Speaker

Uros Babic

Uros Babic

Security Architect at Crayon, Microsoft Security MVP, MCT

Belgrade, Serbia

Actions

Graduate electrical engineer, currently employed in Crayon Serbia as Security Architect , Microsoft Security MVP, MCT, Keynote Speaker

Area of Expertise

  • Information & Communications Technology

Incident Management and Threat Hunting in Microsoft Unified Security Operations

Microsoft’s Unified Security Operations platform integrates several powerful tools to enhance incident detection, response and threat hunting. This platform combines Microsoft Sentinel and Microsoft Defender XDR with Security Copilot to provide a comprehensive security solution.

Defender External Attack Surface Management

Microsoft Defender External Attack Surface Management (Defender EASM) continuously discovers and maps your digital attack surface to provide an external view of your online infrastructure. This visibility enables security and IT teams to identify unknowns, prioritize risk, eliminate threats, and extend vulnerability and exposure control beyond the firewall.

Incident Detection and Response in Microsoft Unified Security Operations

Microsoft’s Unified Security Operations platform integrates several powerful tools to enhance incident detection and response. This platform combines Microsoft Sentinel and Microsoft Defender XDR with Security Copilot to provide a comprehensive security solution.

Azure DDoS Protection simulation training

It’s a good practice to test your assumptions about how your services respond to an attack by conducting periodic simulations:
- Validate how Azure DDoS Protection helps protect your Azure resources from DDoS attacks.
- Optimize your incident response process while under DDoS attack.
- Document DDoS compliance.
- Train your network security teams.

Azure Network Security

Azure offers a comprehensive suite of network security services to protect your applications and cloud workloads from cyberattacks
Agenda:
- Hub and Spoke topology with Azure
- Network Security Groups (NSG)
- Application Security Groups
-Service Endpoints
- Private Endpoints
- Azure Application Gateway
- Web Application Firewall
- Azure Front Door
- ExpressRoute
- Azure Firewall
- Azure DDoS protection

Unifying XDR, SIEM and Security Copilot in Security Opertions

In the rapidly evolving world of cybersecurity, the role of artificial intelligence (AI) is becoming increasingly important. With the sheer volume and complexity of threats, a holistic approach to cybersecurity is necessary, and AI is proving to be a crucial element in detecting and fighting against advanced attacks.
Now Microsoft Defender, XDR, Microsoft Sentinel, and Microsoft Security Copilot are available as a unified experience, all your alerts, incidents, playbooks, and policies in one place with more AI, more automation, and an unparalleled view of emerging threats enriching it all. One dashboard to manage defenses. A single portal for threat investigation, detection, and response. A single command center built on a common data model to help you manage your SOC and work faster. One place to investigate all incidents. Making incident triage more straightforward, investigation more seamless and insights more holistic. One place to search and hunt for threats across all data. Simplified with help from Security Copilot, translating natural language to KQL. Copilot is generating all the queries, and these are, and you need to know KQL now.
During this session, Microsoft Security MVP, MCT Uros Babic will be speaking about the future of cybersecurity incident response with AI. Real stories incident investigations with Microsoft Defender XDR, Sentinel and Security Copilot will be presented.

Driving Microsoft’s transformation with Data and AI

Get started with Azure AI Services
2. Azure AI services
Azure Machine L earning
 Cognitive Services
Azure OpenAl Services
3. Microsoft Copilot
4. AI for Security
5. Al Shared responsibility model
6. Accelerate cloud-native app innovation with Azure and Al

Manage Identity and Access in Microsoft Entra ID

Entra ID is the core of any secure solution you will build on Azure. You need to know verify who is accessing your systems, what they have access to, and monitor how they are using your solutions

How to collect data from Azure virtual machine with Azure Monitor, Defender for Cloud and Sentinel

how to collect data from an Azure virtual machine with Azure Monitor, Defender for Cloud and Azure Sentinel based on threat detection and incident response

How to Forensic Investigate Security Incidents in Microsoft Azure

When a security incident is detected on the Azure cloud platform, forensic investigators must examine the log data collected from various sources. If a VM is found to be affected, it is important to take a snapshot of the OS disk of the VM for further investigation. This ssession discusses the forensic acquisition methodology of an Azure VM and discusses an assumed scenario to divide the whole process into multiple steps

Active Directory Incident Response and Remediation in Microsoft Azure

Azure AD incident response explores how Azure AD investigates, manages and responds cybersecurity incidents. It involves skills, knowledge and experience with best practices to protect Azure Active Directory on day to day IR operations, remediation techniques and describes Azure AD incident response - life cycle, proces and tools.

Festive Tech Calendar 2024 Sessionize Event

December 2024

Azure User Group Sweden User group Sessionize Event

October 2024

Cyber Back to School Sessionize Event

October 2024

Azure Back to School 2024 Sessionize Event

September 2024

Gimme-Cloud-Talks-Global-Azure-2024 Sessionize Event

April 2024

Festive Tech Calendar 2023 Sessionize Event

December 2023

Microsoft Azure Serbia Meetup Group User group Sessionize Event

November 2023

Azure Back to School 2023 Sessionize Event

September 2023

Gimme-Cloud-Talks-Global-Azure-2023 Sessionize Event

May 2023

Uros Babic

Security Architect at Crayon, Microsoft Security MVP, MCT

Belgrade, Serbia

Actions

Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.

Jump to top