Office 365 Office 365 Office 365 Governance Microsoft Teams SharePoint Exchange Online Exchange Server Azure Active Directory Enterprise Mobility and Security Security & Compliance Microsoft 365 Microsoft Teams
Michael Van Horenbeeck is a Microsoft Certified Solutions Master (MCSM) and Azure Threat Protection MVP from Belgium, and one of the few people worldwide to hold both the coveted certification and award at the same time. He is a dynamic tech enthusiast and focuses on Security, Identity Management, with a history in Messaging and Collaboration.
In his daily job, Michael is the CEO at “The Collective” and works with customers of all sizes around the globe to help them become and stay secure with, and through, Microsoft's solutions and services.
Besides his job at The Collective, Michael loves to engage with the community and inspire people. He is the driving force behind the Microsoft 365 Security for IT Pros e-book and you can regularly find him writing about technology for a variety of tech websites or catch him speaking at different events across the globe.
Michael is on Twitter as @vanhybrid and you can follow his ramblings on m365securitybook.com, insight365.eu, or through his company's website www.thecollective.eu.
Microsoft Defender for Endpoint is great at wat it does, but it's not the end all be all. In this session, Alex and Michael look beyond Microsoft Defender for Endpoint and show you how to build a multi-layered approach to security. You'll learn where Microsoft Defender for Endpoint excels, but - more importantly - how where it falls short and how to address those shortcomings. Along the way, you'll see what is required to create a multi-layered approach to security to further strengthen your defenses and increase your overall security posture.
In this challenging cyber threat landscape, it is important to keep control over what's happening in your environment. With Microsoft 365 Defender and Azure Sentinel, you have two products which can help you to do just that. Both can be used to aggregate incidents and data between different solutions and each have their own strenghts and weaknesses. As with everything: It's paramount to use them the 'right' way. In this session Michael and Thijs will walk you through both products and provide tips and tricks in order to optimize your Microsoft SecOps experience based on real-life experience, from running a SOC.
If anything, Microsoft Defender for Endpoint is a versatile security platform which can help you greatly increase the security posture of your environment and endpoints. In this session you will find out how to best deploy Microsoft Defender for Endpoint, what policies to apply and why, etc. All so that your own deployment is a breeze. Want to find out how we deployed more than 100,000 endpoints in a matter of weeks and what our experiences are from our SOC? Join Michael and find out!
These days, however, flexible access to your data (from any place at any time) is important -- especially with so many working from home. However, solely protecting the location where data is stored is no longer a viable option. Instead, you must create a balanced approach so that data is available in a flexible way and that people can share and collaborate without compromise to the integrity and security of your information. In this session we'll dive into the different options, from (endpoint) DLP to Unified Labeling and various other ways of encrypting data.
By focusing on point solutions, many organizations are tackling security the wrong way and missing out on a more efficient and effective way to protect, detect and respond to (new) threats. Come in and learn how the playing field os changing and why your security approach should too!
The world of cybersecurity is constantly evolving. A few years ago, Microsoft wasn't even considered a security vendor. Today, they are one of the top-tier solution providers when it comes to security-related solutions and services. In this session, Michael sheds a light on what it is to run a SOC on top of Microsoft's solutions. You'll get to see the good, the bad, and also some of the ugly sides, all based on cases he's seen in the SOC in the past year.
The world of cybersecurity is challenging, but also lots of fun. In this demo-packed session, Michael walks you through a number of real-world scenarios in a true Red Team / Blue Team style. Aside from seeing first hand how attacks can unfold, you'll learn what signals and alerts are generated, or what traces are left behind which you can use to detect and respond to attacks as they are unfolding. You'll not only learn how Microsoft's solutions can help you, but also where some fall short and some out-of-the-box thinking might be required.
A balanced security approach considers various elements; endpoints included. In this session, Michael walks you through the steps needed to successfully secure your endpoints so that you have a solid foundation to start from. From protection to detection to response, from EDR to hardening a successful patching strategy. They all belong in your endpoint security strategy, and they are all covered here.
Not a day goes by without news of one or the other breach, data leak or ransomware attack. The current cybersecurity landscape forces defenders to rethink how to protect, detect and respond to threats. In this session we'll explain why Microsoft 365 Defender matters, and how to get most out of it.
For better and worse, many organizations still heavily rely on an on-premises Active Directory. However, they don't have to. Join Michael and find out what you should do NOW to start reducing your dependencies and be ready for a future in the cloud.
There’s more than one way to bake a cake. The same is true for securing your environment. With the plethora of features available to Microsoft customers, whether it’s a built-in capability or a third-party solution, it’s sometimes hard to see the forest for the trees. But don’t worry: you can have your cake and eat it! In this session, we’ll go through the motions of how to develop and deliver a successful security strategy without having to become a security-expert yourself. We’ll go over some very common (security) requirements and translate them into real-world solutions using real-world examples. If you’re interested to learn more about acronyms like MDE, MDI, MDI, ATP, EMS, MCAS, AIP, OME and why they are important to you, attend this session!
There's more than one way to catch a rabbit... Securing identities with MFA is required, but only one of the elements to build a strong identity governance approach. In this session, we'll learn how you can leverage the full feature set of Azure AD to protect identities, detect misuse/abuse, govern the lifecycle and combine all of them in an harmonized approach.
As more and more organizations move to Office 365, the likelihood that you'll run into cross-tenant migrations increases. Even now, many organizations have already had to deal with acquisitions, mergers and divestitures of some sort in Office 365. This session is all about uncovering the dirty details on what works and what doesn't. What options does Microsoft provide and for which challenges do you need other solutions? Cross-tenant migrations entail a series of hurdles to overcome, starting from (geo-)political issues to hardcore technical challenges. Based on real-world experience with several world-wide projects, Michael will walk you through the same process he went through and he might even share a few of his mistakes so you don't have to!
In this session, we'll discuss 10 (easy) things you can do to secure your modern workplace. Our tips cover everything from securely accessing your environment, to making sure you can respond appropriately if and when a breach occurs.