Planning to move your databases to the cloud but seriously doubt if your data is 100% secure? No matter if you are on-prem or in the cloud, making sure your data is protected in every angle possible is the most crucial and important step in building a secure data tier of an application. Let's dedicate this session to knowing the different multi-layer defense-in-depth security techniques and strategies available to armor your Azure SQL database. let's dive deep into each of these layers starting with the network security, Azure role-based access control (RBAC), data security at the row level, auditing, advanced threat protection, different layers of encryption, monitoring, and more. By the end of this session, you will have the knowledge to make the right security decisions for your environments and implement these techniques in securing your data. 
The video is not available to view online.
Join us for a pure, demo-driven journey of a dozen incredible features for Azure SQL Managed Instance showing you the greatest and latest innovations enabling Database Administrators and Developers to achieve more. Whether you’re a DBA, Azure Administrator, Developer, Business Intelligence developer, or of course any other data professional, these demos will show how you can achieve more with the exciting features that are available to you. Some of the topics we will cover are hybrid scenarios, performance and scale, application compatibility, workload modernization, compliance, data mobility/migration & business continuity/disaster recovery - and several more - in this fast-paced, demo-only session.
The video is not available to view online.
In this session, I will discuss five common myths about SQL Server backup and demo each to show you the correct answer.
The video is not available to view online.
Join us to learn why data governance is increasing in popularity and what you need to know about what data governance really is.
The video is not available to view online.
In this session I'll guide you from through a secure reference architecture with Data Factory, Databricks, Data Lake, and Azure Synapse, working together as a secure, fully productionised platform. Each has their own idiosyncrasies, but this session will teach you the options available and the pitfalls to avoid.
The video is not available to view online.
Learn how malicious users can lure a power user such as sysadmin to run code that performs action to the benefit of the evil user by something I call permission hijacking and what means you can take to prevent this from happening.
The video is not available to view online.
Extend your Power BI governance functionality with Microsoft Purview. This session will show you how, what's in it for your PBI Landscape in terms of data catalog, -map and -lineage, data loss prevention, life cycles management and information protection. You will see live demos, watch outs and implementation best practises.
The video is not available to view online.
Cloud migration projects are often massive projects with sprawling scopes. Don't you want some help sorting through this enormous pile of work? Join an experienced cloud migration consultant for a targeted walkthrough of their cloud migration success checklist so you can make sure your project gets off to a good start and reaches a successful completion.
The video is not available to view online.
Auditors are not fun to deal with and proving your systems meet requirements is a PITA. Come to this session to learn how to leverage dbachecks to check your SQL Servers for security compliance.
The video is not available to view online.
If you need to easily identify all your on-premises data gateways or prevent gateways from being installed in your Power BI tenant, then you don't want to miss this quick tip session.
The video is not available to view online.
Azure DevOps is the leading deployment tool for build and release solutions end to end. It helps you plan your Agile project, manages Git code, and deploys solutions using Continuous Integration (CI) and Continuous Deployment (CD) pipelines. In this session we will cover some of the core components of Azure DevOps and show you how to implement a secure deployment pipeline, using unit tests and gating with your CI builds and CD releases.
The video is not available to view online.
Data integrity is a huge concern for every business, especially when it comes to protecting your company's most valuable information and Azure SQL Ledger can be the way to go.
The video is not available to view online.
One of the new applications within Microsoft Purview Governance Portal are Access Policies. Access policies in Microsoft Purview allow you to manage access to different data systems across your entire data estate. The big advantage of these policies is that you do not have to apply RBAC roles and you have an overview of all applied policies. Are you a data consumer? Then the self-service access policy is an easy way to request access to data while browsing or searching for data. Are you a data producer? Then access policies helps you to easily create and publish access to data sources In this session, I will explain and show you how to create and publish policies and how to set up a self-service access workflow.
The video is not available to view online.
Microsoft Defender for SQL is part of the Azure Defender family and it protects SQL Server in two main ways. We'll cover the first way, Advanced Threat Protection. This is a feature with advanced security capabilities that detect anomalous activities that might access or exploit sql server, like SQL Injection.
The video is not available to view online.
Implement network security with the IP firewall, VNet access, and private endpoints, understand the various authentication options using master keys, resource tokens and Azure AD integration, learn about built-in server-side encryption, and how to configure client-side encryption using Always Encrypted.
The video is not available to view online.
Getting started with Cosmos DB is super easy and you get the scalability and global reach out of the box. For production scenarios we often have additional requirements for security, that could span from restricting public endpoints to auditing user actions on data. In this session, we will go through the different security capabilities available for Cosmos DB, focusing deeper on networking and access control. We will cover how to control networking and use private endpoints with Cosmos DB, as well as how the global nature of the service makes these different from the rest of the services in Azure. We will also explore the different options for access control on the data in Cosmos DB and particularly how the newest addition to the mix, Cosmos DB RBAC, can help keep your data secure.
The video is not available to view online.
You should not have to wait for a spefic feauture to be secure. A lot of the security features are not limited to the latest versions. Let's go back in time and match modern day security features in a SQL version from way back when.
The video is not available to view online.
Security is given too little attention in the database environment and many times more rights are given than are necessary. Especially with CROSS DATABASE access, the goal is often overshot. Learn how to securely access data in other databases without breaking the bank.
The video is not available to view online.
Lean about some of the worst security practices observed in the wild and have a good laugh.
The video is not available to view online.
Get started with B2B collaboration in Power BI. Get to know which questions to ask, how to set it up and leave the room well equipped to get your collaboration started! We will provide you with best practices and ways of working and give you a decision tree to help you even after the session to make the right decisions.
The video is not available to view online.
<<1234567>>