Most Active Speaker

Peter Schmidt

Peter Schmidt

Cloud & Security Architect, Microsoft MVP: M365, MCSM: Exchange, MCT.

Kolding, Denmark

Actions

Peter is a Cloud & Security Architect based in Denmark with extensive experience in the IT industry, specializing in Messaging, Collaboration, and Cloud security. Since 1996, he has been a consultant, focusing on technologies such as Microsoft 365, Exchange Server, Microsoft Teams, OneDrive for Business, Office 365, Purview Information Protection, and Microsoft Defender Security products.

Peter holds the prestigious Microsoft Certified Solutions Master (MCSM) certification in Exchange and has been recognized as a Microsoft MVP in Microsoft 365. He is a seasoned speaker, having presented at numerous high-profile events, including the European SharePoint Conference, European Collab Summit, Nordic Infrastructure Conference, Workplace Ninja Summit, Microsoft Campus Days, and various local User Group events.

In addition to his professional work, Peter leads the Danish WorkPlace Ninja User Group, which focuses on advancing knowledge in Microsoft Modern Workplace, Productivity, and Security.

Badges

Area of Expertise

  • Information & Communications Technology

Topics

  • Office 365
  • Exchange
  • E-mail Security
  • Cyber Security
  • SharePoint Online
  • Office 365 Security
  • Office 365 Identity
  • Azure Active Directory
  • Microsoft 365
  • Microsoft 365 Compliance
  • Microsoft 365 governance and compliance
  • Microsoft 365 Security
  • Microsoft Purview
  • Microsoft Teams
  • Microsoft MVP
  • Microsoft OneDrive
  • Microsoft SharePoint
  • OneDrive For Business
  • Microsoft Defender for Office
  • Microsoft Defender for Endpoint
  • Microsoft Defender Advanced Threat Protection
  • Microsoft Defender for Cloud Apps
  • EntraID
  • Microsoft Entra
  • multi-tenant
  • Copilot for M365
  • Copilot
  • Microsoft Copilot
  • Microsoft 365 Copilot
  • M365 Copilot
  • Copilot for Microsoft 365
  • Copilot Studio
  • Microsoft 365 Copilot Adoption
  • Copilot/AI
  • chatgpt
  • GenAI
  • GenAI Tools
  • microsoft defender
  • Microsoft XDR
  • Microsoft Defender XDR
  • Email Security
  • AI in Phishing Detection and Email Security
  • m&a
  • Migrations
  • Microsoft 365 Migration
  • Tenant to Tenant Migration
  • Multitenant Organization (MTO)

Mastering A Tenant-to-Tenant Migration in 2026: Advanced Strategies & Best Practices

Microsoft 365 tenant-to-tenant migrations continue to be highly relevant in 2026, driven by mergers, acquisitions, corporate restructuring, and the realities of hybrid work.

This session delivers advanced insights, proven best practices, and the latest tools from Microsoft tailored for 2026. Attendees will learn how to streamline migration processes, minimize downtime, boost user adoption, and maintain compliance and security throughout complex projects.

We’ll cover:
🔹 Real-world insights from complex migrations
🔹 What really gets migrated (and what doesn’t)
🔹 Strategies to handle M&A transitions under tight deadlines

Through real-world scenarios, success stories, and lessons learned, participants will gain practical guidance to confidently manage and optimize tenant migrations in today’s Microsoft 365 environment.

Mastering a Tenant-to-Tenant Migration

In this session we will dive into tenant-to-tenant migrations, it could be based on anything from mergers, acquisitions, or consolidations.
What is possible during migration and how do we best plan, test, and migrate data in a tenant-to-tenant project?
Get a good understanding of what is possible and how to plan for a successful migration between tenants, including understanding the data structures and dependencies, managing security and compliance, and ensuring a smooth user experience.
By the end of this session, attendees will have a solid understanding of the challenges and opportunities of tenant-to-tenant migrations, and the tools and techniques required to master them.

No Phishing Allowed: A Deep Dive into Microsoft Defender for Office and Authtenticated E-mail

Phishing attacks continue to be a major threat to businesses, with attackers using increasingly sophisticated techniques to trick users into revealing sensitive information or infecting their systems with malware.

In this session, you will learn how to implement Microsoft Defender for Office in your organization, and how to use it in conjunction with other anti-phishing strategies. You will also learn how to customize its protection policies to meet the specific needs of your organization, and how to monitor and analyze the reports to understand the threat landscape.

The sessions will provide an overview of best practices for securing your organization against phishing attacks, such as user education, training, and policy development.

After this session, attendees will have a better understanding of how to use Microsoft Defender for Office and other security tools to protect their organizations against email-based threats.

Mastering Email Security using Defender for Office

Phishing attacks present an ever-evolving threat to businesses, employing sophisticated techniques to compromise sensitive information.
This session targets IT and cybersecurity professionals, focusing on deploying Microsoft Defender for Office (MDO) as a pivotal component of your organization’s defense strategy. You’ll gain insights into best practices for configuring MDO to its fullest potential, utilizing AI and machine learning to detect and neutralize phishing attempts before they impact your network.

Covering how to customize MDO’s protection policies to align with your organization's requirements, enhancing security with features like Safe Links, Safe Attachments, Impersonation Protection and the latest features.
Practical demonstrations will guide you in setting up these defenses, monitoring for threats, and analyzing reports to gain a comprehensive view of the phishing landscape.

Beyond technical configurations, this session emphasizes the importance of user education, awareness training as cornerstone practices for securing your organization against phishing attacks.

You will leave this session with best practices and actionable strategies to implement Microsoft Defender for Office and complementary security measures, ensuring robust protection against email-based threats.

AI-Powered Productivity: Navigating the Microsoft Copilots

In the evolving digital landscape, AI is revolutionizing how we approach productivity, and Microsoft Copilot is at the forefront of this transformation. In this session, we will provide an in-depth look into how AI-powered Copilots within the Microsoft ecosystem can enhance personal and organizational productivity.

We will cover the range of Microsoft Copilots available, focusing on those designed for productivity. Copilot works alongside users, generating content, automating repetitive tasks, analyzing data, and improving collaboration. But how does it work? Copilot harnesses the power of AI and natural language processing to understand user prompts, perform contextual actions, and produce meaningful outputs, all while learning from user interactions to continuously improve its capabilities.

Implementing Copilot successfully requires a strategic and secure approach. We’ll discuss the recommended path to implementing Microsoft Copilot in an organization.

By the end of this session, attendees will walk away with a comprehensive understanding of Microsoft 365 Copilot and Cpolit Studio, the licenses needed to deploy it, the key Copilots available to enhance productivity, and a clear, secure path to implementation. This session will equip you with the knowledge and tools to lead your team into the future of AI-enhanced productivity, ensuring you stay ahead in today’s competitive environment.

Mastering Microsoft 365 Security Posture in 2026

In today's dynamic threat landscape, proactively securing your Microsoft 365 environment is more critical than ever.

This session delivers advanced insights and practical strategies to help you strengthen your Microsoft 365 security posture in 2026 and beyond.

Building directly on the global threat trends, we connect the dots from attacker behaviors to Zero Trust principles to actionable Microsoft 365 hardening.

You’ll see how Microsoft Secure Score and Microsoft Defender Vulnerability Management provide a unified, prioritized understanding of organizational risks across identity, devices, apps, and data.

By the end of this session, you will walk away with:
Practical knowledge rooted in the 2026 threat landscape
A clear understanding of how to optimize security posture using Secure Score
A prioritized vulnerability roadmap through Defender Vulnerability Management
How to use tools like Maester for assessment
A coherent Zero Trust alignment model that ties all of it together

This session equips you with a practical roadmap for elevating your Microsoft 365 security posture using the tools and frameworks that matter most: Baseline Mode, Secure Score, Defender, Zero Trust Assessment, and Maester.

Learn how to strengthen your Microsoft 365 security posture using Secure Score, Defender Vulnerability Management, and automated baseline validation with Maester. This session connects the 2026 threat landscape to practical Zero Trust–aligned actions, giving you a clear roadmap for prioritizing risks and improving configuration hygiene across identity, devices, apps, and data.

Microsoft 365 Copilot - Data Governance

Copilot can only be as safe and as useful as the data it’s allowed to ground on.
In 2026, getting Copilot-ready is no longer just about permissions and tidy SharePoint sites. It’s about governance at scale: understanding where sensitive data lives, reducing oversharing, applying label-driven protection, and enforcing policies consistently across Microsoft 365 and Copilot experiences including Copilot Studio and agents.

In this session, I will cover a practical playbook to make your data discoverable to the right people and inaccessible to everyone else. You’ll see how Microsoft Purview capabilities (classification, sensitivity labels, DLP, retention, audit/eDiscovery) and tools such as DSPM combine with identity controls and collaboration settings can reduce risk without killing productivity.

Mastering Email & Collaboration Security in Microsoft 365 using Defender for Office (2026 Edition)

Email security in 2026 isn’t about enabling Defender and hoping it will sort everything out. If the fundamentals aren’t in place, the rest won’t hold. Real protection starts before the first policy with authenticated email, and continues across email, Teams, and how users actually behave.

In this session, we walk through a practical approach to email and collaboration security in Microsoft 365. We start with why SPF, DKIM, and DMARC are non‑negotiable. Without proper email authentication, even a well‑configured Defender for Office 365 setup will struggle with spoofing, phishing, and business email compromise (BEC).
From there, we focus on Defender for Office 365 best practices and what actually matters in real environments:

Anti‑phishing and impersonation protection that reduces real risk
Safe Links and Safe Attachments without ruining the user experience
When preset security policies are enough, and when custom tuning makes sense
Common misconfigurations that lead to blind spots or alert fatigue

Email is no longer the only entry point. We’ll also cover how Defender extends into Microsoft Teams, including protection against malicious links, files, and social engineering attacks that don’t rely on email at all.

We’ll show how Attack Simulator Training fits into a modern security strategy, not as a checkbox exercise, but as a way to reinforce controls, improve reporting, and close the gap between detection and response. The session is based on real customer environments and focuses on practical decisions, tradeoffs, and lessons learned.

Attendees will leave with:
- A clear understanding of why email authentication is foundational to Defender effectiveness
- Practical Defender for Office 365 configuration guidance for both email and Teams
- Insight into common operational mistakes and how to avoid them
- A realistic approach to combining technical controls with user awareness

A Hitchhikers Guide to Microsoft Information Protection

This session gives you a practical overview of Microsoft Purview Information Protection and how to get started with classification and sensitivity labels using Microsoft’s recommended defaults, including preconfigured labels/policies designed to accelerate secure deployments.

You’ll learn how labels become the foundation for controlling sharing and protecting data at rest, and how they connect to downstream controls like DLP, retention, auditing, and eDiscovery especially important when AI tools like Copilot are in the mix.

Microsoft Zero To Hero Community - 2025 User group Sessionize Event Upcoming

Not scheduled yet.

Experts Live Denmark 2026 Sessionize Event

February 2026 Copenhagen, Denmark

Workplace Ninja Summit 2025 Sessionize Event

September 2025 Baden, Switzerland

aMP Hammamet 2025 Sessionize Event

September 2025 Hammamet, Tunisia

India Cloud Security Summit 2025 Sessionize Event

July 2025

European M365 Summit 24.-25. Juni 2025 Sessionize Event

June 2025

Experts Live Denmark 2025 Sessionize Event

March 2025 Copenhagen, Denmark

Festive Tech Calendar 2024 Sessionize Event

December 2024

NIC Empower 2024 Sessionize Event

November 2024 Oslo, Norway

AI Day 2024

Delivered a Copilot session

November 2024 Århus, Denmark

CollabSummit 2024

May 2024 Wiesbaden, Germany

Workplace NInja User Group Denmark

Delivered a session about Microsoft 365 backup.

April 2024

6th Cloud8 virtual Summit 2024 Sessionize Event

January 2024

ESPC 2023

December 2023 Amsterdam, The Netherlands

Festive Tech Calendar 2023 Sessionize Event

December 2023

NIC Conf 2023

November 2023 Oslo, Norway

ESPC23 - European SharePoint, Office 365 & Azure Conference Sessionize Event

November 2023 Amsterdam, The Netherlands

AI Day 2024

Delivered a Copilot session.

November 2023 Århus, Denmark

NIC Cloud Connect 2023 Sessionize Event

November 2023 Oslo, Norway

Experts Live User Group Denmark

October 2023

Workplace Ninja Summit 2023 Sessionize Event

September 2023 Baden, Switzerland

Workplace Ninja Summit 2023

Delivered two sessions about E-mail Security and Secure Score.

September 2023 Baden, Switzerland

5th cloud8 virtual Summit 2022 Sessionize Event

September 2022

NIC X Edition Sessionize Event

June 2022 Oslo, Norway

Microsoft 365 Virtual Marathon 2022 Sessionize Event

May 2022

Nordic Virtual Summit 3rd Edition Sessionize Event

March 2022

M365 Below in Chicago! Sessionize Event

January 2022

Nordic Virtual Summit Second Edition Sessionize Event

November 2021

ExpertsLive Norway 2021 Sessionize Event

May 2021 Oslo, Norway

Nordic Virtual Summit Sessionize Event

February 2021

2nd cloud8 virtual Summit in 2020 Sessionize Event

November 2020

Nordic Infrastructure Conference 2020

Nordic Infrastructure Conference 2020
Delivered two sessions about Teams and Security.

February 2020

Microsoft Tech Summit Stockholm 2018

Proctor on a workshop about Microsoft Teamwork (Teams, Groups, OneDrive, Yammer).

April 2018 Stockholm, Sweden

Nordic Infrastructure Conference 2017

Delivered two sessions, one about OneDrive for Business and one about Exchange Online (Office 365).

February 2017 Oslo, Norway

Nordic Infrastructure Conference 2016

Delivered two sessions about Office 365 and Exchange.

February 2016 Oslo, Norway

Nordic Infrastructure Conference 2015

Delivered two sessions about Exchange and Office 365.

January 2015 Oslo, Norway

Peter Schmidt

Cloud & Security Architect, Microsoft MVP: M365, MCSM: Exchange, MCT.

Kolding, Denmark

Actions

Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.

Jump to top