Speaker

Morten Thomsen

Morten Thomsen

Cloud Security Architect | Trusted Security Advisor | SECONI

Viborg, Denmark

Actions

Morten is a Cloud Security Architect and Trusted Security Advisor in Denmark. He has been working in the IT business since 2000 with a primary focus on Microsoft infrastructure and last many years with Cloud security, based on technologies like Defender for Endpoint, Defender for Identity, Defender for Office 365, Cloud App Security, Sentinel and Microsoft Information Protection.

Morten is also a Microsoft Certified Trainer and Certified Enterprise Administrator Expert, and hold almost all Microsoft Security certification. Morten has been speaker at the Microsoft Security Day event in Denmark.

Area of Expertise

  • Information & Communications Technology

Maximizing the Value of MDE: Vulnerability Management and Secure Score

Are you looking for ways to improve your organization's security posture and prioritize your infrastructure proactively? Join us for a comprehensive presentation on MDE Vulnerability Management and Secure Score and how to get the full value out of it.

We will delve into the vulnerability management capabilities of Defender for Endpoint, including how to use it to identify and address security risks in your environment. You'll learn how to prioritize and remediate vulnerabilities based on the potential impact on your business, and gain insights into the latest threat intelligence from Microsoft.

We'll also cover details of Secure Score, including how it provides a clear and actionable overview of your organization's security posture. You'll learn how to use Secure Score to prioritize vulnerabilities.

Don't miss this opportunity to learn from the experts and take your vulnerability management to the next level together with Microsoft Secure Score!

ASR Rules... Your best Defence against Ransomware

This session would educate attendees on the importance of using ASR rules in Defender For Endpoint and demonstrate how these rules can be used to effectively defend against ransomware attacks.

Agenda:
1. Overview of ASR rules in Defender for Endpoint and how they work
2. Demonstration of how ASR rules can be used to block common ransomware tactics, such as script-based attacks and process invocation
3. Best practices for configuring and managing ASR rules to maximize protection against ransomware
4. Q&A session to address any remaining questions or concerns

Target Audience: IT professionals, system administrators, and anyone responsible for managing endpoint security in their organization.

Duration: 60 minutes.

Prerequisites: Basic understanding of endpoint security and experience with Windows operating system.

E5 Security Licensing: Unlock the Full Potential of Your Cybersecurity Defense

In this session, I will provide an overview of the features included in the E5 Security licensing package. Attendees will learn about the advanced security capabilities, such as threat protection, incident response, and advanced hunting that are available to protect their organization from cyber threats. I will also discuss the differences between the E5 license and other licensing options and show how the E5 license can be used to enhance and augment an organization's existing security posture. Whether you are a security administrator or IT professional, this session will provide you with valuable information and practical tips on how to better protect your organization from cyber threats by utilizing the full potential of E5 Security licensing.

Target Audience: IT professionals, system administrators, and anyone responsible for managing endpoint security in their organization.

Duration: 45-60 minutes.

Prerequisites: Basic understanding of endpoint security and experience with Windows operating system.

Maximizing the Value of MDE: Vulnerability Management and Secure Score

Are you looking for ways to improve your organization's security posture and prioritize your infrastructure proactively? Join us for a comprehensive presentation on MDE Vulnerability Management and Secure Score and how to get the full value out of it.

We will delve into the vulnerability management capabilities of Defender for Endpoint, including how to use it to identify and address security risks in your environment. You'll learn how to prioritize and remediate vulnerabilities based on the potential impact on your business, and gain insights into the latest threat intelligence from Microsoft.

We'll also cover details of Secure Score, including how it provides a clear and actionable overview of your organization's security posture. You'll learn how to use Secure Score to prioritize vulnerabilities.

Don't miss this opportunity to learn from the experts and take your vulnerability management to the next level together with Microsoft Secure Score!

Target Audience: IT professionals, system administrators, and anyone responsible for managing endpoint security in their organization.

Duration: 60 minutes.

Prerequisites: Basic understanding of endpoint security and experience with Windows operating system.

Boost your security with Microsoft Defender XDR portal

A practical guide to protect your endpoint, email, application and identity!

Do you want to learn how to use the Microsoft Defender XDR portal to improve your security across different domains and products? Do you want to see how to integrate Microsoft Sentinel with the portal to enhance your SOC efficiency and response capabilities? Do you want to hear real-world case studies and success stories from organizations that have successfully implemented Microsoft XDR solutions?

If you answered yes to any of these questions, then this session is for you. In this session, you will:
• Discover what is Microsoft Defender XDR portal and why you need it.
• Learn how the portal si
• mplifies and unifies your security management across endpoint, email, application and identity.
• Find out how to use Secure Score to prioritize tasks and get help to secure your environment.
• Explore how to experience the next level of SOC efficiency with Microsoft Sentinel in Defender portal.
• Learn from real-world examples of how organizations have successfully implemented Microsoft XDR to improve their security posture.

The session will last for one hour and will include a Q&A session where you can ask questions and get answers from the experts.

Don't miss this opportunity to boost your security with Microsoft Defender XDR portal.

Target Audience: IT professionals, system administrators, and anyone responsible for managing security in their organization.

Duration: 60 minutes.

Prerequisites: Basic understanding of Microsoft Defender XDR

Defender XDR Unleashed: Automate Detection and Response the Simple Way

Learn how Microsoft Defender XDR’s custom detection rules unlock powerful yet simple automations, turning threat detection into immediate action. Join us to see hands-on examples of rapid response, simplified workflows, and smarter security.

Automation in cybersecurity is essential, but complexity often prevents effective implementation. In this technical deep-dive, we'll demonstrate how you can leverage custom detection rules in Microsoft Defender XDR to quickly turn detections into effective automated responses—without complexity or heavy customization.

Through 3-5 practical, real-world examples, we'll showcase scenarios such as automatic endpoint isolation upon malware detection, proactive blocking of suspicious user activities, and immediate alert-driven remediation tasks. You'll see step-by-step demonstrations, actionable code snippets, and clear guidelines, making it easy to apply these automations directly in your environment.

By attending, you'll learn:
• How to create powerful but straightforward custom detection rules.
• Strategies for automating immediate security responses with minimal effort.
• Best practices for ensuring reliable, low-maintenance automation.
• Does and don’ts – Real live experience.

This session is ideal for security analysts, engineers, and architects who want actionable insights, simplified security workflows, and immediate improvements to their threat-response capabilities using Microsoft Defender XDR.

Join us and turn your threat detection into rapid, reliable, and simple automated actions.

Microsoft Ignite 2022 After Party!

Microsoft Defender News

November 2022 Viborg, Denmark

Maksimer værdien af investering i Microsoft Security

Håndtering af MS Security Stack og Sentinel

November 2022 Horsens, Denmark

Workplace Ninja Denmark User Group

Session: ASR Rules... Your best Defence against Ransomware

October 2022 Viborg, Denmark

Nordic Virtual Summit 3rd Edition Sessionize Event

March 2022

Nordic Virtual Summit Second EditionSessionize Event

November 2021

Microsoft Security day 2021

Track 5: Cloud Native Security
“Cloud security principles, how do you deliver security in a cloud environment and why is automation Crucial?”

March 2021 Copenhagen, Denmark

Morten Thomsen

Cloud Security Architect | Trusted Security Advisor | SECONI

Viborg, Denmark

Actions

Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.