You are on page 1of 16

Hybrid Cloud Security

Workshop
Engagement Overview
Author name
Date
1. Introduction & overview
2. Funding & nomination flow
Agenda: 3. Engagement delivery phases
4. Resources
Introducing the Hybrid Cloud Security Workshop

Showcase Azure Defender and find threats and


vulnerabilities in your customer’s environment.
Explore Azure Network Security capabilities,
creating adoption intent
Hybrid Cloud Security Workshop: Overview

Designed as a three-day engagement, the Hybrid Cloud Security Workshop enables partners to build intent for sales and deployment
of Azure Defender and Azure Network Security. The engagement involves showcasing in customer’s production environment Azure
Defender features, discovering real threats to selected hybrid workloads, and analyzing security vulnerabilities across existing hybrid
workloads. It also includes an exploration of Azure Network Security capabilities in a demonstration environment.

Audience

Customers Partner Participants


Senior BDMs – CISO, CSO, CIO, etc. Consultants, Solution Architects, Dev and Design Leads
and TDMs – IT Security, IT Operations
Workshop

Envision Discover Plan


Value Conversation Security assessment Next Steps Discussion
• Customer priorities & • Threat Exploration • Azure Defender pilot/deployment
requirements • •
Demonstrate Threat Azure Network Security
• Product feature showcase Investigation & Response pilot/deployment
• Vulnerability Assessment • Cost and economic value
conversation
What we’ll do during the Hybrid Cloud Security Workshop

Analyze your Define scope & Explore Azure Discover threats Discover existing Recommend
requirements and deploy Azure Network Security to the included hybrid workloads next steps on how
priorities for a hybrid Defender in your capabilities and hybrid workloads vulnerabilities and to proceed with a
cloud detection and production experience selected and demonstrate learn how to reduce production
response solution. environment, Azure Network how to investigate the attack surface implementation of
onboarding servers Security products in and respond to area. Azure Defender
and other selected a demonstration threats. and Azure
services. environment. Network Security.
After the Hybrid Cloud Security Workshop, you’ll…

Better understand the Better understand Better understand Have defined next
benefits and how to prioritize and what can be done to steps based on your
capabilities of Azure mitigate potential reduce the attack needs and objectives.
Defender and Azure threats to your servers surface area for hybrid
Network Security. and services. workloads.
Why deliver the Hybrid Cloud Security Workshop

Customer benefits Partner benefits

Customized: exclusively focused on Use Microsoft funding to acquire new


their specific security needs. customers.

Real data: threat/vulnerability analysis Position yourself as the trusted advisor


based on customer’s environment. for security strategy.

Solution oriented: mitigation Opportunity to pitch deployment and


solutions & actionable next steps. managed services with recommended
outcomes.
Funding & nomination flow
Program details and funding
Partner funding is available for eligible partners and customers.

Customer requirements Partner requirements


• US$400k or more annual Azure • Approved or Completed Security
consumption for Servers, SQL, and Workshop in FY21 MCAP program,

$3500
per engagement
Storage, AND
• Azure Defender consumption = <2
percent of Azure consumption
OR Azure Expert MSP
• SSPA Compliant

Proof of execution
Program date
• Customer Satisfaction Survey
• Nominations open March 5th, 2021 • Partner Findings Survey
• POE Report
• Partner Invoice

Nominate customers at: https://aka.ms/HybridCloudSecurityWorkshop/Nomination More information: https://aka.ms/SecurityPilotWorkshops 


Workshop nomination flow & steps
1. Nominate your target accounts to conduct an engagement to verify whether the accounts are eligible for program
funding https://aka.ms/HybridCloudSecurityWorkshop/Nomination. Eligibility verification will happen instantaneously.

2. Once a customer has been nominated, partner is requested to secure and upload the customer acknowledgement
document, on the partner portal within 30 days of customer nomination.

3. Support team will review customer acknowledgement and confirm funding. You can begin execution at this point. Please
allow 2 business days for reviewing customer acknowledgments.

4. Once approved, request access to the Network Security demonstration environment through the partner dashboard.

5. Execute the workshop within 90 days after engagement approval, using the delivery guidance resources:
https://aka.ms/HybridCloudSecurityWorkshop/Resources.

6. Submit the Required POE documents to claim funds within the 90-day period: (1) customer satisfaction survey, (2)
partner findings survey, (3) POE Report, (4) Partner Invoice.

7. Payouts are released monthly once all POE has been received and vetted.
Delivery phases
Hybrid Cloud Security Workshop phases and activities
Pre-engagement call Azure Security Center Overview Kick-Off Meeting – 1 hour Azure Network Security Overview
– 1 hour – 1 hour [optional] – 1 hour
• Engagement walk-through
• Introductions • Azure Security Center overview • Engagement tools • Azure Network Security
• Engagement walk-through presentation • Expectations overview presentation
• Expectations • What’s next
• Azure Network Security Demonstration
What’s next
Define Scope – 1 hour and Discussion – 2 hours

• Define and document deployment • Azure Firewall demonstration


Engagement questionnaire scope • Azure Web Application Firewall
demonstration
• Fill in and return the questionnaire • Azure DDOS Protection Standard
Configuration and Verification
• Other pre-engagement preparations – 4 hours demonstration
• Discussion of next steps
• Configure engagement tools
• Verification of deployment and
configuration

Azure
Network
Security
Exploration

Readiness Engagement Data


Pre-engagement Collection
[optional] Setup

2-3 weeks
Hybrid Cloud Security Workshop phases and activities
Threat Exploration and Report Generation Threat Results Presentation – 1 hour Engagement Decommissioning – 1 hour
– 4 hours
• Present and discuss results • Remove configuration changes
• Threat Exploration • Record next steps • Deactivate trial licenses
• Report Generation
Next Steps Discussion – 1 hour

• Discuss next steps

Threat
Exploration Engagement
Results and
Report Decommissioning
Next Steps
generation
Resources
Resources

 Program webpage: https://aka.ms/HybridCloudSecurityWorkshop

 Delivery resource & guides: https://aka.ms/HybridCloudSecurityWorkshop/Resources

 Customer nomination form: https://aka.ms/HybridCloudSecurityWorkshop/Nomination

 Program FAQ: https://aka.ms/HybridCloudSecurityWorkshop/FAQ

Join the Microsoft Security, Compliance & Identity Yammer Group


Thank you.

© Copyright Microsoft Corporation. All rights reserved.

You might also like