Implementing Continuous Threat Exposure Management using MSEM
talk-data.com
Topic
Cyber Security
216
tagged
Activity Trend
Top Events
As generative AI adoption accelerates, IT, security and compliance leaders must balance access to innovation with responsibility and governance. In this session on Copilot Trust & Safety you’ll learn about the Microsoft-built protections embedded in the platform, see how Copilot safety investments map to real-world risk scenarios, and get a clear understanding of how to proactively safeguard your organization through policy, compliance, and risk management tools while unlocking AI’s value.
Get a step-by-step walkthrough for Microsoft Defender XDR and learn how to implement key capabilities. Learn how to assign preset security policies for Exchange Online Protection (EOP) and Microsoft Defender for Office 365. Protect your endpoints using Microsoft Defender Endpoint by onboarding devices and configuring roles and device groups. Lastly, dive into the advanced attack mitigation features for your devices using Defender for Endpoint to effectively investigate alerts and incidents.
Please RSVP and arrive at least 5 minutes before the start time, at which point remaining spaces are open to standby attendees.
Confidently adopt AI and manage your AI apps, agents, and platforms. From assistive copilots to autonomous digital workers, gain visibility and control to prevent data oversharing, manage sprawl, defend against threats, and ensure compliance.
Delivered in a silent stage breakout.
Step into the era of modular AI. Join our engineering leaders to see how Microsoft Foundry lets you build, orchestrate, and manage intelligent agents using new workflow capabilities. Learn how to unify models, data, and tools with enterprise-grade security and observability.
Build the single front door experience for your employees with the Employee Self-Service Agent in Microsoft 365 Copilot. In this lab, get hands on with configuring and extending the Agent in Copilot Studio, Learn to connect HR/IT systems and third-party agents, customize workflows, and see how deploying this agent streamlines support, reduces tickets, and boosts employee satisfaction—all with enterprise-grade security.
Please RSVP and arrive at least 5 minutes before the start time, at which point remaining spaces are open to standby attendees.
Downtime is expensive, and every minute counts when incidents hit. Yet valuable engineering time is lost to troubleshooting, instead of driving design and innovation. NeuBird’s Agentic AI SRE delivers real-time RCA and remediation, while ensuring enterprise-grade security and governance. It correlates telemetry across Azure Monitor, observability tools, and multi-cloud, helping reduce MTTR up to 90%. Join this session to see Hawkeye by NeuBird in action.
Explore how Veeam Data Cloud for M365 goes far beyond backup, leveraging Azure and Azure AI to interact with your data. These new features offer high-throughput data discovery and Veeam's patent-pending advanced malware and ransomware detection. See a live demo of natural language queries, threat evaluation, and AI-driven management via MCP server. Learn how IT Admins, SOC Leads and CISOs can quickly identify threats and prioritize mitigation- empowering security teams to act faster and smarter.
Want to have consistent data security and regulatory compliance with enterprise-wide visibility and policy enforcement across all your endpoints, SaaS, IaaS, and network traffic? Join this session to learn how expanded data discovery and classification from Microsoft Purview integrated with unified security and advanced controls from Netskope for all your data at rest and in motion delivers a seamless administrator and user experience to help you extend the value of your Microsoft investment.
Connecting LLMs to your secure, operational database involves complexity, security risks, and hallucinations. This session shows how to build context-aware AI agents directly on your existing data, going from live database to production-ready, secure AI agent in hours. You'll see how to ship personalized experiences that will define the next generation of software. RavenDB's CEO will demonstrate this approach.
Building intelligent AI agents is no simple task. With Microsoft Foundry Agent Service, you can rapidly create and deploy robust agents with the security, scalability, and integrations of Azure. In this walkthrough, we’ll build an agent that combines live data, reasoning, and dynamic tool usage. Using Azure Functions for real APIs and W&B Weave for detailed tracking, you’ll learn setup, tool registration, data endpoints, and Python-based interaction.
Cloud providers deliver powerful security capabilities, yet most organizations struggle to fully leverage them to ensure their environment is secure-by-design. In this session, we’ll explore how to harness the Azure native security controls to accelerate a prevention-first model. Learn how Native brings order to preventive policies across cloud providers, allowing you to safely achieve a secure-by-design environment in minutes.
Passkeys are an important step forward, but not the finish line. With attackers targeting help desks, enrollment , and self-service recovery to bypass MFA entirely, organizations need more to stop attacks and stay operational. Join this session to learn how RSA and Microsoft together secure the credential lifecycle, the blind spots that threat actors target, and how to build a bypass-resistant security posture.
In the era of AI-driven innovation, organizations need databases that are flexible and powerful while also being secure and scalable. This session explores how MongoDB empowers to rapidly build, deploy, and manage intelligent applications through the lens of a developer persona. Diving into our integrations with AI Foundry, Microsoft Sentinel, and Azure Landing Zones, we’ll showcase a complete developer journey—from prototype to production—while ensuring security, and operational excellence.
Enterprises face deployment challenges as ARM-based Copilot+ PCs enter corporate environments alongside traditional Intel devices. Managing mixed architectures often means separate tools, increasing complexity and risk. This demo shows unified deployment across Intel, AMD and ARM delivering identical builds. Watch Windows 11 deploy live to these platforms, maintaining security and compliance. Learn how OneDeploy's multi-architecture approach future-proofs your device deployment strategy.
DevEx 2.0 means giving developers guardrails that accelerate delivery instead of slowing it. This session shows how continuous security integrates with Azure and GitHub pipelines. You’ll see IDE coaching and SAST at commit. With Microsoft Copilot and Azure OpenAI using GPT-5, developers can cut through false positives and receive actionable fixes directly in the code. Builds include SBOM generation, container scans, and dependency checks. Staging environments add DAST and API testing.
DNS plays a critical role in a Zero Trust security strategy by helping enforce granular access controls and reduce broad network exposure. With over 63% of organizations adopting Zero Trust, it's recognized as an industry best practice to limit access strictly to necessary resources. This session explores why DNS should be a foundational element of your Zero Trust architecture and highlights how Microsoft has implemented Zero Trust DNS protections on Windows 11 devices.
AI and intelligent agents are no longer future promises — they’re transforming industries today. Hear real-world stories of organizations accelerating software development, enhancing every stage of the process, and redefining customer engagement. Discover Insight’s AI framework for adopting and scaling these capabilities with security, speed, and confidence — and get practical guidance to move from experimentation to measurable impact.
Cloud AI platforms introduce new business challenges for security teams: attackers exploit east-west traffic, encrypted communications, and limited visibility to move laterally and exfiltrate sensitive data undetected. These blind spots create long-term risk, eroding trust and threatening compliance. In this session, we will discuss the key security problems organizations must address in protecting AI workloads, share Check Point’s recommended approach to mitigating these risks.
Do you want to reduce your operating costs, have fewer things go wrong, improve your business profits and improve security? In this video you will learn how TeamViewer's DEX tool impacts user experience