Loading…
Attending this event?
Zero Trust clear filter
arrow_back View All Dates
Thursday, September 19
 

08:00 CEST

Entra Private Access deep dive
Thursday September 19, 2024 08:00 - 09:00 CEST
Learn in depth about Entra Private Access integration with Entra ID for Zero-trust VPN replacement and on prem MFA capabilities
Speakers
avatar for Peter Lenzke

Peter Lenzke

Sen. Product Manager, Microsoft Corp.
Working in IT for 15+ years and for the last 12 years at Microsoft. Being a Program Manager in the identity division making Entra better every day.
Thursday September 19, 2024 08:00 - 09:00 CEST
Clubraum 1

08:00 CEST

Securing the Unseen: Microsoft Defender for IoT Explained
Thursday September 19, 2024 08:00 - 09:00 CEST
As organizations increasingly adopt Internet of Things (IoT) devices, ensuring their security becomes paramount. Microsoft Defender for IoT offers a multi-layered defense approach, combining agentless monitoring via passive network traffic analysis (NTA) with endpoint micro-agents. In this session, we’ll delve into the architecture, deployment strategies, and real-world use cases of Defender for IoT. Join us to learn how to protect your IoT devices effectively and enhance your overall security posture.
Speakers
avatar for Alain Schneiter

Alain Schneiter

Partner | Solutions Architect, scopewyse GmbH
Alain (Al) Schneiter is one of the scopewyse founders and an Microsoft Secuirty MVP. As an experienced solutions architect he is supporting clients and partners in training, concepts, designs and implementations using cloud solutions from Microsoft Azure and Microsoft 365. Alain is... Read More →
Thursday September 19, 2024 08:00 - 09:00 CEST
Clubraum 2

10:40 CEST

Control Plane under Control: Securing Privileged Access by Microsoft Enterprise Access Model
Thursday September 19, 2024 10:40 - 11:40 CEST
Over the last years, Microsoft has released many design principles, best practices and security concepts for securing privileged access in a Microsoft Cloud environment. This includes also the "Enterprise Access Model" as an evolution of the previously known (Active Directory) ESAE approach.

But what are real-world experiences and examples of implementing those reference architecture? Which security controls should be applied? Who and what should be defined as "Tier0" or "Control Plane"? Which privilege escalation paths should be considered even in a tiered administration model?

In this demo-drive session, I will share my learnings and practical approach to identify, protect and monitor the high-privileged assets in Microsoft Entra. We will go through related features and monitoring capabilities but also limitations to implement a tiered administration model in a cloud environment. In addition, I will show insights of my free commmunity tool "EntraOps" which allows to automate classification and protection of privileged assets in your environment.
Speakers
avatar for Thomas Naunheim

Thomas Naunheim

Thomas Naunheim is a Cyber Security Architect from Germany and with focus on identity and security solutions in Microsoft Azure. He is working for glueckkanja AG and part of projects to design and implement Microsoft cloud identity and security solutions in enterprise environments.You... Read More →
Thursday September 19, 2024 10:40 - 11:40 CEST
Clubraum 1

12:40 CEST

One Year of Fighting Adversary-in-the-Middle, notes from the field
Thursday September 19, 2024 12:40 - 13:40 CEST
Last 1,5 year we were faced with a new advanced phishing technique, called adversary-in-the-middle. This is an advanced method to bypass multiple forms of MFA.

In this session Kenneth and Erik we do a deep dive into this topic.

First of alll we start with a small demo of the AiTM case

Then we will go through our options to fight this by using differente strategies like implementing phising resistant MFA methodes or using simple Conditional Access policies, or advanced Entra ID P2 Protection methods.

After this session you will have enough information to stop this attack in several ways each with it's own advangtages and drawbacks.


Speakers
avatar for Erik Loef

Erik Loef

CTO, Proxsys
CTO, MSc, CEH, MVP
avatar for Kenneth van Surksum

Kenneth van Surksum

Modern Workplace Consultant, Secure At Work
As a Microsoft 365 Modern Workplace consultant I help customers implement modern workplace solutions based on top of theirMicrosoft 365 licensing, leveraging products like Microsoft Intune, Microsoft Entra, Microsoft Defender, Exchange Online, Microsoft Teams, Microsoft SharePoint... Read More →
Thursday September 19, 2024 12:40 - 13:40 CEST
Clubraum 2

15:20 CEST

Zero Trust - Zero Gap? Spotlight on (new) uncovered aspects of your CA design
Thursday September 19, 2024 15:20 - 16:20 CEST
Conditional Access is the heart of Microsoft's Zero Trust implementation as its policy enforcement engine and Microsoft introduces constantly new features to cover more and more use cases and integrations. This includes granular conditions and controls for specific authentication methods, restricted sessions and authentication flows but also new capabilities to re-trigger a policy evaluation.

In this session, we will discuss the latest features and their use cases and also challenges that you may not address in your current ruleset. Starting from automation for deployment, exclusion handling and gap monitoring, up to missing strong policy design to prevent rogue devices or protect privileged users.
Speakers
avatar for Thomas Naunheim

Thomas Naunheim

Thomas Naunheim is a Cyber Security Architect from Germany and with focus on identity and security solutions in Microsoft Azure. He is working for glueckkanja AG and part of projects to design and implement Microsoft cloud identity and security solutions in enterprise environments.You... Read More →
avatar for Christopher Brumm

Christopher Brumm

Cyber Security Architect, glueckkanja AG
I am a big fan of Microsoft Cloud Security products because there my two favorite topics Identity and Security work together in a unique way. I've been working in IT for quite a while and have almost 15 years of experience in IT security in various roles. At the moment I am a Cybersecurity... Read More →
Thursday September 19, 2024 15:20 - 16:20 CEST
Auditorium

15:20 CEST

Microsoft Dev Box - Make The Devs AND Security Teams happy
Thursday September 19, 2024 15:20 - 16:20 CEST
Meet Dave, the Dev. Dave has been using a powerful laptop to run VMs on so he can do his work. Now Security Steve has told him they're no longer putting up with his 'against policy' methods and he needs to use VDI like everyone else. On the same host with everyone else... Dave is now complaining about slow performance, not having the tools he needs, and having only 1 session at the time. Poor Dave :(

There's a way to make both Dave and Steve happy! Introducing Microsoft Dev Box! We will discuss how this compares to other options, including Azure Virtual Desktop (AVD), and why it is the better choice for organizations looking to provide their developers with a secured, self-service platform.
Speakers
avatar for Merlijn Van Waeyenberghe

Merlijn Van Waeyenberghe

Consultant, OB-V-US
Consultant @itsobvus | #AI addict #SoftwareComposer | #MEM #ConfigMgr expert | #PowerShell #Python coder | #BEPUG co-owner | #community speaker | CPL(H) #HelicopterPilot #AviationGeek | Biker | VR/XR enthousiast
Thursday September 19, 2024 15:20 - 16:20 CEST
Clubraum 1

16:40 CEST

Defender for Endpoint on mobile: from Endpoint protection to Zero Trust Network Access
Thursday September 19, 2024 16:40 - 17:40 CEST
During this session you will learn about the three core capabilities of Defender for Endpoint for iOS and Android:
- Defender for Endpoint (Endpoint Protection)
- Microsoft Tunnel
- Microsoft Entra Private Access
You will learn about the various deployment and configuration options and how these impact the end user experience and behaviour.
I will share some notes from the field and tips and tricks how you can further streamline and enhance the deployment of the Defender app.
After you learned how you can deploy and configure MDE on mobile devices to work with the core capabilities, we will go into the subject of Conditional Access and how the signals from the Defender for Endpoint capabilities can support you in enhancing your mobile security posture using Compliance and network signals.
Speakers
avatar for Janic Verboon

Janic Verboon

Senior Endpoint Engineer, baseVISION AG
Endpoint Engineer with interests in everything Intune & Entra related, enjoys a good beer 🍺 and is a big fan of heavy & loud music 🤘
Thursday September 19, 2024 16:40 - 17:40 CEST
Auditorium
 

Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.
Filtered by Date -