Making Sense of Microsoft's Security Solutions
A Guided Learning Lab Series
Microsoft offers an unmatched catalog of world-class security solutions to protect your business. The problem? The options are overwhelming and (let's be honest) licensing is complex. Which security mix is right for you? Join any or all of the learning lab sessions in this series to make your road to an optimal security environment clear.
Introduction to Microsoft's Security Solutions
Thursday, March 4 @ 4PM
What you will learn about:
- Microsoft's Security Stack
- Zero Trust
- Your own Security Score
Who should attend?
IT, Executive Management, Compliance
An initial dive into Microsoft's security landscape, this webinar gives you a big picture view of Microsoft's solutions covering 4 major areas: identity and access management; threat protection; information protection; and cloud security. We will explain what Zero Trust is and how it is employed holistically across all of Microsoft's framework, as well as how when used in combination, how these solutions provide businesses acute visibility into their overall security posture.
Building Your Security Operations Center
with XDR | Microsoft Defender
Thursday, March 25 @ 4PM
What you will learn about:
- Threat hunting with XDR
- Identifying and managing weaknesses, vulnerabilities, and reducing your attack surface
- Detecting and preventing threats across your environment including across multiple clouds, platforms (Windows, Mac, IOS, Android), and non-Microsoft services and technologies
Who should attend?
IT, Executive Management, IT Professionals, Security Operations, Compliance
This session is a deep dive into what Microsoft Extended Detection and Response (XDR) delivers. We will show how XDR can become the backbone of your Security Operations Center through the leveraging of unmatched and advantageous security insights gathered from the prodigious analysis of 1 trillion-plus user activities. Learn how to identify vulnerabilities and weaknesses and tie them back to industry standards like NIST to evaluate their risk to your environment and create work items to remediate. We will also show you how XDR provides unprecedented functionality in detecting and remediating threats to your environment, such as ransomware.
Protecting and Managing Your Endpoints
Thursday, April 15 @ 4PM
What you will learn about:
- Reducing your ransomware risk
- Establishing and enforcing security baselines across your environment
- Protecting your endpoints
Who should attend?
IT, Executive Management, IT Professionals, Security Operations, Compliance
Protecting your endpoints goes well beyond ensuring you have proper anti-virus in place (although that is part of it). No longer hiding safely behind your corporate firewalls, endpoints are freely out in the world: places like coffee shops, airports, beaches, and people’s homes. In this webinar, we demonstrate how you can manage anti-virus, reduce your attack surface, create security baselines, measure how compliant your environment is, and identify where you are falling short. You will also learn how to manage security tasks resulting from any vulnerabilities and weaknesses with far more efficiency and expediency.
Securing Your Cloud Data
Thursday, May 6 @ 4PM
What you will learn about:
- Discover cloud apps uses
- Apply compliance policies to the cloud
- Investigate risky users, security alerts, and your security posture – all in the cloud
Who should attend?
IT, Executive Management, IT professionals, people in charge of managing your cloud apps
Does the notion of ‘the cloud’ freak you out? Whether your organization subscribes to locking employees completely out of any cloud or playing Russian roulette with absolutely no rules, attending this webinar will provide you with the insight needed for how Microsoft Cloud App Security enables you to securely allow employees to leverage the cloud in a safe and compliant way. Discover the powerful control you can have such as: identifying the cloud services your employees are using, sanctioning cloud services, applying and managing compliance rules (such as encryption) across multiple cloud services, running security assessments, and creating and managing policies. Yes, you may use other organization’s cloud services, but you CAN manage it like it is YOUR cloud.
Protecting Your Corporate Identity
Thursday, May 27 @ 4PM
What you will learn about:
- Conditional access
- Password-less authentication
- Privileged identity management
Who should attend?
IT, Executive Management, IT Professionals, Security Operations, Compliance
One of the most critical keys to security lives in identity – knowing and authorizing who has access to what. 67 percent of breaches involve the theft of credentials. How do we protect our online identities from compromise? In this webinar, we examine the several ways we can protect your organization’s users from hostile threats – including themselves! We will look at how to move toward a password-less authentication (because let’s face it, your users are still writing down their complex passwords and placing them under keyboards).
Learn how to apply intelligent rules regarding where and under what conditions your users can access your environment, including how Microsoft’s intelligent network can protect you against attacks through the identification of ‘impossible travel’ where a user is identified as logging in from two geographies at the same time. (While many of us welcome that super-hero ability, we aren’t quite there yet in breaking the law of physics.) Join us and learn how you can protect your most critical asset, your users’ identities!
Using Azure Sentinel: One Reporting Structure for All Your Devices
Thursday, June 17 @ 4PM
What you will learn about:
- Bringing non-Microsoft security devices in Microsoft XDR
- The power that removing silos brings to your environment through even correlation
- Assess your security posture across your entire environment
Who should attend?
IT, Executive Mangement, IT Professionals, Security Operations, Compliance
Silos of information in a security environment are dangerous. But how can you remove these silos if it means turning over all your security needs to one company? Using Azure Sentinel is the solution to this precarious conundrum. In this webinar, we will examine how you can incorporate security signals from 3rd party security devices into Microsoft Defender XDR. Through streamlining signals into Azure Sentinel and using the powers of machine learning and artificial intelligence it can analyze and correlate events, thereby removing the silos of your information. Learn how this solution truly enables you to have a ‘connect the security dots’ tool, managing a multi-device environment to function as a single intelligent entity.
Gamifying Security: Using Microsoft Security Score
Thursday, July 8 @ 4PM
What you will learn about:
- Your security score and how to improve it
- How to compare yourself to other peers
- Using the score to manage your risks
Who should attend?
IT, Executive Management, IT Professionals, Security Operations, Compliance
Managing security risk correctly means there is a mountain of tasks, vulnerabilities, and configuration settings to change - how do you know where to start? Microsoft’s answer to this tricky situation is the creation of a security score to assist you with the evaluation of your overall security posture. In this session, we will review Microsoft security scores’ assessments, identify what changes will yield the greatest results, and examine how they impact a score.
But wait - what good is a score in a game if you have nothing to compare it to?
We will also show how you compare yourself to your peers, and where you are trending with consideration to parameters such as industry, organization size, regions, and licensing levels.
If increasing your score is not enough to put you at ease, Microsoft also provides simulated attacks including phishing, linked attachments, and more, so that you can test your personal level of readiness. Truly quantify what actions your users are likely to take and educate them in the process with supplied materials. Track how they do and identify your repeat offenders.
Don’t roll the dice, inform your organization of exactly where they are in the game of security risk!
Security Town Hall: An Open Question Forum
Featuring Microsoft Security Blackbelt
Thursday, July 29 @ 4PM
Who should attend?
IT, Executive Management, IT Professionals, Security Operations, Compliance
Whether you attended one, none, or all our security webinars, join us for a completely open forum where you will have the opportunity to ask questions of a panel of security experts, including a Microsoft Security Blackbelt.