How to plan your Modern Workplace Project - SPS Denver October 2018Ammar Hasayen
Join Ammar Hasayen as he speaks at the SharePoint Saturday Denver, Colorado - October 2018 about how big organizations should plan their modern workplace project. Learn how to get executive sponsorship, create clear vision, drive adoption, and adopt a success plan to maximize the impact of the modern workplace.
More at my blog post https://blog.ahasayen.com/speaking-at-sharepoint-saturday-denver-colorado
Secure Modern Workplace With Microsoft 365 Threat ProtectionAmmar Hasayen
Join me as I walk you through alll what Microsoft 365 has to offer to protect your business and organization. I am going to cover every security feature and how it fits in the big picture. Whether you are on-premises organization or migrating to the cloud, there is something for you to look at.
Follow me on twitter @ammarhasayen and connect on Linkedined https://www.linkedin.com/in/ammarhasayen
Here is the full blog post: https://blog.ahasayen.com/secure-modern-workplace-with-microsoft-365-advanced-threat-protection/
Virtual Data Center VDC - Azure Cloud Reference Architecture CRAAmmar Hasayen
The Virtual Data Center VDC is part of any Cloud Reference Architecture CRA and promotes for a balance between governance and developer agility, separation of duties and more. In this blog, you learn why to architect your data center in Azure with best practices and recommendation from Cloud Security Alliance CSA.
Microsoft EMS Enterprise Mobility and Security Architecture PosterAmmar Hasayen
Microsoft Cloud Security and Mobility Architecture Deep Dive showing Azure Active Directory, EMS, Azure Information Protection AIP, device management, DLP , CASB and more.
Poster. Full blog post:
https://blog.ahasayen.com/microsoft-cloud-security-approach/
UAE Microsoft MVPs - How To become Microsoft MVPAmmar Hasayen
Learn from UAE Microsoft MVPs tips on how to become a Microsoft Most Valuable Professional MVP as they share their personal MVP journeys and diversity of contributions.
How To Become Microsoft MVP in Arabic
https://youtu.be/pxhNIkBMWKU
How To Become Microsoft MVP Blog Post
https://blog.ahasayen.com/you-can-als...
A Typcal Microsoft MVP Journey
https://blog.ahasayen.com/how-to-beco...
How To Start Your Blog - Microsoft MVP Stories
https://blog.ahasayen.com/start-your-...
--------------------------------
Microsoft MVPs in this video:
--------------------------------
Ammar Hasayen @ammarhasayen
MVP Category: Microsoft Cloud and Data center
CISSP | CISM - Microsoft MVP | MCT
Public Speaker
Blogger https://blog.ahasayen.com
Pluralsight Author https://pluralsight.com/authors/ammar...
Book Author https://me.ahasayen.com/m365security
Youtuber http://YoutTube.com/AmmarHasayen
Ahmad Nabil
Website: https://itcalls.net/
From: Egypt
MVP Category: Microsoft Cloud and Data Center
James Toulman
From: United kingdom
MVP Category: Microsoft Azure
Igor Shastitko @iwalker2000
From: Slovakia
MVP Category: Microsoft Azure
Azure Infra Deployment, Management, Security and Automation. Worked at Microsoft for 10 years.
Usama Wahab
From: Pakistan
MVP Category: Microsoft Azure (Since 2011)
CTO @ Evolution | AI, ML, BI, Cloud Practitioner | Speaker | Blogger | Author | Trainer #FinTech
Website: https://Usmanwahabkhan.blogspot.com
Hatim Nagarwala @hatimnagarwala
From: India
MVP Category: Microsoft AI
Technology Lead @appsWave
Microsoft MVP in AI, Speaker, Mentor, Adventurer, Microsoft by beathing heart
Website: http://Hatim.im
Hasan Dimdik @HasanDimdik
From: Turkey
MVP Category: Microsoft Cloud and Data center
Senior Technology Engineer at Emirates NBD | CEH | MCT | MCSE | Speaker and Author
Satheshwaran Manoharan @sattzzz
From: India
MVP Category: Office Apps & Services
Microsoft MVP | Messaging and Virtualization Expert | Publisher of Azure365Pro.com
Website:http://Azure365pro.com
Discover how you can consume security services and products from Azure, and how you can use Azure services to protect not only cloud resources, but also on premise workloads.
The workplace is undergoing some fundamental changes. In this video, we will talk about the trends happening in the workplace, demographic changes, the Millennials arrival, and explore how we might be working in the future in a modern workplace.
WATCH THE RECORDING ON YOUTUBE HERE:
ACCESS THE BLOG POST HERE
https://blog.ahasayen.com/the-emerge-of-the-modern-workplace/
CONNECT @AmmarHasayen
Securing Governing and Protecting Your Office 365 InvestmentsChris Bortlik
Microsoft continues to invest in services and capabilities to help you protect, detect, and respond to a variety of emerging security and compliance needs for Office 365. Come to this session for an interactive scenario based whiteboard and demonstration of how you can implement comprehensive controls based on a variety of dimensions across the identity of the user; their location and device; and the application, service, and content they are accessing.
How to plan your Modern Workplace Project - SPS Denver October 2018Ammar Hasayen
Join Ammar Hasayen as he speaks at the SharePoint Saturday Denver, Colorado - October 2018 about how big organizations should plan their modern workplace project. Learn how to get executive sponsorship, create clear vision, drive adoption, and adopt a success plan to maximize the impact of the modern workplace.
More at my blog post https://blog.ahasayen.com/speaking-at-sharepoint-saturday-denver-colorado
Secure Modern Workplace With Microsoft 365 Threat ProtectionAmmar Hasayen
Join me as I walk you through alll what Microsoft 365 has to offer to protect your business and organization. I am going to cover every security feature and how it fits in the big picture. Whether you are on-premises organization or migrating to the cloud, there is something for you to look at.
Follow me on twitter @ammarhasayen and connect on Linkedined https://www.linkedin.com/in/ammarhasayen
Here is the full blog post: https://blog.ahasayen.com/secure-modern-workplace-with-microsoft-365-advanced-threat-protection/
Virtual Data Center VDC - Azure Cloud Reference Architecture CRAAmmar Hasayen
The Virtual Data Center VDC is part of any Cloud Reference Architecture CRA and promotes for a balance between governance and developer agility, separation of duties and more. In this blog, you learn why to architect your data center in Azure with best practices and recommendation from Cloud Security Alliance CSA.
Microsoft EMS Enterprise Mobility and Security Architecture PosterAmmar Hasayen
Microsoft Cloud Security and Mobility Architecture Deep Dive showing Azure Active Directory, EMS, Azure Information Protection AIP, device management, DLP , CASB and more.
Poster. Full blog post:
https://blog.ahasayen.com/microsoft-cloud-security-approach/
UAE Microsoft MVPs - How To become Microsoft MVPAmmar Hasayen
Learn from UAE Microsoft MVPs tips on how to become a Microsoft Most Valuable Professional MVP as they share their personal MVP journeys and diversity of contributions.
How To Become Microsoft MVP in Arabic
https://youtu.be/pxhNIkBMWKU
How To Become Microsoft MVP Blog Post
https://blog.ahasayen.com/you-can-als...
A Typcal Microsoft MVP Journey
https://blog.ahasayen.com/how-to-beco...
How To Start Your Blog - Microsoft MVP Stories
https://blog.ahasayen.com/start-your-...
--------------------------------
Microsoft MVPs in this video:
--------------------------------
Ammar Hasayen @ammarhasayen
MVP Category: Microsoft Cloud and Data center
CISSP | CISM - Microsoft MVP | MCT
Public Speaker
Blogger https://blog.ahasayen.com
Pluralsight Author https://pluralsight.com/authors/ammar...
Book Author https://me.ahasayen.com/m365security
Youtuber http://YoutTube.com/AmmarHasayen
Ahmad Nabil
Website: https://itcalls.net/
From: Egypt
MVP Category: Microsoft Cloud and Data Center
James Toulman
From: United kingdom
MVP Category: Microsoft Azure
Igor Shastitko @iwalker2000
From: Slovakia
MVP Category: Microsoft Azure
Azure Infra Deployment, Management, Security and Automation. Worked at Microsoft for 10 years.
Usama Wahab
From: Pakistan
MVP Category: Microsoft Azure (Since 2011)
CTO @ Evolution | AI, ML, BI, Cloud Practitioner | Speaker | Blogger | Author | Trainer #FinTech
Website: https://Usmanwahabkhan.blogspot.com
Hatim Nagarwala @hatimnagarwala
From: India
MVP Category: Microsoft AI
Technology Lead @appsWave
Microsoft MVP in AI, Speaker, Mentor, Adventurer, Microsoft by beathing heart
Website: http://Hatim.im
Hasan Dimdik @HasanDimdik
From: Turkey
MVP Category: Microsoft Cloud and Data center
Senior Technology Engineer at Emirates NBD | CEH | MCT | MCSE | Speaker and Author
Satheshwaran Manoharan @sattzzz
From: India
MVP Category: Office Apps & Services
Microsoft MVP | Messaging and Virtualization Expert | Publisher of Azure365Pro.com
Website:http://Azure365pro.com
Discover how you can consume security services and products from Azure, and how you can use Azure services to protect not only cloud resources, but also on premise workloads.
The workplace is undergoing some fundamental changes. In this video, we will talk about the trends happening in the workplace, demographic changes, the Millennials arrival, and explore how we might be working in the future in a modern workplace.
WATCH THE RECORDING ON YOUTUBE HERE:
ACCESS THE BLOG POST HERE
https://blog.ahasayen.com/the-emerge-of-the-modern-workplace/
CONNECT @AmmarHasayen
Securing Governing and Protecting Your Office 365 InvestmentsChris Bortlik
Microsoft continues to invest in services and capabilities to help you protect, detect, and respond to a variety of emerging security and compliance needs for Office 365. Come to this session for an interactive scenario based whiteboard and demonstration of how you can implement comprehensive controls based on a variety of dimensions across the identity of the user; their location and device; and the application, service, and content they are accessing.
Microsoft 365 is a complete, intelligent solution, including Office 365, Windows 10, and Enterprise Mobility + Security, that empowers everyone to be creative and work together, securely.
You can download the actual PowerPoint slides here:
https://1drv.ms/p/s!AoxWYcd83_57g1p93krrgqAm9yJ2
Connect with me on twitter:
https://twitter.com/ammarhasayen
About me: Ammar Hasayen - Microsoft MVP - https://ahasayen.com
Microsoft 365 Certification - How to become Enterprise Administrator ExpertAmmar Hasayen
Learn how to become Microsoft 365 Certified Enterprise Administrator Expert, what exams you should pass, and what is the best certification path for your specific job role and skill sets.
Microsoft is changing their exams and certification program and there are a lot of new set of certifications and exams that can be confusing to understand at first. I am going to save you time and effort and explain it all to you in this presentation.
After completing this presentation, you will have the knowledge necessary to choose your next exams and get your Microsoft 365 Certified Enterprise Administrator Expert badge.
In this presentation you are going to learn:
- Overview about the new Microsoft certification Program
- What are these new Badges (Fundamental, Associate and Expert)
- Which exams to take to get the Microsoft 365 Certified Enterprise Administrator Expert badge?
- Which certifications match you job role and years of experience.
Cloud Reference Architecture - Part 1 FoundationAmmar Hasayen
This presentation covers a practical approach for adopting and migrating on premises systems and applications to the Public Cloud. Based on a clear migration master plan, it helps companies and enterprises to be prepared for Cloud computing, what and how to successfully migrate or deploy systems on Cloud, preparing your IT organization with a sound Cloud Governance model, Security in the Cloud and how to reach the benefits of Cloud computing by automation and optimizing your cost and workloads.
Community IT CTO Matthew Eshleman reviews security fundamentals in Office 365. Small and medium sized nonprofits are in a great position to take advantage of the native security tools offered in Office 365.
This is the slide deck used on my webinar session titled " Fundamentals of Microsoft 365 security , Identity and Compliance" .You can find the recording of this webinar here : https://youtu.be/akrEnqK6Dsc
AsiaPac is the best Azure Cloud platform in Singapore. Azure Cloud provides efficient, stable, and extensible cloud services like computing, analytics, storage and networking.
https://bit.ly/2PerTDf
This is the slide deck of our session on " Building solutions with SPFx that work across SharePoint and Teams" at the SharePoint Saturday event in Bengaluru on Nov 30th , 2019
Microsoft 365 provides holistic security across these four aspects of security.
By helping enterprise businesses secure corporate data and manage risk in today’s mobile-first, cloud-first world Microsoft 365 enables customers to digitally transform by unifying user productivity and enterprise security tools into a single suite that enables the modern workplace.
Identity & Access Mgmt
Secure identities to reach zero trust
Threat Protection
Help stop damaging attacks with integrated and automated security
Information Protection
Protect sensitive information anywhere it lives
Security Management
Strengthen your security posture with insights and guidance
Office 365 Security - MacGyver, Ninja or Swat teamAntonioMaio2
Do you know the tools and tricks in your MacGyver kit for Office 365 Security? Would you consider yourself a Security Ninja, fully versed and prepared to take advantage of the Office 365 Security and Compliance Center?
Is your SWAT Team prepared to take down adversaries in worst-case scenarios? Join Antonio Maio, 5-time Microsoft MVP and 20-year security professional, as he reviews the recommended game plan to enable your inner MacGyver, execute tactical strikes like a Ninja and arm your team with information governance and security practices in use at global 100 companies. Through customer case studies and hands-on demonstrations of capabilities such as alerts, data loss prevention policies, activity audit logs, advanced security management and advanced threat protection, Antonio will show you the tools and tricks you need to effectively secure your information in Office 365.
Thr30117 - Securely logging to Microsoft 365Robert Crane
Getting access to your information in Microsoft 365 starts with logging in but is it secure as it could be? Understanding security options at the point of entry like MFA, Legacy Authentication and Conditional Access on all devices is critical to keeping information protected as it is not only you that is trying to log into your account these days! Learn what security technologies you can add at login and the best practices approaches to configuring and monitoring these. Security starts at the doorway to Microsoft 365 and simple configurations can greatly reduce your risks of unauthorised access. Come and learn what can be done.
Microsoft 365 Virtual 2020 Spain - Microsoft Graph Search APIAlberto Diaz Martin
Microsoft Graph es el núcleo de nuestros desarrollos en Microsoft 365 y como tal, nos ofrece direfentes endpoints para extender la plataforma. ¿Qué API tenemos para Microsoft Search?
En esta sesión, haremos un repaso a las capacidades de Microsoft Graph para usar Microsoft Search en nuestras aplicaciones, así como las posibilidades de extender Microsoft Search con nuestros propios conectores.
Secure Productive Enterprise from Microsoft and AtidanDavid J Rosenthal
Secure Productive Enterprise
The most trusted, secure, and productive way to work that brings together the best of Office 365, Enterprise Mobility + Security, and Windows 10 Enterprise.
Microsoft 365 is a complete, intelligent solution, including Office 365, Windows 10, and Enterprise Mobility + Security, that empowers everyone to be creative and work together, securely.
You can download the actual PowerPoint slides here:
https://1drv.ms/p/s!AoxWYcd83_57g1p93krrgqAm9yJ2
Connect with me on twitter:
https://twitter.com/ammarhasayen
About me: Ammar Hasayen - Microsoft MVP - https://ahasayen.com
Microsoft 365 Certification - How to become Enterprise Administrator ExpertAmmar Hasayen
Learn how to become Microsoft 365 Certified Enterprise Administrator Expert, what exams you should pass, and what is the best certification path for your specific job role and skill sets.
Microsoft is changing their exams and certification program and there are a lot of new set of certifications and exams that can be confusing to understand at first. I am going to save you time and effort and explain it all to you in this presentation.
After completing this presentation, you will have the knowledge necessary to choose your next exams and get your Microsoft 365 Certified Enterprise Administrator Expert badge.
In this presentation you are going to learn:
- Overview about the new Microsoft certification Program
- What are these new Badges (Fundamental, Associate and Expert)
- Which exams to take to get the Microsoft 365 Certified Enterprise Administrator Expert badge?
- Which certifications match you job role and years of experience.
Cloud Reference Architecture - Part 1 FoundationAmmar Hasayen
This presentation covers a practical approach for adopting and migrating on premises systems and applications to the Public Cloud. Based on a clear migration master plan, it helps companies and enterprises to be prepared for Cloud computing, what and how to successfully migrate or deploy systems on Cloud, preparing your IT organization with a sound Cloud Governance model, Security in the Cloud and how to reach the benefits of Cloud computing by automation and optimizing your cost and workloads.
Community IT CTO Matthew Eshleman reviews security fundamentals in Office 365. Small and medium sized nonprofits are in a great position to take advantage of the native security tools offered in Office 365.
This is the slide deck used on my webinar session titled " Fundamentals of Microsoft 365 security , Identity and Compliance" .You can find the recording of this webinar here : https://youtu.be/akrEnqK6Dsc
AsiaPac is the best Azure Cloud platform in Singapore. Azure Cloud provides efficient, stable, and extensible cloud services like computing, analytics, storage and networking.
https://bit.ly/2PerTDf
This is the slide deck of our session on " Building solutions with SPFx that work across SharePoint and Teams" at the SharePoint Saturday event in Bengaluru on Nov 30th , 2019
Microsoft 365 provides holistic security across these four aspects of security.
By helping enterprise businesses secure corporate data and manage risk in today’s mobile-first, cloud-first world Microsoft 365 enables customers to digitally transform by unifying user productivity and enterprise security tools into a single suite that enables the modern workplace.
Identity & Access Mgmt
Secure identities to reach zero trust
Threat Protection
Help stop damaging attacks with integrated and automated security
Information Protection
Protect sensitive information anywhere it lives
Security Management
Strengthen your security posture with insights and guidance
Office 365 Security - MacGyver, Ninja or Swat teamAntonioMaio2
Do you know the tools and tricks in your MacGyver kit for Office 365 Security? Would you consider yourself a Security Ninja, fully versed and prepared to take advantage of the Office 365 Security and Compliance Center?
Is your SWAT Team prepared to take down adversaries in worst-case scenarios? Join Antonio Maio, 5-time Microsoft MVP and 20-year security professional, as he reviews the recommended game plan to enable your inner MacGyver, execute tactical strikes like a Ninja and arm your team with information governance and security practices in use at global 100 companies. Through customer case studies and hands-on demonstrations of capabilities such as alerts, data loss prevention policies, activity audit logs, advanced security management and advanced threat protection, Antonio will show you the tools and tricks you need to effectively secure your information in Office 365.
Thr30117 - Securely logging to Microsoft 365Robert Crane
Getting access to your information in Microsoft 365 starts with logging in but is it secure as it could be? Understanding security options at the point of entry like MFA, Legacy Authentication and Conditional Access on all devices is critical to keeping information protected as it is not only you that is trying to log into your account these days! Learn what security technologies you can add at login and the best practices approaches to configuring and monitoring these. Security starts at the doorway to Microsoft 365 and simple configurations can greatly reduce your risks of unauthorised access. Come and learn what can be done.
Microsoft 365 Virtual 2020 Spain - Microsoft Graph Search APIAlberto Diaz Martin
Microsoft Graph es el núcleo de nuestros desarrollos en Microsoft 365 y como tal, nos ofrece direfentes endpoints para extender la plataforma. ¿Qué API tenemos para Microsoft Search?
En esta sesión, haremos un repaso a las capacidades de Microsoft Graph para usar Microsoft Search en nuestras aplicaciones, así como las posibilidades de extender Microsoft Search con nuestros propios conectores.
Secure Productive Enterprise from Microsoft and AtidanDavid J Rosenthal
Secure Productive Enterprise
The most trusted, secure, and productive way to work that brings together the best of Office 365, Enterprise Mobility + Security, and Windows 10 Enterprise.
Softwerx Microsoft 365 Security Webinar PresentationPatrick Leckie
We ran this webinar in October 2019 to provide a better understanding of the security settings and options that are included in your Microsoft 365 but may not be fully optimised to protect your businesses.
WHAT WE COVERED:
1. The Advanced Security Features In Microsoft 365, Office 365 And The EMS Portfolio
Understanding your current Microsoft security portfolio and better leveraging the features you’ve already paid for.
2. Securing Your Microsoft Environment
Critical considerations in securing your Microsoft cloud environment and why there isn’t a one size fit’s all solution to securing your business.
3. A Real World Business Case Study
The cloud offers simplified application development and delivery by providing infrastructure, platform and software services that are ready to use immediately. However, the major inhibitor for businesses has been concerns around security. IBM has simplified the typical method for approaching this problem. Whether you’re looking to employ infrastructure-as-a-service (IaaS), platform-as-a-service (PaaS) or software-as-a-service (SaaS), use the framework below when designing your solution. Each platform comes with certain built-in security qualities and lets you use add-ons on top of the platform to secure each workload.
Organizations that work with a variety of third-parties in a cloud-based environment are challenged with finding a scalable and elastic security solution, that also meets their partners’ regulations and remains easy-to-use. Barracuda delivers cloud-connected security to simplify your IT environment, and their Web Application Firewall is an elastic and scalable solution for AWS that adapts to and deters evolving threats in a cloud environment. Iris Solutions, a multi-national cloud based enterprise software provider, needed to secure their eSignature SaaS with a tool that facilitated elasticity and scalability to help streamline expansion into several different markets, while meeting the strict regulations they encountered. Register for our upcoming webinar to learn why Iris chose to integrate Barracuda Web Application Firewall with AWS Services, such as Amazon CloudWatch, AWS Elastic Load Balancing, and AWS Identity and Access Management, to overcome their challenge without slowing the pace of transactions.
Join us to learn:
• Best practices for securing web-facing applications on AWS
• The features and benefits of using Barracuda WAF on AWS to protect web-facing applications from targeted and automated attacks
• Insights on the flexible deployment options that Barracuda offers to best complement your AWS environment
Who Should Attend:
Directors, Security Managers, Security Engineers, Security Architects, IT System Administrators, System Administrators, IT Administrators, IT Managers, IT Architects, IT Security Engineers, Business Decision Makers
Securely Harden Microsoft 365 with Secure ScoreJoel Oleson
7 Ways to Harden and Secure Microsoft 365
1. Enable Secure Access for Users with Azure Active Directory MFA
2. Identify compromised identities or malicious insiders with Microsoft Defender for Identity
3. Protect and Encrypt Sensitive Data with Microsoft Information Protection
4. Manage and Protect Devices and with Secure Score for Devices
5. Prevent Unauthorized Access and Sharing with Cloud App security
6. Secure your Email and Files with Microsoft 365 Rights Management Policies and Defender for Microsoft 365
7. Use Intelligent Insights and Guidance to Strengthen Your Organizational security posture with Microsoft Secure Score
Sponsored by CoreView
“How do we operate as a multi-tenant environment while, from Microsoft’s perspective, on a single tenant? CoreView brought all of that to the table with the V-tenant capabilities. We can slice and dice administration into functional areas. We can have user managers, Teams managers, Teams administrators, or security administrators. All of those functions and feature sets are critical to the solution we have today”
SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with A...Scott Hoag
Securing Office 365 requires knowing more than your way around the Admin Center. With Office 365's heavy dependency on Azure Active Directory for authentication (and in some cases authorization) to Office 365 workloads, it is critical that you understand how users access your environment and how you can control that access.
In this session, we'll explore how you can secure your Office 365 tenant with Azure Active Directory, conditional access policies, and more.
One of the major concerns for most organizations considering cloud services is security in the cloud. Are you looking to secure your cloud environment or services, no matter what they may be – data, operating system, domain or applications from intrusion and vulnerabilities? Azure Active Directory is Microsoft's multi-tenant, cloud-based directory, and identity management service helping secure your cloud and on-premise environments.
In this presentation, we discussed Azure Active Directory (Azure AD) Identity Protection, Conditional Access, Identity Management which uses AI and machine learning capabilities to help secure your cloud environment – Office 365 and Azure. In this session, we discussed
Advanced features of Azure AD
Demonstrate the detection capabilities, and real-time prevention
October 2022 CIAOPS Need to Know WebinarRobert Crane
Recording of monthly Need to Know webinar for October 2022 that focused on providing a deep dive into Microsoft 365 security. The session also includes Microsoft Cloud news and updates along with an open Q and A session around Microsoft 365. Video recording is available at www.ciaopsacademy.com
Introduction to Microsoft Enterprise Mobility + SecurityAntonioMaio2
Microsoft has given us some amazing capabilities with the Microsoft Enterprise Mobility + Security (EM+S) suite to help protect both our information and our investments in Office 365. This collection of features gives you just about everything you need in the Microsoft Cloud for security, compliance and Information Protection. With such a vast array of services, tools and features, its often challenging to understand everything this product provides or how its layered on top of existing Office 365 security controls. In this session we’ll review the capabilities available to you in Microsoft EM+S, and you'll discover which ones may best fit with your security and compliance needs. Come and join us, as we also dive deep into some of the most useful Microsoft EM+ S tools.
December 2019 Microsoft 365 Need to Know WebinarRobert Crane
Slides from CIAOPS December 2019 webinar that provided Microsoft 365 news update, open Q & A as well as a focus session on security. Video recording is available at www.ciaopsacademy.com
Security and Compliance with SharePoint and Office 365Richard Harbridge
Whether you’re new to security and compliance in Office 365 or a seasoned veteran, we’ll have something for you in this session. Hear about Microsoft’s overall security story from Microsoft MVP Richard Harbridge, and better understand how it relates to SharePoint services, catch up on new developments over the past year, and learn about the new capabilities Microsoft provides. From advanced security management and threat intelligence to sensitive content encryption, governance and sharing there is plenty to discuss.
Cybersecurity Architect For Cooperatives Designs Multi-Factor Authentication ...RobinLilly5
If your business or cooperative is primarily cloud-based, Azure IAM wants to help design rigorous, adaptive access management and security systems for your network. To read more about what they may be able to do for you, visit https://azureiam.com/
Azure IAM, LLC P. O. Box 650685, Sterling, Virginia 20165, United States
Website https://azureiam.com
Email prc.pressagency@gmail.com
Similar to Microsoft 365 Threat Management and security - EMS E5 (20)
am going to introduce you to Azure Bastion in Microsoft Azure and teach you how to create your first Azure bastion host, connect to a virtual machine and work a virtual machine session.
Watch on YouTube
------------------------
https://youtu.be/8-_JPzdWe1I
In this presentation, you learn
---------------------------------------
- What is Azure Bastion and what is trying to achieve?
- How to create an Azure Bastion host.
- How to connect to a VM using Azure Bastion
- How to work with a virtual machine Session
View the full blog post here with all scripts
https://blog.ahasayen.com/introducing-azure-bastion/
Connect with me
----------------------------
About me: https://me.ahasayen.com
Blog: https://blog.ahasayen.com
Twitter: https://twitter.com/ammarhasayen
LinkedIn: https://www.linkedin.com/in/ammarhasayen
Instagram: https://www.instagram.com/ammarhasayen
SlideShare: https://www.slideshare.net/ammarhasayen
View my Pluralsight course : Implementing Azure AD Privileged Identity Management
https://www.pluralsight.com/courses/microsoft-azure-privileged-identity-management-implementing
Windows Advance Threats - BSides Amman 2019Ammar Hasayen
Learn how to hack Windows machines and reveal the password of the domain admin by hacking into the memory and Windows Services. This is Level 400 content with a lot of demos and it covers many security technologies like machine learning, post-breach defensive and pre-preach defensive controls.
I presented this session in the first BSides Security conference in Amman-Jordan and I am sharing the slides as requested by the audience.
I am also going to post the full video on my Youtube Channel: http://youtube.com/ammarhasayen , so, don't forget to subscribe.
I would like to hear your feedback on my session, so please connect with me on twitter @ammarhasayen and let me know what do you think.
About me: http://ahasayen.com
Blog: http://blog.ahasayen.com
Social Media (Twiiter, LinkedIn, Instagram): @ammarhasayen
Windows Advanced Threat and Defensive Technique
Microsoft cloud app security or CASB is a critical component of the Microsoft cloud security stack. It provides a comprehensive solution to give organizations improved visibility into cloud activities, uncover shadow IT, assess risks, enforce polices, investigate suspicious activities and stop threats
https://blog.ahasayen.com/microsoft-cloud-app-security-casb/
Office 365 periodic table in your PowerPoint presentation. This is not a picture, but built piece by piece so you can edit the writing and re-arrange blocks as you wish. [https://blog.ahasayen.com/the-modern-workplace-trends-solutions/]
All rights preserved to Matt Wade [https://techcommunity.microsoft.com/t5/Office-365/New-infographic-Periodic-Table-of-Office-365/td-p/68275]
Migrating your certification authority hashing algorithm from sha 1 to sha-2Ammar Hasayen
A practical guide on how to migrate your certification authority hashing algorithm from SHA-1 to SHA-2, and guidance on cryptographic providers, what makes your CA SHA-2 capable, and step by step guide with screenshots.
What is Strict KDC Validation and what risks does it mitigate? In this blog post, we will uncover how smart cards and digital certificates work with domain controllers (KDC), and how life looks like before introducing Strict KDC validation.
Modern Workplace Architecture Poster with Azure Active Directory , Intune, AIP, OMS, Windows 10, Office 365, Federation services and more. Full blog post here:
https://blog.ahasayen.com/microsoft-cloud-security-approach/
Exchange Online Protection EOP full architecture view showing the full EOP inspection pipeline in great details.
Full post can be found https://blog.ahasayen.com/eop-exchange-online-protection-architecture/
Microsoft 365 is a complete, intelligent solution, including Office 365, Windows 10, and Enterprise Mobility + Security, that empowers everyone to be creative and work together, securely.
This table shows the different header value used by Exchange Online Protection or EOP, and what each value means , and whether it is bypassing anti-spam filtering or not.
Blog Post:
https://blog.ahasayen.com/exchange-scl-and-eop-headers/
The journey to the cloud from business perspectiveAmmar Hasayen
I will be talking about how business are approaching the cloud and how this journey to the cloud looks like from technology, employees, and IT perspectives.
https://blog.ahasayen.com/journey-cloud-business-perspective/
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
7. Windows Defender
ATP
Signals from hundreds of
millions of customers
Microsoft Edge and
Internet Explorer
8B internet downloads
Office 365
400B emails analyzed
Bing
18B web pages scanned
Microsoft Intelligent Security Graph
12. RESTRICT
HERE
CONDITIONAL ACCESS
Allow access
Or
Block access
Actions
Enforce MFA
per user/per
app
IDENTITY DRIVEN SECURITY : NEW FIREWALL
USER
[Group Membership]
DEVICE STATE
Registered, Managed by Intune, Compliant,
domain joined,...
APPLICATION
What application? Business Sensitivity
NETWORK LOCATION
Inside Corporate, Outside Corporate
RISK SCORE [IDENTITY PROTECTION]
User at risk, session at risk?
AzureADConditional Access
13. AzureADIdentity Protection
PROTECT
AT THIS LAYER
IDENTITY PROTECTION
Securityreporting and
monitoring(access & usage)
Behavioral analytics
Anomaly detection
Microsoft Azure
18. Information Protection
Data
Data leaks
DATA LAYER
DATA
Azure Information Protection
Classify& Label
Protect
How do I control data
on-premises and in
the cloud
Monitor and Respond
Prevent data leakage
How do I prevent data
leakage from my
mobile apps?
Audit and Reports
DLP for Office 365 mobile apps
Mobile App Policies
20. Multi-Tier Threat Protection
Windows Defender Security Center
Windows Defender ATP
Office 365 ATP
Office 365 Threat Explorer
Azure Advanced Threat Protection