Azure Sentinel: Enabling Entity Behavior Analytics | Hunting for Insider ThreatsFeatured
Azure Sentinel Webinar: KQL part 3 -Optimizing Azure Sentinel KQL queries performance
|Presenter: Ofer Shezaf
Description: Azure Sentinel query language is fast. But you can make it faster. Want to make your workbooks faster? Your hunting experience snappier?
Ensure no time outs in your alert rules? In this webinar, we will go over a few simple rules-of-thumb and tips to accelerate your KQL queries. We will also learn how to test your queries’ performance and see the impact of those changes.
Azure Sentinel Webinar:
Empowering the Azure Sentinel Community with Pre-Recorded Datasets for research and training purposes
|Presenter: Roberto Rodriguez
Description: As a defensive security practitioner, researching a new technique used by real threat actors to compromise an environment is not as simple as copying, pasting, and running a query. Besides learning about the internals of a technique and ways how it can be executed, eventually, one would need to simulate it. As you may already know, the simulation process takes time and preparation, and usually, the time spent trying to generate data is higher than actually analyzing data. Besides, once you have data, what can you do with it?
Microsoft Defender Advanced Threat Protection: Get started with Microsoft Defender ATP, from zero to hero
|Presenter: John Nieves & Steve Newby
Description: Are you ready to hit the ground running with the industry’s leading endpoint security platform – Microsoft Defender ATP? Join this webinar to go from zero to hero in your deployment! During this session, we will take a new Microsoft Defender ATP subscription and walk you through the process of setting up the tenant and its basic settings such as configuring the tenant, tags, groups, and RBAC. Then we will show you how to on-board various endpoints and configure base-line policies (using Microsoft Endpoint Manager). Finally, we will have a deeper look into the configuration options of features and show you how to get your endpoints protected with Microsoft Defender ATP as quickly as possible. We’re looking forward to having you join us!
MITRE ATT&CK for ICS: CyberX Demo and Azure IoT/OT Security Deep Dive
|Presenter: Phil Neray & Joe DiPietro
Description: MITRE ATT&CK for ICS is a standard framework for understanding the diverse tactics adversaries use to compromise industrial control system (ICS) and operational technology (OT) networks. Unlike ATT&CK for Enterprise, ATT&CK for ICS focuses on adversaries whose primary goal is causing safety incidents, shutting down production, or stealing intellectual property such as proprietary formulas. CyberX, which was recently acquired by Microsoft, is composed of IoT/OT security experts who developed an agentless security platform for IoT/OT providing continuous IoT/OT asset visibility, vulnerability management, and threat monitoring.
Azure Sentinel: Enabling Entity Behavior Analytics | Hunting for Insider Threats
|Presenter: Itay Argoety
Description: Learn how to enable Sentinel Behavior Analytics in just two clicks and hunt for insider threats and compromised users leveraging Behavior Analytics.
Unleash your Azure Sentinel automation Jedi tricks and build Logic Apps Playbooks like a Boss
|Presenter: Tiander Turpijn
Description: In this webinar I will be sharing tips and tricks how to create automation Playbooks in Azure Sentinel to more effectively manage incidents and external data sources.
Azure Security Center: VM Protection
|Presenter: Aviv Mor
Description: Learn how to better protect your virtual machines using Azure Security Center.
Azure Security Center: Azure Service Layers protection
|Presenter: Tal Rosler
Description: In this webinar we will present new threat protection suites in Azure Security Center to protect cloud-native workloads.
Cybersecurity Basics: Securing Yourself
|Presenter: Andrew Baze
Description: To stay safe online, one of the best things you can do is stay educated. Join us to learn some quick and simple techniques to secure yourself and your family from the most common and dangerous Internet security threats.