Speaker

Émile Cabot

Émile Cabot

CheckYourLogs.net

St. Stephen, Canada

Émile is a nine-time Microsoft Most Valuable Professional (MVP) who started in the industry during the mid-90s working at an ISP and designing web sites for celebrities. He has a strong background specializing in datacenter and deployment solutions and has spent many years performing infrastructure analyses and solution implementations for organizations ranging from 20 to over 200,000 employees.

Émile organizes the Calgary Microsoft User Group, blogs on CheckYourLogs.net, and has presented at several conferences, including Ignite, VeeamOn, TechReady, TechMentor and as an active part of the MVPDays team.

Area of Expertise

  • Information & Communications Technology

Topics

  • Microsoft Endpoint Manager
  • MEM aka SCCM
  • Hyper-V
  • OS Deployment
  • Microsoft Intune
  • Ransomware
  • Azure Site Recovery (ASR)
  • Windows Defender ATP
  • Windows Admin Center
  • Everything Windows

Using ChatGPT as an ITPro: Cool Tips and Infrastructure Prompts!

This session will look at the use of Large Language Models and how they've already had such a huge impact on our jobs in IT.

The Pros and Cons of Autopilot in the Field

This session will look at the moving goalposts during several Autopilot implementations

Mac Management on Intune: More Than "Good Enough"

Struggling to find a way to manage your Mac environment, without buying a whole new tool? This session will look at the recent advancements of Mac management in Intune and explore the capabilities these features present.

Building Real World Labs in Azure

Using a desk fan to keep your lab running? No more!
This session doesn't just show you how to build your lab in Azure, but gives you tips on how to pay for it in our favourite currency...free! That's right, ladies and gentlemen, as IT Administrators, you are likely throwing away the ability to have this puppy purr (yes, this puppy purrs) and allow you to point that fan back on your face while you enjoy the beach and work on your lab from the iPhone.

MAM in Intune - Securing data for personal Android, iOS, and Windows devices

Securely protect corporate data from personal device use, without the cost and risk of managing them. With Intune's MAM controls, users must remediate their device before access is granted, restricting corporate control to strictly organizational data. This session goes through the process to enable this feature for all supported platforms.

Conditional Access - Best Practices for Securing your M365 Environment

This session investigates the policies required to effectively protect your environment in 2024. We look at how to create each one, why they're essential, and options available to monitor their functionality in production. If you're using Microsoft 365 in any capacity, like Conditional Access Policies, this session is a must!

How Windows 11 uses Hyper-V to protect you

Explore all the security enhancements made to your client operating system, brought to you by enhancements in virtualization. We will look at each feature, why they're important, and how to enable anything not enabled by default in Windows 11. This session is tailored for your home computers as well as staff that support workstations in the enterprise.

Session can be presented in 20-minutes (highlights), 75-minutes (full), or 90-minutes (with demo).

Using Virtualization to Protect Your Workstation Environment

If you're using Windows 10 Pro, Education, or Enterprise, there are several built-in security enhancements that will protect your environment from malicious attacks. This session will look at three solutions that are possible due to advancements in client virtualization, how to deploy and configure them, as well as scenarios to test the solutions against.

Driving Adoption of the Modern Workplace

There's a LOT of cool tools available with Windows 10. They increase collaboration, reduce the "IT burden" and streamline device management. Before these enhancements can be implemented, they need to be embraced by the business. This session looks at the capabilities of the Modern Workplace, how to drive adoption in your organization, and how to enable these solutions without compromising data security.

Surviving a Ransomware Attack: Notes from the Field

From Enterprise Admin credentials being leaked to a limited access breach, we will go into detail four different Ransomware attacks. We look at the attackers approach, the DR solutions in place, and what was ultimately required for a complete recovery. This session is a great opportunity to learn from others' mistakes, and ensure you're taking the right steps to protect your important data.

Surviving a Ransomware Attack using Azure Site Recovery

This session is packed with real world experiences from multiple ransomware recoveries at clients where traditional DR failed them. We will discuss why each attack was successful, the remediation involved, and how ASR helped (or would have helped) with the remediation.

Go from Zero to Hero using Azure Site Recovery: Surviving the Ransomware Attack

Fears of a ransomware attack keeping you up at night? Come to this session and learn from the mistakes of others. We break down several successful and failed attacks, how traditional DR was circumvented, and how we can use ASR to protect our organization from these rapid attacks. This session is packed with notes from the field, as well as easy to follow use-cases for implementing ASR.

TechMentor Microsoft HQ 2019 Sessionize Event

August 2019 Redmond, Washington, United States

MVPDays Azure Day Online Sessionize Event

May 2019 Calgary, Canada

Émile Cabot

CheckYourLogs.net

St. Stephen, Canada