Understanding cybercrimeUnderstanding the cyber kill chainCommon threatsBuilding a security postureAdopting an assume-breach mentalityCloud threats and securityComplianceRisk managementIdentity and access managementOperational securityEndpoint protectionData protectionAzure SecurityHost protectionNetwork protectionStorage protection