Introduction to Network ProtectionProtect Your Windows Network from Perimeter to Data Click here
About the Authors:
Steve Riley is a Senior Program Manager in Microsoft's Security Business and Technology Unit in Redmond, Washington. Steve specializes in network and host security, communication protocols, network design, and information security policies and process. His customers include various ISPs and ASPs around the United States, as well as traditional enterprise IT customers, for whom he has conducted security assessments and risk analyses, deployed technologies for prevention and detection, and designed highly available network architectures. Steve is a frequent and popular speaker at conferences worldwide, often appearing in Asia one week and Europe the next. When not evangelizing the benefits of Microsoft security technology, he spends time with customers to better understand the security pain they face and show how some of that pain can be eliminated.
Jesper Johansson is Program Manager for Security Policy at Microsoft. In this position, Jesper is responsible for the tools customers use to implement security policies, such as the Security Configuration Wizard, Security Configuration Editor, and related tools. He has delivered speeches on network security all over the world and is a frequent speaker at conferences and workshops, particularly in places that lend themselves to great diving. He has a Ph.D. in Management Information Systems and is a Certified Information Systems Security Professional (CISSP) and a certified Information Systems Security Architecture Professional (ISSAP).
Dig Deeper on Working With Servers and Desktops