Loading…
Attending this event?
Conditional Access clear filter
Monday, September 16
 

13:15 CEST

Forward to the Past and Back to the Future - Cybercrime in 2023/2024
Monday September 16, 2024 13:15 - 14:15 CEST
Join Sami Laiho, Chief Research Officer of Adminize, for a look back in to what 2023 changed in the Security Threat Landscape and to hear his predictions on what will the future have in store for us.
Speakers
avatar for Sami Laiho

Sami Laiho

Chief Research Officer, Matti Laiho Oy
Sami Laiho is one of the world's leading professionals in the Windows OS and Security. Sami has been working with and teaching OS troubleshooting, management, and security since 1995. Sami's session was evaluated as the best session in TechEd North America, Europe and Australia in... Read More →
Monday September 16, 2024 13:15 - 14:15 CEST
Luzerner Saal

15:45 CEST

Strong Authentication with Entra Certificate-Based Authentication
Monday September 16, 2024 15:45 - 16:45 CEST
Identity is the most critical aspect of security. Ensuring that users are who they claim to be is vital. Today, usernames and passwords alone are insufficient. Although Multifactor Authentication (MFA) mitigates some risks associated with standard credentials, digital certificates are a better choice. Organizations can improve their security posture by adopting strong, phishing-resistant credentials in digital certificates by implementing Microsoft Entra Certificate-Based Authentication (CBA).
Speakers
avatar for Richard Hicks

Richard Hicks

President, Richard M. Hicks Consulting, Inc.
Richard Hicks is the founder and principal consultant at Richard M. Hicks Consulting, Inc. A Microsoft Most Valuable Professional (MVP) with more than 25 years of experience implementing secure remote access and public key infrastructure (PKI) solutions, he is a widely recognized... Read More →
Monday September 16, 2024 15:45 - 16:45 CEST
Clubraum 2
 
Tuesday, September 17
 

08:00 CEST

Let’s replace your VPN with a real Zero Trust Network Access !
Tuesday September 17, 2024 08:00 - 09:00 CEST
We've spent the last few years modernizing clients, kicking them out of Active Directory and optimizing them to run outside the corporate network. The use of modern protocols, conditional access and the integration of MDE and Intune now enables us to access cloud services with access management that largely complies with the principles of zero trust.

However, when it comes to accessing legacy apps in the old data center world, we unfortunately all too often fall back on the old solutions - perhaps enhanced with some SAML and certificates - and features such as microsegmentation and session revocation are sought in vain.

In this session I would like to discuss and show why Microsoft's SSE solution is so much closer to my understanding of Zero Trust Network Access by explicitly checking every session in the network during its establishment, limiting access to the least necessary and disconnecting in case of a breach.

As a security architect who used to deal intensively with networks and in recent years with identity, I am very much looking forward to a deep dive on the topic of Single SignOn when accessing the OnPrem environment with Private Access.

In addition to the way the technology works, you will learn what needs to be considered during POC and rollout and what differences there are to a classic VPN project.
Speakers
avatar for Christopher Brumm

Christopher Brumm

Cyber Security Architect, glueckkanja AG
I am a big fan of Microsoft Cloud Security products because there my two favorite topics Identity and Security work together in a unique way. I've been working in IT for quite a while and have almost 15 years of experience in IT security in various roles. At the moment I am a Cybersecurity... Read More →
Tuesday September 17, 2024 08:00 - 09:00 CEST
Clubraum 1

09:20 CEST

Navigating the Cloud-Native shift: Insights & best practices
Tuesday September 17, 2024 09:20 - 10:20 CEST
Join us for a session with two experts in transitioning to cloud-native device management. Learn about their journey from managing on-premises devices to using Intune for cloud-based management. Is the transition smooth? Can it save costs? Understand why this shift is important and get valuable insights.

Discover the challenges they faced and learn best practices, tips, and tricks for a successful transition. Don't miss this chance to upgrade your device management strategy.
Speakers
avatar for Mattias Melkersen

Mattias Melkersen

Modern workplace architect - Mindcore | Microsoft MVP, Mindcore
Mattias Melkersen is a community driven and passionate modern workplace consultant with 18 years’ experience in automating software, driving adoption and technology change within the Enterprise. He lives in Denmark and works at Mindcore.He is an Enterprise Mobility Intune MVP, Official... Read More →
avatar for Nickolaj Andersen

Nickolaj Andersen

Microsoft MVP, Senior Architect End User Computing, Ericsson
Nickolaj specializes in Enterprise Mobility and Security, Windows deployments and automation. Additionally, he has extensive experience with planning, implementing and migrating Microsoft Endpoint Manager environments on a global scale. Nickolaj has also been awarded as PowerShell... Read More →
Tuesday September 17, 2024 09:20 - 10:20 CEST
Clubraum 2

10:40 CEST

Terraform Provider for Microsoft 365
Tuesday September 17, 2024 10:40 - 11:40 CEST
Terraform is widely recognized as the dominant language for professional cloud configuration. It has become an essential tool for Azure, AWS, and Kubernetes projects, offering numerous advantages such as a readable declaration language, reliable state tracking for changes, robust auditing of all modifications through git, and automatic documentation of infrastructure.

Until now, Terraform has primarily focused on configuring cloud infrastructures and provided limited support for Entra ID. However, we are introducing a groundbreaking development: the Terraform Provider for Microsoft 365. This session provides an overview of this provider, which in it's first incarnation enables the configuration of almost all aspects of Intune. With support for Autopilot, Conditional Access, Configuration Profiles with Settings Catalog, Compliance Policies, and more, it opens up entirely new possibilities for Enterprise or MSP Tenant Management through Terraform.
Speakers
avatar for Christian Kanja

Christian Kanja

CEO, glueckkanja AG
Christian Kanja has been working with glueckkanja for more than 30 years, focusing on the technical possibilities to create the best possible working environment for companies and their employees through innovation. As co-founder of the German-based company, he is responsible for... Read More →
avatar for Ugur Koc

Ugur Koc

Microsoft MVP, Cloud Engineer, glueckkanja AG
With a robust background in IT and cybersecurity, I have developed my expertise through various roles. My career began as an IT Support Specialist, where I built a strong technical foundation. Progressing into the realm of IT security, I grew from an Analyst to an Administrator, gaining... Read More →
avatar for Steffen Schwerdtfeger

Steffen Schwerdtfeger

Enterprise Mobility Management | Microsoft 365 | Education #100PercentCloud #EMM
Tuesday September 17, 2024 10:40 - 11:40 CEST
Clubraum 1

15:20 CEST

Kerberos is alive and kicking in the cloud
Tuesday September 17, 2024 15:20 - 16:20 CEST
Microsoft first introduced Kerberos as an authentication protocol in Windows 2000 Active Directory. Since then, many extensions to the protocol have been introduced to allow for constrained delegation, protocol translation and more. You may be surprised that Kerberos is still actively used in Microsoft Entra and solves several challenges, including SSO for hybrid users, hybrid user sign-ins using FIDO keys, Kerberos sign-in to Windows auth websites, and user authentication to cloud-hosted SMB file share.

Come to this session, and John Craddock will show you how Kerberos works and how Microsoft has implemented Kerberos in the cloud. This is packed with demos and insights that will allow you to troubleshoot your environments. Don't miss this session!
Speakers
avatar for John Craddock

John Craddock

Identity and security architect, XTSeminars Ltd
John has designed and implemented computing systems ranging from high-speed industrial controllers to distributed IT systems focusing on security and high availability. A key player in many IT projects for industry leaders, including Microsoft, the UK Government and multi-nationals... Read More →
Tuesday September 17, 2024 15:20 - 16:20 CEST
Clubraum 1
 
Wednesday, September 18
 

08:00 CEST

How to improve security for your Cloud PC users
Wednesday September 18, 2024 08:00 - 09:00 CEST
In this session we will talk about how you can improve the security of Windows 365 and Cloud PCs without making it to hard for the end-user to use.
Speakers
avatar for Ola Ström

Ola Ström

Chief Technical Architect, Advania Knowledge Factory
Hello! I’m a Chief Technical Architect and Practice Lead within Modern Work at Advania Knowledge Factory and I’ve spent over a decade architecting the future of cloud and device management. My journey has been fueled by a relentless pursuit of simplicity in technology, ensuring... Read More →
avatar for Dominiek Verham

Dominiek Verham

Blogger | Author | Public speaker | Loving tech and F1
Wednesday September 18, 2024 08:00 - 09:00 CEST
Deuxième

10:40 CEST

100 Solutions, 1 Strategy: Unveiling Your Epic Modern Workplace Adventure!
Wednesday September 18, 2024 10:40 - 11:40 CEST
Step into the ultimate workplace adventure where classic meets cutting-edge! In this dynamic session, we'll embark on a journey through time and technology, blending traditional workplace management with the innovative realms of Microsoft Zero Trust and Identity Management. From the tried-and-true methods of yesteryears to the futuristic landscapes of digital security, we'll explore how to weave together the best of both worlds. Join us to uncover strategies for building a resilient, adaptable, and secure workplace environment that stands the test of time and technology.
Speakers
avatar for Kim Heyrman

Kim Heyrman

Consultant, OB-V-US
Modern workplace IT consultant @itsobvus
avatar for Kenny Buntinx

Kenny Buntinx

CEO, OB-V-US
Kenny is a highly qualified , certified and energized consultant working for OB-V-US Benelux with more than 20 years of experience and strives to always deliver high quality when managing and delivering projects. He has a strong focus on the Microsoft Cloud product family and is an... Read More →
Wednesday September 18, 2024 10:40 - 11:40 CEST
Luzerner Saal

10:40 CEST

Zero Trust - Dope or Nope?
Wednesday September 18, 2024 10:40 - 11:40 CEST
Zero Trust must be the worst name in the history of Security. But is it just a bad name? Does it really offer worthwhile goals or is it an overkill? I hear sales pitches for it, like for many other security solutions, that concentrate on "What we can't allow anymore because of changed security landscape" all the time. Why does security have to be so negative? A well done Zero Trust environment gives you "the ability to work as efficiently and securely, whether you are sitting in Starbucks or the corporate office" - Which I believe most of us want. Come and listen to this talk about rights and wrongs of how to achieve Zero Trust and how keep Security as what it's meant to be - a support function for a happy workforce.
Speakers
avatar for Sami Laiho

Sami Laiho

Chief Research Officer, Matti Laiho Oy
Sami Laiho is one of the world's leading professionals in the Windows OS and Security. Sami has been working with and teaching OS troubleshooting, management, and security since 1995. Sami's session was evaluated as the best session in TechEd North America, Europe and Australia in... Read More →
Wednesday September 18, 2024 10:40 - 11:40 CEST
Auditorium

12:15 CEST

Tips and Tricks from a baseVISION Security Engineer
Wednesday September 18, 2024 12:15 - 12:35 CEST
Have you ever wondered what it is like to be a Security Engineer at baseVISION? In this session, sponsored by baseVISION, I'll show you how the company enables me to deliver the best service to my customers. I'll also cover a technical part where I'll talk about a current customer security project I'm working on. This will give you an insight into my daily life and I’ll also share some practical tips and tricks around my work.
Speakers
avatar for Loris Ambrozzo

Loris Ambrozzo

Senior Security Engineer, baseVISION AG
Loris is a Senior Security Engineer at baseVISION AG, where he supports customers in improving the security posture of their environments. He's interested in various security and identity topics such as Microsoft Defender XDR, Microsoft Entra and Microsoft Sentinel.
Wednesday September 18, 2024 12:15 - 12:35 CEST
Community stage

12:40 CEST

Keynote: The future of Windows, AI, and the Cloud
Wednesday September 18, 2024 12:40 - 13:40 CEST
Christiaan from Microsoft is back and will take you down memory lane and into the future and share how Windows is moving to the Cloud and how progressive AI will change the way how you have been using and configuring Windows via Copilot for Windows and Security.

This session will be demo-rich and a real showcase how Cloud Computing and Cloud native management via Microsoft Intune is coming together!
Speakers
avatar for Christiaan Brinkhoff

Christiaan Brinkhoff

Principal PM and Community Lead, Windows 365 + AVD, Microsoft
Christiaan Brinkhoff works as a Principal Program Manager and Community Lead for Windows 365 and AVD at Microsoft, In his role at Microsoft, he works on features such as Windows 365 app, Switch and Boot. His mission is to drive innovation while bringing Windows 365, Windows, and Microsoft... Read More →
avatar for Scott Manchester

Scott Manchester

Vice President, Windows 365 and Azure Virtual Desktop, Microsoft
Scott Manchester is the Vice President of Program Management for Windows Cloud Experience. He is a 24 year veteran at Microsoft where he has led the development of Windows 365, Azure Virtual Desktop, Remote Desktop Service, Second Screen Remoting, Multimedia, and Networking technologies... Read More →
Wednesday September 18, 2024 12:40 - 13:40 CEST
Luzerner Saal

14:00 CEST

Entra Suite deep dive
Wednesday September 18, 2024 14:00 - 15:00 CEST
Learn how to securely manage your Identity and remote access across the enterprise, from private resources to Internet ones
Speakers
avatar for Peter Lenzke

Peter Lenzke

Sen. Product Manager, Microsoft Corp.
Working in IT for 15+ years and for the last 12 years at Microsoft. Being a Program Manager in the identity division making Entra better every day.
Wednesday September 18, 2024 14:00 - 15:00 CEST
Clubraum 2

16:40 CEST

Conditional Access, from basic to advanced: Part 2, advanced scenarios
Wednesday September 18, 2024 16:40 - 17:40 CEST
This session, which is part 1 of a 2 part workshop, Kenneth van Surksum will take your Microsoft Entra Conditional Access knowledge from basic to advanced. In part 2, we will go through the advanced scenarios you can implement with Conditional Access allowing you to take your Conditional Access policies one step further. Kenneth will talk about integrating Conditional Access with Microsoft Defender for Cloud Apps and Microsoft Purview, but will also explain how to leverage Authentication Context, Authentication Strength, Authentication Flow, Filters and more.
Speakers
avatar for Kenneth van Surksum

Kenneth van Surksum

Modern Workplace Consultant, Secure At Work
As a Microsoft 365 Modern Workplace consultant I help customers implement modern workplace solutions based on top of theirMicrosoft 365 licensing, leveraging products like Microsoft Intune, Microsoft Entra, Microsoft Defender, Exchange Online, Microsoft Teams, Microsoft SharePoint... Read More →
Wednesday September 18, 2024 16:40 - 17:40 CEST
Clubraum 1

17:45 CEST

Microsoft Ask Me Anything - Microsoft Leadership
Wednesday September 18, 2024 17:45 - 19:00 CEST
Come ask Microsoft leadership all of your questions
Speakers
avatar for Sumit Malhotra

Sumit Malhotra

Group Product Manager, Microsoft
Leading teams on our vision and delivery of enterprise security focused solutions for our M365 customers. Driving rapid improvements in end users and security teams' resilience to emerging threats through automation in awareness, detection, investigation and response.
avatar for Martin Schvartzman

Martin Schvartzman

Principal Product Manager, Microsoft
Martin is a Principal Product Manager in the Microsoft Defender for Identity team. Has over 20 years of experience in the technology industry, primarily around IT and Cyber Security with vast knowledge of Cloud Services. Martin is passionate about technology and innovation, and he... Read More →
avatar for Lior Arviv

Lior Arviv

Senior Product Manager, Microsoft
Lior Arviv is a Senior Product Manager on the Defender for Cloud team, with over 15 years of experience in Microsoft technologies, particularly in cloud services and security. Passionate about innovation, Lior is dedicated to developing products that simplify complex challenges and... Read More →
avatar for Ran Marom

Ran Marom

Group Product Manager, Microsoft
Ran is the group product manager for Microsoft Defender for Cloud Apps, previously to Microsoft Ran was leading security products in different domains such as cloud-native and network security
avatar for Talal Alqinawi

Talal Alqinawi

SR Director, Microsoft
Talal Alqinawi is a seasoned executive leader specializing in cloud marketing and product strategy. With over 22 years at Microsoft, Talal has a proven track record in driving digital transformation through SaaS/IaaS cloud solutions, sales models, marketing & GTM strategy, and business... Read More →
avatar for Lior Bela

Lior Bela

Bringing the Spark to Endpoint Managment, Microsoft
Lior is the Director of Intune with focus on business growth, customer & partner relationships, and the owner of the Intune MVP community
avatar for Scott Manchester

Scott Manchester

Vice President, Windows 365 and Azure Virtual Desktop, Microsoft
Scott Manchester is the Vice President of Program Management for Windows Cloud Experience. He is a 24 year veteran at Microsoft where he has led the development of Windows 365, Azure Virtual Desktop, Remote Desktop Service, Second Screen Remoting, Multimedia, and Networking technologies... Read More →
avatar for Jeff Pinkston

Jeff Pinkston

Vice President, Management Engineering, Microsoft
I am Jeff Pinkston, and most people at Microsoft call me by my nickname - Pinky. I am the Vice President of Engineering for the Management team for SCCM and Intune. I love talking to customers to learn where we can do better, and then making that happen. Personally, I love the outdoors... Read More →
avatar for Stefan Kinnestrand

Stefan Kinnestrand

Vice President, Cloud Endpoint Microsoft, Microsoft
Stefan Kinnestrand is the leader of the marketing and GTM strategy for Cloud Endpoints, which aims to advance and transform commercial end user computing for all information and frontline workers. His team oversees Windows Commercial (Windows Client, Windows 365 & Azure Virtual Desktop... Read More →
avatar for Brett Flegg

Brett Flegg

Partner Software Architect, Microsoft
Brett is a software architect and tech blogger who has spent the last two decades building tools and services that enable enterprises to get the most out of their IT infrastructure. The software he has developed (System Center Configuration Manager, Microsoft Endpoint Manager Intune... Read More →
Wednesday September 18, 2024 17:45 - 19:00 CEST
Luzerner Saal
 
Thursday, September 19
 

12:40 CEST

Intune MAM, Conditional Access, actual scenarios and the clown fiesta!
Thursday September 19, 2024 12:40 - 13:40 CEST
We'll dive deep into Intune Mobile Application Management as part of Microsoft Endpoint Manager. We'll go thru the diverse landscape that explain certain identify driven MAM scenarios and their potential issues that drove us nuts. Of course a big part of this is conditional access driven and we will discuss all practical
blockers and workarounds when it goes south.

This session will be focusing specifically on the use case issues and workarounds , less on the theoretical part of Intune mam & CA
Speakers
avatar for Kim Heyrman

Kim Heyrman

Consultant, OB-V-US
Modern workplace IT consultant @itsobvus
avatar for Kenny Buntinx

Kenny Buntinx

CEO, OB-V-US
Kenny is a highly qualified , certified and energized consultant working for OB-V-US Benelux with more than 20 years of experience and strives to always deliver high quality when managing and delivering projects. He has a strong focus on the Microsoft Cloud product family and is an... Read More →
Thursday September 19, 2024 12:40 - 13:40 CEST
Luzerner Saal

12:40 CEST

One Year of Fighting Adversary-in-the-Middle, notes from the field
Thursday September 19, 2024 12:40 - 13:40 CEST
Last 1,5 year we were faced with a new advanced phishing technique, called adversary-in-the-middle. This is an advanced method to bypass multiple forms of MFA.

In this session Kenneth and Erik we do a deep dive into this topic.

First of alll we start with a small demo of the AiTM case

Then we will go through our options to fight this by using differente strategies like implementing phising resistant MFA methodes or using simple Conditional Access policies, or advanced Entra ID P2 Protection methods.

After this session you will have enough information to stop this attack in several ways each with it's own advangtages and drawbacks.


Speakers
avatar for Erik Loef

Erik Loef

CTO, Proxsys
CTO, MSc, CEH, MVP
avatar for Kenneth van Surksum

Kenneth van Surksum

Modern Workplace Consultant, Secure At Work
As a Microsoft 365 Modern Workplace consultant I help customers implement modern workplace solutions based on top of theirMicrosoft 365 licensing, leveraging products like Microsoft Intune, Microsoft Entra, Microsoft Defender, Exchange Online, Microsoft Teams, Microsoft SharePoint... Read More →
Thursday September 19, 2024 12:40 - 13:40 CEST
Clubraum 2

15:20 CEST

Zero Trust - Zero Gap? Spotlight on (new) uncovered aspects of your CA design
Thursday September 19, 2024 15:20 - 16:20 CEST
Conditional Access is the heart of Microsoft's Zero Trust implementation as its policy enforcement engine and Microsoft introduces constantly new features to cover more and more use cases and integrations. This includes granular conditions and controls for specific authentication methods, restricted sessions and authentication flows but also new capabilities to re-trigger a policy evaluation.

In this session, we will discuss the latest features and their use cases and also challenges that you may not address in your current ruleset. Starting from automation for deployment, exclusion handling and gap monitoring, up to missing strong policy design to prevent rogue devices or protect privileged users.
Speakers
avatar for Thomas Naunheim

Thomas Naunheim

Thomas Naunheim is a Cyber Security Architect from Germany and with focus on identity and security solutions in Microsoft Azure. He is working for glueckkanja AG and part of projects to design and implement Microsoft cloud identity and security solutions in enterprise environments.You... Read More →
avatar for Christopher Brumm

Christopher Brumm

Cyber Security Architect, glueckkanja AG
I am a big fan of Microsoft Cloud Security products because there my two favorite topics Identity and Security work together in a unique way. I've been working in IT for quite a while and have almost 15 years of experience in IT security in various roles. At the moment I am a Cybersecurity... Read More →
Thursday September 19, 2024 15:20 - 16:20 CEST
Auditorium

16:40 CEST

Defender for Endpoint on mobile: from Endpoint protection to Zero Trust Network Access
Thursday September 19, 2024 16:40 - 17:40 CEST
During this session you will learn about the three core capabilities of Defender for Endpoint for iOS and Android:
- Defender for Endpoint (Endpoint Protection)
- Microsoft Tunnel
- Microsoft Entra Private Access
You will learn about the various deployment and configuration options and how these impact the end user experience and behaviour.
I will share some notes from the field and tips and tricks how you can further streamline and enhance the deployment of the Defender app.
After you learned how you can deploy and configure MDE on mobile devices to work with the core capabilities, we will go into the subject of Conditional Access and how the signals from the Defender for Endpoint capabilities can support you in enhancing your mobile security posture using Compliance and network signals.
Speakers
avatar for Janic Verboon

Janic Verboon

Senior Endpoint Engineer, baseVISION AG
Endpoint Engineer with interests in everything Intune & Entra related, enjoys a good beer 🍺 and is a big fan of heavy & loud music 🤘
Thursday September 19, 2024 16:40 - 17:40 CEST
Auditorium
 

Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.