Cybersecurity for the most challenging requirements - Part 1: Protect - Level: 300

Cybersecurity for the most challenging requirements - Part 1: Protect - Level: 300

IT Pro, Level: 300

The cybersecurity challenge is escalating as business increasingly rely on information technology as part of their critical infrastructure. Data is accessed, used and shared on premise and in the cloud, erasing traditional security boundaries. Join Marcus Murray and Hasain Alshakarti to discuss strategies and solutions to secure your investments in digital transformation. They spent the past 16 years working with customers, where cybersecurity is the No. 1 priority, to achieve a balance of security and end-user empowerment with effective security controls across identity, device, data and apps, and infrastructure.    This session will teach you how to build a secure modern enterprise using the Microsoft protect-detect-respond model to secure the four pillars of  Identity: Embraces identity as primary security perimeter and protects identity systems, admins, and credential as top priorities.  Apps and Data: Aligns security investments with business priories including identifying and securing communications, data, and applications.  Infrastructure: Operates on modern platform and uses cloud intelligence to detect and remediate both vulnerabilities and attacks. Devices: Accesses assets from trusted devices with hardware security assurances, great user experience, and advanced threat detection.    By using built-in security features in Windows 10, Windows Server 2016, Azure and Microsoft Enterprise Mobility + Security (EMS) we show case and help deliver a comprehensive, agile platform to better protect endpoints, detect threats, and respond to security breaches across the largest of organizations.

Target audience: IT-Pro
Second target audience: Developer
Third target audience: IT-Manager