This paper covers the recommended and alternate breakout sessions that contain valuable information that you can use to exploit the current and upcoming security infrastructure in the Windows NT® operating system. This paper contains a brief overview of Microsoft's security strategy, followed by day-by-day descriptions of the breakout sessions that you will want to attend.