
Views: 219
commitment Microsoft is to provide customers with a trusted platform through the technologies and services of cloud and is stated as follows:
"Security is our top priority and we are committed to working with others across the industry to protect our customers." Satya Nadella Chief Executive Officer, Microsoft Corporation
Microsoft Secure Mission Statement expressing the vendor's vision for security, defined to enable organizations to remain productive and digitally transform using technologies cloud Azure and Microsoft 365.
addressing Microsoft is to integrate build-in specialized security platforms in each layer of functionality of the services cloud delivered: Azure, Office 365, EMS, Windows, clientții Office:
Although there are dozens of different types of attacks, the list of cyber attacks includes the 20 most common examples.

Who is the dedicated training program for? Microsoft Chief Information Security Officer?
Training program Microsoft The CISO is built to define the strategies and priorities of the organizations, related to the capabilities and strategies recommended by the vendor, thus succeeding in helping the participants to define an effective work plan based on the understanding sTRATEGY cybersecurity defined by the vendor.

Program Microsoft Chief Information Security Office (CISO) contains a collection of security insights, principles and recommendations for modernizing the security of organizations, offering a combination of experiences from security teams Microsoft and from customers.
The goal is to help organizations meet the dual security challenges of increasingly sophisticated attacks and protecting assets in a hybrid environment that includes platforms cloud.
The CISO Workshop videos and PDF/PowerPoint downloadable content are modular so attendees can skip to any section of interest or resume the presentation from the beginning. Slides for each module are shared to help your organization build effective security strategies.
The program contains the following modules:
- Module 1: Microsoft Cybersecurity Briefing : This module covers overviews of critical security hygiene, reference architecture Microsoft in cybersecurity, cybersecurity resilience, the Internet of Things (IoT) and operational technology.
- Module 2: Security Management : Learn how to increase visibility and control over your hybrid enterprise estate with integrated guidance, automated policy enforcement, and monitoring.
- Module 3: Untrusted User Identity and Access: Learn how to advance zero trust with your identity and user access strategy to better protect corporate data inside and outside your network perimeter.
- Module 4a: Threat Protection Strategy, Part I: Explore key elements of threat protection, security evolution, strategies and security roadmaps.
- Module 4b: Threat Protection Strategy, Part II- a: This module reviews the evolution and trajectory of Security Operations Centers (SOCs), fueled by trillions of signals from Microsoft Intelligent Security Graph.
- Module 5: Information Protection : Learn how to protect sensitive information wherever it goes with automatic classification, persistent encryption on devices and continuous data monitoring on mobile devices, services cloud and other corporate assets.
You can complete this program by accessing web page dedicated to it.
Author MARIAN PANDILICĂ
Senior Microsoft Certified trainer
Microsoft Learning Consultant 2010-2024
Customer Learning Architect
Cloud Solution and Cybersecurity Architect

