I will show you demos for how to implement each layer of defense. This way, if one layer is breached, you aren’t left defenseless. We will start at the outer layer with network access. Next, we will cover the authentication and authorization using Azure RBAC. Finally, we will protect the innermost layer with Data At Rest and Data In Transit encryption. Once these protections are in place, we’ll see how to monitor Azure SQL security ecosystem for intrusions with Advanced threat protection.
An overview of VNets, Service Endpoints & Private Endpoints for Azure SQL DB & Managed Instance
This session will introduce you to "What and why you should care about", and discuss "how" to apply the Security and Privacy lens for Big Data on AWS.
A short, fast dive into the specific elements of Azure Purview that work well with Data Lakes, and how you implement them yourselves
Join this session for a deep dive on secure enclaves in Always Encrypted. We will explore how the SQL Server database engine uses enclaves internally. We will dissect the end-to-end query processing workflow, so that you understand how attestation and the key release protocol work. You will learn about how to optimize the performance of your enclave queries and about the latest Always Encrypted investments in Azure SQL and other Azure data services.
Automate checking your database security model
Learn how to and why you should protect your data with Row Level Security in SQL Server and Power BI.
Reality Check on Microsofts Enterprise Scale Analytics Framework
Auditing options for Azure SQL offerings
In this session, you will learn how to solve common security requirements for new or existing applications using Azure SQL Database and Azure SQL Managed Instance. We will cover Authentication and Authorization, Data Protection, Auditing and Security Management. After completing this session, you will understand how to meet specific security compliance standards and best practices.
Let's be honest; dealing with Keys for Azure Service Principal can be a pain. Fortunately Azure Active Identity has an Identity type called Managed Identity that we can assign to a resource and make use of that for authorisation. We will discuss the beneifts of using Managed Identities in Azure to authorise resources without having to use Service Principals.
This session will discuss a custom solution we have built to solve the problem of row level encryption in a highly complex data lake.
Dynamic SQL is great, until it is used to hack your site. In this session we demonstrate how using the T-SQL "Execute AS" command can limit what can be run using dynamic SQL.
This session will help you find the best strategy for managing your Power BI workspaces. Should you go for as much automation as possible or do careful manual process? Should you have few people controlling everything or should everyone do as they want? All this and more you will find in this session.
Join us for a tour of Network Security & Connectivity features that work towards securing your data on Sql Server and Azure Sql
Are you trying to make sense of how to secure your Azure Data Service to your private network, but can't just seem to make sense of service endpoints, private links and private endpoints, as well as when to use which approach? Join this session to understand networking for the Azure Data services and the differences of these methods for integrating your Azure Data Services to a virtual network. You will learn what are the benefits of each approach and what challenges you can solve with them.
Learn how to deploy Power BI at scale within a large Enterprise. The mantra behind this is “discipline at the core, flexibility at the edge” - we will cover deploying appropriate guardrails/controls whilst still retaining the notion of “self-service” within the organization.
Learn security and governance tips for your Power BI estate and avoid common pitfalls.
Learn what's new in Microsoft Defender for Cloud for data store
Join this session to learn how ledger tables in Azure SQL Database and SQL Server 2022 work and why you should use them in your databases and applications.
<<1234>>