Ronny de Jong
Microsoft, Security Technical Specialist
Amsterdam, The Netherlands
Actions
At my best navigating at the intersection of technology and business. As a former multi-year Microsoft MVP, more than connected with technology to generate value for the business. As Security Technical Specialist at Microsoft, I'm helping local and regional governments strengthen their security posture with the aim making the Dutch society more cyber resilient. Lead by example. Learning over knowing. Make the complex simple.
Links
Area of Expertise
Topics
Forecasting Cyber Weather: Discover Cybersecurity storms with Microsoft Defender Threat Intelligence
In this engaging session, we invite you to explore the power of Microsoft Defender Threat Intelligence (MDTI) as your cybersecurity weather radar. Learn how to enhance your data sets with the use of threat intelligence, empowering you to make informed decisions and stay ahead of potential storms. And lastly, explore the role of brand-intelligence in identifying and mitigating risks to your organization's reputation.
Dive into the process of URL detonation and witness firsthand how MDTI analyzes and dissects suspicious URLs, preventing potential cyber hurricanes before they make landfall. Delve into Sentinel incident enrichment via the MDTI API and use of playbooks, uncovering the secrets to orchestrating a robust response to cyber threats.
Join us as we decode the cybersecurity weather forecast with Microsoft Defender Threat Intelligence, arming you with the tools and insights needed to - ultimo avoid - or become resilient against storms in the digital realm. Don't miss this opportunity to fortify your cybersecurity strategy and ensure a clear sky ahead in the ever-evolving threat landscape.
Forecasting Cyber Weather: Discover Cybersecurity storms with Microsoft Defender Threat Intelligence
In this engaging session, we invite you to explore the power of Microsoft Defender Threat Intelligence (MDTI) as your cybersecurity weather radar. Learn how to enhance your data sets with the use of threat intelligence, empowering you to make informed decisions and stay ahead of potential storms. And lastly, explore the role of brand-intelligence in identifying and mitigating risks to your organization's reputation.
Dive into the process of URL detonation and witness firsthand how MDTI analyzes and dissects suspicious URLs, preventing potential cyber hurricanes before they make landfall. Delve into Sentinel incident enrichment via the MDTI API and use of playbooks, uncovering the secrets to orchestrating a robust response to cyber threats.
Join us as we decode the cybersecurity weather forecast with Microsoft Defender Threat Intelligence, arming you with the tools and insights needed to - ultimo avoid - or become resilient against storms in the digital realm. Don't miss this opportunity to fortify your cybersecurity strategy and ensure a clear sky ahead in the ever-evolving threat landscape.
Guarding the Gates: Effective External Attack Surface Management
In the digital age, businesses rely heavily on online operations, making their external attack surface a prime target for cybercriminals. An external attack surface refers to all the digital entry points that an organization has to the outside world, including web applications, cloud environments, and IoT devices. Managing this vast and constantly expanding attack surface is a daunting task, and it requires a comprehensive approach to security.
This session will explore the challenges of external attack surface management and how organizations can develop a robust security posture to mitigate the risk of cyber-attacks. We will discuss the key strategies that can be employed to identify and monitor potential threats, including vulnerability scanning, penetration testing, and threat intelligence. We will also delve into the importance of continuous monitoring and the value of automation in reducing response times to potential threats.
Join us for this informative session to learn how to effectively manage your external attack surface, reduce your risk of cyber-attacks, and protect your organization's reputation and it's valuable assets.
Help, my developer is using secrets within his code! Defender for DevOps to the rescue!
The world we live in today can't run without software, automation and DevOps. With more and more people on earth we need to be intuitive and be smarter, meaning more and more automation. In some cases people tend to fall back to 'let's do this quick and dirty, because I've so many on my plate to work on'. This can lead to open-source dependencies, used in your code, vulnerable for attacks or worse credentials exposed in clear text.
During this session, you will learn how to take back control, in all of these matters, with the use of Defender for DevOps. We will explain how to configure Defender for DevOps, the insights it gives and guided with real-life demo's on how you can work with these insights and protect yourself against potential attacks!
After this session, you will have a clear understanding what the value-add of Defender for DevOps is and are able to implement it yourself from start to finish. This is a must-visit session for IT Pros and DevOps owners who want to make sure the right security controls are in place to protect applications and resources from code to cloud.
Zero-Trust Network Access to any legacy resource with the Power of Entra Private Access!
Join us on a journey and learn how you can secure access to your legacy resources by using the brand new Entra Private Access feature, part of Microsoft's brand new Secure Service Edge solution.
It's time to take the next step in modernizing your network infrastructure and move to Entra Private Access which is extremely powerful to publish access to legacy on-premises resources like legacy file shares, SQL databases and more via the internet as if you were on-premises & safeguarded with Conditional Access!
In this session, you will learn how to kick-start and boost your Entra Private Access journey by configuring the 'Quick Access' feature to provide simplified resource access to all of your users. Quick Access provides the ability to replace the VPN access and will help to gain insights in the resource usage, who is accessing what kind of resource. From here we will guide you further in your journey to easily move resources from quick access to a 'Per app' access model and make sure that the least privilege concept has been applied, which results in only users who really need access have been provide access.
It's time to say goodbye to traditional VPN solutions and secure your legacy on-premises resources via Entra Private Access, combined together with Entra Conditional Access and Continuous Access Evaluations this feature will provide you top class security. Don't miss out on this opportunity to bring your Zero-Trust Network Access (ZTNA) for legacy resources to the next level in your environment and learn from the best.
The external attack surface challenge. “Do. Or do not. There is no try.”
External attack surface management. Admittedly there is a lot of “trying” out there. The problem we are looking to solve isn’t new, it’s just exacerbated by digital transformation, lack of time, lack of visibility, and lack of resources.
How do you protect your external Attack Surface? In this session, we will investigate how to properly protect your infrastructure, covering how to secure assets that are already accounted for and assets that are not on your current radar. We will focus on Microsoft Defender External Attack Surface Management (MDEASM), as this solution can now discover your internet-based digital assets and systems, presenting vulnerabilities and exposures through an ‘outside-in’ view.
You either automate attack surface management the way an attacker does, and protect it, or you try to do it manually, and do not. We, of course, strongly recommend you do.
Help, my identity lifecycle management is a mess! Entra Inbound Provisioning to the rescue!
Are you struggling with managing the lifecycle of user identities within your organization? Do you find it challenging to make HR data the 'source of truth' for your end user identities? Are you trying to streamline the joiner, mover and leaver process but find it too difficult? If so, join us for a deep dive into Entra ID Governance with the brand new Entra Inbound Provisioning API and new features in Entra Lifecycle Workflows!
During this session we'll guide you through the options of the brand new Entra Inbound Provisioning API which enables us to streamline and automate the provisioning and updates of user identities in Entra ID or Active Directory with HR as source. We will provide you with real-life demo's, lessons learned from the field and starting materials which you could use yourself directly after this session. As the Entra Inbound Provisioning API goes hand in hand with Entra Lifecycle Workflows we will conclude our deep dive by exploring the new powerful capabilities of Entra Lifecycle Workflows, like brand new mover triggers and native integration for hybrid accounts.
At the end of this session, you'll have a solid understanding of the brand new Entra Inbound Provisioning API to provision identities, you understand how you can build (custom) Entra Lifecycle Workflows, and be equipped with the tools and knowledge to implement it yourself in your own organization tomorrow and improve the zero-trust level of your organization! Don't miss out on this opportunity to simplify identity lifecycle management while keeping your valuable assets secure!
APIs - the next underestimated attack surface
Having secured assets like identities, devices, data & infrastructure to a large extent, what escapes the eye mostly/remains the blind spot is the mushrooming security risk associated with APIs. It is an infinite game of protecting your workloads and keep your data safe. Are you aware of how many APIs on an average your organization is using? According to Akamai, 83% of web traffic is the API traffic.
Gartner envisions a shift of API abuse becoming the most common form of web application attack in near future. A pretty sobering statistic for those in charge of developing API's, as well as application and data owners, and those responsible for infrastructure security.
In this session, you'll learn how to successfully implement an effective API security strategy in order to achieve attack disruption and attack surface reduction. This would include build discovery and full lifecycle protection, detection and response coverage for your APIs wherever they reside.
By the end of it, you should have established a clear understanding of what API security entails, and what options based on Microsoft technology you have to make your web application more resilient. Are you ready to disrupt the attack?
Managing the unmanaged with Security Management for Defender for Endpoint
The security threat landscape is confusing and changing rapidly – there’s so much out there, how do you keep up to understand where the true risks are and keep your assets safe from bad actors? It all starts with insights and managing your endpoints. But what if they are not? Security Management sets the benchmark for unified protection regardless of how your endpoints are managed or aren’t managed at all. No matter how fragmented or complex the landscape of your endpoints looks, with Security Management you can manage and configure them without dependence of GPOs, SCCM, Endpoint Manager or 3rd party management. After this session you have a clear understanding of the various management scenarios, seen demo’s how the solution works and you’re able to define a strategy to kickstart your deployment to apply Security Management in your organization. Make the unknown known!
Techorama 2024 Belgium Sessionize Event
API World 2023 Sessionize Event
Techorama 2023 Belgium Sessionize Event
Experts Live Netherlands 2022 Sessionize Event
WorkPlace Ninja Summit 2022 Sessionize Event
Techorama 2022 BE Sessionize Event
EXPERTS LIVE NETHERLANDS 2020 Sessionize Event
Techorama 2020 BE Sessionize Event
Ronny de Jong
Microsoft, Security Technical Specialist
Amsterdam, The Netherlands
Links
Actions
Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.
Jump to top