Most Active Speaker

Peter Schmidt

Peter Schmidt

Cloud & Security Architect, Microsoft MVP: M365 and Security, MCSM: Exchange, MCT.

Kolding, Denmark

Actions

Peter is a Cloud & Security Architect based in Denmark with extensive experience in the IT industry, specializing in Messaging, Collaboration, and Cloud security. Since 1996, he has been a consultant, focusing on technologies such as Microsoft 365, Exchange Server, Microsoft Teams, OneDrive for Business, Office 365, Purview Information Protection, and Microsoft Defender Security products.

Peter holds the prestigious Microsoft Certified Solutions Master (MCSM) certification in Exchange and has been recognized as a Microsoft MVP in Microsoft 365 and Security. He is a seasoned speaker, having presented at numerous high-profile events, including the European SharePoint Conference, European Collab Summit, Nordic Infrastructure Conference, Workplace Ninja Summit, Microsoft Campus Days, and various local User Group events.

In addition to his professional work, Peter leads the Danish WorkPlace Ninja User Group, which focuses on advancing knowledge in Microsoft Modern Workplace, Productivity, and Security.

Awards

Area of Expertise

  • Information & Communications Technology

Topics

  • Office 365
  • Exchange
  • E-mail Security
  • Cyber Security
  • SharePoint Online
  • Office 365 Security
  • Office 365 Identity
  • Azure Active Directory
  • Microsoft 365
  • Microsoft 365 Compliance
  • Microsoft 365 governance and compliance
  • Microsoft 365 Security
  • Microsoft Purview
  • Microsoft Teams
  • Microsoft MVP
  • Microsoft OneDrive
  • Microsoft SharePoint
  • OneDrive For Business
  • Microsoft Defender for Office
  • Microsoft Defender for Endpoint
  • Microsoft Defender Advanced Threat Protection
  • Microsoft Defender for Cloud Apps
  • EntraID
  • Microsoft Entra
  • multi-tenant

Mastering a Tenant-to-Tenant Migration

In this session we will dive into tenant-to-tenant migrations, it could be based on anything from mergers, acquisitions, or consolidations.
What is possible during migration and how do we best plan, test, and migrate data in a tenant-to-tenant project?
Get a good understanding of what is possible and how to plan for a successful migration between tenants, including understanding the data structures and dependencies, managing security and compliance, and ensuring a smooth user experience.
By the end of this session, attendees will have a solid understanding of the challenges and opportunities of tenant-to-tenant migrations, and the tools and techniques required to master them.

Ready, Set, Migrate: A Guide to Tenant-to-Tenant Data Migration

Cross-tenant migrations can be complex and time-consuming, especially if the two tenants have different configurations or use different technologies. In this technical session, we will explore strategies and best practices for successfully executing a cross-tenant migration.

Maximizing the Value of MDE: Vulnerability Management and Secure Score

Are you looking for ways to improve your organization's security posture and prioritize your infrastructure proactively? Join us for a comprehensive presentation on MDE Vulnerability Management and Secure Score and how to get the full value out of it.

We will delve into the vulnerability management capabilities of Defender for Endpoint, including how to use it to identify and address security risks in your environment. You'll learn how to prioritize and remediate vulnerabilities based on the potential impact on your business, and gain insights into the latest threat intelligence from Microsoft.

We'll also cover details of Secure Score, including how it provides a clear and actionable overview of your organization's security posture. You'll learn how to use Secure Score to prioritize vulnerabilities.

Don't miss this opportunity to learn from the experts and take your vulnerability management to the next level together with Microsoft Secure Score!

Mastering Microsoft Security Exposure Management: Become a Security Ninja!

Are you often asked by management about your defenses against phishing emails, ransomware attacks, and how your critical assets are protected, but find it challenging to explain? This session is designed just for you.

During the session, you'll learn how to deepen your grasp of security posture management through detailed exposure insights and explore various security initiatives, including domain-specific and threat-focused areas. You will learn to master attack surface management to identify and mitigate potential attack paths. We'll also teach you how to assess the security status of your infrastructure using detailed metrics and how we recommend how to implement Microsoft's recommendations to enhance your protections.

Furthermore, you'll discover effective strategies for reporting to management in a way that builds trust in your security reporting. Finally, you'll leave equipped with a comprehensive plan for successful implementation, aimed at improving the maturity of processes and organizational support throughout your security journey.

Mastering Email Security: Microsoft Defender for Office Against Phishing

Phishing attacks present an ever-evolving threat to businesses, employing sophisticated techniques to compromise sensitive information. This session targets IT and cybersecurity professionals, focusing on deploying Microsoft Defender for Office (MDO) as a pivotal component of your organization’s defense strategy. You’ll gain insights into configuring MDO to its fullest potential, utilizing AI and machine learning to detect and neutralize phishing attempts before they impact your network.

We will walk you through customizing MDO’s protection policies to align with your organization's requirements, enhancing security with features like Safe Links, Safe Attachments, Impersonation Protection and the latest features.
Practical demonstrations will guide you in setting up these defenses, monitoring for threats, and analyzing reports to gain a comprehensive view of the phishing landscape.

Beyond technical configurations, this session emphasizes the importance of user education, training, and policy development as cornerstone practices for securing your organization against phishing attacks.

You will leave this session with best practices and actionable strategies to implement Microsoft Defender for Office and complementary security measures, ensuring robust protection against email-based threats.

Mastering Microsoft 365: Cross-Tenant Collaboration and Migration Essentials

In the modern enterprise landscape, effective collaboration across Microsoft 365 tenants is crucial, especially for organizations navigating mergers, acquisitions, or strategic partnerships. This session provides a comprehensive guide to mastering cross-tenant collaboration and migration, equipping IT professionals and business leaders with the knowledge and tools necessary to ensure seamless integration and communication across different Microsoft 365 environments.

By the end of this session, participants will have a clear understanding of the strategies, tools, and best practices required to master cross-tenant collaboration and migration in Microsoft 365, positioning their organizations for success in an increasingly interconnected digital environment.

Exchange Server SE: What's Coming and How to Get Ready

The upcoming release of the latest Exchange Server version is set to be released in 2025. What to expect from this new version. What does it mean when running hybrid and do we still need Exchange Server. This session is designed to provide you with a comprehensive overview of what to expect from this new release and how to prepare for it.

AI-Powered Productivity: Navigating the Microsoft Copilots

In the evolving digital landscape, AI is revolutionizing how we approach productivity, and Microsoft Copilot is at the forefront of this transformation. In this session, we will provide an in-depth look into how AI-powered Copilots within the Microsoft ecosystem can enhance personal and organizational productivity.

We will cover the range of Microsoft Copilots available, focusing on those designed for productivity. Copilot works alongside users, generating content, automating repetitive tasks, analyzing data, and improving collaboration. But how does it work? Copilot harnesses the power of AI and natural language processing to understand user prompts, perform contextual actions, and produce meaningful outputs, all while learning from user interactions to continuously improve its capabilities.

Implementing Copilot successfully requires a strategic and secure approach. We’ll discuss the recommended path to implementing Microsoft Copilot in an organization.

By the end of this session, attendees will walk away with a comprehensive understanding of Microsoft Copilot, the licenses needed to deploy it, the key Copilots available to enhance productivity, and a clear, secure path to implementation. This session will equip you with the knowledge and tools to lead your team into the future of AI-enhanced productivity, ensuring you stay ahead in today’s competitive environment.

Navigating Exchange supportability, Mailflow and hybrid management in 2025

A New Exchange Server in the horizon in 2025, this session will cover what is important to know about an important and always critical component of your infrastructure and Microsoft 365.
Supportability
Mailflow - what about our SMTP relay
Management - Hybrid servers or not

Mastering Email Security: Defending Against Phishing with Microsoft Defender for Office

In today’s evolving threat landscape, email remains one of the most vulnerable entry points for cyberattacks, particularly through phishing. With sophisticated attackers constantly refining their tactics, organizations need to stay ahead by deploying robust email security measures. This 60-minute session focuses on the essentials of email security and how to leverage Microsoft Defender for Office (MDO) to protect your organization from phishing and other email-based threats.

We’ll begin by examining the latest trends in email attacks, highlighting the risks and impact of phishing, malware, and business email compromise (BEC). Attendees will learn about the layered security approach necessary for comprehensive protection, with a deep dive into Microsoft Defender for Office’s capabilities. We’ll cover critical features, such as real-time phishing detection, anti-spoofing protection, and automated threat response, along with best practices for policy configuration and user training.

By the end of the session, participants will have a clear understanding of how to:

Identify common phishing tactics and emerging email threats.
Implement Microsoft Defender for Office to strengthen email defenses.
Customize threat protection policies to meet specific organizational needs.
Educate users on recognizing and responding to phishing attempts.
Whether you're an IT administrator, security professional, or anyone responsible for safeguarding your organization’s email environment, this session will equip you with the knowledge and tools to effectively mitigate email-based risks using MDO.

Defender for Business Deep Dive

Join us in a sessio, that dives into the New Defender for Business. Learn all about what is included and how to get started with Defender for Business.

No Phishing Allowed: A Deep Dive into Microsoft Defender for Office and Authtenticated E-mail

Phishing attacks continue to be a major threat to businesses, with attackers using increasingly sophisticated techniques to trick users into revealing sensitive information or infecting their systems with malware.

In this session, you will learn how to implement Microsoft Defender for Office in your organization, and how to use it in conjunction with other anti-phishing strategies. You will also learn how to customize its protection policies to meet the specific needs of your organization, and how to monitor and analyze the reports to understand the threat landscape.

The sessions will provide an overview of best practices for securing your organization against phishing attacks, such as user education, training, and policy development.

After this session, attendees will have a better understanding of how to use Microsoft Defender for Office and other security tools to protect their organizations against email-based threats.

A Hitchhikers Guide to Microsoft Information Protection

All Your Data is now in the Cloud, what's next. This session will show you how to get a good start on data protection using Microsoft Information Protection. Get the full overview of what Microsoft Information Protection is and how it can help protect our data at rest. Covering everything you need to know, to get started with data classification and how to use Sensitivity Labels to protect and your data

Teams Architecture Deep Dive

In this session, we will go deep-dive into the architecture of Microsoft Teams and how Microsoft is using existing Azure and Office 365 technology to make Microsoft Teams a scalable platform, that can perform and is easy to manage.
This session will cover the logical architecture of Teams, where are conversations, images, files, voicemails, and recordings are stored.

NIC Empower 2024 Sessionize Event

November 2024 Oslo, Norway

AI Day 2024

Delivered a Copilot session

November 2024 Århus, Denmark

Workplace Ninjas Denmark User group Sessionize Event

July 2024

CollabSummit 2024

May 2024 Wiesbaden, Germany

Workplace NInja User Group Denmark

Delivered a session about Microsoft 365 backup.

April 2024

6th Cloud8 virtual Summit 2024 Sessionize Event

January 2024

ESPC 2023

December 2023 Amsterdam, The Netherlands

Festive Tech Calendar 2023 Sessionize Event

December 2023

NIC Conf 2023

November 2023 Oslo, Norway

ESPC23 - European SharePoint, Office 365 & Azure Conference Sessionize Event

November 2023 Amsterdam, The Netherlands

AI Day 2024

Delivered a Copilot session.

November 2023 Århus, Denmark

NIC Cloud Connect 2023 Sessionize Event

November 2023 Oslo, Norway

Experts Live User Group Denmark

October 2023

Workplace Ninja Summit 2023 Sessionize Event

September 2023 Baden, Switzerland

Workplace Ninja Summit 2023

Delivered two sessions about E-mail Security and Secure Score.

September 2023 Baden, Switzerland

5th cloud8 virtual Summit 2022 Sessionize Event

September 2022

NIC X Edition Sessionize Event

June 2022 Oslo, Norway

Microsoft 365 Virtual Marathon 2022 Sessionize Event

May 2022

Nordic Virtual Summit 3rd Edition Sessionize Event

March 2022

M365 Below in Chicago! Sessionize Event

January 2022

Nordic Virtual Summit Second Edition Sessionize Event

November 2021

ExpertsLive Norway 2021 Sessionize Event

May 2021 Oslo, Norway

Nordic Virtual Summit Sessionize Event

February 2021

2nd cloud8 virtual Summit in 2020 Sessionize Event

November 2020

Nordic Infrastructure Conference 2020

Nordic Infrastructure Conference 2020
Delivered two sessions about Teams and Security.

February 2020

Microsoft Tech Summit Stockholm 2018

Proctor on a workshop about Microsoft Teamwork (Teams, Groups, OneDrive, Yammer).

April 2018 Stockholm, Sweden

Nordic Infrastructure Conference 2017

Delivered two sessions, one about OneDrive for Business and one about Exchange Online (Office 365).

February 2017 Oslo, Norway

Nordic Infrastructure Conference 2016

Delivered two sessions about Office 365 and Exchange.

February 2016 Oslo, Norway

Nordic Infrastructure Conference 2015

Delivered two sessions about Exchange and Office 365.

January 2015 Oslo, Norway

Peter Schmidt

Cloud & Security Architect, Microsoft MVP: M365 and Security, MCSM: Exchange, MCT.

Kolding, Denmark

Actions

Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.

Jump to top