City street with lights

Microsoft at RSA Conference 2017

See what you missed from this year’s global security event with on-demand Microsoft presentations that highlight our unique view of threat intelligence and demonstrate how Microsoft fits into your security portfolio.

Featured Microsoft RSA speakers

Brad Smith.

Brad Smith, President

  • Protecting and defending against cyber threats in uncertain times
  • While many hacks, data breaches and leaks are the work of criminals seeking financial gain, new threats continue to emerge targeting civilians, businesses and governments. Hear Brad Smith discuss these growing and evolving cyber threats and what’s needed to protect and defend this critical infrastructure.
  • Watch session

Mark Russinovich.

Mark Russinovich, CTO Azure

  • Advances in Cloud-scale Machine Learning for Cyber Defense
  • Discover the latest frameworks, techniques, and unconventional machine learning algorithms that Microsoft uses to disrupt attackers and protect customers.
  • View presentation

Dan Plastina.

Dan Plastina, Partner Director, Threat Protection

  • A Vision for Shared, Central Intelligence to Ebb a Growing Flood of Alerts
  • Learn how to make the most of machine learning and intelligence from a new effort aimed at reducing the sea of data and frustration in the industry.
  • View presentation

Sara Manning Dawson.

Sara Manning Dawson, Principal Group Program Manager

  • Learnings from the Cloud: What to Watch When Watching for Breach
  • Take a deep dive into Office 365 best practices for protecting against cloud service account breach and misuse.
  • View presentation

Videos on demand

Gaining Visibility and Control of Cloud Infrastructure Security slide.
Gaining Visibility and Control of Cloud Infrastructure Security

Take control of cloud security with visibility into the security state of your cloud infrastructure and policy-driven security recommendations. We will demo the Azure Security Center, Power BI dashboard, and the Operations Management Suite Demo.

Presenter: Adwait Joshi (AJ)

Gaining Enhanced Visibility and Control with Office 365 Advanced Security Management slide.
Gaining Enhanced Visibility and Control with Office 365 Advanced Security Management

Learn how Advanced Security Management can help you detect unusual use of Office 365, what shadow it is happening in your company and what apps users are plugging into your company's Office 365 environment.

Presenter: Anthony Smith (A.J.)

Towards a Trustworthy Industrial Internet of Things slide.
Towards a Trustworthy Industrial Internet of Things

This session will introduce the challenges of designing, developing, and deploying IoT infrastructure. Additionally, it will introduce security design principles and features built into Microsoft Azure and Azure IoT Suite resulting in a trustworthy Internet of Things.

Presenter: Arjmand Samuel

Azure Encryption @ Rest slide.
Azure Encryption @ Rest

Discover how to be able to describe the Encryption @ Rest roadmap for Azure.

Presenter: Avi Ben-Menahem

Catching advanced attacks and insider threats with Microsoft ATA slide.
Catching advanced attacks and insider threats with Microsoft ATA

Learn what advanced attacks look like and how Advanced Threat Analytics (ATA) can help you catch them.

Presenter: Benny Lakunishok

Taking Ransomware to task with Next Generation Windows Defender (Session 1) slide.
Taking Ransomware to task with Next Generation Windows Defender (Session 1)

Ransomware has become a plague. With Windows 10, we've delivered a deep bench of defenses to help address the threat. Come join us to learn our strategy and how Windows 10 can help.

Presenters: Shekhar Saxena, Bill Pfeifer, Tim Kerk

Taking Ransomware to task with Next Generation Windows Defender (Session 2) slide.
Taking Ransomware to task with Next Generation Windows Defender (Session 2)

Ransomware has become a plague. With Windows 10, we've delivered a deep bench of defenses to help address the threat. Come join us to learn our strategy and how Windows 10 can help.

Presenters: Shekhar Saxena, Bill Pfeifer, Tim Kerk

GDPR Primer slide.
GDPR Primer

On May 2018, Europe's General Data Protection Regulation or GDPR comes to effect. Now is the time to start planning and this primer will tell you how.

Presenter: Bruce Cowper

Conditional Access with EMS (Session 2) slide.
Conditional Access with EMS (Session 2)

Learn how Microsoft solutions work together to improve your organization’s security posture. Watch now to learn about Conditional Access with Enterprise Mobility Services (EMS).

Presenter: Caleb Baker

NextGen SOC slide.
NextGen SOC

Enterprise security ops are struggling with data fatigue and talent shortage. Learn how Microsoft and E&Y have teamed up to provide a managed solution that lowers customers’ mean time to detection and recovery utilizing the power of Azure.

Presenters: Chad Holmes, Jonathan Trull

Microsoft Edge Security with Windows Defender Application Guard (Session 1) slide.
Microsoft Edge Security with Windows Defender Application Guard (Session 1)

Attacks on devices most likely achieve success through exploits that either begin in the user’s inbox or in the browser. Come join us to learn more about how Windows Defender Application Guard can help protect devices from the most advanced attacks launched against Microsoft Edge.

Presenter: Chas Jeffries

Iron sharpens Iron: Fusing offensive and defense security research (Session 1) slide.
Iron sharpens Iron: Fusing offensive and defense security research (Session 1)

This session will show how Microsoft’s data driven approach to developing advanced threat detection capabilities has impacted our direction and security features in Windows 10.

Presenter: David Weston

Compliance, Privacy, and Security information on the Microsoft Trust Center slide.
Compliance, Privacy, and Security information on the Microsoft Trust Center

Learn about the Microsoft Trust Center. Here you have access to comprehensive information about compliance certifications, audit reports, and privacy and security policies in the Microsoft Cloud.

Presenters: David Burt, Om Vaiti

What/s New & Upcoming in Advanced Threat Protection slide.
What's New & Upcoming in Advanced Threat Protection

Learn how Microsoft solutions work together to improve their organization’s security posture. Watch this video to understand how we secure sensitive email across devices and to anyone you wish to reach.

Presenters: Jason Rogers, Debraj Ghosh

Get ahead of attackers with Identity-Driven Security (Session 2) slide.
Get ahead of attackers with Identity-Driven Security (Session 2)

Allow us to show you how our technologies help you first protect at the "front door", protect your data and detect attacks before they cause damage.

Presenter: Demi Albuz

Security and Compliance in Azure Stack slide.
Security and Compliance in Azure Stack

Learn how Azure Stack adopted the "Assume Breach" and "Hardened by Default" principles to bring state of the art security and compliance to the next generation hybrid cloud solution.

Presenter: Filippo Seracini

Easily secure your sensitive email with the power of Office 365 and Azure Information Protection slide.
Easily secure your sensitive email with the power of Office 365 and Azure Information Protection

Watch to understand how we secure sensitive email across devices and to anyone you wish to reach. See a demo of the user experience and what’s under the hood.

Presenters: Gagan Gulati, George Roussos

Detect and respond to advanced and targeted attacks with Windows Defender ATP (Session 1) slide.
Detect and respond to advanced and targeted attacks with Windows Defender ATP (Session 1)

Windows Defender ATP is able to detect attackers and threats that have evaded other defenses. It enables enterprises to investigate the potential scope of breach across endpoints and provides relevant Threat Intelligence and response recommendations.

Presenter: Heike Ritter

Detect and respond to advanced and targeted attacks with Windows Defender ATP (Session 2) slide.
Detect and respond to advanced and targeted attacks with Windows Defender ATP (Session 2)

Windows Defender ATP is able to detect attackers and threats that have evaded other defenses. It enables enterprises to investigate the potential scope of breach across endpoints and provides relevant Threat Intelligence and response recommendations.

Presenter: Heike Ritter

Best practices for securing privileged identities across Office 365 and Azure AD slide.
Best practices for securing privileged identities across Office 365 and Azure AD

Discover the best practices to managing privileged identities and their access across Office 365, Microsoft Online Services and connected SaaS apps as well.

Presenter: Mark Wahl

Whats new in Office 365 DLP slide.
What's new in Office 365 DLP

We will provide an overview of new updated features in Office 365 DLP like, simplified admin UX, updates to IW experiences and new reports.

Presenter: Mas Libman

Conditional Access with EMS (Session 1) slide.
Conditional Access with EMS (Session 1)

Learn about Conditional Access with Enterprise Mobility + Security (EMS) in our session.

Presenter: Nasos Kladakis

Take Control of your Security & Compliance with Office 365 slide.
Take Control of your Security & Compliance with Office 365

We discuss current customer challenges, needs managing security, and compliance policies across their organization and how we are tackling those head on.

Presenter: Nishan DeSilva

Take Control of your Security & Compliance with Office 365 (Session 2) slide.
Take Control of your Security & Compliance with Office 365 (Session 2)

We discuss current customer challenges, needs managing security, and compliance policies across their organization and how we are tackling those head on.

Presenter: Nishan DeSilva

Risk-based Identity Protection slide.
Risk-based Identity Protection

Learn how Azure Active Directory Identity Protection calculates the risk level for every user and every sign-in attempt to your resources while providing insights, recommendations, and let you apply risk-based conditional access rules to protect from advanced threats.

Presenter: Nitika Gupta

Introduction To O365 Threat Intelligence (Session 1) slide.
Introduction To O365 Threat Intelligence (Session 1)

Watch for an introduction to O365 Threat Intelligence, which provides actionable insights to global attack trends. This session will provide service overview, demo, and question & answer.

Presenter: Debraj Ghosh

Introduction To O365 Threat Intelligence (Session 2) slide.
Introduction To O365 Threat Intelligence (Session 2)

Watch for an introduction to O365 Threat Intelligence, which provides actionable insights to global attack trends. This session will provide service overview, demo, and question & answer.

Presenter: Debraj Ghosh

Microsoft Enterprise Threat Detection: Detecting Threats From Enterprise Telemetry (Session 1) slide.
Microsoft Enterprise Threat Detection: Detecting Threats From Enterprise Telemetry (Session 1)

Learn about how Microsoft's Enterprise Threat Detection (ETD) can provide you with actionable intelligence and insights on what has evaded your defense in depth controls.

Presenter: Roberto Bamberger

Microsoft Enterprise Threat Detection: Detecting Threats From Enterprise Telemetry (Session 2) slide.
Microsoft Enterprise Threat Detection: Detecting Threats From Enterprise Telemetry (Session 2)

Learn about how Microsoft's Enterprise Threat Detection (ETD) can provide you with actionable intelligence and insights on what has evaded your defense in depth controls.

Presenter: Roberto Bamberger

Microsoft Password Guidance slide.
Microsoft Password Guidance

Good password practices fall into two broad categories: resisting common attacks and containing successful attacks. For administrators of identity systems, a third broad category exists: understanding human nature. Come learn about what you can do to improve your overall account security.

Presenter: Robyn Hicock

Protecting Privileged Access slide.
Protecting Privileged Access

Learn how Windows Server 2016 can help you protect privileged identities while still providing the ability to perform legitimate actions. For more information visit: www.microsoft.com/secure

Presenter: Ryan Puffer

Detecting threats to your cloud infrastructure with Azure Security Center (Session 1) slide.
Detecting threats to your cloud infrastructure with Azure Security Center (Session 1)

Learn how Azure Security Center detects threats you might otherwise miss while using advanced analysis and machine learning - no PhD required!

Presenter: Sarah Fender

Office 365 Secure Score slide.
Office 365 Secure Score

Learn how Microsoft solutions work together to improve an organization’s security posture. Watch for an overview of the Office 365 Secure Score Service.

Presenter: Stuart Clark

Enterprise-grade security to your cloud apps with Microsoft Cloud App Security slide.
Enterprise-grade security to your cloud apps with Microsoft Cloud App Security

Even if you are not on the cloud, your employees probably are. Cloud apps are essential to today's connected workforce, but they also introduce a unique set of security concerns. Learn how Microsoft Cloud App Security takes the visibility, control and protection you have come to expect on-premises and extends them to your cloud apps.

Presenter: Yair Cohen

Get ahead of attackers with identity driven security (session 2) slide.
Get ahead of attackers with identity driven security (session 2)

Learn how our technologies help you first protect at the "front door", protect your data and detect attacks before they cause damage.

Presenter: Demi Albuz

Microsoft Edge security with Windows Defender Application Guard (session 2) slide.
Microsoft Edge security with Windows Defender Application Guard (session 2)

Attacks on devices most likely achieve success through exploits that either begin in the user’s inbox or in the browser. Learn how Windows Defender Application Guard can help protect devices from attacks launched against Microsoft Edge.

Presenter: Chas Jeffries

Securing Virtual Machines with Windows Server 2016 slide.
Securing Virtual Machines with Windows Server 2016

Learn how Windows Server 2016 can help you protect your virtual machines and workloads from internal attacks at the fabric level.

Presenter: Dean Wells

Know your data, govern your data slide.
Know your data, govern your data

In this video we discuss Data Governance in Office 365 to help you understand what data you have and how you can govern it to protect you from unintenede loss, preservation and sharing.

Presenter: Nishan DeSilva

Explore more about our unique approach to security

Back To Top
close-button