Most Active Speaker

Peter Schmidt

Peter Schmidt

Independent Consultant, Microsoft MVP: M365 Apps & Services, MCM: Exchange, MCT.

Kolding, Denmark

Peter is working as a Cloud Architect in Denmark. He has been working as a consultant since 1996 with a primary focus on Messaging, Collaboration, and Cloud security, based on technologies like Microsoft 365, Exchange Server, Microsoft Teams, OneDrive for Business, Office 365, Purview Information Protection, and Microsoft Defender Security products.
Peter is a Microsoft Certified Master on Exchange and has been awarded as a Microsoft MVP in M365 Apps & Services and Security. He has been speaking numerous times at Danish and Norwegian events like Microsoft Campus Days, Nordic Infrastructure Conference, European SharePoint Conference, and local User Group events.
He also runs the Danish WorkPlace Ninja User Group, which has a focus on Microsoft Modern Workplace, Productivity, and Security.


Area of Expertise

  • Information & Communications Technology


  • Office 365
  • Exchange
  • E-mail Security
  • Cyber Security
  • SharePoint Online
  • Office 365 Security
  • Office 365 Identity
  • Azure Active Directory
  • Microsoft 365
  • Microsoft 365 Compliance
  • Microsoft 365 governance and compliance
  • Microsoft 365 Security
  • Microsoft Purview
  • Microsoft Teams
  • Microsoft MVP
  • Microsoft OneDrive
  • Microsoft SharePoint
  • OneDrive For Business
  • Microsoft Defender for Office
  • Microsoft Defender for Endpoint
  • Microsoft Defender Advanced Threat Protection
  • Microsoft Defender for Cloud Apps

Effective Backup and Data Integrity Strategies for Microsoft 365

In this session, we will explore the data integrity challenges associated with Microsoft 365, and why backup is essential for protecting your data in the cloud. We will discuss best practices for backup, including how often to perform backups, what types of data to include, and how to recover data in the event of a disaster. Additionally, we will look at different backup solutions available for Microsoft 365, including native and third-party options.

Protecting Your Users Against Phishing Attacks

Phishing is still one of the most common cybercrimes and during COVID, the number of phishing attacks has increased by 25%.
This session will cover how we can use the built-in features of Office 365 Defender to protect our users against phishing and how to better train our users.
We will cover everything from the basics of protecting your mail flow, using SPF, DKIM, DMARC, combined with the advanced features of Microsoft Defender for Office 365 to phishing simulation and training.

Learn how to train and protect your users against phishing attacks.

Be the Information Protection Hero of Your Organization

Get the IT Pro overview into how you can protect your sensitive and GDPR related data, using Microsoft Information Protection.
We will deep dive into using Sensitivity Labels in data protection scenarios with SharePoint, Teams, Cloud App Security, and learn how to be the Hero in Information Protection projects.

Mastering a Tenant-to-Tenant Migration

In this session we will dive into tenant-to-tenant migrations, it could be based on anything from mergers, acquisitions, or consolidations.
What is possible during migration and how do we best plan, test, and migrate data in a tenant-to-tenant project?
Get a good understanding of what is possible and how to plan for a successful migration between tenants, including understanding the data structures and dependencies, managing security and compliance, and ensuring a smooth user experience.
By the end of this session, attendees will have a solid understanding of the challenges and opportunities of tenant-to-tenant migrations, and the tools and techniques required to master them.

Defender for Business Deep Dive

Join us in a sessio, that dives into the New Defender for Business. Learn all about what is included and how to get started with Defender for Business.

No Phishing Allowed: A Deep Dive into Microsoft Defender for Office and Authtenticated E-mail

Phishing attacks continue to be a major threat to businesses, with attackers using increasingly sophisticated techniques to trick users into revealing sensitive information or infecting their systems with malware.

In this session, you will learn how to implement Microsoft Defender for Office in your organization, and how to use it in conjunction with other anti-phishing strategies. You will also learn how to customize its protection policies to meet the specific needs of your organization, and how to monitor and analyze the reports to understand the threat landscape.

The sessions will provide an overview of best practices for securing your organization against phishing attacks, such as user education, training, and policy development.

After this session, attendees will have a better understanding of how to use Microsoft Defender for Office and other security tools to protect their organizations against email-based threats.

A Hitchhikers Guide to Microsoft Defender for Business

In this technical session, we will explore the features and capabilities of Microsoft Defender for Business and show you how to use them to protect your business from cyber threats. We will cover best practices for deployment and configuration, as well as threat detection and response.

Ready, Set, Migrate: A Guide to Tenant-to-Tenant Data Migration

Cross-tenant migrations can be complex and time-consuming, especially if the two tenants have different configurations or use different technologies. In this technical session, we will explore strategies and best practices for successfully executing a cross-tenant migration.

Tenant to Tenant Migrations: A Deep Dive into Data and User Migration

Tenant to tenant migrations are becoming increasingly common as organizations undergo mergers, acquisitions, divestitures, and rebranding. In this session, we will explore the latest approaches and best practices for migrating data, users, and workloads between Microsoft 365 tenants. The session will cover the importance of careful planning, testing, and end-user adoption, and share insights on how to minimize the impact of the migration on productivity and performance.

Leveraging Authenticated Email and Defender for Office for Enhanced Security in Microsoft 365

Phishing attacks are a constant threat to organizations, and it is essential to have the right tools and strategies in place to mitigate these risks. In this session, we will explore how to optimize and mitigate phishing in Microsoft 365 using Defender for Office and Authenticated E-mail.

Advanced Defense: Optimizing Microsoft Defender for Office Against Phishing

Dive into the core of Microsoft Defender for Office (MDO) in this technical session for IT-Pro and cybersecurity professionals. We will focus on how MDO employs cutting-edge technology, including AI and machine learning, to detect and neutralize phishing threats, offering a comprehensive defense for organizational email systems.

You will learn to configure MDO for maximum efficiency, with a focus on customizing anti-phishing policies, and enhancing security with Safe Links and Safe Attachments. The session offers practical demonstrations on setting up and managing these features, alongside insights into leveraging Threat Explorer for proactive threat detection.

Learn through practical advice and demonstrations how to harness the latest features and configurations of Microsoft Defender to protect against advanced phishing threats. Equip yourself with the knowledge to enhance your organization’s email security posture effectively.

Mastering Email Security: Microsoft Defender for Office Against Phishing

Phishing attacks present an ever-evolving threat to businesses, employing sophisticated techniques to compromise sensitive information. This session targets IT and cybersecurity professionals, focusing on deploying Microsoft Defender for Office (MDO) as a pivotal component of your organization’s defense strategy. You’ll gain insights into configuring MDO to its fullest potential, utilizing AI and machine learning to detect and neutralize phishing attempts before they impact your network.

We will walk you through customizing MDO’s protection policies to align with your organization's requirements, enhancing security with features like Safe Links, Safe Attachments, Impersonation Protection and the latest features.
Practical demonstrations will guide you in setting up these defenses, monitoring for threats, and analyzing reports to gain a comprehensive view of the phishing landscape.

Beyond technical configurations, this session emphasizes the importance of user education, training, and policy development as cornerstone practices for securing your organization against phishing attacks.

You will leave this session with best practices and actionable strategies to implement Microsoft Defender for Office and complementary security measures, ensuring robust protection against email-based threats.

A Hitchhikers Guide to Microsoft Information Protection

All Your Data is now in the Cloud, what's next. This session will show you how to get a good start on data protection using Microsoft Information Protection. Get the full overview of what Microsoft Information Protection is and how it can help protect our data at rest. Covering everything you need to know, to get started with data classification and how to use Sensitivity Labels to protect and your data

Teams Architecture Deep Dive

In this session, we will go deep-dive into the architecture of Microsoft Teams and how Microsoft is using existing Azure and Office 365 technology to make Microsoft Teams a scalable platform, that can perform and is easy to manage.
This session will cover the logical architecture of Teams, where are conversations, images, files, voicemails, and recordings are stored.

Workplace Ninjas Denmark User group Sessionize Event Upcoming

Not scheduled yet.

6th Cloud8 virtual Summit 2024 Sessionize Event

January 2024

Festive Tech Calendar 2023 Sessionize Event

December 2023

ESPC23 - European SharePoint, Office 365 & Azure Conference Sessionize Event

November 2023 Amsterdam, The Netherlands

NIC Cloud Connect 2023 Sessionize Event

November 2023 Oslo, Norway

Workplace Ninja Summit 2023 Sessionize Event

September 2023 Baden, Switzerland

5th cloud8 virtual Summit 2022 Sessionize Event

September 2022

NIC X Edition Sessionize Event

June 2022 Oslo, Norway

Microsoft 365 Virtual Marathon 2022 Sessionize Event

May 2022

Nordic Virtual Summit 3rd Edition Sessionize Event

March 2022

M365 Below in Chicago! Sessionize Event

January 2022

Nordic Virtual Summit Second Edition Sessionize Event

November 2021

ExpertsLive Norway 2021 Sessionize Event

May 2021 Oslo, Norway

Nordic Virtual Summit Sessionize Event

February 2021

2nd cloud8 virtual Summit in 2020 Sessionize Event

November 2020

Nordic Infrastructure Conference 2020

Nordic Infrastructure Conference 2020
Delivered two sessions about Teams and Security.

February 2020

Microsoft Tech Summit Stockholm 2018

Proctor on a workshop about Microsoft Teamwork (Teams, Groups, OneDrive, Yammer).

April 2018 Stockholm, Sweden

Nordic Infrastructure Conference 2017

Delivered two sessions, one about OneDrive for Business and one about Exchange Online (Office 365).

February 2017 Oslo, Norway

Nordic Infrastructure Conference 2016

Delivered two sessions about Office 365 and Exchange.

February 2016 Oslo, Norway

Nordic Infrastructure Conference 2015

Delivered two sessions about Exchange and Office 365.

January 2015 Oslo, Norway

Peter Schmidt

Independent Consultant, Microsoft MVP: M365 Apps & Services, MCM: Exchange, MCT.

Kolding, Denmark

Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.

Jump to top