Protecting Your Data at Speed and Scale with AI-Powered Data Security

Protecting Your Data at Speed and Scale with AI-Powered Data Security

Microsoft Ignite via YouTube Direct link

0:00 - Security Team Challenges: Alert Overload and Staffing Constraints

1 of 9

1 of 9

0:00 - Security Team Challenges: Alert Overload and Staffing Constraints

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Protecting Your Data at Speed and Scale with AI-Powered Data Security

Automatically move to the next video in the Classroom when playback concludes

  1. 1 0:00 - Security Team Challenges: Alert Overload and Staffing Constraints
  2. 2 00:09:21 - Introduction to Live Demo by Arun
  3. 3 00:11:32 - Introducing Lauren and Adi – the security team at Sava
  4. 4 00:14:10 - Adi discovers unusual alerts suggesting data leaks from Project Nebula
  5. 5 00:20:10 - ADI’s workload reduction and alert triage overview
  6. 6 00:20:45 - Three risk types introduced: sensitivity, exfiltration, and policy risk
  7. 7 00:24:20 - Summary of automation benefits and cross-functional alert management
  8. 8 00:33:16 - Policy comparison between ‘Tented Project Leak’ and default email policy
  9. 9 00:37:25 - Six steps review – signal to outcome overview of Java’s workflow

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.