Home | Security/Virus | Travel | East bay Cameras | CA Highway Cameras | Tesla | Medical | Links | Calendar | Spanish | Download | Entertainment |
Kenmark International
KENMARK.US
Sample of past Conferences & Speaking Engagements
Sessions by Kenmark International:
Technical Presentations
Hearing aid technology |
Cruise Control and Full Self Driving (FSD) |
Cyber Security - Call Kenmark to schedule |
Start up Cop - check what is starting and disable what you don't need |
GoodSync |
RoboForm |
Asus vs Dell vs Macbook |
Avanquest Fix-It utility |
Avanquest - Fix-It |
What is running - Autostart |
Allway Sync |
Snapfish |
Travel and Health |
Microsoft Security Essentials Presentation |
Gadgets and Allway Sync |
IncrediMail |
Android Presentation |
Android Apps |
Revo Uninstaller |
PCMatic Virus presentation |
Complete guide to Microsoft Shortcuts |
Microsoft Shortcuts Presentation |
Process Explorer |
Smart Phones - Samsung vs IPhones |
Kenmark.US |
Portable Apps - Add to your USB drive |
Cyber Security |
Electricity Basics |
BlueTooth |
Ring Security Cameras |
Basic Electricity |
Effective Presentations |
Resume Writing |
Interview Skills |
Android |
Androis emulation under Windows |
Android Vs Iphones |
Gear VR - Virtual Reality |
Past Conferences:
Why do hackers make our life so miserable? Isn’t it bad enough that we need to keep those servers up and running without having to worry about hackers? To maintain a farm of servers running, with constant new demands from users and management having impossible deadlines is very demanding.
Knut Ojermark of Kenmark will help you understand the most common hacking exposures how to reduce the risk of these exposures. He will show you some of the penetration tools used by hackers and how you can use some of these same tools to detect and safeguard your own systems for vulnerabilities.
Knut quotes: “Many of the exposures are due to lack of simple controls creating an easy target for inside and outside people.”
In this session Knut will cover:
1. Single session (1 hr. 15 min.)
2. Level: Intermediate to Advanced
3. Audience: Admin. Management Technical Audit
How to survive an Windows Server audit
Windows Server is a complicated operating system with many security features. Out of the box, Windows Server installs without any security features turned on, leaving the operating system vulnerable to attacks from hackers and from employees within the company.
In this session Knut Ojermark of Kenmark International will guide you through how to survive a Windows Server audit. He will cover:
1. Single session (1 hr. 15 min.)
2. Level: Basic to Intermediate
3. Audience: Admin. Management Technical Audit
The Windows operating system environment is very complex and the default installation is not secured from unauthorized access. The numerous security settings are hard to find and hard to test for proper settings, leaving the system open for abuse by hackers and internal employees. Further more IT personnel are overworked by user requests and windows updates, leaving little time to help the auditors to audit the syste
Auditor needs to be sensitive to their clients’ workload and use tools and techniques to discover security flaws and to minimize the impact on day-to-day operation.
In this double session Knut Ojermark of Kenmark International will guide you through how hackers and other threats can affect the system. He will provide audit tips, techniques and give demo of tools to help you with finding security exposure and minimize the impact on audit clients. He will cover:
u Understanding The Threats
u Detection and Hacker tools demos
u How to use tools minimize security exposures
u Security Policies and Templates
u User Rights
u Security Options
u Take you on a tour of the best website
u Summary
1. Double (2hr. 30 min)
2. Level: Intermediate
3. Audience: Technical, Audit
The Windows operating system environment is very complex and the default installation is not secured from unauthorized access. The numerous security settings are hard to find and hard to test for proper settings, leaving the system open for abuse by hackers and internal employees. Further more IT personnel are overworked by user requests and windows updates, leaving little time to help the auditors to audit the systems.
Auditor needs to be sensitive to their clients’ workload and use tools and techniques to discover security flaws and to minimize the impact on day-to-day operation.
In this session Knut Ojermark of Kenmark International will guide you through how hackers and other threats can affect the system. He will provide audit tips, techniques and tools to help you with finding security exposure and minimize the impact on audit clients. He will cover:
u Understanding The Threats
u Detection and Hacker tools
u How to use tools minimize security exposures
u Security Policies and Templates
u User Rights
u Security Options
u Take you on a tour of the best website
u Summary
How to survive an Windows Server audit
Windows Server is a complicated operating system with many security features. Out of the box, Windows Server installs without any security features turned on, leaving the operating system vulnerable to attacks from hackers and from employees within the company.
In this session Knut Ojermark of Kenmark International will guide you through how to survive a Windows Server audit. He will cover:
Schedule for Windows Sessions:
Hacking Exposures in Windows
Why do hackers make our life so miserable? Isn’t it bad enough that we need to keep those NT servers up and running without having to worry about hackers? To maintain a farm of NT servers running, with constant new demands from users and management having impossible deadlines is very demanding.
Knut Ojermark of Secure 20 will help you understand the most common NT hacking exposures how to reduce the risk of these exposures. He will show you some of the penetration tools used by hackers and how you can use some of these same tools to detect and safeguard your own systems for vulnerabilities.
Knut quotes: “Many of the exposures are due to lack of simple controls creating an easy target for inside and outside people.”
In this session will cover:
DECEMBER Server PROGRAM RECAP
by Dave Gandrud
AFTERNOON SEMINAR
Knut Ojermark, consultant, author of many computer related articles, and IT Audit Manager at American President Lines, provided insightful commentary and advice regarding the Y2k problem. Workshop attendees were duly impressed with the importance of effectively dealing with the problem before the clock strikes 12:01 a.m., January 1, Server.
Programmers created the Y2k problem many years ago when they decided to identify years using just two digits rather than four. Data-reliant organizations must now consider the consequences of such programming myopia. In the U. S. alone, the Year Server problem will cost over $100 billion to correct - - worldwide such efforts may cost $600 billion.
If your organization relies on databases, imbedded dates, and date calculations, then it',s time to seriously examine your vulnerability to the Year Server problem. Seventy-five percent of businesses are unable to function beyond 14 days without computer support. Of those businesses that experience a disaster without recovery support, 43 percent never reopen and 29 percent close within two years. Of those businesses that have recovery support, only 50 percent have a recovery plan - - 95 percent of them have never tested their plan.
Where are we? Only 20 percent of all companies are addressing the Y2k date change problem. Texaco has estimated that 65 percent of its applications are impacted; Northern Telecom has found that all of its systems will be impacted; and Midwest Bank plans to spend an estimated 22,000 staff hours to deal with the problem. Date critical applications pertain most often to loans, bills, payroll systems, forecasts, insurance, transportation, and personnel systems.
Knut outlined a 10-step plan to the Y2k conversion:
As auditors, we need to become educated on Year Server issues. We should then generate management awareness, educate top management, involve all audit entities, assist in tool/resource identification, conduct initial scope/impact assessments, obtain vendor compliance certifications, assess budgetary requirements, evaluate the change management process, monitor project status, and provide a communication conduit to senior management and the Board of Directors.
Remember, if your organization is vulnerable, you have less than 2 years to do something about it!
DINNER 2001 PROGRAM
Knut Ojermark also presented our dinner program, discussing the mechanics of how to automate the audit department. Knut has developed and marketed KAAS (Kenmark's Automated Audit System), an advanced, Windows-based audit system. KAAS keeps track of your audit schedule; helps you complete audits on time; tracks how auditors spend their time; identifies risks in each audit area; matches the auditor's skills to the audit requirements; keeps track of audit findings, work papers, and audit reports; and calculates the number of auditors needed to do the audit. The program is fully integrated with your favorite word processing, spreadsheet, chart and database programs.