Speaker

Robbe Van den Daele

Robbe Van den Daele

MC2MC | SSCP | Security Consultant & SOC Engineer

Brussels, Belgium

Actions

I'm Robbe, an information security professional driven by a genuine passion for my work. My focus lies in Cloud Security, Purple Teaming, Microsoft Security Solutions, and the powerful MITRE ATT&CK framework.

With a strong foundation in computer science, I've delved into the intricacies of information security, mastering technical aspects and procedural complexities. Cloud security became my niche, where I secure data, design resilient architectures, and implement robust measures.

As a purple teamer, I excel at detecting and mitigating cybersecurity threats, identifying vulnerabilities, and fortifying defenses. I've embraced the invaluable MITRE ATT&CK framework, consulting organizations on understanding adversaries and strengthening their security posture.

I'm driven by a thirst for knowledge, constantly staying ahead of industry trends through engagement with information security communities, conferences, and continuous learning. I try to give as much as possible back to the cybersecurity community, by blogging at hybridbrothers.com, speaking at conferences, and organizing events with MC2MC.

Area of Expertise

  • Information & Communications Technology

Topics

  • Security
  • Cloud Security
  • cyber security
  • Azure Security
  • Information Security
  • Microsoft 365 Security
  • network security
  • MITRE ATT&CK
  • Microsoft sentinel
  • Microsoft 365 Defender
  • Microsoft Defender for Cloud

Microsoft Token Theft Unveiled: Real-Life Examples and Countermeasures

In today's dynamic threat landscape, adversaries increasingly target tokens over passwords. Join me in this interactive session, where I delve into the functionality and use cases of tokens. I will explore the inner workings of different tokens, how they enable Single Sign-On (SSO) in your environment, and contain permission and authentication claims.

Throughout the session, I will provide a hands-on demonstration of real-life examples of token theft, shedding light on the evolving tactics employed by cyber adversaries.

Key Session Highlights:

Token Functionality: Gain insights into how tokens function, with a focus on access tokens and their role in facilitating SSO within your environment.

Real-Life Examples: Witness practical demonstrations of token theft scenarios, illustrating the potential risks and vulnerabilities associated with this form of attack.

Proactive Measures: Discover proactive measures and detection strategies against token-centric attacks. Learn how organizations can fortify their defenses to mitigate the risks posed by token compromise.

Don't miss this opportunity to enhance your understanding of token security, uncover potential threats, and explore effective defense strategies against evolving cyber threats.

Sentinel's Got Game: Unleashing the Power of 3rd party app integrations

In today's rapidly evolving threat landscape, cybersecurity professionals face the challenge of combating sophisticated attacks while managing complex infrastructures. Microsoft Sentinel has emerged as a leading solution in empowering organizations to detect, investigate, and respond to threats effectively. By integrating third-party applications with Microsoft Sentinel, users can harness the power of a unified security platform that brings together the best tools, insights, and automation.

Key Topics Covered:
- Introduction to Microsoft Sentinel
- The Benefits of Integration
- Extending the Capabilities
- Real-World Use Cases
- Best Practices and Implementation Strategies

Operationalizing the MITRE Frameworks with Microsoft Security products

As Sun Tzu said, "If you know the enemy and know yourself, you do not need to fear the result of a hundred battles.". In the realm of cyber warfare, victory lies in the fusion of self-awareness and knowledge of the enemy. Let us embark on a journey to master the art of cybersecurity using various MITRE tools combined with Microsoft security products, arming us with knowledge that transcends the digital battlefield. Only by knowing ourselves and our adversaries can we hope to emerge victorious in the constant struggle for cyber supremacy.

Architecting a SOC on top of Microsoft Defender XDR and Microsoft Sentinel

Deploying Defender and Sentinel is easy, but how do you deploy it according to best practices, connect it to the correct products and integrate it within your environment?

This session walks through a sample architecture and showcases some of the design decisions Thijs and Robbe have made in their own Security Operations Center and what kind of issues they have run into.

They will cover multi-tenant setups, Lighthouse authentication, ITSM integration and automation using Logic Apps, Azure Functions, API Management and Azure DevOps

Enhancing Network Visibility with Microsoft Security Tools

Discover how the Microsoft security solutions you probably already rely on today, can help you in getting more visibility into your corporate networks. In this session, we’ll delve into the powerful capabilities of Defender XDR, showcasing how built-in insights can be extended to conduct deeper understanding of your corporate networks, both to identity possible security misconfigurations and detect network related threats.

Mastering SOAR: Automatic Isolation with Defender XDR and On-Premise Network Solutions

In this session, we delve into the complexities of implementing Microsoft Sentinel's Security Orchestration, Automation, and Response (SOAR) solutions, focusing on automatic isolation scenarios with both Defender XDR and On-Premise Network Solutions. We will cover multiple practical scenarios, and discuss the different strategies you can use for each of them.

Network Detection Strategies: Defender for Endpoint and Global Secure Access better together

In this session, we will explore advanced network detection strategies by leveraging the combined power of Microsoft Defender for Endpoint and Global Secure Access. Learn how these tools work together to provide comprehensive security coverage, enhancing your ability to detect and respond to threats across both cloud and on-premise environments. We’ll discuss integration techniques, share best practices, and present real-world examples to illustrate the effectiveness of this unified approach.

Cyber Back to School Sessionize Event

October 2024

Experts Live Netherlands 2024 Sessionize Event

June 2024 Nieuwegein, The Netherlands

Constant Call for Speakers - MC2MC events User group Sessionize Event

April 2024

Robbe Van den Daele

MC2MC | SSCP | Security Consultant & SOC Engineer

Brussels, Belgium

Actions

Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.

Jump to top