Yuri Diogenes, M.S. Cybersecurity
Keller, Texas, United States
23K followers
500+ connections
Articles by Yuri
Activity
-
🎄✨Feliz Natal! ✨🎄 Neste período de reflexão e celebração, quero destacar a importância desta rede para mim, como forma de apoio aos projetos da…
🎄✨Feliz Natal! ✨🎄 Neste período de reflexão e celebração, quero destacar a importância desta rede para mim, como forma de apoio aos projetos da…
Liked by Yuri Diogenes, M.S. Cybersecurity
-
Encerramos a semana com o encontro Conexão Ti Bradesco. Gratidão por fazer parte deste grande time e desta transformação! À medida que nos…
Encerramos a semana com o encontro Conexão Ti Bradesco. Gratidão por fazer parte deste grande time e desta transformação! À medida que nos…
Liked by Yuri Diogenes, M.S. Cybersecurity
-
Great time at the Ratio party last night. The Dude, aka Jeff Rose, was mixing up the right amount of holiday cheer. 😁 Thanks for the invite.
Great time at the Ratio party last night. The Dude, aka Jeff Rose, was mixing up the right amount of holiday cheer. 😁 Thanks for the invite.
Liked by Yuri Diogenes, M.S. Cybersecurity
Experience
Education
Licenses & Certifications
Publications
-
Building a Career in Cybersecurity: The Strategy and Skills You Need to Succeed
Pearson
Cybersecurity is one of the world’s fastest growing, most exciting fields--but that doesn’t mean it’s easy to enter the industry and succeed. Now there’s a complete guide to creating a great cybersecurity career, whether you’re migrating to cybersecurity from another field or already a cybersecurity professional.
Building a Career in Cybersecurity doesn’t teach detailed technical skills you can get from a thousand books and videos. Instead, Yuri Diogenes focuses on make-or-break…Cybersecurity is one of the world’s fastest growing, most exciting fields--but that doesn’t mean it’s easy to enter the industry and succeed. Now there’s a complete guide to creating a great cybersecurity career, whether you’re migrating to cybersecurity from another field or already a cybersecurity professional.
Building a Career in Cybersecurity doesn’t teach detailed technical skills you can get from a thousand books and videos. Instead, Yuri Diogenes focuses on make-or-break knowledge you won’t find elsewhere: personal strategy, planning, process, mindset, and the critical “soft skills” today’s employers are desperate to find. -
Exam Ref SC-900 Microsoft Security, Compliance, and Identity Fundamentals
Microsoft Press
Exam Ref SC-900 Microsoft Security Fundamentals offers professional-level preparation that helps candidates maximize their exam performance and sharpen their skills on the job. It focuses on the specific areas of expertise modern IT professionals need to demonstrate real-world mastery of how Microsoft Azure and Microsoft 365 security, compliance, and identity solutions can provide holistic, end-to-end solutions.
Other authorsSee publication -
Exam Ref SC-200 Microsoft Security Operations Analyst
Microsoft Press
Prepare for Microsoft Exam SC-200and help demonstrate your real-world mastery of skills and knowledge required to work with stakeholders to secure IT systems, and to rapidly remediate active attacks. Designed for Windows administrators, Exam Ref focuses on the critical thinking and decision-making acumen needed for success at the Microsoft Certified Associate level.
Other authorsSee publication -
Microsoft Azure Security Center (IT Best Practices - Microsoft Press) 3rd Edition
Microsoft Press
Extensively revised for updates through spring 2021 this guide will help you safeguard cloud and hybrid environments at scale. Two Azure Security Center insiders help you apply Microsoft’s powerful new components and capabilities to improve protection, detection, and response in key operational scenarios. You’ll learn how to secure any workload, respond to new threat vectors, and address issues ranging from policies to risk management.
Other authorsSee publication -
Exam Ref AZ-500 Microsoft Azure Security Technologies
Microsoft Press
Demonstrate your real-world knowledge of Microsoft Azure security, including tools and techniques for protecting identity, access, platforms, data, and applications, and for effectively managing security operations. Designed for professionals with Azure security experience, this Exam Ref focuses on the critical thinking and decision-making acumen needed for success at the Microsoft Certified: Azure Security Engineer Associate level.
Other authorsSee publication -
Azure Sentinel
Microsoft Press
Microsoft’s cloud-based Azure Sentinel helps you fully leverage advanced AI to automate threat identification and response – without the complexity and scalability challenges of traditional Security Information and Event Management (SIEM) solutions. Now, three of Microsoft’s leading experts review all it can do, and guide you step by step through planning, deployment, and daily operations. Leveraging in-the-trenches experience supporting early customers, they cover everything from configuration…
Microsoft’s cloud-based Azure Sentinel helps you fully leverage advanced AI to automate threat identification and response – without the complexity and scalability challenges of traditional Security Information and Event Management (SIEM) solutions. Now, three of Microsoft’s leading experts review all it can do, and guide you step by step through planning, deployment, and daily operations. Leveraging in-the-trenches experience supporting early customers, they cover everything from configuration to data ingestion, rule development to incident management… even proactive threat hunting to disrupt attacks before you’re exploited.
Other authorsSee publication -
Cybersecurity – Attack and Defense Strategies: Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals, 2nd Edition
Packt
Cybersecurity – Attack and Defense Strategies, Second Edition is a completely revised new edition of the bestselling book, covering the very latest security threats and defense mechanisms including a detailed overview of Cloud Security Posture Management (CSPM) and an assessment of the current threat landscape, with additional focus on new IoT threats and cryptomining.
Cybersecurity starts with the basics that organizations need to know to maintain a secure posture against outside threat and…Cybersecurity – Attack and Defense Strategies, Second Edition is a completely revised new edition of the bestselling book, covering the very latest security threats and defense mechanisms including a detailed overview of Cloud Security Posture Management (CSPM) and an assessment of the current threat landscape, with additional focus on new IoT threats and cryptomining.
Cybersecurity starts with the basics that organizations need to know to maintain a secure posture against outside threat and design a robust cybersecurity program. It takes you into the mindset of a Threat Actor to help you better understand the motivation and the steps of performing an actual attack – the Cybersecurity kill chain. You will gain hands-on experience in implementing cybersecurity using new techniques in reconnaissance and chasing a user’s identity that will enable you to discover how a system is compromised, and identify and then exploit the vulnerabilities in your own system.
This book also focuses on defense strategies to enhance the security of a system. You will also discover in-depth tools, including Azure Sentinel, to ensure there are security controls in each network layer, and how to carry out the recovery process of a compromised system.Other authorsSee publication -
Azure Security Center - Second Edition
Microsoft Press
Reflecting updates through mid-2019, this book presents comprehensive Azure Security Center techniques for safeguarding cloud and hybrid environments. Leading Microsoft security and cloud experts Yuri Diogenes and Dr. Thomas Shinder help you apply Azure Security Center’s robust protection, detection, and response capabilities in key operational scenarios. You’ll walk through securing any Azure workload, and optimizing key facets of modern security, from policies and identity to incident…
Reflecting updates through mid-2019, this book presents comprehensive Azure Security Center techniques for safeguarding cloud and hybrid environments. Leading Microsoft security and cloud experts Yuri Diogenes and Dr. Thomas Shinder help you apply Azure Security Center’s robust protection, detection, and response capabilities in key operational scenarios. You’ll walk through securing any Azure workload, and optimizing key facets of modern security, from policies and identity to incident response and risk management. Brand-new coverage includes single-click remediation, IoT, improved container security, Azure Sentinel, and more. Whatever your security role, you’ll learn how to save hours, days, or even weeks by solving problems in the most efficient and reliable ways possible.
Other authorsSee publication -
The Quest for Visibility and Control in the Cloud
ISSA Journal
Although cloud security has evolved over the years and it is becoming more mature, the endless journey to obtain the right level of visibility and control over the cloud workloads is still a challenge for many companies. From companies that are still in process to migrate to the cloud, to companies that are already building their infrastructure entirely in the cloud, the governance of cloud workloads can be difficult if not approached correctly, and using the right tools. In addition to that…
Although cloud security has evolved over the years and it is becoming more mature, the endless journey to obtain the right level of visibility and control over the cloud workloads is still a challenge for many companies. From companies that are still in process to migrate to the cloud, to companies that are already building their infrastructure entirely in the cloud, the governance of cloud workloads can be difficult if not approached correctly, and using the right tools. In addition to that, companies that need to adhere to certain compliance standards, must understand the current security controls around their workloads and how it maps to the standards that they need to be compliant. This article will cover important considerations regarding cloud security visibility and control.
-
Holistic Approach to Enhance your Security Posture
ISSA Journal
Organizations can’t rely on protection only, they need to enhance their detection, with the intent to reduce the gap between the initial attack and the sub sequential compromise of a resource. Once a threat is detected, organizations must be ready to quickly respond, and reduce the potential damage for the environment. This article will cover important considerations when planning to apply a holistic approach to enhance your overall security posture.
-
Certificação de Analista em Segurança Cibernética CSA+ Preparatório para o Exame COMPTIA CS0-001
Editora Nova Terra
Este livro tem como objetivo preparar o leitor para o exame de certificação CSA+ CS0-001, cobrindo os tópicos requisitados na prova. Apesar de o livro ter como foco a preparação para a certificação CompTIA CSA+, ele também poderá ser usado como referência para assuntos relacionados com segurança cibernética. Para mais informações sobre a pertinência dessa certificação dentro da carreira de certificações de segurança da CompTIA, visite o site…
Este livro tem como objetivo preparar o leitor para o exame de certificação CSA+ CS0-001, cobrindo os tópicos requisitados na prova. Apesar de o livro ter como foco a preparação para a certificação CompTIA CSA+, ele também poderá ser usado como referência para assuntos relacionados com segurança cibernética. Para mais informações sobre a pertinência dessa certificação dentro da carreira de certificações de segurança da CompTIA, visite o site https://certification.comptia.org/certifications/cybersecurity-analyst.
-
Embrancing Cloud Computing to Enhance Your Overall Security Posture
ISSA Journal
While many CSOs will be skeptical to lead their cloud computing adoption using security as the main motivation factor, this approach could help companies identify business opportunities and find gaps in the current on-premises security infrastructure that could be mitigate by cloud security capabilities.
-
Social Media Impact - Is it Possible to be Social and Secure?
ISSA Journal
This article covers the current state of social media threats and give guidance on how to be social while increasing your online security.
-
Enterprise Mobility from App Management to Threat Mitigation: Beyond BYOD
Microsoft Press
Yuri Diogenes, Jeff Gilbert and Robert Mazzoli show how to leverage Microsoft Intune's powerful capabilities to manage application mobility based on your organization's specific requirements. You'll also learn how to take full advantage of the Mobile Device Management (MDM) capabilities now built into Microsoft Office 365, and how to protect on-premises resources with Microsoft Advanced Threat Analytics (ATA), a key component of Microsoft's Enterprise Mobility Suite.
Other authorsSee publication -
Alcance o seu Melhor
Editora Novaterra
O livro apresenta um guia organizado que tem como intuito lhe auxiliar a transformar um sonho em realidade sem sacrificar outras áreas da sua vida. Estudos mostram que saúde pessoal afeta diretamente seu bem estar como profissional e vice-versa. A queda de um leva o outro a sofrer as consequências, assim como quando um está elevado o outro é igualmente beneficiado. Portanto, Alcance seu Melhor entra nos detalhes de como estabelecer um objetivo, criar um plano de ação, encontrar um sistema que…
O livro apresenta um guia organizado que tem como intuito lhe auxiliar a transformar um sonho em realidade sem sacrificar outras áreas da sua vida. Estudos mostram que saúde pessoal afeta diretamente seu bem estar como profissional e vice-versa. A queda de um leva o outro a sofrer as consequências, assim como quando um está elevado o outro é igualmente beneficiado. Portanto, Alcance seu Melhor entra nos detalhes de como estabelecer um objetivo, criar um plano de ação, encontrar um sistema que lhe forneça suporte e recomeçar o ciclo, passando para objetivos maiores e mais ambiciosos.
Other authorsSee publication -
Information Security Career Path
ISSA Journal
The author discusses key decision points regarding an information security career, the options
available, and how to succeed in this field. -
Mobile Device Management Design Considerations Guide
Microsoft TechNet
With all of the different design and configuration options for mobile device management (MDM), it’s difficult to determine which combination will best meet the needs of your organization. This design considerations guide will help you to understand mobile device management design requirements and will detail a series of steps and tasks that you can follow to design a solution that best fits the business and technology needs for your organization. Throughout the steps and tasks, this guide will…
With all of the different design and configuration options for mobile device management (MDM), it’s difficult to determine which combination will best meet the needs of your organization. This design considerations guide will help you to understand mobile device management design requirements and will detail a series of steps and tasks that you can follow to design a solution that best fits the business and technology needs for your organization. Throughout the steps and tasks, this guide will present the relevant technologies and feature options available to organizations to meet functional and service quality (such as availability, scalability, performance, manageability, and security) level requirements.
Other authorsSee publication -
Certificação Security+ da Prática para o exame SYO-401 (PT-BR)
Editora Nova Terra
Essa é a Terceira Edição do livro de Certificação Security+ agora cobrindo o exame 401
Other authorsSee publication -
Ready, Set, Achieve! A Guide to Taking Charge of Your Life, Creating Balance and Achieving Your Goals
Morgan James Publishing
When charging after a goal, most people act like a bull in an arena, focusing solely on the swinging red flag in the bullfighter’s hands and forgetting about the rest of the surrounding area and neighboring responsibilities. Ready, Set, Achieve! presents an organized guide to turning a dream into reality without sacrificing achievements in other areas of life. Studies have shown that personal health directly affects professional well-being and vice versa. As one decreases, the other suffers…
When charging after a goal, most people act like a bull in an arena, focusing solely on the swinging red flag in the bullfighter’s hands and forgetting about the rest of the surrounding area and neighboring responsibilities. Ready, Set, Achieve! presents an organized guide to turning a dream into reality without sacrificing achievements in other areas of life. Studies have shown that personal health directly affects professional well-being and vice versa. As one decreases, the other suffers. Conversely, as one increases, the other rises as well. By learning how to effectively and evenly pull the strings of both aspects of life and avoiding a collision of priorities, all goals can be reached with less stress and better health. Press release: http://www.morganjamespublishing.com/news/story/a-well-rounded-approach-to-success
Other authors -
Certificação Cloud Essentials
Editora Novaterra
A Certificação CompTIA Cloud Essentials é fundamental para qualquer profissional de tecnologia da informação interessado em aprender os conceitos, padrões, práticas e o impacto no negócio decorrente da adoção da computação em nuvem. Essa certificação permitirá que o profissional entenda as características da computação em nuvem e como uma empresa pode tirar proveito desta tecnologia para fins de aprimoramento do negócio.
Other authorsSee publication -
Bring Your Own Device (BYOD) Design Considerations Guide
Microsoft
This guide provides the system architect and system designer with a collection of critical design considerations that need to be addressed before designing a Bring Your Own Device (BYOD) infrastructure that enables employees to use their own devices and protects the company’s data.
-
Sidebar for the Introducing Windows Azure Book
Microsoft Press
Wrote a sidebar for this book explaining how implement a Hybrid IT with Windows Azure site-to-site VPN (page 58).
-
Certificação Security+ — Da Prática ao Exame SY0-301 Segunda Edição
Editora Novaterra
-
Windows Server 2012 Security from End to Edge and Beyond: Architecting, Designing, Planning, and Deploying Windows Server 2012 Security Solutions
Syngress
The book covers security technologies that apply to both client and server and enables you to identify and deploy Windows 8 security features in your systems based on different business and deployment scenarios. The book provides a single source where you can learn how to secure Windows 8 in many systems, including core, endpoint and anywhere access.
Tom Shinder and Yuri Diogenes are both Microsoft employees who bring you insider knowledge of the Windows 8 platform. They discuss Windows…The book covers security technologies that apply to both client and server and enables you to identify and deploy Windows 8 security features in your systems based on different business and deployment scenarios. The book provides a single source where you can learn how to secure Windows 8 in many systems, including core, endpoint and anywhere access.
Tom Shinder and Yuri Diogenes are both Microsoft employees who bring you insider knowledge of the Windows 8 platform. They discuss Windows security technologies and how you can deploy them effectively in both the traditional datacenter and in new cloud-based solutions. When you finish the book, you will understand the conceptual underpinnings of Windows 8 security and how to deploy these features first in a Test Lab and then in pilot and production environments.
Other authorsSee publication -
Certificação Security+ — Da Prática ao Exame SY0-301
Novaterra Editora
Certificação Security+ — Da Prática Para o Exame SY0-301 tem como objetivo preparar o leitor para o exame de certificação, cobrindo os conceitos requisitados e trazendo uma visão prática da implementação destes conceitos em um ambiente real. Como a segurança da informação deixou de ser assunto apenas para especialistas, esta obra, além de material de apoio para o exame, também serve como referência prática para implementação e tomada de decisões sobre o aspecto de segurança da informação.
Other authorsSee publication -
Deploying Microsoft® Forefront® Protection 2010 for Exchange Server
Microsoft Press
This book is targeted at information technology professionals, security consultants and firewall administrators who wish to design, develop and implement the Microsoft Forefront security products on their Microsoft and heterogeneous networks.
Other authorsSee publication -
Deploying Microsoft® Forefront® Threat Management Gateway 2010
Microsoft Press
This book is targeted at information technology professionals, security consultants and firewall administrators who wish to design, develop and implement the Microsoft Forefront security products on their Microsoft and heterogeneous networks.
Other authorsSee publication -
Deploying Microsoft® Forefront® Unified Access Gateway 2010
Microsoft Press
This book is targeted at information technology professionals, security consultants and firewall administrators who wish to design, develop and implement the Microsoft Forefront security products on their Microsoft and heterogeneous networks.
Other authorsSee publication -
Microsoft® Forefront™ Threat Management Gateway (TMG) Administrator's Companion
Microsoft Press
The comprehensive, one-volume guide to deploying and managing Microsoft® Forefront® TMG for Web security, network perimeter security, and application security.
Other authorsSee publication -
Azure Security Infrastructure
Microsoft Press
Cloud computing offers compelling benefits, but many companies remain concerned about security and compliance in environments they don't physically control. In response, Microsoft has introduced comprehensive tools for enforcing, managing, and verifying robust security on its Azure cloud platform. In Azure Security Infrastructure, two leading experts show how to plan, deploy, and operate Microsoft Azure at the highest levels of control, security, and compliance. Yuri Diogenes and Dr. Thomas…
Cloud computing offers compelling benefits, but many companies remain concerned about security and compliance in environments they don't physically control. In response, Microsoft has introduced comprehensive tools for enforcing, managing, and verifying robust security on its Azure cloud platform. In Azure Security Infrastructure, two leading experts show how to plan, deploy, and operate Microsoft Azure at the highest levels of control, security, and compliance. Yuri Diogenes and Dr. Thomas Shinder help you prepare your infrastructure with Microsoft's integrated tools, pre-built templates, and managed services -- and use these to quickly build and safely manage any enterprise, mobile, Web, or Internet of Things (IoT) system. You'll walk through protecting your cloud environment at the physical, network, host, application, and data layers, so all your online services are resilient to attack. The authors guide you through implementing and continuously improving security-aware deployment, operational management, and threat mitigation practices, to protect all your services and data in the cloud
Other authorsSee publication -
Cybersecurity: Attack and Defense Strategies
Packt Publisher
The book will start with the initial Incident Response process, moving to Red Team tactics, where you will learn the basic syntax for commonly used Windows and Linux tools to perform the necessary operations. You will also gain hands-on experience of using the new red team techniques with powerful tools like python and PowerShell which will enable you to find out vulnerabilities in your system and mediums to exploit them. Moving on, you will learn how to compromise a system, hack the user’s…
The book will start with the initial Incident Response process, moving to Red Team tactics, where you will learn the basic syntax for commonly used Windows and Linux tools to perform the necessary operations. You will also gain hands-on experience of using the new red team techniques with powerful tools like python and PowerShell which will enable you to find out vulnerabilities in your system and mediums to exploit them. Moving on, you will learn how to compromise a system, hack the user’s identity, and the various tools used by the red team to find vulnerabilities in a system.
In the next section, you will learn about the defense strategies followed by the blue team to enhance the overall security of a system. You will also learn about an in depth strategy to ensure that there are security controls in each network layer and ways in which you can carry out the recovery process of a compromised system. Finally, you will learn how to create a vulnerability management strategy and the different techniques for manual log analysis.
By the end of this book, you will be well-versed with Red and Blue team techniques and will learn military grade security aspects of attacking and defending a system.Other authorsSee publication -
Enterprise Mobility Suite - Managing BYOD and Company-Owned Devices
Microsoft Press
Enterprise Mobility Suite - Managing BYOD and Company-Owned Devices is the first authoritative, scenario-based guide to enabling your mobile workforce. Two expert Microsoft authors introduce Microsoft's breakthrough Enterprise Mobility Suite, and demonstrate how to use it as your single solution for mobile device management of all leading smartphone and tablet platforms: Windows, iOS, and Android.
Other authors -
Exam Ref SC-900 Microsoft Security, Compliance, and Identity Fundamentals
Microsoft Press
Organizes its coverage by exam objectives
Features strategic, what-if scenarios to challenge you
Assumes you are a business user, stakeholder, consultant, professional, or student who wants to create holistic, end-to-end solutions with Microsoft security, compliance, and identity technologiesOther authorsSee publication -
Microsoft Defender for Cloud
Microsoft Press
Microsoft Defender for Cloud, formerly Azure Security Center, has evolved into one of the world's most widely-used Cloud Security Posture Management (CSPM) environments and Cloud Workload Protection Platforms (CWPP). The name change reflects Microsoft's powerful commitment to multi-cloud environmentsjust part of major recent advances in the product. Protecting workloads running in Azure, hybrid, and other cloud platforms, as well as on premises, it offers comprehensive tools for hardening…
Microsoft Defender for Cloud, formerly Azure Security Center, has evolved into one of the world's most widely-used Cloud Security Posture Management (CSPM) environments and Cloud Workload Protection Platforms (CWPP). The name change reflects Microsoft's powerful commitment to multi-cloud environmentsjust part of major recent advances in the product. Protecting workloads running in Azure, hybrid, and other cloud platforms, as well as on premises, it offers comprehensive tools for hardening resources, tracking security posture, protecting against cyberattacks, and streamlining security managementall in one natively integrated toolset.
Leading Microsoft Azure experts Yuri Diogenes and Tom Janetscheck help you apply Defender for Cloud's robust protection, detection, and response capabilities in key operational scenarios. Reflecting updates through mid-2022, it shows how to take full advantage of recently introduced components, feature enhancements, and deployment scenarios, as you address today's latest threat vectors. Diogenes and Janetscheck walk you through securing any Azure workload, and strengthening security in everything from policies and identity to incident response and risk management.Other authorsSee publication
Courses
-
(ISC)2 CISSP CBK Review Seminar
-
-
BlueHat Security Conference (v12, v15 and v16)
-
-
Cyber Incident Analysis and Response
-
-
Escalation Engineer Academy
-
-
Intelligent Application Gateway (IAG) 2007
-
-
Introduction to C++
-
-
MITRE ATT&CK Defender (MAD) ATTAC&K Cyber Threat Intelligence Certification Training
-
-
Microsoft Exchange Admin Troubleshooting
-
-
Microsoft Exchange Transport Troubleshooting
-
-
Microsoft Windows Cluster Internship
-
-
Microsoft Windows Server 2008 - Networking
-
-
Microsoft Windows XP SP2 Troubleshooting
-
-
Network Assurance
-
-
TakeDownCon Hacking Conference
-
-
TakeDownCon Hacking Conference 2012
-
-
Technical Leadership Program
-
-
User Mode Debug
-
Projects
-
Speaker at the Cybercrime Forum Europe 2018
Delivered two presentations:
Day 1 (10/29/2018): Incident Response in the Cloud with Azure Security Center
Day 2 (10/30/2018): Enhancing your Security Posture to Combat Cybercrime
-
Presentation at Microsoft Ready Vegas 2018: Post breach investigation using Azure Security Center
Threat actors are using different techniques to compromise systems, and once they are inside the network they will continue their attack campaign until total domain dominance. Security Center uses a variety of advanced memory forensic techniques to identify malware that persists only in memory and is not detected via traditional means. In this presentation you will learn how Security Center detect attacks across the cyber kill gain, learn more about new capabilities such as Fileless Attack…
Threat actors are using different techniques to compromise systems, and once they are inside the network they will continue their attack campaign until total domain dominance. Security Center uses a variety of advanced memory forensic techniques to identify malware that persists only in memory and is not detected via traditional means. In this presentation you will learn how Security Center detect attacks across the cyber kill gain, learn more about new capabilities such as Fileless Attack Detection, and how Microsoft Threat Intelligence Center uses Security Center to improve the security state of our customers.
Other creatorsSee project -
Breakout session at Ignite 2017
Respond quickly to threats with next-generation security operation, and investigation
Other creatorsSee project -
Presentation at TechRead24: Post breach investigation using Azure Security Center
Do you know what you don’t know? That’s probably one intrigue question when the subject is information security. How do you know if your virtual machine located in Azure is not being used by a malicious command and control on the web? By using Azure Security Center you can investigate post breach activities to identity the type of attack, where the attack came from and how the vulnerability was exploited. In this presentation we will demonstrate how to use Security Alerts, Security Incidents…
Do you know what you don’t know? That’s probably one intrigue question when the subject is information security. How do you know if your virtual machine located in Azure is not being used by a malicious command and control on the web? By using Azure Security Center you can investigate post breach activities to identity the type of attack, where the attack came from and how the vulnerability was exploited. In this presentation we will demonstrate how to use Security Alerts, Security Incidents and Threat Reports to help you during a post breach investigation.
Other creators -
Presentation at TechReady24: Investigating Security Issues with OMS Security & Audit Solution
How secure is your posture today? One imperative aspect of a solid secure poster is how well you detect security incidents and how you leverage the information that was obtained during this detection to rapidly respond. By leveraging OMS security capabilities for investigation purpose, you can explore the data that was collected by OMS while leveraging Microsoft Security Intelligence to identity cyber-attacks and potential actors. In this presentation we will demonstrate two investigation…
How secure is your posture today? One imperative aspect of a solid secure poster is how well you detect security incidents and how you leverage the information that was obtained during this detection to rapidly respond. By leveraging OMS security capabilities for investigation purpose, you can explore the data that was collected by OMS while leveraging Microsoft Security Intelligence to identity cyber-attacks and potential actors. In this presentation we will demonstrate two investigation scenarios using OMS and walk through the steps to identity the root cause of the issue. This session is designed to help you understand how to leverage OMS for investigation purpose, to assist you during key conversations with customers that need a stronger secure posture by enhancing their detection capability with OMS Security. You should walk away with good understanding of how to effectively have a technical cybersecurity conversation with your customers and help them understand the breadth and depth of OMS, expertise and experience that Microsoft brings to the table.
-
Enterprise Security Bootcamp
If you look across the Microsoft platform stack, we have security technologies built into our core platforms like Windows, Azure, and Office 365. Then we extend those core capabilities with security technologies that work across the platforms like Advanced Threat Analytics, which watches for risky behavior in your identity system, and Cloud App Security that can monitor and control behavior across not only Microsoft cloud apps, but also [thousands/hundreds] of 3rd party SaaS apps. In this…
If you look across the Microsoft platform stack, we have security technologies built into our core platforms like Windows, Azure, and Office 365. Then we extend those core capabilities with security technologies that work across the platforms like Advanced Threat Analytics, which watches for risky behavior in your identity system, and Cloud App Security that can monitor and control behavior across not only Microsoft cloud apps, but also [thousands/hundreds] of 3rd party SaaS apps. In this presentation, you will learn more about Microsoft security end to end story, from cloud to datacenter, including Azure Security Center and OMS. This bootcamp contains demos and labs that will help you to apply some of the security concepts in a real-world environment.
-
Monitoring Your Hybrid Environment with OMS Security - Microsoft Virtual Academy (MVA)
Get the details on security challenges for IT operations and how the OMS Security and Audit solution can help you to overcome those challenges. Take a look at important deployment considerations for OMS Security agents, along with general considerations for OMS Security adoption. Plus, leverage Microsoft security intelligence to help you identify suspicious activities in your environment, and find out how to use notable issues to investigate alerts.
-
Breakout session at Ignite 2016: Mitigate datacenter security threats with guided investigation using Operations Management Suite
A demo of the security capabilities in Microsoft Operations Management Suite that enable you to identify security threats and attacks. Learn how to leverage Operations Management Suite for an Incident Response scenario.
-
Presentation at TechReady 23 - Leveraging Azure Security Center for Incident Response
When a security incident does happen, you will need to ensure that its impact is minimized by limiting breach expansion and ejecting the attacker. By leveraging Azure Security Center in multiple phases of your Incident Response plan you can identify security issues, minimize the damage and rapidly respond to an incident. In this presentation we will demonstrate how to incorporate Azure Security Center as part of your IR plan and demonstrate how to identify potential breaches and take proper…
When a security incident does happen, you will need to ensure that its impact is minimized by limiting breach expansion and ejecting the attacker. By leveraging Azure Security Center in multiple phases of your Incident Response plan you can identify security issues, minimize the damage and rapidly respond to an incident. In this presentation we will demonstrate how to incorporate Azure Security Center as part of your IR plan and demonstrate how to identify potential breaches and take proper action to mitigate the threat.
Other creators -
Enterprise Mobility Suite: Beyond "Bring Your Own Device" - Microsoft Virtual Academy
You have seen, experienced, and learned about Enterprise Mobility Suite (EMS) and Bring Your Own Device (BYOD). Are you ready to take your learning to the next level? Get an in-depth look at the supporting services and infrastructure to further implement, manage, and protect your technology assets through on-premises and user-owned technologies and devices.
In this demo-rich course, learn the basics of Advanced Threat Analytics (ATA), including what it does and how it works. Explore ATA…You have seen, experienced, and learned about Enterprise Mobility Suite (EMS) and Bring Your Own Device (BYOD). Are you ready to take your learning to the next level? Get an in-depth look at the supporting services and infrastructure to further implement, manage, and protect your technology assets through on-premises and user-owned technologies and devices.
In this demo-rich course, learn the basics of Advanced Threat Analytics (ATA), including what it does and how it works. Explore ATA architecture, see how to enhance your mobility infrastructure, and look at ways to configure, deploy, and implement ATA. Plus, examine ATA threat detection and get troubleshooting tips, in this EMS training course. -
Azure Security Center Public Preview Documentation
Member of the documentation team responsible for publishing content for Azure Security Center Public Preview. Azure Security Center helps your prevent, detect, and respond to threats with increased visibility into and control over the security of your Azure resources.
Other creatorsSee project -
Enterprise Mobility Poster
This poster was created to help customers to understand the Microsoft Enterprise Mobility solution and how it integrates with your environment, your users and your on-premises infrastructure. It also shows key capabilities of each pillar of the solution: identity, devices, apps, and data.
Other creatorsSee project -
Microsoft Ignite 2015
Microsoft Cloud and Enterprise Documentation Booth coordinator and co-speaker for the Enterprise Mobility All Up Architecture session.
-
Getting Started with Windows Server Security
Technical reviewer for this Windows Server Security book.
-
Microsoft Virtual Academy - Enterprise Mobility Suite (PT-BR)
This course has three modules that will cover the reasons companies are embracing mobility, how to deal with BYOD challenges and how to use Microsoft Enterprise Mobility Suite to address those challenges and implement a mobile workforce. This course is only available in Portuguese (Brazil).
-
Hacker Halted 2014
Presented the session: Avoiding the “Walking Dead” Scenario during BYOD Adoption
Users are bringing their own devices to the company regardless of the IT is ready to support or not. They are demanding access to corporate resources and the capability to work from anywhere using the device of their choices. There are many risks involved in the BYOD scenario so you must plan to embrace it securely. This session will cover core scenarios of invasion by unauthorized employees that are…Presented the session: Avoiding the “Walking Dead” Scenario during BYOD Adoption
Users are bringing their own devices to the company regardless of the IT is ready to support or not. They are demanding access to corporate resources and the capability to work from anywhere using the device of their choices. There are many risks involved in the BYOD scenario so you must plan to embrace it securely. This session will cover core scenarios of invasion by unauthorized employees that are bringing their own devices and what IT/Sec should do to design a BYOD strategy that works.Other creatorsSee project -
Microsoft TechEd North America 2014
Speaker for one breakout session and shared PM responsibilities with Thomas Shinder for the Architecture track.
Other creatorsSee project -
Presentation at Microsoft CSO Council Fall 2013
Presentation was about the following topic: Understanding Microsoft’s BYOD Strategy to Enable Device Management, Secure Access and Protection.
Other creators -
Microsoft TechEd Europe 2013
Speaker for one breakout session and shared PM responsibilities with Thomas Shinder for the Architecture Track.
Other creatorsSee project -
Microsoft TechEd North America 2013
Speaker for two breakout sessions and shared PM responsibilities with Tom Shinder for the Architecture Track.
Other creatorsSee project -
Microsoft TechEd North America 2012
Speaker for two breakout sessions and shared PM responsibilities with Thomas Shinder for the Architecture Track.
Other creatorsSee project -
Network Monitor Wizard - NetWiz
Acted as Program Manager for the development of this tool. Writing the spec of the tool, functionalities and testing the capabilities.
-
High Speed Network - ATM
Implementation of a 155 Mbps backbone in the main secretariats of the State Government, in the Administrative Campus and linking to others government agencies using Frame Relay. More information about this project see this recommendation letter: http://www.yuridiogenes.com.br/PDF/Rigav_letter.pdf
-
Exchange Migration at Metalic
Migration of Microsoft Windows NT for Windows 2000 with Active Directory and Exchange 5.5 for Exchange 2000. More information about this project see this recommendation letter: http://www.yuridiogenes.com.br/PDF/Metalic_Letter.pdf
-
Telemar
Windows Administrator in an environment using Microsoft Backoffice products. The environment had 1.500 local workstations, 500 remote workstations and 20 servers. More information about this project see this recommendation letter: http://www.yuridiogenes.com.br/PDF/Telemar_Letter.pdf
-
Security Talk Show
-
Acted as a Host for the Security Talk show where Thomas and I used to interview Security specialists from Microsoft and also MVPs. The Security Talk Show was active from May 2011 to December 2013.
Other creatorsSee project
Honors & Awards
-
Global CIO Forum USA Edition Award of Cybersecurity Influencer of the Year 2023
Global CISO Forum
https://twitter.com/GlobalCISO/status/1699485000658231553?s=20
-
Marquis Who's Who for Leadership Strengths in Cybersecurity and Education
Marquis Who's Who in America
Press release information https://www.24-7pressrelease.com/press-release/503598/yuri-diogenes-recognized-by-marquis-whos-who-for-leadership-strengths-in-cybersecurity-and-education
-
EC-Council University Faculty of the Year Award 2019
EC-Council University
-
Microsoft Better Togehter Award
Microsoft
On behalf of the SI Leadership team, a huge thank you for your excellent achievement!
In FY20, we continue to give recognition to extraordinary individuals and teams who went above and beyond to deliver value through collaboration and partnership. We are truly grateful for your spirit, it was a key factor in driving synergy and success for SI, Microsoft Services and the company.
This is the true essence of #BetterTogether and we should all be proud of what we achieved in Q1…On behalf of the SI Leadership team, a huge thank you for your excellent achievement!
In FY20, we continue to give recognition to extraordinary individuals and teams who went above and beyond to deliver value through collaboration and partnership. We are truly grateful for your spirit, it was a key factor in driving synergy and success for SI, Microsoft Services and the company.
This is the true essence of #BetterTogether and we should all be proud of what we achieved in Q1. Congratulations to all Q1’s #bettertogether award winners!
Post: https://www.linkedin.com/feed/update/urn:li:activity:6595417114125877249/ -
EC-Council University Faculty of the Year Award 2018
EC-Council University
Award announcement:
"Congratulations Yuri! On behalf of the President of EC-Council University, I would like to inform you that you have been selected this year's EC-Council University’s Faculty Award for Authorship. Congratulations on this achievement! For this award, a faculty member is selected from among those eligible based on professional development, research, and publications. In addition, the faculty member selected should demonstrate a passion for cyber security studies and shows…Award announcement:
"Congratulations Yuri! On behalf of the President of EC-Council University, I would like to inform you that you have been selected this year's EC-Council University’s Faculty Award for Authorship. Congratulations on this achievement! For this award, a faculty member is selected from among those eligible based on professional development, research, and publications. In addition, the faculty member selected should demonstrate a passion for cyber security studies and shows a positive attitude toward students and program peers. You have met and surpassed these criteria and you have clearly demonstrated the outstanding qualities we look for in our faculty recipients of this award." -
BookAuthority's best books of all time!
https://bookauthority.org/award/Cybersecurity/1788475291
Cybersecurity - Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics
By Yuri Diogenes, Erdal Ozkaya ranked number 2 out of 34 Best Network Security Books of All Time. https://bookauthority.org/books/best-network-security-books -
Top Cybersecurity Professors on Twitter
https://www.onlineeducation.com/features/connected-cybersecurity-professors-on-twitter
Cybersecurity professors can have a range of expertise, from architecture, maintenance, and administration to forensic investigation of secure networked systems, a type of infrastructure (with a corresponding set of policies) increasingly necessary for safe operation of governments, businesses, nonprofits and educational institutions of all sizes. Following these socially connected cybersecurity professors on Twitter will shine a light on various career opportunities in information security…
Cybersecurity professors can have a range of expertise, from architecture, maintenance, and administration to forensic investigation of secure networked systems, a type of infrastructure (with a corresponding set of policies) increasingly necessary for safe operation of governments, businesses, nonprofits and educational institutions of all sizes. Following these socially connected cybersecurity professors on Twitter will shine a light on various career opportunities in information security along with several threats experts are trying to address, and the solutions they’re discovering.
-
Annual Threat Scenario Bounty Award
Microsoft
"Your nomination has been approved because you have identified a scenario which may put Microsoft at risk and provided us an opportunity to remediate such a threat. You have certainly set the benchmark for other teams to achieve."
-
Senior ISSA Member
ISSA Fort Worth Chapter
Congratulations! After reviewing your credentials, your application for ISSA Senior Member has been approved. ISSA thanks you for your contributions to the security community and sustained membership in the association. You will be presented a certificate by your ISSA chapter at an upcoming chapter meeting to be determined by your chapter leadership. Once again, thank you for your dedication to ISSA and to the security community.
Complete list of Senior members available here:…Congratulations! After reviewing your credentials, your application for ISSA Senior Member has been approved. ISSA thanks you for your contributions to the security community and sustained membership in the association. You will be presented a certificate by your ISSA chapter at an upcoming chapter meeting to be determined by your chapter leadership. Once again, thank you for your dedication to ISSA and to the security community.
Complete list of Senior members available here: http://www.issa.org/?page=fellowprogram -
Ship It Award - Windows Server 2012 R2
Microsoft
Ship It Award for shipping Windows Server 2012 R2
-
Ship It Award - Windows Server 2012
Microsoft
Ship It Award for shipping Windows Server 2012
-
Q4 CPE Champion Award
Microsoft
On behalf of the Customer Service and Support organization, I would like to extend my personal congratulations to you as a recipient of a Q4 CPE Champion Award.
I’d like to share a bit about why you were chosen for this award:
- Wrote and co-authored blogs, TechNet articles and Whitepaper.
- Translated personal learning into training for other Microsoft employees.
- Recently received approval to co-author MS Press book.
Thank you for ensuring that the voice of the…On behalf of the Customer Service and Support organization, I would like to extend my personal congratulations to you as a recipient of a Q4 CPE Champion Award.
I’d like to share a bit about why you were chosen for this award:
- Wrote and co-authored blogs, TechNet articles and Whitepaper.
- Translated personal learning into training for other Microsoft employees.
- Recently received approval to co-author MS Press book.
Thank you for ensuring that the voice of the customer is heard. Your work has contributed significantly to earning satisfaction and building loyalty among customers and partners.
-
Excellence Award
Dell
Excellence Award for the excellent performance and for go beyond the expectation on the job duty - July 2005.
-
Gold Award
Dell
Gold Award for the best Customer Satisfaction metric (NOS Team) in the Second Quarter (Q2 2005).
Languages
-
Portuguese
Native or bilingual proficiency
-
English
Native or bilingual proficiency
-
Spanish
Limited working proficiency
Organizations
-
Cloud Security Alliance Brazil
Contributor
- PresentMore information about the membership here (in Portuguese): https://chapters.cloudsecurityalliance.org/brazil/2012/06/20/eleicao-na-cloud-security-alliance-brasil/
-
ISSA
Senior Member
- Present
Recommendations received
27 people have recommended Yuri
Join now to viewMore activity by Yuri
-
View my verified achievement from Pearson Accelerated Pathways.
View my verified achievement from Pearson Accelerated Pathways.
Liked by Yuri Diogenes, M.S. Cybersecurity
-
🎉 Finalizo 2024 com imensa alegria e compartilho o resultado do processo seletivo da Escola Superior de Guerra (ESG) para o CAEPE 2025 (Curso de…
🎉 Finalizo 2024 com imensa alegria e compartilho o resultado do processo seletivo da Escola Superior de Guerra (ESG) para o CAEPE 2025 (Curso de…
Liked by Yuri Diogenes, M.S. Cybersecurity
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More