Date: Tuesday, July 17, 2018
Time: 02:00 PM Eastern Daylight Time
Duration: 1 hour
Most vulnerabilities that organizations have to deal with are related to a specific product or operating system. Occasionally, however, vulnerabilities are disclosed in hardware that is used in almost every business, as is the case with CPU vulnerabilities such as Spectre and Meltdown.
In this session, we'll discuss:
- how speculative execution and side channel methods work
- what impact they may have on your IT environment
- steps that you can take to mitigate the vulnerabilities
If you have already registered, click here to access
Orin Thomas is an MVP, an MCT and has a string of Microsoft MCSE and MCITP certifications. He has written more than 30 books for Microsoft Press on topics including Windows Server, Windows Client, System Center, Exchange Server, Security, and SQL Server. He is an author at PluralSight and is a contributing editor at Windows IT Pro magazine. He has been working in IT since the early 1990's and regularly speaks at conferences in Australia and around the world. Orin founded and runs the Melbourne System Center, Security, and Infrastructure
Jeff Melnick is a manager of System Engineering at Netwrix. He has over 15 years of experience in the IT field performing Active Directory Migrations, Integrations and Installations for various businesses. Jeff now helps organizations strengthen IT security, streamline compliance and optimize operations.