4/17 (Thu.) 14:00 - 14:30 7F 701B

Practical Applications and Configurations of Microsoft Products and Third-Party Tools: Building Enterprise Cybersecurity Defense

This session will delve into the configuration and application of Microsoft security products, covering multiple platforms such as Defender, Intune, and Entra ID. We will provide detailed explanations on how to effectively configure and utilize these platforms to protect enterprises from common cyber threats and enhance overall cybersecurity resilience.

We will also share past attack cases, illustrating how Microsoft products and third-party tools can be leveraged for defense and investigation. For instance, enterprises often face phishing emails impersonating senior executives or multi-layer redirection phishing attacks exploiting open redirects on well-known websites. In these cases, we will analyze how Microsoft products perform in defending against such attacks, discussing their advantages, such as high integration and robust threat detection capabilities, while also acknowledging their shortcomings, including operational complexity and limited configuration flexibility.

AZ
SPEAKER
TXOne Networks Inc.
Senior Information Security Engineer, Threat Research

TOPIC / TRACK
SecOps Forum

LOCATION
Taipei Nangang Exhibition Center, Hall 2
7F 701B

LEVEL
Intermediate Intermediate sessions focus on cybersecurity architecture, tools, and practical applications, ideal for professionals with a basic understanding of cybersecurity.

SESSION TYPE
Breakout Session

LANGUAGE
Chinese

SUBTOPIC
Advanced Threat Protection
Access Control
Enterprise Security