Open Workshops & Security Updates

open workshops

Top Stories for US partners of the week

Stay up-to-date with training opportunities


What’s new

News and Events



  • MS Security Events Recent News 1-28-22


Microsoft Security Community events
As part of our community, you can speak directly to our engineering teams and get early access to changes by joining our webinars, participating in private previews, reviewing product roadmaps, attending in-person events, or providing feedback on our forums.


FEB 3     Microsoft Sentinel | Become a Jupyter Notebooks Ninja – MSTICPy Intermediate to Build Your Own Notebooks

In the previous webinar, we walked you through the fundamentals of MSTICPy. In this webinar, we will cover useful tips and more advanced uses of MSTICPy to supercharge your incident investigation and threat hunting.

FEB 10   Microsoft Sentinel | Automate Your Microsoft Sentinel Triage Efforts with RiskIQ Threat Intelligence

Please join this webinar to understand the threat intelligence capabilities in Microsoft Sentinel and how you can leverage the power of RiskIQ TI better with Microsoft Sentinel.

FEB 23   Microsoft Defender for IoT | Cloud Capabilities and Security Advantages

In this session, we will discuss the benefits of connecting Microsoft Defender for IoT for OT/ICS environments to the cloud. Covering both security and manageability aspects and cross platform integrations.

MAR 1   Microsoft Sentinel | What’s Next in Microsoft Sentinel?

Join members of our engineering team as they dive deeper into the new Microsoft Sentinel features, and the product vision going forward. See new features in action and as always, don’t forget to bring your questions.

MAR 9   Microsoft Sentinel | The Advanced SIEM Information Model (ASIM): Now Built into Microsoft Sentinel

Now that ASIM is built into Microsoft Sentinel, we will show you how to best use ASIM to use Microsoft Sentinel without worrying about each source’s details.

MAR 15   Microsoft Defender for Cloud | Demystifying Microsoft Defender for Containers

Join us to learn more about Microsoft Defender for Containers – a new cloud workload protection plan, which is part of Microsoft Defender for Cloud, and addresses the unique needs of container-based solutions.

MAR 22   Microsoft Sentinel | Extend and Manage ASIM: Developing, Testing and Deploying ASIM Parsers

In this webinar, we will explain and demonstrate how to manage your parsers by excluding built-in parsers and adding your custom parsers and how to develop and test parsers using our new testing tools for ASIM.

MAR 24   Better Together | Microsoft Sentinel – IT/OT Threat Monitoring with Defender for IoT Solution

In this session, we will discuss how Microsoft Sentinel and Microsoft Defender for IoT are driving together a convergence of OT and corporate cybersecurity disciplines in defense of critical infrastructure.

APR 6   Microsoft Defender for IoT | How to Discover and Secure IoT Devices in the Enterprise Environment

In this session, we will share how Microsoft Defender for IoT is leveraging multiple data sources (including an agentless solution and Microsoft Defender for Endpoints) to discover and secure IoT devices in enterprise networks.

APR 26   Microsoft Defender for Cloud | What’s New in the Last 3 Months

Microsoft Defender for Cloud is in active development and receives improvements on an ongoing basis. In this session we will summarize and demo what we’ve released for Microsoft Defender for Cloud in the last 3 months that you need to know about!


VIRTUAL: Microsoft Security Virtual Training Day: Protect Data and Manage Risk 02/02/2022 10:00 AM – Eastern Time Register
VIRTUAL: Microsoft Security Virtual Training Day: Security, Compliance, and Identity Fundamentals 02/10/2022 11:00 AM – Eastern Time Register
VIRTUAL: Microsoft Security Virtual Training Day: Modernize Security and Defend Against Threats 02/16/2022 10:00 AM – Pacific Time Register
VIRTUAL: Microsoft Security Virtual Training Day: Zero Trust 02/22/2022 10:00 AM – Pacific Time Register


Security Days is an event that provides customers with a holistic view of Microsoft’s cloud security product stack.

Save the Dates:

  • EMEA: March 7-8
  • Americas: March 9-10

Registration links coming soon. Check out our recordings of previous Security Days sessions.


Protecting Identity, Apps, Data and Devices

 Identity is at the center of security: don’t compromise when it comes to your company’s valuable information. Explore how to use secure authentication, govern access, get comprehensive protection and set the right identity foundation.

Protecting Assets and Empowering Your Defenders

Today’s workforce can work from anywhere, on any device, and on any app. Security teams need to understand threat signals from disconnected products and optimize security with minimal complexity. Explore how you can empower your security teams with native integrations, intelligent automation, and expert guidance.

Simplifying Your Privacy and Compliance Journey

Your business needs to control how sensitive data is managed. Explore how to assess your compliance risk, protect sensitive and business critical data, and respond efficiently to data discovery requests.

Protecting your Sensitive Information

Data needs to be protected wherever it’s stored and whenever it travels, and you need the tools to monitor policy violations and risky behavior. Explore how to implement a comprehensive and integrated approach across devices, apps, cloud services, and on-premises.


Ninja Trainings

Azure Network Security Ninja Training

Microsoft 365 Advanced eDiscovery Ninja Training

Microsoft 365 Defender Ninja Training
Microsoft Defender for Cloud Ninja Training

Microsoft Defender for Cloud Apps Ninja Training

Microsoft Defender for Endpoint Ninja Training

Microsoft Defender for Identity Ninja Training

Microsoft Defender for IoT Ninja Training

Microsoft Defender for Office 365 Ninja Training
Microsoft Sentinel Ninja Training
Microsoft Sentinel Notebooks Ninja Training



Build a stronger cybersecurity team through diversity and training

Microsoft Security Blog

In the latest post in the Voice of the Community blog series, Microsoft Security Product Marketing Manager Natalia Godyla talks with Heath Adams, CEO at TCM Security about being a mentor, hiring new security talent, certifications, upskilling, the future of cybersecurity training, and more.


Why you shouldn’t set these 25 Windows policies

Windows IT Pro Blog

The blog identifies which Windows policies are not recommended, why they are not recommended, and how to get the same or similar behavior with either default settings or recommended policies.

Microsoft Defender for Cloud PoC Series—Microsoft Defender for Containers

Microsoft Defender for Cloud Blog

The blog features guidelines and considerations for how to successfully perform a proof of concept for the new Microsoft Defender for Containers plan.

Related reading: Microsoft Defender for Office 365 Ninja Training: January 2022 Update, Custom assessments and standards in Microsoft Defender for Cloud for AWS workloads (Preview)

Achieving Zero Trust readiness in your apps #2: Designing for Least Privilege

Azure Active Directory Identity Blog

The blog focuses on how you can design apps using the principle of least privileged access with the Microsoft identity platform.

Red Cross: Supply chain data breach hit 500K people


The International Committee of the Red Cross (IRC) suffered a cyberattack where hackers seized the data of more than 515,000 “highly vulnerable” people. The data was stolen from an external company in Switzerland that stores the data on behalf of the IRC.

Cybercriminals actively target VMware vSphere with cryptominers


Cryptojackers are using malicious shell scripts to make modifications and run the XMrig crytpominer against organizations running virtual networks with VMware’s vSphere service.

Ransomware: 2,300+ local governments, schools, healthcare providers impacted in 2021


New research from Emsisoft finds that at least 77 state and municipal governments, 1,043 schools, and 1,203 healthcare providers were impacted by a ransomware incident in 2021, leading to 118 data breaches.

How ‘The Great Resignation’ is affecting cybersecurity

Gov Info Security

Mike Hamilton, former CISO for the city of Seattle, warns organizations about the opportunities that the so-called The Great Resignation presents for cybercriminals and outlines how employers can work to retain talent.

Closing the cyber gap: Business and security leaders at crossroads as cybercrime spikes

Modern Diplomacy

According to the World Economic Forum’s annual report, 92 percent of business executives surveyed agree that cyber resilience is integrated into enterprise risk-management strategies, while only 55 percent of cyber leaders surveyed agree. This disparity between leaders leaves firms vulnerable to attacks as a direct result of incongruous security priorities and policies.

Implement cybersecurity measures now to protect against potential critical threats (PDF)

CISA Insights

CISA (Cybersecurity & Infrastructure Security Agency) has issued this document “to ensure that senior leaders at every organization in the United States are aware of critical cyber risks and take urgent, near-term steps to reduce the likelihood and impact of a potentially damaging compromise.”

Biden signs memorandum to improve cybersecurity across DOD, intelligence community


President Joe Biden on January 19, 2022, signed a national security memorandum to improve cybersecurity across the US Department of Defense (DOD) and the intelligence community.

Threat spotlight: COVID-19 test-related email scams


Between October 2021 and January 2022, the number of COVID-19-test-related scams increased by 521 percent.

Supply chain attack used legitimate WordPress add-ons to backdoor sites

Ars technica

Researchers say that dozens of legitimate WordPress add-ons downloaded from their original sources have been found backdoored through a supply chain attack.

US data breaches surge 68% to all-time high


The volume of publicly reported data compromises in the U.S. increased 68 percent from 2021 to 2022 to a new record of 1,862.

Two in five IT security managers considering quitting their jobs


Two in five (41 percent) IT security managers in the UK are considering quitting their jobs in the next six months.

Known exploited vulnerabilities catalog