A special thanks to our sponsors, speakers, and those who participated in Petri's GET-IT conference.
Petri Editorial Director Russell Smith gets the conference started with an outline of all the day's sessions and what you can expect to learn by attending our GET-IT conference.
This presentation will delve into the advanced threat protection capabilities of Microsoft Defender and how it can be utilized to protect Windows endpoints. Attendees will learn about the different features and benefits of Microsoft Defender, including threat detection and response, and how it can be integrated with other security tools. The presentation will also cover best practices for deployment and management of Microsoft Defender to ensure maximum protection of Windows endpoints.
After deploying Microsoft security tools such as Defender 365 and Identity Protection, you will be confronted with an avalanche of alerts. It is important to distinguish real security threats from noise to take action against attacks. During this session, you will learn how to use Microsoft Sentinel to enrich, automate, and suppress Microsoft security alerting.
It's no secret that an increasing number of ransomware attacks and data breaches have taken the world by storm, especially as the rapid adoption of hybrid work models has forced businesses to transition to cloud technologies.
While data is now being accessed and managed in the cloud, the devices and locations from which people are doing their work are often in shared, non-private spaces. These conditions are prime for cybercriminals to swoop in and take advantage of vulnerabilities in our systems.
On the corporate level, significant breaches may be career-ending for company executives, and as the level of attention on attacks rises, so does potential reputational as well as financial damage to the organizations that fall victim.
This checklist will guide you through 8 simple steps that will help not only decrease the likelihood of an organization being targeted with ransomware but also potentially mitigate the damages if and when you are infected.
This presentation will provide attendees with a practical guide to implementing a Zero Trust security model using Azure Active Directory. Ru will outline five key steps to building a Zero Trust framework, including identity and access management, risk assessment, and continuous monitoring. Attendees will gain insights into best practices for securing their organization's resources and data in a rapidly evolving threat landscape.
Russell Smith hosts a panel of experts, including Rod Trent and Brodie Cassell from Microsoft, who will discuss the role of A.I. in security operations.
In this presentation, attendees will learn how to protect their organization's critical assets with Azure Backup. Wim will demonstrate how Azure Backup can provide reliable and scalable data protection for hybrid and cloud environments. Attendees will also gain insights into best practices for implementing a disaster recovery plan using Azure Backup, including backup and restore options, monitoring and reporting capabilities, and cost optimization strategies.
A special thanks to our sponsors, speakers, and those who participated in Petri's GET-IT conference.