Ignite 2019 is approaching fast – and again there are a lot of interesting and thrilling sessions coming – esp. regarding “my” topics “Security & Compliance” (in Modern Workplace).
Update1: Added Security Path SECI & SECO
Update2: translated to English
Update3: Added (Tech) Keynotes
Update4: Added Compliance Path COMP
Update5: Added Top3 Highlight Sessions
And same procedure as last year I created “my Playlist” (based on the current session catalog, there might be short-term changes and I will update the list as soon as I am aware of such a change.
As soon as the recordings are available on YouTube I will update the links to these because it will be more reliable for the future.
I have five tables for you, first the “Securing your Organization” then the “Configuring and deploying security and identity solutions” security path and third in the line is the “Meeting organizational compliance requirements“. After that the “Theater” Sessions (normally ~20min) and last but not least the “Breakouts“, these might be up to 75min.
And yes, these are quite a few – probably not “every” available and I don’t say it’s 100%.
@Cortana: please cancel all my appointments for November and change my Teams status to “I am extrem igniting”!
And of course you should start with the keynotes:
My Top3 Sessions
- SECI20 “Shut the door to cybercrime with identity-driven security” (best content)
- BRK4010 “Windows security internals: Containers for the win” (best presentation of >L400 content)
- INK01 “Envisioning Tomorrow Keynote: innovating for an alternative futur” (most innovative)
And now go for the sessions:
Reset – Information Protection (13) – Identities (22) – Threat Protection (13) – Secure Score (3) – Microsoft Graph (5) – Cloud App Security (2) – Edge (2) – Windows 10 (4) – Security (Mgmt) (1) – Compliance (1)
||Navigate data protection and risk management in the cloud era
||Secure your edge with the new, most secure Windows 10 PCs
||State of the browser: Microsoft Edge
||Built in and cloud powered – elevate your endpoint security with Microsoft Defender ATP
||What’s new and what’s next: Security and compliance in SharePoint and OneDrive
||Data residency with Office 365 datacenters
||Simplify sign in and authorization with the Microsoft identity platform
||Your users are under attack! Strengthen your anti-phishing defense with these O365 ATP best practices
||Superlative protection, unparalleled intelligence: Learn why Office 365 ATP is the most trusted solution
||Security solutions from Microsoft, but not just for Microsoft services
||We’ve got your back: Team up with Microsoft’s security experts to respond to critical threats
||Secure your sensitive data! Understanding the latest Microsoft Information Protection capabilities
||Got Azure Information Protection? Navigating unified labeling, policy configuration, clients, and analytics
||Maayan Naaman Rand
||Demystifying Microsoft Information Protection solutions: A panel discussion with the product experts
||Take back the advantage: Max out your security posture with the all new Microsoft Secure Score
||How to operationalize making ongoing security posture assessments and improvements part of your organization’s DNA
||99+% of breaches didn’t occur because technology failed us. It’s time to fix the people problem!
||Detect, investigate, and respond to identity-based threats in your environment with Azure ATP
||Finding needles in a haystack: How to use Azure ATP to identify and investigate compromised users and suspicious activities at hybrid organizations.
||Real-world steps to protect against user account compromise. How Microsoft uses Identity Protection and Conditional Access to protect its assets without disruption?
||Unveil all the tools you need to use for risk management and compliance: Microsoft 365 compliance center
||Keep users productive and data secure in a cloud-first world: Secure browsing with Microsoft Edge
||Protect your data (in-transit and at-rest) with Microsoft 365 encryption technologies
||Implementing a zero trust security model at Microsoft
||2Lessons on operational resilience: Outcomes from Microsoft Defense and Response Team (DART) customer engagements to help organizations become operationally resilient to cyberthreats
||2019 Global Cyber Risk Perception Survey insights
||Microsoft cybersecurity reference architecture: A-Z explained with live demos
||Data is exploding: Intelligently manage your data lifecycle with information governance
||New Yammer compliance and administration experiences in Microsoft 365
||Optimal network connectivity for Office 365 performance: What is it and how to get there
||Role-based access control in Microsoft 365: Improve your operations and security posture
||How do we operate Microsoft Data Center with zero trust
||Insider risks keeping you up at night? Leveraging intelligence, Microsoft 365 can help you!
||Quickly identify and remediate corporate code-of-conduct policy violations
||eDiscovery for Microsoft Teams, Yammer, and beyond
||Endpoint security management with Microsoft Defender ATP and Microsoft Endpoint Manager
||Microsoft Office Privacy Controls and Diagnostic Data
||What does your sensitive data landscape look like? Best practices in data discovery, classification, analytics and reports
||Protecting sensitive information in Office apps and Office 365 services: A deeper look at the latest enhancements
||Using data loss prevention policies in Microsoft 365 to prevent oversharing of sensitive information across apps and services
||Protecting sensitive files and data can be hard. Choose the right data protection options that balance security and worker productivity
||Connect your workforce to all the apps they need with Azure Active Directory
||Luis Carlos Leon Plata
||Eliminate your weakest link with passwordless authentication
||Modernize your hybrid environment with Azure Active Directory
||Govern your workforce and guest user access with Azure Active Directory
||Winning strategies for identity security and governance
||Love all your identities – Building digital relationships with your customers and partners
||New frontiers in identity standards
||Building trust into digital experiences with decentralized identities
||Securing the modern workplace with Microsoft solutions in 10 (easy) steps
||Michael Van Horenbeeck
||SecOps teams – don’t drown in a sea of alerts! Use O365 ATP automation for efficient incident response
||Integrating CASB into IAM for a comprehensive identity security strategy
||Security in overdrive! Best practices for configuring Microsoft Defender ATP
||Azure Active Directory cloud authentication doesn’t just mean “sign-in”
||Advanced Threat Protection with Office 365 apps
||Securing Exchange Online from modern threats
||Protected, productive mobile browsing with Microsoft Edge mobile and Microsoft Intune
||Leverage the cloud to strengthen your on-premises Active Directory security
||Windows diagnostic data compliance
||Make the most of your blue team: Empower defenders with the correlated incidents and automation in our threat protection stack
||Make the predators your prey: Explore advanced threat hunting across identities, endpoints, and Office 365 with Microsoft 365 Threat Protection
||Increase M&A agility by integrating quickly and securely with Azure Active Directory
||Continuously assess and monitor your IT and data protection risks in Microsoft 365
||Securing, governing, and protecting your Office 365 investments
||Leverage compliance capabilities in Microsoft Teams and Yammer
||Microsoft identity platform best practices for developers
||Windows security internals: Containers for the win
||Real detection stories! See how Microsoft 365 Threat Protection defeated actual attacks and adheres to the MITRE framework
||The science behind Azure Active Directory Identity Protection
While compiling the list I got pretty hot on the content, can hardly wait any longer, I hope you feel the same after reading the list!
Security is the place to be and with the content of #msignite19 it will be very easy to getting more secure! 😉
If you are a Microsoft Partner and can imagine a solution in your portfolio in one or more of the topics and need support for the implementation, then contact your OCP contact (especially PDM/PTS) and we will win together!