Sign in to confirm you’re not a bot
This helps protect our community. Learn more

Structure of the Book

4:38

How How Long Did It Take You To Write the Book

6:38

Fact Checking from Microsoft

8:01

Were They both with the Same Publisher or Was It Different Publishers That You Worked with

9:10

Any Other Books in the Pipeline

11:23

Experience Transitioning from that Written Medium to the Visual Medium

13:08

Introduction to Yourself

21:39

How Have You Dealt with Working Remotely versus Working in an Office

29:25

Holiday Pay

36:05

What Strange Skills Have You Had To Learn You'Re Running a User Group

56:06

What Tips Would You Give Them To Start in a User Group

57:37

Introduce Yourself to the Audience

1:00:45

Unprotected Public Endpoints

1:05:36

Contributor Role

1:15:49

User Access Administrator

1:16:23

Audit Logging

1:20:28

Audit Logs

1:22:21

Legacy Access Legacy Access Keys

1:25:59

Centralized Logging

1:29:40

Materials for Building Your Cloud Security Framework

1:32:42

Cloud Control Matrix

1:32:53

Azure Security Baselines

1:33:22

Could You Share without Naming any Names the Worst Customer Scenario You'Ve Ever Seen and What Impact It Had on Them

1:35:58

Shifting Security Left

1:49:10