{"id":69,"date":"2014-05-20T15:17:20","date_gmt":"2014-05-20T19:17:20","guid":{"rendered":"http:\/\/blog.metcorp.org\/?p=69"},"modified":"2014-06-09T21:50:08","modified_gmt":"2014-06-10T01:50:08","slug":"microsoft-bluehat-resources","status":"publish","type":"post","link":"https:\/\/adsecurity.org\/?p=69","title":{"rendered":"Microsoft BlueHat Resources"},"content":{"rendered":"<h5>Microsoft has their own internal employee security conference called &#8220;<a href=\"http:\/\/technet.microsoft.com\/en-us\/security\/dn456542\">BlueHat<\/a>&#8220;.<br \/>\nHere are session links from the past few years:<\/h5>\n<p><!--more--><\/p>\n<ul>\n<li>\n<h5><a href=\"http:\/\/channel9.msdn.com\/Events\/Blue-Hat-Security-Briefings\/BlueHat-Security-Briefings-Fall-2013-Sessions%20\">BlueHat Fall 2013 Sessions<\/a><\/h5>\n<\/li>\n<li>\n<h5><a href=\"http:\/\/channel9.msdn.com\/Events\/Blue-Hat-Security-Briefings\/BlueHat-Security-Briefings-Fall-2012-Sessions\">BlueHat Fall 2012 Sessions<\/a><\/h5>\n<\/li>\n<li>\n<h5><a href=\"http:\/\/channel9.msdn.com\/Events\/Blue-Hat-Security-Briefings\/BlueHat-Redmond-Security-Briefings-Fall-2011-Sessions\">BlueHat Fall 2011 Sessions<\/a><\/h5>\n<\/li>\n<li>\n<h5><a href=\"http:\/\/channel9.msdn.com\/Events\/Blue-Hat-Security-Briefings\/BlueHat-Security-Briefings-Fall-2010-Sessions\">BlueHat Fall 2010 Sessions<\/a><\/h5>\n<\/li>\n<li>\n<h5><a href=\"http:\/\/channel9.msdn.com\/Events\/Blue-Hat-Security-Briefings\/BlueHat-Security-Briefings-Fall-2009-Sessions-and-Interviews\">BlueHat Fall 2009 Sessions<\/a><\/h5>\n<\/li>\n<li>\n<h5><a href=\"http:\/\/channel9.msdn.com\/Events\/Blue-Hat-Security-Briefings\/BlueHat-Security-Briefings-Fall-2008-Sessions-and-Interviews\">BlueHat Fall 2008 Sessions<\/a><\/h5>\n<\/li>\n<\/ul>\n<h5><span style=\"text-decoration: underline;\">BlueHat Session highlights:<\/span><\/h5>\n<ul>\n<li>\n<h5><a href=\"http:\/\/blogs.msdn.com\/cfs-file.ashx\/__key\/communityserver-blogs-components-weblogfiles\/00-00-00-63-74-metablogapi\/1055.PowerShell_2D00_Security_2D00_Best_2D00_Practices_5F00_3CA24C32.pptx\">PowerShell Security Best Practices<\/a> (2013)<\/h5>\n<\/li>\n<li>\n<h5><a href=\"http:\/\/channel9.msdn.com\/Events\/Blue-Hat-Security-Briefings\/BlueHat-Security-Briefings-Fall-2013-Sessions\/PowerShell-Code-Integrity\">PowerShell Code Integrity<\/a> (2013)<\/h5>\n<\/li>\n<li>\n<h5><a href=\"http:\/\/channel9.msdn.com\/Events\/Blue-Hat-Security-Briefings\/BlueHat-Security-Briefings-Fall-2013-Sessions\/The-Surveillance-Landscape-and-Resistant-Design\">The Surveillance Landscape and Resistant Design<\/a> (2013)<\/h5>\n<\/li>\n<li>\n<h5><a href=\"http:\/\/channel9.msdn.com\/Events\/Blue-Hat-Security-Briefings\/BlueHat-Security-Briefings-Fall-2012-Sessions\/BH1202\">Social Authentication<\/a> (2012)<\/h5>\n<\/li>\n<li>\n<h5><a href=\"http:\/\/channel9.msdn.com\/Events\/Blue-Hat-Security-Briefings\/BlueHat-Security-Briefings-Fall-2012-Sessions\/Stuff-My-Cloud-Evangelist-Says-Just-Not-My-CSO\">Stuff My Cloud Evangelist Says&#8230; Just Not My CSO Stuff My Cloud Evangelist Says&#8230; Just Not My CSO<\/a> (2012)<\/h5>\n<\/li>\n<li>\n<h5><a href=\"http:\/\/channel9.msdn.com\/Events\/Blue-Hat-Security-Briefings\/BlueHat-Security-Briefings-Fall-2012-Sessions\/BH1207\">Why UEFI<\/a> (2012)<\/h5>\n<\/li>\n<li>\n<h5><a href=\"http:\/\/channel9.msdn.com\/Events\/Blue-Hat-Security-Briefings\/BlueHat-Security-Briefings-Fall-2012-Sessions\/BH1205\">Don&#8217;t Stand So Close To Me: An Analysis of the NFC Attack Surface Don&#8217;t Stand So Close To Me: An Analysis of the NFC Attack Surface<\/a> (2012)<\/h5>\n<\/li>\n<li>\n<h5><a href=\"http:\/\/channel9.msdn.com\/Events\/Blue-Hat-Security-Briefings\/BlueHat-Security-Briefings-Fall-2012-Sessions\/BH1208\">Pass the Hash and Other Credential Theft and Reuse: Preventing Lateral Movement and Privilege Escalation Pass the Hash and Other Credential Theft and Reuse: Preventing Lateral Movement and Privilege\u2026<\/a>(2012)<\/h5>\n<\/li>\n<li>\n<h5><a href=\"http:\/\/channel9.msdn.com\/Events\/Blue-Hat-Security-Briefings\/BlueHat-Security-Briefings-Fall-2012-Sessions\/BH1209\">Why Johnny Can&#8217;t Patch: And What We Can Do About It Why Johnny Can&#8217;t Patch: And What We Can Do About It<\/a> (2012)<\/h5>\n<\/li>\n<li>\n<h5><a href=\"http:\/\/channel9.msdn.com\/Events\/Blue-Hat-Security-Briefings\/BlueHat-Redmond-Security-Briefings-Fall-2011-Sessions\/v11-4\">You Spent All That Money and You Still Got Owned???? You Spent All That Money and You Still Got Owned????<\/a> (2011)<\/h5>\n<\/li>\n<li>\n<h5><a href=\"http:\/\/channel9.msdn.com\/Events\/Blue-Hat-Security-Briefings\/BlueHat-Security-Briefings-Fall-2010-Sessions\/V10-1\">Nine Trends Affecting the Future of Exploitation Nine Trends Affecting the Future of Exploitation<\/a> (2010)<\/h5>\n<\/li>\n<li>\n<h5><a href=\"http:\/\/channel9.msdn.com\/Events\/Blue-Hat-Security-Briefings\/BlueHat-Security-Briefings-Fall-2010-Sessions\/V10-2\">Behind the Curtain of Second Tuesdays: Challenges in Software Security Response Behind the Curtain of Second Tuesdays: Challenges in Software Security Response<\/a> (2010)<\/h5>\n<\/li>\n<li>\n<h5><a href=\"http:\/\/channel9.msdn.com\/Events\/Blue-Hat-Security-Briefings\/BlueHat-Security-Briefings-Fall-2010-Sessions\/V10-6\">Browser Hacks, Design Flaws, &amp; Opt-In Security Browser Hacks, Design Flaws, &amp; Opt-In Security<\/a> (2010)<\/h5>\n<\/li>\n<\/ul>\n<h4><\/h4>\n<h4><\/h4>\n<h4><\/h4>\n<h4><\/h4>\n<h4><\/h4>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft has their own internal employee security conference called &#8220;BlueHat&#8220;. Here are session links from the past few years:<\/p><p><a class=\"more-link btn\" href=\"https:\/\/adsecurity.org\/?p=69\">Continue reading<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11,2],"tags":[15,16],"class_list":["post-69","post","type-post","status-publish","format-standard","hentry","category-microsoft-security","category-technical-reference","tag-microsoftbluehat","tag-securitysession","item-wrap"],"_links":{"self":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts\/69","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=69"}],"version-history":[{"count":2,"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts\/69\/revisions"}],"predecessor-version":[{"id":77,"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts\/69\/revisions\/77"}],"wp:attachment":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=69"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=69"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=69"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}