Most Active Speaker

Dr. Abhilasha Vyas

Dr. Abhilasha Vyas

Business Unit Head Cloud Security and BI, CloudThat

Dr. Abhilasha Vyas working as Business Unit Head Cloud Security and BI, CloudThat. She is Executive council member, Women in Big Data (WiBD)
India and Core Team member of Women in Tech India. She is Gujarat Chapter
Lead of infosecgirls community. She is also working as Head, Cyber Cell, Suraj
Sansthan, Jaipur. Her research area is Cyber Security and Detection of DDoS
attacks. Dr. Abhilasha is AWS Cloud Solution Architect certified. She has
been invited and honored as keynote speaker, session chair, resource person and
technical committee member of various conferences. Dr. Abhilasha Vyas recognised by The420.in along with Noida-
based NGO Root64 Infosec Research Foundation as CQ100 women as a result of
a pan-India online survey to acknowledge the efforts of women who have made a
difference in the online world and made the digital world safer.

Awards

  • Most Active Speaker 2023

Managing Sensitive Data with Microsoft Purview Compliance Portal: A Practical Guide

As organizations increasingly rely on data to drive business decisions, managing sensitive data has become a critical task. Microsoft Purview is a powerful compliance portal that can help organizations manage their sensitive data effectively. In this talk, we will discuss a practical guide on how to use Microsoft Purview to manage sensitive data.

Managing Identities and secure access with GCP Security

Identity and access management (generally referred to as IAM) is the practice of granting the right individuals access to the right resources for the right reasons. This talk will discuss the general practice for IAM including corporate identities, customer identities, service identities, granting access to google services, applications and resources. The participants will be able to understand the provisioning and managing identities users and groups. In addition, will also be able to understand enabling secure authentication to services and workloads.

Managing Identities and secure access with GCP Security

Identity and access management (generally referred to as IAM) is the practice of granting the right individuals access to the right resources for the right reasons. This talk will discuss the general practice for IAM including corporate identities, customer identities, service identities, granting access to google services, applications and resources. The participants will be able to understand the provisioning and managing identities users and groups. In addition, will also be able to understand enabling secure authentication to services and workloads.

Manage Privileged access assignment to Users and Groups with Azure AD PIM

As per the current scenario when attackers are gaining access with help of simple social engineering techniques. It is very important to understand the importance of Just Enough Access, Just in Time access. The privileged roles which are assigned to Identities should be managed in such a way that they will be assigned to the right person, for the right duration and for the right resources. This will automatically govern the access assigned to identities and the attack surface will be reduced. In this session we will be discussing Privileged Identity Management service with Azure AD to manage, approve and assign privileged roles to identities and privileged access groups. Azure portal will be used to demonstrate.

Outcome: Importance of JEA and JIT, PIM Service, Privileged access group creation and role assignments

"Securing Microsoft Metaverse: Challenges and Solutions"

This topic would examine the unique security challenges that come with Microsoft Metaverse, the company's new virtual reality platform. Find below subtopics of the session:

1. Understanding the potential security risks associated with using Microsoft Metaverse, including data breaches, identity theft, and cyber attacks
2. Best practices for securing personal and sensitive data within the Metaverse, such as user profiles and transaction histories
The role of encryption and access control in securing Metaverse transactions and communications
3. Techniques for preventing unauthorized access and preventing identity fraud in the Metaverse
4. The importance of regularly auditing and updating security protocols within the Metaverse to stay ahead of emerging threats
5. The role of machine learning and artificial intelligence in enhancing security within the Metaverse
6. The legal and regulatory considerations associated with securing the Metaverse, including GDPR and CCPA compliance

Defender Cloud Security Posture Management (CSPM)

Cloud Security Posture Management (CSPM) is a market segment for IT security tools that are designed to identify misconfiguration issues and compliance risks in the cloud. An important purpose of CSPM programming is to continuously monitor cloud infrastructure for gaps in security policy enforcement. Microsoft Defender for Cloud is a Cloud Security Posture Management (CSPM) and Cloud Workload Protection Platform (CWPP) for all of your Azure, on-premises, and multicloud (Amazon AWS and Google GCP) resources. Defender for Cloud fills three vital needs as you manage the security of your resources and workloads in the cloud and on-premises. This talk will demonstrate the features of Defender of Cloud and it's recommendations.

Discover & Investigate your applications with Microsoft Defender for Cloud Applications

As an organization, you need to protect your users and confidential data from the different methods employed by malicious actors. In general, defender for cloud application help you do this by providing a wide array of capabilities that protect your environment across the following pillars:
Visibility: detect all cloud services; assign each a risk ranking; identify all users and third-party apps able to log in
Data security: identify and control sensitive information (DLP);
Threat protection: offer adaptive access control (AAC); mitigate malware
Compliance: supply reports and dashboards to demonstrate cloud governance; assist efforts to conform to data residency and regulatory compliance requirements

Security Compliance and Identity Management

With the ever growing importance of security in IT infrastructure, this talk focus on the products and methodologies used for securing Microsoft technologies. This talk will serve as the introduction for audience to Microsoft security and the various tools at their disposal as an admin.

The capabilities of Microsoft Identity and Access y

Azure Active Directory is the tool for identity and access management in the Microsoft Cloud. In this session will discuss about Azure AD services and identity principals, secure authentication, access management capabilities, as well as identity protection and governance. Azure portal will be used for demonstration.

Know your Data and secure it

In this session I will be discussing about Data security and tools. Why knowing organization data and classifying that data is necessary for implementing security? Why data security is important for all sectors? How we can protect organization / personal data? About CIS Control 10 which is Data Recovery Capabilities.

Security Compliance and Identity Management

With the ever growing importance of security in IT infrastructure, this talk focus on the products and methodologies used for securing Microsoft technologies. This talk will serve as the introduction for audience to Microsoft security and the various tools at their disposal as an admin.

Cloud Privileged Identity Management

Privileged Identity Management (PIM) is a service in Azure Active Directory (Azure AD) that enables you to manage, control, and monitor access to important resources in your organization. These resources include resources in Azure AD, Azure, and other Microsoft Online Services such as Microsoft 365 or Microsoft Intune.

Cloud Identity Governance

Azure Active Directory (Azure AD) Identity Governance allows you to balance your organization's need for security and employee productivity with the right processes and visibility. It provides you with capabilities to ensure that the right people have the right access to the right resources. These and related Azure AD and Enterprise Mobility + Security features allows you to mitigate access risk by protecting, monitoring, and auditing access to critical assets -- while ensuring employee and business partner productivity.

Dr. Abhilasha Vyas

Business Unit Head Cloud Security and BI, CloudThat

Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.

Jump to top