Planning to move your databases to the cloud but seriously doubt if your data is 100% secure? No matter if you are on-prem or in the cloud, making sure your data is protected in every angle possible is the most crucial and important step in building a secure data tier of an application. Let's dedicate this session to knowing the different multi-layer defense-in-depth security techniques and strategies available to armor your Azure SQL database. let's dive deep into each of these layers starting with the network security, Azure role-based access control (RBAC), data security at the row level, auditing, advanced threat protection, different layers of encryption, monitoring, and more. By the end of this session, you will have the knowledge to make the right security decisions for your environments and implement these techniques in securing your data. 
The video is not available to view online.
Join us for a pure, demo-driven journey of a dozen incredible features for Azure SQL Managed Instance showing you the greatest and latest innovations enabling Database Administrators and Developers to achieve more. Whether you’re a DBA, Azure Administrator, Developer, Business Intelligence developer, or of course any other data professional, these demos will show how you can achieve more with the exciting features that are available to you. Some of the topics we will cover are hybrid scenarios, performance and scale, application compatibility, workload modernization, compliance, data mobility/migration & business continuity/disaster recovery - and several more - in this fast-paced, demo-only session.
The video is not available to view online.
In this session, I will discuss five common myths about SQL Server backup and demo each to show you the correct answer.
The video is not available to view online.
Join us to learn why data governance is increasing in popularity and what you need to know about what data governance really is.
The video is not available to view online.
In this session I'll guide you from through a secure reference architecture with Data Factory, Databricks, Data Lake, and Azure Synapse, working together as a secure, fully productionised platform. Each has their own idiosyncrasies, but this session will teach you the options available and the pitfalls to avoid.
The video is not available to view online.
Learn how malicious users can lure a power user such as sysadmin to run code that performs action to the benefit of the evil user by something I call permission hijacking and what means you can take to prevent this from happening.
The video is not available to view online.
Extend your Power BI governance functionality with Microsoft Purview. This session will show you how, what's in it for your PBI Landscape in terms of data catalog, -map and -lineage, data loss prevention, life cycles management and information protection. You will see live demos, watch outs and implementation best practises.
The video is not available to view online.
Cloud migration projects are often massive projects with sprawling scopes. Don't you want some help sorting through this enormous pile of work? Join an experienced cloud migration consultant for a targeted walkthrough of their cloud migration success checklist so you can make sure your project gets off to a good start and reaches a successful completion.
The video is not available to view online.
Auditors are not fun to deal with and proving your systems meet requirements is a PITA. Come to this session to learn how to leverage dbachecks to check your SQL Servers for security compliance.
The video is not available to view online.
If you need to easily identify all your on-premises data gateways or prevent gateways from being installed in your Power BI tenant, then you don't want to miss this quick tip session.
The video is not available to view online.
Azure DevOps is the leading deployment tool for build and release solutions end to end. It helps you plan your Agile project, manages Git code, and deploys solutions using Continuous Integration (CI) and Continuous Deployment (CD) pipelines. In this session we will cover some of the core components of Azure DevOps and show you how to implement a secure deployment pipeline, using unit tests and gating with your CI builds and CD releases.
The video is not available to view online.
Data integrity is a huge concern for every business, especially when it comes to protecting your company's most valuable information and Azure SQL Ledger can be the way to go.
The video is not available to view online.
One of the new applications within Microsoft Purview Governance Portal are Access Policies. Access policies in Microsoft Purview allow you to manage access to different data systems across your entire data estate. The big advantage of these policies is that you do not have to apply RBAC roles and you have an overview of all applied policies. Are you a data consumer? Then the self-service access policy is an easy way to request access to data while browsing or searching for data. Are you a data producer? Then access policies helps you to easily create and publish access to data sources In this session, I will explain and show you how to create and publish policies and how to set up a self-service access workflow.
The video is not available to view online.
Microsoft Defender for SQL is part of the Azure Defender family and it protects SQL Server in two main ways. We'll cover the first way, Advanced Threat Protection. This is a feature with advanced security capabilities that detect anomalous activities that might access or exploit sql server, like SQL Injection.
The video is not available to view online.
Implement network security with the IP firewall, VNet access, and private endpoints, understand the various authentication options using master keys, resource tokens and Azure AD integration, learn about built-in server-side encryption, and how to configure client-side encryption using Always Encrypted.
The video is not available to view online.
Getting started with Cosmos DB is super easy and you get the scalability and global reach out of the box. For production scenarios we often have additional requirements for security, that could span from restricting public endpoints to auditing user actions on data. In this session, we will go through the different security capabilities available for Cosmos DB, focusing deeper on networking and access control. We will cover how to control networking and use private endpoints with Cosmos DB, as well as how the global nature of the service makes these different from the rest of the services in Azure. We will also explore the different options for access control on the data in Cosmos DB and particularly how the newest addition to the mix, Cosmos DB RBAC, can help keep your data secure.
The video is not available to view online.
You should not have to wait for a spefic feauture to be secure. A lot of the security features are not limited to the latest versions. Let's go back in time and match modern day security features in a SQL version from way back when.
The video is not available to view online.
Security is given too little attention in the database environment and many times more rights are given than are necessary. Especially with CROSS DATABASE access, the goal is often overshot. Learn how to securely access data in other databases without breaking the bank.
The video is not available to view online.
Lean about some of the worst security practices observed in the wild and have a good laugh.
The video is not available to view online.
Get started with B2B collaboration in Power BI. Get to know which questions to ask, how to set it up and leave the room well equipped to get your collaboration started! We will provide you with best practices and ways of working and give you a decision tree to help you even after the session to make the right decisions.
The video is not available to view online.
SQLBits' has brought members of the Azure Synapse Program Group to Wales to ask YOUR questions. Bring your questions for: Dedicated SQL Pools, Serverless SQL Pools, Spark Pools, Pipelines, Kusto and everything else Synapse related.
The video is not available to view online.
Learn the basics of private endpoints, including what they are, why the make your platform more secure, how to deploy and configure them, and common mistakes to avoid.
The video is not available to view online.
Learn how to convince your security team that Power BI's security and governance features are secure. It's baked in features that allow your org to upload your upload your data to the cloud and enable self-service in a safe and managable way.
The video is not available to view online.
In just 20 minutes you will see a demo of bidirectional database failover between SQL Server 2022 and Managed Instance, using the link feature. The feature provides never-before possible hybrid connectivity and near real-time database replication between SQL Servers 2016-2022 and Managed Instance, including industry’s first bidirectional data movement and online failover (Disaster Recovery) between SQL Server 2022 and SQL Managed Instance Need to move back from Azure to SQL Server on-premises, or anywhere else? No problem, use it all in reverse and replicate your online and near real-time from Managed Instance back to SQL Server 2022.
The video is not available to view online.
ADF Tips and Tricks which help you to speed up your Azure Data Integration solution,save operational cost and improve performance.
The video is not available to view online.
In this demo filled session, learn how to view lineage data from Databricks Unity Catalog in Microsoft Purview.
The video is not available to view online.
The CIS Benchmarks, from the Centre of Internet Security (CIS), are a set of globally recognized and consensus-driven best practices to help us implement and manage our cybersecurity defences. In this 20-minute session, listen to David and Gethyn discussing these best practices, see if you agree with them, and see how many you have implemented.
The video is not available to view online.
In this session, we'll be looking at all the various places within the application stack that data can be encrypted or hashed, so that as an application/database administrator/developer/architect you can make the best decision as to where in the application stack to do this work.
The video is not available to view online.
SQL bits and London Power BI user group are brining a Q&A panel with some of Power BI CAT team members to ask everything about Power BI. Join us with your questions
The video is not available to view online.
I will show you demos for how to implement each layer of defense. This way, if one layer is breached, you aren’t left defenseless. We will start at the outer layer with network access. Next, we will cover the authentication and authorization using Azure RBAC. Finally, we will protect the innermost layer with Data At Rest and Data In Transit encryption. Once these protections are in place, we’ll see how to monitor Azure SQL security ecosystem for intrusions with Advanced threat protection.
You will be challenged with a case study to design a solution using Azure SQL Database capabilities. At the end of this session, you will better understand the possibilities to migrate on-premises databases to Azure SQL Database. You will learn how to synchronize data across different environments and get more insights on how to troubleshoot issues in Azure SQL Database. This is a hands-on, open discussions and team work kind of session (not a traditional slideshow).
The video is not available to view online.
An overview of VNets, Service Endpoints & Private Endpoints for Azure SQL DB & Managed Instance
This session will introduce you to "What and why you should care about", and discuss "how" to apply the Security and Privacy lens for Big Data on AWS.
A short, fast dive into the specific elements of Azure Purview that work well with Data Lakes, and how you implement them yourselves
In this session, you will tag along the journey of working towards a solution to this problem. We will touch upon topics like automated workflows with Power Automate, Active Directory Security Groups, Decoupled Datasets and Security Tables, all combined with Row-Level Security to bring them all together.
The video is not available to view online.
Join this session for a deep dive on secure enclaves in Always Encrypted. We will explore how the SQL Server database engine uses enclaves internally. We will dissect the end-to-end query processing workflow, so that you understand how attestation and the key release protocol work. You will learn about how to optimize the performance of your enclave queries and about the latest Always Encrypted investments in Azure SQL and other Azure data services.
Automate checking your database security model
Learn how to and why you should protect your data with Row Level Security in SQL Server and Power BI.
Reality Check on Microsofts Enterprise Scale Analytics Framework
Auditing options for Azure SQL offerings
In this session, you will learn how to solve common security requirements for new or existing applications using Azure SQL Database and Azure SQL Managed Instance. We will cover Authentication and Authorization, Data Protection, Auditing and Security Management. After completing this session, you will understand how to meet specific security compliance standards and best practices.
Let's be honest; dealing with Keys for Azure Service Principal can be a pain. Fortunately Azure Active Identity has an Identity type called Managed Identity that we can assign to a resource and make use of that for authorisation. We will discuss the beneifts of using Managed Identities in Azure to authorise resources without having to use Service Principals.
In this session you will learn about the latest big investments in Security for Azure Data Services. Among them the ability to authorize access using Policies in Purview, different managed identity options and the latest on Ledger and Network controls
The video is not available to view online.
This session will discuss a custom solution we have built to solve the problem of row level encryption in a highly complex data lake.
Dynamic SQL is great, until it is used to hack your site. In this session we demonstrate how using the T-SQL "Execute AS" command can limit what can be run using dynamic SQL.
This session will help you find the best strategy for managing your Power BI workspaces. Should you go for as much automation as possible or do careful manual process? Should you have few people controlling everything or should everyone do as they want? All this and more you will find in this session.
Meet SQL Server audit and compliance requirements for all instances across your enterprise with an easy centralized user interface.
The video is not available to view online.
Meet SQL Server audit and compliance requirements for all instances across your enterprise with an easy centralized user interface.
The video is not available to view online.
Join us for a tour of Network Security & Connectivity features that work towards securing your data on Sql Server and Azure Sql
Are you trying to make sense of how to secure your Azure Data Service to your private network, but can't just seem to make sense of service endpoints, private links and private endpoints, as well as when to use which approach? Join this session to understand networking for the Azure Data services and the differences of these methods for integrating your Azure Data Services to a virtual network. You will learn what are the benefits of each approach and what challenges you can solve with them.
<<123>>