Dr. Erdal Ozkaya
Search
  • Home
  • Announcemets, Erdal in the news
  • KEMP Microsoft Experts speaking at Teched 2014

KEMP Microsoft Experts speaking at Teched 2014

KEMP Microsoft Experts Erdal Ozkaya
Erdal2021-07-14T19:01:56-04:00

KEMP Microsoft Experts Speakers at Teched and their sessions

Table of Contents

  • KEMP Microsoft Experts Speakers at Teched and their sessions
  • WIN-B310 TWC: Bulletproofing Your Network Security
  • PCIT-B319 TWC: Social Engineering: Manipulations, Targeted Attacks, and IT Security
  • WIN-B351 Hacker Tools for Ethical Hackers to Protect Windows Clients
  • OFC-B329 Make Role Based Access Control (RBAC) Work for You
  • OFC-B271 Integrating Microsoft Exchange Server 2013 with Lync and SharePoint
  • SPEAKER BIOS

WIN-B310 TWC: Bulletproofing Your Network Security

Monday, May 12 1:15 PM – 2:30 PMSpeaker(s): Erdal Ozkaya, Milad Aslaner Track: Windows, Phone and DevicesSession Type: BreakoutTopic: Security, Trustworthy ComputingLearn to halt hackers in their tracks. This session demonstrates the best tools and techniques to harden your devices—from your laptop, to your cell phone, to your servers and your services.

Gain key insights that, for years, have been reserved only for the top IT staff of the NSA and others in the Federal government. Learn how you can make your network secure and stay one step ahead of the next wave of malware, malicious insiders, and cyber criminals. Still not convinced? What you learn in this session will change your way of thinking, and be your first step toward building a highly secure network. At the end of the presentation, you will rush to double check your “systems” security.

PCIT-B319 TWC: Social Engineering: Manipulations, Targeted Attacks, and IT Security

Tuesday, May 13 5:00 PM – 6:15 PMSpeaker(s): Erdal Ozkaya, Milad Aslaner Track: People-centric ITSession Type: BreakoutTopic: Security, Trustworthy ComputingToday we are able to see a clear shift in how enterprises are targeted by malware engineers. The attack landscape has adapted to the new world and they now perform targeted attacks, especially over the social networks. Because guess what? The CEO, CTO, or even the girl next door has a social network account. Join this session and explore how social engineering has grown over time and examine lessons learned from the field on how to best mitigate those traps.

WIN-B351 Hacker Tools for Ethical Hackers to Protect Windows Clients

Wednesday, May 14 10:15 AM – 11:30 AMSpeaker(s): Erdal Ozkaya, Raymond Comvalius Track: Windows, Phone and DevicesSession Type: BreakoutTopic: Windows Operating SystemIf you want to really protect your Windows environment then you should know what is used by the cyber criminals. This session shows you the hacking tools of today, the damage they can inflict, and how you can be aware of those tools before they hit your network. Also, learn how Windows Clients are ready to mitigate some of these attacks, and how you can utilize your security skills.

OFC-B329 Make Role Based Access Control (RBAC) Work for You

Thursday, May 15 8:30 AM – 9:45 AMSpeaker(s): Bhargav ShuklaTrack: Office Servers and ServicesSession Type: BreakoutTopic: Microsoft ExchangeRole Based Access Control (RBAC) was introduced with Microsoft Exchange Server 2010. Other Microsoft products such as Lync Server use the powerful RBAC framework as well. In this session, learn from an RBAC expert’s own real-world implementation of RBAC in an Exchange environment, as well as experiences he gained from discussions while teaching MCM candidates for both the Exchange and Lync MCM programs. Let the real-world experiences help you learn how to make RBAC work for you in your Exchange and Lync deployments.

OFC-B271 Integrating Microsoft Exchange Server 2013 with Lync and SharePoint

Thursday, May 15 1:00 PM – 2:15 PMSpeaker(s): Bhargav ShuklaTrack: Office Servers and ServicesSession Type: BreakoutTopic: Microsoft Exchange, Microsoft Lync, Microsoft SharePointWhile each of the three products provide great experience and functionality by itself, when you combine the power of them working together, it becomes a great productivity booster and an amazing user experience. The Microsoft Office 2013 family of products brings integration features that make products work harder for you. We talk about integration of Microsoft Lync Server 2013 and Microsoft SharePoint 2013 with Exchange Server 2013 and the benefits it brings to both organizations investing in these products and end users who can get the most out of it.

SPEAKER BIOS

Erdal Ozkaya Kemp Technologies Regional Director

Erdal Ozkaya, Bachelor of Science in Information Technology (B.I.T.), MVP, Microsoft Certified Trainer, ISO27001 Consultant, Certified Ethical Hacker (CEH), Certified Ethical Instructor, is an educator at Charles Sturt University. Erdal is also completing his Doctor of Philosophy (Ph.D.) in IT security and working for KEMP Technologies as Regional Director. His specialties include Windows Server and clients, security, virtualization, system management, and load balancers. He is a speaker, proctor for hands-on labs, and technical expert in worldwide conferences such as TechEd, Hacker Halted, Microsoft Management Summit, trade shows and in webcasts for Microsoft and EC-Council. Erdal has also developed and consulted on Microsoft Official Exams and Courses. You can visit his blog for more information www.erdalozkaya.com

Bhargav Shukla KEMP Technologies Director – Product Research and InnovationAn Exchange guy to the core, Bhargav Shukla grew up with Microsoft technologies and became an expert in a few (Exchange and Lync topping the list). Over his 16-year career, he has gained broad experience with a multitude of technologies and worked with a range of small/medium and enterprise clients to achieve their vision and path to success. Bhargav works at KEMP Technologies as Director of Product Research and Innovation and provides insight to make KEMP ADCs even more awesome. Bhargav was recently awarded MVP for Microsoft Exchange by Microsoft and also holds Exchange/Lync MCM and Exchange MCSM certifications.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *


Related Posts

MCT Weekly – Detailed News 2015

MCT Weekly  Security in the EnterpriseIn this course, experts Simon May and Erdal Ozkaya take you through social media platforms to... read more
Erdal Ozkaya in the News

Cyber security course for non-ICT students – Great opportunity in 2019

Cyber security course for non-ICT students Australian corporate ICT and cybersecurity training provider DDLS has introduced a course in cyber security... read more
Hiring

Come and join my Team at SCB -Great Opportunity 2019

Come and join my Team at SCB To Apply Via LinkedIn : The Role Responsibilities ICS 1st Line Risk Manager, AME will execute a... read more
Middle East Cybersecurity Forum Erdal Ozkaya

Middle East Cybersecurity Forum 2021 Join for Free

Speaking at Middle East Cybersecurity Forum Crritical infrastructure assets, systems, and networks, whether physical or virtual which are considered so vital... read more
ISC CBK Suggested References

CBK Suggested References – Great resources suggested by (ISC)²

CBK Suggested References Did you know that our book, Cybersecurity Attack and Defense Strategies is listed in one of the World’s Most Prestigious... read more

Cybersecurity Roadshow Algeria

Cybersecurity Roadshow Algeria This week I spend my time explaining our Oil & Gas customers the importance of Cybersecurity and how... read more
Inside The Dark Web Dr Ozkaya

New Book Inside the Dark Web

New Book Inside the Dark Web I am proud to announce my new book which I authored with support of... read more
Windows 7 RC Stress Testing Begins

Information Week Magazine: Windows 7 RC Stress Testing Begins

Information Week Magazine: Windows 7 RC Stress Testing Begins Microsoft hopes to double the number of free tests during the Release... read more
Logical Operations Erdal Ozkaya

Logical Operations Certifications Industry Contributor 0

Logical Operations / Communispond Earners of the Logical Operations Certifications: Industry Contributor badge have served as Subject Matter Experts and/or Scheme... read more

Heartbleed clinic seeks to staunch flow ( Free Training 14)

Heartbleed clinic seeks to staunch flow Over 6 000 students have enrolled in a Hacking Countermeasures short course to be run... read more

Categories

  • About Dr Erdal Ozkaya (300)
    • Awards (97)
    • Erdal in the news (121)
    • Feedback (88)
    • My Books (53)
    • Who is Dr Erdal Ozkaya ? (2)
  • Announcemets (305)
  • Artificial Intelligence AI (11)
  • Certification (52)
  • Cloud Computing (73)
  • Cybersecurity (325)
  • Cybersecurity Leadership (58)
  • Digital Transformation (2)
  • Financial Sector (31)
  • Forensics (17)
  • Free Events (166)
  • General (138)
  • How to …? (61)
  • ISO 2700x (12)
  • News (38)
  • Reviews (77)
    • Book Reviews (32)
    • Free E-Books (14)
    • Hardware Review (9)
    • Security Review / Reports (10)
    • Software Review (8)
  • Siber Güvenlik (17)
  • Video Tutorials (101)
  • What is new? (27)
  • Windows (30)

Recent Comments

  • Sabri Kızmaz on Finans Sektörü Odaklı Siber Tatbikat
  • celal bayar on Finans Sektörü Odaklı Siber Tatbikat
  • Erdal on Free EDR Certification Training
  • SANDEEP SHRIVASTAV on Free EDR Certification Training
  • Alicia Harlow on Core isolation Memory Integrity not available – (Get it fixed)

Archives

Dr. Erdal Ozkaya © Copyright 2023. All Rights Reserved.