Peter Schmidt
Independent Consultant, Microsoft MVP: M365 Apps & Services, MCM: Exchange, MCT.
Kolding, Denmark
Peter is working as a Cloud Architect in Denmark. He has been working as a consultant since 1996 with a primary focus on Messaging, Collaboration, and Cloud security, based on technologies like Microsoft 365, Exchange Server, Microsoft Teams, OneDrive for Business, Office 365, Purview Information Protection, and Microsoft Defender Security products.
Peter is a Microsoft Certified Master on Exchange and has been awarded as a Microsoft MVP in M365 Apps & Services and Security. He has been speaking numerous times at Danish and Norwegian events like Microsoft Campus Days, Nordic Infrastructure Conference, European SharePoint Conference, and local User Group events.
He also runs the Danish WorkPlace Ninja User Group, which has a focus on Microsoft Modern Workplace, Productivity, and Security.
Area of Expertise
Topics
Maximizing the Value of MDE: Vulnerability Management and Secure Score
Are you looking for ways to improve your organization's security posture and prioritize your infrastructure proactively? Join us for a comprehensive presentation on MDE Vulnerability Management and Secure Score and how to get the full value out of it.
We will delve into the vulnerability management capabilities of Defender for Endpoint, including how to use it to identify and address security risks in your environment. You'll learn how to prioritize and remediate vulnerabilities based on the potential impact on your business, and gain insights into the latest threat intelligence from Microsoft.
We'll also cover details of Secure Score, including how it provides a clear and actionable overview of your organization's security posture. You'll learn how to use Secure Score to prioritize vulnerabilities.
Don't miss this opportunity to learn from the experts and take your vulnerability management to the next level together with Microsoft Secure Score!
Mastering Microsoft Security Exposure Management: Become a Security Ninja!
Are you often asked by management about your defenses against phishing emails, ransomware attacks, and how your critical assets are protected, but find it challenging to explain? This session is designed just for you.
During the session, you'll learn how to deepen your grasp of security posture management through detailed exposure insights and explore various security initiatives, including domain-specific and threat-focused areas. You will learn to master attack surface management to identify and mitigate potential attack paths. We'll also teach you how to assess the security status of your infrastructure using detailed metrics and how we recommend how to implement Microsoft's recommendations to enhance your protections.
Furthermore, you'll discover effective strategies for reporting to management in a way that builds trust in your security reporting. Finally, you'll leave equipped with a comprehensive plan for successful implementation, aimed at improving the maturity of processes and organizational support throughout your security journey.
A Hitchhikers Guide to Microsoft Information Protection
All Your Data is now in the Cloud, what's next. This session will show you how to get a good start on data protection using Microsoft Information Protection. Get the full overview of what Microsoft Information Protection is and how it can help protect our data at rest. Covering everything you need to know, to get started with data classification and how to use Sensitivity Labels to protect and your data
Teams Architecture Deep Dive
In this session, we will go deep-dive into the architecture of Microsoft Teams and how Microsoft is using existing Azure and Office 365 technology to make Microsoft Teams a scalable platform, that can perform and is easy to manage.
This session will cover the logical architecture of Teams, where are conversations, images, files, voicemails, and recordings are stored.
Mastering a Tenant-to-Tenant Migration
In this session we will dive into tenant-to-tenant migrations, it could be based on anything from mergers, acquisitions, or consolidations.
What is possible during migration and how do we best plan, test, and migrate data in a tenant-to-tenant project?
Get a good understanding of what is possible and how to plan for a successful migration between tenants, including understanding the data structures and dependencies, managing security and compliance, and ensuring a smooth user experience.
By the end of this session, attendees will have a solid understanding of the challenges and opportunities of tenant-to-tenant migrations, and the tools and techniques required to master them.
Defender for Business Deep Dive
Join us in a sessio, that dives into the New Defender for Business. Learn all about what is included and how to get started with Defender for Business.
No Phishing Allowed: A Deep Dive into Microsoft Defender for Office and Authtenticated E-mail
Phishing attacks continue to be a major threat to businesses, with attackers using increasingly sophisticated techniques to trick users into revealing sensitive information or infecting their systems with malware.
In this session, you will learn how to implement Microsoft Defender for Office in your organization, and how to use it in conjunction with other anti-phishing strategies. You will also learn how to customize its protection policies to meet the specific needs of your organization, and how to monitor and analyze the reports to understand the threat landscape.
The sessions will provide an overview of best practices for securing your organization against phishing attacks, such as user education, training, and policy development.
After this session, attendees will have a better understanding of how to use Microsoft Defender for Office and other security tools to protect their organizations against email-based threats.
Ready, Set, Migrate: A Guide to Tenant-to-Tenant Data Migration
Cross-tenant migrations can be complex and time-consuming, especially if the two tenants have different configurations or use different technologies. In this technical session, we will explore strategies and best practices for successfully executing a cross-tenant migration.
Tenant to Tenant Migrations: A Deep Dive into Data and User Migration
Tenant to tenant migrations are becoming increasingly common as organizations undergo mergers, acquisitions, divestitures, and rebranding. In this session, we will explore the latest approaches and best practices for migrating data, users, and workloads between Microsoft 365 tenants. The session will cover the importance of careful planning, testing, and end-user adoption, and share insights on how to minimize the impact of the migration on productivity and performance.
Leveraging Authenticated Email and Defender for Office for Enhanced Security in Microsoft 365
Phishing attacks are a constant threat to organizations, and it is essential to have the right tools and strategies in place to mitigate these risks. In this session, we will explore how to optimize and mitigate phishing in Microsoft 365 using Defender for Office and Authenticated E-mail.
Mastering Email Security: Microsoft Defender for Office Against Phishing
Phishing attacks present an ever-evolving threat to businesses, employing sophisticated techniques to compromise sensitive information. This session targets IT and cybersecurity professionals, focusing on deploying Microsoft Defender for Office (MDO) as a pivotal component of your organization’s defense strategy. You’ll gain insights into configuring MDO to its fullest potential, utilizing AI and machine learning to detect and neutralize phishing attempts before they impact your network.
We will walk you through customizing MDO’s protection policies to align with your organization's requirements, enhancing security with features like Safe Links, Safe Attachments, Impersonation Protection and the latest features.
Practical demonstrations will guide you in setting up these defenses, monitoring for threats, and analyzing reports to gain a comprehensive view of the phishing landscape.
Beyond technical configurations, this session emphasizes the importance of user education, training, and policy development as cornerstone practices for securing your organization against phishing attacks.
You will leave this session with best practices and actionable strategies to implement Microsoft Defender for Office and complementary security measures, ensuring robust protection against email-based threats.
Boost your security with Microsoft Defender XDR portal
A practical guide to protect your endpoint, email, application and identity!
Do you want to learn how to use the Microsoft Defender XDR portal to improve your security across different domains and products? Do you want to see how to integrate Microsoft Sentinel with the portal to enhance your SOC efficiency and response capabilities? Do you want to hear real-world case studies and success stories from organizations that have successfully implemented Microsoft XDR solutions?
If you answered yes to any of these questions, then this session is for you. In this session, you will:
• Discover what is Microsoft Defender XDR portal and why you need it.
• Learn how the portal si
• mplifies and unifies your security management across endpoint, email, application and identity.
• Find out how to use Secure Score to prioritize tasks and get help to secure your environment.
• Explore how to experience the next level of SOC efficiency with Microsoft Sentinel in Defender portal.
• Learn from real-world examples of how organizations have successfully implemented Microsoft XDR to improve their security posture.
The session will last for one hour and will include a Q&A session where you can ask questions and get answers from the experts.
Don't miss this opportunity to boost your security with Microsoft Defender XDR portal.
Workplace Ninjas Denmark User group Sessionize Event Upcoming
6th Cloud8 virtual Summit 2024 Sessionize Event
Festive Tech Calendar 2023 Sessionize Event
ESPC23 - European SharePoint, Office 365 & Azure Conference Sessionize Event
NIC Cloud Connect 2023 Sessionize Event
Workplace Ninja Summit 2023 Sessionize Event
5th cloud8 virtual Summit 2022 Sessionize Event
NIC X Edition Sessionize Event
Microsoft 365 Virtual Marathon 2022 Sessionize Event
Nordic Virtual Summit 3rd Edition Sessionize Event
M365 Below in Chicago! Sessionize Event
Nordic Virtual Summit Second Edition Sessionize Event
ExpertsLive Norway 2021 Sessionize Event
Nordic Virtual Summit Sessionize Event
2nd cloud8 virtual Summit in 2020 Sessionize Event
Nordic Infrastructure Conference 2020
Nordic Infrastructure Conference 2020
Delivered two sessions about Teams and Security.
Microsoft Tech Summit Stockholm 2018
Proctor on a workshop about Microsoft Teamwork (Teams, Groups, OneDrive, Yammer).
Nordic Infrastructure Conference 2017
Delivered two sessions, one about OneDrive for Business and one about Exchange Online (Office 365).
Nordic Infrastructure Conference 2016
Delivered two sessions about Office 365 and Exchange.
Nordic Infrastructure Conference 2015
Delivered two sessions about Exchange and Office 365.
Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.
Jump to top