Recordings of past webinars are below. To register for upcoming webinars visit aka.ms/SecurityCommunity. Also, explore the Microsoft Security Technical Content Library relevant to your needs. |
Asterisk (*) indicates updates to the file.
AZURE COMPUTE |
|||
2022 |
|||
Apr 12 |
Azure Confidential VMs - When the Power of the Public Cloud Meets the Confidentiality of Your Private Datacenter |
||
2021 |
|||
Feb 3 |
Confidential computing nodes on Azure Kubernetes Service |
||
AZURE NETWORK SECURITY |
|||
2023 |
|||
Mar 23 |
How to Tune Your Azure WAF | ||
Mar 16 |
Multi-Cloud: Protecting GCP and AWS Applications with Azure WAF | ||
Feb 16 |
Azure Firewall SKUs - Basic vs Standard vs Premium |
||
Jan 24 |
Private Link Integration with Azure Firewall | ||
2022 |
|||
Nov 15 |
Azure DDoS IP Protection | ||
Sep 29 |
Enhance your Azure Firewall Deployments | ||
Sep 27 |
Azure Firewall Manager Integration with Azure WAF and DDoS | ||
Sep 22 |
Single Click Migration for Azure Firewall | ||
Sep 20 |
DDoS Attack Simulations | ||
Sep 15 |
Azure Firewall Policy Analytics | ||
Sep 6 |
Zero Trust Web Application Security with Azure WAF and Azure Firewall | ||
2021 | |||
Dec 15 |
Azure Virtual Network Manager: Simplify and Centrally Manage Azure Networks at Scale | ||
May 20 |
Using Attack Simulation to Assess Protection and Detection Capabilities of Azure WAF |
||
May 11 |
Central DNS Management and Logging with Azure Firewall |
||
May 6 |
Exploring IDPS Capability in Azure Firewall Premium |
||
May 4 |
Using Azure WAF Policies to Protect Your Web Application at Different Association Levels |
||
Apr 27 |
Safeguards for a Successful Azure DDoS Protection Standard Deployment |
||
Apr 6 |
Content Inspection Using TLS Termination with Azure Firewall Premium |
||
2020 |
|||
Dec 10 |
Azure Network Security Advanced Architecture |
||
Dec 8 |
Azure Network Security for SOCs |
||
Dec 3 |
Getting started with Azure Firewall Manager |
||
Dec 1 |
Manage application and network connectivity with Azure Firewall |
||
Nov 12 |
Boosting your Azure Web Application (WAF) deployment |
||
Nov 10 |
Getting started with Azure Distributed Denial of Service (DDoS) Protection |
||
Oct 27 |
Protecting your web apps with Azure Web Application Firewall (WAF) |
||
Oct 15 |
Introduction to Azure Network Security |
||
MICROSOFT 365 DEFENDER |
|||
2022 |
|||
Nov 30 |
Software Usage Insights and Application Blocking with MDVM |
||
Oct 27 |
Native Integration of Microsoft Defender for Cloud Apps in M365 Defender |
||
Sep 27 |
Get a Grip on Critical Threats with Microsoft Defender Experts for Hunting |
||
2021 |
|||
Oct 11 |
l33tSpeak: Advanced Hunting in Microsoft 365 Defender |
Demo |
|
Sep 15 |
Webinar Series: Monthly Threat Insights |
||
Aug 18 |
Webinar Series: Monthly Threat Insights |
||
Jul 29 |
Introduction to Microsoft Defender Application Guard for Office |
Deck | |
Jul 21 |
Webinar series: Monthly Threat Insights |
||
Jul 12 |
The story behind eSentire MDR with Microsoft 365 Defender: How eSentire streamlined security for itself and its customers |
||
Jun 16 |
Webinar series: Monthly Threat Insights |
||
May 10 |
l33tSpeak: Advanced Hunting in Microsoft 365 Defender |
||
May 3 |
Microsoft 365 Defender’s Unified Experience for XDR |
||
Feb 22 |
What Tracking an Attacker Email Infrastructure Tells Us About Persistent Cybercriminal Operations |
||
Jan 28 |
Protect, Detect, and Respond to Solorigate using Microsoft 365 Defender |
||
2020 |
|||
Nov 17 |
l33tSpeak | Advanced hunting in Microsoft 365 Defender |
Demo |
|
Aug 5 |
Advanced Hunting series - Episode 4: Let’s hunt! Applying KQL to incident tracking |
Demo |
|
Jul 29 |
Advanced Hunting series - Episode 3: Summarizing, Pivoting, and Visualizing Data |
Demo |
|
Jul 22 |
Advanced Hunting series - Tracking the Adversary Episode 2: Joins |
Demo |
|
Jul 15 |
Advanced Hunting series - Tracking the Adversary Episode 1: KQL Fundamentals |
Demo |
|
MICROSOFT DEFENDER EXTERNAL ATTACK SURFACE MANAGEMENT (EASM) |
|||
2023 | |||
Mar 15 |
Introduction to Microsoft Defender External Attack Surface Management |
||
MICROSOFT DEFENDER FOR CLOUD (formerly Azure Security Center) |
|||
2023 | |||
Jan 31 |
What's New in the Last 3 Months
|
YouTube | |
Jan 25 |
Code to Cloud Security using Microsoft Defender for DevOps
|
YouTube | |
Jan 18 |
A Day In the Life Series with Microsoft Defender for Cloud
|
YouTube | |
2022 |
|||
Dec 15 |
Prevent Permissions Sprawl in Multicloud with Microsoft Defender for Cloud and Permissions Management
|
YouTube | |
Dec 13 |
Protect your Cloud Workloads with Microsoft Defender for Cloud: A Cloud Native Application Protection Platform (CNAPP)
|
YouTube | |
Dec 8 |
Secure your Containers from Build to Runtime
|
YouTube | |
Dec 6 |
Keep Calm and Deploy Defender for Servers
|
YouTube | |
Nov 23 |
Pregled Microsoft Defender for Cloud-a kao Modernog CSPM/CWP Rješenja (Croatian)
|
YouTube | |
Nov 22 |
Multicloud Capabilities in Microsoft Defender for Cloud
|
YouTube | |
Nov 17 |
Automating Cloud Security Posture and Cloud Workload Protection Responses
|
YouTube | |
Nov 10 |
New Contextual CSPM a Context-Aware Security Intelligence
|
YouTube | |
Nov 8 |
Demystifying Microsoft Defender for Servers
|
YouTube | |
Nov 3 | Deep Dive into Security Orchestration, Automation and Response (SOAR) using Microsoft Azure Security | YouTube | |
Oct 25 | What’s New in the Last 3 Months | YouTube | |
Oct 20 | Start Secure and Stay Secure Across Your Multicloud Environments with Microsoft Defender for Cloud | YouTube | |
Aug 4 | How to Ensure Maximum Security Posture for Your Government Cloud Environment and How to Protect It Using Microsoft Defender for Cloud | YouTube | |
Jul 26 | Improving Your Security Posture with Policy Enforcement and Governance | YouTube | |
Jul 19 | What's New in the Last 3 Months | YouTube | |
Jun 30 | Protect Your Databases Anywhere with Microsoft Defender for Cloud | YouTube | |
Jun 21 | Protect Your Azure Service Layer with Microsoft Defender for ARM & Defender for DNS | YouTube | |
Jun 16 | The Latest Microsoft Defender for Cloud News from RSA | YouTube | |
May 26 | Azure Security Benchmark V3 Workbook | YouTube | |
May 17 |
How to Deploy Microsoft Defender for Cloud at Scale |
YouTube | |
Apr 26 |
What's New in 3 Months |
YouTube | |
Apr 14 | Protecting Multi-Cloud Environments (AWS & GCP) with Microsoft Defender for Cloud | YouTube | |
Mar 15 |
Demystifying Microsoft Defender for Containers |
YouTube | |
Jan 20 |
What's New in 3 Months |
YouTube | |
Jan 12 |
Introducing Microsoft Defender for Containers |
YouTube | |
2021 |
|||
Nov 17 |
NextGen Multi Cloud CSPM in Microsoft Defender for Cloud |
||
Nov 16 |
Azure Security Ignite 2021 Updates | ||
Oct 27 |
Azure Defender for SQL |
||
Oct 26 |
Manage Your Security Risk and Compliance Requirements with Azure Security Center |
||
Oct 20 |
What’s New in the Last 6 Months |
||
Oct 5 |
Better Together: Azure Defender, Azure Sentinel, and M365 Defender |
||
Aug 26 |
Better Together | Azure Security Center and Microsoft Defender for Endpoint |
||
Jul 22 |
Manejo de Postura de Seguridad de la Nube y Protección de Cargas de Trabajo (Cloud Security Posture Management and Workload Protection) |
YouTube | Deck |
May 13 |
Azure Workbooks in Security Center |
||
Apr 29 |
Demystifying Azure Defender Once for All |
||
Apr 28 |
Automate(d) Security with Azure Security Center and Logic Apps |
||
Mar 9 |
Azure Defender for Storage |
||
Feb 23 |
Best Practices for Improving Your Secure Score |
||
Jan 7 |
Azure service layers protection |
||
2020 |
|||
Dec 7 |
Investigating Azure Security Center alerts using Azure Sentinel |
||
Nov 30 |
Azure Defender for SQL Anywhere |
||
Nov 9 |
Ignite 2020 Announcements |
||
Nov 2 |
Enhance IoT Security & Visibility with Azure Defender and Azure Sentinel |
||
Oct 28 |
Multi-Cloud support in Azure Security Center |
||
Oct 26 |
VM Protection |
||
Mar 11 |
Security Benchmark Policy |
||
Feb 20 |
Secure Score enhanced model |
||
MICROSOFT DEFENDER FOR CLOUD APPS
(formerly Microsoft Cloud App Security) |
|||
2023 | |||
Feb 1 |
Protect, Detect, and Respond to Malicious OAuth Applications Abusing Cloud E-mail Services |
||
2022 | |||
Nov 16 |
App Governance is a Key Part of a Customers' Zero Trust Journey |
||
Sep 14 |
Manage your SaaS Security Posture with Microsoft |
||
2021 | |||
Aug 17 |
Protect your Slack Deployment using Microsoft Cloud App Security |
||
Jun 8 |
Protect Your Salesforce Environment Using MCAS |
||
May 25 |
Improve Your AWS Security Posture Using MCAS |
||
May 12 |
Protect Your Box Deployment Using MCAS |
||
May 11 |
How to Protect Your GitHub Environment Using MCAS |
||
2020 | |||
Apr 15 |
Enabling Secure Remote Work |
||
MICROSOFT DEFENDER FOR ENDPOINT |
|||
2021 | |||
Nov 29 | Protect Your Mobile Devices with Microsoft Defender for Endpoint | ||
May 18 |
Stopping Cabanak+FIN7: Understanding the MITRE Engenuity ATT&CK Results |
||
2020 |
|||
Sep 16 |
Get started with Microsoft Defender ATP: from zero to hero |
||
Jul 7 |
Deploy MDATP capabilities using a phased roadmap |
||
Apr 2 |
End-to-end security for your endpoints |
||
MICROSOFT DEFENDER FOR IDENTITY | |||
2022 | |||
Sep 6 |
Identity Targeted Attacks - A Researcher's Point of View |
||
Mar 2 |
New Remediation Actions in Microsoft Defender for Identity |
||
2021 | |||
Oct 6 |
Microsoft Defender for Identity’s Latest Detection Capabilities |
||
Jun 22 |
MDI in the Microsoft 365 Security Center |
||
Jun 1 |
Detection Deep Dive with Defender for Identity’s Engineering Experts |
||
Mar 23 |
Proactive Identity Posture Management |
||
MICROSOFT DEFENDER FOR IoT (formerly Azure Defender for IoT) |
|||
2023 | |||
Mar 1 | OT/IoT Enabled SOC with Microsoft Sentinel and Microsoft Defender for IoT | ||
Jan 26 | Azure Manager Secure Connectivity and Advantages | ||
2022 | |||
Oct 27 | Best Practices for Facilitating OT/IoT Enablement in the Corporate SOC | ||
Sep 14 | The Last Piece of the XDR Puzzle - Augmenting IT SecOps with IoT Security | ||
Jul 28 | IT/OT Threat Monitoring Solution | ||
Jul 20 | Securing Critical Networks Through Defender for IoT and Horizon DPI | ||
Jun 29 | Better Together: Microsoft Defender for IoT and ServiceNow’s Operational Technology (OT) Management | ||
May 24 | Section 52 - Investigating Malicious Ladder Logic | ||
Apr 6 | How to Discover and Secure IoT Devices in the Enterprise Environment | ||
Mar 24 |
Better Together: Microsoft Sentinel - IT/OT Threat Monitoring with Defender for IoT Solution |
||
Feb 23 |
Cloud Capabilities and Security Advantages |
||
2021 | |||
Oct 19 |
Agent Based Solution for IoT Device |
||
Jan 20 |
Leveraging OT Behavioral Analytics and Zero Trust for OT Cyber Resilience |
||
2020 | |||
Sep 17 |
MITRE ATT&CK for ICS: CyberX Demo and Azure IoT/OT Security Deep Dive |
||
MICROSOFT DEFENDER THREAT INTELLIGENCE |
|||
2023 | |||
Feb 15 |
Microsoft Defender Threat Intelligence Overview |
||
MICROSOFT PURVIEW (formerly Azure Purview) |
|||
2020 | |||
Jul 29 |
Discover Multi Cloud Data in Purview |
||
Jun 17 |
Better Together: E2E Sensitivity Label Flow from M365 to Azure Purview to SQL to Power BI |
||
Jan 27 |
Introduction to Azure Purview |
||
MICROSOFT SENTINEL (formerly Azure Sentinel) |
|||
2023 | |||
Jan 25 |
What's New in the Last 6 Months
|
YouTube | |
Jan 17 |
Announcing the New Microsoft Sentinel Incident Investigation Experience!
|
YouTube | |
2022
|
|||
Oct 19 |
Pregled Microsoft Sentinel-a kao Modernog SIEM/SOAR Rješenja (Croatian)
|
YouTube |
Demo |
Sep 21 |
Pregled Microsoft Sigurnosnih Rjesenja (Bosnian-Serbian-Croatian)
|
YouTube | |
Sep 13 |
NIST SP 800-53 Solution
|
YouTube | |
Sep 8 |
Microsoft Sentinel Threat Protection Solution for SAP
|
YouTube | |
Aug 31 |
Utilizando Microsoft Sentinel de ponta a ponta em SOC (Portuguese)
|
YouTube | |
Aug 29 |
Utilizando Microsoft Sentinel de punta a punta en su SOC (Spanish)
|
YouTube | |
Aug 25 |
MSTICPy 2.0: What’s New in Microsoft’s Jupyter and Python Security Toolset
|
YouTube |
Demo |
Aug 17 |
Gerenciando o ciclo de vida do seu log (Portuguese)
|
YouTube | |
Aug 16 |
Cybersecurity Maturity Model Certification (CMMC) 2.0 Solution
|
YouTube | |
Aug 15 |
Administracion del ciclo de vida de sus Registros (Spanish)
|
YouTube | |
Aug 11 |
Building on Microsoft Sentinel Platform
|
YouTube | |
Jul 28 |
IT/OT Threat Monitoring Solution
|
YouTube | |
Jul 27 |
Novidades do Microsoft Sentinel (Portuguese)
|
YouTube | |
Jul 21 | Microsoft Sentinel Fusion: New Detection Capabilities & Features Explained | YouTube | |
Jul 14 | Cyber Threat Intelligence Demystified in Microsoft Sentinel | YouTube | |
Jul 12 | Zero Trust (TIC 3.0) Solution | YouTube | |
Jun 28 | Codeless Connector Platform: Create Your Data Connector in Microsoft Sentinel | YouTube | |
Jun 23 | Leverage new and existing features to optimize cost in Microsoft Sentinel | YouTube | |
May 31 | Transforming Data at Ingestion Time in Microsoft Sentinel | YouTube | |
May 10 | Microsoft Sentinel Automation: Tips & Tricks | YouTube | |
Apr 28 | Unleash the Power of Analytics to Strengthen Your SOC Against Threats | YouTube | |
Apr 7 | Manage Your Log Lifecycle with New Methods for Ingestion, Archival, Search, and Restoration |
YouTube | |
Mar 31 | Modernize Log Management with the Maturity Model for Event Log Management (M-21-31) Solution | YouTube | |
Mar 29 | Use Watchlist to Manage Alerts, Reduce Alert Fatigue, and Improve SOC Efficiency | YouTube | |
Mar 22 | Extend and Manage ASIM: Developing, Testing and Deploying ASIM Parsers | YouTube | |
Mar 9 | The Advanced SIEM Information Model (ASIM): Now Built into Microsoft Sentinel | YouTube | |
Mar 1 | What's Next in Microsoft Sentinel | YouTube | |
Feb 10 | Automate Your Microsoft Sentinel Triage Efforts with RiskIQ Threat Intelligence | YouTube | |
Feb 3 |
Become a Jupyter Notebooks Ninja – MSTICPy Intermediate to Build Your Own Notebooks |
YouTube |
Demo |
Jan 19 |
Present and Future of User Entity Behavioral Analytics in Microsoft Sentinel |
YouTube | |
2021 | |||
Dec 16 |
Become a Jupyter Notebooks Ninja – MSTICPy Fundamentals to Build Your Own Notebooks |
YouTube |
Demo |
Dec 8 |
Overview of the SOC Process Framework |
YouTube |
Demo |
Dec 7 |
KQL Framework for Microsoft Sentinel -Empowering You to Become KQL-Savvy |
YouTube | |
Dec 2 | Microsoft Sentinel Content Management | YouTube | |
Dec 1 | Fusion ML Detections for Emerging Threats & Configuration UI | YouTube | |
Nov 22 | Everything You Ever Wanted to Know About Using the New Azure Monitor Agent (AMA) with Microsoft Sentinel |
||
Nov 16 | Create Your Own Microsoft Sentinel Solutions |
||
Nov 15 | Improving the Breadth and Coverage of Threat Hunting with ADX Support, More Entity Types, and Updated MITRE Integration | ||
Nov 10 |
Decrease Your SOC’s MTTR (Mean Time to Respond) by Integrating Microsoft Sentinel with Microsoft Teams |
||
Nov 9 |
SAP Mini-Series Part 2: Deep Dive - End-to-End Installation of SAP for Microsoft Sentinel |
||
Nov 8 |
Latest Innovations for Microsoft’s Cloud Native SIEM |
||
Oct 28 |
What’s New in Azure Sentinel Automation |
||
Oct 25 |
Explore the Power of Threat Intelligence in Azure Sentinel |
||
Oct 18 |
SAP Mini-Series Part 1: Introduction to Monitoring SAP with Azure Sentinel for Security Professionals |
||
Oct 11 |
Become a Notebooks Ninja – Getting Started with Jupyter Notebooks in Azure Sentinel |
||
Oct 6 |
Turbocharging ASIM: Making Sure Normalization Helps Performance Rather Than Impacting It |
||
Sep 29 |
Better Together | OT and IoT Attack Detection, Investigation and Response |
||
Sep 15 |
What's New in the Last 6 Months |
||
Sep 14 |
Learn About Customizable Anomalies and How to Use Them |
||
Aug 18 |
Fusion ML Detections with Scheduled Analytics Rules |
||
Aug 11 |
Deep Dive into Azure Sentinel Normalizing Parsers and Normalized Content |
||
Jul 28 |
The Information Model: Understanding Normalization in Azure Sentinel |
||
Jul 20 |
Streamlining your SOC Workflow with Automated Notebooks |
||
Jul 13 |
Customizing Azure Sentinel with Python - MSTICPy and Jupyter Notebooks |
||
Jun 29 |
Threat Intelligence in Action with Anomali |
||
Jun 24 |
Cost Management in Azure Sentinel - Getting the Most for Your Investment |
||
May 26 |
Deep Dive into Azure Sentinel Innovations for RSA 2021 |
||
Mar 31 |
Using Azure Data Explorer as Your Long Term Retention Platform of Azure Sentinel Logs |
||
Mar 18 |
Data Collection Scenarios |
||
Feb 18 |
Best Practices for Converting Detection Rules from Splunk, QRadar, and ArcSight to Azure Sentinel Rules |
||
Feb 4 |
Accelerate Your Azure Sentinel Deployment with the All-in-One Accelerator |
||
Jan 21 |
Auditing and monitoring your Azure Sentinel workspace |
||
Jan 19 |
Azure Notebooks Fundamentals – How to get started |
||
Jan 12 |
Machine Learning detections in the AI-infused Azure Sentinel SIEM |
||
2020 | |||
Sep 30 |
Unleash your Azure Sentinel automation Jedi tricks and build Logic Apps Playbooks like a Boss |
||
Sep 29 |
Enabling User and Entity Behavior Analytics (UEBA) | Hunting for Insider Threats |
||
Sep 14 |
Empowering the Azure Sentinel Community with Pre-Recorded Datasets for research and training purposes |
||
Sep 9 |
KQL part 3 of 3 - Optimizing Azure Sentinel KQL queries performance |
||
Sep 2 |
Log Forwarder deep dive | Filtering CEF and Syslog events |
||
Aug 19 |
Threat intelligence automation with RiskIQ |
||
Aug 12 |
Threat hunting and reduce dwell times with Azure Sentinel |
||
Jul 28 |
KQL part 2 of 3: KQL hands-on lab exercises |
||
Jul 9 |
Workbooks deep dive - Visualize your security threats and hunts |
||
Jun 23 |
Multi-tenant investigations |
||
Jun 15 |
Deploying and Managing Azure Sentinel as Code |
||
Jun 2 |
KQL part 1 of 3: Learn the KQL you need for Azure Sentinel |
||
May 13 |
Using Sigma to accelerate your SIEM transformation to Azure Sentinel |
||
Apr 22 |
Threat Hunting on AWS using Sentinel |
||
Apr 20 |
MSSP and Distributed Organization Support |
||
Mar 31 |
Extending and Integrating Azure Sentinel (APIs) |
||
Mar 18 |
Deep Dive on Threat Intelligence |
||
Mar 4 |
Recap of RSA 2020 |
||
Feb 19 |
Tackling Identity |
||
Feb 12 |
Deep Dive on Correlation Rules |
||
Jan 29 |
Threat Hunting - revisited |
||
Jan 22 |
End-to-End SOC scenario |
||
MICROSOFT MISCELLANEOUS SECURITY WEBINARS | |||
CYBERSECURITY FUNDAMENTALS | |||
2022 | |||
Dec 7 | Microsoft Digital Defense Report | YouTube | Deck |
Aug 23 | A Microsoft Overview of Russia’s Cyberattack Activity in Ukraine | YouTube | Deck |
2021 | |||
Dec 6 | Cloud Katana | YouTube | Deck |
Oct 21 | Hacking AI with Counterfit | YouTube | Deck |
Oct 14 | Exploiting Vulnerabilities in Azure Stack Hub (Note: All exploits discussed during the webinar have been addressed.) |
YouTube | Deck |
Oct 7 |
Combating Manipulated Media -Media Provenance |
YouTube | Deck |
Jul 1 | Spa Treatments: Web Security in Single Page Applications | YouTube | Deck |
Jun 15 | Best Practices of Authentication & Authorization Methods | YouTube | Deck |
Mar 24 | Who Wants a Thousand Free Puppies? Managing Open Source Software Security in The Enterprise | YouTube | Deck |
Feb 16 | The Billion-Dollar Central Bank Heist | YouTube | Deck |
2020 | |||
Dec 9 | Microsoft Digital Defense Report | YouTube | Deck |
Oct 29 | Cybersecurity Basics: Securing Yourself | YouTube | Deck |
DIVERSITY IN CYBERSECURITY | |||
2022 | |||
June 14 | Connecting Women in Technology |
n/a |
|
May 12 | Speaking Up for Minorities in Tech |
n/a |
|
May 3 | Navigating Mentorship of the Security and Veteran Communities |
n/a |
|
Apr 13 |
Achievement Unlocked: A Real Life-Size Statue of a Latina Woman in Tech 2021 |
n/a |
|
Nov 18 |
Cristhofer Muñoz: Encouraging Young Talent |
||
Oct 4 |
Mekonnen Kassa: From a Refugee to Microsoft: Impact of Active Allyship |
||
May 27 |
Sarah Young: How Unconventional Career Paths are Making a Difference in the Technology |
||
Mar 16 |
Sue Loh, software engineer at Microsoft and author of the young adult hacker novel Raven, inspires girls and other under-represented groups to enter tech. |
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.