Speaker

Olav Tvedt

Olav Tvedt

We cannot solve our problem with the same thinking we used when we created them. -Albert Einstein

We cannot solve our problem with the same thinking we used when we created them. -Albert Einstein

Bergen, Norway

Olav, MVP (Azure) for 16 years has been working with customers of different sizes and segments. This has given Olav a foundation he uses during his day-to-day work and presentations.

Olav works as Cloud and API operation manager with SpareBanken Vest and is hosting a «The BlueScreen Brothers» video podcast show on YouTube: https://www.youtube.com/@bluescreenbrothers

For years he has been one of Norway’s most popular speakers and doing international events such as TechDays, NIC, TechED North America/Europe. He was also one of the featured speakers at Ignite 2018 and got Microsoft Norway's honor award 2018 for being a Microsoft pioneer and his heavy expertise in new technologies.

Med lang fartstid som foredragsholder verden rundt på eventer som Ignite, TechED og NIC i mer enn 15 år har Olav lært seg balansen for å formidle det faglige med et glimt i øyet.

Med 15 år som MVP og mer enn 20 år som konsulent, har Olav opparbeidet seg en solid erfaring og forståelse for teknologi. Olav fikk Microsoft Norge sin hederspris i 2018 for sin innsats for å styrke Microsoft omdømme og tunge kompetanse på ny teknologi. Olav jobber nå som driftsansvarlig for sky og API hos Sparebanken Vest, og er vert for podkast serien "BlåSkjerm Brødrene" og YouTube videoer på kanalen https://www.youtube.com/@bluescreenbrothers

Area of Expertise

  • Information & Communications Technology
  • Finance & Banking

Topics

  • Microsoft Office365
  • Microsoft OneDrive
  • Windows Client
  • Cloud & Infrastructure
  • Azure

Strukturert privilegert tilgang til Azure med PIM

Ja vi trenger brukere med forskjellige privilegerte tilganger til Azure, men hvordan kan vi balansere dette med stadig økende behov for mer sikkerhet og innsikt? Microsoft Azure Privileged Identity Management er et kraftig verktøy her, både for Azure AD baserte roller, men også andre Azure resurser. Vi ser på hva du bør tenke på og hvordan komme igang‎

Security from chip to cloud

A walk in the sunshine involves several safety measures, such as shoes to protect your feet, sunglasses for the eyes and sunscreen for what the clothes do not protect. Information and system protection is often far more complex than antiviruses, MFA, and firewalls. In this session, Olav Tvedt and Alexander Rødland will demonstrate and explain the many layers of security that are built layer by layer, from device level to user protection and artificial intelligence in the cloud.

Monitoring Azure AD identity

Identity is without a doubt the corner stone of both security and user experience. But still many organisations seems to not know enough or understand the full value of monitoring and understanding the users authentications.

This session aims to help understand the processes, tools and licenses available. Monitoring and insight is the base of the identity lifecycle, and might just be the key to make the users feel happy and safe. There will be easy but powerfull scripts demonstrated available for the attendees and some tips for the end-users that want to make sure nobody are missusing their identity.

Customizing Windows Sandbox

Windows contains lots of virtualization features that can be useful for developers, for instance inprivate browser etc. But maybe the coolest and most useful are Windows Sandbox.

Useful you say? It’s just an empty Windows!
Grab a chair and let me show, tell and learn you something great

Enhancing the security of your Azure resources with PIM

Many companies are now using PIM (Privileged Identity Management) to control and increase security on Azure AD roles like Global Administrator. But this feature should also be used on Azure resources (Subscriptions, Management groups, Resource groups, and resources) to prevent unwanted access, misuse, and "accidents".

This session focus on the discovery and implementation. Scripts to ease the job will also be made available

Implementing Privileged Identity Management on Azure resources

Many companies are now using PIM (Privileged Identity Management) to control and increase security on Azure AD roles like Global Administrator. But this feature should also be used on Azure resources (Subscriptions, Management groups, Resource groups, and resources) to prevent unwanted access, misuse, and "accidents" from unwanted and wanted users.

This is a matter of cost, stability, and security. With the right mindset, focus, and tools it should be possible for most companies to get started with this quite quickly. But the process might meet both technical and “cultural” challenges.

This session focus on the discovery and implementation phase and scripts to ease the process will also be made available for the attendees.

Are you paying "Money for nothing"?

Whether it was Azure Mark Knopfler and Dire Straits were thinking about when they were singing about money for nothing is a little uncertain, but that many people pay unnecessarily on Azure resources is quite clear.

In this session, I want to highlight things I have personally experienced that can save the company money, sometimes lots of money, and get a little into how the advice given is not necessarily good or correct in every situation.

Malware protection on Windows 10 using Hyper-V

Den innebygde funksjonene gjør langt mer enn å kjøre tradisjonelle klienter og serevere. Den beskytter deg med Windows Defender Application Guard, Windows Sandbox og langt, langt mer

Coping with your identities

For decades we have been doing the same password game, changing password every x number of days and with a minimum of y character. Going into a new area of identity management it seams like we are just change one simple policy set with another, but this is the time to realize that identities and accounts have different needs and values, and must be treated the right way to balance security with usability. The session will cover identities ranging from guest access too break the glass admins.

Securing identity without annoying users

The modern user is pushing the limits and testing all borders, and they want as few restrictions as possible. To make sure the organization’s security needs are met in this mix we can utilize Azure Active Directory Identity Protection. By analyzing user risk and detecting suspicious activities we can make sure annoying security features doesn’t appear before they are necessary,

The Windows 10 Tips you wished you knew last week

When going to a conference it is easy to get lost in what's new, what is coming and what's the next big thing. But wouldn't it be nice to come back to work with a bag full of tips and tricks that would improve both you and your users workday? We will show and tell free tools, give away some of our best scripts and deepest secrets accumulated over years of a headache over late night troubleshooting.

Identity security in a Microsoft environment

The core of everything is the identity of the users, but still it is neglected by many organizations.

In a modern always connected world the users core identity are for many organizations based on Active Directory as a foundation for Azure Active Directory.
In this session we will cover strategies, limitations and possible solutions for making sure that the identities are protected in the best possible way based on roles and functions, both users, power users and admins.

Questions being raised and maybe answered are stuff like this:
• Are Azure MFA the best solution for me?
• Should we look down all users for security sake?
• Is there an easy way of increasing security on domain controllers?

The good, the bad and the ugly of PIM on Azure resources

Privileged Identity Management (PIM) is a crucial component to make sure that necessary permissions are only available in the needed timeframe, for the intended user. So, this means that it should be a key component in your Azure security strategy.

Many organizations have used PIM for a long time to secure Azure AD roles, and it is easy to set it up. But when it comes to Azure resources the story is a bit different, it is still quite easy to get started, but it’s pretty different behind the scenes and when you need to adjust it. This session highlights how it works, what you need to consider, and how to script the process from discovery, and modifications to implementation. All based on months of hard work to get a complex environment into a PIM state.

Cloud Technology Townhall Tallinn 2023 Sessionize Event

February 2023 Tallinn, Estonia

MVP-Dagen 2022 Sessionize Event

October 2022 Oslo, Norway

Scottish Summit 2022 Sessionize Event

June 2022 Glasgow, United Kingdom

Bergen Microsoft Community - December 2021 Sessionize Event

December 2021 Bergen, Norway

MVPDagen 2021 Sessionize Event

November 2021 Oslo, Norway

Bergen Microsoft Community - June 2021 Sessionize Event

June 2021

Bergen Microsoft Community 04 02 2021 Sessionize Event

February 2021

MVP Dagen 2020 Sessionize Event

October 2020 Oslo, Norway

Bergen Microsoft Community 30 09 2020 - Managing and Monitoring Sessionize Event

September 2020 Bergen, Norway

MVP Dagen 2019 Sessionize Event

September 2019 Oslo, Norway

Microsoft TechDays 2018 Sessionize Event

October 2018 Kista, Sweden

MVP Dagen 2018 Sessionize Event

May 2018 Oslo, Norway

Olav Tvedt

We cannot solve our problem with the same thinking we used when we created them. -Albert Einstein

Bergen, Norway

Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.

Jump to top