Hi, I'm Nicholas 👋
I'm a Senior Platform Engineer

Buy Me A Coffee
Episode 18

Threat Detection using Microsoft Sentinel with Uros Babic

with Uros Babic, Security Architect and Microsoft MVP

October 11, 2024 Episode 18 26:14
Uros Babic
Published:
Duration: 26:14

Unlock the secrets of cutting-edge threat detection with insights from Uros Babic, a security architect and Microsoft MVP, as we navigate the powerful capabilities of Microsoft Sentinel. You'll learn how Sentinel's analytics expertly sift through historical data to detect anomalies and potential threats.

Unlock the secrets of cutting-edge threat detection with insights from Uros Babic, a security architect and Microsoft MVP, as we navigate the powerful capabilities of Microsoft Sentinel. You’ll learn how Sentinel’s analytics expertly sift through historical data to detect anomalies and potential threats, providing security teams with the tools to efficiently respond to incidents. Uros sheds light on the seamless integration of Sentinel with other Microsoft security solutions, enhancing threat detection and facilitating rapid responses to security incidents.

Episode Highlights

  • Advanced threat detection using Microsoft Sentinel
  • Analytics for identifying anomalies and threats
  • Integration with Microsoft security ecosystem
  • Efficient incident response strategies

Uros shares best practices to address the human element in cybersecurity and how unified security operations streamline incident response.

Key Takeaways

  1. Analytics Power - Using historical data for threat detection
  2. Integration Benefits - Connecting Sentinel with other security tools
  3. Incident Response - Streamlining security operations
  4. Human Factor - Addressing the people aspect of cybersecurity

Resources Mentioned

  • Microsoft Sentinel analytics rules
  • Security incident response frameworks
  • Microsoft security ecosystem integration
  • Threat detection methodologies
  • Cybersecurity best practices

Topics Covered:

threat-detection microsoft-sentinel security-analytics incident-response cybersecurity