Speaker

David das Neves

David das Neves

IT Architect

I am a former software architect, ex-Microsoft, and Xoogler. Today, I work as an IT Architect for Munich RE with a dedicated focus on Cloud Computing, Automation, Cybersecurity, and Microsoft Technologies. Besides his work, he writes books, blog articles, organizes user groups, and speaks at other User Groups and Conferences on PowerShell, Security and AI topics all over the world.

Area of Expertise

  • Information & Communications Technology

Topics

  • PowerShell
  • Security
  • Azure
  • Automation

Keynote - what´s next in IT now?

Digital Transformation?! A strong buzzword, which is very often misunderstood. But where is IT really heading to? How does this affect the companies and the working styles?

We will take a look what it means and how all the technical roadmaps are aligning to this strategy.
Azure, ConfigMgr, Windows 10, PowerShell, O365, Intune, IoT and AI are all assisting in this process. The process through the Digital Transformation to not just to use IT as a necessary tool, but to make value out of it.

Be prepared to set the goals.

Windows as a Service - The Big Chance

Did you know that Windows as a Service is a chance for every company to push their direction into Modern IT and doing their first steps through the Digital Transformation? The problem though is that customers very rarely recognize this value and struggle a lot to get their preparation done for Windows as a Service and hit much too often the end of the servicing times. In this session we will explain Windows as a Service for everyone. Afterwards we continue to look at possible adoptions of Windows as Service, which will be highly fed by field-experience and ending then in deep-dived technical advices.
Join this session to get hints and tips on the different states to move into the right direction and letting WaaS be a chance for big transformational projects into Modern IT and not just ending in escalations.

PowerShell Security

PowerShell Security is a very wide topic. Starting with Signing, Logging, WEF, Remoting, Privileged Access Management moving on to enforced Constrained Language Mode, AMSI, JEA, Exploit Guard and much more. But where to start and where to end? We will take a look at the prioritization list and show also how you can set up a best-practice demo environment very easily.

David das Neves

IT Architect

Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.

Jump to top