Chief Information Security Officer (CISO) Workshop Training
The Chief Information Security Office (CISO) workshop contains a collection of security learnings, principles, and recommendations for modernizing security in your organization. This training workshop is a combination of experiences from Microsoft security teams and learnings from customers.
The CISO workshop can help your organization meet the dual security challenges of:
- Increasingly sophisticated attacks
- Protecting assets on a hybrid enterprise that now includes cloud platforms
The CISO workshop videos and PDF/PowerPoint download content are modular so you can jump to any section of interest or start at the beginning. The slides for each module are shared with a creative commons (with attribution) license to help your organization build effective security strategies.
CISOs, managers and architects, security architects
Knowledge of cloud and security terminology in general.
Content of Chief Information Security Officer (CISO) Workshop Training
Module 1: Microsoft Cybersecurity Briefing
This module covers overviews on critical security hygiene, Microsoft cybersecurity reference architecture, cybersecurity resilience, Internet of Things (IoT), and operational tech.
Module 2: Security Management
Learn how to increase visibility and control over your hybrid enterprise estate with integrated guidance, automated policy enforcement, and monitoring.
Module 3: Identity and Zero Trust User Access
Learn how to advance zero trust with your identity and user access strategy to better protect corporate data inside and outside your network perimeter
Explore key learnings about threat protection, security evolution, strategies, and security road maps.
This module reviews the evolution and trajectory of the Security Operations Centers (SOC), powered by the trillions of signals in the Microsoft Intelligent Security Graph.
Learn how to protect sensitive information wherever it goes with automatic classification, persistent encryption across devices, and continuous monitoring of data across mobile devices, cloud services, and other corporate assets.