This article is contributed. See the original author and article here.
Upcoming Public Community Webinars:
Asterisk (*) indicates updates to the deck.
Date & Time in PST | Topic | Registration |
2020-21 Winter Series (08:00-09:00 AM PST time) | ||
Feb 3, 2021 | Azure Confidential Computing: Confidential computing nodes on Azure Kubernetes Service | Link |
Feb 4, 2021 | Azure Sentinel: Accelerate Your Azure Sentinel Deployment with the All-in-One Accelerator | |
Feb 16, 2021 | The Billion-Dollar Central Bank Heist | |
Feb 18, 2021 | Azure Sentinel: Best practices for converting detection rules from Splunk, QRadar, and ArcSight to Azure Sentinel rules | |
Feb 23, 2021 | Azure Security Center: Best Practices for Improving Your Secure Score | |
Mar 9, 2021 | Azure Security Center: Azure Defender for Storage | |
Mar 18, 2021 | Azure Sentinel: Data Collection Scenarios | |
March 24, 2021 | Who wants a thousand free puppies? Managing open source software security in the enterprise |
Recordings of Past Webinars:
Asterisk (*) indicates updates to the file.
Date | Topic | Recording | Deck | |
AZURE ADVANCED THREAT PROTECTION | ||||
Sep 24, 2019 | Identity Security Posture assessments | |||
Sep 16, 2019 | Deployment and Configuration | |||
Jul. 15, 2019 | Detections part 2 of 2 | |||
Jun. 24, 2019 | Unified SecOps Portal | |||
Apr 29, 2019 | Detections part 1 of 2 | |||
AZURE INFORMATION PROTECTION | ||||
Jun 2, 2020 | MIP and Power BI integration | |||
May 23, 2019 | Unified Labeling in AIP | |||
Apr 18, 2019 | MIP SDK | How to leverage the SDK | |||
Apr 11, 2019 | Monitoring | Visibility into who is accessing data | N/A | ||
Apr 4, 2019 | Protection | Protect data at rest and in motion | |||
Mar 28, 2019 | Classification | Label taxonomy and recommendations | |||
Mar 21, 2019 | Discovery | Discover data at rest | |||
Mar 14, 2019 | Introduction | AIP basics and latest announcements | |||
AZURE NETWORK SECURITY | ||||
Dec 10, 2020 | Azure Network Security Advanced Architecture | |||
Dec 8, 2020 | Azure Network Security for SOCs | |||
Dec 3, 2020 | Getting started with Azure Firewall Manager | |||
Dec 1, 2020 | Manage application and network connectivity with Azure Firewall | |||
Nov 12, 2020 | Boosting your Azure Web Application (WAF) deployment | |||
Nov 10, 2020 | Getting started with Azure Distributed Denial of Service (DDoS) Protection | |||
Oct 27, 2020 | Protecting your web apps with Azure Web Application Firewall (WAF) | |||
Oct 15, 2020 | Introduction to Azure Network Security | |||
Nov 14, 2019 | Introduction to WAF | |||
Nov 12, 2019 | DDoS Protection | |||
AZURE SECURITY CENTER | ||||
Jan 7, 2021 | Azure service layers protection | Deck | ||
Dec 7, 2020 | Investigating Azure Security Center alerts using Azure Sentinel | Deck | ||
Nov 30, 2020 | Azure Defender for SQL Anywhere | Deck | ||
Nov 9, 2020 | Ignite 2020 Announcements | Deck | ||
Nov 2, 2020 | Enhance IoT Security & Visibility with Azure Defender and Azure Sentinel | Deck | ||
Oct 28, 2020 | Multi Cloud support in ASC | Deck | ||
Oct 26, 2020 | VM Protection | |||
Mar 11, 2020 | Security Benchmark Policy | |||
Feb 20, 2020 | Secure Score enhanced model | |||
Sep 10, 2019 | Secure Score | |||
AZURE DEFENDER for IoT | ||||
Jan 20, 2021 | Leveraging OT Behavioral Analytics and Zero Trust for OT Cyber Resilience | |||
Sep 17, 2020 | MITRE ATT&CK for ICS: CyberX Demo and Azure IoT/OT Security Deep Dive | |||
Nov 19, 2019 | End-to-End security for IoT | |||
Aug 05, 2019 | Basics and latest announcements on ASC for IoT | |||
AZURE SENTINEL | ||||
Jan 21, 2021 | Auditing and monitoring your Azure Sentinel workspace | Deck | ||
Jan 19, 2021 | Azure Notebooks Fundamentals – How to get started | |||
Jan 12, 2021 | Machine Learning detections in the AI-infused Azure Sentinel SIEM | |||
Sep 30, 2020 | Unleash your Azure Sentinel automation Jedi tricks and build Logic Apps Playbooks like a Boss | |||
Sep 29, 2020 | Enabling User and Entity Behavior Analytics (UEBA) | Hunting for Insider Threats | |||
Sep 14, 2020 | Empowering the Azure Sentinel Community with Pre-Recorded Datasets for research and training purposes | |||
Sep 09, 2020 | KQL part 3 of 3 – Optimizing Azure Sentinel KQL queries performance | |||
Sep 02, 2020 | Log Forwarder deep dive | Filtering CEF and Syslog events | |||
Aug 19, 2020 | Threat intelligence automation with RiskIQ | |||
Aug 12, 2020 | Threat hunting and reduce dwell times with Azure Sentinel | |||
Jul 28, 2020 | KQL part 2 of 3: KQL hands-on lab exercises | |||
Jul 9, 2020 | Workbooks deep dive – Visualize your security threats and hunts | |||
Jun 23, 2020 | Multi-tenant investigations | |||
Jun 15, 2020 | Deploying and Managing Azure Sentinel as Code | |||
Jun 2, 2020 | KQL part 1 of 3: Learn the KQL you need for Azure Sentinel | |||
May 13, 2020 | Using Sigma to accelerate your SIEM transformation to Azure Sentinel | |||
Apr 22, 2020 | Threat Hunting on AWS using Sentinel | |||
Apr 20, 2020 | MSSP and Distributed Organization Support | |||
Mar 31, 2020 | Extending and Integrating Sentinel (APIs) | |||
Mar 18, 2020 | Deep Dive on Threat Intelligence | |||
Mar 4, 2020 | Recap of RSA 2020 | |||
Feb 19, 2020 | Tackling Identity | |||
Feb 12, 2020 | Deep Dive on Correlation Rules | |||
Jan 29, 2020 | Threat Hunting – revisited | |||
Jan 22, 2020 | End-to-End SOC scenario | |||
Nov 20, 2019 | Cloud & on-prem architecture | |||
Nov 13, 2019 | Post-Ignite. Understanding Azure Sentinel features and functionality deep dive | |||
Sep 18, 2019 | Threat Hunting | |||
AZURE PURVIEW | ||||
Jan 27, 2021 | Introduction to Azure Purview | TBA | TBA | TBA |
MICROSOFT CLOUD APP SECURITY | ||||
Apr 15, 2020 | Enabling Secure Remote Work | |||
Oct 07, 2019 | Extending real-time monitoring & controls to any app | |||
July 2, 2019 | App Discovery and Log Collector Configuration | |||
Apr 16, 2019 | Automation and integration with Microsoft Flow | |||
Apr 9, 2019 | Connecting 3rd party Applications | |||
Mar 26, 2019 | Conditional Access App Control | |||
Mar 19, 2019 | Threat detection | |||
Mar 12, 2019 | Information Protection | |||
MICROSOFT DEFENDER FOR ENDPOINT | ||||
Sep 16, 2020 | Get started with Microsoft Defender ATP: from zero to hero | |||
Jul 7, 2020 | Deploy MDATP capabilities using a phased roadmap | |||
Apr 2, 2020 | End-to-end security for your endpoints | |||
MICROSOFT 365 DEFENDER | ||||
Jan 28, 2021 | Protect, Detect, and Respond to Solorigate using Microsoft 365 Defender | |||
Nov 17, 2020 | l33tSpeak | Advanced hunting in Microsoft 365 Defender | Demo | ||
Aug 5, 2020 | Advanced Hunting series – Episode 4: Let’s hunt! Applying KQL to incident tracking | Demo | ||
Jul 29, 2020 | Advanced Hunting series – Episode 3: Summarizing, Pivoting, and Visualizing Data | Demo | ||
Jul 22, 2020 | Advanced Hunting series – Tracking the Adversary Episode 2: Joins | Demo | ||
Jul 15, 2020 | Advanced Hunting series – Tracking the Adversary Episode 1: KQL Fundamentals | Demo | ||
MICROSOFT MISC SECURITY WEBINARS | ||||
Microsoft x Secure 2020 event – October 20-23, 2020 | ||||
Oct 20 | Keynote 1 with Ann Johnson |
|
| |
Keynote 2 with Alex Weinert |
|
| ||
Oct 21 | Keynote with Mark Simos |
| ||
Zero Trust for Devices with Clay Taylor |
|
| ||
Oct 22 | Zero Trust for Data with Marc Meunier |
|
| |
Zero Trust for Apps with Alex Esibov |
|
| ||
Zero Trust for Identity with Sarah Handler |
|
| ||
Oct 23 | Zero Trust for Infrastructure & Network with Sinead O’Donovan |
|
| |
Microsoft’s Zero Trust Implementation with Mark Skorupa |
|
| ||
| ||||
Dec 9, 2020 | Microsoft Digital Defense Report | |||
Oct 29, 2020 | Cybersecurity Basics: Securing Yourself |
Brought to you by Dr. Ware, Microsoft Office 365 Silver Partner, Charleston SC.
Recent Comments