Unexpected spikes in log volume left Yale New Haven Health, Connecticut's largest healthcare system, struggling with soaring SIEM costs and operational inefficiencies. In this session, hear how the team used Cribl to cut log volume by 40%, centralize data telemetry from 30k+ endpoints, and accelerate migration to Microsoft Sentinel in just two weeks. Learn how to control costs, streamline operations, and strengthen security posture with a modern telemetry data management strategy.
talk-data.com
Topic
Cyber Security
216
tagged
Activity Trend
Top Events
Attendees will learn to enable Defender for Cloud, navigate its dashboard, and interpret regulatory compliance and workload protection insights. The labs also cover secure score analysis, security recommendations, inventory management, pricing models, and governance rule assignment. By the end of the series, participants will be equipped to proactively identify and mitigate threats, strengthen cloud security posture, and align with organizational governance standards.
Please RSVP and arrive at least 5 minutes before the start time, at which point remaining spaces are open to standby attendees.
As security data grows, it is critical for organizations to balance business outcomes and budgets. In this session, discover how Microsoft Sentinel data lake simplifies data management, accelerates AI adoption and optimizes costs. Serving as the foundation of the Microsoft Sentinel platform, it unifies all security data for greater visibility, deeper analysis, and contextual awareness. We’ll share real-world examples, tools, and best practices to help you maximize Microsoft Sentinel value.
Data Security Posture Management (DSPM) has become an increasingly important pilar for organizations to make sure their data security programs are well established, properly working, and continuously improved. To enable data security teams to secure their data more effectively, we’re now bringing the new generation of Microsoft Purview DSPM, going beyond visibility and bringing in actionable insights to address organizations’ top data risks. Join this session to explore how Microsoft Purview DSPM is helping reshape data security posture taking data protection to the next level!
Connection Pods accommodate up to 15 people. Please RSVP and arrive at least 5 minutes before the start time, at which point remaining spaces are open to standby attendees.
AI workloads require a fast and secure data infrastructure that works seamlessly. Learn how Azure Blob storage scales for OpenAI, how Azure Container Storage and Blobfuse2 ensure GPUs never sit idle, how to simplify integration with Ray/KAITO for AI apps on AKS, and how Blob storage integrates with AI services and frameworks to securely convert your enterprise data to AI-ready data. You’ll leave with best practices to drive performance, security, and developer velocity with Azure Storage.
Accelerate compliant Azure transformation for payers, providers, pharma, and research orgs with Aviatrix Cloud Native Security fabric. Learn proven strategies for zero trust architecture with end-to-end encryption, securing EHRs, claims systems, clinical trials, and R&D platforms while meeting HIPAA/regulatory requirements. Integrate deeply with the Microsoft stack including AI-first innovation to rapidly identify and triage cloud security issues in real-time with CoPilot and Sentinel.
What challenges are you facing with visibility, governance, and access controls for agents? We are seeking feedback on real-world agent use in organizations, identity and network security implications, and how Microsoft Entra solutions are evolving to secure and govern autonomous agents. Join us for a discussion with an expert and the opportunity to hear what your peers are thinking, too!
Connection Pods accommodate up to 15 people. Please RSVP and arrive at least 5 minutes before the start time, at which point remaining spaces are open to standby attendees.
Organizations are under constant pressure to deliver software faster, more securely, and at lower cost. GitHub Enterprise is more than just a source code platform, it is the foundation for developer velocity and future-ready innovation. In this session, you will learn how to adopt GitHub as a platform, what to consider when migrating from existing tools, and how to enable your teams with built-in security, automation, and AI- powered development. We will cover the benefits of centralizing on GitHub Enterprise, strategies to accelerate adoption across your organization, and practical steps to get the most out of GitHub Advanced Security and GitHub Copilot. Finally, weʼll look ahead to the future of AI in software development and how todayʼs adoption choices set you up to take full advantage of whatʼs next. Whether you are just beginning your GitHub journey or looking to maximize your investment, this session will help you prepare your developers, and your organization, for long-term success.
As threats grow more complex, teams need improved visibility and context to defend threats faster. In this lab, we’ll explore how Microsoft Purview and Defender XDR integrate to help organizations investigate security incidents through a single pane.
Please RSVP and arrive at least 5 minutes before the start time, at which point remaining spaces are open to standby attendees.
Effortlessly modernize classic ASP.NET apps with Managed Instance on Azure App Service. Enjoy frictionless migration, minimal code changes, and great control with custom software support. Get benefits of VMs with agility, security & scalability of PaaS.
Please RSVP and arrive at least 5 minutes before the start time, at which point remaining spaces are open to standby attendees.
Discover the enhanced Microsoft Zero Trust Workshop—now covering all six technical pillars. Explore how Intune and Entra secure identities and devices, with new implementation indicators and cross-pillar guidance. Build a tailored roadmap, track progress, and leverage the latest integrations to accelerate adoption and boost your security posture.
Please RSVP and arrive at least 5 minutes before the start time, at which point remaining spaces are open to standby attendees.
Do you need to protect your data with AI or from AI? Do you need to protect your AI-generated data? Great questions! There’s a lot of focus on the security, privacy, and governance features built into Copilot, but not as much attention on how you can use AI to help you keep your data safe and secure. In this session we’ll cover the key principles of using AI tools to help protect your Microsoft-platform data, including Copilot agents and other items that you may not have thought of protecting.
Discover how Cisco and Microsoft deliver unified digital resilience by integrating visibility, security, automation, and AI-driven insights on Microsoft Azure. Learn how this partnership transforms security operations with AI-powered unified threat detection, investigation and response that accelerates threat detection, operational efficiency, and business continuity. Explore real-world customer success stories and the latest technology roadmap.
In the AI era, IT and security leaders face the challenge of enabling speed and innovation while ensuring comprehensive data protection and compliance. This session explores how Copilot Control System (CCS) – with tools like Microsoft Purview and SharePoint Advanced Management – enables organizations to address oversharing concerns, mitigate data loss and insider risks, and govern Microsoft 365 Copilot and agent use to meet regulations and policies.
IT teams are the heroes behind successful Microsoft 365 Copilot and agent adoption. This session shows how Copilot Control System (CCS) and Agent 365 empower IT to shape secure, scalable, and value-driven AI deployments. From managing setup, security, adoption, agent policies and lifecycles, CCS and Agent 365 together help maximize AI impact and innovation with a growing set of management controls. Keep IT in the driver's seat with real solutions for Copilot and agent success.
Delivered in a silent stage breakout.
As organizations harness AI, success depends on trust. Join Lenovo and Microsoft to explore how security, cloud infrastructure, and AI innovation empower the modern workforce. Discover how Lenovo’s Cybersecurity Services for Microsoft—powered by Defender, Sentinel, and Security Copilot—deliver end-to-end resiliency, while TruScale, ThinkAgile, and Azure Stack HCI extend AI across the enterprise for secure, intelligent operations.
Microsoft’s security stack is powerful, but many organizations aren’t using it to its full potential. Join us to understand how to maximize your investment and the ways the Huntress Platform can turn your Microsoft licensing into an affordable, 24/7, people-driven threat detection and automated response platform for your endpoints, identities, employees, and data. Learn how we operationalize your Microsoft licensing into our platform to stop attacks in their tracks.
For Security Operations Center leaders, the daily reality is a battle against alert fatigue. IUniderstand how you can build security operations to detect, investigate, and respond to threats at the speed and scale of cloud. Learn about AI-powered Attack Discovery which automatically surfaces high-fidelity threats, Elastic Workflows, a native automation engine, and Elastic AI Agent Builder to investigate and monitor using out-of-the-box AI agents or to build custom agents.
Discover how Microsoft Defender for Office 365 redefines security with agentic AI, intelligent automation, and ecosystem integration. Empowering teams to detect, investigate, and respond at machine speed, outpacing threats with precision and confidence.
Get a step-by-step walkthrough for Microsoft Defender XDR and learn how to implement key capabilities. Learn how to assign preset security policies for Exchange Online Protection (EOP) and Microsoft Defender for Office 365. Protect your endpoints using Microsoft Defender Endpoint by onboarding devices and configuring roles and device groups. Lastly, dive into the advanced attack mitigation features for your devices using Defender for Endpoint to effectively investigate alerts and incidents.
Please RSVP and arrive at least 5 minutes before the start time, at which point remaining spaces are open to standby attendees.