Skip to main content
Virtualization Boston logo

Virtualization Group - Boston

Go Search
Home
Calendar
DeepDiveDay2014
  
Virtualization Group - Boston > Meeting Notices > Securing the Cloud and SafeGuarding the Desktop  

Meeting Notices: Securing the Cloud and SafeGuarding the Desktop

Event Date

11/18/2015 

Title

Securing the Cloud and SafeGuarding the Desktop 

Sponsor

 

Body

VirtG Nov 2015 Meeting
Location and
Directions
One Cambridge Center
Cambridge, MA 02142

NERD CenterUse entrance near the Microsoft sign on the South end of the building. Elevator to 2nd floor, then sign in and guard will direct you to 4th floor, Hawthorne Room

Nerd Ctr. Map

6:00 PM - 9:00 PM Eastern Time

Paid parking available nearby; MIT lots are free after 5PM, Bldg E-51 (2 Amherst St) for example.
Directions to E-51 Parking
Better yet, take the "T".


 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 


 

 

 

 

 

 

 

 

Wednesday November 18th
Security - Mitigating Risks
From the Desktop to the Cloud

The Best in Education and Virtualization each Month

Thank you to our sponsors:

FSLogix
RES Software

PLEASE, be sure to RSVP on the VirtG Meetup site MeetUp Logo
so we know how much food to order and speed up registration at the Microsoft Security Desk
.

Registration Link: http://www.meetup.com/VirtGBoston/

  • 6:00-7:00 Networking, Introductions, Pizza

  • 7:00-7:45 Dan Stolts - Chief Technology Strategist - Microsoft
    Cloud Computing and the Security Landscape


  • Description: 
    • The REAL Security Story
      With massive security breaches announced on the nightly news every couple weeks, is cloud computing even viable? Come to this session to get the inside scoop on the security landscape and what that means to cloud computing and managing your infrastructure. We look at the cloud today as well as how we can expect the cloud and security landscape to change in the coming years. Does the launch of Windows 10 have any bearing on the discussion? How can we keep up with the rapid changes in both the cloud and in security? How are enterprises responding to security and privacy threats and breaches? What are companies doing to clean up their house? Most importantly, how should you respond to protect your business’s assets? Come to this session to find out!

  • Speaker Bio
    Dan Stolts
    • Dan Stolts – Chief Technology Strategist - Microsoft
      http://www.itproguru.com
      Dan Stolts “ITProGuru” is a technology expert who is a master of systems management and security. He is Chief Technology Strategist for Microsoft, owns several businesses and is a published author. Reach him on his primary blog http://itproguru.com or twitter @ITProGuru. He is proficient in many datacenter technologies (Windows Server, System Center, Virtualization, Cloud, etc.) and holds many certifications including MCT, MCITP, MCSE, TS, etc. Dan is currently specializing in system management, virtualization and cloud technologies. Dan is and has been a very active member of the user group community and was the founder of VirtG. Dan is an enthusiastic advocate of technology and is passionate about helping others. See more at: http://itproguru.com/about

      MonadCloud
  • 8:00-8:45 RES Software- : Securing The End User: A look beyond the enterprise “gated community” approach to IT security

  • Description:
    • This presentation will look at ways to ways mitigate end user carelessness and the risk of malicious activities by going beyond the firewall to secure your end users.

  • Speaker Bio
    • Tom Lauzon - Solution Engineer for RES Software
      Tom is an accomplished professional experienced in the automation, operation, management, and deployment of high-volume, mission critical, virtual end-user computing environments. Prior to RES Software, Tom managed the world-wide virtual computing infrastructure for a leading AMLAW 100 law firm, focusing on continuity of experience between physical and virtual end-user computing environments. Tom also has managed the virtual computer infrastructure for a large Electric & Gas utility; securing and virtualizing access to control and outage management applications with a high level of availability. Tom started his career as a support engineer for InterMute, Inc a leader in Spyware detection and removal prior to being acquired by Trend Micro, Inc in 2005. Tom is a Citrix Certified Expert for Virtualization, Microsoft Certified Professional and a RES Software Certified Professional. Follow Tom on Twitter @tcl145.
  • 8:45- Cleanup and prizes 
  • Registration Link: http://www.meetup.com/VirtGBoston/MeetUp Logo

 

 

Topic 1

 

Speaker 1

 

Topic 2

 

Speaker 2

 

Topic 3

 

Speaker 3

 

Topic 4

 

Speaker 4

 

# Registered

 

# Attended

 

Expires

11/19/2015 

Links To Resources

Attachments
Created at 10/22/2015 8:34 PM  by SAM\jsbythrow 
Last modified at 11/19/2015 8:46 AM  by SAM\Tim.Mangan