Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Throw MS Defender into Overdrive with LimaCharlie

Looking for a fast, powerful, and easy way to get more control and performance out of Microsoft Defender? LimaCharlie has what you need. Chris Botelho, Senior Solutions Engineer at LimaCharlie, hosted a live walkthrough of our new MS Defender Endpoint Protection extension. Chris demonstrated how our SecOps Cloud Platform enhances MS Defender by providing: Defender Check: Instantly query Windows machines to verify the presence of an active Defender instance.

Security Team's Secret: How to Make Everyone Love You! #cybersecurity #securityteam

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

A Real Example of Copilot Exposing Sensitive Data

Is Microsoft Copilot putting your sensitive data at risk? AI tools like Copilot can unintentionally expose sensitive information through indirect queries leading to data leaks, insider threats, and compliance risks. In this webinar, we break down real-world examples of how over-permissioned access and prompt manipulation can bypass security controls and what you can do to prevent it. Stay ahead of AI-driven threats.

EDR, DFIR and Endpoint Triage with Brian Carrier

Brian Carrier, CEO of Sleuth Kit Labs, joined Defender Fridays to discuss EDR, DFIR and Endpoint Triage. We explored how SOCs can effectively investigate endpoints after alerts to decide whether to wipe it or call an IR team. Brian covered leveraging EDR data and additional forensic artifacts for better Endpoint Triage, helping teams cut through the overwhelming amount of information to make informed response decisions.

Top Use Cases & Trends in Machine & Workload Identity

Speakers: As infrastructure becomes increasingly automated, the systems that deploy, manage, and scale it—CI/CD pipelines, service agents, orchestration tools—rely on a growing class of non-human identities (NHIs). These machine actors often operate with persistent credentials, excessive privileges, and limited visibility—leaving critical trust gaps in modern environments. This session explores three high-impact use cases where addressing NHI is both urgent and achievable.