

TU Microsoft's Cloud Compliance Manager
Microsoft newest tool allows Office 365, Dynamics 365, and Azure users track compliance and see what Microsoft has done. Cybersecurity...

Where Cybercrime Goes to Hide
Here is a Norton documentary on bulletproof hosting services. Pick where you want to host your data where it is most legally beneficial...


New Attack Techniques 2017
The Seven Most Dangerous New Attack Techniques, and What's Coming Next "Moderator: Alan Paller, Research Director and Founder, SANS...


Azure Active Directory
If you plan to do Office 365 administration you will want to know the different options for authentication and the difference between...


Microsoft Ignite 2017 Keynote
Satya Nadella, CEO Microsoft, oversees all aspects of Microsoft business and leadership--from cloud and mobile development to digital and...


Use Azure Security Center to prevent, detect, and respond to threats
"Microsoft Azure Security Center helps organizations prevent, detect, and respond to threats by providing increased visibility into the...


Office 365 Cyber Security
Secure Office 365 like a cybersecurity proassessing risk and implementing controls Based on proven experience, our top Office 365...


Microsoft Ignite Keynotes
Ignite Keynote Description: “Technology continues to rapidly evolve, offering us new ways of working and powering digital transformation...


Protect and Manage Your Digital Transformation (MS Ignite)
Protect and Manage Your Digital Transformation Brad Anderson VP, Enterprise Mobility Microsoft Session recorded at Microsoft Ignite...


Cyber Security for Local Governments SAMFOG Presentation
#Cybersecurity #LocalGovernment #Cloud