Loading…
Attending this event?
Conditional Access clear filter
arrow_back View All Dates
Thursday, September 19
 

12:40 CEST

Intune MAM, Conditional Access, actual scenarios and the clown fiesta!
Thursday September 19, 2024 12:40 - 13:40 CEST
We'll dive deep into Intune Mobile Application Management as part of Microsoft Endpoint Manager. We'll go thru the diverse landscape that explain certain identify driven MAM scenarios and their potential issues that drove us nuts. Of course a big part of this is conditional access driven and we will discuss all practical
blockers and workarounds when it goes south.

This session will be focusing specifically on the use case issues and workarounds , less on the theoretical part of Intune mam & CA
Speakers
avatar for Kim Heyrman

Kim Heyrman

Consultant, OB-V-US
Modern workplace IT consultant @itsobvus
avatar for Kenny Buntinx

Kenny Buntinx

CEO, OB-V-US
Kenny is a highly qualified , certified and energized consultant working for OB-V-US Benelux with more than 20 years of experience and strives to always deliver high quality when managing and delivering projects. He has a strong focus on the Microsoft Cloud product family and is an... Read More →
Thursday September 19, 2024 12:40 - 13:40 CEST
Luzerner Saal

12:40 CEST

One Year of Fighting Adversary-in-the-Middle, notes from the field
Thursday September 19, 2024 12:40 - 13:40 CEST
Last 1,5 year we were faced with a new advanced phishing technique, called adversary-in-the-middle. This is an advanced method to bypass multiple forms of MFA.

In this session Kenneth and Erik we do a deep dive into this topic.

First of alll we start with a small demo of the AiTM case

Then we will go through our options to fight this by using differente strategies like implementing phising resistant MFA methodes or using simple Conditional Access policies, or advanced Entra ID P2 Protection methods.

After this session you will have enough information to stop this attack in several ways each with it's own advangtages and drawbacks.


Speakers
avatar for Erik Loef

Erik Loef

CTO, Proxsys
CTO, MSc, CEH, MVP
avatar for Kenneth van Surksum

Kenneth van Surksum

Modern Workplace Consultant, Secure At Work
As a Microsoft 365 Modern Workplace consultant I help customers implement modern workplace solutions based on top of theirMicrosoft 365 licensing, leveraging products like Microsoft Intune, Microsoft Entra, Microsoft Defender, Exchange Online, Microsoft Teams, Microsoft SharePoint... Read More →
Thursday September 19, 2024 12:40 - 13:40 CEST
Clubraum 2

15:20 CEST

Zero Trust - Zero Gap? Spotlight on (new) uncovered aspects of your CA design
Thursday September 19, 2024 15:20 - 16:20 CEST
Conditional Access is the heart of Microsoft's Zero Trust implementation as its policy enforcement engine and Microsoft introduces constantly new features to cover more and more use cases and integrations. This includes granular conditions and controls for specific authentication methods, restricted sessions and authentication flows but also new capabilities to re-trigger a policy evaluation.

In this session, we will discuss the latest features and their use cases and also challenges that you may not address in your current ruleset. Starting from automation for deployment, exclusion handling and gap monitoring, up to missing strong policy design to prevent rogue devices or protect privileged users.
Speakers
avatar for Thomas Naunheim

Thomas Naunheim

Thomas Naunheim is a Cyber Security Architect from Germany and with focus on identity and security solutions in Microsoft Azure. He is working for glueckkanja AG and part of projects to design and implement Microsoft cloud identity and security solutions in enterprise environments.You... Read More →
avatar for Christopher Brumm

Christopher Brumm

Cyber Security Architect, glueckkanja AG
I am a big fan of Microsoft Cloud Security products because there my two favorite topics Identity and Security work together in a unique way. I've been working in IT for quite a while and have almost 15 years of experience in IT security in various roles. At the moment I am a Cybersecurity... Read More →
Thursday September 19, 2024 15:20 - 16:20 CEST
Auditorium

16:40 CEST

Defender for Endpoint on mobile: from Endpoint protection to Zero Trust Network Access
Thursday September 19, 2024 16:40 - 17:40 CEST
During this session you will learn about the three core capabilities of Defender for Endpoint for iOS and Android:
- Defender for Endpoint (Endpoint Protection)
- Microsoft Tunnel
- Microsoft Entra Private Access
You will learn about the various deployment and configuration options and how these impact the end user experience and behaviour.
I will share some notes from the field and tips and tricks how you can further streamline and enhance the deployment of the Defender app.
After you learned how you can deploy and configure MDE on mobile devices to work with the core capabilities, we will go into the subject of Conditional Access and how the signals from the Defender for Endpoint capabilities can support you in enhancing your mobile security posture using Compliance and network signals.
Speakers
avatar for Janic Verboon

Janic Verboon

Senior Endpoint Engineer, baseVISION AG
Endpoint Engineer with interests in everything Intune & Entra related, enjoys a good beer 🍺 and is a big fan of heavy & loud music 🤘
Thursday September 19, 2024 16:40 - 17:40 CEST
Auditorium
 

Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.
Filtered by Date -