talk-data.com talk-data.com

Topic

Cyber Security

cybersecurity information_security data_security privacy

216

tagged

Activity Trend

297 peak/qtr
2020-Q1 2026-Q1

Activities

Showing filtered results

Filtering by: Microsoft Ignite 2025 ×

Discover how agents powered by the Model Context Protocol (MCP) on Windows transforms enterprise productivity. This session explores how MCP on Windows enables intelligent, context-aware automation, and seamless app integration to deliver on common real-world scenarios. Learn how these agents offer simplified user experiences while maintaining strong end-user security.

A new era of work is emerging—where the browser becomes a proactive, context-aware partner that helps move work forward. As a secure enterprise browser at its core, Edge for Business brings AI-powered assistance to everyday workflows, including Copilot Mode and multi-tab reasoning. See Copilot Mode in action and explore new contractor scenarios, among other security and management capabilities designed to help IT leaders deliver secure, productive experiences on any device, anywhere.

Attend the Hyper V session to gain a comprehensive overview of the latest advancements and features transforming virtualization technology. Learn how Hyper V delivers enhanced performance, scalability, and security. The session will also address the role of AI in management, current Hyper-V development initiatives, and provide expert guidance for optimizing latency-sensitive workloads.

Automation in Copilot Studio: Agent flows and computer use

Step into the agentic era with Copilot Studio. Learn to build solutions using agent flows and computer use agents (CUA) for end-to-end automation across apps, sites, and desktops. Discover how to orchestrate complex processes, apply Microsoft security and governance, and scale automation confidently—whether modernizing flows or piloting new agentic solutions.

Delivered in a silent stage breakout.

Blueprint for Building the SOC of the Future

The future of security operations is autonomous, adaptive, and deeply integrated—and Microsoft is delivering the blueprint. In this session, you’ll learn how to turn that vision into reality using Microsoft Sentinel and Defender. We’ll walk through how to architect a modern SOC that not only detects and responds to threats in real time, but also anticipates and prevents them using predictive shielding, agentic AI, and graph-powered reasoning.

Build AI Apps fast with GitHub and Microsoft Foundry in action

Discover how to accelerate AI application development with GitHub and Microsoft Foundry—Microsoft’s integrated platform for building, customizing, and deploying intelligent apps at scale. This session walks IT professionals through the full lifecycle of AI app development, from experimentation to production deployment using Foundry’s robust orchestration, security, and governance capabilities.

This session is tailored for professionals like you, eager to move beyond foundational knowledge. We'll share our most valuable practical experiences from numerous projects and introduce you to the latest features recently added by Microsoft. Learn how to apply these innovations in practice to enhance your security strategy. No introductions here, just a deep dive into the world of advanced access control!

Connection Pods accommodate up to 15 people. Please RSVP and arrive at least 5 minutes before the start time, at which point remaining spaces are open to standby attendees.

Enabling the next wave of cloud transformation with Azure Networking

Azure Network is the backbone of Microsoft’s cloud vision—enabling secure, scalable, and high-performance connectivity across the globe.

Discover the evolution of Azure networking innovations across its networking foundations, connectivity, application delivery and security. Learn how these advancements boost multi-region deployment, security, and performance at scale. Hear real-world examples on how organizations are architecting resilient, intelligent, and hybrid cloud infrastructures.

Delivered in a silent stage breakout.

This hands-on lab is designed to equip IT professionals and technical decision-makers with the latest tools and capabilities in Microsoft Teams administration and security. Participants will explore new diagnostic, monitoring, and protection features that enhance operational efficiency and safeguard collaboration.

Please RSVP and arrive at least 5 minutes before the start time, at which point remaining spaces are open to standby attendees.

Attendees will learn to enable Defender for Cloud, navigate its dashboard, and interpret regulatory compliance and workload protection insights. The labs also cover secure score analysis, security recommendations, inventory management, pricing models, and governance rule assignment. By the end of the series, participants will be equipped to proactively identify and mitigate threats, strengthen cloud security posture, and align with organizational governance standards.

Please RSVP and arrive at least 5 minutes before the start time, at which point remaining spaces are open to standby attendees.

Discover how to reduce your containerized application’s vulnerability footprint by leveraging the Azure Linux stack end-to-end. In this session, you’ll learn how to build distroless Azure Linux containers and deploy them on AKS nodes running Azure Linux. We’ll show you how this integrated approach minimizes CVEs, simplifies security management, and delivers a hardened environment for your workloads—all without sacrificing agility.

The "tyranny of the default" refers to a phenomenon where people tend to stick with preselected or default options rather than actively choosing alternatives. Unfortunately, this phenomenon also occurs in Microsoft 365 and results in weak security posture. Continuous evaluation of you Microsoft 365 security posture is critical to staying ahead of evolving cyber threats. As attackers constantly develop new tactics, techniques, and vulnerabilities, a static security strategy quickly becomes obsolete. In this session I'll provide some guidance on how to evaluate your tenant security posture, build a secure baseline configuration and continuous evaluate your Microsoft 365 security posture.

Connection Pods accommodate up to 15 people. Please RSVP and arrive at least 5 minutes before the start time, at which point remaining spaces are open to standby attendees.

Secure code to cloud with AI infused DevSecOps

Modern development moves fast. Security teams are overwhelmed with alerts. But not all risks are equal. GitHub Advanced Security and Microsoft Defender for Cloud make DevSecOps seamless by connecting code to runtime context and unifying developer and security admin tools. Learn how to prioritize what’s actually exploitable in production, reduce alert fatigue, and accelerate remediation with AI-powered fixes with agentic workflows.

Trustworthy AI at Microsoft: From commitments to capabilities
breakout
by Natasha Crampton (Microsoft) , Vivek Sinha (Infosys) , Florent Ricci (Stanley Black & Decker, Inc.) , Sarah Bird (Microsoft) , Ian Swanson (Palo Alto Networks)

Microsoft’s Trustworthy AI approach is grounded in three pillars: commitments, capabilities, and research. We are prioritizing security, sovereignty, sustainability, and safety as core areas of investment, ensuring that AI systems are built responsibly and deployed with confidence. In this session, we’ll show how these commitments translate into tangible product capabilities across Microsoft Foundry, Copilot, and the broader Microsoft AI ecosystem.

Breaches are inevitable. Disasters are optional. Watch Illumio Insights, an AI-powered cloud detection and response solution, transform complex threat detection into visual containment in minutes. As a Sentinel data lake launch partner, Insights is accessible from within Sentinel. Insights Agent within Security Copilot identifies lateral movement risk, contains threats instantly, and suggests microsegmentation policies. Stop intruders and turn threat containment into a 5-minute “wow” moment.

Explore how Snapdragon® platforms are powering a new generation of intelligent devices designed to meet enterprise needs. Through insights from Snapdragon X Series and Nexthink’s employee experience analytics, this session will unpack how silicon-driven performance, security, and AI efficiency are transforming IT operations and redefining digital employee experience. You’ll walk away with clear strategies for integrating AI at scale.

Join this hands-on lab to explore Azure Arc for hybrid and multicloud environments. You’ll onboard Windows VMs, enable monitoring with Azure Monitor, apply compliance with Machine Configuration, and strengthen security using Microsoft Defender for Cloud. Wrap up by enabling Arc agent auto-upgrade to keep resources secure and current.

Please RSVP and arrive at least 5 minutes before the start time, at which point remaining spaces are open to standby attendees.

Modern CI/CD pipelines and software supply chains are critical to delivering quickly, but they are also prime targets for attackers. Many organizations are unaware of the many ways that their approaches may be exposing them to risk. We’ll walk through three common ways attackers can compromise your CI/CD processes and how to spot and fix these risks using GitHub Advanced Security. Get practical guidance to strengthen your workflows, secure your supply chain, and stay ahead of evolving threats.