Speaker

James Robinson

James Robinson

Microsoft Intune MVP, Cloud-Native Endpoint Advocate, Neurodivergent Loudmouth

Actions

With 20 years of experience in the field, James is a Principal Consultant specialising in Modern Workplace and End User Compute technologies, with a focus on getting environments onto Cloud-Native endpoints.

Awards

Area of Expertise

  • Information & Communications Technology

Topics

  • Modern Device Management
  • Microsoft 365
  • Intune / MDM
  • Cloud-Native

Implementing Modern Management - Consultant notes from the field

Moving into "Modern Management" is an increasingly prevalent request for businesses' IT teams, and often has the same high-level goals: Reducing reliance on on-premises infrastructure, reducing management overhead, and improving user experience and overall security posture. But how well do businesses understand all the relevant pre-requisites and steps in that journey, based off years of consultancy experience?

This session aims to prepare you with common issues faced by businesses when initiating a Modern Management journey, and how to avoid falling into the same traps, based off significant experience as consultants and using real-life examples.

Security Tooling: Fit for purpose in a modern environment?

Do the currently available security toolsets cater for Modern Management, or are they stuck in the past?

After identifying some potentially serious flaws in the way in which modern-managed desktops are checked for compliance against security recommendations, frameworks and threat vulnerability, this session aims to bring awareness and spark discussions and debate amongst the security community.

Just Do It! A Misadventure in End User Device Security‚Äč

Creating a secure baseline within Intune can be challenging, as can working with your security team! In this session, we'll dig into what challenges you might face, why your security team might have a problem with you managing your devices with Intune, and some best practices to adhere to secure frameworks such as NCSC, CIS, or NIST.
Learn how to approach building your own secure configuration and avoid painful lessons learned.

Understanding gaps in security frameworks and bridging them.
Collaboration is key to end-user device security.
Best practices for building a secure configuration in Intune.
Real-life scenarios and lessons learned to avoid common pitfalls.

James Robinson

Microsoft Intune MVP, Cloud-Native Endpoint Advocate, Neurodivergent Loudmouth

Actions

Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.

Jump to top