TechNet Webcast: 2008 Defense in Depth Security Series (Part 2 of 8): All Bark and No Bite (Level 200)
IT Implem_IT Generalist.
In our second session, we take a look at what is considered to be the most important aspect of information security: security policies. We discuss the policies that exist within your company and how to strengthen
them. After all, what good is a policy if it is not enforceable? We also investigate the most cost-effective way for you to increase the security posture of your business. What is it? You have to tune in to see! You will not be disappointed.
Presenter: Kai Axford, Senior Security Strategist, Microsoft Corporation
Kai Axford (CISSP, MCSE-Security) is a senior security strategist in the Trustworthy Computing Group.
Kai is responsible for discussing and recommending security solutions for both private and public sector organizations worldwide. In addition, he conducts chief security officer councils worldwide, taking executive feedback and affecting change within Microsoft
security products and processes.
Kai started with Microsoft in 1999 as a server support engineer before moving on to become an IT professional evangelist, focusing on his peers through the Microsoft TechNet Events program. Kai has delivered more than 200 security presentations on a variety
of topics, including digital forensics, security management, and incident response. He is a frequent speaker at security conferences, executive meetings, and business seminars around the world
Kai is currently pursuing an MBA in information assurance and is a member of the Information Systems Security Association (ISSA), InfraGard, and the North Texas Electronic Crimes Task Force. He was the recipient of the 2006 Rising Star award from the Information
Security Executive council.
Prior to Microsoft, Kai served as a leader in several real-world operations with the U.S. Army's elite 75th Ranger Regiment. Originally from Wisconsin, Kai is a Green Bay Packers fan now based in Dallas, Texas with his lovely wife and yellow Labrador.
Choose how you want to access this content:
- View the webcast online (slides, demonstrations, and audio): Register above.
- Download the webcast (slides, demonstrations, and audio): Register above.
- Download the webcast PowerPoint: Register above.
- Download the podcast (audio only):
MP3 (right click and ‘save target as’ to download)
- Subscribe to the RSS feed for the podcast series:
View other sessions from:
Ask the Security Experts: Understand the Latest in Digital Security.
If you have questions or feedback,