Why this training ?
More and more companies are using the Microsoft Azure cloud platform.
This new afternoon seminar provides participants with the necessary insights into Microsoft cloud security, from the security configurations that are possible within Microsoft 365 to better protect a company against phishing, ransomware, malware, hacking, ..., to the configuration tips and best practices to develop a secure application on top of Azure.
Your questions are of course welcome!
What do you learn from this training ?
In this training we want to zoom in very pragmatically on the tools that Microsoft offers to secure Microsoft 365 and Azure. In addition to an overview, you will also receive tips and advice on how to continuously (daily) monitor the situation.
Who is this training intended for?
This training is aimed at both security professionals and:
of companies that have chosen the Microsoft Azure cloud platform.
This is a live online-only training, where we try to simulate the interaction and group feeling of an onsite meeting. We ask for your cooperation by turning on your camera and participating via the interactive chat, raising your hand, interrupting the speaker to ask questions, exchanging ideas via a whiteboard, etc. In this way, we can create as much, often even more, value for the participants. This is not going to be a boring webinar where Erwin shows slides and reads a text, on the contrary ...
Why this training ?
More and more companies are using applications and services on the Azure cloud platform.
In this new training from @itworks, independent security consultant Erwin Geirnaert provides insights into how Azure security works, and what you should pay attention to when using it properly. This is more than a summary of the options, but a pragmatic overview for security specialists.
Which security configurations are possible within Microsoft 365 to better protect a company against phishing, ransomware, malware, hacking, ...:
How can we easily and daily monitor the security status of our Microsoft 365 via the Security Score? What are the best practices where we can close security everywhere?
What are the best practices to develop a secure application on top of Azure? What is the difference in security when we talk about Infrastructure-as-a-Service, Platform-as-a-Service and Software-as-a-Service ?
Which security building blocks should we definitely configure to protect the application? We examine in detail:
Check out these related open workshops:
Check out our related in-house workshops: