O365 Cloud Security
The cloud security ecosystem is constantly changing and improving. Each cloud provider is investing huge dollars into their products to differentiate themselves. Focusing on insightful data and simple to use interfaces, these cloud solutions provide tremendous value, especially if you know where to look.
We are pleased to bring you a virtual presentation from Integration Partners covering the security capabilities of Microsoft O365.
Here's what we'll cover:
- Overview of Microsoft’s Cloud Security Capabilities
- Microsoft Intelligent Security Graph
- Defender’s Dilemma vs. Attacker’s Dilemma
- Security Pillars
- Threat Protection
- Identity Protection
- Information Protection
- How to improve Security within your own Office 365 tenant(s)
- Overview of Microsoft’s Office 365 Secure Score
- Microsoft Secure Score is a measurement of an organization's security posture, with a higher number indicating more improvement actions taken. It can be found at https://securescore.office.com
- Overview of Microsoft’s Compliance Manager and Compliance Score
- Microsoft Compliance Score is a preview feature in the Microsoft 365 compliance center to help you understand your organization's compliance posture. It calculates a risk-based score measuring your progress in completing actions that help reduce risks around data protection and regulatory standards. It can be found at https://compliance.microsoft.com/compliancescore
- Overview of Microsoft’s Office 365 Secure Score
- Review
- How to Protect, Detect & Respond
- Typical advanced attack timeline & observations
- Attack kill chains and how Microsoft Security can help
- Q&A
Location T.B.D.
The AI Revolution
November ISSA Event
Cybersecurity Joint Meeting w REF CIO Forum and ISSA
State of Cybersecurity
Mobile Security
Reducing Microsoft 365 Risk
A Journey to the Cloud
Protecting Your Organization with MDR
Cyber Insurance Insights
Zero Trust Segmentation
2022 Year End Celebration
Cybersecurity Rants... And Other Topics of Interest
Healthcare Cybersecurity Summit
When It's OK to Lie: Not Your Father's Honeypot
Reacting to Cyber Threats
SOC - Buy vs Build
MSU Interdisciplinary Conference on Cybercrime
BSides Fort Wayne
Cybersecurity Alphabet Soup
Cyber Insurance in a Ransomware World
Are you out of your Trust but Verifying Mind
Solarwinds Breach
O365 Cloud Security
Anatomy of a Hack
Cloud Service Providers Webinar
COVID-19 Webinar
Cyber Wellness
NEIN-ISSA Holiday Networking Event
Rolling Cyber Security into Risk Management
IoT - from the Edge, through the Fog, and to the Cloud
Indiana InfraGard
Northeast IN Year End Celebration
Lifeline Data Center Tour
Social Gathering
Privileged Account Management: A Sprint Approach
Securing the Internet of Things
The who, what, where and why of SIEM
Northeast Indiana ISSA Holiday Celebration 2017
Understanding Penetration Testing
IT and Finance: Bridging the Knowledge Gap
ISSA NE IN - Social
Compliance and Regulations
Preventing Data Disasters
20 Critical Security Controls
Ransomware and Drinks
Meet the President of ISSA Int'l
Networking Event
Hyper Converged Solutions
3D Printing Demo
Ransomware Roundtable