2024-06-17 –, Breakout 1
In the intricate ecosystem of cloud computing, Azure Monitor Activity Logs serve as a critical tool for tracking and understanding operations within Azure environments. However, navigating these logs can be as challenging as it is essential, with complexities that can obscure crucial insights. This session aims to shed light on the nuances of Azure Monitor Activity Logs, highlighting both their strengths and the obstacles they present. I will introduce the concept of a composite key designed to re-orient and review events with a "correlation" that goes beyond Azure's existing correlation and operation ID constructs, offering a clearer perspective. This approach promises to provide enhanced clarity and actionable insights for your Azure infrastructure.
B.S. in Computer Information Systems and an M.S. in Information Security from Robert Morris University, I bring over 9 years of diverse experience in the IT industry. My career journey has spanned roles in software development, cybersecurity consulting, data loss prevention, threat detection, and threat research. Over the last 6 years, my primary focus has been on the proactive identification of potential threats. I have honed my skills in developing sophisticated methods for detecting these threats, ensuring that defense mechanisms remain a step ahead of malicious actors.