Main Menu

Search Our Site


Join us on Facebook

Meeting Schedule

Written by admin
Monday, 17 March 2014 15:00
San Francisco, CA
Microsoft Office
835 Market Street, Suite 700
San Francisco, CA 94103
Tuesday April 1, 2014 @ 6:30pm RSVP
Los Angeles, CA
See meetup site for meeting location
Dates and times on MeetUp site RSVP at the MeetUp website
Sacramento, CA – PowerShell UG
See meetup site for meeting location
Dates and times on MeetUp site RSVP at the MeetUp website
Help us start meeting locations at: info@pacitpros.org

April 1st, 2014 – Secunia – 3rd Party Patching w/ System Center & Sami Laiho- Proactive Security in Windows environments

Written by Ed Horley
Monday, 17 March 2014 22:15

Meeting Date and Time: April 1st, 2014 – 6:30pm

Sponsor Topic: How to Hit a Moving Target – Vulnerability Intelligence for 3rd Party Patching
Do you know what software applications need updating in your system today?  Once you identify, how are you creating and deploying these patches in your system? With nearly 76% of vulnerabilities coming exclusively from 3rd party software applications, it’s more important than ever to patch everything in your environment.

In this session we will go through how vulnerability intelligence can help you prioritize what patches are most important for your environment based on your security risks.  Plus, we will demo how you can create and deploy third party patches through Microsoft’s System Center Configuration Center 2012.

Founded in 2002, Secunia is the leading provider of IT security solutions that help businesses and private individuals globally manage and control vulnerability threats, risks across their networks, and end-points. This is enabled by Secunia’s award-winning Vulnerability Intelligence, Vulnerability Assessment, and Patch Management solutions that ensure optimal and cost-effective protection of critical information assets.

Sponsor Presenter Bio: Meaghan McKeown, Director, Business Development, Secunia
Meaghan has been with Secunia since 2009, currently managing Enterprise accounts and business development.  She started at the Secunia headquarters in Copenhagen, Denmark, and moved to Minneapolis, MN in January 2013 to help launch the first North American office.  Prior to Secunia, Meaghan conducted project management and sales within the media industry.  She graduating from American University in Washington DC with a Bachelors in BA – Economics of Developing Countries, and recently completed an Executive MBA at Copenhagen’s AVT Business school.

Technical Presenter Topic: Proactive Security in Windows environments
Did you see the news about the latest zero-day attack using RTF-files? Yet again an example where no harm is done if you have your proactive security measures in place. In fact all biggest zero-attacks in the last decade have been of such nature that even without an anti-malware solution you could have avoided the worst consequences if you just had you proactive security done right. If a user has admin rights he/she can turn of the protective measures so this is the most important thing to do right and get rid of the excessive user permission. You can control admins with policies can’t you? No, you cannot, and in this session you’ll see how admins can turn of all policies in a heartbeat. After you’ve done with getting rid of admin rights you need to implement stuff like firewalls, IPsec, Software Resctriction policies and disk encryption. And Yes you also need a reactive solution like an anti-malware on top the more important proactive measures. Reactive security reacts to found threats as proactive prevents you from getting them in the first place. Join this session and see one of the leading OS and Security Experts Sami Laiho show you how to build a proactive security solution that’s always up to date and not relying on someone else finding fingerprints and keeping your security up to date!

Technical Presenter Bio: Sami LaihoDSC_7303Sami Laiho is one of the world’s leading professionals in the Windows OS. He has been working with and teaching OS troubleshooting, management and security for more than 15 years. Sami’s session was evaluated as the best session and Sami as the best speaker in TechEd Australia 2013. Sami’s session in TechEd Europe 2013 was evaluated as the best session by an external speaker. Sami is a Microsoft MVP in Windows Expert-ITPro category and frequent public speaker at major technical conferences around the world.

Giveaway: Regular items – Update! Secunia will be doing a drawing for a $250 Amazon gift card

REMINDER: RSVP so we know how much pizza to order! Food arrives between 5:30 and 6pm.

We will also have a LiveStream of the meeting. There is no guarantee on how this will work out given we are still learning! The LiveStream event will be up at:
https://new.livestream.com/accounts/4589578/

Location:

Microsoft, San Francisco Office
835 Market Street, Suite 700
San Francisco, CA 94103

Follow us on Twitter, LinkedIn and Facebook!

- Doug, Ed, Jennelle, Eric and Matt

March 4, 2014 – PowerShell UG – Understanding Desired State Configuration

Written by Ed Horley
Thursday, 27 February 2014 19:57

Meeting Date and Time March 4th, 2014 – 6:00pm* – note earlier start time!!

Topic: Understanding Desired State Configuration
Desired State Configuration offers a lifeline to those of us who are forging our way through data centers with racks of snowflake servers, those servers whose configurations are lovingly hand crafted by proud sysadmins.  While we stand proud on those “works of art”, other sysadmins curse our names when troubleshooting applications that behave differently on servers that are intended to be the same.  Those same sysadmins tremble in fear of ever having to re-create those undocumented, intricate environments.  DSC promises to deliver us from this chaos and bring our configurations forward into a well documented, version-able artifact.
DSC has several moving parts that can be daunting at first glance.  Join me in exploring the structure of Desired State Configuration and the in-box and custom resources required to drive it.

Presenters Bio’s: Steven Murawski
Steven is a SysAdmin on the Site Reliability Engineering team for Stack Exchange (operators of great Q&A sites like Server Fault and Stack Overflow)  and a Microsoft MVP in PowerShell.  Steven is a co-host of the Ops All The Things podcast.
Steven also leads two local user groups, the Greater Milwaukee IT Pro User Community and the Greater Milwaukee Script Club. He speaks regularly to local user groups and can be found at various conferences.

Giveaway: Regular items

REMINDER: RSVP so we know how much pizza to order! Food arrives between 5:30 and 6pm.

We will also have a LiveStream of the meeting. There is no guarantee on how this will work out given we are still learning! The LiveStream event will be up at:
https://new.livestream.com/accounts/4589578/

Location:

Microsoft, San Francisco Office
835 Market Street, Suite 700
San Francisco, CA 94103

Follow us on Twitter, LinkedIn and Facebook!

- Doug, Ed, Jennelle and Eric

Special Event – Wednesday February 26 – Pass the Hash (PtH)

Written by Doug Spindler
Tuesday, 18 February 2014 21:59

Pass-the-Hash attack – How Attackers use password hashes to gain unauthorized access and How to Stop Them 

Note location: CCSF Chinatown campus 808 Kearny St, San Francisco, CA 94108  Fourth floor.  (5-10 minute walk from Montgomery BART station.)

Presented by Nathan Ide from Microsoft.
Pass-the-hash transforms the breach of one machine into a total compromise of infrastructure. The publication of attacks and lack of tools to respond have forced enterprises to rely on onerous and ineffective techniques. In this talk, we will decompose the PtH threat, show how the attack is performed and how it can be addressed using new platform technologies in Windows 8.1.

Nathan Ide is a Principal Development Lead in the Windows Security group at Microsoft. Ide has worked on various security technologies such as platform integrity, trustworthy computing and network security in Windows for 11 years. He led the team that implemented the Windows 8.1 pass-the-hash response and is responsible for the development of authentication-related technologies such as Kerberos and OAuth in Windows. He is a holder of several U.S. patents in the security technology space.