Most Active Speaker

Ewelina Paczkowska

Ewelina Paczkowska

Solution Architect at Threatscape

Actions

Ewelina is a dedicated Solution Architect at Threatscape that specialises in Microsoft Purview and holds certifications like Cybersecurity Architect Expert and Azure Security Engineer. Creator of the blog Welka’s World.

Badges

  • Most Active Speaker 2025

Intune and Purview – Better Together

Purview protects data - but only if your devices play by the rules. Enter Intune.
This session shows how Intune enables successful Purview deployment, from onboarding devices into Defender and Purview, to deploying the Purview Browser Extension, to enforcing DLP and Insider Risk policies at the endpoint.
I’ll also cover how Intune can help control Shadow AI tools before they leak sensitive data.
If you want to make Purview actually effective across your environment, Intune is the missing piece - and this session shows exactly how to use it.
Technologies Covered
• Microsoft Intune
• Purview Data Loss Prevention (DLP)
• Purview Insider Risk Management

Shadow AI Is the New Shadow IT: Spot It, Stop It, Secure It

AI is in your org - whether you like it or not. This session explores how generative AI tools like ChatGPT, Copilot, and third-party browser extensions are creating new data exfiltration risks. Learn how to detect shadow AI use, secure data access, and create guardrails for responsible AI adoption across Microsoft 365.

Secure Your M365 Tenant Like a Boss (Admin Tips You’ll Thank Me For)

Think your Microsoft 365 tenant is secure? Think again. This session delivers 20+ hard-earned lessons from the field to help you truly lock down your M365 environment. We’ll go deep into the hidden settings across Microsoft 365 admin centers - Entra, Intune, SharePoint, Teams, and beyond - and reveal the real-world misconfigurations, permission pitfalls, and policy blind spots you didn’t know you had. Skip the fluff and leave with actionable steps you can apply immediately.

Zero to Hero: Adaptive Protection with Insider Risk Management and Conditional Access

In today’s threat landscape, insider risks - from data theft to inadvertent leaks - pose significant security challenges. This advanced session dives into Microsoft’s latest adaptive protection capabilities, using Insider Risk Management and Conditional Access to dynamically mitigate these risks. Through demonstrations, attendees will see firsthand how to configure context-aware policies that respond to specific user behaviours, applying appropriate access restrictions while maintaining productivity. We’ll also cover best practices for leveraging machine learning to identify critical risks, enabling you to automate responses that protect sensitive information. This 300-400 level technical session promises actionable insights for securing against insider threats with innovative Microsoft tools.

Zero to Hero: Adaptive Protection with Insider Risk Management and Conditional Access

In today’s threat landscape, insider risks - from data theft to inadvertent leaks - pose significant security challenges. This advanced session dives into Microsoft’s latest adaptive protection capabilities, using Insider Risk Management and Conditional Access to dynamically mitigate these risks. Through demonstrations, attendees will see firsthand how to configure context-aware policies that respond to specific user behaviours, applying appropriate access restrictions while maintaining productivity. We’ll also cover best practices for leveraging machine learning to identify critical risks, enabling you to automate responses that protect sensitive information. This 300-400 level technical session promises actionable insights for securing against insider threats with innovative Microsoft tools.

Zero to Hero: Adaptive Protection with Insider Risk Management and Conditional Access

Whether you’re new to insider risk management or an experienced IT pro, this session will empower you to protect your organisation from internal threats with Microsoft’s adaptive protection solutions. Insider risks can lead to data leakage, IP theft, and compliance violations, but traditional security measures often miss these threats. We’ll explore how to use Microsoft Purview’s machine learning-powered insights and Entra Conditional Access to identify high-risk user activities in real-time, dynamically adjusting policies based on insider risk signals. This “zero to hero” journey will give you the skills to configure effective, context-aware security controls that maintain productivity while proactively mitigating insider risks.

Zero to Hero: Adaptive Protection with Insider Risk Management and Conditional Access

In today’s threat landscape, insider risks - from data theft to inadvertent leaks - pose significant security challenges. This advanced session dives into Microsoft’s latest adaptive protection capabilities, using Insider Risk Management and Conditional Access to dynamically mitigate these risks. Through demonstrations, attendees will see firsthand how to configure context-aware policies that respond to specific user behaviours, applying appropriate access restrictions while maintaining productivity. We’ll also cover best practices for leveraging machine learning to identify critical risks, enabling you to automate responses that protect sensitive information. This 300-400 level technical session promises actionable insights for securing against insider threats with innovative Microsoft tools.

Ewelina Paczkowska

Solution Architect at Threatscape

Actions

Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.

Jump to top