talk-data.com talk-data.com

Topic

Cyber Security

cybersecurity information_security data_security privacy

216

tagged

Activity Trend

297 peak/qtr
2020-Q1 2026-Q1

Activities

Showing filtered results

Filtering by: Microsoft Ignite 2025 ×
Inside Microsoft Agent 365

See how the new Microsoft Agent 365 extends the infrastructure used for managing people to managing agents. We’ll explain what Agent 365 is, how it works, and how it’s managed. With Agent 365 every agent gets​ a unique identity​, access to productivity tools in Microsoft 365, systems and data for context. IT gets​ total observability and visibility​, along with control, security and governance.

Level up Microsoft security for insider threats

Maximize the value of Microsoft Defender and Entra ID with OpenText™ Core Threat Detection and Response. Learn how behavior-based analytics complement your existing tools to unmask elusive threats (e.g. insider, novel, advanced persistent), streamline investigations, and reduce noise—no tuning or rule-writing required. See how you can do more with the telemetry you already trust.

Join this hands-on lab to learn about Azure Arc for on-prem and multicloud management. In this lab, you will learn how to project and manage resources in Azure - connect on-premises resources and use cloud connector for AWS resources, enforce security policies, and enable monitoring. Whether you’re modernizing existing systems or building new edge capabilities, you’ll gain practical experience to extend Azure’s power everywhere.

Get a step-by-step walkthrough for Microsoft Defender XDR and learn how to implement key capabilities. Learn how to assign preset security policies for Exchange Online Protection (EOP) and Microsoft Defender for Office 365. Protect your endpoints using Microsoft Defender Endpoint by onboarding devices and configuring roles and device groups. Lastly, dive into the advanced attack mitigation features for your devices using Defender for Endpoint to effectively investigate alerts and incidents.

Attendees will learn to enable Defender for Cloud, navigate its dashboard, and interpret regulatory compliance and workload protection insights. The labs also cover secure score analysis, security recommendations, inventory management, pricing models, and governance rule assignment. By the end of the series, participants will be equipped to proactively identify and mitigate threats, strengthen cloud security posture, and align with organizational governance standards.

This hands-on workshop will introduce participants to the fundamentals of automated AI red teaming generative AI systems for safety and security risks using Microsoft Foundry. Attendees will learn how to apply automated attack techniques to identify safety issues and security vulnerabilities across multiple risk dimensions before deployment. Participants will engage in hands-on walkthroughs and guided exercises to apply these concepts in realistic development scenarios.

Prepare for the Autonomous Era in ITOps

Manual patching drains time, money, and security. Join Jason Kikta, Automox CISO and former U.S. Cyber Command leader, as he unpacks insights from the 2026 State of Endpoint Management Report. Learn why time-to-remediate is the new business health metric and unlock a safer, smarter tomorrow with Autonomous Endpoint Management.

Revolutionize file storage with PowerScale's Azure integration

See how Dell PowerScale for Azure cuts through storage complexity and delivers enterprise-grade file storage built for modern workloads. Watch PowerScale handle sprawling, unstructured data and integrate effortlessly with Azure, fueling high-impact AI, analytics, and business-critical data-intensive applications without missing a beat. Join our 10-minute live session for a firsthand look at the high performance, rock-solid security, and operational speed customers demand today.

Secure the work with Citrix

Work is now fluid, distributed, and powered by AI, creating new complexity for IT leaders. With more worker types, more apps, and rising security and compliance risks, organizations need a strategic platform approach. Citrix delivers secure, scalable access for all worker types - including AI agents - plus end-to-end app security, productivity, and cost optimization to keep enterprises ahead.

Securing the AI Agents with Zenity and Microsoft

As AI agents scale across Microsoft 365 Copilot, Copilot Studio, and Microsoft Foundry, defense-in-depth is more critical than ever. In this session, learn how Zenity’s unified platform complements and extends Microsoft security solutions to deliver AI observability, posture management, detection and response, and inline prevention—securing agents wherever they’re built. Discover how to govern AI responsibly, mitigate risks, and ensure compliance across your Microsoft AI ecosystem.

Security in the agentic AI era: built-in, built for autonomous defense

As more organizations adopt and deploy agents at scale, transforming into intelligence-driven Frontier Firms, there is an urgent need for security that protects end to end and gives IT and security teams oversight, control, and governance over the new workforce with agents working side by side with people. Vasu Jakkal, CVP, Microsoft Security, takes time to discuss how security must be ambient and autonomous—just like the AI it protects. Microsoft Security announced innovations at Ignite that are delivering on a vision of security as the core primitive.

Think you know Quest? Think again.

We're investing $350M to make our 30 years of expertise your AI launchpad. The new Quest understands that AI fails without trusted data and modern identity security. Join us to see how we build the essential foundation for your AI strategy; from creating trusted, AI-ready data products to securing your entire Microsoft identity fabric (AD & Entra ID). Your legacy is your advantage.