Microsoft’s Zero Trust Series

Microsoft’s Zero Trust Webinar Series

It's easy to distrust everything outside your company’s perimeter. But what about the people, devices, services, and networks within? Compromising trusted resources is a popular focus of cyber attacks and protecting against this requires a multi-pronged approach.

Microsoft’s Zero Trust security models integrate security, compliance, identity management, and networking solutions into a tightly woven protective virtual mesh. Any access is explicitly verified, inspected for anomalies, and then monitored for risky or unusual behaviour patterns.

In this Zero Trust webinar series, you’ll learn the principles and practices that support safe and secure systems. You’ll explore different models that you can use, and how to plan out strategies that work for your organisation.

Program1Image

Demystifying Zero Trust

Thursday, 10th June 2021 | 11:00 AM – 12:00 PM AEST | (GMT+10:00) Canberra, Melbourne, Sydney

Learn the basics of Zero Trust cyber security, with thought leaders from Microsoft, AustCyber, and NTT. This session will help you to:

  • Understand the principles underlying Zero Trust, and why they’re important.
  • Identify the key elements in your organisation’s attack surface.
  • Envision how your organisation can improve its security stance.
  • Ensure that remote work doesn’t erode the safety of your data.

Register Now
Program2Image

Securing Identities and Endpoints with Zero Trust

Wednesday, 16th June 2021 | 11:00AM – 12:00PM AEST | (GMT+10:00) Canberra, Melbourne, Sydney

Knowing who and what is accessing your data is integral to keeping it secure. Learn how to:

  • Verify the identities of people, services, and devices using strong authentication.
  • Monitor resource access for compliance and unusual behaviour.
  • Follow least privilege access principles.
  • Monitor and enforce device health.
  • Check compliance before allowing secure access.

Register Now
Program3Image

Securing Apps and Data with Zero Trust

Thursday, 24th June 2021 | 11:00AM – 12:00PM AEST | (GMT+10:00) Canberra, Melbourne, Sydney

Your data, and the applications and APIs that use it, are valuable assets. Learn how to:

  • Apply controls and technologies to discover shadow IT.
  • Ensure appropriate in-app permissions.
  • Gate access based on real-time analytics.
  • Monitor for abnormal behaviour.
  • Control user actions.
  • Validate secure configuration options.
  • Classify, label, and encrypt data.

Register Now
Program4Image

Securing Network and Infrastructure with Zero Trust

Thursday, 1st July 2021 | 11:00 AM – 11:45 AM AEST | (GMT+10:00) Canberra, Melbourne, Sydney

Infrastructure and networks act as the skeleton that supports your business.
Learn how to:

  • Assess for version, configuration, and JIT access to harden defences.
  • Use telemetry to detect attacks and anomalies.
  • Automatically block and flag risky behaviour and take protective action.
  • Segment and micro-segment networks.
  • Deploy real-time cyber threat protection, end-to-end encryption, monitoring, and analytics.

Register Now
Program5Image

Making Zero Trust real at Microsoft: Best practices and Lessons learned

Thursday, 8th July 2021 | 11:00 AM – 12:00 PM AEST | (GMT+10:00) Canberra, Melbourne, Sydney

Join the Microsoft team behind our internal implementation of Zero Trust. They’ll be talking about our implementation approach, the best practices they put in place, and the lessons they learnt. This will be a valuable session for anyone who is or will be involved in a Zero Trust security deployment.

Register Now
Program8Image

Program9Image

Program10Image

Program11Image

Program12Image

Program13Image

Program14Image

Program15Image

Program16Image

Program17Image

Program18Image

Program19Image

Program20Image

Program1Image

Program2Image

Program3Image

Program4Image

Program5Image

Program6Image

Program7Image

Program8Image

Program9Image

Program10Image

Program11Image

Program12Image

Program13Image

Program14Image

Program15Image

Program16Image

Program17Image

Program18Image

Program19Image

Program20Image