talk-data.com talk-data.com

Ken Lawson

Speaker

Ken Lawson

8

talks

Technical Writing Microsoft

I'm a Microsoft Worldwide Learning, Learning Lab content developer for Security courses. I own and maintain the Security Operations Analyst course including instructor led training and labs.

Bio from: Microsoft Ignite 2025

Frequent Collaborators

Filter by Event / Source

Talks & appearances

8 activities · Newest first

Search activities →

Update description to Unlock the power of Microsoft Sentinel with this hands-on lab. Hunt threats using KQL across the data lake and leverage graph-based insights to detect anomalies, investigate alerts, and strengthen SOC workflows.

Please RSVP and arrive at least 5 minutes before the start time, at which point remaining spaces are open to standby attendees.

Get a step-by-step walkthrough for Microsoft Defender XDR and learn how to implement key capabilities. Learn how to assign preset security policies for Exchange Online Protection (EOP) and Microsoft Defender for Office 365. Protect your endpoints using Microsoft Defender Endpoint by onboarding devices and configuring roles and device groups. Lastly, dive into the advanced attack mitigation features for your devices using Defender for Endpoint to effectively investigate alerts and incidents.

Please RSVP and arrive at least 5 minutes before the start time, at which point remaining spaces are open to standby attendees.

Get a step-by-step walkthrough for Microsoft Defender XDR and learn how to implement key capabilities. Learn how to assign preset security policies for Exchange Online Protection (EOP) and Microsoft Defender for Office 365. Protect your endpoints using Microsoft Defender Endpoint by onboarding devices and configuring roles and device groups. Lastly, dive into the advanced attack mitigation features for your devices using Defender for Endpoint to effectively investigate alerts and incidents.

Please RSVP and arrive at least 5 minutes before the start time, at which point remaining spaces are open to standby attendees.

Update description to Unlock the power of Microsoft Sentinel with this hands-on lab. Hunt threats using KQL across the data lake and leverage graph-based insights to detect anomalies, investigate alerts, and strengthen SOC workflows.

Please RSVP and arrive at least 5 minutes before the start time, at which point remaining spaces are open to standby attendees.

Update description to Unlock the power of Microsoft Sentinel with this hands-on lab. Hunt threats using KQL across the data lake and leverage graph-based insights to detect anomalies, investigate alerts, and strengthen SOC workflows.

Please RSVP and arrive at least 5 minutes before the start time, at which point remaining spaces are open to standby attendees.

Get a step-by-step walkthrough for Microsoft Defender XDR and learn how to implement key capabilities. Learn how to assign preset security policies for Exchange Online Protection (EOP) and Microsoft Defender for Office 365. Protect your endpoints using Microsoft Defender Endpoint by onboarding devices and configuring roles and device groups. Lastly, dive into the advanced attack mitigation features for your devices using Defender for Endpoint to effectively investigate alerts and incidents.

Please RSVP and arrive at least 5 minutes before the start time, at which point remaining spaces are open to standby attendees.

Update description to Unlock the power of Microsoft Sentinel with this hands-on lab. Hunt threats using KQL across the data lake and leverage graph-based insights to detect anomalies, investigate alerts, and strengthen SOC workflows.

Please RSVP and arrive at least 5 minutes before the start time, at which point remaining spaces are open to standby attendees.

Get a step-by-step walkthrough for Microsoft Defender XDR and learn how to implement key capabilities. Learn how to assign preset security policies for Exchange Online Protection (EOP) and Microsoft Defender for Office 365. Protect your endpoints using Microsoft Defender Endpoint by onboarding devices and configuring roles and device groups. Lastly, dive into the advanced attack mitigation features for your devices using Defender for Endpoint to effectively investigate alerts and incidents.

Please RSVP and arrive at least 5 minutes before the start time, at which point remaining spaces are open to standby attendees.