Sasha is a Microsoft Regional Director (RD), Microsoft MVP, and CEO of both Kloudatech and Kranjac - IT Training and Consulting. He holds numerous certifications from Microsoft, ISC2, AWS, CompTIA and EC-Council, and in addition to cloud, security architecture, and consulting, they deliver vendor and exclusive tailored workshops and courses that solve unique security challenges faced by executives and organizations worldwide. Among others, Sasha is a CISSP, MCT, MCT Community Lead, CEI, CompTIA Instructor, frequent speaker at international conferences, user groups and events, book author on cloud security, Microsoft Azure, Microsoft 365, and Windows Server.
09/01/2025
UA 92, Manchester
MANCHESTER , United Kingdom
09/01/2025
UA 92, Manchester
MANCHESTER , United Kingdom
09/01/2025
UA 92, Manchester
MANCHESTER , United Kingdom
19/10/2024
BluePoint Brussels-Conference & Business Centre
Brussel, Belgium
15/10/2024
09/01/2025, UA 92, Manchester
MANCHESTER , United Kingdom
Following successful and popular Sara’s session from the past Summit, we want to bring this interesting topic in Manchester as well! More than often trainers compare MCT program with MVP program just to conclude both programs are drastically different. Or are they? MCTs possess some unique skills that can be useful to become members of both programs! In this session you will have a chance to meet MCTs who are also MVPs and we’ll cover: • What the MVP program is (and what it is not) • What the MVP Communities is and what programs it includes • How to become an MVP • and more… Bring your questions to the session – we need them! – as it is an interactive session and suitable for all!
09/01/2025, UA 92, Manchester
MANCHESTER , United Kingdom
Most Trainers make a living from training other people on technologies or products in demand. They combine TWO ingredients and make a formula for success: A. knowledge about a product or technology AND B. ability to train other people. You definitely invested in A, you are expert in your field, have years of experience and hold multiple certifications. But what about B? Have you invested enough in soft skills, in speaking and presentation skills as you invest in learning about hottest Operating System or great new Technology? A + B = Successful Trainer. Do you have a minimum of B to satisfy the equation? Join the session and find out about some important soft skills gems you might have forgotten about some you might have not known, and have fun!
09/01/2025, UA 92, Manchester
MANCHESTER , United Kingdom
In today's fast-paced and ever-evolving world, the role of a trainer extends far beyond just possessing knowledge. This panel discussion aims to delve into the critical question: Is knowledge alone sufficient to become a successful trainer? The session will explore the diverse skills that a good trainer needs to have, drawing insights from experts with varied backgrounds. Anouck is a passionate advocate for effective training and development. She believes that understanding the multifaceted nature of a trainer's role is crucial. This presentation will provide valuable perspectives on the essential skills that complement knowledge, helping trainers to engage, inspire, and lead their learners effectively. The panel will feature a diverse group of speakers, each bringing unique expertise to the discussion: A professional with extensive technical experience, sharing insights on the importance of technical proficiency in training. An expert in skills development, highlighting the significance of soft skills such as communication, empathy, and adaptability. A business professional, discussing how trainers can align their methods with organizational goals and drive business success. Join this engaging and thought-provoking discussion on what truly makes a good trainer. Whether you are an aspiring trainer or a seasoned professional, this session will offer valuable takeaways to enhance your training approach and effectiveness.
19/10/2024, BluePoint Brussels-Conference & Business Centre
Brussel, Belgium
Threat hunters possess impressive skills, a willingness to learn and adapt, and a constant vigilance for potential threats, much like wilderness survival experts. Adversaries are becoming increasingly skilled at infiltrating networks and remaining undetected for extended periods, sometimes weeks or months, in order to gather information and elevate their privileges. Surviving a human-operated attack requires the ability to recognize signs of the attacker and their activities. These indicators are useful for determining the extent of the breach and identifying the assets that require remediation. These warning signs may encompass both visible and invisible elements. In cybersecurity, these anomalies may include the sudden disappearance or alteration of elements in your environment that are different from what you typically encounter. Join this exciting session where we will dissect a typical attack paths attackers might take, find out about Microsoft’s security arsenal to deal with these attacks and malicious actors, and discover how you can protect yourself in situations like these.
15/10/2024,
Microsoft 365 is a complex environment and secure by design, but in a shared responsibility model we must do our part as well. Find out about the absolute must-have top "10" ways to secure your Microsoft 365 environment and data - tighten the Microsoft 365 security belt in under an hour!
21/09/2024, Isep Parque
Porto, Portugal
Azure Networking is fundamental in Azure IaaS and the first step in moving or extending your DataCenter to cloud. This session covers all aspects of Azure Networking, from IP addresses, VNets, to P2S, S2S and ExpressRoute connections. We discuss how IP addresses are assigned, how to reserve IP addresses, the difference between IP address types, create VNet/subnet, assign new VM to your VNet/subnet, connect your local network to VNet, connection between different VNets, connect VNet on different subscriptions, and more. Every step is covered in live demo and real-world examples.
14/09/2024, Algebra
Zagreb, Croatia
Great, it was due time that something finally replaces “digital transformation” as a new buzzword that it is leaking out of our ears. Now, it is time for AI to take its place. Artificial Intelligence or, AI, is a new popular buzzword these days, and its likely that it will stay like that for some time. Meanwhile, AI is everywhere: on washing machines, cereals have AI on boxes, sinks and welding machines have AI stickers as well (perhaps to sell better) and – while almost everyone has heard about AI by now – rarely people know really and truly about what AI is. It is time to demystify and explain security in AI, what are cybersecurity threats by using AI, what security issues AI hides, how criminals and attackers leverage AI in getting to your private and corporate data, and what are risks in using AI for personal uses and in corporate environments. Of course, we will show good and useful side of AI medal: how to stay use AI at your and your companies’ advantage while staying secure.
30/08/2024, IT Park Osijek
Osijek, Croatia
Threat hunters possess impressive skills, a willingness to learn and adapt, and a constant vigilance for potential threats, much like wilderness survival experts. Adversaries are becoming increasingly skilled at infiltrating networks and remaining undetected for extended periods, sometimes weeks or months, in order to gather information and elevate their privileges. Surviving a human-operated attack requires the ability to recognize signs of the attacker and their activities. These indicators are useful for determining the extent of the breach and identifying the assets that require remediation. These warning signs may encompass both visible and invisible elements. In cybersecurity, these anomalies may include the sudden disappearance or alteration of elements in your environment that are different from what you typically encounter. Join this exciting session where we will dissect a typical attack paths attackers might take, find out about Microsoft’s security arsenal to deal with these attacks and malicious actors, and discover how you can protect yourself in situations like these.
30/08/2024, IT Park Osijek
Osijek, Croatia
Cloud i digitalna transformacija donose mnogo prednosti ali i razne izazove. Jedan od ovih izazova je kako osigurati resurse i informacije. Stvari nisu vise u 'nasa cetiri zida'. Gotovo sve je javno dostupno sa bilo koje lokacije u svijetu. Razgovarat cemo koje alate i procese koristiti kako bi osigurali svoje cloud resurse - od Azure Active Directory, preko NSG, ACL, WAF, RBAC i enkripcije, do naprednih alata kao Azure Security Center i Azure Sentinel. Pridruzite se strucnjacima koji su dizajnirali security rjesenja za kompanije sirom svijeta. Do kraja workshop-a, moci cete da odmah primjenite nauceno i sa sigurnoscu krenete u cloud!
01/06/2024, van der valk vianen
Vianen, Netherlands
Hunting malware and anomalies, catching attackers and intruders in the cloud requires different tools and techniques. Microsoft cloud is backed by powerful Artificial Intelligence platform and extensive logging capabilities – this is where we need to invest and sharpen up our skills to stay ahead of the cloud invaders. Join this session to see how to take advantage of the tools Microsoft 365 (and some in Azure, too), how to detect anomalous behaviour and respond to threats of the new era!
20/05/2024, Kompas Xnet
Ljubljana, Slovenia
Artificial intelligence (AI) is transforming various domains of human activity, including cybersecurity. AI can help enhance the detection and prevention of cyberattacks, automate the response and recovery processes, and optimize the security management and governance. However, AI also poses new threats and challenges for the security of digital systems and networks. Cybercriminals can use AI to launch more sophisticated and targeted attacks, exploit the vulnerabilities and biases of AI systems, and evade the existing security measures. Moreover, AI raises ethical and social questions about the responsibility, accountability, and transparency of security decisions and actions. In this session, we will explore the current and future applications of AI in cybersecurity, as well as the potential risks and ethical issues that arise from the use of AI for security purposes.
20/05/2024, Kompas Xnet
Ljubljana, Slovenia
Copilot for Microsoft 365 is a powerful AI assistant that helps you write better documents, emails, and messages. It can suggest content, grammar, tone, and style improvements based on your context and preferences. But how secure, private, and compliant is Copilot for Microsoft 365? In this presentation, I will answer these questions and show you how Copilot for Microsoft 365 protects your data and respects your choices.
14/05/2024, Rheinmain Congresscenter
Wiesbaden, Germany
In today's interconnected digital, hybrid world, cloud security is an essential consideration for all organizations. The landscape of cybersecurity threats is constantly evolving, and organizations must remain vigilant in their efforts to protect their sensitive data, infrastructure, and applications, both in cloud and on-premises. The nature of work has also changed, and hybrid work became a reality. The modern workplace evolves at lightning speed but inevitably faces complex security issues. As organizations adopt cloud technologies and adapt to new ways of working, they’re faced with a new challenge: how to make hybrid workplace more secure? To address this challenge, Microsoft provides wide-ranging security, privacy, and compliance solutions. In this comprehensive, full-day tutorial, you will obtain valuable insight and knowledge about the most important Microsoft Azure and Microsoft 365 products, services, and features that help you protect, manage, and monitor your data, meet regulatory requirements, and minimise compliance risks. Moreover, you will learn about Microsoft Defender, Microsoft Purview, and numerous related services - not only how to deploy and manage them, but how to use them to protect your organizations, detect security risks, prevent harmful activities, while staying compliant. This tutorial is designed to provide attendees with a practical understanding of how to implement security and compliance best practices in Microsoft Azure and Microsoft 365. We will cover a range of topics, where attendees will: • Learn from real-world examples and practical advice on how to implement security and compliance best practices in Azure and Microsoft 365. • Learn how to use Microsoft 365 Defender, Email and Collaboration Security, Microsoft Defender for Cloud Apps, Incident and threat management, and compliance capabilities to meet continuously stricter security requirements than ever • Learn how to implement identity protection and management capabilities, such as using Entra ID to manage identities and access to Azure and Microsoft 365 resources, including how to configure multi-factor authentication, conditional access policies, and identity protection features. • Learn how to use Azure capabilities to secure data at rest and in motion, including how to implement security best practices and to meet regulatory compliance requirements. • Learn how to implement and use workload protection and other key Azure services and capabilities to secure IaaS and PaaS services. • Learn how to protect your organisations, detect security risks, prevent harmful activities, while staying compliant • And more! By the end of this tutorial, attendees will be armed with the necessary knowledge and skills to implement security and compliance best practices in Microsoft Azure and Microsoft 365 and protect their organizations' sensitive data and achieve compliance with regulatory standards.
14/05/2024, Rheinmain Congresscenter
Wiesbaden, Germany
Number of cyber-attacks has been increasing year after year. Methods and technology used to execute these attacks becomes more and more sophisticated. In parallel, we are witnessing rise of AI and its impact on every industry. How will all of this affect security and where will it take us? Join our panelist in an interesting discussion and view on what is to come!
14/05/2024, Rheinmain Congresscenter
Wiesbaden, Germany
Threat hunters possess impressive skills, a willingness to learn and adapt, and a constant vigilance for potential threats, much like wilderness survival experts. Adversaries are becoming increasingly skilled at infiltrating networks and remaining undetected for extended periods, sometimes weeks or months, in order to gather information and elevate their privileges. Surviving a human-operated attack requires the ability to recognize signs of the attacker and their activities. These indicators are useful for determining the extent of the breach and identifying the assets that require remediation. These warning signs may encompass both visible and invisible elements. In cybersecurity, these anomalies may include the sudden disappearance or alteration of elements in your environment that are different from what you typically encounter. Join this exciting session where we will dissect a typical attack paths attackers might take, find out about Microsoft’s security arsenal to deal with these attacks and malicious actors, and discover how you can protect yourself in situations like these.
14/05/2024, Rheinmain Congresscenter
Wiesbaden, Germany
In today's digital landscape, adopting Microsoft 365 is paramount for businesses striving to enhance productivity and security. Introducing and adopting technical and functional changes is not an easy task. Organizations often focus on technical implementation, neglecting perhaps the most important factor: the human factor. Antje Lamartine and Sasha Kranjac will combine their practical knowledge and experience and delve into the strategies, hurdles, and proven methodologies for successful Microsoft 365 adoption. They will focus in this session on Data Loss Prevention and Multifactor Authentication. Join them to hear examples and best practices that will empower you with the expertise needed to navigate the intricacies of those Microsoft 365 technologies and get them adopted successfully.
18/04/2024, Garden City Hotel Konjic
Konjic, Bosnia and Herzegovina
Welcome to Azure PowerClass where all tastes are satisfied. Join our Master Chefs, Mustafa Toroman (MVP) and Sasa Kranjac (MVP) who have been designing and creating Azure recipes for top companies around the world, for an all-day interactive tutorial. Starting with a solid foundation of IaaS and PaaS in Azure and the addition of some Hybrid Cloud. Into the mix, some Azure Networking and VMs to ensure all flavours are represented. Adding a handful of Azure App Service and a pinch of configuration, deployment slots and monitoring with the exotic taste of App Insight. A cup of Azure SQL databases along with Cosmo DB and Azure Storage Accounts, data is everything. Just to be safe, a healthy dose of Azure Active Directory. On top of that, at teaspoon of ‘serverless’ with Azure Functions. At the end the ‘secret’ ingredient, DevOps, including everyone’s favourites Visual Studio and Git which perfectly compliment Azure.
18/04/2024, Garden City Hotel Konjic
Konjic, Bosnia and Herzegovina
Svaki početak je bitan, pogotovo kod planiranja, implementacije i upravljanjem podataka kod Microsoft Sentinel-a gdje ispravna implementacija utječe na cijenu troškova pohrane i analize podataka, brzini i načinu pretraživanja logova, sve do učinkovitosti rada sigurnosnih timova. Pridružite se predavanju da biste saznali više o arhitekturi, karakteristikama, planiranju, optimizaciji, i savjetima kod unosa podataka i logiranju u Microsoft Sentinel-u.
09/04/2024, Irving Convention Center at Las Colinas
Irving, United States of America
Given its widespread use, Microsoft 365 has been a prime target for cybercriminals and nation-state actors seeking to deploy malware, ransomware, and various malicious attacks. Despite Microsoft's continuous efforts to enhance security, hackers persist in discovering novel exploitation methods. Presently, we're witnessing a migration of these attacks into the cloud environment. Discover the precise methods employed by attackers in targeting Microsoft 365, and gain valuable insights into the proactive measures your organization can adopt to fortify its defenses.
25/11/2023, ISCTE-IUL, Edifício II, Piso 1 Av. das Forças Armadas, 1649-026 Lisboa
Lisboa, Portugal
Hunting malware and anomalies, catching attackers and intruders in the cloud requires different tools and techniques. Microsoft cloud is backed by powerful Artificial Intelligence platform and extensive logging capabilities – this is where we need to invest and sharpen up our skills to stay ahead of the cloud invaders. Join this session to see how to take advantage of the tools Microsoft 365 (and some in Azure, too), how to detect anomalous behaviour and respond to threats of the new era!
21/10/2023, BluePoint Brussels-Conference & Business Centre
Brussel, Belgium
Microsoft 365 is a complex environment and secure by design, but in a shared responsibility model we must do our part as well. Find out about the absolute must-have top 10 ways to secure your Microsoft 365 environment and data - tighten the Microsoft 365 security belt in under an hour!
01/09/2023, Didin Konak Kopačevo
Kopačevo, Croatia
According to Gartner “Cloud Strategy Leadership” study, “Organizations that do not have a high-level cloud strategy driven by their business strategy will significantly increase their risk of failure and wasted investment.” You don’t want that to happen to you and your organization, do you? The Microsoft Cloud Adoption Framework for Azure is a full lifecycle framework that enables cloud architects, IT professionals, and business decision makers to achieve their cloud adoption goals. Following best practices for the Cloud Adoption Framework allows your organization to better align business and technical strategies and ensure success. Join this workshop to see have a better picture of how it can help you on your cloud journey!
01/09/2023, Didin Konak Kopačevo
Kopačevo, Croatia
Cloud and digital transformation brings many advantages but has it’s challenges as well. One of those challenges is how to secure our resources and data. Everything isn’t in our local datacenter and behind our firewall. Services are more exposed to access over internet. In this Masterclass, we will discuss what tools and processes to use to secure your cloud and protect your data and resources - from Azure Active Directory, over NSGs, ACLs, WAFs, RBAC and encryption to using Azure Security Center. Join real experts and professionals , who design security solutions for companies around the world, to help you stay safe in cloud. By the end of the course, you’ll be able to apply what you have learned and be more confident and secure in your cloud journey.
01/07/2023, Algebra
Zagreb, Croatia
The attacks are getting increasingly sophisticated, and the tools used until now might not be enough to detect and investigate threats. Fortunately, there is a powerful, AI-powered tool available to increase data security across your enterprise. Attend this session to learn how Microsoft Sentinel protects your cloud and hybrid workloads, and get practical guidance into detecting and responding to threats and elevate organizational security to a higher level. This session's mott is: Almost no slides - All Demo!
10/06/2023, van der valk vianen
Vianen, Netherlands
There is no “Big Red Security Button” to push or “Giant Security Lever” to pull, but there are so many big and small, but significant, functionalities and features to activate and configure, to improve Microsoft 365 security posture. Whether you are a small, medium-size organisation or an enterprise, this session is packed with security tips and tricks for everyone: from Microsoft Teams, Microsoft Defender and Office 365 to Microsoft 365 plans, Information Protection, Identity and much more! Join the session, make yourselves comfortable and relax - attend this feature-packet session and get a head-start in configuring and increasing your Microsoft 365 security stance!
22/05/2023, Congress Center Düsseldorf
Düsseldorf, Germany
The nature of work has changed, and hybrid work became a reality. The modern workplace evolves at lightning speed but inevitably faces complex security issues. As organizations adopt cloud technologies and adapt to new ways of working, they’re faced with a new challenge: how to make hybrid workplace more secure? To address this challenge, Microsoft provides wide-ranging security, privacy, and compliance solutions. In this comprehensive, full-day tutorial, you will obtain valuable insight and knowledge about most important Microsoft 365 products, services and features that help you protect, manage, and monitor your data, meet regulatory requirements, and minimise compliance risks. Moreover, you will learn about Microsoft Defender, Microsoft Purview, and numerous related services - not only how to deploy and manage them, but how to use them to protect your organisations, detect security risks, prevent harmful activities, while staying compliant. Join us to gain important, real-world knowledge, to expand your security and compliance skills in Microsoft 365 while we address all of these and much more: Azure Active Directory role in M365 Security o AAD Identity Protection o AAD PIM o Conditional Access o Guest Accounts Microsoft 365 Defender o Services o Scenarios o Requirements o Deployment o Secure Score Microsoft Purview Information Protection o Data classification o Information Protection o Labels o DLP o eDiscovery o Content search Microsoft Endpoint Security o Endpoint Manager o Devices o Device Security o Vulnerability Management Email and Collaboration Security o Exchange Online o SharePoint Online o Teams o Office 365 Microsoft Defender for Cloud Apps o Settings and Setting up o Discovery o Investigation o Policies and Templates o Alerts Incident Management o Alerts o Incidents o Threat analytics and threat hunting o Auditing and Reporting All you ever wanted to know about Microsoft 365 Licensing
22/05/2023, Congress Center Düsseldorf
Düsseldorf, Germany
Workforce of today requires access to resources and applications that no longer exist behind traditional corporate network boundaries. Continuously evolving threats on the internet as a working network of choice changed the technology landscape of the modern workplace. The significant shift in mindset is required, sparking the journey that has only begun to efficiently protect our modern enterprises and businesses. What you need right NOW is Zero Trust Security Deployment in Microsoft 365 – but only if you want your businesses and enterprises to exist in 2023 and beyond. Fortunately, this session will explain how to start, implement, and create a Zero Trust Security Model in Microsoft 365, including (but not limited to) planning, scenarios, architecture, implementation phases and much more!
12/05/2023, Congress Center Hotel Hills
Ilidža, Bosnia and Herzegovina
Microsoft Defender for Cloud trebao bi biti vaša prvo mjesto zaštite infrastrukture u Azure-u. Saznajte kako započeti, saznajte koje su prednosti i karakteristike, i otkrijte kako vam Microsoft Defender for Cloud može pomoći u osiguranju Azure i on-premises infrastrukture za manje od sat vremena! Ova sesija ima minimalno slajdova a maksimalno demonstracija!
26/11/2022, Microsoft Portugal
Lisboa, Portugal
Active Directory (Azure AD) is Microsoft’s multi-tenant, cloud based directory and identity management service. It's also new boundary layer for security and everyone is using it. But it brings many questions like how to set up perfect hybrid environment, what should we sync, should we use MFA, should we allow access to external users... In this session, we will discuss what are do's and don't's extracted from experience from the field.
26/11/2022, Microsoft Portugal
Lisboa, Portugal
Hunting malware and anomalies, catching attackers and intruders in the cloud requires different tools and techniques. Microsoft cloud is backed by powerful Artificial Intelligence platform and extensive logging capabilities – this is where we need to invest and sharpen up our skills to stay ahead of the cloud invaders. Join this session to see how to take advantage of the tools Microsoft 365 (and some in Azure, too), how to detect anomalous behaviour and respond to threats of the new era!
26/09/2022, Rheingoldhalle Congress Centrum Mainz
Mainz, Germany
As a public and multitenant cloud service, Microsoft Azure supports vast range of services and capabilities. It is robust, highly secure, highly available and provides integrity and confidentiality of users’ data. Along with the abundance of services and benefits Azure provides, users often forget its key characteristics: it is publicly available platform with shared security responsibility. In this Tutorial, we will cover all the key Azure platform security topics that are part of your shared security responsibility and show you the technologies involved. I will show you how to increase and raise security, compliance and privacy of your data and workloads in Azure to a higher levels and to become familiar with the latest security trends and identity and security capabilities in Azure. Do not miss this unique opportunity as we uncover: best practices and advice directly from on-the-filed experience, tips-and-tricks on Azure Active Directory; identity protection and management securing access to resources securing data in rest and in motion encryption protecting against vulnerabilities detecting threats securing IaaS and PaaS compliance and many more Do not miss this unique opportunity as we uncover best practices and advice directly from on-the-filed experience, spiced with tips-and-tricks on Azure Active Directory; identity protection and management; securing access to resources; securing data in rest and in motion; encryption; protecting against vulnerabilities; detecting threats; securing IaaS and PaaS; compliance and many more!
26/09/2022, Rheingoldhalle Congress Centrum Mainz
Mainz, Germany
“The Cloud” is secure. That is, Microsoft Azure, Amazon Web Services and Google Cloud Platform, as three main cloud providers operate extremely secure datacenters and services. Keep in mind that we are talking about shared responsibility in the cloud: you are still responsible for identity and data security. Along with known security tools and services, you should consider penetration testing your cloud environment to take the cloud security up a notch. In this session, you will learn about on various techniques, frameworks, tools, and approach to perform offensive exploitation of cloud infrastructure. You will get an insight and understand how to conduct reconnaissance to identify vulnerable services, find misconfigurations and insecure configurations for various components, and how adversaries could use these vulnerabilities to gain unauthorized access. Additionally, you will learn about common attack vectors that attackers use to compromise cloud environments and how to protect yourself against them.
02/09/2022, Stara Pekara - Osijek
Osijek, Croatia
Welcome to Azure PowerClass where all tastes are satisfied. Join our Master Chefs, Mustafa Toroman (MVP) and Sasa Kranjac (MVP) who have been designing and creating Azure recipes for top companies around the world, for an all-day interactive tutorial. Starting with a solid foundation of IaaS and PaaS in Azure and the addition of some Hybrid Cloud. Into the mix, some Azure Networking and VMs to ensure all flavours are represented. Adding a handful of Azure App Service and a pinch of configuration, deployment slots and monitoring with the exotic taste of App Insight. A cup of Azure SQL databases along with Cosmo DB and Azure Storage Accounts, data is everything. Just to be safe, a healthy dose of Azure Active Directory. On top of that, at teaspoon of ‘serverless’ with Azure Functions. At the end the ‘secret’ ingredient, DevOps, including everyone’s favourites Visual Studio and Git which perfectly compliment Azure.
02/09/2022, Stara Pekara - Osijek
Osijek, Croatia
Cloud and digital transformation brings many advantages but has it’s challenges as well. One of those challenges is how to secure our resources and data. Everything isn’t in our local datacenter and behind our firewall. Services are more exposed to access over internet. In this Masterclass, we will discuss what tools and processes to use to secure your cloud and protect your data and resources - from Azure Active Directory, over NSGs, ACLs, WAFs, RBAC and encryption to using Azure Security Center. Join real experts and professionals , who design security solutions for companies around the world, to help you stay safe in cloud. By the end of the course, you’ll be able to apply what you have learned and be more confident and secure in your cloud journey.
02/09/2022, Stara Pekara - Osijek
Osijek, Croatia
Are you aware of Azure security architecture and best practices? Sure, Azure is designed with security in mind but that doesn’t mean you shouldn’t do your best to protect your workloads, data and services in The Cloud and know about its security features and tools. Don't worry, because this feature-packed session will help you understand and control security features of your Azure environment. Join and learn how to make Azure environment more secure, apply correct Azure security features and capabilities and implement appropriate tools and practices. Understand Azure security architecture and control security in networking and virtual machines, secure identities and correctly use appropriate management and monitoring solutions to increase security in Azure and more!