SlideShare a Scribd company logo
1 of 12
Download to read offline
Security Operations
in Actions
More than 10 years of IT Experience and working with MS. Team and Partners to deliver
Microsoft Solutions and specializes in the following Microsoft Technologies and Solutions:
- Microsoft Cloud Solutions (Private, Public, Hybrid and Multi-Clouds)
- Windows Server (AD DS, Hyper-V, and Infrastructure Services)
- System Center (System & Device Management and Others)
- Windows 10/11 Enterprise Services (Deployment, Security, and Others)
Cloud Security Challenges
Security Threats are compounded by the complexity
of Hybrid and Multi-Cloud Environments
OPTION 1
Top Cybersecurity concerns
Attacks like ransomware are increasing
Costs are increasing
Organizations are feeling the pressure
1. “Cyber Resilience”. May 2021, Microsoft Security Insider.
2. “The State of Ransomware 2021.” Sophos, April 2021.
Human operated ransomware
Defending against Attacks
Supply Chain Attacks
Business Email Compromise
Phishing
Credential Theft
Insider Threats
Human-Operated Ransomware
Security Operations
“Is the Overall Process of Using
Collected Data and Analyzing them for
Potential Anomalous Behavior that
may indicate a Threat or Attack.”
SIEM + SOAR | Microsoft Sentinel
Microsoft 365 Defender
Email/docs Endpoints
Identities Apps
Microsoft Defender for Cloud
SQL Server VMs Containers
Network
traffic IoT Apps
XDR
Microsoft Defender
Non-Azure
workloads
Deliver End-to-End Security across Your Organization
Security Operations Center (SOC)
Microsoft Defender for Cloud
Streamline Security Management
Strengthen Multi-Cloud
Security Posture
Secure
Score
Policies and
compliance
Automation
Leveraging
Azure Arc
Protect your Azure Native, Multi-Cloud and
Hybrid Workloads
Servers - EPP/ EDR,
Security alerts
Container
services
Databases and
storage
For Azure
service layers
For IoT
devices
Vulnerability
Assessment
Security
Baseline
CSPM CWPP
Full-Stack Coverage with Dedicated Detections
Compute Service Layer
Databases and Storage
AWS workloads GCP workloads On-premise
workloads
(Security Information and Event Management) (Security Orchestration and Automated Response)
Microsoft Sentinel
SIEM SOAR
Aggregate Events and Alerts from
numerous solutions to correlate intelligence.
The consolidated view streamlines threat
hunting as well as allows for automated
remediations, or assisted investigation
Is a stack of compatible software programs that
allow an organization to collect data about
security threats from multiple sources and
respond to low-level security events without
human assistance.
Thank You.

More Related Content

Similar to Security Operations in Actions

Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckArrow ECS UK
 
La sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SILa sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SIMicrosoft Ideas
 
Webinar Mastering Microsoft Security von Baggenstos
Webinar Mastering Microsoft Security von BaggenstosWebinar Mastering Microsoft Security von Baggenstos
Webinar Mastering Microsoft Security von BaggenstosJenniferMete1
 
Microsoft_Enterprise_Mobility_plus_Security_datasheet_EN_US
Microsoft_Enterprise_Mobility_plus_Security_datasheet_EN_USMicrosoft_Enterprise_Mobility_plus_Security_datasheet_EN_US
Microsoft_Enterprise_Mobility_plus_Security_datasheet_EN_US☁ ☁ Gautam T ☁☁
 
Turning the tables talk delivered at CCISDA conference
Turning the tables talk delivered at CCISDA conferenceTurning the tables talk delivered at CCISDA conference
Turning the tables talk delivered at CCISDA conferenceDean Iacovelli
 
2 Microsoft Security.pdf
2 Microsoft Security.pdf2 Microsoft Security.pdf
2 Microsoft Security.pdfSerbanTeron
 
Microsoft Threat Protection
Microsoft Threat ProtectionMicrosoft Threat Protection
Microsoft Threat ProtectionThierry DEMAN
 
7 Experts on Implementing Microsoft Defender for Endpoint
7 Experts on Implementing Microsoft Defender for Endpoint7 Experts on Implementing Microsoft Defender for Endpoint
7 Experts on Implementing Microsoft Defender for EndpointMighty Guides, Inc.
 
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIBM Switzerland
 
The Changing Security Landscape
The Changing Security LandscapeThe Changing Security Landscape
The Changing Security LandscapeArrow ECS UK
 
Information Security Management System in the Banking Sector
Information Security Management System in the Banking SectorInformation Security Management System in the Banking Sector
Information Security Management System in the Banking SectorSamvel Gevorgyan
 
DSS @CERT.LV_ISACA_2013_Conference - IBM X Force Report 2013
DSS @CERT.LV_ISACA_2013_Conference - IBM X Force Report 2013DSS @CERT.LV_ISACA_2013_Conference - IBM X Force Report 2013
DSS @CERT.LV_ISACA_2013_Conference - IBM X Force Report 2013Andris Soroka
 
Top 10 Cybersecurity Companies Software 2022.pptx
Top 10 Cybersecurity Companies Software 2022.pptxTop 10 Cybersecurity Companies Software 2022.pptx
Top 10 Cybersecurity Companies Software 2022.pptxSonaliG6
 
Daniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity storyDaniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity storyMicrosoft Österreich
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundaryDean Iacovelli
 
Session 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry TessierSession 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry TessierCTE Solutions Inc.
 
ciso-platform-annual-summit-2013-Hp enterprise security overview
ciso-platform-annual-summit-2013-Hp enterprise security overviewciso-platform-annual-summit-2013-Hp enterprise security overview
ciso-platform-annual-summit-2013-Hp enterprise security overviewPriyanka Aash
 
Cloud with Cyber Security
Cloud with Cyber SecurityCloud with Cyber Security
Cloud with Cyber SecurityNiki Upadhyay
 

Similar to Security Operations in Actions (20)

Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
 
La sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SILa sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SI
 
Webinar Mastering Microsoft Security von Baggenstos
Webinar Mastering Microsoft Security von BaggenstosWebinar Mastering Microsoft Security von Baggenstos
Webinar Mastering Microsoft Security von Baggenstos
 
Microsoft_Enterprise_Mobility_plus_Security_datasheet_EN_US
Microsoft_Enterprise_Mobility_plus_Security_datasheet_EN_USMicrosoft_Enterprise_Mobility_plus_Security_datasheet_EN_US
Microsoft_Enterprise_Mobility_plus_Security_datasheet_EN_US
 
Turning the tables talk delivered at CCISDA conference
Turning the tables talk delivered at CCISDA conferenceTurning the tables talk delivered at CCISDA conference
Turning the tables talk delivered at CCISDA conference
 
2 Microsoft Security.pdf
2 Microsoft Security.pdf2 Microsoft Security.pdf
2 Microsoft Security.pdf
 
Microsoft Threat Protection
Microsoft Threat ProtectionMicrosoft Threat Protection
Microsoft Threat Protection
 
7 Experts on Implementing Microsoft Defender for Endpoint
7 Experts on Implementing Microsoft Defender for Endpoint7 Experts on Implementing Microsoft Defender for Endpoint
7 Experts on Implementing Microsoft Defender for Endpoint
 
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
 
The Changing Security Landscape
The Changing Security LandscapeThe Changing Security Landscape
The Changing Security Landscape
 
IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,
 
Information Security Management System in the Banking Sector
Information Security Management System in the Banking SectorInformation Security Management System in the Banking Sector
Information Security Management System in the Banking Sector
 
DSS @CERT.LV_ISACA_2013_Conference - IBM X Force Report 2013
DSS @CERT.LV_ISACA_2013_Conference - IBM X Force Report 2013DSS @CERT.LV_ISACA_2013_Conference - IBM X Force Report 2013
DSS @CERT.LV_ISACA_2013_Conference - IBM X Force Report 2013
 
Top 10 Cybersecurity Companies Software 2022.pptx
Top 10 Cybersecurity Companies Software 2022.pptxTop 10 Cybersecurity Companies Software 2022.pptx
Top 10 Cybersecurity Companies Software 2022.pptx
 
Daniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity storyDaniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity story
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
 
Session 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry TessierSession 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry Tessier
 
ciso-platform-annual-summit-2013-Hp enterprise security overview
ciso-platform-annual-summit-2013-Hp enterprise security overviewciso-platform-annual-summit-2013-Hp enterprise security overview
ciso-platform-annual-summit-2013-Hp enterprise security overview
 
Cloud with Cyber Security
Cloud with Cyber SecurityCloud with Cyber Security
Cloud with Cyber Security
 
go secure cloud.pdf
go secure cloud.pdfgo secure cloud.pdf
go secure cloud.pdf
 

More from Kumton Suttiraksiri

Best Practice on using Azure OpenAI Service
Best Practice on using Azure OpenAI ServiceBest Practice on using Azure OpenAI Service
Best Practice on using Azure OpenAI ServiceKumton Suttiraksiri
 
All-in on AI: How Smart Companies Win Big with AI
All-in on AI: How Smart Companies Win Big with AIAll-in on AI: How Smart Companies Win Big with AI
All-in on AI: How Smart Companies Win Big with AIKumton Suttiraksiri
 
AKS backup with Velero and Workload Identities
AKS backup with Velero and Workload IdentitiesAKS backup with Velero and Workload Identities
AKS backup with Velero and Workload IdentitiesKumton Suttiraksiri
 
Unlocking the Power of Quantum Machine Learning with Azure Quantum
Unlocking the Power of Quantum Machine Learning with Azure QuantumUnlocking the Power of Quantum Machine Learning with Azure Quantum
Unlocking the Power of Quantum Machine Learning with Azure QuantumKumton Suttiraksiri
 
Azure Data Factory with Power BI for Data Analysts
Azure Data Factory with Power BI for Data AnalystsAzure Data Factory with Power BI for Data Analysts
Azure Data Factory with Power BI for Data AnalystsKumton Suttiraksiri
 
Improve Developer Experience with Developer Portal
Improve Developer Experience with Developer PortalImprove Developer Experience with Developer Portal
Improve Developer Experience with Developer PortalKumton Suttiraksiri
 
azure-app-jump-start-wAzure App Jumpstart using GitHub Codespaces and Azure D...
azure-app-jump-start-wAzure App Jumpstart using GitHub Codespaces and Azure D...azure-app-jump-start-wAzure App Jumpstart using GitHub Codespaces and Azure D...
azure-app-jump-start-wAzure App Jumpstart using GitHub Codespaces and Azure D...Kumton Suttiraksiri
 
Mvpskill Saturday[EP48]Microsoft 365 Update [27 FEB 2021]
Mvpskill Saturday[EP48]Microsoft 365 Update [27  FEB 2021]Mvpskill Saturday[EP48]Microsoft 365 Update [27  FEB 2021]
Mvpskill Saturday[EP48]Microsoft 365 Update [27 FEB 2021]Kumton Suttiraksiri
 
Mvpskill saturday ep 45 16 jan 2021
Mvpskill saturday ep 45  16 jan 2021Mvpskill saturday ep 45  16 jan 2021
Mvpskill saturday ep 45 16 jan 2021Kumton Suttiraksiri
 
5 Power BI for Real time Analytics
5   Power BI for Real time Analytics5   Power BI for Real time Analytics
5 Power BI for Real time AnalyticsKumton Suttiraksiri
 
4 Integrating azure monitor with power bi and power automate
4 Integrating azure monitor with power bi and power automate4 Integrating azure monitor with power bi and power automate
4 Integrating azure monitor with power bi and power automateKumton Suttiraksiri
 
3 Staff check ins solution with power automate
3 Staff check ins solution with power automate3 Staff check ins solution with power automate
3 Staff check ins solution with power automateKumton Suttiraksiri
 
2 Build Apps for Any Devices With Power Apps
2 Build Apps for Any Devices With Power Apps2 Build Apps for Any Devices With Power Apps
2 Build Apps for Any Devices With Power AppsKumton Suttiraksiri
 
Microsoft graph and power platform champ
Microsoft graph and power platform   champMicrosoft graph and power platform   champ
Microsoft graph and power platform champKumton Suttiraksiri
 
Mvpskill Saturday EP_37 12 Sept 2563 - Azure Products Update + DEMO
Mvpskill Saturday EP_37 12 Sept 2563 - Azure Products Update + DEMOMvpskill Saturday EP_37 12 Sept 2563 - Azure Products Update + DEMO
Mvpskill Saturday EP_37 12 Sept 2563 - Azure Products Update + DEMOKumton Suttiraksiri
 
Mvpskill Saturday EP_35 8 Aug. 2563 - Microsoft Azure Products Update + DEMO
Mvpskill Saturday EP_35 8 Aug. 2563 - Microsoft Azure Products Update + DEMOMvpskill Saturday EP_35 8 Aug. 2563 - Microsoft Azure Products Update + DEMO
Mvpskill Saturday EP_35 8 Aug. 2563 - Microsoft Azure Products Update + DEMOKumton Suttiraksiri
 
Mvpskill Saturday EP_34 25 July 2563 - Microsoft 365 Products Update + DEMO
Mvpskill Saturday EP_34 25 July 2563 - Microsoft 365 Products Update + DEMOMvpskill Saturday EP_34 25 July 2563 - Microsoft 365 Products Update + DEMO
Mvpskill Saturday EP_34 25 July 2563 - Microsoft 365 Products Update + DEMOKumton Suttiraksiri
 
Mvpskill Saturday EP_34 25 July. 2563 - Microsoft 365 Products Update + DEMO
Mvpskill Saturday EP_34 25 July. 2563 - Microsoft 365 Products Update + DEMOMvpskill Saturday EP_34 25 July. 2563 - Microsoft 365 Products Update + DEMO
Mvpskill Saturday EP_34 25 July. 2563 - Microsoft 365 Products Update + DEMOKumton Suttiraksiri
 

More from Kumton Suttiraksiri (20)

Best Practice on using Azure OpenAI Service
Best Practice on using Azure OpenAI ServiceBest Practice on using Azure OpenAI Service
Best Practice on using Azure OpenAI Service
 
All-in on AI: How Smart Companies Win Big with AI
All-in on AI: How Smart Companies Win Big with AIAll-in on AI: How Smart Companies Win Big with AI
All-in on AI: How Smart Companies Win Big with AI
 
AKS backup with Velero and Workload Identities
AKS backup with Velero and Workload IdentitiesAKS backup with Velero and Workload Identities
AKS backup with Velero and Workload Identities
 
Unlocking the Power of Quantum Machine Learning with Azure Quantum
Unlocking the Power of Quantum Machine Learning with Azure QuantumUnlocking the Power of Quantum Machine Learning with Azure Quantum
Unlocking the Power of Quantum Machine Learning with Azure Quantum
 
Azure Arc on AIS Cloud X
Azure Arc on AIS Cloud XAzure Arc on AIS Cloud X
Azure Arc on AIS Cloud X
 
Azure Sentinel
Azure SentinelAzure Sentinel
Azure Sentinel
 
Azure Data Factory with Power BI for Data Analysts
Azure Data Factory with Power BI for Data AnalystsAzure Data Factory with Power BI for Data Analysts
Azure Data Factory with Power BI for Data Analysts
 
Improve Developer Experience with Developer Portal
Improve Developer Experience with Developer PortalImprove Developer Experience with Developer Portal
Improve Developer Experience with Developer Portal
 
azure-app-jump-start-wAzure App Jumpstart using GitHub Codespaces and Azure D...
azure-app-jump-start-wAzure App Jumpstart using GitHub Codespaces and Azure D...azure-app-jump-start-wAzure App Jumpstart using GitHub Codespaces and Azure D...
azure-app-jump-start-wAzure App Jumpstart using GitHub Codespaces and Azure D...
 
Mvpskill Saturday[EP48]Microsoft 365 Update [27 FEB 2021]
Mvpskill Saturday[EP48]Microsoft 365 Update [27  FEB 2021]Mvpskill Saturday[EP48]Microsoft 365 Update [27  FEB 2021]
Mvpskill Saturday[EP48]Microsoft 365 Update [27 FEB 2021]
 
Mvpskill saturday ep 45 16 jan 2021
Mvpskill saturday ep 45  16 jan 2021Mvpskill saturday ep 45  16 jan 2021
Mvpskill saturday ep 45 16 jan 2021
 
5 Power BI for Real time Analytics
5   Power BI for Real time Analytics5   Power BI for Real time Analytics
5 Power BI for Real time Analytics
 
4 Integrating azure monitor with power bi and power automate
4 Integrating azure monitor with power bi and power automate4 Integrating azure monitor with power bi and power automate
4 Integrating azure monitor with power bi and power automate
 
3 Staff check ins solution with power automate
3 Staff check ins solution with power automate3 Staff check ins solution with power automate
3 Staff check ins solution with power automate
 
2 Build Apps for Any Devices With Power Apps
2 Build Apps for Any Devices With Power Apps2 Build Apps for Any Devices With Power Apps
2 Build Apps for Any Devices With Power Apps
 
Microsoft graph and power platform champ
Microsoft graph and power platform   champMicrosoft graph and power platform   champ
Microsoft graph and power platform champ
 
Mvpskill Saturday EP_37 12 Sept 2563 - Azure Products Update + DEMO
Mvpskill Saturday EP_37 12 Sept 2563 - Azure Products Update + DEMOMvpskill Saturday EP_37 12 Sept 2563 - Azure Products Update + DEMO
Mvpskill Saturday EP_37 12 Sept 2563 - Azure Products Update + DEMO
 
Mvpskill Saturday EP_35 8 Aug. 2563 - Microsoft Azure Products Update + DEMO
Mvpskill Saturday EP_35 8 Aug. 2563 - Microsoft Azure Products Update + DEMOMvpskill Saturday EP_35 8 Aug. 2563 - Microsoft Azure Products Update + DEMO
Mvpskill Saturday EP_35 8 Aug. 2563 - Microsoft Azure Products Update + DEMO
 
Mvpskill Saturday EP_34 25 July 2563 - Microsoft 365 Products Update + DEMO
Mvpskill Saturday EP_34 25 July 2563 - Microsoft 365 Products Update + DEMOMvpskill Saturday EP_34 25 July 2563 - Microsoft 365 Products Update + DEMO
Mvpskill Saturday EP_34 25 July 2563 - Microsoft 365 Products Update + DEMO
 
Mvpskill Saturday EP_34 25 July. 2563 - Microsoft 365 Products Update + DEMO
Mvpskill Saturday EP_34 25 July. 2563 - Microsoft 365 Products Update + DEMOMvpskill Saturday EP_34 25 July. 2563 - Microsoft 365 Products Update + DEMO
Mvpskill Saturday EP_34 25 July. 2563 - Microsoft 365 Products Update + DEMO
 

Recently uploaded

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Security Operations in Actions

  • 2. More than 10 years of IT Experience and working with MS. Team and Partners to deliver Microsoft Solutions and specializes in the following Microsoft Technologies and Solutions: - Microsoft Cloud Solutions (Private, Public, Hybrid and Multi-Clouds) - Windows Server (AD DS, Hyper-V, and Infrastructure Services) - System Center (System & Device Management and Others) - Windows 10/11 Enterprise Services (Deployment, Security, and Others)
  • 3. Cloud Security Challenges Security Threats are compounded by the complexity of Hybrid and Multi-Cloud Environments
  • 4. OPTION 1 Top Cybersecurity concerns Attacks like ransomware are increasing Costs are increasing Organizations are feeling the pressure 1. “Cyber Resilience”. May 2021, Microsoft Security Insider. 2. “The State of Ransomware 2021.” Sophos, April 2021.
  • 5. Human operated ransomware Defending against Attacks Supply Chain Attacks Business Email Compromise Phishing Credential Theft Insider Threats Human-Operated Ransomware
  • 6. Security Operations “Is the Overall Process of Using Collected Data and Analyzing them for Potential Anomalous Behavior that may indicate a Threat or Attack.”
  • 7. SIEM + SOAR | Microsoft Sentinel Microsoft 365 Defender Email/docs Endpoints Identities Apps Microsoft Defender for Cloud SQL Server VMs Containers Network traffic IoT Apps XDR Microsoft Defender Non-Azure workloads Deliver End-to-End Security across Your Organization Security Operations Center (SOC)
  • 8.
  • 9. Microsoft Defender for Cloud Streamline Security Management Strengthen Multi-Cloud Security Posture Secure Score Policies and compliance Automation Leveraging Azure Arc Protect your Azure Native, Multi-Cloud and Hybrid Workloads Servers - EPP/ EDR, Security alerts Container services Databases and storage For Azure service layers For IoT devices Vulnerability Assessment Security Baseline CSPM CWPP
  • 10. Full-Stack Coverage with Dedicated Detections Compute Service Layer Databases and Storage AWS workloads GCP workloads On-premise workloads
  • 11. (Security Information and Event Management) (Security Orchestration and Automated Response) Microsoft Sentinel SIEM SOAR Aggregate Events and Alerts from numerous solutions to correlate intelligence. The consolidated view streamlines threat hunting as well as allows for automated remediations, or assisted investigation Is a stack of compatible software programs that allow an organization to collect data about security threats from multiple sources and respond to low-level security events without human assistance.