Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Microsoft

Lumen and Microsoft Co-Innovation - From Threats to Transformation

Microsoft via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore how Lumen Defender integrates with Microsoft's security ecosystem to enhance threat detection and response capabilities in this 47-minute conference session from Microsoft Ignite 2025. Discover strategies for addressing the growing complexity organizations face when migrating to Microsoft Security solutions, including challenges with threat detection, incident response, and compliance management. Learn how Lumen's outside-in intelligence leverages the world's most interconnected internet backbone to complement Microsoft's native security stack, enabling Security Operations Center (SOC) teams to detect and respond to alerts with greater confidence and speed. Examine the four planes of Microsoft's security platform and understand how Lumen's partnership provides additional connectors available in the Security Store. Gain insights into Black Lotus Labs' role in delivering threat intelligence and understand network visibility through practical analogies comparing network infrastructure to highway systems. Analyze the benefits of reused attack infrastructure detection for early warning systems and compare endpoint versus network-level intelligence approaches. Review enterprise strategies for managing suspicious traffic through log analysis and discover actionable methods to strengthen your organization's security posture while accelerating return on investment. Access additional resources including Microsoft's secure data plans, telecommunications solutions, and Lumen Defender threat intelligence documentation to further enhance your security implementation.

Syllabus

0:00 - Challenges Faced by SOC Teams and Data Overload
00:07:00 - Introduction to AI-First End-to-End Security Platform
00:13:33 - Introduction to Microsoft Security Platform and its Four Planes
00:14:40 - Showcase of Lumen Partnership and Available Connectors in the Security Store
00:17:07 - Overview of Black Lotus Labs and Their Role in Lumen’s Threat Intelligence
00:25:39 - Analogy of U.S. Highways to Explain Network Visibility
00:27:11 - Reused Attack Infrastructure and Early Warnings
00:29:36 - Analogy Comparing Endpoint vs. Network-Level Intelligence
00:36:21 - Enterprise Approach: Letting Suspicious Traffic Pass into Logs for Analysis

Taught by

Microsoft Ignite

Reviews

Start your review of Lumen and Microsoft Co-Innovation - From Threats to Transformation

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.