Event - Virtual-Security-Summit_Virtual-Security-Summit-2016


Virtual Security Summit[MP4] [2:59:44] [2016/03/30]
Cyberattacks cost organizations $400 billion a year. It seems nearly every week a new cyberattack is announced, against a corporation, a government agency, or a nonprofit organization. This has made…


Expert Perspective: Microsofts CISO on Cybersecurity[MP4] [0:25:11] [2016/03/24]
Today, organizations are under constant attack. At the same time, the landscape is constantly changing with new threats arising and laws evolving. The national conversation around technology, security…


Live Demo: Protecting against, Detecting and Responding to Threats[MP4] [0:17:52] [2016/03/24]
Join this session to see the Microsoft security platform in action. General Manager for Cloud & Enterprise, Julia White, will demonstrate the security features of Windows 10, Azure and Office 365…


Protecting Your Organization on a Single Security Platform[MP4] [0:15:27] [2016/03/24]
With 300 billion user authentications, one billion device updates and 200 billion analyzed emails each month, Microsoft has a unique perspective on security. This unique perspective has given…


What is the Future of Cybersecurity?[MP4] [0:27:30] [2016/03/24]
New threats are continually emerging and new technologies are being developed, so what will cybersecurity look like in 10 years? In this session, Chief Technologist, Paul Edlund, will analyze the key…


Why You Should Trust the Cloud in These Tumultuous Times[MP4] [0:08:15] [2016/03/24]
As cyberthreats grow, the legal environment has become more complex. It is more difficult than ever for organizations to keep their data secure and comply with relevant laws and regulations. In this…


Fighting Cybercrime with the Intelligent Security Graph[MP4] [0:11:38] [2016/03/24]
The key to a good intelligence operation is breaking down barriers and allowing individuals to work side by side on complex problems. That's how Microsoft's state-of-the-art Cyber Defense Operations…


Anatomy of a Breach: How Hackers Break In[MP4] [0:20:45] [2016/03/24]
While hackers are evolving, there are some standard methods for attack, as well as tried-and-true strategies for mitigation and recovery. In this session, cybersecurity experts Matt Kemelhar and Jim…


Who is the Modern Cybercriminal?[MP4] [0:30:22] [2016/03/24]
Have you ever wondered what a cybercriminal operation looks like? Do you want to know how cybercriminals have evolved and which vulnerabilities they're now exploiting? In this session, James Lyne,…


The State of Cybersecurity[MP4] [0:27:30] [2016/03/24]
Recent cyberattacks on Target and Sony catapulted the issue of Cybersecurity into the national consciousness. Today, national security and privacy issues—like encryption—are at the center of a…