Tom Janetscheck is a Senior Program Manager at Microsoft Cybersecurity Engineering, focused on Microsoft Defender for Cloud. Prior to that, he has been working in different internal IT and consulting roles for almost two decades, with a strong focus on cloud infrastructure, architecture, governance, and security.
Sasha Kranjac is a security and Azure person, Architect, and Instructor. He is a CEO at Kloudatech, a company that helps businesses and individuals around the globe to embrace the cloud and be safe in cyberspace. Sasha is a Microsoft Most Valuable Professional (MVP), Microsoft Certified Trainer (MCT), and MCT Regional Lead.
As a public and multitenant cloud service, Microsoft Azure supports vast range of services and capabilities. It is robust, highly secure, highly available and provides integrity and confidentiality of users’ data. Along with the abundance of services and benefits Azure provides, users often forget its key characteristics: it is publicly available platform with shared security responsibility.
In this Tutorial, we will cover all the key Azure platform security topics that are part of your shared security responsibility and show you the technologies involved. I will show you how to increase and raise security, compliance and privacy of your data and workloads in Azure to a higher levels and to become familiar with the latest security trends and identity and security capabilities in Azure.
Do not miss this unique opportunity as we uncover:
- best practices and advice directly from on-the-filed experience,
- tips-and-tricks on Azure Active Directory; identity protection and management
- securing access to resources
- securing data in rest and in motion
- protecting against vulnerabilities
- detecting threats
- securing IaaS and PaaS
- and many more
Do not miss this unique opportunity as we uncover best practices and advice directly from on-the-filed experience, spiced with tips-and-tricks on Azure Active Directory; identity protection and management; securing access to resources; securing data in rest and in motion; encryption; protecting against vulnerabilities; detecting threats; securing IaaS and PaaS; compliance and many more!