Search
Content Type
Conference
I will show you demos for how to implement each layer of defense. This way, if one layer is breached, you aren’t left defenseless. We will start at the outer layer with network access. Next, we will cover the authentication and authorization using Azure RBAC. Finally, we will protect the innermost layer with Data At Rest and Data In Transit encryption. Once these protections are in place, we’ll see how to monitor Azure SQL security ecosystem for intrusions with Advanced threat protection.
An overview of VNets, Service Endpoints & Private Endpoints for Azure SQL DB & Managed Instance
This session will introduce you to "What and why you should care about", and discuss "how" to apply the Security and Privacy lens for Big Data on AWS.
A short, fast dive into the specific elements of Azure Purview that work well with Data Lakes, and how you implement them yourselves
We'll explore delivering this framework within an enterprise and consider an architect’s perspective on a wider platform of ingestion/transformation workloads with multiple batches and execution stages.
Join us for an hour to examine data governance for business and how it can benefit you.
This data governance session guides you through the organization processes, policies and roles that are required for a successful data governance adoption. In addition to demos showing the possibilities of Azure Purview (the MS data governance service), we will share about experiences from our data governance workshops and adoption projects with our customers.
Join this session for a deep dive on secure enclaves in Always Encrypted. We will explore how the SQL Server database engine uses enclaves internally. We will dissect the end-to-end query processing workflow, so that you understand how attestation and the key release protocol work. You will learn about how to optimize the performance of your enclave queries and about the latest Always Encrypted investments in Azure SQL and other Azure data services.
Automate checking your database security model
Govern your Power BI estate and setup your DTAP approach for Power BI using DevOps or native deployment pipelines!
Learn how to and why you should protect your data with Row Level Security in SQL Server and Power BI.
Reality Check on Microsofts Enterprise Scale Analytics Framework
Auditing options for Azure SQL offerings
In this session, you will learn how to solve common security requirements for new or existing applications using Azure SQL Database and Azure SQL Managed Instance. We will cover Authentication and Authorization, Data Protection, Auditing and Security Management. After completing this session, you will understand how to meet specific security compliance standards and best practices.
Let's be honest; dealing with Keys for Azure Service Principal can be a pain. Fortunately Azure Active Identity has an Identity type called Managed Identity that we can assign to a resource and make use of that for authorisation. We will discuss the beneifts of using Managed Identities in Azure to authorise resources without having to use Service Principals.
This session will discuss a custom solution we have built to solve the problem of row level encryption in a highly complex data lake.
This session will help you find the best strategy for managing your Power BI workspaces. Should you go for as much automation as possible or do careful manual process? Should you have few people controlling everything or should everyone do as they want? All this and more you will find in this session.
Join us for a tour of Network Security & Connectivity features that work towards securing your data on Sql Server and Azure Sql
Power BI Adoption Roadmap: A Whirlwind Tour
Learn how to deploy Power BI at scale within a large Enterprise. The mantra behind this is “discipline at the core, flexibility at the edge” - we will cover deploying appropriate guardrails/controls whilst still retaining the notion of “self-service” within the organization.
<<12>>