Teched 2014: Microsoft Experts from KEMP

KEMP Microsoft Experts Speakers at Teched & Their Sessions
Table of Contents
Bulletproofing Your Network Security
Monday, May 12, 2013, 1:15 PM – 2:45 PMSpeaker(s),: Erdal Ozkaya, Milad Andlaner Track: Windows Phone and DevicesSession Type : BreakoutTopics: Security, Trustworthy ComputingLearn how to stop hackers in their tracks. This session will demonstrate the best tools and techniques for hardening your devices, from your laptop to your phone to your servers and services.
Key insights that were previously reserved for only the top IT staff at the NSA and other Federal agencies have been made available to you. Find out how to make your network secure so you are always ahead of malicious insiders and cyber criminals. Are you still not convinced? This session will change the way you think and help you to build a secure network. You will be compelled to double-check your security after the presentation.
PCIT-B319TWC: Social Engineering: Manipulations and Targeted Attacks and IT Security
Tuesday, May 13, 5:00 PM – 6 :15 PMSpeaker(s), Erdal Ozkaya and Milad Aslaner Track : People-centric ITession Type : BreakoutTopic : Security, Trustworthy ComputingWe can see a shift in the way malware engineers target enterprises. The new world has seen a shift in the attack landscape. They now target specific targets, especially on social networks. Guess what? You know what? The CEO, CTO, and even the girl next to you all have a social networking account. This session will examine how social engineering has evolved over time and discuss lessons learned from the field about how to avoid traps.
WIN-B351 Hacker tools for ethical hackers to protect Windows clients
Wednesday, May 14, 2010 at 10:15 AM – 11:15 AM. Speaker(s): Raymond Comvalius, Erdal Ozkaya Track: Windows, Phone and Devices. Session Type: BreakoutTopic Windows Operating System. If you want to protect your Windows environment, you need to know the methods used by cyber criminals. This session will show you the most common hacking tools, how they can cause damage, and how to be aware of them before they reach your network. Learn how Windows Clients can help you protect your network from some of these attacks.
OFC-B329 Role Based Access Control (RBAC), Makes Sense for You
Thursday, May 15, 8:30 AM – 9 :45 AM Speaker(s): Bhargav ShuklaTrack Office Servers and ServicesSession Type : BreakoutTopic : Microsoft ExchangeRole Based Access Control was introduced with Microsoft Exchange Server 2010. Lync Server and other Microsoft products also use the RBAC framework. This session will provide insight from an RBAC expert about his real-world implementation in an Exchange environment. He also shares his experiences from teaching MCM candidates for the Lync and Exchange MCM programs. Learn from real-world examples how RBAC can work for you in Lync and Exchange deployments.
OFC-B271 Integration of Microsoft Exchange Server 2013 with Lync & SharePoint
Thursday, May 15, 2013, 1:00 PM – 2:05 PMSpeaker(s), Bhargav ShuklaTrack Office Servers and ServicesSession Type BreakoutTopics: Microsoft Exchange, Microsoft Lync and Microsoft SharePoint. While each product is great, when they are combined, it creates a powerful productivity booster and an amazing user experience. The Microsoft Office 2013 product family includes integration features that make products more efficient. We will discuss the integration of Microsoft Lync Server 2013 with Exchange Server 2013 as well as the benefits it brings to both the organizations investing in these products, and the end users who can benefit from it.
Erdal Ozkaya Kemp Technologies Regional Director
Erdal Ozkaya, Bachelor in Science