Ignite 2019 is approaching fast – and again there are a lot of interesting and thrilling sessions coming – esp. regarding „my“ topics “Security & Compliance” (in Modern Workplace).
Update1: Added Security Path SECI & SECO
Update2: translated to English
Update3: Added (Tech) Keynotes
Update4: Added Compliance Path COMP
Update5: Added Top3 Highlight Sessions
Update6: The 2019 ignite pages have been removed. You can find (at least) the BRKs on youtube. Maybe I will go the way to replace all the broken links. tbc
And same procedure as last year I created “my Playlist” (based on the current session catalog, there might be short-term changes and I will update the list as soon as I am aware of such a change.
As soon as the recordings are available on YouTube I will update the links to these because it will be more reliable for the future.
I have five tables for you, first the „Securing your Organization“ then the „Configuring and deploying security and identity solutions“ security path and third in the line is the „Meeting organizational compliance requirements„. After that the “Theater” Sessions (normally ~20min) and last but not least the “Breakouts“, these might be up to 75min.
And yes, these are quite a few – probably not „every“ available and I don’t say it’s 100%.
@Cortana: please cancel all my appointments for November and change my Teams status to „I am extrem igniting“!
And of course you should start with the keynotes:
My Top3 Sessions
- SECI20 „Shut the door to cybercrime with identity-driven security“ (best content)
- BRK4010 „Windows security internals: Containers for the win“ (best presentation of >L400 content)
- INK01 „Envisioning Tomorrow Keynote: innovating for an alternative futur“ (most innovative)
And now go for the sessions:
Filter:
Reset – Information Protection (13) – Identities (22) – Threat Protection (13) – Secure Score (3) – Microsoft Graph (5) – Cloud App Security (2) – Edge (2) – Windows 10 (4) – Security (Mgmt) (1) – Compliance (1)
# |
Title |
Speaker |
010 |
Navigate data protection and risk management in the cloud era |
Alym Rayani |
1014 |
Secure your edge with the new, most secure Windows 10 PCs |
David Weston |
1019 |
State of the browser: Microsoft Edge |
Sean Lyndersay |
1041 |
Built in and cloud powered – elevate your endpoint security with Microsoft Defender ATP |
Heike Ritter |
2051 |
What’s new and what’s next: Security and compliance in SharePoint and OneDrive |
Sesha Mani |
2059 |
Data residency with Office 365 datacenters |
Brian Day |
2080 |
Simplify sign in and authorization with the Microsoft identity platform |
Saeed Akhter |
2104 |
Your users are under attack! Strengthen your anti-phishing defense with these O365 ATP best practices |
Girish Chander |
2105 |
Superlative protection, unparalleled intelligence: Learn why Office 365 ATP is the most trusted solution |
Jason Rogers |
2107 |
Security solutions from Microsoft, but not just for Microsoft services |
Kim Kischel |
2109 |
We’ve got your back: Team up with Microsoft’s security experts to respond to critical threats |
Jessica Payne |
2119 |
Secure your sensitive data! Understanding the latest Microsoft Information Protection capabilities |
Gagan Gulati |
2120 |
Got Azure Information Protection? Navigating unified labeling, policy configuration, clients, and analytics |
Maayan Naaman Rand |
2122 |
Demystifying Microsoft Information Protection solutions: A panel discussion with the product experts |
Mas Libman |
2123 |
Take back the advantage: Max out your security posture with the all new Microsoft Secure Score |
Nayna Sheth |
2124 |
How to operationalize making ongoing security posture assessments and improvements part of your organization’s DNA |
Michelle Gilbert |
2125 |
99+% of breaches didn’t occur because technology failed us. It’s time to fix the people problem! |
Brandon Koeller |
2126 |
Detect, investigate, and respond to identity-based threats in your environment with Azure ATP |
Tali Ash |
2127 |
Finding needles in a haystack: How to use Azure ATP to identify and investigate compromised users and suspicious activities at hybrid organizations. |
Tali Ash |
2132 |
Real-world steps to protect against user account compromise. How Microsoft uses Identity Protection and Conditional Access to protect its assets without disruption? |
Caleb Baker |
2180 |
Microsoft Graph |
Yina Arenas |
2229 |
Unveil all the tools you need to use for risk management and compliance: Microsoft 365 compliance center |
Ruchi Chopra |
2231 |
Keep users productive and data secure in a cloud-first world: Secure browsing with Microsoft Edge |
Arunesh Chandra |
2235 |
Protect your data (in-transit and at-rest) with Microsoft 365 encryption technologies |
Brijesh Desai |
2240 |
Implementing a zero trust security model at Microsoft |
Brian Fielder |
2250 |
2Lessons on operational resilience: Outcomes from Microsoft Defense and Response Team (DART) customer engagements to help organizations become operationally resilient to cyberthreats |
Ann Johnson |
2251 |
2019 Global Cyber Risk Perception Survey insights |
Joram Borenstein |
2272 |
Microsoft cybersecurity reference architecture: A-Z explained with live demos |
Mohamed Gibreel |
2384 |
Data is exploding: Intelligently manage your data lifecycle with information governance |
Shilpa Ranganathan |
3003 |
New Yammer compliance and administration experiences in Microsoft 365 |
John Bacus |
3040 |
Optimal network connectivity for Office 365 performance: What is it and how to get there |
Konstantin Ryvkin |
3041 |
Role-based access control in Microsoft 365: Improve your operations and security posture |
Alice Appleton |
3052 |
How do we operate Microsoft Data Center with zero trust |
Art Sadovsky |
3055 |
Insider risks keeping you up at night? Leveraging intelligence, Microsoft 365 can help you! |
Talhah Mir |
3056 |
Quickly identify and remediate corporate code-of-conduct policy violations |
Christophe Fiessinger |
3059 |
eDiscovery for Microsoft Teams, Yammer, and beyond |
Iram Arras |
3083 |
Endpoint security management with Microsoft Defender ATP and Microsoft Endpoint Manager |
Matt Shadbolt |
3088 |
Microsoft Office Privacy Controls and Diagnostic Data |
Brian Albrecht |
3100 |
What does your sensitive data landscape look like? Best practices in data discovery, classification, analytics and reports |
Athanasios Themelis |
3101 |
Protecting sensitive information in Office apps and Office 365 services: A deeper look at the latest enhancements |
Mike Paer |
3102 |
Using data loss prevention policies in Microsoft 365 to prevent oversharing of sensitive information across apps and services |
Vaibhav Upadhyay |
3103 |
Protecting sensitive files and data can be hard. Choose the right data protection options that balance security and worker productivity |
Aashish Ramdas |
3105 |
Connect your workforce to all the apps they need with Azure Active Directory |
Luis Carlos Leon Plata |
3106 |
Eliminate your weakest link with passwordless authentication |
Libby Brown |
3108 |
Modernize your hybrid environment with Azure Active Directory |
Jeevan Bisht |
3109 |
Govern your workforce and guest user access with Azure Active Directory |
Joseph Dadzie |
3110 |
Winning strategies for identity security and governance |
Alex Weinert |
3112 |
Love all your identities – Building digital relationships with your customers and partners |
Elisabeth Olson |
3113 |
New frontiers in identity standards |
Pamela Dingle |
3114 |
Building trust into digital experiences with decentralized identities |
Ankur Patel |
3141 |
Securing the modern workplace with Microsoft solutions in 10 (easy) steps |
Michael Van Horenbeeck |
3143 |
Secure your information, not your devices |
Olav Tvedt |
3153 |
SecOps teams – don’t drown in a sea of alerts! Use O365 ATP automation for efficient incident response |
Sumit Malhotra |
3154 |
Integrating CASB into IAM for a comprehensive identity security strategy |
Dana Kaufman |
3156 |
Security in overdrive! Best practices for configuring Microsoft Defender ATP |
Dilip Radhakrishnan |
3194 |
Azure Active Directory cloud authentication doesn’t just mean “sign-in” |
John Craddock; |
3239 |
Advanced Threat Protection with Office 365 apps |
Sriram Iyer |
3248 |
Securing Exchange Online from modern threats |
Brandon Koeller |
3253 |
Protected, productive mobile browsing with Microsoft Edge mobile and Microsoft Intune |
Ileana Wu |
3257 |
Leverage the cloud to strengthen your on-premises Active Directory security |
Charity Shelbourne |
3259 |
Windows diagnostic data compliance |
Steve Conn |
3265 |
Make the most of your blue team: Empower defenders with the correlated incidents and automation in our threat protection stack |
Michael Shalev |
3266 |
Make the predators your prey: Explore advanced threat hunting across identities, endpoints, and Office 365 with Microsoft 365 Threat Protection |
Naama Schlesinger |
3267 |
Bridge the gap between HR, IT and business with the Azure Active Directory identity provisioning platform |
Nitika Gupta |
3273 |
Continuously assess and monitor your IT and data protection risks in Microsoft 365 |
Om Vaiti |
3291 |
Securing, governing, and protecting your Office 365 investments |
Chris Bortlik |
3328 |
Leverage compliance capabilities in Microsoft Teams and Yammer |
Mas Libman |
4007 |
Microsoft identity platform best practices for developers |
Kyle Marsh |
4010 |
Windows security internals: Containers for the win |
Chris Jackson |
4016 |
Real detection stories! See how Microsoft 365 Threat Protection defeated actual attacks and adheres to the MITRE framework |
Elia Florio |
4017 |
The science behind Azure Active Directory Identity Protection |
Rajat Luthra |
While compiling the list I got pretty hot on the content, can hardly wait any longer, I hope you feel the same after reading the list!
Security is the place to be and with the content of #msignite19 it will be very easy to getting more secure! 😉
If you are a Microsoft Partner and can imagine a solution in your portfolio in one or more of the topics and need support for the implementation, then contact your OCP contact (especially PDM/PTS) and we will win together!
Cheers
Stephanus
2 Gedanken zu „My Session PlayList “Security & Compliance” for Ignite 2019“
Kommentare sind geschlossen.