Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Microsoft

AI-Powered Defense for Cloud Workloads - BRK262

Microsoft via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore advanced cloud security through a conference talk that demonstrates real-world cyberattack scenarios targeting sensitive data in cloud storage and containers. Learn how Microsoft Defender for Cloud leverages artificial intelligence to detect threats, enhance threat hunting capabilities, and automate response mechanisms to prevent lateral movement in cloud environments. Discover market trends driving new security challenges as AI and cloud adoption accelerate, and understand the critical need for Cloud-Native Application Protection Platform (CNAPP) solutions in modern cloud environments. Examine the expansion of Microsoft Defender for Cloud into the Defender portal and witness live demonstrations showing how attackers enumerate secrets after bypassing content filters. Analyze AI-powered attack progression visualization using multiple security tools, and understand how to identify and terminate attack vectors through Extended Detection and Response (XDR) integration. Gain insights into AI-assisted detection and triage processes that provide deep understanding of attacker behavior patterns, and explore comprehensive monitoring of complex topologies and container ecosystems. This advanced-level breakout session from Microsoft Ignite 2025 features speakers Parul Seth and Michael Withrow, providing practical takeaways for cloud security professionals working to protect cloud workloads against sophisticated threats.

Syllabus

0:00 - Session agenda: context, live demo, and takeaways
00:00:59 - Market trends: growth in AI and cloud adoption driving new security challenges
00:03:24 - Understanding your cloud environment and need for CNAPP solutions
00:11:38 - Expansion of Microsoft Defender for Cloud into the Defender portal
00:16:03 - Demo shows attacker enumerating secrets after bypassing content filters
00:21:33 - Visualization of AI-powered attack progression with multiple tools
00:26:47 - Identifying and terminating attack vectors via XDR integration
00:28:25 - Summary of AI-assisted detection and triage with attacker behavior insights
00:29:36 - Overview of complex topology and container ecosystem monitoring

Taught by

Microsoft Ignite

Reviews

Start your review of AI-Powered Defense for Cloud Workloads - BRK262

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.