[CRSP] Taking your security operations to the next level

Microsoft

Add to calendar:
Aug 17th, 2022: 14:00 – 15:00 PM AEST     Click to Register 

Click here to check your local time. 

 

Are you leveraging your security tools correctly? How does your process look from detection to action? Are you focusing on the areas that matter?

 

Surprisingly, there is a lot you can do with a limited budget, the key is knowing how to leverage your processes and tooling.

 

Join Samuel Soto and Chitresh Pandit, security consultants from the Compromise Recovery Security Practice, as they discuss the ways in which you can effectively conduct security operations. The value of different security operations perspectives can't be stressed enough, this is a session you cannot afford to miss.

 

#technology #cybersecurity #compromiserecovery #hardening #microsoftadvocate

1 Reply
Thank you all for participating in the live event. Please find the Q&A list below: 1. is the Defender for Identity part of Level1 frontline detection which pass the signals to Sentinel to act on? Defender for identity is a security tool that works like other tools at level 1, an agent that focuses on detection at the device level. The only difference is that defender for identity main intent is not to block these attacks using the agent, but to provide higher visibility on these types of attacks and their success. As such, one should treat it like a level 1 tool and have personnel that learn not only to understand the information it provides, but also how to securely configure and trouble it if issues arise. More information can be found at: https://docs.microsoft.com/en-us/defender-for-identity/what-is Please feel free to post any additional queries you may have, thanks!