendered":"Microsoft Ignite 2015 Security Sessions"},"content":{"rendered":"<p>Microsoft retired several conferences this year (TechEd, MEC, MMC, etc) and merged them into a single mega-conference called Microsoft Ignite 2015. About 23,000 people (~29k including all staff and support personnel) converged on the McCormick Place Conference Center in Chicago, IL during the week of May 4th (May the Fourth be With You!).<\/p>\n<p>I recently posted on the new <a href=\"https:\/\/adsecurity.org\/?p=1535\">Windows 10 credential system, Microsoft Passport &amp; Microsoft Hello<\/a>.<\/p>\n<p><em>Note: Session content is still being uploaded.<\/em><\/p>\n<p><span style=\"text-decoration: underline;\"><strong>Windows Security Sessions:<\/strong><\/span><\/p>\n<p>How to Protect Your Corporate Resources from Advanced Attacks (Microsoft Advanced Threat Analytics, formerly Aorato)<br \/>\n<a href=\"https:\/\/channel9.msdn.com\/Events\/Ignite\/2015\/BRK3870\">https:\/\/channel9.msdn.com\/Events\/Ignite\/2015\/BRK3870<\/a><br \/>\nDemi Albuz, Michael Dubinsky, Benny Lakunishok, Idan Plotnik<br \/>\n<a href=\"http:\/\/video.ch9.ms\/sessions\/ignite\/2015\/decks\/BRK3870_Albuz.pptx\">Slides<\/a> (<a href=\"http:\/\/view.officeapps.live.com\/op\/view.aspx?src=http%3a%2f%2fvideo.ch9.ms%2fsessions%2fignite%2f2015%2fdecks%2fBRK3870_Albuz.pptx\">view online<\/a>)<\/p>\n<p>How You Can Hack-Proof Your Clients and Servers in a Day<br \/>\nHasain Alshakarti, Marcus Murray<br \/>\n<a href=\"https:\/\/channel9.msdn.com\/Events\/Ignite\/2015\/BRK2346\">https:\/\/channel9.msdn.com\/Events\/Ignite\/2015\/BRK2346<\/a><\/p>\n<p>Hacker Tools for Ethical Hackers to Protect Windows Clients<br \/>\nRaymond Comvalius, Erdal Ozkaya<br \/>\n<a href=\"https:\/\/channel9.msdn.com\/Events\/Ignite\/2015\/BRK2332\">https:\/\/channel9.msdn.com\/Events\/Ignite\/2015\/BRK2332<br \/>\n<\/a><a href=\"http:\/\/video.ch9.ms\/sessions\/ignite\/2015\/decks\/BRK2332_Ozkaya.pptx\">Slides<\/a> (<a href=\"http:\/\/view.officeapps.live.com\/op\/view.aspx?src=http%3a%2f%2fvideo.ch9.ms%2fsessions%2fignite%2f2015%2fdecks%2fBRK2332_Ozkaya.pptx\">view online<\/a>)<\/p>\n<p>Detecting the Undetectable<br \/>\nRoger Grimes<br \/>\n<a href=\"https:\/\/channel9.msdn.com\/Events\/Ignite\/2015\/BRK2344\">https:\/\/channel9.msdn.com\/Events\/Ignite\/2015\/BRK2344<br \/>\n<\/a><a href=\"http:\/\/video.ch9.ms\/sessions\/ignite\/2015\/decks\/BRK2344_Grimes.pptx\">Slides<\/a> (<a href=\"http:\/\/view.officeapps.live.com\/op\/view.aspx?src=http%3a%2f%2fvideo.ch9.ms%2fsessions%2fignite%2f2015%2fdecks%2fBRK2344_Grimes.pptx\">view online<\/a>)<\/p>\n<p><!--more--><\/p>\n<p>Adventures in Underland: What Your System Stores on the Disk without Telling You<br \/>\nPaula Januszkiewicz<br \/>\n<a href=\"https:\/\/channel9.msdn.com\/Events\/Ignite\/2015\/BRK3320\">https:\/\/channel9.msdn.com\/Events\/Ignite\/2015\/BRK3320<\/a><\/p>\n<p>Hidden Talents: Things Administrators Never Expect from Their Users Regarding Security<br \/>\nPaula Januszkiewicz<br \/>\n<a href=\"https:\/\/channel9.msdn.com\/Events\/Ignite\/2015\/BRK3323\">https:\/\/channel9.msdn.com\/Events\/Ignite\/2015\/BRK3323<\/a><\/p>\n<p>The Ultimate Hardening Guide: What to Do to Make Hackers Pick Someone Else<br \/>\nPaula Januszkiewicz<br \/>\n<a href=\"https:\/\/channel9.msdn.com\/Events\/Ignite\/2015\/BRK3343\">https:\/\/channel9.msdn.com\/Events\/Ignite\/2015\/BRK3343<\/a><\/p>\n<p>Black Belt Security with Windows 10<br \/>\nSami Laiho<br \/>\n<a href=\"https:\/\/channel9.msdn.com\/Events\/Ignite\/2015\/BRK3336\">https:\/\/channel9.msdn.com\/Events\/Ignite\/2015\/BRK3336<\/a><\/p>\n<p>Zero Admins \u2013 Zero Problems<br \/>\nSami Laiho<br \/>\n<a href=\"https:\/\/channel9.msdn.com\/Events\/Ignite\/2015\/BRK2335\">https:\/\/channel9.msdn.com\/Events\/Ignite\/2015\/BRK2335<\/a><br \/>\n<a href=\"http:\/\/video.ch9.ms\/sessions\/ignite\/2015\/decks\/BRK2335_Laiho.pptx\">Slides<\/a> (<a href=\"http:\/\/view.officeapps.live.com\/op\/view.aspx?src=http%3a%2f%2fvideo.ch9.ms%2fsessions%2fignite%2f2015%2fdecks%2fBRK2335_Laiho.pptx\">view online<\/a>)<\/p>\n<p>Barbarians Inside the Gates: Protecting against Credential Theft and Pass the Hash Today<br \/>\nAaron Margosis, Mark Simos<br \/>\n<a href=\"https:\/\/channel9.msdn.com\/Events\/Ignite\/2015\/BRK2334\">https:\/\/channel9.msdn.com\/Events\/Ignite\/2015\/BRK2334<br \/>\n<\/a><a href=\"http:\/\/video.ch9.ms\/sessions\/ignite\/2015\/decks\/BRK2334_Margosis.pptx\">Slides<\/a> (<a href=\"http:\/\/view.officeapps.live.com\/op\/view.aspx?src=http%3a%2f%2fvideo.ch9.ms%2fsessions%2fignite%2f2015%2fdecks%2fBRK2334_Margosis.pptx\">view online<\/a>)<\/p>\n<p>Advanced Windows Defense<br \/>\nErdal Ozkaya<br \/>\n<a href=\"https:\/\/channel9.msdn.com\/Events\/Ignite\/2015\/BRK2311\">https:\/\/channel9.msdn.com\/Events\/Ignite\/2015\/BRK2311<\/a><br \/>\n<a href=\"http:\/\/video.ch9.ms\/sessions\/ignite\/2015\/decks\/BRK2311_Ozkaya.pptx\">Slides<\/a> (<a href=\"http:\/\/view.officeapps.live.com\/op\/view.aspx?src=http%3a%2f%2fvideo.ch9.ms%2fsessions%2fignite%2f2015%2fdecks%2fBRK2311_Ozkaya.pptx\">view online<\/a>)<\/p>\n<p>Zombies in Social Networks<br \/>\nErdal Ozkaya<br \/>\n<a href=\"https:\/\/channel9.msdn.com\/Events\/Ignite\/2015\/BRK2315\">https:\/\/channel9.msdn.com\/Events\/Ignite\/2015\/BRK2315<br \/>\n<\/a><a href=\"http:\/\/video.ch9.ms\/sessions\/ignite\/2015\/decks\/BRK2315_Ozkaya.pptx\">Slides<\/a> (<a href=\"http:\/\/view.officeapps.live.com\/op\/view.aspx?src=http%3a%2f%2fvideo.ch9.ms%2fsessions%2fignite%2f2015%2fdecks%2fBRK2315_Ozkaya.pptx\">view online<\/a>)<\/p>\n<p>Modern Hardening: Lessons Learned on Hardening Applications and Services<br \/>\nShawn Rabourn, Mark Simos<br \/>\n<a href=\"https:\/\/channel9.msdn.com\/Events\/Ignite\/2015\/BRK3486\">https:\/\/channel9.msdn.com\/Events\/Ignite\/2015\/BRK3486<\/a><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"text-decoration: underline;\"><strong>Windows 10 Security Sessions:<\/strong><\/span><br \/>\nDropping the Hammer Down on Malware Threats with Windows 10\u2019s Device Guard<br \/>\nScott Anderson, Jeffrey Sutherland<br \/>\n<a href=\"https:\/\/channel9.msdn.com\/Events\/Ignite\/2015\/BRK2336\">https:\/\/channel9.msdn.com\/Events\/Ignite\/2015\/BRK2336<\/a><br \/>\n<a class=\"slides\" href=\"http:\/\/video.ch9.ms\/sessions\/ignite\/2015\/decks\/BRK2336_Sutherland.pptx\">Slides<\/a> (<a href=\"http:\/\/view.officeapps.live.com\/op\/view.aspx?src=http%3a%2f%2fvideo.ch9.ms%2fsessions%2fignite%2f2015%2fdecks%2fBRK2336_Sutherland.pptx\">view online<\/a>)<\/p>\n<p>The End Game for Passwords and Credential Theft?<br \/>\nNelly Porter<br \/>\n<a href=\"https:\/\/channel9.msdn.com\/Events\/Ignite\/2015\/BRK2333\">https:\/\/channel9.msdn.com\/Events\/Ignite\/2015\/BRK2333<\/a><br \/>\n<a class=\"slides\" href=\"http:\/\/video.ch9.ms\/sessions\/ignite\/2015\/decks\/BRK2333_Porter.pptx\">Slides<\/a> (<a href=\"http:\/\/view.officeapps.live.com\/op\/view.aspx?src=http%3a%2f%2fvideo.ch9.ms%2fsessions%2fignite%2f2015%2fdecks%2fBRK2333_Porter.pptx\">view online<\/a>)<\/p>\n<p>Overview of Windows 10 for Enterprises<br \/>\nJeremy Chapman, Dustin Ingalls<br \/>\n<a href=\"https:\/\/channel9.msdn.com\/Events\/Ignite\/2015\/THR0342\">https:\/\/channel9.msdn.com\/Events\/Ignite\/2015\/THR0342<\/a><\/p>\n<p>Windows 10: Disrupting the Revolution of Cyber-Threats with Revolutionary Security!<br \/>\nChris Hallum, Dustin Ingalls<br \/>\n<a href=\"https:\/\/channel9.msdn.com\/Events\/Ignite\/2015\/BRK2306\">https:\/\/channel9.msdn.com\/Events\/Ignite\/2015\/BRK2306<br \/>\n<\/a><a href=\"http:\/\/video.ch9.ms\/sessions\/ignite\/2015\/decks\/BRK2306_Hallum.pptx\">Slides<\/a> (<a href=\"http:\/\/view.officeapps.live.com\/op\/view.aspx?src=http%3a%2f%2fvideo.ch9.ms%2fsessions%2fignite%2f2015%2fdecks%2fBRK2306_Hallum.pptx\">view online<\/a>)<\/p>\n<p>A New Era of Threat Resistance for the Windows 10 Platform<br \/>\nChris Hallum, Dustin Ingalls<br \/>\n<a href=\"https:\/\/channel9.msdn.com\/Events\/Ignite\/2015\/BRK2325\">https:\/\/channel9.msdn.com\/Events\/Ignite\/2015\/BRK2325<br \/>\n<\/a><a href=\"http:\/\/video.ch9.ms\/sessions\/ignite\/2015\/decks\/BRK2325_Hallum.pptx\">Slides<\/a> (<a href=\"http:\/\/view.officeapps.live.com\/op\/view.aspx?src=http%3a%2f%2fvideo.ch9.ms%2fsessions%2fignite%2f2015%2fdecks%2fBRK2325_Hallum.pptx\">view online<\/a>)<\/p>\n<p>Next Generation Malware Detection with Windows Defender<br \/>\nDustin Ingalls, Deepak Manohar<br \/>\n<a href=\"https:\/\/channel9.msdn.com\/Events\/Ignite\/2015\/BRK2327\">https:\/\/channel9.msdn.com\/Events\/Ignite\/2015\/BRK2327<\/a><br \/>\n<a class=\"slides\" href=\"http:\/\/video.ch9.ms\/sessions\/ignite\/2015\/decks\/BRK2327_Manohar.pptx\">Slides<\/a> (<a href=\"http:\/\/view.officeapps.live.com\/op\/view.aspx?src=http%3a%2f%2fvideo.ch9.ms%2fsessions%2fignite%2f2015%2fdecks%2fBRK2327_Manohar.pptx\">view online<\/a>)<\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"text-decoration: underline;\"><strong>Misc:<\/strong><\/span><\/p>\n<p>Sysinternals Primer: Ignite 2015 Edition<br \/>\nAaron Margosis<br \/>\n<a href=\"https:\/\/channel9.msdn.com\/Events\/Ignite\/2015\/BRK3337\">https:\/\/channel9.msdn.com\/Events\/Ignite\/2015\/BRK3337<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft retired several conferences this year (TechEd, MEC, MMC, etc) and merged them into a single mega-conference called Microsoft Ignite 2015. About 23,000 people (~29k including all staff and support personnel) converged on the McCormick Place Conference Center in Chicago, IL during the week of May 4th (May the Fourth be With You!). I recently &hellip; <\/p>\n<p><a class=\"more-link btn\" href=\"https:\/\/adsecurity.org\/?p=1560\">Continue reading<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11,234],"tags":[113,507,509,505,321,207,508,494,506,204],"class_list":["post-1560","post","type-post","status-publish","format-standard","hentry","category-microsoft-security","category-security-conference-presentationvideo","tag-activedirectorysecurity","tag-chicago","tag-conferencesecuritysessions","tag-microsoftignite","tag-microsoftigniteconference2015","tag-mimikatz","tag-securityvideo","tag-windows10","tag-windows10security","tag-windowssecurity","item-wrap"],"_links":{"self":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts\/1560","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1560"}],"version-history":[{"count":8,"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts\/1560\/revisions"}],"predecessor-version":[{"id":1571,"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts\/1560\/revisions\/1571"}],"wp:attachment":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1560"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1560"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1560"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}