Most Active Speaker

Jon Jarvis

Jon Jarvis

Principal Architect @ Cisilion, Microsoft MVP & MCT

Sittingbourne, United Kingdom

Microsoft MVP & MCT | Sessionize Top 3% speaker 2022 & 2023

Jon specialises in Microsoft 365 with over 10 years of experience in consultancy, Jon is passionate about Microsoft Workspace products and especially enjoys enabling customer productivity in Microsoft.

Jon is the co-host of the Microsoft Spotlight podcast which has over 50 episodes of talking to Women in Tech about there careers and journeys.

Jon particularly likes talking about Microsoft Security and Windows 365.

Awards

Area of Expertise

  • Information & Communications Technology

Topics

  • Microsoft
  • Microsoft 365
  • Microsoft Teams
  • Microsoft Azure
  • Microsoft Office365
  • Microsoft Technologies
  • Microsoft MVP
  • Microsoft Intune
  • Microsoft 365 Security
  • Windows 365
  • Windows Autopilot
  • Windows 11
  • Windows Virtual Desktop

Women In Tech Roundtable hosted by Microsoft Spotlight Podcast

The Microsoft Spotlight Podcast highlights the importance of Diversity, Equality, and Inclusion within the Microsoft Community.

In this session will talk with a number of high profile Women In Tech about their journey into the world of IT and how as a community we can engage more women to get involved with the IT industry.

This will provide insight into the challenges our panel has faced and how they manage to carve out a successful career in IT, the goals that they have set for themselves and how we can get women in technical or non-technical roles throughout the industry.

Stopping Teams data exfiltration dead using Teams data using Microsoft 365 Endpoint DLP

Stopping Teams data exfiltration dead using Teams data using Microsoft 365 Endpoint DLP

Protecting sensitive data from risky or inappropriate copying, sharing, transfer, or use is a top priority for any organization. Remote working and data sharing across a plethora of corporate and personally owned devices have created renewed emphasis on providing strong and coordinated protection on the endpoint's employees use every day.

Microsoft Endpoint DLP identifies and protects information on endpoints. It extends the activity monitoring and protection capabilities of DLP to sensitive items that are physically stored on Windows 10, Windows 11, and macOS devices. It delivers three core capabilities: Native protection, seamless deployment, and integrated insights.

In this session, Luke will play the disgruntled employee looking to try and conduct some insider data exfiltration using Microsoft Teams with Jose/Jon playing the part of the defenders to try and stop Luke dead in his tracks!

After attending this session, you will understand at a high-level:

What Endpoint DLP is, what are the capabilities and how it can better protect your data
A live demo of Endpoint attacker vs defender
How you can take the insights of Endpoint DLP and integrate it into the Microsoft Sentinel

Technologies in this session will be

Microsoft Teams
Endpoint DLP
Windows 10/11
Microsoft Sentinel

From Diagrams to Code: Automating Infrastructure Provisioning

Manual infrastructure provisioning can be challenging and error-prone, leading to potential security risks and increased complexity. Visualising and automating this process can improve threat modelling capabilities and streamline infrastructure management.

We will cover:

Challenges of manual infrastructure provisioning

Benefits of automating infrastructure provisioning

Using diagrams to visualise infrastructure and threat modelling with Microsoft Threat Modelling Tool

Technical details of (1) translating Visio diagrams into Terraform and Bicep, (2) Importing the diagrams into Microsoft Threat Modelling Tool and (3) AzureRM and AzureAD through IaC “gotchas”

Potential benefits, limitations, and trade-offs of this approach

Integrating with common DevOps tools and workflows

Results of the proof of concept through sample diagrams and generated code, along with lessons learned from the development process.

Attendees will learn about the benefits of automating infrastructure provisioning and how using diagrams to visualize infrastructure can improve threat modelling capabilities. They will also gain a technical understanding of how to translate Visio diagrams into Terraform and Bicep code, as well as insights into the limitations and trade-offs of this approach. Finally, attendees will see a showcase of results and lessons learned, as well as potential use cases and considerations for implementing this approach in their own organizations.

Products: Microsoft Visio, Microsoft Threat Modelling Tool, Azure DevOps, Bicep, Terraform, AzureRM, AzureAD

Unleashing the Power of Code-Driven Virtual Desktop Deployments: AVD & Windows 365

Join us for a comprehensive session on deploying cloud-based virtual desktops with Azure. Jon and Jake will walk you through the process of deploying Azure Virtual Desktop and its supporting infrastructure, using Terraform, Packer and PowerShell, demonstrating the power and versatility of deployment via code.

They will also provide a side-by-side comparison of Windows 365 and Azure Virtual Desktop, highlighting the pros and cons of each solution.

To top it off, they will show you how to deploy Windows 365 via PowerShell, giving you hands-on experience including deploying a custom image via Packer. Whether you're new to virtual desktop deployment or an experienced pro, this session is sure to leave you with valuable insights and practical skills.

This session will cover:
Azure Virtual Desktop
Windows 365
Terraform
Packer
Infrastructure as Code

The Grinch: M365 Edition

Are you tired of Christmas and all the fun it brings? Join this session for a lighthearted session to see how to remove Christmas from your M365 tenant using Microsoft Purview Protection and Defender for Cloud Apps

Supercharge Intune With 5 Community Apps

As more organisations start to use Intune, more members of the community start to create amazing applications to help customers manage their environment. In this session, Dean and Jon will talk about the 5 best Intune applications that have been created by the Microsoft community.

This session will cover applications that will help your organisation:

-Create and deploy standardised images for Windows devices
-Securely manage local administrator username and passwords
-Manage Intune settings
-Clearly document your environment

This session is aimed at administrators of Intune environments who want to proactively manage their environment without relying on costly 3rd party solutions.

Stopping data exfiltration dead using Microsoft 365 Endpoint DLP

Stopping data exfiltration dead using Microsoft 365 Endpoint DLP

Protecting sensitive data from risky or inappropriate copying, sharing, transfer, or use is a top priority for any organization. Remote working and data sharing across a plethora of corporate and personally owned devices have created renewed emphasis on providing strong and coordinated protection on the endpoint's employees use every day.

Microsoft Endpoint DLP identifies and protects information on endpoints. It extends the activity monitoring and protection capabilities of DLP to sensitive items that are physically stored on Windows 10, Windows 11, and macOS devices. It delivers three core capabilities: Native protection, seamless deployment, and integrated insights.

In this session, Luke will play the disgruntled employee looking to try and conduct some insider data exfiltration with Jon playing the part of the defenders to try and stop Luke dead in his tracks!

After attending this session, you will understand at a high-level:

What Endpoint DLP is, what are the capabilities and how it can better protect your data
A live demo of Endpoint attacker vs defender
How you can take the insights of Endpoint DLP and integrate it into the Microsoft Sentinel

Technologies in this session will be

Microsoft Teams
Endpoint DLP
Windows 10/11

Microsoft 365 Security Master Class: the Ongoing Battle to Improve Security

A primary concern of any Microsoft 365 admin that lingers is the security of that tenant! Whether you're an experienced tenant admin looking to hone your security skills or you're just getting to grips with the vast array of features and controls, this workshop is for you.

In this interactive workshop, you'll learn how to configure your tenant to security best practices drawing on broad experience from the expert presenters and built upon trusted guidance from the US Cybersecurity and Infrastructure Security Agency (CISA) and the UK Nation Cyber Security Centre (NCSC).

This workshop will cover three main technical areas, including work in M365, Azure Active Directory, and Microsoft Sentinel. Expect to:
– Learn the end-to-end Microsoft security story;
– Understand how to set security goals and a security strategy;
– Dive into configuration and tooling options in M365;
– Learn tips on to stay up to date with the constant changes;
– Secure an M365 tenant to CISA, NCSC, and Microsoft best practices;
– Set up a best-practice Microsoft Sentinel tenant;
– Identify real threats and produce security findings and recommendations reports; and
– Create and deliver a summary of your report.

For this workshop you'll need an existing M365 tenant you want to perform a security assessment on (optional, otherwise we will help you setup a test tenant on the day) and a device with software for administration of M365 (e.g., Microsoft Edge, PowerShell).

Avoid compliance nightmares with M365 Multi Geo

As the list of data compliance policies grows worldwide, companies need to ensure that their data resides in the correct country or region. This session will dive into Microsoft 365 Multi Geo explaining to attendees the basics of Multi Geo and the journey to ensure that data is in the geographical location that it should be.

The session will cover:
- An Overview of M365 Multi Geo
- Prerequisites for companies who want to use Multi Geo
- How SharePoint differs from other products when it comes to M365 Multi Geo
- How to move data between Preferred Data Locations for Exchange, Teams, OneDrive and SharePoint Online.

This session is aimed at administrators of multi-national companies who need to prepare their M365 tenant to be expanded to additional geographies to meet data residency requirements.

Microsoft 365; Exchange Online; Teams; OneDrive for Business; SharePoint Online

Microsoft 365 Security and Compliance User Group User group Upcoming

Not scheduled yet.

Scottish Summit 2023

August 2023 Manchester, United Kingdom

Global Azure London 2023

May 2023 London, United Kingdom

May 2023 Microsoft 365 Conference

April 2023 Las Vegas, Nevada, United States

Cloud Chat Monthly User group

March 2023

Microsoft Cloud Security User Group User group

November 2022

South Coast Summit 2022

October 2022 Southampton, United Kingdom

Scottish Summit 2022

June 2022 Glasgow, United Kingdom

Jon Jarvis

Principal Architect @ Cisilion, Microsoft MVP & MCT

Sittingbourne, United Kingdom