{"id":127722,"date":"2022-08-31T16:57:42","date_gmt":"2022-08-31T16:57:42","guid":{"rendered":"https:\/\/news.microsoft.com\/?p=447015"},"modified":"2022-08-31T16:57:42","modified_gmt":"2022-08-31T16:57:42","slug":"stop-ransomware-with-microsoft-security-digital-event-presents-threat-intelligence-in-action","status":"publish","type":"post","link":"https:\/\/sickgaming.net\/blog\/2022\/08\/31\/stop-ransomware-with-microsoft-security-digital-event-presents-threat-intelligence-in-action\/","title":{"rendered":"Stop Ransomware with Microsoft Security digital event presents threat intelligence in action"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.sickgaming.net\/blog\/wp-content\/uploads\/2022\/09\/stop-ransomware-with-microsoft-security-digital-event-presents-threat-intelligence-in-action.png\" class=\"ff-og-image-inserted\"><\/div>\n<p>One of the biggest challenges in security today is visibility. And by visibility, I don\u2019t just mean keeping an eye on ever-evolving cyberthreats, but also seeing your own security environment clearly\u2014especially where you\u2019re vulnerable.<\/p>\n<p>For defenders who are working hard to manage threats across multiple clouds, platforms, and devices, research and investigation is a time-consuming and difficult challenge. Thankfully, we\u2019ve recently launched two new security solutions designed to give you a comprehensive view of the security threats to your business\u2014and track what\u2019s changing day-to-day.<\/p>\n<p>I\u2019m really excited about these new products and invite you to learn more about them at our next digital event\u2014<a href=\"https:\/\/MSThreatIntelligencedigitalevent.eventcore.com?ocid=cmm9ro7glh1\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Stop Ransomware with Microsoft Security<\/strong><\/a>\u2014on September 15, 2022.<\/p>\n<h2>See the latest threat intelligence solutions in action<\/h2>\n<p>We have a lot to look forward to at this event. Charlie Bell, Executive Vice President of Microsoft Security, and Vasu Jakkal, Corporate Vice President of Microsoft Security, Compliance, Identity, and Privacy Business, will join other security experts to discuss how to get ahead of ransomware and proactively prepare for even the most sophisticated attacks.<\/p>\n<p>But this event goes beyond strategies and thought leadership\u2014you\u2019ll also get an exciting, in-depth look at two innovative new security products:<\/p>\n<ul>\n<li>Microsoft Defender Threat Intelligence<\/li>\n<li>Microsoft Defender External Attack Surface Management<\/li>\n<\/ul>\n<p>These new security solutions work together to help you understand both your adversaries and your own security environment. With more visibility into your infrastructure and better insights into breaches and potential threats, you\u2019ll be able to prioritize the right response tactics and keep pace with an ever-changing threat environment.<\/p>\n<p>Register for the <a href=\"https:\/\/MSThreatIntelligencedigitalevent.eventcore.com?ocid=cmm9ro7glh1\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Stop Ransomware with Microsoft Security<\/strong><\/a> digital event to learn more.<\/p>\n<h2>Stay ahead of adversaries<\/h2>\n<p>Let\u2019s start with Microsoft Defender Threat Intelligence. This solution works by analyzing signals from across the internet, then enriching this data with powerful machine learning algorithms to extract insights relevant to your organization.<\/p>\n<p>When you attend this free digital event, you\u2019ll learn exactly how to use this new solution to dive deep into a breach and really understand the nature of the attack and the assets affected.<\/p>\n<h2>Elevate your security posture<\/h2>\n<p>While Microsoft Defender Threat Intelligence can help you understand the threat landscape, Microsoft Defender External Attack Surface Management gives you greater knowledge of your attack surface.<\/p>\n<p>With the help of this tool, you can build a more complete understanding of your security posture and locate unknown, unmanaged resources that are visible from the internet\u2014the same view an attacker has when selecting a target.&nbsp;<\/p>\n<p>Throughout the <a href=\"https:\/\/MSThreatIntelligencedigitalevent.eventcore.com?ocid=cmm9ro7glh1\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Stop Ransomware with Microsoft Security<\/strong><\/a> digital event, we\u2019ll be demonstrating both Microsoft Defender Threat Intelligence and Microsoft Defender External Attack Surface Management. Join us to learn how you can bolster your security strategy by integrating both products into your own security operation center\u2014or connect with cybersecurity professionals during a live question and answer chat if you have questions.<\/p>\n<h2>Learn from the experts firsthand<\/h2>\n<p>We crafted every session in the <strong>Stop Ransomware with Microsoft Security <\/strong>digital event to empower you with the tools and insights you need to make the most of threat intelligence. Join your fellow cybersecurity professionals in the following sessions:<\/p>\n<ul>\n<li><strong>Ransomware, threat intelligence, and the state of security<\/strong>: Join Vasu Jakkal and Charlie Bell as they discuss the Microsoft approach to security, including what analysts are seeing in the threat landscape and how threat intelligence can help organizations prepare for the worst.<\/li>\n<li><strong>Unmask adversaries with Microsoft Defender Threat Intelligence<\/strong>: Threat intelligence is the foundation of effective cybersecurity. As threats like ransomware increase in sophistication, it becomes even more critical to understand adversaries and their infrastructure. Learn how threat intelligence can enhance incident response and give your business the insights you need to stay ahead of threats.<\/li>\n<li><strong>Locate and secure your external attack surface<\/strong>: The external attack surface is constantly changing, and unknown, unsecured resources may fall outside your security coverage. Learn how to view your organization from the outside in\u2014the same way an attacker does\u2014and not only locate unmanaged assets but also protect them.<\/li>\n<li><strong>Threat intelligence is the cornerstone of solid security<\/strong>: Explore common use cases for threat intelligence and discover real-world applications to learn how you can enhance your existing security solutions and stop ransomware in its tracks.<\/li>\n<\/ul>\n<h2>Don\u2019t just react to threats. Get ahead of them.<\/h2>\n<p>Join the <strong>Stop Ransomware with Microsoft Security <\/strong>digital event to learn how to safeguard your organization from today\u2019s attacks\u2014and be ready for tomorrow\u2019s.<\/p>\n<p>At this digital event, you\u2019ll:<\/p>\n<ul>\n<li>Hear key insights from Microsoft\u2019s leadership, including a fireside conversation between Charlie Bell, Executive Vice President of Microsoft Security, and Vasu Jakkal, Corporate Vice President of Microsoft Security, Compliance, Identity, and Privacy Business.<\/li>\n<li>Learn about two new security solutions: Microsoft Defender Threat Intelligence and Microsoft Defender External Attack Surface Management.<\/li>\n<li>See threat intelligence from Microsoft Security in action and learn how to use it to prevent and remove even the most sophisticated ransomware.<\/li>\n<li>Get your questions answered by threat protection experts during a live question and answer chat.<\/li>\n<\/ul>\n<p>Secure everything. Limit nothing. Be fearless.<\/p>\n<p><a href=\"https:\/\/MSThreatIntelligencedigitalevent.eventcore.com?ocid=cmm9ro7glh1\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Register now<\/strong><\/a>.<\/p>\n<blockquote class=\"wp-block-quote\">\n<p><strong>Stop Ransomware with Microsoft Security<\/strong><br \/>September 15, 2022<br \/>9:00 AM-10:30 AM PT<\/p>\n<\/blockquote>\n<p>To learn more about Microsoft Security solutions,&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/\">visit our&nbsp;website<\/a>.&nbsp;Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us at&nbsp;<a href=\"https:\/\/twitter.com\/@MSFTSecurity\">@MSFTSecurity<\/a>&nbsp;for the latest news and updates on cybersecurity.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>One of the biggest challenges in security today is visibility. And by visibility, I don\u2019t just mean keeping an eye on ever-evolving cyberthreats, but also seeing your own security environment clearly\u2014especially where you\u2019re vulnerable. For defenders who are working hard to manage threats across multiple clouds, platforms, and devices, research and investigation is a time-consuming [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":127723,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[49],"tags":[50,52],"class_list":["post-127722","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-news","tag-recent-news","tag-security"],"_links":{"self":[{"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/posts\/127722","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/comments?post=127722"}],"version-history":[{"count":0,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/posts\/127722\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/media\/127723"}],"wp:attachment":[{"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/media?parent=127722"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/categories?post=127722"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/tags?post=127722"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}