Microsoft Ignite in 2016 offered some of the best and deepest sessions about Microsoft in general and security in special - ever. This will only be topped by the upcoming Ignite 2017 starting September 25th.
Of course there is the session catalog available but maybe you want to have a "one slide" list with (Modern Workplace) security relevant sessions?
I did some digging in the catalog, find the resulting list below.
I will update the list with the video links as soon as the recordings are online, but you should take the chance and view your most important session(s) live!
And if I missed an important session - please let me know, I will add it to the list!
Cheers
Stephanus
Session name |
Speaker |
Speaker 2 |
Speaker 3 |
Abstract |
Accelerate Azure information protection deployment and adoption |
You all deal with sensitive data in your day-to-day business and you may be at different stages of your information protection journey. Join us to learn some useful tips and tricks to get started with information protection today, regardless of where you are in that process. While deployment is important, making information protection a part of your company culture may be challenging. Users who are working on sensitive data need to know that now there’s a simple, intuitive process to secure sensitive data. Get some ideas on how you can maximize... |
|||
Learn about the latest new features in Office 365 Advanced Threat Protection (ATP) and how ATP protects not just email, but your extended Office environment. |
||||
Adventures in Underland: Is encryption solid as a rock or a handful of dust? |
|
|
Encryption is based on three principals: algorithm, key length, and storage. It has also become more popular and it is more often built into databases, networks, config files, OS, and users’ secrets. Is DPAPI and DPAPI-NG enough for us? Unfortunately there are many slip-ups that can be made. Come and learn if ‘encrypted’ = or != ‘safe’ and when! Tools included. |
|
|
Learn how malicious attackers try to gain access into your network. Understanding how attackers conduct advanced persistent threats will give you better insight on how to safeguard your organization and what how Microsoft Advanced Threat Analytics can help protect you. |
|||
|
|
This session provides a view into the phishing landscape and the latest technologies and feature updates on how Microsoft Office 365 ATP helps prevent organizations and end users from being compromised by today's sophisticated phishing campaigns. |
||
Assess your Office 365 risk with simple tools to get you started |
|
Microsoft has invested in tools and resources to make it easier for customers to perform risk assessments of using our cloud services. This session will feature live demos of the tools and resources available to you now to perform risk assessments of, and understand security considerations for, using Microsoft Office 365 and other enterprise cloud services. Discover Microsoft’s enterprise cloud transparency programs, our risk assurance documentation library, our cloud-based security tools that are based on and mapped to various international s... |
||
Automating security for better, continuous compliance in the cloud |
|
|
|
Let's face it, with hundreds of security dials and levers in Microsoft Azure, we can't possibly expect that users get it right every time. And, manual inspection of the infrastructure—when the environment is constantly changing—is next to impossible. With the Evident Security Platform (ESP), you can use automation to monitor, assess, manage, and enforce security policy throughout your entire SDL, reducing the risks that are introduced into cloud environments. In this talk we present an overview of ESP and share a case study from Warner Bros. |
Best practices to secure Windows 10 with already included features |
|
|
AppLocker, Windows Information Protection, Device Guard, WDAG - there are many ways to secure Windows 10. Not all ways are compatible with enterprise requirements. In the session, we look at what we are able to do and discuss experiences from the field around what works well and what doesn’t. In addition, we check how Configuration Manager can support us. |
|
Bring visibility, data control and threat protection to cloud apps with Microsoft Cloud App Security |
Even if you are not on the cloud, your employees probably are. Cloud apps are essential to today's connected workforce but they also introduce a unique set of security concerns. Learn how Microsoft Cloud App Security takes the visibility, control, and protection you have come to expect on-premises and extends them to your cloud apps. Experience all the new features and innovations including in-session control (proxy deployment) we have for providing you state-of-the-art SaaS security. Learn how Cloud App Security integrates with other Microsoft... |
|||
Building an effective Microsoft Advanced Threat Analytics solution |
|
|
We currently live in a very tenacious and aggressive era that requires all organizations to assume breached and implement proper tools to stay ahead of the cybersecurity game. This session guides you to the actual implementation of Advanced Threat Analytics (ATA). We discuss sizing requirements, server placement, UEBA and data analysis strategy. We demo how to deploy the major components of ATA. See you then! |
|
|
|
Protecting organizations from APTs using credential theft is a critical and challenging problem. This session provides an overview of credential protection in Windows. We go over how Credential Guard and Remote Credential Guard help against credential theft. We also discuss challenges in credential protection and how we are looking to address them. This is a great opportunity to ask questions and provide feedback! |
||
Customer story: How to protect against security breaches and insider threats |
|
In this case study session, Ed Panzeter, Senior Systems Engineer for Universal Health Services, shares best practices and strategies for protecting Active Directory and Windows Server from potential cyber security breaches and insider threats. Learn how Universal Health Services, an 8-year Quest software customer, works to stay ahead of today’s security threats with proactive measures to: • Identify security threats and vulnerabilities quickly with continuous, real-time monitoring of AD and Windows file servers • Protect file servers f... |
||
|
|
Take a peek under the covers of the security features Windows 10 provides - going deeper than a feature list to gain a very clear understanding of how Windows 10 Creators Update provides a secure foundation for applications and business scenarios. We examine the security isolation features of Microsoft Edge and modern applications, the security mitigations applications can leverage, and new features to apply them retroactively to existing applications. At the end of this hardcore deep dive, you'll have a solid understanding of OS features which... |
||
Defending against malware with robust and practical application whitelisting |
|
Application whitelisting is a powerful defense against malware, including ransomware, and has been widely advocated by security experts. Whitelisting defines what a user can run and disallows everything else, particularly code that a user intentionally downloaded, was tricked into running, or that a malware breach brought onto the system. Windows includes strong whitelisting technologies, but to date most organizations have not found it easy to define, apply, and maintain effective policies that don’t negatively impact productivity. This sessio... |
||
Deliver management and security at scale to Office 365 with Azure Active Directory |
|
|
|
Managing and securing Office 365 at scale can be challenging. Join us to learn how Azure Active Directory can help you get even more value from your Office 365 subscription with scalable identity management capabilities and unmatched security features: new hybrid authentication scenarios, dynamic groups, self-service password reset with write-back, advanced security reports, conditional access, and more. Find out how easy identity management for Office 365 can be. |
Deploy and get started with Microsoft Advanced Threat Analytics |
|
In this session, we will learn the preliminary steps and process of deploying Microsoft Advanced Threat Analytics in your network, and how to get up and running as quickly as possible. Start protecting your organization from malicious attacks today! |
||
Deploying and managing Windows Defender application control in the real world |
|
With over hundreds of thousands of new malicious files created per day, the fight against malware using traditional techniques (i.e.: signature based detection) is a never-ending game of whack-a-mole. Windows 10 fundamentally changes the game for enterprise security with Device Guard which offers next generation application control. In this session we provide prescriptive guidance to help you guide customers as they plan, deploy, and manage Device Guard enabled devices. We show you where Device Guard can be easy to deploy and where is can be di... |
||
Deploying and managing Windows Information Protection (WIP) with Azure Information Protection |
|
|
The Windows platform has traditionally had many data protection options available to it, but it wasn’t until the mobile era that easy to deploy and cost effective solutions would emerge in the market place. Solutions from Good Technology, AirWatch, Samsung and others use containers and effectively perform business data separation but they’ve done so at the expense of the user experience. In this session we show you how Windows Information Protection (WIP) can be deployed and managed along with Office 365 and Azure Information Protection to prov... |
|
Deploying Windows Defender AV and more with Configuration Manager |
|
Join us for this demo-focused session demonstrating how easy it is to deploy Windows Defender features at scale leveraging System Center Configuration Manager. |
||
|
|
Device Guard is like AppLocker on steroids. But do your systems require steroids? Learn how Device Guard improves security and what systems are fit for this technology that will take system hardening to the next level. |
||
Discover what’s new in Azure Information Protection and learn about the roadmap and strategy |
Azure Information Protection just keeps getting better and better with a frequent release cadence and exciting new features. Attend this session to see what all the fuss is about, get a handle on what we have been working on over the last six months, and where we are going over the next year. |
|||
Discover why and how Microsoft is the most trusted cloud service provider |
|
|
To help organizations comply with national, regional, and industry-specific requirements governing the collection and use of customer data, Microsoft offers the most comprehensive set of compliance offerings of any cloud service provider. We design and build our cloud services using a common set of controls, which streamlines compliance across a range of regulations not only for today, but for tomorrow as well. Then we engage independent auditors to perform in-depth audits of the implementation and effectiveness of these controls. This session ... |
|
Don’t be the first victim of new malware, turn Windows Defender AV Cloud Protection on! |
|
|
Come and see how Windows Defender Cloud Protection evaluates unknown, emerging, and polymorphic files—files never seen before—that are downloaded from the internet, to quickly deciphers whether the file is malicious or not. |
|
Drill down: What’s new in the Fall Creators Update for Windows Defender ATP |
Windows 10 offers an enormous leap forward when it comes to threat resistance, but that was just the beginning. With the addition of Windows Defender Suite we have an impressive lineup of new capabilities and improvements that will raise the security bar for malware and hacking threats. This session drills down on some of the key protection technologies in the suite. |
|||
|
You may need the flexibility to manage and store your encryptions keys according to your needs to be compliant with regulations. Join us to explore what options you have and what's the best key management strategy for your organization. |
|||
|
Learn how Office 365 provides end-to-end security through a fully integrated and advanced stack of security products. This session walks through a high level view of Office 365, Exchange Online Protection (EOP), Advanced Threat Protection (ATP), Advanced Security Management (ASM), and Threat Intelligence and how these interconnected products work in sync to ensure your organization is always protected. |
|||
|
|
You've successfully deployed Windows 10, but the next step is to configure it to provide all of the security promises that it's capable of! In this session, we deep dive on a roadmap for securely configuring, managing, and monitoring Windows 10 devices for even the most sensitive user scenarios. In the end, you'll be able to develop an iterative roadmap to continue to enhance your security and leverage the capabilities of Windows 10! |
||
Ensure users have the right access with Azure Active Directory |
|
See the new capabilities in Azure Active Directory that simplify managing identities and access across Microsoft Office, Microsoft Azure, SaaS apps and existing on-premises applications, including attestation with access reviews, terms of use checks, time-limited access rights, and new reports, notifications and insights. Make sure that the right people have access to the right resources. |
||
|
|
Windows Hello brings us into the world of easy to use and deploy multi-factor authentication. As we look at what’s next with Windows Hello, the use of additional factors, possibly those from the environment (e.g. Are you on premises?; Is a trusted device nearby?), gives us an opportunity to provide additional convenience and security. With Creator’s Update, we introduced Dynamic Lock, which leverages proximity-based signals to automatically lock a PC when the user is not around. Learn more about Dynamic Lock, as well as the upcoming work we are... |
||
|
|
With Microsoft Office 365 Groups provisioning a number of products, it can sometimes be difficult to figure out who has access to what. Add a little bit of SharePoint external users, Office 365 guests, anonymous links, and a new sharing experience and you have yourself a good challenge maintaining security. See how things work and what you should look out for within your Office 365 tenant. |
||
Five endpoint security and Windows 10 tips to help your IT team fight the dark side |
|
|
As the threat landscape for enterprises grows larger every day, IT teams need to be armed with the right tools to fight “the dark side.” This session presents ways enterprises can both proactively manage their security hygiene to prevent attacks and also rapidly repair endpoint configuration management security issues when they happen. It also provides tips on how to use new Windows 10 security features to make your enterprise more secure. Topics include: • Windows 10 security features and how to use them • Techniques for driving security... |
|
Going underground: Discovering, exploiting, & defending against covert channels in modern computing |
|
|
There’s a hidden world that you never knew existed. In this fascinating deep dive, join Andy Malone as he takes you inside the murky world of covert channels. Beyond the well-known ports, hackers and bad guys lurk waiting to deploy viruses, Trojans, or worse. Also discover how to access hidden channels within modern file systems and how hackers exploit them. Discover what lies beneath, in this fascinating session packed with demos, tricks, and tips to ensure that your network is properly monitored and secured. |
|
|
In this session, learn everything you want to know about how to meet key governance needs with Office 365 Groups such as expiry, retention, classification, driving policy for groups as well as records management – eDiscovery and hold. We also cover how groups can be used for legal case matters workspace as well as a knowledge and compliance workspace within your organization. |
|||
|
|
Over the past years, attacks have become more sophisticated and what was once the most safe operating system on the planet, can now easily be hacked. What are the most compelling dangers for Microsoft Windows 7 and 8.1, and how is Windows 10 capable of fixing them? This session shows what Windows 10 will help to protect out of the box and what you can do about the remaining threats. |
||
How Microsoft IT used Windows 10 and Windows Server 2016 to implement privileged access workstations |
|
|
As part of the security strategy to protect administrative privilege, Microsoft recommends using a dedicated machine, referred to as PAW (privileged access workstation), for administrative tasks; and using a separate device for the usual productivity tasks such as Outlook and Internet browsing. This can be costly for the company to acquire machines just for server administrative tasks, and inconvenient for the admins to carry multiple machines. In this session, we show you how MSIT uses shielded VMs on the new release of Windows client to imple... |
|
|
|
The best computer security defenses use their own threat intelligence and attack data to drive policies and responses. Microsoft has been ramping up the use of a data-driven defense for nearly a decade now. Attend this session to learn about what a data-driven defense is, and how Microsoft implements it. The session is full of Microsoft examples, including ATA, ATP, and Microsoft Azure Security Center. Learn how to help any organization implement a better data-driven defense, just like Microsoft did. Session Summary: • Learn what is a data-... |
||
Investigate and shut down attacks more precisely than ever before with Windows Defender ATP |
|
With the new Windows Defender Suite we provide a single console which enables security operations to investigate, determine scope of an incident, and take action using correlated data across the suite. Come and join us to see how an investigation experience looks like using the Windows Security Center. |
||
Make Windows devices more secure by taking them out of your existing infrastructure |
|
|
Can an Internet connected device joined to Azure Active Directory really be safer for a company than a traditional domain joined PC? Come and find out how in this session. Learn how to get the most out of an Enterprise Mobility + Security (EMS) subscription. Learn also to how maximize device and data security with Windows 10 devices, bringing into the mix EMS and Office 365 for a ‘better together’ strategy. |
|
Mastering the lions PAW: How to build a privileged access workstation |
|
|
Passwords are not secure enough! Passwords are not usable enough! Sound like preaching to the choir? Are you interested in transforming your organization to address the perils of the pervasive use of passwords? This session is for you. |
|
Microsoft Cloud App Security deep dive: Learn how to deploy and manage |
|
Microsoft Cloud App Security provides deeper visibility, stronger controls and enhanced protection for your cloud apps. In this session we show you can deploy and manage Microsoft Cloud App Security not only for discovering shadow IT but also for providing data control and protection features for approved apps in your organization. We will also demonstrate new features and innovations including in-session control (proxy) deployment. |
||
Modernizing your remote access - the choices and options available |
|
As IT organizations continue the journey with mobility and cloud, one constant pain point is a cohesive remote access strategy that takes into account the shift in the industry as well as takes advantage of it. This session shows how Windows can help businesses take steps towards such a shift. |
||
|
|
Our customers are facing a difficult threat landscape, one where if you're targeted by a sophisticated attacker, they very likely will be able to compromise a device or maybe your entire network. Today’s solutions are helping but they are nowhere near complete. With Windows Defender Suite we will offer a fully integrated and manageable solution that blurs the lines between endpoint protection (EPP) and endpoint detection and response (EDR) and raises the bar for security to a new level that hasn’t been reached by today’s solutions. |
||
|
|
Windows Defender Antivirus is an enterprise-grade antivirus solution, built into Windows, that uses the power of the cloud, wide optics, machine learning, and behavior analysis to rapidly respond to emerging, sophisticated threats and protect your devices against them. Come and learn everything about Windows Defender AV. |
||
Overview: Modern Windows 10 and Office ProPlus management with Enterprise Mobility + Security |
Join this overview session to see how you can modernize the deployment, management, and servicing of Windows 10 and Office 365 ProPlus with System Center Configuration Manager, Azure Active Directory, Microsoft Intune, and other cloud services. Learn how you can reduce your on-premises infrastructure needs, simplify management, and lower TCO. |
|||
Protect sensitive information with Office 365 Data Loss Prevention |
|
|
|
Microsoft Office 365 Data Loss Prevention (DLP) enables you to detect, protect, and monitor sensitive information in your organization. Come for a quick overview of how DLP functionality works across Office 365 services and client applications and how you can easily get started and better protect your information. Also, learn what's on the roamap to make our DLP solution even better. |
Protect your sensitive emails through encryption and rights management capabilities in Office 365 |
|
Just about every organization has the need to communicate sensitive information through email within your org, with your business partners or with your customers. There’s no doubt that these email communications would greatly benefit from additional safeguards against either accidental or malicious disclosure. Learn how Microsoft Office 365 email protection solutions make it easy for you to mitigate the risk of sensitive email from being read by anyone other than its intended recipients. You also hear about a number of new enhancements to Offic... |
||
Protecting complete data lifecycle using Microsoft information protection capabilities |
|
Organizations no longer operate solely within their own walls. Data travels to more locations than ever before – across both on-premises and cloud environments. While this has helped increase users’ productivity and their ability to collaborate with others, it has also made protecting sensitive data more challenging. Join us to learn how Microsoft information protection capabilities use unique intelligence and an integrated platform to help you identify, classify, protect, and monitor your data throughout its complete lifecycle. |
||
|
In the last two years Ransomware campaigns have become front page news. Impacts from high profile outbreaks like WannaCrypt and Petya continue to cause untold damage in Fortune 500 companies and home users alike. Come spend some time learning about Microsoft’s approach to dealing with Ransomware. In this session we will walk through Microsoft’s comprehensive Ransomware protection stack, explore case studies of recent outbreaks, demo some of the protections built into Windows 10 that stop Ransomware, and understand how you can protect your machi... |
|||
Red Teaming Windows: Building a better Windows by hacking it |
|
|
|
For generations of Windows releases we’ve relied on the Security Development Lifecycle (SDL), Threat Modeling, and other processes to help identify security weaknesses in our designs and implementations and now with Windows 10 we’ve added another key tactic to our approach which is to use Red Team tactics. This process which started in Windows 8 has been scaled out and has become central to our engineering process. Come join us to learn how the Windows Red Team helps us build a better Windows by hacking it! Note: This session is part of the cor... |
|
|
A world without passwords is possible. In the identity division at Microsoft, we don’t like passwords any more than you do! So we’ve been hard at work creating a modern way to sign in that protects from phishing attacks and doesn’t require upper and lowercase letters, numbers, a special character, and your favorite emoji. Join us to learn more on phone sign-in, Microsoft Authenticator, Windows Hello, FIDO and everything else that will make passwords a thing of the past. |
||
Secure access to Office 365, SaaS and on-premises apps with Microsoft Enterprise Mobility + Security |
|
In this session, we show how you can secure access to Office 365, SaaS apps, and on-premises apps with an innovative approach designed for the modern world using conditional access capabilities delivered through Azure Active Directory (AD) and Microsoft Intune. Join us to learn how to configure conditional access policies to ensure that only authorized users, devices, and apps can access corporate resources both on-premises and in the cloud. |
||
Secure Office 365 like a cybersecurity pro: Top priorities for the first 30 days, 90 days and beyond |
|
Based on investigations of real-world attacks, our top Microsoft Office 365 cybersecurity experts provide coaching on how to assess risk and implement the most critical security, compliance, and information protection controls to protect your Office 365 tenant. Learn how to prioritize threats, translate threats into technical strategy, and then take a systematic approach to implementing features and controls. This session covers customer responsibilities including admin privilege management, account and access management, and client endpoints. |
||
Secure Windows 10 with Intune, Azure AD and System Center Configuration Manager |
|
Microsoft offers a deep bench of security techologies but how can they be deployed and configured in the real world. In this session we show you how Intune, Azure Active Directory and System Center Configuration Manager can be used to configure Windows 10 devices for maximum security. |
||
Secure your Office 365 environment with best practices recommended for political campaigns |
|
Political campaigns around the world are run by fast-moving organizations with intensive collaboration patterns and security risks that rise with the potential influence a win can achieve. They face challenges from sophisticated actors that can deploy significant resources to breach an organization. Learn prescriptive security design for protecting identities, email, and access from mobile devices. Learn top recommendations for efficient and secure collaboration. Take away a blueprint for a secure Microsoft Azure-based environment for analytics... |
||
Securing, governing, and protecting your Office 365 investments |
|
|
Microsoft continues to invest in services and capabilities to help you protect, detect, and respond to a variety of emerging security and compliance needs for Office 365. Come to this session for an interactive scenario based whiteboard and demonstration of how you can implement comprehensive controls based on a variety of dimensions across the identity of the user; their location and device; and the application, service, and content they are accessing. |
|
Send secure email to anyone with Office 365 and Microsoft Azure Information Protection |
|
|
Just about every organization has the need to communicate sensitive information through email within the org, with business partners, or with customers. There's no doubt that these email communications would greatly benefit from additional safeguards against either accidental or malicious disclosure. Learn how Office 365 and Azure Information Protection email protection solutions make it easy for you to mitigate the risk of sensitive email from being read by anyone other than its intended recipients. You also hear about a number of new enhancem... |
|
Shut the door to cybercrime with Azure Active Directory risk-based identity protection |
|
|
Azure AD Identity Protection and Privileged Identity Management take secure identity and access management to the next level. These new Azure AD features puts the power of conditional access and advanced risk analytics, just-in-time administration and security reviews in your hand to stop cyber criminals from gaining entry to your systems by compromising identities. Azure AD Identity Protection is built on Microsoft's experience protecting consumer identities, and gains tremendous accuracy from the signal from over 13B logins a day. In this ses... |
|
|
Learn about the latest investments in Office 365 ProPlus security including Windows Defender Advanced Threat Protection integrations; new configuration options; a native classification, labeling, and protection experience; and a ProPlus security management tool! |
|||
Stop data exfiltration and advanced threats in Microsoft Office 365 and Azure |
|
|
|
Office 365 and Microsoft Azure introduce the benefits of agility and scalability for organizations of all sizes, often hosting your most sensitive applications and data. From a security perspective, this session demonstrates how an integrated approach to next-generation network security and CASB (cloud access security broker) technologies allows you to protect your applications and data in the cloud as vigilantly as you protect your on-premises resources. Key topics include: • Visibility and control over your applications, the data, and who h... |
Stopping Malicious Users and Shadow IT with Office 365 Advanced Security Management |
|
Understanding what your users are doing in Office 365 and how to protect your data is becoming more and more important. Advanced Security Management (ASM) provides you with enhanced visibility and control into your Office 365 environment to help you get this understanding. This demo heavy session will show you how to configure ASM to help you stop malicious user and admin activity, while also getting a better handle of the shadow IT in your organization. |
||
Take Control of Your Compliance Requirements with the Microsoft Service Trust Platform |
|
Manage end to end compliance for your Microsoft cloud services by leveraging Microsoft Service Trust Platform. The Microsoft Service Trust Platform is a "one-stop shop" for access to audit reports, interactive dashboards, “how to guides”, and other rich content regarding the security, privacy, and compliance of your data. Come learn how you can leverage this platform to efficiently demonstrate compliance to your regulators and auditors for the regulations that matter most to you. We will also share upcoming investments that will help you incr... |
||
Taming the Beast - How We Secure the World's Largest Enterprise Cloud Service |
|
|
Understand why and how your data is secure with Office 365 by getting an in depth view of how we ship secure code, run a secure data center, and why we are fully prepared to detect and mitigate an attack. Lastly we will walk through how we can help meet your data residency needs. |
|
The hacker playbook: How to think and act like a cybercriminal to reduce risk |
|
|
Successful attack prevention strategies consist of a couple of factors that are often not implemented properly in organizations. One of the best strategies we’ve seen is to rely on experience and learn from actual live hacks. Join Paula Januszkiewicz to learn how to identify vulnerabilities, strengthen your systems, and STOP the data that litter the news sites today. She discusses the latest threats and solutions available in 2017. Everything topped with the newest features of Windows 10 and Windows Server 2016! Add this pre-day training to y... |
|
The untold truth of social engineering: A real-world cyber-attack and response |
|
|
We see a clear shift in how enterprises are targeted by activist groups. With continous digitalization, the cyber attack landscape has changed significantly. Join this session and explore how social engineering has grown over time, get insights on some real-world social engineering cyber-attacks and how you can prepare your organization to protect, detect, and respond with Microsoft technologies. |
|
The utility belt for managing security and compliance in Office 365 |
|
|
Managing the numerous security and compliance policies across your organization can be challenging! We have released a number of new features in the Office 365 Security and Compliance Center that allow you to tackle these challenges head on. You get a deeper understanding of all our new capabilities and the redesigned user experience that is more intuitive, informative, scalable, and insightful. We also provide details on our future vision and roadmap. Learn how the Microsoft Office 365 Security and Compliance Center makes it easier for you to ... |
|
Three strategies to protect corporate IP in the age of employee churn |
|
|
|
Your business is built on data. In fact, 80% of your company value is in your intellectual property. It’s exactly this data—created by your knowledge workers—that holds the key to innovation and market advantage. But today, workers leave for new opportunities every 3-5 years—and take IP with them. So how do organizations develop security strategies for this new age? Attend the session to learn how to combat one of the largest data security blind spots—employee behavior. |
Top 10 ways to make hackers excited: All about the shortcuts not worth taking |
|
|
Designing secure architecture can always be more expensive, time consuming, and complicated. But does it make sense to cut corners when hackers invent new attacks every day? Taking shortcuts will sooner or later translate to more harm and backfire. Come to the session and learn what mistakes we eliminated when working with our customers. |
|
Learn about Microsoft Office 365 Threat Intelligence. This session offers a product deep dive and a look at several user scenarios that can leverage and benefit from Threat Intelligence. We provide examples of how Microsoft security teams work to detect and prevent cyber threats from impacting today's organizations. |
||||
Understanding advanced customization and configuration of Office 365 Data Loss Prevention |
|
If you are already familiar with the basics of data loss prevention, this session will go deeper to provide an advanced understanding of customizing and tuning Office 365 DLP to meet your organization’s needs. We’ll show you how to create custom policies, customize sensitive information detection, view reports and alerts, and how you can take DLP information from Office 365 and bring it into third-party solutions. |
||
|
|
It’s important that you have the flexibility and control to customize the classification of sensitive data as part of your information protection strategy – no matter where the data lives or travels. In this session we’ll discuss the key considerations and best practices in classifying sensitive data, and how this can be applied across Microsoft’s information protection solutions, including Office 365 Advanced Data Governance, Office 365 DLP, Azure Information Protection and Microsoft Cloud App Security. |
||
Understanding your security position with Office 365 Secure Score |
|
|
Do you know how you’d be rated if someone were to evaluate your security configuration? To give you better visibility into your Microsoft Office 365 security configuration and the security features available to you, come to this session to learn about our security analytics tools Office 365 Secure Score. Secure Score helps you understand your current Office 365 security configuration and shows you how implementing additional controls can further enhance your security and reduce risk. |
|
What to do before all hell breaks loose: Building a modern cybersecurity strategy |
|
|
|
Cybersecurity must evolve and mature—because cyber threats are doing that faster than ever. 2017 has already offered up some of the largest disclosures of vulnerabilities in history, with The Shadow Brokers releasing a host of NSA-developed SMB exploits. In turn, these “gifts” to the world spawned WannaCry, the worst wormable attack since Conficker in 2008. Then, attackers put the Eternal SMB vulnerability to work for them again, and NotPetya? It had this surprise in store: weaponized ransomware designed for mass social and economic disruption.... |
What's new in Windows 10 security? Raising the bar of security once again with the Creators Update! |
|
|
Disrupting the revolution of cyber-threats requires a platform with revolutionary security capabilities and the Windows 10 Creators Update raises to the occation. In this session, we talk about each of the security improvements in the Windows 10 Creators Edition and how Windows 10 security capabilities dovetail with the security capabilities in Office 365, our Server and Tools products, and Microsoft Azure. Note: This session is part of the core Windows Security session set. |
|
Windows Defender Application Guard making Microsoft Edge the world’s most secure browser |
|
|
Attacks on devices achieve success through exploits that either begin in the user’s inbox or in the browser. As a result browser security is one of the most important vectors of attack to secure. With Windows Defender Application Guard we completely change the game using virtualization-based security and containers which make Microsoft Edge the world’s most secure browser! The impact of these technologies when used to defend the browser can’t be understated. This is the hammer against malware and hacking that our customers have been waiting for... |
|
|
|
Windows Defender Exploit Guard enables enterprise admins to smartly manage the configuration and behaviors of the operating system and their applications, thereby limiting the attack surface of their apps and the OS, stopping exploits/raising the cost for exploitation, and containing damage. Learn everything about Windows Defender Exploit Guard. |
||
Windows Defender Exploit Guard: Reducing the Attack Surface while balancing productivity & security |
Windows Defender ATP now offers support for Windows 10 Clients, Windows Servers and cross-platform. All these events are being surfaced into a single console, so you can easily follow the attacker and understand the scope of the breach. Come and see how you configure all of your endpoints and investigate advanced attacks. |
|||
|
|
So you've heard a lot about Windows Hello but how will customers actually make the transition away from passwords in the real world? Come join us to learn what’s new in Windows Hello for Business in the Creator’s Update and Fall Creators Update. We will talk about the enhancements we have made, including the support for on-prem only environments, go over new scenarios that we now support and discuss what are the upcoming investments we are looking into. We promise some exciting demos! |
||
Your attacker thinks like my attacker: A common threat model to create better defense |
|
In this session, learn how easy it is to configure all individual components of the new Windows Defender Suite in a single management interface. Everything is built-in, nothing to deploy - just turn it on and configure your individual settings. |