How to Leverage the Azure Security Center & Microsoft Operations Management Suite for an Incident Response




Taste of Premier   (Audio) - Channel 9 show

Summary: Join Lex Thomas and Yuri Diogenes as they discuss how you can leverage both the Azure Security Center and Microsoft Operations Management Suite (OMS) to better manage cybersecurity threats in both the cloud and hybrid cloud environments. [2:10] Why are some organization still avoiding a move to the cloud? Are security concerns a major reason for this hesitation?[3:45] What happens when there's a security incident in the cloud?[5:45] So how can the Azure Security Center be utilized for an incident response?[8:00] DEMO: Azure Security Center[15:53] DEMO: Operations Management Suite (OMS) Security Dashboard[23:24] Where can our viewers go for more information? Looking for more info? Check out the “Azure Security Center Planning and Operations Guide” Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS __________________________ Websites & Blogs: Microsoft Services Premier SupportMicrosoft CybersecurityAzure Security CenterOperations Management SuiteAzure Security InformationGet the book! Microsoft Azure Security InfrastructureVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware