Shruti Ailani
Microsoft Corporation
Tech Specialist/Global Black Belt (GBB) in Security
Netherlands

SecurityNinja

Armed with Big-4 managerial experience of EY, cyber start-ups as well as international organizations such as Formula1, AWS, Dropbox, Facebook, Google, I bring cybersecurity solutions that empower every customer. Empowered with thought leadership alongside technical strength, in cyber security and privacy domains cross-geographies (Middle East, EU, US,), I aim for a two-way knowledge sharing today. Off-work, I am an avid reader, scuba diver, a bungee jumper and a squash player.

Session Portfolio
Current Sessions Delivered by Shruti
The Future of Network and Identity Security: Microsoft Entra SSE
azure
microsoft
security
threat-intelligence
defender
external-attack-surface-management
mdeasm

In this session, we will explore the concept of Secure Service Edge (SSE), a cutting-edge approach to network security that combines the capabilities of Secure Access Service Edge (SASE) with Zero Trust Network Access (ZTNA). We will discuss Secure Access Service Edge (SASE), a network architecture that combines WAN capabilities with cloud-native security functions. SASE delivers secure access to applications, data, and services from any device, anywhere, at any time. We will discuss how SSE provides a comprehensive security solution that protects against threats at the edge of the network, while also enabling secure access to applications and data. Eventually we will expand on Microsoft’s approach to SSE via Microsoft Entra Internet Access and Private Access, including improved security, reduced complexity, and increased agility, and how it can be implemented in your organization. We can explore the demonstration capabilities for this session closer to the event date depending on the NDA-boundations of Microsoft. Right audience: Information Security professionals, IT professionals, CISOs, Cloud Security enthusiasts, network architects, CIO, CTOs.To resolve all these modern day challenges related to external attack surfaces which attackers can see, we bring to you a solution that works on top of threat intelligence pool and feeds into XDR and SIEM solutions for better correlation. At the end of this session, the audience can takeaway insights into discovery, prioritization and security of publicly exposed infrastructure.

Read more

Shruti can deliver sessions in
English
Connect with Shruti
Past Speaking Engagements
A Look Back at Past Speaking Events
See all past speaking engagements

Report speaker profile

Reason for reporting this profile (multiple options possible)


Please select at least one option.

Please select at least one option.

Please select at least one option.

Please select at least one option.

Please select at least one option.
Please complete this required field.
Please complete this required field.

Thank you for reporting this profile, we are going to review it as soon as possible.