Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Microsoft

Protecting Your Data at Speed and Scale with AI-Powered Data Security

Microsoft via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore how Security Copilot and AI agents in Microsoft Purview revolutionize data protection by automating security tasks and accelerating threat response in this 41-minute conference session from Microsoft Ignite 2025. Discover solutions to common security team challenges including alert overload and staffing constraints through practical demonstrations featuring a fictional security team at Sava. Learn about three critical risk types - sensitivity, exfiltration, and policy risk - and witness how AI-powered automation reduces manual workload in alert triage and investigation. Follow along as the session demonstrates detecting unusual data leak alerts from Project Nebula, implementing cross-functional alert management, and comparing security policies for comprehensive data protection. Gain insights into the six-step workflow from signal detection to outcome resolution, showcasing how modern AI tools transform security operations from reactive to proactive data protection strategies. The session includes live demonstrations by Microsoft experts Tanay Baldua, Paige Johnson, and Arun Kumar, providing advanced-level insights for security professionals looking to scale their data protection capabilities efficiently.

Syllabus

0:00 - Security Team Challenges: Alert Overload and Staffing Constraints
00:09:21 - Introduction to Live Demo by Arun
00:11:32 - Introducing Lauren and Adi – the security team at Sava
00:14:10 - Adi discovers unusual alerts suggesting data leaks from Project Nebula
00:20:10 - ADI’s workload reduction and alert triage overview
00:20:45 - Three risk types introduced: sensitivity, exfiltration, and policy risk
00:24:20 - Summary of automation benefits and cross-functional alert management
00:33:16 - Policy comparison between ‘Tented Project Leak’ and default email policy
00:37:25 - Six steps review – signal to outcome overview of Java’s workflow

Taught by

Microsoft Ignite

Reviews

Start your review of Protecting Your Data at Speed and Scale with AI-Powered Data Security

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.