Peter Schmidt
Cloud & Security Architect, Microsoft MVP: M365, MCSM: Exchange, MCT.
Kolding, Denmark
Actions
Peter is a Cloud & Security Architect based in Denmark with extensive experience in the IT industry, specializing in Messaging, Collaboration, and Cloud security. Since 1996, he has been a consultant, focusing on technologies such as Microsoft 365, Exchange Server, Microsoft Teams, OneDrive for Business, Office 365, Purview Information Protection, and Microsoft Defender Security products.
Peter holds the prestigious Microsoft Certified Solutions Master (MCSM) certification in Exchange and has been recognized as a Microsoft MVP in Microsoft 365. He is a seasoned speaker, having presented at numerous high-profile events, including the European SharePoint Conference, European Collab Summit, Nordic Infrastructure Conference, Workplace Ninja Summit, Microsoft Campus Days, and various local User Group events.
In addition to his professional work, Peter leads the Danish WorkPlace Ninja User Group, which focuses on advancing knowledge in Microsoft Modern Workplace, Productivity, and Security.
Area of Expertise
Topics
Mastering A Tenant-to-Tenant Migration in 2026: Advanced Strategies & Best Practices
Microsoft 365 tenant-to-tenant migrations continue to be highly relevant in 2026, driven by mergers, acquisitions, corporate restructuring, and the realities of hybrid work.
This session delivers advanced insights, proven best practices, and the latest tools from Microsoft tailored for 2026. Attendees will learn how to streamline migration processes, minimize downtime, boost user adoption, and maintain compliance and security throughout complex projects.
We’ll cover:
🔹 Real-world insights from complex migrations
🔹 What really gets migrated (and what doesn’t)
🔹 Strategies to handle M&A transitions under tight deadlines
Through real-world scenarios, success stories, and lessons learned, participants will gain practical guidance to confidently manage and optimize tenant migrations in today’s Microsoft 365 environment.
Mastering a Tenant-to-Tenant Migration
In this session we will dive into tenant-to-tenant migrations, it could be based on anything from mergers, acquisitions, or consolidations.
What is possible during migration and how do we best plan, test, and migrate data in a tenant-to-tenant project?
Get a good understanding of what is possible and how to plan for a successful migration between tenants, including understanding the data structures and dependencies, managing security and compliance, and ensuring a smooth user experience.
By the end of this session, attendees will have a solid understanding of the challenges and opportunities of tenant-to-tenant migrations, and the tools and techniques required to master them.
No Phishing Allowed: A Deep Dive into Microsoft Defender for Office and Authtenticated E-mail
Phishing attacks continue to be a major threat to businesses, with attackers using increasingly sophisticated techniques to trick users into revealing sensitive information or infecting their systems with malware.
In this session, you will learn how to implement Microsoft Defender for Office in your organization, and how to use it in conjunction with other anti-phishing strategies. You will also learn how to customize its protection policies to meet the specific needs of your organization, and how to monitor and analyze the reports to understand the threat landscape.
The sessions will provide an overview of best practices for securing your organization against phishing attacks, such as user education, training, and policy development.
After this session, attendees will have a better understanding of how to use Microsoft Defender for Office and other security tools to protect their organizations against email-based threats.
Mastering Email Security using Defender for Office
Phishing attacks present an ever-evolving threat to businesses, employing sophisticated techniques to compromise sensitive information.
This session targets IT and cybersecurity professionals, focusing on deploying Microsoft Defender for Office (MDO) as a pivotal component of your organization’s defense strategy. You’ll gain insights into best practices for configuring MDO to its fullest potential, utilizing AI and machine learning to detect and neutralize phishing attempts before they impact your network.
Covering how to customize MDO’s protection policies to align with your organization's requirements, enhancing security with features like Safe Links, Safe Attachments, Impersonation Protection and the latest features.
Practical demonstrations will guide you in setting up these defenses, monitoring for threats, and analyzing reports to gain a comprehensive view of the phishing landscape.
Beyond technical configurations, this session emphasizes the importance of user education, awareness training as cornerstone practices for securing your organization against phishing attacks.
You will leave this session with best practices and actionable strategies to implement Microsoft Defender for Office and complementary security measures, ensuring robust protection against email-based threats.
AI-Powered Productivity: Navigating the Microsoft Copilots
In the evolving digital landscape, AI is revolutionizing how we approach productivity, and Microsoft Copilot is at the forefront of this transformation. In this session, we will provide an in-depth look into how AI-powered Copilots within the Microsoft ecosystem can enhance personal and organizational productivity.
We will cover the range of Microsoft Copilots available, focusing on those designed for productivity. Copilot works alongside users, generating content, automating repetitive tasks, analyzing data, and improving collaboration. But how does it work? Copilot harnesses the power of AI and natural language processing to understand user prompts, perform contextual actions, and produce meaningful outputs, all while learning from user interactions to continuously improve its capabilities.
Implementing Copilot successfully requires a strategic and secure approach. We’ll discuss the recommended path to implementing Microsoft Copilot in an organization.
By the end of this session, attendees will walk away with a comprehensive understanding of Microsoft 365 Copilot and Cpolit Studio, the licenses needed to deploy it, the key Copilots available to enhance productivity, and a clear, secure path to implementation. This session will equip you with the knowledge and tools to lead your team into the future of AI-enhanced productivity, ensuring you stay ahead in today’s competitive environment.
Mastering Microsoft 365 Security Posture in 2026
In today's dynamic threat landscape, proactively securing your Microsoft 365 environment is more critical than ever.
This session delivers advanced insights and practical strategies to help you strengthen your Microsoft 365 security posture in 2026 and beyond.
Building directly on the global threat trends, we connect the dots from attacker behaviors to Zero Trust principles to actionable Microsoft 365 hardening.
You’ll see how Microsoft Secure Score and Microsoft Defender Vulnerability Management provide a unified, prioritized understanding of organizational risks across identity, devices, apps, and data.
By the end of this session, you will walk away with:
Practical knowledge rooted in the 2026 threat landscape
A clear understanding of how to optimize security posture using Secure Score
A prioritized vulnerability roadmap through Defender Vulnerability Management
How to use tools like Maester for assessment
A coherent Zero Trust alignment model that ties all of it together
This session equips you with a practical roadmap for elevating your Microsoft 365 security posture using the tools and frameworks that matter most: Baseline Mode, Secure Score, Defender, Zero Trust Assessment, and Maester.
Learn how to strengthen your Microsoft 365 security posture using Secure Score, Defender Vulnerability Management, and automated baseline validation with Maester. This session connects the 2026 threat landscape to practical Zero Trust–aligned actions, giving you a clear roadmap for prioritizing risks and improving configuration hygiene across identity, devices, apps, and data.
Microsoft 365 Copilot - Data Governance
Copilot can only be as safe and as useful as the data it’s allowed to ground on.
In 2026, getting Copilot-ready is no longer just about permissions and tidy SharePoint sites. It’s about governance at scale: understanding where sensitive data lives, reducing oversharing, applying label-driven protection, and enforcing policies consistently across Microsoft 365 and Copilot experiences including Copilot Studio and agents.
In this session, I will cover a practical playbook to make your data discoverable to the right people and inaccessible to everyone else. You’ll see how Microsoft Purview capabilities (classification, sensitivity labels, DLP, retention, audit/eDiscovery) and tools such as DSPM combine with identity controls and collaboration settings can reduce risk without killing productivity.
Mastering Email & Collaboration Security in Microsoft 365 using Defender for Office (2026 Edition)
Email security in 2026 isn’t about enabling Defender and hoping it will sort everything out. If the fundamentals aren’t in place, the rest won’t hold. Real protection starts before the first policy with authenticated email, and continues across email, Teams, and how users actually behave.
In this session, we walk through a practical approach to email and collaboration security in Microsoft 365. We start with why SPF, DKIM, and DMARC are non‑negotiable. Without proper email authentication, even a well‑configured Defender for Office 365 setup will struggle with spoofing, phishing, and business email compromise (BEC).
From there, we focus on Defender for Office 365 best practices and what actually matters in real environments:
Anti‑phishing and impersonation protection that reduces real risk
Safe Links and Safe Attachments without ruining the user experience
When preset security policies are enough, and when custom tuning makes sense
Common misconfigurations that lead to blind spots or alert fatigue
Email is no longer the only entry point. We’ll also cover how Defender extends into Microsoft Teams, including protection against malicious links, files, and social engineering attacks that don’t rely on email at all.
We’ll show how Attack Simulator Training fits into a modern security strategy, not as a checkbox exercise, but as a way to reinforce controls, improve reporting, and close the gap between detection and response. The session is based on real customer environments and focuses on practical decisions, tradeoffs, and lessons learned.
Attendees will leave with:
- A clear understanding of why email authentication is foundational to Defender effectiveness
- Practical Defender for Office 365 configuration guidance for both email and Teams
- Insight into common operational mistakes and how to avoid them
- A realistic approach to combining technical controls with user awareness
A Hitchhikers Guide to Microsoft Information Protection
This session gives you a practical overview of Microsoft Purview Information Protection and how to get started with classification and sensitivity labels using Microsoft’s recommended defaults, including preconfigured labels/policies designed to accelerate secure deployments.
You’ll learn how labels become the foundation for controlling sharing and protecting data at rest, and how they connect to downstream controls like DLP, retention, auditing, and eDiscovery especially important when AI tools like Copilot are in the mix.
Microsoft Zero To Hero Community - 2025 User group Sessionize Event Upcoming
Experts Live Denmark 2026 Sessionize Event
Workplace Ninja Summit 2025 Sessionize Event
aMP Hammamet 2025 Sessionize Event
India Cloud Security Summit 2025 Sessionize Event
European M365 Summit 24.-25. Juni 2025 Sessionize Event
Experts Live Denmark 2025 Sessionize Event
Festive Tech Calendar 2024 Sessionize Event
NIC Empower 2024 Sessionize Event
AI Day 2024
Delivered a Copilot session
Workplace NInja User Group Denmark
Delivered a session about Microsoft 365 backup.
6th Cloud8 virtual Summit 2024 Sessionize Event
Festive Tech Calendar 2023 Sessionize Event
ESPC23 - European SharePoint, Office 365 & Azure Conference Sessionize Event
AI Day 2024
Delivered a Copilot session.
NIC Cloud Connect 2023 Sessionize Event
Experts Live User Group Denmark
Workplace Ninja Summit 2023 Sessionize Event
Workplace Ninja Summit 2023
Delivered two sessions about E-mail Security and Secure Score.
5th cloud8 virtual Summit 2022 Sessionize Event
NIC X Edition Sessionize Event
Microsoft 365 Virtual Marathon 2022 Sessionize Event
Nordic Virtual Summit 3rd Edition Sessionize Event
M365 Below in Chicago! Sessionize Event
Nordic Virtual Summit Second Edition Sessionize Event
ExpertsLive Norway 2021 Sessionize Event
Nordic Virtual Summit Sessionize Event
2nd cloud8 virtual Summit in 2020 Sessionize Event
Nordic Infrastructure Conference 2020
Nordic Infrastructure Conference 2020
Delivered two sessions about Teams and Security.
Microsoft Tech Summit Stockholm 2018
Proctor on a workshop about Microsoft Teamwork (Teams, Groups, OneDrive, Yammer).
Nordic Infrastructure Conference 2017
Delivered two sessions, one about OneDrive for Business and one about Exchange Online (Office 365).
Nordic Infrastructure Conference 2016
Delivered two sessions about Office 365 and Exchange.
Nordic Infrastructure Conference 2015
Delivered two sessions about Exchange and Office 365.
Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.
Jump to top