{"id":3875,"date":"2016-11-09T10:30:36","date_gmt":"2016-11-09T15:30:36","guid":{"rendered":"https:\/\/blogs.msdn.microsoft.com\/azuregov\/?p=3875"},"modified":"2016-11-09T10:30:36","modified_gmt":"2016-11-09T15:30:36","slug":"join-us-cybersecurity-best-practices-for-cloud-in-government-nov-16-in-dc","status":"publish","type":"post","link":"https:\/\/devblogs.microsoft.com\/azuregov\/join-us-cybersecurity-best-practices-for-cloud-in-government-nov-16-in-dc\/","title":{"rendered":"Join us: Cybersecurity Best Practices for Cloud in Government &#8212; Nov. 16 in DC"},"content":{"rendered":"<p><a href=\"https:\/\/devblogs.microsoft.com\/azuregov\/\"><img decoding=\"async\" width=\"249\" height=\"187\" class=\"aligncenter wp-image-3885\" alt=\"open-source-meetup-1\" src=\"https:\/\/devblogs.microsoft.com\/wp-content\/uploads\/sites\/43\/2019\/03\/Open-Source-Meetup-1.jpg\" \/><\/a><a href=\"https:\/\/devblogs.microsoft.com\/azuregov\/join-us-internet-of-things-at-dc-azure-gov-meetup-oct-26\/open-source-meetup-1\/\"><\/a><\/p>\n<p><span>With billions of connected devices, our digital life is more convenient than ever. But those devices also create opportunities for attackers to move quickly from an initial breach to a major loss; and it can happen within minutes.\u00a0<\/span><span>\u00a0<\/span><\/p>\n<p>Join us for the <a target=\"_blank\" href=\"https:\/\/aka.ms\/ku7fht\">Microsoft Azure Government DC Meetup<\/a> on Wednesday, Nov. 16 starting at 6 pm. as we discuss <em>Cybersecurity Best Practices for Cloud in Government<\/em> at <a target=\"_blank\" href=\"http:\/\/www.1776.vc\/\">1776 in Washington DC<\/a>.<\/p>\n<p><span lang=\"EN\"><span>Hear from cybersecurity subject matter experts Capt. Matthew &#8220;Tux, Weiner, Cyber Weapons and Tactics, on <\/span><em>Using the Cloud to Train Cyber Ninjas<\/em>;<span> and Jason Norton of the Microsoft Threat Intelligence Center on <\/span><em>Data-driven Cybersecurity<\/em>.<\/span><\/p>\n<p><span lang=\"EN\"><span>Capt. Weiner will discuss how\u00a0implementing cyber training or any training in the cloud can be challenging. He will provide\u00a0an overview on implementation and lessons learned from building systems, cloud access and user interaction. <\/span><\/span><\/p>\n<p><span lang=\"EN\"><span>Jason\u00a0will discuss how Microsoft\u2019s signal supports a data-driven model of cybersecurity to speed up detection time and reduce risks. This includes:<\/span><\/span><span lang=\"EN\"><span>\u00a0<\/span><\/span><\/p>\n<ul>\n<li><span>How Microsoft uses data and analytics to help secure your organization<\/span><span>\u00a0<\/span><\/li>\n<li><span>How machine learning and human intelligence help to detect advanced cyber attacks<\/span><span>\u00a0<\/span><\/li>\n<li><span>How behavioral analysis helps organizations stay one step ahead<\/span><span>\u00a0<\/span><\/li>\n<\/ul>\n<p><span>For more information and to RSVP to join us for this engaging discussion on cybersecurity along with great networking, pizza and beverages, please visit the <\/span><a target=\"_blank\" href=\"https:\/\/aka.ms\/ku7fht\"><span>DC Azure Government Meetup site<\/span><\/a><span>.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>With billions of connected devices, our digital life is more convenient than ever. But those devices also create opportunities for attackers to move quickly from an initial breach to a major loss; and it can happen within minutes.\u00a0\u00a0 Join us for the Microsoft Azure Government DC Meetup on Wednesday, Nov. 16 starting at 6 pm. [&hellip;]<\/p>\n","protected":false},"author":2054,"featured_media":3145,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2,9],"tags":[],"class_list":["post-3875","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-announcements","category-events"],"acf":[],"blog_post_summary":"<p>With billions of connected devices, our digital life is more convenient than ever. But those devices also create opportunities for attackers to move quickly from an initial breach to a major loss; and it can happen within minutes.\u00a0\u00a0 Join us for the Microsoft Azure Government DC Meetup on Wednesday, Nov. 16 starting at 6 pm. [&hellip;]<\/p>\n","_links":{"self":[{"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/posts\/3875","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/users\/2054"}],"replies":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/comments?post=3875"}],"version-history":[{"count":0,"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/posts\/3875\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/media?parent=3875"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/categories?post=3875"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/tags?post=3875"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}