Marius Skovli
Microsoft MVP, Security | Identity & Access - Zero Trust
Oslo, Norway
Actions
With over 20 years of experience in the IT sector, I have developed a specialization in identity and endpoint security and management, with a particular focus on infrastructure. As a Principal Consultant, I have demonstrated expertise in both Information Technology (IT) and Operational Technology (OT), giving me a unique ability to understand and solve complex technological challenges.
My key competencies include:
Deep Knowledge of Microsoft Cloud Solutions: I possess extensive experience in assisting clients to integrate and maximize the potential of Microsoft's cloud-based solutions, including Azure, Azure Stack HCI, and Microsoft 365. I am skilled in implementing these technologies in line with the Zero-Trust security model, to balance security, risk, and productivity.
Expertise in Identity and Endpoint Management: I have extensive experience in identity and endpoint management, offering specialized knowledge in analysis, mapping, and development of customized solutions. My expertise also includes securing access and privileged roles, which are crucial in modern IT infrastructures.
Design and Architecture: A significant part of my expertise lies in the design and architecture of IT solutions. I have demonstrated the ability to develop and implement robust, scalable, and secure system architectures. This ability is crucial to ensure that IT infrastructure not only meets current needs but is also prepared for future technological developments and business requirements.
Customized Client Approach: In my role as a key person in the company, I prioritize understanding and adapting to each client's unique environment and business needs. My approach is to tailor technological solutions that reflect the individual DNA of clients, ensuring that these solutions not only meet their current business objectives but are also flexible enough to adapt to future growth and change. This client-focused strategy allows us to offer solutions as unique and varied as the clients themselves.
Role as a Microsoft MVP: My role as a Microsoft MVP attests to my ability to keep pace with rapid technological development and contribute to professional communities through knowledge sharing and innovation. I am passionate about using my extensive experience to drive forward technological solutions that address the challenges of today and tomorrow in IT and OT infrastructure.
I am passionately committed to utilizing my extensive experience and expertise to drive innovation and security solutions that meet the ever-changing needs within IT and OT infrastructure.
Links
Area of Expertise
Topics
Endpoint Avengers: Power-Up with Intune Suite's Advanced Management Powers
Let´s dive into the advanced capabilities of Microsoft Intune Suite and learn how to enhance your endpoint management and security. This session will provide you with the technical know-how to leverage Intune's new powerful features for efficient IT operations and robust security. Get ready to become an Endpoint Avenger with practical insights and real-world feedback.
Learn:
- Intune Suite Architecture where we will look at and understand the key components of Intune Suite and where it fits in.
- Microsoft Intune Endpoint Privilege Management:
A feature that allows standard users to perform elevations approved by their organization.
-Microsoft Cloud PKI:
A public key infrastructure (PKI) solution that allows customers to create multiple certificate authorities and manage the lifecycle of certificates issued to Intune-managed devices.
- Microsoft Intune Enterprise Application Management:
A solution that enables easy app discovery, deployment, and updating using a securely hosted enterprise app catalog.
-Microsoft Intune Advanced Analytics
A set of analytics-driven capabilities that help IT admins understand, anticipate, and improve end-user experiences.
- Microsoft Intune Remote Help
A cloud-based solution that enables secure helpdesk-to-user connections.
- Microsoft Intune Tunnel for Mobile Application Management:
A lightweight VPN solution for iOS and Android mobile devices that does not require device enrollment.
Securing the Crown Jewels: Advanced PAM Solutions for Azure, M365 and your Hybrid Cloud
Technical dive into advanced Privileged Access Management (PAM) solutions on how to secure your organization's critical infrastructure.
This session will focus on implementing robust security measures using Entra ID, Intune, Microsoft Defender, and other key Microsoft tools. We will explore how to leverage these technologies to minimize attack surfaces, ensure accountability and traceability, maintain regulatory compliance, and enhance monitoring capabilities.
Key principles such as Just-In-Time (JIT) access, Zero Trust architecture, clean source, and Privileged Identity Management (PIM) will be covered to reduce risks and protect your most valuable assets. Additionally, we'll delve into Identity Governance, Privileged Access Workstations (PAW), and other advanced strategies like Conditional Access, Strong Authentication, and Tiering to ensure robust security for Azure, Microsoft 365, and hybrid cloud environments like Hyper-V and Azure Stack HCI which is still based on Active Directory.
With a tiered approach, we will also look into how to separate security levels between Enterprise, Specialized, and Privileged to provide tailored security measures for different asset and identity classes. This segmentation ensures that the strongest security is applied to the highest impact assets and accounts, while maintaining efficiency and manageability.
The goal is to provide a practical approach on how you can use Microsoft technology to control and monitor access and access paths to your infrastructure, effectively securing your "Crown Jewels."
Lock it Down! Mastering Conditional Access & MFA for Ultimate Data Security and User Agility
Fortify your digital borders!
In today's hyper-connected world, users expect to work seamlessly from anywhere, on any device. But with increased mobility comes the need for greater vigilance. Conditional Access (CA) and Multi-Factor Authentication (MFA) aren't just add-ons—they're essential to keeping your data safe from unauthorized access while enabling productivity. This session dives deep into the latest in CA and MFA, guiding you through both fundamental setups and advanced techniques that keep your organization secure.
Expect to walk away with a comprehensive understanding of Conditional Access beyond just the basics. We’ll explore:
Housekeeping: Best practices for maintaining CA policies that are robust, effective, and adaptable.
Monitoring & Reporting: Keep an eye on who’s trying to access your network—how to track and log the activity that matters.
Backup & Restore: Never fear policy misconfigurations again with strategies for backing up and restoring CA policies quickly.
Blocking Unwanted Access: Learn to block risky sign-ins based on device, location, or authentication methods, and ensure only the right people get through.
Securing Non-Managed Devices: Ensure seamless but safe access to SharePoint, OneDrive, and more from non-managed devices.
Azure Identity Protection: How Identity Protection integrates into your CA strategy to mitigate risk proactively.
Privileged & Guest User Security: Break-the-glass accounts and guest user management—strategies to keep them safe without slowing things down.
Latest Features & Cutting-Edge Possibilities: From Continuous Access Evaluation (CAE) to emerging AI-driven identity protections, stay ahead of the curve with the newest tools in Microsoft’s arsenal.
Lock it Down! Learn how to leverage Conditional Access and MFA to keep your corporate data safe and empower your users to work from anywhere without compromise. This session will cover everything from getting started to advanced security measures.
MVP-Dagen(e) 2024 Sessionize Event
Marius Skovli
Microsoft MVP, Security | Identity & Access - Zero Trust
Oslo, Norway
Links
Actions
Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.
Jump to top