SlideShare a Scribd company logo
Microsoft Services –Sikkerhedsløsninger 
Strategiske Assessments 
Løsninger 
Dynamic Identity Framework Assessment 
Microsoft Security Risk Assessment 
Intro 
One Microsoft Security 
ServicesOverblik 
One Microsoft Security 
Services 
Workshop 
Active Directory Self Service Migration Service 
Access Enablement Gateway and Identity Service (AEGIS) 
Data Protection using Active Directory Rights Management Services 
Design and Implementation for Active Directory 
Enterprise Identity Management using Microsoft Identity Manager 
Office 365 FIM Connector for Windows Azure Active Directory 
Enterprise Federated Identity using Active Directory Federation Services 
Seamless Secure Access using DirectAccess 
Enterprise Mobility POC 
Strong Authentication using Smartcards 
Public Key Infrastructure using Microsoft Active Directory Certificate Services (PKI 2012) 
Group Management using Microsoft Identity Manager 
Full Volume Encryption using Windows BitLocker Drive Encryption 
Network Isolation Services 
Self Service Password Management 
Persistent Advisory Detection Service (PADS) 
Windows XP migration Jumpstart 
Security Health Check 
Security Error Reporting and Analysis (SERA) 
Software Update Management 
Software Update Management Process Service Map 
SUM Tech Extension –Windows Server 
SUM Tech Extension –Windows Client 
Enhanced Security Administrative Environment (ESAE) 
Securing Lateral Account Movement (SLAM) Side by Side Remediation 
Active Directory Security Assessment 
Security Development Lifecycle (SDL) Maturity Assessment 
SDL Training 
ADSRaaS 
Incident Response & Recovery (IR&R) 
Information Protection using Hybrid RMS
Microsoft Security Guidance (gode korte forklaringer og links der omhandler en masse sikkerheds discipliner) http://technet.microsoft.com/en-us/library/cc184906.aspx 
En række artikler om nogle af de bedste gratis sikkerhedsværktøjer fra Microsoft 
Part 1:Microsoft’s Free Security Tools –Series IntroductionPart 2:Microsoft’s Free Security Tools –Attack Surface AnalyzerPart 3:Microsoft’s Free Security Tools –Enhanced Mitigation Experience ToolkitPart 4:Microsoft’s Free Security Tools –BinScopeBinary AnalyzerPart 5:Microsoft’s Free Security Tools –Threat ModelingPart 6:Microsoft’s Free Security Tools –banned.hPart 7:Microsoft’s Free Security Tools –Windows Defender OfflinePart 8:Microsoft’s Free Security Tools –PortqryPart 9:Microsoft’s Free Security Tools –SummaryPart 10:Microsoft’s Free Security Tools –Microsoft Baseline Security AnalyzerPart 11: Microsoft’s Free Security Tools –Microsoft Safety ScannerPart 12: Microsoft’s Free Security Tools –Anti-Cross-Site Scripting LibraryPart 13: Microsoft’s Free Security Tools –Microsoft Security Compliance Manager ToolPart 14: Microsoft’s Free Security Tools –URLScanSecurity ToolPart 15: Microsoft’s Free Security Tools –Microsoft Assessment and Planning Toolkit
Hvis du tror, at teknologien kan løse dine sikkerhedsproblemer, så du forstår ikke problemerne og du forstår ikke teknologien. 
Bruce Schneier

More Related Content

Viewers also liked

CampusDays 2013 Intro
CampusDays 2013 IntroCampusDays 2013 Intro
CampusDays 2013 Intro
Microsoft
 
Velfærd for færre resourcer
Velfærd for færre resourcerVelfærd for færre resourcer
Velfærd for færre resourcer
Microsoft
 
Неизвестное об известном. Выпуск 2
Неизвестное об известном. Выпуск 2Неизвестное об известном. Выпуск 2
Неизвестное об известном. Выпуск 2
Виктор Крысов (Viktor Krysov)
 
Cyber Security Conference - Rethinking cyber-threat
Cyber Security Conference - Rethinking cyber-threatCyber Security Conference - Rethinking cyber-threat
Cyber Security Conference - Rethinking cyber-threat
Microsoft
 
Microsoft Next 2014 - Productivity session 5 - Projektoverblik, effektivt sam...
Microsoft Next 2014 - Productivity session 5 - Projektoverblik, effektivt sam...Microsoft Next 2014 - Productivity session 5 - Projektoverblik, effektivt sam...
Microsoft Next 2014 - Productivity session 5 - Projektoverblik, effektivt sam...
Microsoft
 
Cyber Security Conference - Velkommen & overblik over dagens indhold, v/ Tekn...
Cyber Security Conference - Velkommen & overblik over dagens indhold, v/ Tekn...Cyber Security Conference - Velkommen & overblik over dagens indhold, v/ Tekn...
Cyber Security Conference - Velkommen & overblik over dagens indhold, v/ Tekn...
Microsoft
 
Jenkins review buddy
Jenkins review buddyJenkins review buddy
Jenkins review buddy
Aske Olsson
 
Fokuser på din forretning med Office 365. Få de internationale erfaringer og ...
Fokuser på din forretning med Office 365. Få de internationale erfaringer og ...Fokuser på din forretning med Office 365. Få de internationale erfaringer og ...
Fokuser på din forretning med Office 365. Få de internationale erfaringer og ...
Microsoft
 
Hvordan Kunde 2.0 forandrede marketing, som vi kendte det
Hvordan Kunde 2.0 forandrede marketing, som vi kendte detHvordan Kunde 2.0 forandrede marketing, som vi kendte det
Hvordan Kunde 2.0 forandrede marketing, som vi kendte det
Microsoft
 
научная деятельность студента в вузе
научная деятельность студента в вузенаучная деятельность студента в вузе
научная деятельность студента в вузе
Виктор Крысов (Viktor Krysov)
 
Microsoft Next 2014 - Productivity session 5 - Projektoverblik, effektivt sam...
Microsoft Next 2014 - Productivity session 5 - Projektoverblik, effektivt sam...Microsoft Next 2014 - Productivity session 5 - Projektoverblik, effektivt sam...
Microsoft Next 2014 - Productivity session 5 - Projektoverblik, effektivt sam...
Microsoft
 
Group Brainstorming - Jason Mraz
Group Brainstorming - Jason MrazGroup Brainstorming - Jason Mraz
Group Brainstorming - Jason Mrazdannyhammond1
 
Business Insight 2014 - Små og store data - hvad kan de bruges til, hvordan f...
Business Insight 2014 - Små og store data - hvad kan de bruges til, hvordan f...Business Insight 2014 - Små og store data - hvad kan de bruges til, hvordan f...
Business Insight 2014 - Små og store data - hvad kan de bruges til, hvordan f...Microsoft
 
Salgsproduktivitet og effektiv sagsbehandling
Salgsproduktivitet og effektiv sagsbehandlingSalgsproduktivitet og effektiv sagsbehandling
Salgsproduktivitet og effektiv sagsbehandling
Microsoft
 
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...
Microsoft
 
Hvad kan en mobil forretningsapplikation tilføre til min forretning?
Hvad kan en mobil forretningsapplikation tilføre til min forretning?Hvad kan en mobil forretningsapplikation tilføre til min forretning?
Hvad kan en mobil forretningsapplikation tilføre til min forretning?
Microsoft
 
Смерть не умеет играть в футбол
Смерть не умеет играть в футболСмерть не умеет играть в футбол
Смерть не умеет играть в футбол
Виктор Крысов (Viktor Krysov)
 
Microsoft Danmark i tal
Microsoft Danmark i talMicrosoft Danmark i tal
Microsoft Danmark i tal
Microsoft
 
Tre danske virksomheders erfaringer med Office 365 - den konkrete forskel for...
Tre danske virksomheders erfaringer med Office 365 - den konkrete forskel for...Tre danske virksomheders erfaringer med Office 365 - den konkrete forskel for...
Tre danske virksomheders erfaringer med Office 365 - den konkrete forskel for...
Microsoft
 
Samspillet mellem mennesker, processer og teknologi
Samspillet mellem mennesker, processer og teknologiSamspillet mellem mennesker, processer og teknologi
Samspillet mellem mennesker, processer og teknologi
Microsoft
 

Viewers also liked (20)

CampusDays 2013 Intro
CampusDays 2013 IntroCampusDays 2013 Intro
CampusDays 2013 Intro
 
Velfærd for færre resourcer
Velfærd for færre resourcerVelfærd for færre resourcer
Velfærd for færre resourcer
 
Неизвестное об известном. Выпуск 2
Неизвестное об известном. Выпуск 2Неизвестное об известном. Выпуск 2
Неизвестное об известном. Выпуск 2
 
Cyber Security Conference - Rethinking cyber-threat
Cyber Security Conference - Rethinking cyber-threatCyber Security Conference - Rethinking cyber-threat
Cyber Security Conference - Rethinking cyber-threat
 
Microsoft Next 2014 - Productivity session 5 - Projektoverblik, effektivt sam...
Microsoft Next 2014 - Productivity session 5 - Projektoverblik, effektivt sam...Microsoft Next 2014 - Productivity session 5 - Projektoverblik, effektivt sam...
Microsoft Next 2014 - Productivity session 5 - Projektoverblik, effektivt sam...
 
Cyber Security Conference - Velkommen & overblik over dagens indhold, v/ Tekn...
Cyber Security Conference - Velkommen & overblik over dagens indhold, v/ Tekn...Cyber Security Conference - Velkommen & overblik over dagens indhold, v/ Tekn...
Cyber Security Conference - Velkommen & overblik over dagens indhold, v/ Tekn...
 
Jenkins review buddy
Jenkins review buddyJenkins review buddy
Jenkins review buddy
 
Fokuser på din forretning med Office 365. Få de internationale erfaringer og ...
Fokuser på din forretning med Office 365. Få de internationale erfaringer og ...Fokuser på din forretning med Office 365. Få de internationale erfaringer og ...
Fokuser på din forretning med Office 365. Få de internationale erfaringer og ...
 
Hvordan Kunde 2.0 forandrede marketing, som vi kendte det
Hvordan Kunde 2.0 forandrede marketing, som vi kendte detHvordan Kunde 2.0 forandrede marketing, som vi kendte det
Hvordan Kunde 2.0 forandrede marketing, som vi kendte det
 
научная деятельность студента в вузе
научная деятельность студента в вузенаучная деятельность студента в вузе
научная деятельность студента в вузе
 
Microsoft Next 2014 - Productivity session 5 - Projektoverblik, effektivt sam...
Microsoft Next 2014 - Productivity session 5 - Projektoverblik, effektivt sam...Microsoft Next 2014 - Productivity session 5 - Projektoverblik, effektivt sam...
Microsoft Next 2014 - Productivity session 5 - Projektoverblik, effektivt sam...
 
Group Brainstorming - Jason Mraz
Group Brainstorming - Jason MrazGroup Brainstorming - Jason Mraz
Group Brainstorming - Jason Mraz
 
Business Insight 2014 - Små og store data - hvad kan de bruges til, hvordan f...
Business Insight 2014 - Små og store data - hvad kan de bruges til, hvordan f...Business Insight 2014 - Små og store data - hvad kan de bruges til, hvordan f...
Business Insight 2014 - Små og store data - hvad kan de bruges til, hvordan f...
 
Salgsproduktivitet og effektiv sagsbehandling
Salgsproduktivitet og effektiv sagsbehandlingSalgsproduktivitet og effektiv sagsbehandling
Salgsproduktivitet og effektiv sagsbehandling
 
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...
 
Hvad kan en mobil forretningsapplikation tilføre til min forretning?
Hvad kan en mobil forretningsapplikation tilføre til min forretning?Hvad kan en mobil forretningsapplikation tilføre til min forretning?
Hvad kan en mobil forretningsapplikation tilføre til min forretning?
 
Смерть не умеет играть в футбол
Смерть не умеет играть в футболСмерть не умеет играть в футбол
Смерть не умеет играть в футбол
 
Microsoft Danmark i tal
Microsoft Danmark i talMicrosoft Danmark i tal
Microsoft Danmark i tal
 
Tre danske virksomheders erfaringer med Office 365 - den konkrete forskel for...
Tre danske virksomheders erfaringer med Office 365 - den konkrete forskel for...Tre danske virksomheders erfaringer med Office 365 - den konkrete forskel for...
Tre danske virksomheders erfaringer med Office 365 - den konkrete forskel for...
 
Samspillet mellem mennesker, processer og teknologi
Samspillet mellem mennesker, processer og teknologiSamspillet mellem mennesker, processer og teknologi
Samspillet mellem mennesker, processer og teknologi
 

Similar to Cyber Security Conference - Praktiske erfaringer med Implementering af Cyber Defense, v/ Seniorkonsulent Martin Kiær, Security & Infrastructure Business Lead

Ramnish Singh Platform Security Briefing
Ramnish Singh Platform Security BriefingRamnish Singh Platform Security Briefing
Ramnish Singh Platform Security Briefingguestb099f64c
 
Session 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry TessierSession 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry Tessier
CTE Solutions Inc.
 
Microsoft Security Development Lifecycle
Microsoft Security Development LifecycleMicrosoft Security Development Lifecycle
Microsoft Security Development Lifecycle
Razi Rais
 
Fundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and ComplianceFundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and Compliance
Vignesh Ganesan I Microsoft MVP
 
Secure the modern Enterprise
Secure the modern EnterpriseSecure the modern Enterprise
Secure the modern Enterprise
Microsoft Österreich
 
An introduction to Defender for Business
An introduction to Defender for BusinessAn introduction to Defender for Business
An introduction to Defender for Business
Robert Crane
 
Matthew Coles - Izar Tarandach - Security Toolbox
Matthew Coles - Izar Tarandach - Security ToolboxMatthew Coles - Izar Tarandach - Security Toolbox
Matthew Coles - Izar Tarandach - Security ToolboxSource Conference
 
Microsoft Platform Security Briefing
Microsoft Platform Security BriefingMicrosoft Platform Security Briefing
Microsoft Platform Security Briefingtechnext1
 
Foster Employee Engagement and Create a Digital Culture Through Microsoft Mod...
Foster Employee Engagement and Create a Digital Culture Through Microsoft Mod...Foster Employee Engagement and Create a Digital Culture Through Microsoft Mod...
Foster Employee Engagement and Create a Digital Culture Through Microsoft Mod...
David J Rosenthal
 
Transforming your Security Products at the Endpoint
Transforming your Security Products at the EndpointTransforming your Security Products at the Endpoint
Transforming your Security Products at the Endpoint
Ivanti
 
Continuous Delivery to Azure with VSTS
Continuous Delivery to Azure with VSTSContinuous Delivery to Azure with VSTS
Continuous Delivery to Azure with VSTS
Solidify
 
Azure security and Compliance
Azure security and ComplianceAzure security and Compliance
Azure security and Compliance
Karina Matos
 
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS BuildersAWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
James Strong
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 Overview
David J Rosenthal
 
Daniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity storyDaniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity story
Microsoft Österreich
 
Azure Refresh 2015 - KeyNote - DotNetLombardia
Azure Refresh 2015 - KeyNote - DotNetLombardiaAzure Refresh 2015 - KeyNote - DotNetLombardia
Azure Refresh 2015 - KeyNote - DotNetLombardia
Marco Parenzan
 
Microsoft Sentinel and Its Components.pptx
Microsoft Sentinel and Its Components.pptxMicrosoft Sentinel and Its Components.pptx
Microsoft Sentinel and Its Components.pptx
Infosectrain3
 
Security Process in DevSecOps
Security Process in DevSecOpsSecurity Process in DevSecOps
Security Process in DevSecOps
Opsta
 
This project is broken up into Windows and Mac versions lis.pdf
This project is broken up into Windows and Mac versions lis.pdfThis project is broken up into Windows and Mac versions lis.pdf
This project is broken up into Windows and Mac versions lis.pdf
adinathfashion1
 
Introduction to graph services
Introduction to graph servicesIntroduction to graph services
Introduction to graph services
Dipti Chhatrapati
 

Similar to Cyber Security Conference - Praktiske erfaringer med Implementering af Cyber Defense, v/ Seniorkonsulent Martin Kiær, Security & Infrastructure Business Lead (20)

Ramnish Singh Platform Security Briefing
Ramnish Singh Platform Security BriefingRamnish Singh Platform Security Briefing
Ramnish Singh Platform Security Briefing
 
Session 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry TessierSession 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry Tessier
 
Microsoft Security Development Lifecycle
Microsoft Security Development LifecycleMicrosoft Security Development Lifecycle
Microsoft Security Development Lifecycle
 
Fundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and ComplianceFundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and Compliance
 
Secure the modern Enterprise
Secure the modern EnterpriseSecure the modern Enterprise
Secure the modern Enterprise
 
An introduction to Defender for Business
An introduction to Defender for BusinessAn introduction to Defender for Business
An introduction to Defender for Business
 
Matthew Coles - Izar Tarandach - Security Toolbox
Matthew Coles - Izar Tarandach - Security ToolboxMatthew Coles - Izar Tarandach - Security Toolbox
Matthew Coles - Izar Tarandach - Security Toolbox
 
Microsoft Platform Security Briefing
Microsoft Platform Security BriefingMicrosoft Platform Security Briefing
Microsoft Platform Security Briefing
 
Foster Employee Engagement and Create a Digital Culture Through Microsoft Mod...
Foster Employee Engagement and Create a Digital Culture Through Microsoft Mod...Foster Employee Engagement and Create a Digital Culture Through Microsoft Mod...
Foster Employee Engagement and Create a Digital Culture Through Microsoft Mod...
 
Transforming your Security Products at the Endpoint
Transforming your Security Products at the EndpointTransforming your Security Products at the Endpoint
Transforming your Security Products at the Endpoint
 
Continuous Delivery to Azure with VSTS
Continuous Delivery to Azure with VSTSContinuous Delivery to Azure with VSTS
Continuous Delivery to Azure with VSTS
 
Azure security and Compliance
Azure security and ComplianceAzure security and Compliance
Azure security and Compliance
 
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS BuildersAWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 Overview
 
Daniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity storyDaniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity story
 
Azure Refresh 2015 - KeyNote - DotNetLombardia
Azure Refresh 2015 - KeyNote - DotNetLombardiaAzure Refresh 2015 - KeyNote - DotNetLombardia
Azure Refresh 2015 - KeyNote - DotNetLombardia
 
Microsoft Sentinel and Its Components.pptx
Microsoft Sentinel and Its Components.pptxMicrosoft Sentinel and Its Components.pptx
Microsoft Sentinel and Its Components.pptx
 
Security Process in DevSecOps
Security Process in DevSecOpsSecurity Process in DevSecOps
Security Process in DevSecOps
 
This project is broken up into Windows and Mac versions lis.pdf
This project is broken up into Windows and Mac versions lis.pdfThis project is broken up into Windows and Mac versions lis.pdf
This project is broken up into Windows and Mac versions lis.pdf
 
Introduction to graph services
Introduction to graph servicesIntroduction to graph services
Introduction to graph services
 

Recently uploaded

Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 

Recently uploaded (20)

Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 

Cyber Security Conference - Praktiske erfaringer med Implementering af Cyber Defense, v/ Seniorkonsulent Martin Kiær, Security & Infrastructure Business Lead

  • 1.
  • 2.
  • 3. Microsoft Services –Sikkerhedsløsninger Strategiske Assessments Løsninger Dynamic Identity Framework Assessment Microsoft Security Risk Assessment Intro One Microsoft Security ServicesOverblik One Microsoft Security Services Workshop Active Directory Self Service Migration Service Access Enablement Gateway and Identity Service (AEGIS) Data Protection using Active Directory Rights Management Services Design and Implementation for Active Directory Enterprise Identity Management using Microsoft Identity Manager Office 365 FIM Connector for Windows Azure Active Directory Enterprise Federated Identity using Active Directory Federation Services Seamless Secure Access using DirectAccess Enterprise Mobility POC Strong Authentication using Smartcards Public Key Infrastructure using Microsoft Active Directory Certificate Services (PKI 2012) Group Management using Microsoft Identity Manager Full Volume Encryption using Windows BitLocker Drive Encryption Network Isolation Services Self Service Password Management Persistent Advisory Detection Service (PADS) Windows XP migration Jumpstart Security Health Check Security Error Reporting and Analysis (SERA) Software Update Management Software Update Management Process Service Map SUM Tech Extension –Windows Server SUM Tech Extension –Windows Client Enhanced Security Administrative Environment (ESAE) Securing Lateral Account Movement (SLAM) Side by Side Remediation Active Directory Security Assessment Security Development Lifecycle (SDL) Maturity Assessment SDL Training ADSRaaS Incident Response & Recovery (IR&R) Information Protection using Hybrid RMS
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9. Microsoft Security Guidance (gode korte forklaringer og links der omhandler en masse sikkerheds discipliner) http://technet.microsoft.com/en-us/library/cc184906.aspx En række artikler om nogle af de bedste gratis sikkerhedsværktøjer fra Microsoft Part 1:Microsoft’s Free Security Tools –Series IntroductionPart 2:Microsoft’s Free Security Tools –Attack Surface AnalyzerPart 3:Microsoft’s Free Security Tools –Enhanced Mitigation Experience ToolkitPart 4:Microsoft’s Free Security Tools –BinScopeBinary AnalyzerPart 5:Microsoft’s Free Security Tools –Threat ModelingPart 6:Microsoft’s Free Security Tools –banned.hPart 7:Microsoft’s Free Security Tools –Windows Defender OfflinePart 8:Microsoft’s Free Security Tools –PortqryPart 9:Microsoft’s Free Security Tools –SummaryPart 10:Microsoft’s Free Security Tools –Microsoft Baseline Security AnalyzerPart 11: Microsoft’s Free Security Tools –Microsoft Safety ScannerPart 12: Microsoft’s Free Security Tools –Anti-Cross-Site Scripting LibraryPart 13: Microsoft’s Free Security Tools –Microsoft Security Compliance Manager ToolPart 14: Microsoft’s Free Security Tools –URLScanSecurity ToolPart 15: Microsoft’s Free Security Tools –Microsoft Assessment and Planning Toolkit
  • 10. Hvis du tror, at teknologien kan løse dine sikkerhedsproblemer, så du forstår ikke problemerne og du forstår ikke teknologien. Bruce Schneier