David Sass
Security Engineer @ Switch
Zürich, Switzerland
Actions
David is a highly skilled SharePoint Guy who is focusing on Automation, Compliance, Security, Operational Excellence, Quality Assurance and hacking the unexpected out from the technology stack.
Area of Expertise
Topics
Winget inside Intune remediation scripts
Are you struggling to justify yet another subscription at work while bored to death by managing updates for the various software used across your organization?
In this session, we’ll explore how to integrate Winget into PowerShell scripts and deliver them to your Windows devices using Intune’s remediation scripts feature. We’ll also cover techniques for gathering logs and other complex information, tasks that would otherwise require paid add-ons from the Intune Suite.
After attending this session, you’ll spend far less time patching and - hopefully - avoid wasting countless hours troubleshooting scripts like I once did.
If you need to convince your manager to let you attend PSConfEU, just tell them this session alone will pay for itself before the year is over.
VS Code Extension Deployment with Intune
The VS Code extension marketplace is a double-edged sword: it gives us countless extensions which make our lives a lot easier, but on the other hand it contains malicious extensions impersonating popular tools or just plain simple info stealers. This means there is a significant risk that these extensions can leak your developer credentials together with your source code, and as is stands today we lack a clear way to manage these risk.
In this session, we’ll design and implement a governance solution using the combination of PowerShell, CI/CD workflows, pipelines, and artifacts together with code scanning, and finally with Intune to mitigate these risks. By the end, you’ll have a framework adaptable to other package ecosystems like NuGet and npm, bringing a scalable, enterprise-ready layer of security to your development workflows.
Don’t leave your developers at risk—join us to tackle this challenge head-on!
Building SOC Tools on Stage
In a purely Defender XDR based Security Operations Center, repetitive workflows executed in the browser are more than an annoyance—they’re a risk. To make things works SOC environments are usually high on stress, and demand efficiency and accuracy, not time-wasting tasks like copy-paste and looking information up at multiple places and across multiple browser tabs.
In this session, I’ll demonstrate how I used PowerShell Notebooks to develop tools that eliminated almost all of this browser based repetitive work, increased efficiency, and enhanced incident response. Expect live demos of tools in use, all designed to scale SOC capabilities without adding licensing costs.
Prerequisite: Watch Execute Notebooks Everywhere from PSConfEU 2024. This session will arm you with actionable insights to improve your SOC’s performance and drive down costs.
Execute Notebooks everywhere
Have a lot of script files laying around unorganized because you already forgot what is in them? You wish it was easier to know what they did without running them again?
While there is no magic wand to solve this problem, we can still turn to PowerShell Notebooks to hold our scripts and our knowledge for both our future self and as well for the next person on the job.
In this session we'll focus on how we can elevate our scripting game to a next level using PowerShell Notebooks as a replacement of PowerShell scripts to experiment more quicker and even document what we cooked in a hurry before we had to jump on some other work item.
Hitchhiker's Guide to Multitenant environments
There are very few things more annoying in scripting than wanting to deploy into subscription/tenant A and instead deploying into subscription/tenant B.
When managing Azure Resources in multiple tenants or just in multiple subscriptions for your in-house infrastructure or your own public SaaS offering it is important to only execute commands or scripts in the right context.
With the combination of terminal profiles, PowerShell startup conditions, and customized environment variables we can add guardrails to our everyday working environment to make sure we *not* running our scripts against the wrong environment.
First step of IaC is Configuration Monitoring
First step of Infrastructure as Code: configuration monitoring. If we are honest to each other IaC is a huge step if we don't have the means in place to ensure or validate IaC did what we wanted from it. This session focuses on the foundation on which we can build on and that is Configuration Monitoring.
Bypass and abuse a next-gen antimalware
In 2019 I was debugging, and I ran into some exceptions which were not created by my code, but a Next-Generational AI based antimalware which has injected its code into my script. The sorry about how I debugged their code. How I bypassed its detection, and later how I abused the detection itself to load and execute my code as SYSTEM.
Tips and tricks for when you don't have local admin rights
Most training is meant to target sysadmins with a focus on features like remote management or active directory, but there are lots of places whereas end users don't get local admin rights. This session will show you some handy tools and tricks what we all could use to boost our productivity.
PowerShell Conference Europe 2025 Sessionize Event Upcoming
psconf.eu 2024 Sessionize Event
psconf.eu 2023 Sessionize Event
psconf.eu 2022 Sessionize Event
Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.
Jump to top