The Chief Information Security Office (CISO) workshop contains a collection of security learnings, principles, and recommendations for modernizing security in an organization. This training workshop is a combination of experiences from Microsoft security teams and learnings from customers.
The CISO workshop can help your organization meet the dual security challenges of:
- Increasingly sophisticated attacks
- Protecting assets on a hybrid enterprise that now includes cloud platforms
There is a blog series as well – https://www.microsoft.com/security/blog/ciso-series/
The CISO workshop videos and PDF/PowerPoint download content are modular so you can jump to any section of interest or start at the beginning. The slides for each module are shared with a creative commons (with attribution) license to help your organization build effective security strategies.
- Module 1: Microsoft Cybersecurity Briefing: This module covers overviews on critical security hygiene, Microsoft cybersecurity reference architecture, cybersecurity resilience, Internet of Things (IoT), and operational tech.
- Module 2: Security Management: Learn how to increase visibility and control over your hybrid enterprise estate with integrated guidance, automated policy enforcement, and monitoring.
- Module 3: Identity and Zero Trust User Access: Learn how to advance zero trust with your identity and user access strategy to better protect corporate data inside and outside your network perimeter
- Module 4a: Threat Protection Strategy, Part I: Explore key learnings about threat protection, security evolution, strategies, and security road maps.
- Module 4b: Threat Protection Strategy, Part II: This module reviews the evolution and trajectory of the Security Operations Centers (SOC), powered by the trillions of signals in the Microsoft Intelligent Security Graph.
- Module 5: Information Protection: Learn how to protect sensitive information wherever it goes with automatic classification, persistent encryption across devices, and continuous monitoring of data across mobile devices, cloud services, and other corporate assets.