Home
%3CLINGO-SUB%20id%3D%22lingo-sub-117687%22%20slang%3D%22en-US%22%3EIgnite%202017%3A%20Interesting%20Windows%20Defender%20ATP%20Training%20Sessions%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-117687%22%20slang%3D%22en-US%22%3E%3CUL%3E%0A%3CLI%3ESessions%201-6%3A%26nbsp%3B%20core%20Windows%20Defender%20ATP%20-%20overview%2C%20detect%20investigate%20and%20respond%3C%2FLI%3E%0A%3CLI%3ESessions%207-9%3A%26nbsp%3B%20the%20rest%20of%20Win10%20security%20stack%20technologies%20surfaced%20by%20WDATP%3C%2FLI%3E%0A%3CLI%3ESession%2010-11%3A%20background%20about%20indicators%20of%20attack%20and%20Microsoft%20red%20team.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CTABLE%20width%3D%22780%22%3E%0A%3CTBODY%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2227%22%3E%3CP%3E%3CSTRONG%3E%23%3C%2FSTRONG%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22167%22%3E%3CP%3E%3CSTRONG%3ESession%20title%3C%2FSTRONG%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22442%22%3E%3CP%3E%3CSTRONG%3EAbstract%3C%2FSTRONG%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22144%22%3E%3CP%3E%3CSTRONG%3ESpeakers%3C%2FSTRONG%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2227%22%3E%3CP%3E%3CSPAN%3E1%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22167%22%3E%3CP%3EDrill%20down%3A%20What's%20new%20in%20the%20Fall%20Creators%20Update%20for%20Windows%20Defender%20ATP%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22442%22%3E%3CP%3E%3CSPAN%3EWith%20the%20Fall%20Creators%20Update%2C%20Windows%20Defender%20ATP%20unifies%20your%20endpoint%20security%20stack%2C%20by%20putting%20Windows%2010%20threat%20%26amp%3B%20exploit%20protection%20and%20EDR%20under%20one%20roof.%20You%20have%20a%20single%20console%20to%20centrally%20manage%20your%20end-to-end%20security%20management%20lifecycle%20from%20Security%20Operations%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22144%22%3E%3CP%3E%3CSPAN%3EHeike%20Ritter%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EThorsten%20Henking%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2227%22%3E%3CP%3E%3CSPAN%3E2%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22167%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DIg0v9fIz7Fk%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3EWindows%20Defender%20ATP%20machine%20learning%3A%20Detecting%20new%20and%20unusual%20breach%20activity%3C%2FA%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22442%22%3E%3CP%3E%3CSPAN%3EMicrosoft%20invests%20in%20next-gen%20security%20to%20protect%20from%20malicious%20downloads%20and%20targeted%20threats%20by%20consolidating%20data%20and%20building%20systems%20that%20learn%20from%20data.%20These%20machine%20learning%20(ML)%20systems%20flag%20and%20surface%20threats%20that%20may%20go%20unnoticed.%20By%20augmenting%20human%20analysis%2C%20ML%20drives%20an%20antimalware%20evolution%20with%20SmartScreen%20and%20Windows%20Defender%20Antivirus%2C%20providing%20real-time%20detection%20of%20unknown%2C%20polymorphic%20malware.%20%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22144%22%3E%3CP%3E%3CSPAN%3EChristian%20Seifert%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EHolly%20Stewart%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EShay%20Kels%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2227%22%3E%3CP%3E%3CSPAN%3E3%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22167%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3D-P8fkyIsc7g%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3EInvestigate%20and%20shut%20down%20attacks%20more%20precisely%20than%20ever%20before%20with%20Windows%20Defender%20ATP%3C%2FA%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22442%22%3E%3CP%3E%3CSPAN%3EAttacks%20are%20getting%20more%20and%20more%20sophisticated%20-%20what%20you%20want%20is%20a%20single%20solution%20that%20helps%20you%20with%20the%20right%20detections%20and%20comes%20with%20all%20the%20tools%20you%20need%20to%20hunt%20them%20down!%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22144%22%3E%3CP%3E%3CSPAN%3ERaviv%20Tamir%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2227%22%3E%3CP%3E%3CSPAN%3E4%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22167%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DnM3BOwjymG4%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAutomated%20response%20with%20Windows%20Defender%20ATP%3C%2FA%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22442%22%3E%3CP%3E%3CSPAN%3EWith%20the%20advanced%20detection%20capabilities%20of%20Windows%20Defender%20ATP%2C%20customers%20have%20more%20visibility%20into%20threats%20than%20ever%20before.%20While%20visibility%20is%20tremendously%20important%2C%20security%20teams%20still%20struggle%20to%20follow%20up%20on%20the%20alerts%20they%20see%20manually...until%20now%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22144%22%3E%3CP%3E%3CSPAN%3ENathan%20Burke%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EHeike%20Ritter%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2227%22%3E%3CP%3E%3CSPAN%3E5%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22167%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DrWxvRria64E%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3EWindows%20Defender%20ATP%20now%20extends%20beyond%20Windows%20clients%3C%2FA%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22442%22%3E%3CP%3E%3CSPAN%3EDid%20you%20ever%20dream%20of%20having%20full%20visibility%20into%20whats%20happening%20across%20all%20your%20endpoints%3F%20Your%20dream%20comes%20true!%20With%20the%20next%20Windows%2010%20Update%2C%20Windows%20Defender%20ATP%20provides%20you%20with%20more%20signals%20across%20your%20network%2C%20by%20adding%20support%20for%20additional%20platforms.%20%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22144%22%3E%3CP%3E%3CSPAN%3ERaviv%20Tamir%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2227%22%3E%3CP%3E%3CSPAN%3E6%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22167%22%3E%3CP%3EHow%20Microsoft%20uses%20Windows%20Defender%20ATP%3A%20Welcome%20to%20a%20SecOps%20world%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22442%22%3E%3CP%3E%3CSPAN%3ECome%20and%20see%20how%20Microsoft%20IT%20uses%20Windows%20Defender%20Advanced%20Threat%20Protection%20(ATP)%20-%20day%20in%2C%20day%20out%2C%20to%20protect%2C%20detect%20and%20investigate%20threats%2C%20and%20respond%20to%20suspicious%20activities%20on%20endpoints.%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22144%22%3E%3CP%3E%3CSPAN%3EBrian%20Hooper%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2227%22%3E%3CP%3E%3CSPAN%3E7%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22167%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DC0JwCk-qnfk%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3ENext-gen%20preventative%20protection%20with%20Windows%20Defender%20Advanced%20Threat%20Protection%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22442%22%3E%3CP%3E%3CSPAN%3EOur%20customers%20are%20facing%20a%20difficult%20threat%20landscape%2C%20one%20where%20if%20you're%20targeted%20by%20a%20sophisticated%20attacker%2C%20they%20very%20likely%20will%20be%20able%20to%20compromise%20a%20device%20or%20maybe%20your%20entire%20network.%20Today's%20solutions%20are%20helping%20but%20they%20are%20nowhere%20near%20complete.%20With%20Windows%20Defender%20Advanced%20Threat%20Protection%20(ATP)%20we%20will%20offer%20a%20fully%20integrated%20and%20manageable%20solution%20that%20blurs%20the%20lines%20between%20endpoint%20protection%20(EPP)%20and%20endpoint%20detection%20and%20response%20(EDR)%20and%20raises%20the%20bar%20for%20security%20to%20a%20new%20level%20that%20hasn't%20been%20reached%20by%20today's%20solutions.%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22144%22%3E%3CP%3E%3CSPAN%3EChris%20Hallum%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%5Bfocus%20on%3A%20Windows%20Defender%20App%20Guard%2C%20App%20Control%2C%20Device%20Guard%2C%20Exploit%20Guard%20and%20AV%20technologies%5D%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2227%22%3E%3CP%3E%3CSPAN%3E8%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22167%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DABuFjGBbyWA%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3EWindows%20Defender%20Exploit%20Guard%3A%20Reducing%20the%20Attack%20Surface%20while%20balancing%20productivity%20%26amp%3B%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22442%22%3E%3CP%3E%3CSPAN%3EWindows%20Defender%20Exploit%20Guard%20enables%20enterprise%20admins%20to%20smartly%20manage%20the%20configuration%20and%20behaviors%20of%20the%20operating%20system%20and%20their%20applications%2C%20thereby%20limiting%20the%20attack%20surface%20of%20their%20apps%20and%20the%20OS%2C%20stopping%20exploits%2Fraising%20the%20cost%20for%20exploitation%2C%20and%20containing%20damage.%20%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22144%22%3E%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2227%22%3E%3CP%3E%3CSPAN%3E9%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22167%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DsxlClPvYED8%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3ENext-Gen%20AV%3A%20Windows%20Defender%20Antivirus%20unleashed%3C%2FA%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22442%22%3E%3CP%3E%3CSPAN%3EWindows%20Defender%20Antivirus%20is%20a%20next-gen%20enterprise-grade%20antivirus%20solution%2C%20built%20into%20Windows.%20WD%20AV%20uses%20the%20power%20of%20the%20cloud%2C%20wide%20optics%2C%20machine%20learning%2C%20and%20behavior%20analysis%20to%20rapidly%20respond%20to%20emerging%2C%20sophisticated%20threats%20and%20protect%20your%20devices%20against%20them.%20Come%20and%20learn%20everything%20you%20need%20to%20know%20about%20Windows%20Defender%20AV.%20%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22144%22%3E%3CP%3E%3CSPAN%3EAmitai%20Rottem%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2227%22%3E%3CP%3E%3CSPAN%3E10%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22167%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DIjz7NHF3l28%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3EYour%20attacker%20thinks%20like%20my%20attacker%3A%20A%20common%20threat%20model%20to%20create%20better%20defense%3C%2FA%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22442%22%3E%3CP%3E%3CSPAN%3EFor%20the%20last%20decade%2C%20the%20security%20industry%20has%20been%20focusing%20on%20enumerating%20indicators%20of%20attacks%2C%20rather%20than%20invariant%20techniques.%20Recently%2C%20defenders%20realized%20that%20the%20key%20to%20better%20detections%20is%20the%20deep%20knowledge%20of%20the%20individual%20ammunitions%20which%20combined%20together%20makes%20a%20successful%20attack%20across%20the%20entire%20kill%20chain.%20In%20this%20talk%2C%20we'll%20deep%20dive%20into%20examples%20of%20common%20attacker%20techniques%20and%20show%20how%20measurable%20knowledge%20of%20such%20techniques%20can%20be%20used%20to%20improve%20detection%2C%20design%20of%20networks%20and%20fuel%20security%20products%20like%20WDATP.%20%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22144%22%3E%3CP%3E%3CSPAN%3EElia%20Florio%20research%20lead%2C%20WDATP%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EJessica%20Payne%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2227%22%3E%3CP%3E%3CSPAN%3E11%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22167%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DCClpjtgaJVI%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3ERed%20Teaming%20Windows%3A%20Building%20a%20better%20Windows%20by%20hacking%20it%3C%2FA%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22442%22%3E%3CP%3E%3CSPAN%3EFor%20generations%20of%20Windows%20releases%20we've%20relied%20on%20the%20Security%20Development%20Lifecycle%20(SDL)%2C%20Threat%20Modeling%2C%20and%20other%20processes%20to%20help%20identify%20security%20weaknesses%20in%20our%20designs%20and%20implementations%20and%20now%20with%20Windows%2010%20we've%20added%20another%20key%20tactic%20to%20our%20approach%20which%20is%20to%20use%20Red%20Team%20tactics.%20This%20process%20which%20started%20in%20Windows%208%20has%20been%20scaled%20out%20and%20has%20become%20central%20to%20our%20engineering%20process.%20Come%20join%20us%20to%20learn%20how%20the%20Windows%20Red%20Team%20helps%20us%20build%20a%20better%20Windows%20by%20hacking%20it!%20%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22144%22%3E%3CP%3E%3CSPAN%3EDavid%20Weston%20%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3C%2FTBODY%3E%0A%3C%2FTABLE%3E%3C%2FLINGO-BODY%3E
Microsoft
  • Sessions 1-6:  core Windows Defender ATP - overview, detect investigate and respond
  • Sessions 7-9:  the rest of Win10 security stack technologies surfaced by WDATP
  • Session 10-11: background about indicators of attack and Microsoft red team.

#

Session title

Abstract

Speakers

1

Drill down: What's new in the Fall Creators Update for Windows Defender ATP

With the Fall Creators Update, Windows Defender ATP unifies your endpoint security stack, by putting Windows 10 threat & exploit protection and EDR under one roof. You have a single console to centrally manage your end-to-end security management lifecycle from Security Operations

Heike Ritter

 

Thorsten Henking

2

Windows Defender ATP machine learning: Detecting new and unusual breach activity

Microsoft invests in next-gen security to protect from malicious downloads and targeted threats by consolidating data and building systems that learn from data. These machine learning (ML) systems flag and surface threats that may go unnoticed. By augmenting human analysis, ML drives an antimalware evolution with SmartScreen and Windows Defender Antivirus, providing real-time detection of unknown, polymorphic malware.

Christian Seifert

 

Holly Stewart

 

Shay Kels

3

Investigate and shut down attacks more precisely than ever before with Windows Defender ATP

Attacks are getting more and more sophisticated - what you want is a single solution that helps you with the right detections and comes with all the tools you need to hunt them down!

Raviv Tamir

4

Automated response with Windows Defender ATP

With the advanced detection capabilities of Windows Defender ATP, customers have more visibility into threats than ever before. While visibility is tremendously important, security teams still struggle to follow up on the alerts they see manually...until now

Nathan Burke

 

Heike Ritter

5

Windows Defender ATP now extends beyond Windows clients

Did you ever dream of having full visibility into whats happening across all your endpoints? Your dream comes true! With the next Windows 10 Update, Windows Defender ATP provides you with more signals across your network, by adding support for additional platforms.

Raviv Tamir

6

How Microsoft uses Windows Defender ATP: Welcome to a SecOps world

Come and see how Microsoft IT uses Windows Defender Advanced Threat Protection (ATP) - day in, day out, to protect, detect and investigate threats, and respond to suspicious activities on endpoints.

Brian Hooper

7

Next-gen preventative protection with Windows Defender Advanced Threat Protection

 

Our customers are facing a difficult threat landscape, one where if you're targeted by a sophisticated attacker, they very likely will be able to compromise a device or maybe your entire network. Today's solutions are helping but they are nowhere near complete. With Windows Defender Advanced Threat Protection (ATP) we will offer a fully integrated and manageable solution that blurs the lines between endpoint protection (EPP) and endpoint detection and response (EDR) and raises the bar for security to a new level that hasn't been reached by today's solutions. 

Chris Hallum

[focus on: Windows Defender App Guard, App Control, Device Guard, Exploit Guard and AV technologies]

8

Windows Defender Exploit Guard: Reducing the Attack Surface while balancing productivity &

 

Windows Defender Exploit Guard enables enterprise admins to smartly manage the configuration and behaviors of the operating system and their applications, thereby limiting the attack surface of their apps and the OS, stopping exploits/raising the cost for exploitation, and containing damage.

 

9

Next-Gen AV: Windows Defender Antivirus unleashed

Windows Defender Antivirus is a next-gen enterprise-grade antivirus solution, built into Windows. WD AV uses the power of the cloud, wide optics, machine learning, and behavior analysis to rapidly respond to emerging, sophisticated threats and protect your devices against them. Come and learn everything you need to know about Windows Defender AV.

 

Amitai Rottem

10

Your attacker thinks like my attacker: A common threat model to create better defense

For the last decade, the security industry has been focusing on enumerating indicators of attacks, rather than invariant techniques. Recently, defenders realized that the key to better detections is the deep knowledge of the individual ammunitions which combined together makes a successful attack across the entire kill chain. In this talk, we'll deep dive into examples of common attacker techniques and show how measurable knowledge of such techniques can be used to improve detection, design of networks and fuel security products like WDATP.

Elia Florio research lead, WDATP

 

Jessica Payne

11

Red Teaming Windows: Building a better Windows by hacking it

For generations of Windows releases we've relied on the Security Development Lifecycle (SDL), Threat Modeling, and other processes to help identify security weaknesses in our designs and implementations and now with Windows 10 we've added another key tactic to our approach which is to use Red Team tactics. This process which started in Windows 8 has been scaled out and has become central to our engineering process. Come join us to learn how the Windows Red Team helps us build a better Windows by hacking it!

David Weston