talk-data.com talk-data.com

Event

Microsoft Ignite 2025

2025-11-17 – 2025-11-21 Microsoft Ignite Visit website ↗

Activities tracked

8

Filtering by: Ken Lawson ×

Sessions & talks

Showing 1–8 of 8 · Newest first

Search within this event →

Perform threat hunting in Microsoft Sentinel

2025-11-21
talk
Matt Lowe (Microsoft) , Ken Lawson (Microsoft)

Update description to Unlock the power of Microsoft Sentinel with this hands-on lab. Hunt threats using KQL across the data lake and leverage graph-based insights to detect anomalies, investigate alerts, and strengthen SOC workflows.

Please RSVP and arrive at least 5 minutes before the start time, at which point remaining spaces are open to standby attendees.

Defend Against Threats with Microsoft Defender

2025-11-21
talk
John Nix (Microsoft) , Ken Lawson (Microsoft)

Get a step-by-step walkthrough for Microsoft Defender XDR and learn how to implement key capabilities. Learn how to assign preset security policies for Exchange Online Protection (EOP) and Microsoft Defender for Office 365. Protect your endpoints using Microsoft Defender Endpoint by onboarding devices and configuring roles and device groups. Lastly, dive into the advanced attack mitigation features for your devices using Defender for Endpoint to effectively investigate alerts and incidents.

Please RSVP and arrive at least 5 minutes before the start time, at which point remaining spaces are open to standby attendees.

Defend Against Threats with Microsoft Defender

2025-11-20
talk
John Nix (Microsoft) , Ken Lawson (Microsoft)

Get a step-by-step walkthrough for Microsoft Defender XDR and learn how to implement key capabilities. Learn how to assign preset security policies for Exchange Online Protection (EOP) and Microsoft Defender for Office 365. Protect your endpoints using Microsoft Defender Endpoint by onboarding devices and configuring roles and device groups. Lastly, dive into the advanced attack mitigation features for your devices using Defender for Endpoint to effectively investigate alerts and incidents.

Please RSVP and arrive at least 5 minutes before the start time, at which point remaining spaces are open to standby attendees.

Perform threat hunting in Microsoft Sentinel

2025-11-20
talk
Matt Lowe (Microsoft) , Ken Lawson (Microsoft)

Update description to Unlock the power of Microsoft Sentinel with this hands-on lab. Hunt threats using KQL across the data lake and leverage graph-based insights to detect anomalies, investigate alerts, and strengthen SOC workflows.

Please RSVP and arrive at least 5 minutes before the start time, at which point remaining spaces are open to standby attendees.

Perform threat hunting in Microsoft Sentinel

2025-11-19
talk
Matt Lowe (Microsoft) , Ken Lawson (Microsoft)

Update description to Unlock the power of Microsoft Sentinel with this hands-on lab. Hunt threats using KQL across the data lake and leverage graph-based insights to detect anomalies, investigate alerts, and strengthen SOC workflows.

Please RSVP and arrive at least 5 minutes before the start time, at which point remaining spaces are open to standby attendees.

Defend Against Threats with Microsoft Defender

2025-11-19
talk
John Nix (Microsoft) , Ken Lawson (Microsoft)

Get a step-by-step walkthrough for Microsoft Defender XDR and learn how to implement key capabilities. Learn how to assign preset security policies for Exchange Online Protection (EOP) and Microsoft Defender for Office 365. Protect your endpoints using Microsoft Defender Endpoint by onboarding devices and configuring roles and device groups. Lastly, dive into the advanced attack mitigation features for your devices using Defender for Endpoint to effectively investigate alerts and incidents.

Please RSVP and arrive at least 5 minutes before the start time, at which point remaining spaces are open to standby attendees.

Perform threat hunting in Microsoft Sentinel

2025-11-19
talk
Matt Lowe (Microsoft) , Ken Lawson (Microsoft)

Update description to Unlock the power of Microsoft Sentinel with this hands-on lab. Hunt threats using KQL across the data lake and leverage graph-based insights to detect anomalies, investigate alerts, and strengthen SOC workflows.

Please RSVP and arrive at least 5 minutes before the start time, at which point remaining spaces are open to standby attendees.

Defend Against Threats with Microsoft Defender

2025-11-18
talk
John Nix (Microsoft) , Ken Lawson (Microsoft)

Get a step-by-step walkthrough for Microsoft Defender XDR and learn how to implement key capabilities. Learn how to assign preset security policies for Exchange Online Protection (EOP) and Microsoft Defender for Office 365. Protect your endpoints using Microsoft Defender Endpoint by onboarding devices and configuring roles and device groups. Lastly, dive into the advanced attack mitigation features for your devices using Defender for Endpoint to effectively investigate alerts and incidents.

Please RSVP and arrive at least 5 minutes before the start time, at which point remaining spaces are open to standby attendees.