Welcome to the Security Community webinar calendar!
Please note that the registration links will be made available approximately two weeks before the webinar. Until then, all dates are tentative. Recordings of previous webinars are below. Want to join our email list to be notified about future webinars? Visit https://aka.ms/SecurityCommunity. |
Upcoming Public Community Webinars:
= New additions
Date & Time in PST |
Topic |
Registration |
2020-21 Winter Series (08:00-09:00 AM PST time) |
||
Mar 9, 2021 |
Azure Security Center: Azure Defender for Storage |
|
March 11, 2021 |
|
|
March 16, 2021 |
|
|
Mar 18, 2021 |
Azure Sentinel: Data Collection Scenarios |
|
March 24, 2021 |
Who wants a thousand free puppies? Managing open source software security in the enterprise |
|
2021 Spring Series (08:00-09:00 AM PST time) |
||
March 23, 2021 |
Microsoft Defender for Identity | Proactive Identity Posture Management |
|
March 31, 2021 |
Azure Sentinel | Using Azure Data Explorer as Your Long Term Retention Platform of Azure Sentinel Logs |
|
April 6, 2021 |
Azure Network Security | Content Inspection Using TLS Termination with Azure Firewall Premium |
|
April 13, 2021 |
Microsoft Defender for Identity | Detection Deep Dive with Defender for Identity’s Engineering Experts |
|
April 27, 2021 |
Azure Network Security | Safeguards for a Successful Azure DDoS Protection Standard Deployment |
|
May 4, 2021 |
Azure Network Security | Using Azure WAF Policies to Protect Your Web Application at Different Association Levels |
|
May 6, 2021 |
Azure Network Security | Exploring IDPS Capability in Azure Firewall Premium |
|
May 11, 2021 |
Azure Network Security | Central DNS Management and Logging with Azure Firewall |
|
May 20, 2021 |
Azure Network Security | Using Attack Simulation to Assess Protection and Detection Capabilities of Azure WAF |
Recordings of Past Webinars:
Asterisk (*) indicates updates to the file.
Date |
Topic |
Recording |
Deck |
|
AZURE ADVANCED THREAT PROTECTION |
||||
Sep 24, 2019 |
Identity Security Posture assessments |
|||
Sep 16, 2019 |
Deployment and Configuration |
|||
Jul. 15, 2019 |
Detections part 2 of 2 |
|||
Jun. 24, 2019 |
Unified SecOps Portal |
|||
Apr 29, 2019 |
Detections part 1 of 2 |
|||
AZURE COMPUTE |
||||
Feb 3, 2021 |
Confidential computing nodes on Azure Kubernetes Service |
|||
AZURE INFORMATION PROTECTION |
||||
Jun 2, 2020 |
MIP and Power BI integration |
|||
May 23, 2019 |
Unified Labeling in AIP |
|||
Apr 18, 2019 |
MIP SDK | How to leverage the SDK |
|||
Apr 11, 2019 |
Monitoring | Visibility into who is accessing data |
N/A |
||
Apr 4, 2019 |
Protection | Protect data at rest and in motion |
|||
Mar 28, 2019 |
Classification | Label taxonomy and recommendations |
|||
Mar 21, 2019 |
Discovery | Discover data at rest |
|||
Mar 14, 2019 |
Introduction | AIP basics and latest announcements |
|||
AZURE NETWORK SECURITY |
||||
Dec 10, 2020 |
Azure Network Security Advanced Architecture |
|||
Dec 8, 2020 |
Azure Network Security for SOCs |
|||
Dec 3, 2020 |
Getting started with Azure Firewall Manager | |||
Dec 1, 2020 |
Manage application and network connectivity with Azure Firewall | |||
Nov 12, 2020 |
Boosting your Azure Web Application (WAF) deployment | |||
Nov 10, 2020 |
Getting started with Azure Distributed Denial of Service (DDoS) Protection | |||
Oct 27, 2020 |
Protecting your web apps with Azure Web Application Firewall (WAF) | |||
Oct 15, 2020 |
Introduction to Azure Network Security |
|||
Nov 14, 2019 |
Introduction to WAF |
|||
Nov 12, 2019 |
DDoS Protection |
|||
AZURE SECURITY CENTER |
||||
Feb 23, 2021 |
Best Practices for Improving Your Secure Score | Deck | ||
Jan 7, 2021 |
Azure service layers protection | Deck | ||
Dec 7, 2020 |
Investigating Azure Security Center alerts using Azure Sentinel | Deck | ||
Nov 30, 2020 |
Azure Defender for SQL Anywhere | Deck | ||
Nov 9, 2020 |
Ignite 2020 Announcements | Deck | ||
Nov 2, 2020 |
Enhance IoT Security & Visibility with Azure Defender and Azure Sentinel | Deck | ||
Oct 28, 2020 |
Multi-Cloud support in ASC | Deck | ||
Oct 26, 2020 |
VM Protection | |||
Mar 11, 2020 |
Security Benchmark Policy |
|||
Feb 20, 2020 |
Secure Score enhanced model |
|||
Sep 10, 2019 |
Secure Score |
|||
AZURE DEFENDER for IoT |
||||
Jan 20, 2021 |
Leveraging OT Behavioral Analytics and Zero Trust for OT Cyber Resilience | |||
Sep 17, 2020 |
MITRE ATT&CK for ICS: CyberX Demo and Azure IoT/OT Security Deep Dive |
|||
Nov 19, 2019 |
End-to-End security for IoT |
|||
Aug 05, 2019 |
Basics and latest announcements on ASC for IoT |
|||
AZURE SENTINEL |
||||
Feb 18, 2021 |
Best Practices for Converting Detection Rules from Splunk, QRadar, and ArcSight to Azure Sentinel Rules | Deck | ||
Feb 4, 2021 |
Accelerate Your Azure Sentinel Deployment with the All-in-One Accelerator | Deck | ||
Jan 21, 2021 |
Auditing and monitoring your Azure Sentinel workspace | Deck | ||
Jan 19, 2021 |
Azure Notebooks Fundamentals – How to get started | |||
Jan 12, 2021 |
Machine Learning detections in the AI-infused Azure Sentinel SIEM | |||
Sep 30, 2020 |
Unleash your Azure Sentinel automation Jedi tricks and build Logic Apps Playbooks like a Boss | |||
Sep 29, 2020 |
Enabling User and Entity Behavior Analytics (UEBA) | Hunting for Insider Threats | |||
Sep 14, 2020 |
Empowering the Azure Sentinel Community with Pre-Recorded Datasets for research and training purposes | |||
Sep 09, 2020 |
KQL part 3 of 3 - Optimizing Azure Sentinel KQL queries performance | |||
Sep 02, 2020 |
Log Forwarder deep dive | Filtering CEF and Syslog events | |||
Aug 19, 2020 |
Threat intelligence automation with RiskIQ | |||
Aug 12, 2020 |
Threat hunting and reduce dwell times with Azure Sentinel |
|||
Jul 28, 2020 |
KQL part 2 of 3: KQL hands-on lab exercises | |||
Jul 9, 2020 |
Workbooks deep dive - Visualize your security threats and hunts |
|||
Jun 23, 2020 |
Multi-tenant investigations |
|||
Jun 15, 2020 |
Deploying and Managing Azure Sentinel as Code |
|||
Jun 2, 2020 |
KQL part 1 of 3: Learn the KQL you need for Azure Sentinel |
|||
May 13, 2020 |
Using Sigma to accelerate your SIEM transformation to Azure Sentinel |
|||
Apr 22, 2020 |
Threat Hunting on AWS using Sentinel |
|||
Apr 20, 2020 |
MSSP and Distributed Organization Support |
|||
Mar 31, 2020 |
Extending and Integrating Sentinel (APIs) |
|||
Mar 18, 2020 |
Deep Dive on Threat Intelligence |
|||
Mar 4, 2020 |
Recap of RSA 2020 |
|||
Feb 19, 2020 |
Tackling Identity |
|||
Feb 12, 2020 |
Deep Dive on Correlation Rules |
|||
Jan 29, 2020 |
Threat Hunting - revisited |
|||
Jan 22, 2020 |
End-to-End SOC scenario |
|||
Nov 20, 2019 |
Cloud & on-prem architecture |
|||
Nov 13, 2019 |
Post-Ignite. Understanding Azure Sentinel features and functionality deep dive |
|||
Sep 18, 2019 |
Threat Hunting |
|||
AZURE PURVIEW |
||||
Jan 27, 2021 |
Introduction to Azure Purview |
|||
MICROSOFT CLOUD APP SECURITY |
||||
Apr 15, 2020 |
Enabling Secure Remote Work |
|||
Oct 07, 2019 |
Extending real-time monitoring & controls to any app |
|||
July 2, 2019 |
App Discovery and Log Collector Configuration |
|||
Apr 16, 2019 |
Automation and integration with Microsoft Flow |
|||
Apr 9, 2019 |
Connecting 3rd party Applications |
|||
Mar 26, 2019 |
Conditional Access App Control |
|||
Mar 19, 2019 |
Threat detection |
|||
Mar 12, 2019 |
Information Protection |
|||
MICROSOFT DEFENDER FOR ENDPOINT |
||||
Sep 16, 2020 |
Get started with Microsoft Defender ATP: from zero to hero | |||
Jul 7, 2020 |
Deploy MDATP capabilities using a phased roadmap |
|||
Apr 2, 2020 |
End-to-end security for your endpoints |
|||
MICROSOFT 365 DEFENDER |
||||
Feb 22, 2021 |
What Tracking an Attacker Email Infrastructure Tells Us About Persistent Cybercriminal Operations | |||
Jan 28, 2021 |
Protect, Detect, and Respond to Solorigate using Microsoft 365 Defender |
|||
Nov 17, 2020 |
l33tSpeak | Advanced hunting in Microsoft 365 Defender |
Demo |
||
Aug 5, 2020 |
Advanced Hunting series - Episode 4: Let’s hunt! Applying KQL to incident tracking |
Demo |
||
Jul 29, 2020 |
Advanced Hunting series - Episode 3: Summarizing, Pivoting, and Visualizing Data |
Demo |
||
Jul 22, 2020 |
Advanced Hunting series - Tracking the Adversary Episode 2: Joins |
Demo |
||
Jul 15, 2020 |
Advanced Hunting series - Tracking the Adversary Episode 1: KQL Fundamentals |
Demo |
||
MICROSOFT MISC SECURITY WEBINARS |
||||
Microsoft x Secure 2020 event - October 20-23, 2020 |
||||
Oct 20 |
Keynote 1 with Ann Johnson |
|
|
|
Keynote 2 with Alex Weinert |
|
|
||
Oct 21 |
Keynote with Mark Simos |
|
||
Zero Trust for Devices with Clay Taylor |
|
|
||
Oct 22 |
Zero Trust for Data with Marc Meunier |
|
|
|
Zero Trust for Apps with Alex Esibov |
|
|
||
Zero Trust for Identity with Sarah Handler |
|
|
||
Oct 23 |
Zero Trust for Infrastructure & Network with Sinead O'Donovan |
|
|
|
Microsoft's Zero Trust Implementation with Mark Skorupa |
|
|
||
|
||||
Feb 16, 2021 |
The Billion-Dollar Central Bank Heist | |||
Dec 9, 2020 |
Microsoft Digital Defense Report | |||
Oct 29, 2020 |
Cybersecurity Basics: Securing Yourself |
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.