If playback doesn't begin shortly, try restarting your device.
•
You're signed out
Videos you watch may be added to the TV's watch history and influence TV recommendations. To avoid this, cancel and sign in to YouTube on your computer.
CancelConfirm
Share
An error occurred while retrieving sharing information. Please try again later.
Folks from Microsoft’s Detection and Response Team (DART) share some simple things that anyone can do in their environment to minimize exposure to Ransomware. These scary stories from the DART team customer engagements are sure to thrill and educate at the same time. In this session learn how DART operates through investigation, mitigation and remediation to understand how these same principles can be applied across the depth and breadth of the entire organization.
*Speakers
Stella Aghakian
Kate Livingston
Follow
The Microsoft DART team on Twitter: @MicrosoftDART
The Microsoft Security team on Twitter: @msftsecurity
✔️Resources:
https://aka.ms/DartBlogs
Microsoft DART ransomware approach and best practices: https://learn.microsoft.com/en-us/sec...
Human-operated ransomware: https://learn.microsoft.com/en-us/sec...
How it works: Azure AD Multi-Factor Authentication: https://learn.microsoft.com/en-us/azu...
Microsoft DART …...more
Stories from DART: Taking the ware out of ransomware | BRK212H
16Likes
790Views
2022Oct 21
Folks from Microsoft’s Detection and Response Team (DART) share some simple things that anyone can do in their environment to minimize exposure to Ransomware. These scary stories from the DART team customer engagements are sure to thrill and educate at the same time. In this session learn how DART operates through investigation, mitigation and remediation to understand how these same principles can be applied across the depth and breadth of the entire organization.
*Speakers
Stella Aghakian
Kate Livingston
Follow
The Microsoft DART team on Twitter: @MicrosoftDART
The Microsoft Security team on Twitter: @msftsecurity
✔️Resources:
https://aka.ms/DartBlogs
Microsoft DART ransomware approach and best practices: https://learn.microsoft.com/en-us/sec...
Human-operated ransomware: https://learn.microsoft.com/en-us/sec...
How it works: Azure AD Multi-Factor Authentication: https://learn.microsoft.com/en-us/azu...
Microsoft DART ransomware case study: https://learn.microsoft.com/en-us/sec...
Protect your business from password sprays with Microsoft DART recommendations: https://www.microsoft.com/en-us/secur...
Real-life cybercrime stories from DART, the Microsoft Detection and Response Team: https://www.microsoft.com/en-us/secur...
To learn more, please check out these resources:
https://aka.ms/DartBlogshttps://aka.ms/learnatignitehttps://info.microsoft.com/contact-us...https://aka.ms/IgniteCollectionBRK212H
🔴 To watch more sessions from the Microsoft Ignite 2022 Security Breakout sessions, check out our playlist: https://www.youtube.com/@MicrosoftIgn...
🔖 Chapters:
0:00 Introduction
1:13 About DART
3:00 Tooling and Methodology
5:24 Threat Actor Profiles and Approaches
10:44 Case Study 1: Entertainment Industry Customer
19:14 Case Study 2: Technology Industry Customer
29:17 Case Study Debrief and Comparison
31:20 Tactical Mitigations
32:36 Tactical Remediation
34:36 Long-term Remediation
37:51 Key Takeaways: It’s not Rocket Science
38:50 Key Takeaways: Core Actions
40:46 Close out and resources
ℹ️ Session Information: This video is one of many sessions delivered for the Microsoft Ignite 2022 event. Find more content like this, visit the Microsoft Ignite channel - / microsoftignite
BRK217H | English (US)
#msignite…...more