In this episode of Cloud Maker, Dwayne Natwick and Wim Matthyssen will discuss the use of Azure Sentinel as a cloud-native SIEM solution for your organization.
We will show how it can be used for monitoring security events in Azure, Microsoft 365, and hybrid networks. We will show how the investigation tools tied to the Microsoft global threat database and artificial intelligence can detect anomalies within the environment that can be identified and rectified to protect the organization.
About The Author
I am a vision-driven and goal-focused leader with a history of successfully managing and training on the full life-cycle of Cloud and IT products and services including technical sales and marketing. I author blog articles, curriculum, and provide training for internal and external clients in workshop, video, or certification preparation formats. I currently manage the product strategy, life cycle, and service offerings for Multi-Cloud Services at NTT.
About The Author
Wim is a Cloud Architect, who has more than ten years of experience with Microsoft Technologies. As a Microsoft Certified Trainer (MCT), his strength is to assist companies in the transformation of their business to the Cloud by implementing the latest features, services, and solutions. Wim is also a Microsoft MVP in the Azure category and a founding board member of the MC2MC user group.
Microsoft Certified: Azure Security Engineer Associate
Candidates for this exam should have subject matter expertise implementing security controls and threat protection, managing identity and access, and protecting data, applications, and networks in cloud and hybrid environments as part of an end-to-end infrastructure.
Microsoft 365 Secrurity Administrator
Microsoft 365 Security Administrator collaborates with the Microsoft 365 Enterprise Administrator, and business stakeholders to plan and implement security strategies and ensures that the solutions comply with the policies and regulations of the organization.