Based on investigations of real-world attacks, Microsoft Office 365 cybersecurity experts provide a prescriptive approach to identifying and implementing the most critical security controls to protect your Office 365 tenant. You will learn threats and defenses change from on-premises attacks and what Microsoft recommends for quickly protecting against the most likely and impactful risks.

Speakers: Matt Kemelhar, Mark Simos

Matthew Kemelhar leads Microsoft Enterprise Cybersecurity Group (ECG) as the Global Incident Response and Recovery leader. He joined the company six years ago as one of the Foundational Consultants responsible for developing Microsoft Services’ Incident Response and Recovery methodology and framework. Since he joined the team, Kemelhar has led countless commercial and public sector incident investigations worldwide. Kemelhar and his team excel at advising C-level executives through major network breaches and intellectual property loss. Prior to joining Microsoft, he spent 16 years as a Civil Servant for the US Air Force, National Security Agency (NSA) and most recently the Department of Energy (DOE).

Mark Simos is Lead Architect for the Microsoft Enterprise Cybersecurity Group where he is part of a group of cybersecurity experts and former CISOs who create and deliver solutions to Microsoft’s customers. These solutions leverage the company’s deep cybersecurity and enterprise IT expertise, unique cybersecurity knowledge as a cloud provider, partner capabilities and firsthand experience helping customers investigate and recover from attacks. Simos is a recognized expert in security with real-world experience delivering solutions to detect and mitigate cybersecurity threats. He has presented at Black Hat USA, RSA Conference and numerous Microsoft conferences. He has led the development of cybersecurity reference architectures, cybersecurity solutions, assessments and public guidance.

Detailed Presentation:

(Source: RSA Conference USA 2018)

E-mail me when people leave their comments –

You need to be a member of CISO Platform to add comments!

Join CISO Platform