Speaker

Michael Van Horenbeeck

Michael Van Horenbeeck

CEO | MVP | MCSM

Michael Van Horenbeeck is an expert in Cloud Security, Compliance, and Identity Management, holding both the Microsoft Certified Solutions Master (MCSM) certification and the Microsoft Most Valuable Professional for Security (MVP) award simultaneously.

As CEO and Sr. Architect at The Collective, he leads their security practice, delivering specialized services such as a managed detection and response (MDR) service. He has assisted customers of all sizes globally in designing, implementing, securing, and managing solutions based on Microsoft 365 and Azure.

He is an active community member, author and inspirer of the Microsoft 365 Security for IT Pros e-book, and frequently speaks at events around the world. Follow his insights on Twitter (@vanhybrid), or on his websites m365securitybook.com, m365security.eu and thecollective.eu.

Area of Expertise

  • Information & Communications Technology

Topics

  • Office 365
  • Office 365 Office 365 Governance Microsoft Teams SharePoint
  • Exchange Online
  • Exchange Server
  • Azure Active Directory
  • Enterprise Mobility and Security
  • Security & Compliance
  • Microsoft 365
  • Microsoft Teams

Protecting the castle: secure foundations for and with Microsoft 365

Despite being the greatest army in their time, the Romans knew that adequately protecting their legions was a very important task. Larger legions would stay in castrums – walled camps – and whilst engaging the enemy, legions would form a ‘testudo’: a formation to shield weaker inner ranks from outside attacks.

The world is constantly under attack and your tenant needs protecting too! In this session, we will discuss how to build secure foundations for and with Microsoft 365 and how to assess security so that you may be able to work in safety. If you want to learn how to best secure your environment, you don’t want to miss this session.

Building a PAW for and through the cloud.

Just like in an on-premises environment, administrative access to cloud resources can be compromised fairly easily, especially if you are using your day-to-day device for both work and admin tasks. To avoid stealing your session cookie or even your PRT, you should be using a Privileged Access Workstation (PAW). In this session, Michael will walk you through the process of how you can create a Privileged Access Workstation (PAW) to protect administrative access to your cloud resources, including how to best leverage solutions like a network proxy, Microsoft 365 Defender and Microsoft Intune.

Supercharge your security operations with Microsoft 365 Defender and Azure Sentinel

In this challenging cyber threat landscape, it is important to keep control over what's happening in your environment. With Microsoft 365 Defender and Azure Sentinel, you have two products which can help you to do just that. Both can be used to aggregate incidents and data between different solutions and each have their own strenghts and weaknesses. As with everything: It's paramount to use them the 'right' way. In this session Michael and Thijs will walk you through both products and provide tips and tricks in order to optimize your Microsoft SecOps experience based on real-life experience, from running a SOC.

You’re probably doing it wrong! More effective security through integrated solutions.

By focusing on point solutions, many organizations are tackling security the wrong way and missing out on a more efficient and effective way to protect, detect and respond to (new) threats. Come in and learn how the playing field os changing and why your security approach should too!

Entering a new era of cybersecurity with Microsoft 365 Defender

Not a day goes by without news of one or the other breach, data leak or ransomware attack. The current cybersecurity landscape forces defenders to rethink how to protect, detect and respond to threats. In this session we'll explain why Microsoft 365 Defender matters, and how to get most out of it.

How to develop and deliver a successful long-term security strategy with Microsoft's solutions

There’s more than one way to bake a cake. The same is true for securing your environment. With the plethora of features available to Microsoft customers, whether it’s a built-in capability or a third-party solution, it’s sometimes hard to see the forest for the trees. But don’t worry: you can have your cake and eat it! In this session, we’ll go through the motions of how to develop and deliver a successful security strategy without having to become a security-expert yourself. We’ll go over some very common (security) requirements and translate them into real-world solutions using real-world examples. If you’re interested to learn more about acronyms like MDE, MDI, MDI, ATP, EMS, MCAS, AIP, OME and why they are important to you, attend this session!

How to efficiently secure and govern identities with Microsoft 365

There's more than one way to catch a rabbit... Securing identities with MFA is required, but only one of the elements to build a strong identity governance approach. In this session, we'll learn how you can leverage the full feature set of Azure AD to protect identities, detect misuse/abuse, govern the lifecycle and combine all of them in an harmonized approach.

Microsoft Defender and IoT: the future of network monitoring redefined?

Network Detection and Response systems have been around for as long as cybersecurity was a thing. Today, still, in a modern approach to cybersecurity, NDR-systems continue to be an important element of your virtual defenses. But is that really necessary? In this session, we'll look at the evolution of threat detection, what it has to do with Microsoft Defender for Endpoint, and what the future of NDR could look like, especially considering the proliferation of IoT devices as well as the increasing importance of OT security.

A view from the trenches: running a SOC on Microsoft solutions.

The world of cybersecurity is constantly evolving. A few years ago, Microsoft wasn't even considered a security vendor. Today, they are one of the top-tier solution providers when it comes to security-related solutions and services. In this session, Michael sheds a light on what it is to run a SOC on top of Microsoft's solutions. You'll get to see the good, the bad, and also some of the ugly sides, all based on cases he's seen in the SOC in the past year.

Red vs. Blue: how to efficiently use Microsoft security solutions to keep your environment secure!

The world of cybersecurity is challenging, but also lots of fun. In this demo-packed session, Michael walks you through a number of real-world scenarios in a true Red Team / Blue Team style. Aside from seeing first hand how attacks can unfold, you'll learn what signals and alerts are generated, or what traces are left behind which you can use to detect and respond to attacks as they are unfolding. You'll not only learn how Microsoft's solutions can help you, but also where some fall short and some out-of-the-box thinking might be required.

Endpoint security done right: how to efficiently secure your endpoints with Microsoft.

A balanced security approach considers various elements; endpoints included. In this session, Michael walks you through the steps needed to successfully secure your endpoints so that you have a solid foundation to start from. From protection to detection to response, from EDR to hardening a successful patching strategy. They all belong in your endpoint security strategy, and they are all covered here.

Common mistakes while deploying, configuring, and managing Defender for Endpoint and Identity

There is always more than meets the eye. In this session, Michael will walk over some of the most common misconceptions and mistakes when it comes to deploying, configuring, managing and using Microsoft Defender for Identity & Endpoint. Learn why these, sometimes seemingly, simple things can make a huge difference in how to most efficiently use these products.

Data Protection simplified: setting up efficient data protection in 1-2-3

Microsoft's Sensitivity Labels are a very powerful feature within their Information Protection stack of products. However, with great power comes great responsibility. And you shouldn't revert to labeling for all your data protection needs. In this session, Michael will provide some real-world tips and tricks to get started with sensitivity labels in no time and why using encryption might not be the panacea you're looking for.

Red vs. Blue: Microsoft at the core of your protection, detection, and response capabilities!

In this session, Michael will demonstrate some (common) attack scenarios, how they can be exploited and how Microsoft’s security solutions can help you prevent, detect, and respond to these types of attacks. If you’re interested on become a better ‘Blue Teamer’, this session is for you!

Microsoft 365 Security masterclass

Do you want to become a master in understanding, designing, deploying and using Microsoft's latest security products? In this workshop, Michael will show you the ins and outs of the entire Microsoft 365 Security stack. As an added bonus, we'll see how Microsoft Sentinel can best be used to further enhances your security operations.

Modern Workplace Conference Paris 2019 Sessionize Event

December 2019 Paris, France

EXPERTS LIVE NETHERLANDS 2019 Sessionize Event

June 2019

Techorama Belgium 2019 Sessionize Event

May 2019 Antwerpen, Belgium

European Collaboration Summit 2017 Sessionize Event

May 2017

Michael Van Horenbeeck

CEO | MVP | MCSM