Discover how Microsoft Purview Compliance Manager drives compliance, security, and AI readiness by simplifying regulatory complexity into clear actions. Learn about new capabilities like AI Regulations Onboarding, an enhanced Regulatory Navigator without template limits, and Microsoft Foundry integration. See how compliance scoring is embedded into AI workflows to reduce adoption friction and build trust in responsible AI.
talk-data.com
Topic
Cyber Security
2078
tagged
Activity Trend
Top Events
Threat Intelligence (TI) is no longer just data— it’s actionable insight embedded directly into your security operations. In this session, we’ll explore the latest insights from the Microsoft Digital Defense Report and how Microsoft is transforming TI into dynamic, curated intelligence within Defender, empowering your team. Learn how the latest innovations, including enhanced workflows and TI specific agents, are helping analysts to move faster and act on better intel than ever before.
Learn how you can use tools in Security Copilot to build your own custom agents. Discover agents that are available for you to use off the shelf.
Implementing Continuous Threat Exposure Management using MSEM
As generative AI adoption accelerates, IT, security and compliance leaders must balance access to innovation with responsibility and governance. In this session on Copilot Trust & Safety you’ll learn about the Microsoft-built protections embedded in the platform, see how Copilot safety investments map to real-world risk scenarios, and get a clear understanding of how to proactively safeguard your organization through policy, compliance, and risk management tools while unlocking AI’s value.
Get a step-by-step walkthrough for Microsoft Defender XDR and learn how to implement key capabilities. Learn how to assign preset security policies for Exchange Online Protection (EOP) and Microsoft Defender for Office 365. Protect your endpoints using Microsoft Defender Endpoint by onboarding devices and configuring roles and device groups. Lastly, dive into the advanced attack mitigation features for your devices using Defender for Endpoint to effectively investigate alerts and incidents.
Please RSVP and arrive at least 5 minutes before the start time, at which point remaining spaces are open to standby attendees.
Confidently adopt AI and manage your AI apps, agents, and platforms. From assistive copilots to autonomous digital workers, gain visibility and control to prevent data oversharing, manage sprawl, defend against threats, and ensure compliance.
Delivered in a silent stage breakout.
Step into the era of modular AI. Join our engineering leaders to see how Microsoft Foundry lets you build, orchestrate, and manage intelligent agents using new workflow capabilities. Learn how to unify models, data, and tools with enterprise-grade security and observability.
Build the single front door experience for your employees with the Employee Self-Service Agent in Microsoft 365 Copilot. In this lab, get hands on with configuring and extending the Agent in Copilot Studio, Learn to connect HR/IT systems and third-party agents, customize workflows, and see how deploying this agent streamlines support, reduces tickets, and boosts employee satisfaction—all with enterprise-grade security.
Please RSVP and arrive at least 5 minutes before the start time, at which point remaining spaces are open to standby attendees.
The internal design and deployment modes of DeDi How scale, performance, and security are handled Areas open to contribution, improvement, and extension
Live demos of AI-driven security techniques you can apply immediately.
Live demos of AI-driven security techniques you can apply immediately.
Architecture of DeDi — internal design, deployment modes, scaling, security, and contribution opportunities.
In this episode of Data Unchained we sit down with Ellison Anne Williams, Founder and CEO of Enveil, to explore one of the most important questions in modern technology: how do you protect your data from AI. In this conversation, Ellison Anne breaks down how data can be used securely across environments you do not own, trust, or control, why AI models silently leak sensitive information, and how encrypted computation is transforming the future of AI, cybersecurity, finance, and national security. Learn how privacy enhancing technologies are reshaping enterprise data protection, how secure AI evaluation works, and what technologies organizations must adopt to stay ahead of the next wave of cyber risk. Cyberpunk by jiglr | https://soundcloud.com/jiglrmusic Music promoted by https://www.free-stock-music.com Creative Commons Attribution 3.0 Unported License https://creativecommons.org/licenses/by/3.0/deed.en_US Hosted on Acast. See acast.com/privacy for more information.
Covers AI-driven approaches to security and compliance in the AWS cloud.
Patrick Burke, Chief Data Officer at Havas, shares real-world strategies for balancing innovation with security.
The recent progression of AI brings several challenges to achieve compliance and security. We will discuss topics and ideas on how to ensure that AI practices and programs are done securely and compliantly. It is important that prevent not only data leakage, but also IP leakage. We will explore what this means in the new world of AI and techniques of how to manage it.
API testing includes so many things in it - functionality, data, performance, security. We'd like to know as much as we can about our APIs, but we've got so little time. Can AI help? You bet. It can help in planning, case suggestions, preparations for testing, documenting the tests and help with integration with our favorite tools. Things that took hours now take seconds. API Testing is changing. We want to take advantage of AI's power, and make sure that our testing is not only productive, but effective. I'll show you how.
A hands-on technical and industry roadmap for aspiring data engineers In Data Engineering for Beginners, big data expert Chisom Nwokwu delivers a beginner-friendly handbook for everyone interested in the fundamentals of data engineering. Whether you're interested in starting a rewarding, new career as a data analyst, data engineer, or data scientist, or seeking to expand your skillset in an existing engineering role, Nwokwu offers the technical and industry knowledge you need to succeed. The book explains: Database fundamentals, including relational and noSQL databases Data warehouses and data lakes Data pipelines, including info about batch and stream processing Data quality dimensions Data security principles, including data encryption Data governance principles and data framework Big data and distributed systems concepts Data engineering on the cloud Essential skills and tools for data engineering interviews and jobs Data Engineering for Beginners offers an easy-to-read roadmap on a seemingly complicated and intimidating subject. It addresses the topics most likely to cause a beginning data engineer to stumble, clearly explaining key concepts in an accessible way. You'll also find: A comprehensive glossary of data engineering terms Common and practical career paths in the data engineering industry An introduction to key cloud technologies and services you may encounter early in your data engineering career Perfect for practicing and aspiring data analysts, data scientists, and data engineers, Data Engineering for Beginners is an effective and reliable starting point for learning an in-demand skill. It's a powerful resource for everyone hoping to expand their data engineering Skillset and upskill in the big data era.