AZURE COMPUTE |
|||
MICROSOFT
DEFENDER FOR CLOUD (formerly
Azure Security Center) |
|||
2021 |
|||
Nov 17 |
NextGen Multi Cloud CSPM in Microsoft Defender for
Cloud |
||
Nov 16 |
Azure
Security Ignite 2021 Updates |
||
Oct 27 |
Azure Defender for SQL |
||
Oct 26 |
Manage Your Security Risk and Compliance Requirements with Azure Security
Center |
||
Oct 20 |
What’s New in the Last 6 Months |
||
Oct 5 |
Better Together: Azure Defender, Azure Sentinel, and M365 Defender |
||
Aug 26 |
Better Together | Azure Security Center and Microsoft Defender for
Endpoint |
||
Jul 22 |
Manejo
de Postura de Seguridad de la Nube y Protección de Cargas de Trabajo (Cloud
Security Posture Management and Workload Protection) |
|
|
May 13 |
Azure
Workbooks in Security Center |
||
Apr 29 |
Demystifying
Azure Defender Once for All |
||
Apr 28 |
Automate(d)
Security with Azure Security Center and Logic Apps |
||
Mar 9 |
Azure
Defender for Storage |
||
Feb 23 |
Best Practices for Improving Your Secure Score |
||
Jan 7 |
Azure service layers protection |
||
2020 |
|||
Dec 7 |
Investigating Azure Security Center alerts using
Azure Sentinel |
||
Nov 30 |
Azure Defender for SQL Anywhere |
||
Nov 9 |
Ignite 2020 Announcements |
||
Nov 2 |
Enhance IoT Security & Visibility with Azure Defender and Azure
Sentinel |
||
Oct 28 |
Multi-Cloud support in Azure Security Center |
||
Oct 26 |
VM Protection |
||
Mar 11 |
Security Benchmark Policy |
||
Feb 20 |
Secure Score enhanced model |
||
MICROSOFT DEFENDER FOR CLOUD APPS (formerly
Microsoft Cloud App Security) |
|||
2021 |
|||
Aug 17 |
Protect your Slack Deployment using Microsoft Cloud
App Security |
||
Jun 8 |
Protect Your Salesforce Environment Using MCAS |
||
May 25 |
Improve Your AWS Security Posture Using MCAS |
||
May 12 |
Protect Your Box Deployment Using MCAS |
||
May 11 |
How to Protect Your GitHub Environment Using MCAS |
||
2020 |
|||
Apr 15 |
Enabling Secure Remote Work |
||
MICROSOFT DEFENDER FOR ENDPOINT |
|||
2021 |
|||
May 18 |
Stopping Cabanak+FIN7: Understanding the MITRE
Engenuity ATT&CK Results |
||
2020 |
|||
Sep 16 |
Get started with Microsoft Defender ATP: from zero to
hero |
||
Jul 7 |
Deploy MDATP capabilities using a phased roadmap |
||
Apr 2 |
End-to-end security for your endpoints |
||
MICROSOFT DEFENDER FOR IDENTITY |
|||
2021 |
|||
Oct 6 |
Microsoft Defender for Identity’s Latest Detection
Capabilities |
||
Jun 22 |
MDI in the Microsoft 365 Security Center |
||
Jun 1 |
Detection Deep Dive with Defender for Identity’s
Engineering Experts |
||
Mar 23 |
Proactive Identity Posture Management |
||
MICROSOFT DEFENDER FOR IoT (formerly Azure Defender for IoT) |
|||
2021 |
|||
Oct 19 |
Agent Based Solution for IoT Device |
||
Jan 20 |
Leveraging OT Behavioral Analytics and Zero Trust for
OT Cyber Resilience |
||
2020 |
|||
Sep 17 |
MITRE ATT&CK for ICS: CyberX Demo and Azure
IoT/OT Security Deep Dive |
||
MICROSOFT SENTINEL (formerly Azure Sentinel) |
|||
2021 |
|||
Nov 16 |
Create
Your Own Microsoft Sentinel Solutions |
||
Nov 15 |
Improving
the Breadth and Coverage of Threat Hunting with ADX Support, More Entity
Types, and Updated MITRE Integration |
||
Nov 10 |
Decrease Your SOC’s MTTR (Mean Time to Respond) by
Integrating Microsoft Sentinel with Microsoft Teams |
||
Nov 9 |
SAP
Mini-Series Part 2: Deep Dive - End-to-End Installation of
SAP for Microsoft Sentinel |
||
Nov 8 |
Latest Innovations for Microsoft’s Cloud Native SIEM |
||
Oct 28 |
What’s New in Azure Sentinel Automation |
||
Oct 25 |
Explore the Power of Threat Intelligence in Azure
Sentinel |
||
Oct 18 |
SAP
Mini-Series Part 1: Introduction to Monitoring SAP with Azure
Sentinel for Security Professionals |
||
Oct 11 |
Become a Notebooks Ninja – Getting Started with
Jupyter Notebooks in Azure Sentinel |
||
Oct 6 |
Turbocharging ASIM: Making Sure Normalization Helps
Performance Rather Than Impacting It |
||
Sep 29 |
Better Together | OT and IoT Attack Detection,
Investigation and Response |
||
Sep 15 |
What's New in the Last 6 Months |
||
Sep 14 |
Learn About Customizable Anomalies and How to Use
Them |
||
Aug 18 |
Fusion ML Detections with Scheduled Analytics Rules |
||
Aug 11 |
Deep Dive into Azure Sentinel Normalizing Parsers and
Normalized Content |
||
Jul 28 |
The Information Model: Understanding Normalization in
Azure Sentinel |
||
Jul 20 |
Streamlining your SOC Workflow with Automated
Notebooks |
||
Jul 13 |
Customizing Azure Sentinel with Python - MSTICPy and
Jupyter Notebooks |
||
Jun 29 |
Threat Intelligence in Action with Anomali |
||
Jun 24 |
Cost Management in Azure Sentinel - Getting the Most
for Your Investment |
||
May 26 |
Deep Dive into Azure Sentinel Innovations for RSA
2021 |
||
Mar 31 |
Using Azure Data Explorer as Your Long Term Retention
Platform of Azure Sentinel Logs |
||
Mar 18 |
Data Collection Scenarios |
||
Feb 18 |
Best Practices for Converting Detection Rules from
Splunk, QRadar, and ArcSight to Azure Sentinel Rules |
||
Feb 4 |
Accelerate Your Azure Sentinel Deployment with the
All-in-One Accelerator |
||
Jan 21 |
Auditing and monitoring your Azure Sentinel workspace |
||
Jan 19 |
Azure Notebooks Fundamentals – How to get started |
||
Jan 12 |
Machine Learning detections in the AI-infused Azure
Sentinel SIEM |
||
2020 |
|||
Sep 30 |
Unleash your Azure Sentinel automation Jedi tricks
and build Logic Apps Playbooks like a Boss |
||
Sep 29 |
Enabling User and Entity Behavior Analytics (UEBA) |
Hunting for Insider Threats |
||
Sep 14 |
Empowering the Azure Sentinel Community with
Pre-Recorded Datasets for research and training purposes |
||
Sep 9 |
KQL
part 3 of 3 - Optimizing Azure Sentinel KQL queries
performance |
||
Sep 2 |
Log Forwarder deep dive | Filtering CEF and Syslog
events |
||
Aug 19 |
Threat intelligence automation with RiskIQ |
||
Aug 12 |
Threat hunting and reduce dwell times with Azure
Sentinel |
||
Jul 28 |
KQL
part 2 of 3: KQL hands-on lab exercises |
||
Jul 9 |
Workbooks deep dive - Visualize your security threats
and hunts |
||
Jun 23 |
Multi-tenant investigations |
||
Jun 15 |
Deploying and Managing Azure Sentinel as Code |
||
Jun 2 |
KQL
part 1 of 3: Learn the KQL you need for Azure Sentinel |
||
May 13 |
Using Sigma to accelerate your SIEM transformation to
Azure Sentinel |
||
Apr 22 |
Threat Hunting on AWS using Sentinel |
||
Apr 20 |
MSSP and Distributed Organization Support |
||
Mar 31 |
Extending and Integrating Azure Sentinel (APIs) |
||
Mar 18 |
Deep Dive on Threat Intelligence |
||
Mar 4 |
Recap of RSA 2020 |
||
Feb 19 |
Tackling Identity |
||
Feb 12 |
Deep Dive on Correlation Rules |
||
Jan 29 |
Threat Hunting - revisited |
||
Jan 22 |
End-to-End SOC scenario |
||
MICROSOFT MISCELLANEOUS
SECURITY WEBINARS |
|||
CYBERSECURITY FUNDAMENTALS |
|||
2021 |
|||
Oct 21 |
Hacking
AI with Counterfit |
||
Oct 14 |
Exploiting
Vulnerabilities in Azure Stack Hub |
||
Oct 7 |
Combating Manipulated
Media -Media Provenance |
||
Jul 1 |
Spa
Treatments: Web Security in Single Page Applications |
||
Jun 15 |
Best
Practices of Authentication & Authorization Methods |
||
Mar 24 |
Who
Wants a Thousand Free Puppies? Managing Open Source Software Security in The
Enterprise |
||
Feb 16 |
The
Billion-Dollar Central Bank Heist |
||
2020 |
|||
Dec 9 |
Microsoft
Digital Defense Report |
||
Oct 29 |
Cybersecurity
Basics: Securing Yourself |
||
DIVERSITY IN CYBERSECURITY |
|||
2021 |
|||
Oct 4 |
Mekonnen Kassa: From a Refugee to Microsoft: Impact
of Active Allyship |
||
May 27 |
Sarah Young: How Unconventional Career Paths are
Making a Difference in the Technology |
||
Mar 16 |
Sue Loh, software engineer at Microsoft and author of
the young adult hacker novel Raven,
inspires girls and other under-represented groups to enter tech. |