Synopsis
Features, functions and flashing lights - that's what the majority of developers focussed upon. Certainly there were those who wrote security features but that vast majority of Microsoft developers devoted most of their time to meeting the needs dictated by the functional specification.
Four years ago Bill issued his memo kicking off "Trustworthy Computing" dictating that Security was "job one". A huge cultural change ensued. Microsoft's Security Development Lifecycle was born and with it a significant change to the way each of us worked. Secure by default, design and deployment became the mantra.
What is the future for Microsoft security? How will we ensure that we continue to lead the way in eradicating vulnerabilities whilst maintaining ease of use and functionality that excites our customers? What new threats lie around the corner? What can we expect from security in "Windows 7"?
About the speaker
Stephen Lamb is passionate about helping people to make the most of technology to improve the quality of their lives. He has been specialised in information security technologies focussing on doing more with less risk. Stephen has worked for Microsoft in the UK for the last six years as a technical security advisor. He is particularly interested in helping business transform both their cultures and adoption of technology to reduce their impact on the environment and enable flexible working practises.
Stephen writes most days on his blog which is located at http://blogs.technet.com/steve_lamb where he shares ideas, raises the profile of other people's thoughts and actively listens for feedback.
Stephen enjoys observing the social aspects of the way people use technology and works with others to encourage IT Professionals, Developers and software Architects to innovate solutions that are effective for everyday folk.
Outside work Stephen is a keen Climber, Diver, Snowboarder, Windsurfer, Freestyle Kayaker, Skateboarder and is into most things that go fast and/or involve water!
Time
Doors open at 18:30 for refreshments. Talk starts at 19:00.
The Three Ghosts of Microsoft Security
Filed in
- Organiser
- BCS Edinburgh Branch
- Date
- Wed, 8 Oct 2008, 19:00 - 21:00 (Add to calendar) GMT
- Venue
- The Royal Scots Club , Edinburgh, GB
- Cost
- FREE
You might also like...
Other nearby events
Map
Security forum discussion
-
Best security system for laptop
by maha.k47825 (0 replies)
-
Alternate browsers for Win 7?
by aadeshpandey156 (0 replies)
-
How my advanced boot priority suddencly changed in bios
by rohitsingh751111 (0 replies)
-
I need some advice
by singletonamos50 (14 replies)
-
Ada Banyak Jackpot Ceme Online yang Memberikan Keuntungan
by shielaariel888 (0 replies)
Security tutorials
- What You Need to Know about PCI Compliance and Web Application Security Policy Changes
- Effective Controls for Attaining Continuous Application Security Throughout the Web Application Development Life Cycle
- Top 10 Application Security Vulnerabilities in Web.config Files - Part Two
- Testing for Security in the Age of Ajax Programming
Security podcasts
-
IBM developerWorks: TWOdW: Save data energy and pull down old silos
Published 8 years ago, running time 0h2m
Last month, we highlighted a demo on how to integrate reverse-proxy WebSEAL (found in the IBM Security Access Manager solution) with the SAP NetWeaver Application Server ABAP. Now developerWorks has provided a wrapper of resources around the video to help you identify opportunities to learn more
Comments