Yuri Diogenes, M.S. Cybersecurity

Yuri Diogenes, M.S. Cybersecurity

Keller, Texas, United States
23K followers 500+ connections

Articles by Yuri

Activity

Join now to see all activity

Experience

  • Utica University Graphic
  • -

  • -

    Texas, United States

  • -

  • -

  • -

  • -

    Online Class

  • -

    Irving, TX

  • -

    Irving, Texas

  • -

    Irving, Texas

  • -

    Irving, Texas

  • -

    Irving, Texas

  • -

    Round Rock, Texas

  • -

    Irving, Texas

  • -

    Fortaleza Area, Brazil

  • -

    Fortaleza Area, Brazil

  • -

    Fortaleza Area, Brazil

  • -

    Fortaleza Area, Brazil

  • -

    Fortaleza Area, Brazil

  • -

    Fortaleza Area, Brazil

Education

Licenses & Certifications

Publications

  • Building a Career in Cybersecurity: The Strategy and Skills You Need to Succeed

    Pearson

    Cybersecurity is one of the world’s fastest growing, most exciting fields--but that doesn’t mean it’s easy to enter the industry and succeed. Now there’s a complete guide to creating a great cybersecurity career, whether you’re migrating to cybersecurity from another field or already a cybersecurity professional.



    Building a Career in Cybersecurity doesn’t teach detailed technical skills you can get from a thousand books and videos. Instead, Yuri Diogenes focuses on make-or-break…

    Cybersecurity is one of the world’s fastest growing, most exciting fields--but that doesn’t mean it’s easy to enter the industry and succeed. Now there’s a complete guide to creating a great cybersecurity career, whether you’re migrating to cybersecurity from another field or already a cybersecurity professional.



    Building a Career in Cybersecurity doesn’t teach detailed technical skills you can get from a thousand books and videos. Instead, Yuri Diogenes focuses on make-or-break knowledge you won’t find elsewhere: personal strategy, planning, process, mindset, and the critical “soft skills” today’s employers are desperate to find.

    See publication
  • Microsoft Defender for Cloud

    Microsoft Press

    Other authors
    See publication
  • Exam Ref SC-900 Microsoft Security, Compliance, and Identity Fundamentals

    Microsoft Press

    Exam Ref SC-900 Microsoft Security Fundamentals offers professional-level preparation that helps candidates maximize their exam performance and sharpen their skills on the job. It focuses on the specific areas of expertise modern IT professionals need to demonstrate real-world mastery of how Microsoft Azure and Microsoft 365 security, compliance, and identity solutions can provide holistic, end-to-end solutions.

    Other authors
    See publication
  • Exam Ref SC-200 Microsoft Security Operations Analyst

    Microsoft Press

    Prepare for Microsoft Exam SC-200and help demonstrate your real-world mastery of skills and knowledge required to work with stakeholders to secure IT systems, and to rapidly remediate active attacks. Designed for Windows administrators, Exam Ref focuses on the critical thinking and decision-making acumen needed for success at the Microsoft Certified Associate level.

    Other authors
    See publication
  • Microsoft Azure Security Center (IT Best Practices - Microsoft Press) 3rd Edition

    Microsoft Press

    Extensively revised for updates through spring 2021 this guide will help you safeguard cloud and hybrid environments at scale. Two Azure Security Center insiders help you apply Microsoft’s powerful new components and capabilities to improve protection, detection, and response in key operational scenarios. You’ll learn how to secure any workload, respond to new threat vectors, and address issues ranging from policies to risk management.

    Other authors
    See publication
  • Exam Ref AZ-500 Microsoft Azure Security Technologies

    Microsoft Press

    Demonstrate your real-world knowledge of Microsoft Azure security, including tools and techniques for protecting identity, access, platforms, data, and applications, and for effectively managing security operations. Designed for professionals with Azure security experience, this Exam Ref focuses on the critical thinking and decision-making acumen needed for success at the Microsoft Certified: Azure Security Engineer Associate level.

    Other authors
    See publication
  • Azure Sentinel

    Microsoft Press

    Microsoft’s cloud-based Azure Sentinel helps you fully leverage advanced AI to automate threat identification and response – without the complexity and scalability challenges of traditional Security Information and Event Management (SIEM) solutions. Now, three of Microsoft’s leading experts review all it can do, and guide you step by step through planning, deployment, and daily operations. Leveraging in-the-trenches experience supporting early customers, they cover everything from configuration…

    Microsoft’s cloud-based Azure Sentinel helps you fully leverage advanced AI to automate threat identification and response – without the complexity and scalability challenges of traditional Security Information and Event Management (SIEM) solutions. Now, three of Microsoft’s leading experts review all it can do, and guide you step by step through planning, deployment, and daily operations. Leveraging in-the-trenches experience supporting early customers, they cover everything from configuration to data ingestion, rule development to incident management… even proactive threat hunting to disrupt attacks before you’re exploited.

    Other authors
    See publication
  • Cybersecurity – Attack and Defense Strategies: Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals, 2nd Edition

    Packt

    Cybersecurity – Attack and Defense Strategies, Second Edition is a completely revised new edition of the bestselling book, covering the very latest security threats and defense mechanisms including a detailed overview of Cloud Security Posture Management (CSPM) and an assessment of the current threat landscape, with additional focus on new IoT threats and cryptomining.
    Cybersecurity starts with the basics that organizations need to know to maintain a secure posture against outside threat and…

    Cybersecurity – Attack and Defense Strategies, Second Edition is a completely revised new edition of the bestselling book, covering the very latest security threats and defense mechanisms including a detailed overview of Cloud Security Posture Management (CSPM) and an assessment of the current threat landscape, with additional focus on new IoT threats and cryptomining.
    Cybersecurity starts with the basics that organizations need to know to maintain a secure posture against outside threat and design a robust cybersecurity program. It takes you into the mindset of a Threat Actor to help you better understand the motivation and the steps of performing an actual attack – the Cybersecurity kill chain. You will gain hands-on experience in implementing cybersecurity using new techniques in reconnaissance and chasing a user’s identity that will enable you to discover how a system is compromised, and identify and then exploit the vulnerabilities in your own system.
    This book also focuses on defense strategies to enhance the security of a system. You will also discover in-depth tools, including Azure Sentinel, to ensure there are security controls in each network layer, and how to carry out the recovery process of a compromised system.

    Other authors
    See publication
  • Azure Security Center - Second Edition

    Microsoft Press

    Reflecting updates through mid-2019, this book presents comprehensive Azure Security Center techniques for safeguarding cloud and hybrid environments. Leading Microsoft security and cloud experts Yuri Diogenes and Dr. Thomas Shinder help you apply Azure Security Center’s robust protection, detection, and response capabilities in key operational scenarios. You’ll walk through securing any Azure workload, and optimizing key facets of modern security, from policies and identity to incident…

    Reflecting updates through mid-2019, this book presents comprehensive Azure Security Center techniques for safeguarding cloud and hybrid environments. Leading Microsoft security and cloud experts Yuri Diogenes and Dr. Thomas Shinder help you apply Azure Security Center’s robust protection, detection, and response capabilities in key operational scenarios. You’ll walk through securing any Azure workload, and optimizing key facets of modern security, from policies and identity to incident response and risk management. Brand-new coverage includes single-click remediation, IoT, improved container security, Azure Sentinel, and more. Whatever your security role, you’ll learn how to save hours, days, or even weeks by solving problems in the most efficient and reliable ways possible.

    Other authors
    See publication
  • The Quest for Visibility and Control in the Cloud

    ISSA Journal

    Although cloud security has evolved over the years and it is becoming more mature, the endless journey to obtain the right level of visibility and control over the cloud workloads is still a challenge for many companies. From companies that are still in process to migrate to the cloud, to companies that are already building their infrastructure entirely in the cloud, the governance of cloud workloads can be difficult if not approached correctly, and using the right tools. In addition to that…

    Although cloud security has evolved over the years and it is becoming more mature, the endless journey to obtain the right level of visibility and control over the cloud workloads is still a challenge for many companies. From companies that are still in process to migrate to the cloud, to companies that are already building their infrastructure entirely in the cloud, the governance of cloud workloads can be difficult if not approached correctly, and using the right tools. In addition to that, companies that need to adhere to certain compliance standards, must understand the current security controls around their workloads and how it maps to the standards that they need to be compliant. This article will cover important considerations regarding cloud security visibility and control.

    See publication
  • Holistic Approach to Enhance your Security Posture

    ISSA Journal

    Organizations can’t rely on protection only, they need to enhance their detection, with the intent to reduce the gap between the initial attack and the sub sequential compromise of a resource. Once a threat is detected, organizations must be ready to quickly respond, and reduce the potential damage for the environment. This article will cover important considerations when planning to apply a holistic approach to enhance your overall security posture.

    See publication
  • Certificação de Analista em Segurança Cibernética CSA+ Preparatório para o Exame COMPTIA CS0-001

    Editora Nova Terra

    Este livro tem como objetivo preparar o leitor para o exame de certificação CSA+ CS0-001, cobrindo os tópicos requisitados na prova. Apesar de o livro ter como foco a preparação para a certificação CompTIA CSA+, ele também poderá ser usado como referência para assuntos relacionados com segurança cibernética. Para mais informações sobre a pertinência dessa certificação dentro da carreira de certificações de segurança da CompTIA, visite o site…

    Este livro tem como objetivo preparar o leitor para o exame de certificação CSA+ CS0-001, cobrindo os tópicos requisitados na prova. Apesar de o livro ter como foco a preparação para a certificação CompTIA CSA+, ele também poderá ser usado como referência para assuntos relacionados com segurança cibernética. Para mais informações sobre a pertinência dessa certificação dentro da carreira de certificações de segurança da CompTIA, visite o site https://certification.comptia.org/certifications/cybersecurity-analyst.

    See publication
  • Embrancing Cloud Computing to Enhance Your Overall Security Posture

    ISSA Journal

    While many CSOs will be skeptical to lead their cloud computing adoption using security as the main motivation factor, this approach could help companies identify business opportunities and find gaps in the current on-premises security infrastructure that could be mitigate by cloud security capabilities.

    See publication
  • Social Media Impact - Is it Possible to be Social and Secure?

    ISSA Journal

    This article covers the current state of social media threats and give guidance on how to be social while increasing your online security.

    See publication
  • Enterprise Mobility from App Management to Threat Mitigation: Beyond BYOD

    Microsoft Press

    Yuri Diogenes, Jeff Gilbert and Robert Mazzoli show how to leverage Microsoft Intune's powerful capabilities to manage application mobility based on your organization's specific requirements. You'll also learn how to take full advantage of the Mobile Device Management (MDM) capabilities now built into Microsoft Office 365, and how to protect on-premises resources with Microsoft Advanced Threat Analytics (ATA), a key component of Microsoft's Enterprise Mobility Suite.

    Other authors
    See publication
  • Alcance o seu Melhor

    Editora Novaterra

    O livro apresenta um guia organizado que tem como intuito lhe auxiliar a transformar um sonho em realidade sem sacrificar outras áreas da sua vida. Estudos mostram que saúde pessoal afeta diretamente seu bem estar como profissional e vice-versa. A queda de um leva o outro a sofrer as consequências, assim como quando um está elevado o outro é igualmente beneficiado. Portanto, Alcance seu Melhor entra nos detalhes de como estabelecer um objetivo, criar um plano de ação, encontrar um sistema que…

    O livro apresenta um guia organizado que tem como intuito lhe auxiliar a transformar um sonho em realidade sem sacrificar outras áreas da sua vida. Estudos mostram que saúde pessoal afeta diretamente seu bem estar como profissional e vice-versa. A queda de um leva o outro a sofrer as consequências, assim como quando um está elevado o outro é igualmente beneficiado. Portanto, Alcance seu Melhor entra nos detalhes de como estabelecer um objetivo, criar um plano de ação, encontrar um sistema que lhe forneça suporte e recomeçar o ciclo, passando para objetivos maiores e mais ambiciosos.

    Other authors
    See publication
  • Information Security Career Path

    ISSA Journal

    The author discusses key decision points regarding an information security career, the options
    available, and how to succeed in this field.

    See publication
  • Mobile Device Management Design Considerations Guide

    Microsoft TechNet

    With all of the different design and configuration options for mobile device management (MDM), it’s difficult to determine which combination will best meet the needs of your organization. This design considerations guide will help you to understand mobile device management design requirements and will detail a series of steps and tasks that you can follow to design a solution that best fits the business and technology needs for your organization. Throughout the steps and tasks, this guide will…

    With all of the different design and configuration options for mobile device management (MDM), it’s difficult to determine which combination will best meet the needs of your organization. This design considerations guide will help you to understand mobile device management design requirements and will detail a series of steps and tasks that you can follow to design a solution that best fits the business and technology needs for your organization. Throughout the steps and tasks, this guide will present the relevant technologies and feature options available to organizations to meet functional and service quality (such as availability, scalability, performance, manageability, and security) level requirements.

    Other authors
    See publication
  • Certificação Security+ da Prática para o exame SYO-401 (PT-BR)

    Editora Nova Terra

    Essa é a Terceira Edição do livro de Certificação Security+ agora cobrindo o exame 401

    Other authors
    See publication
  • Ready, Set, Achieve! A Guide to Taking Charge of Your Life, Creating Balance and Achieving Your Goals

    Morgan James Publishing

    When charging after a goal, most people act like a bull in an arena, focusing solely on the swinging red flag in the bullfighter’s hands and forgetting about the rest of the surrounding area and neighboring responsibilities. Ready, Set, Achieve! presents an organized guide to turning a dream into reality without sacrificing achievements in other areas of life. Studies have shown that personal health directly affects professional well-being and vice versa. As one decreases, the other suffers…

    When charging after a goal, most people act like a bull in an arena, focusing solely on the swinging red flag in the bullfighter’s hands and forgetting about the rest of the surrounding area and neighboring responsibilities. Ready, Set, Achieve! presents an organized guide to turning a dream into reality without sacrificing achievements in other areas of life. Studies have shown that personal health directly affects professional well-being and vice versa. As one decreases, the other suffers. Conversely, as one increases, the other rises as well. By learning how to effectively and evenly pull the strings of both aspects of life and avoiding a collision of priorities, all goals can be reached with less stress and better health. Press release: http://www.morganjamespublishing.com/news/story/a-well-rounded-approach-to-success

    Other authors
    • Jodi Miller
    See publication
  • Certificação Cloud Essentials

    Editora Novaterra

    A Certificação CompTIA Cloud Essentials é fundamental para qualquer profissional de tecnologia da informação interessado em aprender os conceitos, padrões, práticas e o impacto no negócio decorrente da adoção da computação em nuvem. Essa certificação permitirá que o profissional entenda as características da computação em nuvem e como uma empresa pode tirar proveito desta tecnologia para fins de aprimoramento do negócio.

    Other authors
    See publication
  • Bring Your Own Device (BYOD) Design Considerations Guide

    Microsoft

    This guide provides the system architect and system designer with a collection of critical design considerations that need to be addressed before designing a Bring Your Own Device (BYOD) infrastructure that enables employees to use their own devices and protects the company’s data.

    See publication
  • Sidebar for the Introducing Windows Azure Book

    Microsoft Press

    Wrote a sidebar for this book explaining how implement a Hybrid IT with Windows Azure site-to-site VPN (page 58).

    See publication
  • Windows Server 2012 Security from End to Edge and Beyond: Architecting, Designing, Planning, and Deploying Windows Server 2012 Security Solutions

    Syngress

    The book covers security technologies that apply to both client and server and enables you to identify and deploy Windows 8 security features in your systems based on different business and deployment scenarios. The book provides a single source where you can learn how to secure Windows 8 in many systems, including core, endpoint and anywhere access.

    Tom Shinder and Yuri Diogenes are both Microsoft employees who bring you insider knowledge of the Windows 8 platform. They discuss Windows…

    The book covers security technologies that apply to both client and server and enables you to identify and deploy Windows 8 security features in your systems based on different business and deployment scenarios. The book provides a single source where you can learn how to secure Windows 8 in many systems, including core, endpoint and anywhere access.

    Tom Shinder and Yuri Diogenes are both Microsoft employees who bring you insider knowledge of the Windows 8 platform. They discuss Windows security technologies and how you can deploy them effectively in both the traditional datacenter and in new cloud-based solutions. When you finish the book, you will understand the conceptual underpinnings of Windows 8 security and how to deploy these features first in a Test Lab and then in pilot and production environments.

    Other authors
    See publication
  • Certificação Security+ — Da Prática ao Exame SY0-301

    Novaterra Editora

    Certificação Security+ — Da Prática Para o Exame SY0-301 tem como objetivo preparar o leitor para o exame de certificação, cobrindo os conceitos requisitados e trazendo uma visão prática da implementação destes conceitos em um ambiente real. Como a segurança da informação deixou de ser assunto apenas para especialistas, esta obra, além de material de apoio para o exame, também serve como referência prática para implementação e tomada de decisões sobre o aspecto de segurança da informação.

    Other authors
    See publication
  • Deploying Microsoft® Forefront® Protection 2010 for Exchange Server

    Microsoft Press

    This book is targeted at information technology professionals, security consultants and firewall administrators who wish to design, develop and implement the Microsoft Forefront security products on their Microsoft and heterogeneous networks.

    Other authors
    See publication
  • Deploying Microsoft® Forefront® Threat Management Gateway 2010

    Microsoft Press

    This book is targeted at information technology professionals, security consultants and firewall administrators who wish to design, develop and implement the Microsoft Forefront security products on their Microsoft and heterogeneous networks.

    Other authors
    See publication
  • Deploying Microsoft® Forefront® Unified Access Gateway 2010

    Microsoft Press

    This book is targeted at information technology professionals, security consultants and firewall administrators who wish to design, develop and implement the Microsoft Forefront security products on their Microsoft and heterogeneous networks.

    Other authors
    See publication
  • Microsoft® Forefront™ Threat Management Gateway (TMG) Administrator's Companion

    Microsoft Press

    The comprehensive, one-volume guide to deploying and managing Microsoft® Forefront® TMG for Web security, network perimeter security, and application security.

    Other authors
    See publication
  • Azure Security Infrastructure

    Microsoft Press

    Cloud computing offers compelling benefits, but many companies remain concerned about security and compliance in environments they don't physically control. In response, Microsoft has introduced comprehensive tools for enforcing, managing, and verifying robust security on its Azure cloud platform. In Azure Security Infrastructure, two leading experts show how to plan, deploy, and operate Microsoft Azure at the highest levels of control, security, and compliance. Yuri Diogenes and Dr. Thomas…

    Cloud computing offers compelling benefits, but many companies remain concerned about security and compliance in environments they don't physically control. In response, Microsoft has introduced comprehensive tools for enforcing, managing, and verifying robust security on its Azure cloud platform. In Azure Security Infrastructure, two leading experts show how to plan, deploy, and operate Microsoft Azure at the highest levels of control, security, and compliance. Yuri Diogenes and Dr. Thomas Shinder help you prepare your infrastructure with Microsoft's integrated tools, pre-built templates, and managed services -- and use these to quickly build and safely manage any enterprise, mobile, Web, or Internet of Things (IoT) system. You'll walk through protecting your cloud environment at the physical, network, host, application, and data layers, so all your online services are resilient to attack. The authors guide you through implementing and continuously improving security-aware deployment, operational management, and threat mitigation practices, to protect all your services and data in the cloud

    Other authors
    See publication
  • Cybersecurity: Attack and Defense Strategies

    Packt Publisher

    The book will start with the initial Incident Response process, moving to Red Team tactics, where you will learn the basic syntax for commonly used Windows and Linux tools to perform the necessary operations. You will also gain hands-on experience of using the new red team techniques with powerful tools like python and PowerShell which will enable you to find out vulnerabilities in your system and mediums to exploit them. Moving on, you will learn how to compromise a system, hack the user’s…

    The book will start with the initial Incident Response process, moving to Red Team tactics, where you will learn the basic syntax for commonly used Windows and Linux tools to perform the necessary operations. You will also gain hands-on experience of using the new red team techniques with powerful tools like python and PowerShell which will enable you to find out vulnerabilities in your system and mediums to exploit them. Moving on, you will learn how to compromise a system, hack the user’s identity, and the various tools used by the red team to find vulnerabilities in a system.
    In the next section, you will learn about the defense strategies followed by the blue team to enhance the overall security of a system. You will also learn about an in depth strategy to ensure that there are security controls in each network layer and ways in which you can carry out the recovery process of a compromised system. Finally, you will learn how to create a vulnerability management strategy and the different techniques for manual log analysis.
    By the end of this book, you will be well-versed with Red and Blue team techniques and will learn military grade security aspects of attacking and defending a system.

    Other authors
    See publication
  • Enterprise Mobility Suite - Managing BYOD and Company-Owned Devices

    Microsoft Press

    Enterprise Mobility Suite - Managing BYOD and Company-Owned Devices is the first authoritative, scenario-based guide to enabling your mobile workforce. Two expert Microsoft authors introduce Microsoft's breakthrough Enterprise Mobility Suite, and demonstrate how to use it as your single solution for mobile device management of all leading smartphone and tablet platforms: Windows, iOS, and Android.

    Other authors
    • Jeff Gilbert
    See publication
  • Exam Ref SC-900 Microsoft Security, Compliance, and Identity Fundamentals

    Microsoft Press

    Organizes its coverage by exam objectives
    Features strategic, what-if scenarios to challenge you
    Assumes you are a business user, stakeholder, consultant, professional, or student who wants to create holistic, end-to-end solutions with Microsoft security, compliance, and identity technologies

    Other authors
    See publication
  • Microsoft Defender for Cloud

    Microsoft Press

    Microsoft Defender for Cloud, formerly Azure Security Center, has evolved into one of the world's most widely-used Cloud Security Posture Management (CSPM) environments and Cloud Workload Protection Platforms (CWPP). The name change reflects Microsoft's powerful commitment to multi-cloud environmentsjust part of major recent advances in the product. Protecting workloads running in Azure, hybrid, and other cloud platforms, as well as on premises, it offers comprehensive tools for hardening…

    Microsoft Defender for Cloud, formerly Azure Security Center, has evolved into one of the world's most widely-used Cloud Security Posture Management (CSPM) environments and Cloud Workload Protection Platforms (CWPP). The name change reflects Microsoft's powerful commitment to multi-cloud environmentsjust part of major recent advances in the product. Protecting workloads running in Azure, hybrid, and other cloud platforms, as well as on premises, it offers comprehensive tools for hardening resources, tracking security posture, protecting against cyberattacks, and streamlining security managementall in one natively integrated toolset.

    Leading Microsoft Azure experts Yuri Diogenes and Tom Janetscheck help you apply Defender for Cloud's robust protection, detection, and response capabilities in key operational scenarios. Reflecting updates through mid-2022, it shows how to take full advantage of recently introduced components, feature enhancements, and deployment scenarios, as you address today's latest threat vectors. Diogenes and Janetscheck walk you through securing any Azure workload, and strengthening security in everything from policies and identity to incident response and risk management.

    Other authors
    See publication

Courses

  • (ISC)2 CISSP CBK Review Seminar

    -

  • BlueHat Security Conference (v12, v15 and v16)

    -

  • Cyber Incident Analysis and Response

    -

  • Escalation Engineer Academy

    -

  • Intelligent Application Gateway (IAG) 2007

    -

  • Introduction to C++

    -

  • MITRE ATT&CK Defender (MAD) ATTAC&K Cyber Threat Intelligence Certification Training

    -

  • Microsoft Exchange Admin Troubleshooting

    -

  • Microsoft Exchange Transport Troubleshooting

    -

  • Microsoft Windows Cluster Internship

    -

  • Microsoft Windows Server 2008 - Networking

    -

  • Microsoft Windows XP SP2 Troubleshooting

    -

  • Network Assurance

    -

  • TakeDownCon Hacking Conference

    -

  • TakeDownCon Hacking Conference 2012

    -

  • Technical Leadership Program

    -

  • User Mode Debug

    -

Projects

  • Speaker at the Cybercrime Forum Europe 2018

    Delivered two presentations:
    Day 1 (10/29/2018): Incident Response in the Cloud with Azure Security Center
    Day 2 (10/30/2018): Enhancing your Security Posture to Combat Cybercrime

    See project
  • Presentation at Microsoft Ready Vegas 2018: Post breach investigation using Azure Security Center

    Threat actors are using different techniques to compromise systems, and once they are inside the network they will continue their attack campaign until total domain dominance. Security Center uses a variety of advanced memory forensic techniques to identify malware that persists only in memory and is not detected via traditional means. In this presentation you will learn how Security Center detect attacks across the cyber kill gain, learn more about new capabilities such as Fileless Attack…

    Threat actors are using different techniques to compromise systems, and once they are inside the network they will continue their attack campaign until total domain dominance. Security Center uses a variety of advanced memory forensic techniques to identify malware that persists only in memory and is not detected via traditional means. In this presentation you will learn how Security Center detect attacks across the cyber kill gain, learn more about new capabilities such as Fileless Attack Detection, and how Microsoft Threat Intelligence Center uses Security Center to improve the security state of our customers.

    Other creators
    See project
  • Presentation at Hacker Halted 2017

    Incident Response in Hybrid Cloud

    See project
  • Breakout session at Ignite 2017

    Respond quickly to threats with next-generation security operation, and investigation

    Other creators
    See project
  • Presentation at TechRead24: Post breach investigation using Azure Security Center

    Do you know what you don’t know? That’s probably one intrigue question when the subject is information security. How do you know if your virtual machine located in Azure is not being used by a malicious command and control on the web? By using Azure Security Center you can investigate post breach activities to identity the type of attack, where the attack came from and how the vulnerability was exploited. In this presentation we will demonstrate how to use Security Alerts, Security Incidents…

    Do you know what you don’t know? That’s probably one intrigue question when the subject is information security. How do you know if your virtual machine located in Azure is not being used by a malicious command and control on the web? By using Azure Security Center you can investigate post breach activities to identity the type of attack, where the attack came from and how the vulnerability was exploited. In this presentation we will demonstrate how to use Security Alerts, Security Incidents and Threat Reports to help you during a post breach investigation.

    Other creators
  • Presentation at TechReady24: Investigating Security Issues with OMS Security & Audit Solution

    How secure is your posture today? One imperative aspect of a solid secure poster is how well you detect security incidents and how you leverage the information that was obtained during this detection to rapidly respond. By leveraging OMS security capabilities for investigation purpose, you can explore the data that was collected by OMS while leveraging Microsoft Security Intelligence to identity cyber-attacks and potential actors. In this presentation we will demonstrate two investigation…

    How secure is your posture today? One imperative aspect of a solid secure poster is how well you detect security incidents and how you leverage the information that was obtained during this detection to rapidly respond. By leveraging OMS security capabilities for investigation purpose, you can explore the data that was collected by OMS while leveraging Microsoft Security Intelligence to identity cyber-attacks and potential actors. In this presentation we will demonstrate two investigation scenarios using OMS and walk through the steps to identity the root cause of the issue. This session is designed to help you understand how to leverage OMS for investigation purpose, to assist you during key conversations with customers that need a stronger secure posture by enhancing their detection capability with OMS Security. You should walk away with good understanding of how to effectively have a technical cybersecurity conversation with your customers and help them understand the breadth and depth of OMS, expertise and experience that Microsoft brings to the table.

  • Enterprise Security Bootcamp

    If you look across the Microsoft platform stack, we have security technologies built into our core platforms like Windows, Azure, and Office 365. Then we extend those core capabilities with security technologies that work across the platforms like Advanced Threat Analytics, which watches for risky behavior in your identity system, and Cloud App Security that can monitor and control behavior across not only Microsoft cloud apps, but also [thousands/hundreds] of 3rd party SaaS apps. In this…

    If you look across the Microsoft platform stack, we have security technologies built into our core platforms like Windows, Azure, and Office 365. Then we extend those core capabilities with security technologies that work across the platforms like Advanced Threat Analytics, which watches for risky behavior in your identity system, and Cloud App Security that can monitor and control behavior across not only Microsoft cloud apps, but also [thousands/hundreds] of 3rd party SaaS apps. In this presentation, you will learn more about Microsoft security end to end story, from cloud to datacenter, including Azure Security Center and OMS. This bootcamp contains demos and labs that will help you to apply some of the security concepts in a real-world environment.

  • Monitoring Your Hybrid Environment with OMS Security - Microsoft Virtual Academy (MVA)

    Get the details on security challenges for IT operations and how the OMS Security and Audit solution can help you to overcome those challenges. Take a look at important deployment considerations for OMS Security agents, along with general considerations for OMS Security adoption. Plus, leverage Microsoft security intelligence to help you identify suspicious activities in your environment, and find out how to use notable issues to investigate alerts.

    See project
  • Breakout session at Ignite 2016: Mitigate datacenter security threats with guided investigation using Operations Management Suite

    A demo of the security capabilities in Microsoft Operations Management Suite that enable you to identify security threats and attacks. Learn how to leverage Operations Management Suite for an Incident Response scenario.

    See project
  • Presentation at TechReady 23 - Leveraging Azure Security Center for Incident Response

    When a security incident does happen, you will need to ensure that its impact is minimized by limiting breach expansion and ejecting the attacker. By leveraging Azure Security Center in multiple phases of your Incident Response plan you can identify security issues, minimize the damage and rapidly respond to an incident. In this presentation we will demonstrate how to incorporate Azure Security Center as part of your IR plan and demonstrate how to identify potential breaches and take proper…

    When a security incident does happen, you will need to ensure that its impact is minimized by limiting breach expansion and ejecting the attacker. By leveraging Azure Security Center in multiple phases of your Incident Response plan you can identify security issues, minimize the damage and rapidly respond to an incident. In this presentation we will demonstrate how to incorporate Azure Security Center as part of your IR plan and demonstrate how to identify potential breaches and take proper action to mitigate the threat.

    Other creators
  • Enterprise Mobility Suite: Beyond "Bring Your Own Device" - Microsoft Virtual Academy

    You have seen, experienced, and learned about Enterprise Mobility Suite (EMS) and Bring Your Own Device (BYOD). Are you ready to take your learning to the next level? Get an in-depth look at the supporting services and infrastructure to further implement, manage, and protect your technology assets through on-premises and user-owned technologies and devices.

    In this demo-rich course, learn the basics of Advanced Threat Analytics (ATA), including what it does and how it works. Explore ATA…

    You have seen, experienced, and learned about Enterprise Mobility Suite (EMS) and Bring Your Own Device (BYOD). Are you ready to take your learning to the next level? Get an in-depth look at the supporting services and infrastructure to further implement, manage, and protect your technology assets through on-premises and user-owned technologies and devices.

    In this demo-rich course, learn the basics of Advanced Threat Analytics (ATA), including what it does and how it works. Explore ATA architecture, see how to enhance your mobility infrastructure, and look at ways to configure, deploy, and implement ATA. Plus, examine ATA threat detection and get troubleshooting tips, in this EMS training course.

    See project
  • Azure Security Center Public Preview Documentation

    Member of the documentation team responsible for publishing content for Azure Security Center Public Preview. Azure Security Center helps your prevent, detect, and respond to threats with increased visibility into and control over the security of your Azure resources.

    Other creators
    See project
  • Presentation at Microsoft MVP Summit 2015

    Presented a session about IT PRO Archtecture related content with Design Considerations Guide, sing Mobile Device Management as a sample scenario.

    Other creators
  • Enterprise Mobility Poster

    This poster was created to help customers to understand the Microsoft Enterprise Mobility solution and how it integrates with your environment, your users and your on-premises infrastructure. It also shows key capabilities of each pillar of the solution: identity, devices, apps, and data.

    Other creators
    See project
  • Microsoft Ignite 2015

    Microsoft Cloud and Enterprise Documentation Booth coordinator and co-speaker for the Enterprise Mobility All Up Architecture session.

    See project
  • Getting Started with Windows Server Security

    Technical reviewer for this Windows Server Security book.

    See project
  • Microsoft Virtual Academy - Enterprise Mobility Suite (PT-BR)

    This course has three modules that will cover the reasons companies are embracing mobility, how to deal with BYOD challenges and how to use Microsoft Enterprise Mobility Suite to address those challenges and implement a mobile workforce. This course is only available in Portuguese (Brazil).

    See project
  • Hacker Halted 2014

    Presented the session: Avoiding the “Walking Dead” Scenario during BYOD Adoption

    Users are bringing their own devices to the company regardless of the IT is ready to support or not. They are demanding access to corporate resources and the capability to work from anywhere using the device of their choices. There are many risks involved in the BYOD scenario so you must plan to embrace it securely. This session will cover core scenarios of invasion by unauthorized employees that are…

    Presented the session: Avoiding the “Walking Dead” Scenario during BYOD Adoption

    Users are bringing their own devices to the company regardless of the IT is ready to support or not. They are demanding access to corporate resources and the capability to work from anywhere using the device of their choices. There are many risks involved in the BYOD scenario so you must plan to embrace it securely. This session will cover core scenarios of invasion by unauthorized employees that are bringing their own devices and what IT/Sec should do to design a BYOD strategy that works.

    Other creators
    See project
  • Microsoft TechEd North America 2014

    Speaker for one breakout session and shared PM responsibilities with Thomas Shinder for the Architecture track.

    Other creators
    See project
  • Presentation at Microsoft CSO Council Fall 2013

    Presentation was about the following topic: Understanding Microsoft’s BYOD Strategy to Enable Device Management, Secure Access and Protection.

    Other creators
    • Jason Leznek
    See project
  • Microsoft TechEd Europe 2013

    Speaker for one breakout session and shared PM responsibilities with Thomas Shinder for the Architecture Track.

    Other creators
    See project
  • Microsoft TechEd North America 2013

    Speaker for two breakout sessions and shared PM responsibilities with Tom Shinder for the Architecture Track.

    Other creators
    See project
  • Microsoft TechEd North America 2012

    Speaker for two breakout sessions and shared PM responsibilities with Thomas Shinder for the Architecture Track.

    Other creators
    See project
  • CSS Security Summit

    Speaker for one breakout session about Troubleshooting Performance Issues in Forefront TMG 2010. Microsoft CSS Security Summit 2010 was held in Porto/Portugal.

    Other creators
  • Network Monitor Wizard - NetWiz

    Acted as Program Manager for the development of this tool. Writing the spec of the tool, functionalities and testing the capabilities.

    See project
  • High Speed Network - ATM

    Implementation of a 155 Mbps backbone in the main secretariats of the State Government, in the Administrative Campus and linking to others government agencies using Frame Relay. More information about this project see this recommendation letter: http://www.yuridiogenes.com.br/PDF/Rigav_letter.pdf

  • Exchange Migration at Metalic

    Migration of Microsoft Windows NT for Windows 2000 with Active Directory and Exchange 5.5 for Exchange 2000. More information about this project see this recommendation letter: http://www.yuridiogenes.com.br/PDF/Metalic_Letter.pdf

  • Telemar

    Windows Administrator in an environment using Microsoft Backoffice products. The environment had 1.500 local workstations, 500 remote workstations and 20 servers. More information about this project see this recommendation letter: http://www.yuridiogenes.com.br/PDF/Telemar_Letter.pdf

  • Security Talk Show

    -

    Acted as a Host for the Security Talk show where Thomas and I used to interview Security specialists from Microsoft and also MVPs. The Security Talk Show was active from May 2011 to December 2013.

    Other creators
    See project

Honors & Awards

  • Global CIO Forum USA Edition Award of Cybersecurity Influencer of the Year 2023

    Global CISO Forum

    https://twitter.com/GlobalCISO/status/1699485000658231553?s=20

  • Marquis Who's Who for Leadership Strengths in Cybersecurity and Education

    Marquis Who's Who in America

    Press release information https://www.24-7pressrelease.com/press-release/503598/yuri-diogenes-recognized-by-marquis-whos-who-for-leadership-strengths-in-cybersecurity-and-education

  • EC-Council University Faculty of the Year Award 2019

    EC-Council University

  • Microsoft Better Togehter Award

    Microsoft

    On behalf of the SI Leadership team, a huge thank you for your excellent achievement!
    In FY20, we continue to give recognition to extraordinary individuals and teams who went above and beyond to deliver value through collaboration and partnership. We are truly grateful for your spirit, it was a key factor in driving synergy and success for SI, Microsoft Services and the company.
    This is the true essence of #BetterTogether and we should all be proud of what we achieved in Q1…

    On behalf of the SI Leadership team, a huge thank you for your excellent achievement!
    In FY20, we continue to give recognition to extraordinary individuals and teams who went above and beyond to deliver value through collaboration and partnership. We are truly grateful for your spirit, it was a key factor in driving synergy and success for SI, Microsoft Services and the company.
    This is the true essence of #BetterTogether and we should all be proud of what we achieved in Q1. Congratulations to all Q1’s #bettertogether award winners!

    Post: https://www.linkedin.com/feed/update/urn:li:activity:6595417114125877249/

  • EC-Council University Faculty of the Year Award 2018

    EC-Council University

    Award announcement:
    "Congratulations Yuri! On behalf of the President of EC-Council University, I would like to inform you that you have been selected this year's EC-Council University’s Faculty Award for Authorship. Congratulations on this achievement! For this award, a faculty member is selected from among those eligible based on professional development, research, and publications. In addition, the faculty member selected should demonstrate a passion for cyber security studies and shows…

    Award announcement:
    "Congratulations Yuri! On behalf of the President of EC-Council University, I would like to inform you that you have been selected this year's EC-Council University’s Faculty Award for Authorship. Congratulations on this achievement! For this award, a faculty member is selected from among those eligible based on professional development, research, and publications. In addition, the faculty member selected should demonstrate a passion for cyber security studies and shows a positive attitude toward students and program peers. You have met and surpassed these criteria and you have clearly demonstrated the outstanding qualities we look for in our faculty recipients of this award."

  • BookAuthority's best books of all time!

    https://bookauthority.org/award/Cybersecurity/1788475291

    Cybersecurity - Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics
    By Yuri Diogenes, Erdal Ozkaya ranked number 2 out of 34 Best Network Security Books of All Time. https://bookauthority.org/books/best-network-security-books

  • Top Cybersecurity Professors on Twitter

    https://www.onlineeducation.com/features/connected-cybersecurity-professors-on-twitter

    Cybersecurity professors can have a range of expertise, from architecture, maintenance, and administration to forensic investigation of secure networked systems, a type of infrastructure (with a corresponding set of policies) increasingly necessary for safe operation of governments, businesses, nonprofits and educational institutions of all sizes. Following these socially connected cybersecurity professors on Twitter will shine a light on various career opportunities in information security…

    Cybersecurity professors can have a range of expertise, from architecture, maintenance, and administration to forensic investigation of secure networked systems, a type of infrastructure (with a corresponding set of policies) increasingly necessary for safe operation of governments, businesses, nonprofits and educational institutions of all sizes. Following these socially connected cybersecurity professors on Twitter will shine a light on various career opportunities in information security along with several threats experts are trying to address, and the solutions they’re discovering.

  • Annual Threat Scenario Bounty Award

    Microsoft

    "Your nomination has been approved because you have identified a scenario which may put Microsoft at risk and provided us an opportunity to remediate such a threat. You have certainly set the benchmark for other teams to achieve."

  • Senior ISSA Member

    ISSA Fort Worth Chapter

    Congratulations! After reviewing your credentials, your application for ISSA Senior Member has been approved. ISSA thanks you for your contributions to the security community and sustained membership in the association. You will be presented a certificate by your ISSA chapter at an upcoming chapter meeting to be determined by your chapter leadership. Once again, thank you for your dedication to ISSA and to the security community.

    Complete list of Senior members available here:…

    Congratulations! After reviewing your credentials, your application for ISSA Senior Member has been approved. ISSA thanks you for your contributions to the security community and sustained membership in the association. You will be presented a certificate by your ISSA chapter at an upcoming chapter meeting to be determined by your chapter leadership. Once again, thank you for your dedication to ISSA and to the security community.

    Complete list of Senior members available here: http://www.issa.org/?page=fellowprogram

  • Ship It Award - Windows Server 2012 R2

    Microsoft

    Ship It Award for shipping Windows Server 2012 R2

  • Ship It Award - Windows Server 2012

    Microsoft

    Ship It Award for shipping Windows Server 2012

  • Q4 CPE Champion Award

    Microsoft

    On behalf of the Customer Service and Support organization, I would like to extend my personal congratulations to you as a recipient of a Q4 CPE Champion Award.

    I’d like to share a bit about why you were chosen for this award:
    - Wrote and co-authored blogs, TechNet articles and Whitepaper.
    - Translated personal learning into training for other Microsoft employees.
    - Recently received approval to co-author MS Press book.

    Thank you for ensuring that the voice of the…

    On behalf of the Customer Service and Support organization, I would like to extend my personal congratulations to you as a recipient of a Q4 CPE Champion Award.

    I’d like to share a bit about why you were chosen for this award:
    - Wrote and co-authored blogs, TechNet articles and Whitepaper.
    - Translated personal learning into training for other Microsoft employees.
    - Recently received approval to co-author MS Press book.

    Thank you for ensuring that the voice of the customer is heard. Your work has contributed significantly to earning satisfaction and building loyalty among customers and partners.

  • Excellence Award

    Dell

    Excellence Award for the excellent performance and for go beyond the expectation on the job duty - July 2005.

  • Gold Award

    Dell

    Gold Award for the best Customer Satisfaction metric (NOS Team) in the Second Quarter (Q2 2005).

Languages

  • Portuguese

    Native or bilingual proficiency

  • English

    Native or bilingual proficiency

  • Spanish

    Limited working proficiency

Organizations

  • Cloud Security Alliance Brazil

    Contributor

    - Present

    More information about the membership here (in Portuguese): https://chapters.cloudsecurityalliance.org/brazil/2012/06/20/eleicao-na-cloud-security-alliance-brasil/

  • ISSA

    Senior Member

    - Present

Recommendations received

More activity by Yuri

View Yuri’s full profile

  • See who you know in common
  • Get introduced
  • Contact Yuri directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Add new skills with these courses