

Cancelling your registration will remove your access to the event. If you proceed, you will no longer be able to participate or access event-related materials.
Deleting your account will remove your access to the event.
Need Technical Assistance? ✉ tech@vfairs.com
Unlock the power of cloud computing and elevate your .NET skills with VSLive Virtual! Join us for two days of immersive learning and networking with industry experts. Discover the latest trends and techniques in cloud-native development and gain the superpowers to take your projects to the next level. Don't miss this opportunity to transform your career and stay ahead of the game. Register now for VSLive Virtual, the must-attend conference for developers in 2025. Limited spots available, so secure your spot today!
Welcome to VSLive Virtual! Are you ready to transform your .NET skills into cloud-native superpowers? Join us at our virtual conference on January 28-29, 2025, and discover the latest tools and techniques for building cloud-native applications. Our expert speakers will share their insights and best practices, while interactive sessions and networking opportunities will connect you with like-minded professionals. Whether you're a developer, architect, or IT professional, this conference will provide you with the knowledge and skills to take your career to the next level. Don't miss this opportunity, register now and unlock your full potential in the world of cloud-native development.
View Info
Hide Info
Level: Intermediate
In this full day of hands-on training, we will go through Microsoft Defender XDR from a Security Analyst perspective.
We will cover the included products in Microsoft Defender XDR, and how to work with them to respond to incidents. Additionally, we will also go through how to perform Threat Hunting with Microsoft Defender XDR.
During this in-depth workshop we will have a mix of lectures and hands-on in the Defender Portal.
You will learn:
Mattias Borg
Cyber Security Geek
Incident Response Specialist with focus on Threat hunting in the Microsoft defense stack. Cyber Security consultant and Threat Hunter. Researching vulnerabilities when not working for customers.
Stefan Schörling
Onevinn AB
Onevinn AB
Cloud Security and Infra Geek, Onevinn AB
Stefan Schörling has over 20 years of experience from working with Cybersecurity. Today Stefan is helping customers to be successful with implementing and adopting Cloud Security with a focus on Azure and Microsoft 365. For the last 10+ years he has been awarded as a Microsoft MVP for his contributions in the community. He also holds several certifications in Incident Response and Forensics, CISM, CISSP among other Microsoft Certifications including Microsoft Certified Trainer.
Mattias Borg
mattias@mshome.eu
mattias@mshome.eu
Cyber Security Geek
Incident Response Specialist with focus on Threat hunting in the Microsoft defense stack. Cyber Security consultant and Threat Hunter. Researching vulnerabilities when not working for customers.
Stefan Schörling
stefan@schorling.org
stefan@schorling.org
Cloud Security and Infra Geek, Onevinn AB
Stefan Schörling has over 20 years of experience from working with Cybersecurity. Today Stefan is helping customers to be successful with implementing and adopting Cloud Security with a focus on Azure and Microsoft 365. For the last 10+ years he has been awarded as a Microsoft MVP for his contributions in the community. He also holds several certifications in Incident Response and Forensics, CISM, CISSP among other Microsoft Certifications including Microsoft Certified Trainer.
View Info
Hide Info
Level: Intermediate
Every computer, whether in a corporate LAN or a public network, needs to be protected with a firewall. This also applies to all servers! And this means the device itself and not a firewall on the perimeter. Zero Trust means that those protections are in place wherever you might take your computer, and that we can identify the computer and user, not just an address where it says it is. With Windows Firewall you can block pass-the-hash and other lateral movement techniques, and by adding IPsec, you can get all the benefits of 802.1x authenticated networks – only better, more granular, and for free!
Join, Sami Laiho, a world leading security expert, in this full-day workshop and learn how he manages different sized environments and deploys the concept of Client Firewalls.
You will learn:
Sami Laiho
Adminize.com
Adminize.com
Chief Research Officer, Adminize
Sami Laiho is one of the world's leading professionals in the Windows OS and Security. Sami has been working with and teaching OS troubleshooting, management, and security for over 25 years. Sami has been a Microsoft MVP in the Windows OS since 2011. Since 2019 Sami has been chosen by TiVi-magazine as one of the top 100 influencers in IT in his country, and is in Top10 of the most followed people in his field in Finland. At Microsoft Ignite 2018, Sami's "Behind the Scenes: How to build a conference winning session" and "Sami Laiho: 45 Life Hacks of Windows OS in 45 minutes" sessions were ranked as #1 and #2 out of 1,708 sessions! Before that, at Ignite 2017, Sami was evaluated as the Best External Speaker! Sami works as a Chief Research Officer and Senior Technical Fellow for Adminize.com. More info at https://samilaiho.com/. Follow Sami on Twitter @samilaiho.
Sami Laiho
sami@adminize.com
sami@adminize.com
Chief Research Officer, Adminize
Sami Laiho is one of the world's leading professionals in the Windows OS and Security. Sami has been working with and teaching OS troubleshooting, management, and security for over 25 years. Sami has been a Microsoft MVP in the Windows OS since 2011. Since 2019 Sami has been chosen by TiVi-magazine as one of the top 100 influencers in IT in his country, and is in Top10 of the most followed people in his field in Finland. At Microsoft Ignite 2018, Sami's "Behind the Scenes: How to build a conference winning session" and "Sami Laiho: 45 Life Hacks of Windows OS in 45 minutes" sessions were ranked as #1 and #2 out of 1,708 sessions! Before that, at Ignite 2017, Sami was evaluated as the Best External Speaker! Sami works as a Chief Research Officer and Senior Technical Fellow for Adminize.com. More info at https://samilaiho.com/. Follow Sami on Twitter @samilaiho.
View Info
Hide Info
Level: Intermediate
Entra ID is Microsoft’s multi-tenant cloud-based directory and identity management service. For IT Admins, Entra ID provides an affordable, easy to use solution to give employees and business partners single sign-on (SSO) access to thousands of cloud SaaS Applications like Office365, Salesforce.com, Drobox, and Concur. For application developers, Entra ID lets you focus on building your application by making it fast and simple to integrate with a world class identity management solution used by millions of organizations around the world.
Microsoft Entra ID also includes a full suite of identity management capabilities including multi-factor authentication, device registration, self-service group management, privileged account management, role-based access control, application usage monitoring, rich auditing and security monitoring and alerting. These capabilities can help secure cloud-based applications, streamline IT processes, cut costs, and help ensure that corporate compliance goals are met.
This intensive PowerCamp not only prepares you with real world skills but provides an opportunity to interact and learn from an industry expert. Join us for a full day of intensive learning and discussions to fast-track through the maze of technology and get straight to the point this jam-packed day.
You will learn:
Andy Malone
andymalone.org
andymalone.org
Worldwide Speaker, YouTuber, Tech Instructor, Author
Winning the coveted Microsoft Speaker Idol competition in 2006 catapulted Andy into a prestigious international speaking career. Today, Andy is not only a world class conference speaker but is also a renowned security & technology expert who has delivered ground-breaking content to hundreds of thousands of delegates worldwide. His passionate style of delivery combined with a sense of fun has become his trademark and have won him multiple awards and global acclaim at events including, Microsoft Ignite, NIC, TechMentor, Spiceworld, The Cybercrime Security Forum, and many more. Although teaching and consulting on cloud and cybersecurity remain his primary focus. Andy also loves to inspire, and with technology ever changing, there's often an interesting story to be told.
Andy Malone
andy@andymalone.org
andy@andymalone.org
Worldwide Speaker, YouTuber, Tech Instructor, Author
Winning the coveted Microsoft Speaker Idol competition in 2006 catapulted Andy into a prestigious international speaking career. Today, Andy is not only a world class conference speaker but is also a renowned security & technology expert who has delivered ground-breaking content to hundreds of thousands of delegates worldwide. His passionate style of delivery combined with a sense of fun has become his trademark and have won him multiple awards and global acclaim at events including, Microsoft Ignite, NIC, TechMentor, Spiceworld, The Cybercrime Security Forum, and many more. Although teaching and consulting on cloud and cybersecurity remain his primary focus. Andy also loves to inspire, and with technology ever changing, there's often an interesting story to be told.
View Info
Hide Info
Level: Advanced
Imagine if You Could Watch Every Step They Take…
Unmasking a threat actors activities is sometime like deciphering an ancient manuscript, but what if you can see every move and control when to strike the pause.
This session is not about log analysis, or following the breadcrumbs left by an elusive adversary. It is about having a full timeline of the threat actors machine and knowing exactly what was done without assumptions or guessing!
You will learn:
Hasain Alshakarti
Truesec
Truesec
Principal Cybersecurity Advisor, Truesec
Hasain, also known as "The Wolf", is an industry-leading cyber security expert with more than 26 years of experience. He has extensive and deep expertise from numerous design projects, security audits, advanced implementation projects, incident response, digital forensic, threat hunting and penetration testing. He helps customers understand and build solutions to protect, detect and respond to cyber threats for enterprises, government agencies, banks, military organizations among others. Due to his expertise, he is a sought-after advisor, speaker and a popular instructor. For his many achievements over the years, Hasain has been awarded recognition as “Sweden’s leading IT security expert” and Microsoft MVP in Enterprise Security and Cloud & Datacenter.
View Info
Hide Info
Level: Introductory
Created by Mark Russinovich as part of Microsoft's Free Sysinternals suite of tools, Sysmon is an amazingly customizable and powerful tool in the security professional's arsenal.
Deployed on Windows hosts, be they servers or workstations, Sysmon captures and logs all sorts of actionable data about potentially nefarious activity taking place on your systems, and goes far beyond what standard Windows Security Log auditing can provide. Want to know when malware is creating files in suspect directories? Want to know when an attacker is establishing certain types of network connections (e.g. RDP/FTP) to exfiltrate data? Want to know when Autorun registry locations are being changed, or when a user accesses the clipboard? Want to see all the DNS queries a user makes? Deploy Sysmon!
In this introductory level session I'll quickly show you what Sysmon audits, how to customize its XML file, and how to quickly deploy it to your systems using another great Sysinternals tool, PSEXEC. We'll also discuss ways to control the data it produces prior to SIEM/SIM ingestion, and how to write PowerShell scripts with event log triggers to act on certain Sysmon events.
You will learn:
Andy Milford
RDPSoft
RDPSoft
CEO, RDPSoft
Andy Milford is a veteran software entrepreneur in the Windows networking and security space. Prior to founding RDPSoft, Andy was the CEO and founder of a Windows event log management company, Dorian Software Creations, Inc., which was acquired by Ipswitch Software in 2009. While at Ipswitch, Andy served as Vice President of Business Intelligence Products and was responsible for expansion of the log management and similar product lines. Andy left Ipswitch in 2012 and founded RDPSoft to begin development on Remote Desktop Reporter, a comprehensive metric tracking and reporting solution for server based computing platforms like Microsoft RDS, Citrix, and VMWare Horizon View. In 2016, Andy was recognized as a Microsoft MVP in the Enterprise Mobility / Remote Desktop Services category, and has remained an MVP ever since. He also enjoys educating IT pros about Remote Desktop Services and Windows Virtual Desktop, and has been a guest speaker at TechMentor and BriForum in the past.
View Info
Hide Info
Level: Intermediate
Join Microsoft MVP and Youtuber, Andy Malone as he introduces you to the world of Quantum Cryptography. With technology literally moving at the speed of light. IT Pro’s and security professionals alike must keep ahead of cybercriminals. So, in this deep dive session join Andy, as he takes you on a journey inside Quantum cryptography. Here we’ll discuss not only the basics, like Qubits but also delve into the technical details of how this revolutionary technology works and more importantly how it can keep you and your data safe.
You will learn:
Andy Malone
andymalone.org
andymalone.org
Worldwide Speaker, YouTuber, Tech Instructor, Author
Winning the coveted Microsoft Speaker Idol competition in 2006 catapulted Andy into a prestigious international speaking career. Today, Andy is not only a world class conference speaker but is also a renowned security & technology expert who has delivered ground-breaking content to hundreds of thousands of delegates worldwide. His passionate style of delivery combined with a sense of fun has become his trademark and have won him multiple awards and global acclaim at events including, Microsoft Ignite, NIC, TechMentor, Spiceworld, The Cybercrime Security Forum, and many more. Although teaching and consulting on cloud and cybersecurity remain his primary focus. Andy also loves to inspire, and with technology ever changing, there's often an interesting story to be told.
View Info
Hide Info
Level: Introductory to Intermediate
Disaster Recovery professionals know to expect the unexpected. But cybercrime and ransomware have completely changed the DR planning landscape. Because recovery from a cyber event can be very different from recovering from a traditional disaster. What should you do to prepare when there isn’t one guaranteed approach for recovering compromised data?
During our presentation, we’ll walk you through some recovery scenarios. We’ll also complete some tabletop exercises to show you how the right planning and flexibility can give you a better chance to recover from a cyber event
You will learn:
Jim Jones
Justin Nordeste
View Info
Hide Info
Level: Everyone
In a world where data is the lifeblood of business, ensuring its protection and rapid recovery is more critical than ever. Join industry leaders as they discuss the evolving landscape of data resilience, best practices for cloud-based protection, and innovative strategies to safeguard your organization's most valuable asset. Discover how to build a robust, agile approach to data continuity in today’s fast-paced digital environment.
Dave Kawula
dkawula@triconelite.com
dkawula@triconelite.com
Principal Consultant, TriCon Elite Consulting
Dave Kawula is an Enterprise Consultant, Technology Evangelist, Best Selling Author, and all around geek. He loves Microsoft Technology and is considered one of the best in his field. He holds over 50 + Microsoft Certifications and is also a Microsoft MVP. Dave is also a Veeam Vanguard, Alumni Cisco Champion, and Nutanix NTC. Dave is the Conference Co-Chair for TechMentor and in 2017 was a top 5 speaker in his track at Microsoft Ignite. In 2018 Dave tied for #1 top session at Microsoft Ignite. He can be followed on twitter @davekawula
Sami Laiho
sami@adminize.com
sami@adminize.com
Chief Research Officer, Adminize
Sami Laiho is one of the world's leading professionals in the Windows OS and Security. Sami has been working with and teaching OS troubleshooting, management, and security for over 25 years. Sami has been a Microsoft MVP in the Windows OS since 2011. Since 2019 Sami has been chosen by TiVi-magazine as one of the top 100 influencers in IT in his country, and is in Top10 of the most followed people in his field in Finland. At Microsoft Ignite 2018, Sami's "Behind the Scenes: How to build a conference winning session" and "Sami Laiho: 45 Life Hacks of Windows OS in 45 minutes" sessions were ranked as #1 and #2 out of 1,708 sessions! Before that, at Ignite 2017, Sami was evaluated as the Best External Speaker! Sami works as a Chief Research Officer and Senior Technical Fellow for Adminize.com. More info at https://samilaiho.com/. Follow Sami on Twitter @samilaiho.
Mikael Nystrom
mikael.nystrom@truesec.se
mikael.nystrom@truesec.se
Principal Technical Architect, TrueSec
Mikael Nystrom is a Microsoft MVP and Principal Technical Architect at Truesec, with an extremely broad field of competence. He has worked with all kinds of infrastructure tasks, in all kinds of environments, enterprise to small business. He is currently working in the CSIRT where he is Rebuilding, Recovering, Deploying, Configuring and Restoring organizations hit by cyberattacks or other incidents. Mikael is a very popular instructor and speaker at major conferences such as Security Summit and MMS
John O'Neill, Sr.
JONeillSr@awesomewildstuff.com
JONeillSr@awesomewildstuff.com
Chief Technologist, AWS Solutions
John’s professional IT career began as a teenager, taking him on many wonderful adventures over the past 30 years. John’s IT path started with programming but branched out quickly. Opportunities from the Help Desk to the Corner Office shape his IT journey. Specializing in CyberSecurity, Cloud, and Infrastructure technologies, John’s broad skillset includes Business Systems (ERP/CRM/HRMS), Desktop and Server OS, Identity Management, Endpoint Management, Public/Private/Hybrid Cloud, Networking Services, Network Architecture, IP Telephony, CyberInsurance, and CyberSecurity. Passionate about giving back to the IT community, John develops relevant, timely content that IT Pros take advantage of immediately. Part of the MVPDays team, he develops both online and in-print content. In addition, John authored material as a contributing editor for the Petri.co.il online community as well as a senior contributor to Tom’s IT Pro, Redmond Magazine, Netwrix, and both Thomson-Reuters' Aspatore Books and Exec Blueprints publications. Helping others succeed and advance in IT drives John to share knowledge. Speaking at conferences worldwide, developing technology training courses for Pluralsight’s online training library, and leading webinars are all regular investments by John in the current and next generation of IT professionals. Blending high-tech education with a bit of entertainment, attendees at John’s sessions regularly rate him as one of their favorite speakers. Attendees rated John top speaker for TechMentor Redmond 2019 and again in 2022. John is proud to be honored by industry organizations, leaders, and especially his peers. A four-time recipient of Microsoft’s MVP Award, John received NEOSA’s CIO of the Year Award in 2012.
Shankar Subramaniam
Druva
Druva
Shankar Subramaniam has over 20 years of experience in bringing customer value with security and AI products. At Druva, he is responsible for growing Druva’s security business with offerings in ransomware resilience (detection/response/recovery), Data Security Posture Management (DSPM) and eDiscovery. He was previously the founder and CTO of Concentric AI, having envisioned, architected and led market adoption of the AI-powered DSPM product. Shankar spent most of his career at startups incubating and building products for mass adoption at Niara as a co-founder, Aruba Networks, Andiamo Systems and Shasta Networks.
Andrew Silva
HPE
HPE
Andrew Silva is a strategic, results-driven leader with extensive experience in technology and a strong business orientation. Skilled at building and nurturing productive relationships with both partners and customers. An effective public speaker, adept at creating and delivering compelling presentations on complex topics. Proficient in leveraging modern frameworks, proven methodologies, and industry best practices to drive success.
View Info
Hide Info
Level: Introductory to Intermediate
In today's rapidly evolving digital landscape, securing your organization's data and resources is more crucial than ever. This lightning talk will delve into the top five Microsoft 365 security best practices you should implement today to safeguard your digital environment. We will explore essential strategies such as protecting credentials, safeguarding your content, and securing devices. By the end of this session, you'll be equipped with actionable insights to enhance your organization's security posture, better protecting your environment against emerging threats. Join us to learn how to fortify your Microsoft 365 environment with these important security measures.
You will learn:
Ben Stegink
Intelligink
Intelligink
Owner & Chief Consultant, Microsoft Cloud Architect and Microsoft 365 MVP, Intelligink
Ben is a Microsoft MVP, MCT, and the owner and chief consultant at Intelligink, where he focuses on Microsoft 365 and Azure. He has worked with SharePoint for 15+ years and Microsoft 365 and Azure for 10+ years. Since starting his career with Microsoft cloud, he has done work for professional sports organizations, government organizations, and organizations ranging in size from as few as 25 employees up to organizations of several thousand employees spread around the globe. Ben is also a co-host of the MS Cloud IT Pro Podcast - https://msclouditpro.com, where he discusses the latest technologies in the Microsoft Office 365 and Azure space from an IT Pro point of view. You can find him on Twitter- @benstegink, YouTue - https://www.youtube.com/@ben_stegink, and his blog - https://www.benstegink.com.
View Info
Hide Info
Level: Intermediate
This engaging conference session delves into the exciting realm of Artificial Intelligence (AI) and its profound impact on resolving age-old problems in Cyber Risk Management. This session reveals how AI is reshaping our approach to age-old cybersecurity challenges, offering practical insights and real-world examples of its impact. Join us to discover AI's potential for proactive risk identification, compliance assessment, cross walking of regulations, to stay at the forefront of cybersecurity innovation.
You will learn:
Padraic O'Reilly
CyberSaint
CyberSaint
Founder and Chief Innovation Officer, CyberSaint
Padraic O'Reilly is Founder and Chief Innovation Officer at CyberSaint, where he leads product innovation and development. His experience as a Harvard-trained economist, IT risk and compliance consultant, and his rapid exposure to cybersecurity led him to seek out CISOs, CIOs, and Boards of Directors at global organizations to pursue the answer to the question - how can cyber be managed, measured, and understood like any other business function? Padraic’s current activity spans working directly with organizations from public agencies to private companies across the globe to understand how to measure and manage cyber risk from assessment to boardroom. Working closely with large, highly regulated enterprise teams and CISOs, Padraic is dedicated to driving tangible value through linking cyber risks to controls, innovating with financial models and AI, and enhancing cyber to business communication. Padraic was a key member of the group providing feedback on the NIST Cybersecurity Framework during its development, and is an expert in regulatory standards both in security and privacy, including the NIST Risk Management and NIST Privacy Frameworks. An expert in Artificial Intelligence (AI) and economic modeling, Padraic works with members of the Global 500 to research and deploy risk quantification, risk intelligence gathering, and risk reporting and communication strategies. Padraic also holds a patent entitled, “System And Method for Monitoring And Grading A Cybersecurity Framework” which has inspired much of his work on cohesive IT and cyber risk management approaches. Padriac has been featured in publications and TV stations such as CNN, Wall Street Journal, Forbes, Fortune, New York Times, and Bloomberg discussing the role of the security leader in business.
View Info
Hide Info
Level: Introductory
Cyber criminals are bullies; they pick on the weakest systems first. Many organizations believe they have a zero-trust architecture and high-security, yet fall victim to attacks exploiting misconfigurations, limited control, and poor cyber-hygiene. During this non-stop, lighting fast session we’ll cover best practices preventing poor security configurations from allowing your systems to fall victim to cyberattack.
You will learn:
John O'Neill, Sr.
AWS Solutions
AWS Solutions
Chief Technologist, AWS Solutions
John’s professional IT career began as a teenager, taking him on many wonderful adventures over the past 30 years. John’s IT path started with programming but branched out quickly. Opportunities from the Help Desk to the Corner Office shape his IT journey. Specializing in CyberSecurity, Cloud, and Infrastructure technologies, John’s broad skillset includes Business Systems (ERP/CRM/HRMS), Desktop and Server OS, Identity Management, Endpoint Management, Public/Private/Hybrid Cloud, Networking Services, Network Architecture, IP Telephony, CyberInsurance, and CyberSecurity. Passionate about giving back to the IT community, John develops relevant, timely content that IT Pros take advantage of immediately. Part of the MVPDays team, he develops both online and in-print content. In addition, John authored material as a contributing editor for the Petri.co.il online community as well as a senior contributor to Tom’s IT Pro, Redmond Magazine, Netwrix, and both Thomson-Reuters' Aspatore Books and Exec Blueprints publications. Helping others succeed and advance in IT drives John to share knowledge. Speaking at conferences worldwide, developing technology training courses for Pluralsight’s online training library, and leading webinars are all regular investments by John in the current and next generation of IT professionals. Blending high-tech education with a bit of entertainment, attendees at John’s sessions regularly rate him as one of their favorite speakers. Attendees rated John top speaker for TechMentor Redmond 2019 and again in 2022. John is proud to be honored by industry organizations, leaders, and especially his peers. A four-time recipient of Microsoft’s MVP Award, John received NEOSA’s CIO of the Year Award in 2012.
View Info
Hide Info
Level: Everyone
The cybersecurity landscape is shifting fast — are you ready for what’s next?
This keynote delivers a deep, insightful look into the most impactful cybersecurity developments of 2023 and 2024 — the attacks that redefined defenses, the technologies that changed the game, and the unexpected trends that caught even seasoned professionals by surprise.
But it doesn't stop there.
You’ll also get a forward-looking view into what’s coming in 2025and beyond, including:
Expect real-world examples, data-driven analysis, and practical insights that will help you strengthen your organization’s security posture and stay resilient in an increasingly complex threat environment.
Led by internationally respected security researcher Sami Laiho, this keynote isn’t just about understanding the past — it’s about preparing with confidence for the future.
Walk away with a sharper perspective and a clear roadmap for securing what’s next.
Sami Laiho
Adminize.com
Adminize.com
Chief Research Officer, Adminize
Sami Laiho is one of the world's leading professionals in the Windows OS and Security. Sami has been working with and teaching OS troubleshooting, management, and security for over 25 years. Sami has been a Microsoft MVP in the Windows OS since 2011. Since 2019 Sami has been chosen by TiVi-magazine as one of the top 100 influencers in IT in his country, and is in Top10 of the most followed people in his field in Finland. At Microsoft Ignite 2018, Sami's "Behind the Scenes: How to build a conference winning session" and "Sami Laiho: 45 Life Hacks of Windows OS in 45 minutes" sessions were ranked as #1 and #2 out of 1,708 sessions! Before that, at Ignite 2017, Sami was evaluated as the Best External Speaker! Sami works as a Chief Research Officer and Senior Technical Fellow for Adminize.com. More info at https://samilaiho.com/. Follow Sami on Twitter @samilaiho.
View Info
Hide Info
Level: Intermediate to Advanced
We have never seen this many incidents where the adversary literally just walks in as during the last year!
Many think we are exaggerating when saying that "Hackers don’t HACK in, they LOG IN". But It has never been easier to just log in to a lot of enterprises.
Why and how is this possible at all? What can we do to stop it?
You will learn:
Hasain Alshakarti
Truesec
Truesec
Principal Cybersecurity Advisor, Truesec
Hasain, also known as "The Wolf", is an industry-leading cyber security expert with more than 26 years of experience. He has extensive and deep expertise from numerous design projects, security audits, advanced implementation projects, incident response, digital forensic, threat hunting and penetration testing. He helps customers understand and build solutions to protect, detect and respond to cyber threats for enterprises, government agencies, banks, military organizations among others. Due to his expertise, he is a sought-after advisor, speaker and a popular instructor. For his many achievements over the years, Hasain has been awarded recognition as “Sweden’s leading IT security expert” and Microsoft MVP in Enterprise Security and Cloud & Datacenter.
View Info
Hide Info
Level: Introductory to Intermediate
Ransomware is the nuclear bomb of malware. Annoying popups and single file deletion problems pale in comparison to the organization-level crippling most ransomware attacks produce. Not to mention the public relation nightmares! Microsoft brings to bear formidable defenses with their Microsoft 365 Defender line of products. Leveraging Microsoft 365 Defender, organizations attacked by ransomware minimize their damage and downtime.
You will learn:
Dave Kawula
TriCon Elite Consulting
TriCon Elite Consulting
Principal Consultant, TriCon Elite Consulting
Dave Kawula is an Enterprise Consultant, Technology Evangelist, Best Selling Author, and all around geek. He loves Microsoft Technology and is considered one of the best in his field. He holds over 50 + Microsoft Certifications and is also a Microsoft MVP. Dave is also a Veeam Vanguard, Alumni Cisco Champion, and Nutanix NTC. Dave is the Conference Co-Chair for TechMentor and in 2017 was a top 5 speaker in his track at Microsoft Ignite. In 2018 Dave tied for #1 top session at Microsoft Ignite. He can be followed on twitter @davekawula
John O'Neill, Sr.
JONeillSr@awesomewildstuff.com
JONeillSr@awesomewildstuff.com
Chief Technologist, AWS Solutions
John’s professional IT career began as a teenager, taking him on many wonderful adventures over the past 30 years. John’s IT path started with programming but branched out quickly. Opportunities from the Help Desk to the Corner Office shape his IT journey. Specializing in CyberSecurity, Cloud, and Infrastructure technologies, John’s broad skillset includes Business Systems (ERP/CRM/HRMS), Desktop and Server OS, Identity Management, Endpoint Management, Public/Private/Hybrid Cloud, Networking Services, Network Architecture, IP Telephony, CyberInsurance, and CyberSecurity. Passionate about giving back to the IT community, John develops relevant, timely content that IT Pros take advantage of immediately. Part of the MVPDays team, he develops both online and in-print content. In addition, John authored material as a contributing editor for the Petri.co.il online community as well as a senior contributor to Tom’s IT Pro, Redmond Magazine, Netwrix, and both Thomson-Reuters' Aspatore Books and Exec Blueprints publications. Helping others succeed and advance in IT drives John to share knowledge. Speaking at conferences worldwide, developing technology training courses for Pluralsight’s online training library, and leading webinars are all regular investments by John in the current and next generation of IT professionals. Blending high-tech education with a bit of entertainment, attendees at John’s sessions regularly rate him as one of their favorite speakers. Attendees rated John top speaker for TechMentor Redmond 2019 and again in 2022. John is proud to be honored by industry organizations, leaders, and especially his peers. A four-time recipient of Microsoft’s MVP Award, John received NEOSA’s CIO of the Year Award in 2012.
View Info
Hide Info
Level: Intermediate
It’s the front door, and he who should not be named is knocking. Cyber criminals never rest, and neither should your security stance. In this demo rich session Andy will take you on a journey inside Entra ID and discuss the latest tactics that would be criminals are using to hack into your environment and how Entra and other security features can be used to detect and thwart these attacks. If you’re serious about security, then grab your wand as this is session you’ll not want to miss.
You will learn:
Andy Malone
andymalone.org
andymalone.org
Worldwide Speaker, YouTuber, Tech Instructor, Author
Winning the coveted Microsoft Speaker Idol competition in 2006 catapulted Andy into a prestigious international speaking career. Today, Andy is not only a world class conference speaker but is also a renowned security & technology expert who has delivered ground-breaking content to hundreds of thousands of delegates worldwide. His passionate style of delivery combined with a sense of fun has become his trademark and have won him multiple awards and global acclaim at events including, Microsoft Ignite, NIC, TechMentor, Spiceworld, The Cybercrime Security Forum, and many more. Although teaching and consulting on cloud and cybersecurity remain his primary focus. Andy also loves to inspire, and with technology ever changing, there's often an interesting story to be told.
View Info
Hide Info
Living off the cloud attacks are on the rise. Executing rapid, cloud-native techniques to escalate privileges, move laterally between environments, and access critical assets, attackers are targeting the cloud more effectively than ever.
This session will focus on a real-world living off the cloud attack case study, analyzing a step-by-step account of the attack as it unfolded from attackers’ perspective.
We will then switch gears and rewind the attack, explaining how effective detection and response methodologies could — and should — have prevented every step of the attack. Defeating these threats requires powerful centralized visibility and control of all cloud environments and resources. Our key takeaways will therefore be tailored to leveraging the best methodologies and tools to take back the initiative and stop even the most sophisticated cloud attacks.
Lauren Place
View Info
Hide Info
Level: Advanced
Common Language Infrastructure XML (CLIXML) is a widely used PowerShell serialization format. In this presentation, we will learn how to exploit PowerShell deserialization to move laterally and escalate privileges in an enterprise environment. I will perform multiple live demos, including a guest-to-host virtual machine breakout.
I will present several novel deserialization gadgets to achieve everything from out-of-band network requests and credential stealing to remote code execution. This includes golden gadgets that work on vanilla PowerShell installations and gadgets that depend on widely used PowerShell modules.
Finally, we will discuss how we can protect ourselves against these attacks as IT admins and how to avoid these vulnerabilities as developers.
You will learn:
Alexander Andersson
Trusec
Trusec
Principal Forensic Consultant, Truesec
Alexander is a Principal Forensic Consultant at the cyber security company Truesec, where he focuses on incident response, threat intelligence, and security research. Alexander spends most of his time providing incident response to companies that have suffered from a cyber attack. He has performed hundreds of complex investigations over the last years. Alexander also performs offensive and forensic research, and is responsible for developing Truesec's forensic tooling.
View Info
Hide Info
Level: Intermediate
The modern supply chain introduces significant cybersecurity risks, as seen in high-profile breaches like SolarWinds. In this session, I’ll explore the complexities of securing the supply chain, including third-party vendor management and software supply chain vulnerabilities. I’ll use real-world case studies to highlight the lessons learned from supply chain breaches, including the consequences of failing to secure third-party access.
We’ll also dive into actionable steps organizations can take to mitigate supply chain risks, such as conducting thorough vendor security assessments, implementing continuous monitoring, and using contractual protections. I’ll provide practical guidance on how to secure both software and hardware supply chains, as well as how to ensure that third-party vendors adhere to your security standards.
Attendees will leave with a clear understanding of supply chain security risks and actionable strategies for protecting their organization from third-party vulnerabilities.
You will learn:
John O'Neill, Sr.
AWS Solutions
AWS Solutions
Chief Technologist, AWS Solutions
John’s professional IT career began as a teenager, taking him on many wonderful adventures over the past 30 years. John’s IT path started with programming but branched out quickly. Opportunities from the Help Desk to the Corner Office shape his IT journey. Specializing in CyberSecurity, Cloud, and Infrastructure technologies, John’s broad skillset includes Business Systems (ERP/CRM/HRMS), Desktop and Server OS, Identity Management, Endpoint Management, Public/Private/Hybrid Cloud, Networking Services, Network Architecture, IP Telephony, CyberInsurance, and CyberSecurity. Passionate about giving back to the IT community, John develops relevant, timely content that IT Pros take advantage of immediately. Part of the MVPDays team, he develops both online and in-print content. In addition, John authored material as a contributing editor for the Petri.co.il online community as well as a senior contributor to Tom’s IT Pro, Redmond Magazine, Netwrix, and both Thomson-Reuters' Aspatore Books and Exec Blueprints publications. Helping others succeed and advance in IT drives John to share knowledge. Speaking at conferences worldwide, developing technology training courses for Pluralsight’s online training library, and leading webinars are all regular investments by John in the current and next generation of IT professionals. Blending high-tech education with a bit of entertainment, attendees at John’s sessions regularly rate him as one of their favorite speakers. Attendees rated John top speaker for TechMentor Redmond 2019 and again in 2022. John is proud to be honored by industry organizations, leaders, and especially his peers. A four-time recipient of Microsoft’s MVP Award, John received NEOSA’s CIO of the Year Award in 2012.
View Info
Hide Info
Level: Introductory to Intermediate
Management Platforms are the keys to the technical kingdom. To secure the enterprise, we must reduce exposure to this critical tool. This session looks at common endpoint security risks and best practices to mitigate them.
You will learn:
Émile Cabot
TriCon Elite Consulting
TriCon Elite Consulting
Principal Consultant, TriCon Elite Consulting
Microsoft MVP
Émile has been an annual recipient of the Microsoft Most Valuable Professional (MVP) Award since 2015. He started in the industry during the mid-90s working at an ISP and designing web sites for celebrities. He has a strong background specializing in datacenter, deployment, and virtualization solutions and has spent many years performing infrastructure analyses, solution implementations, datacenter and workplace modernization for some of the largest, and smallest, organizations in the world. Émile organizes the Calgary Microsoft User Group, blogs on CheckYourLogs.net, and has presented at several conferences around the world. Émile organizes the Calgary Microsoft User Group, blogs on CheckYourLogs.net, and has presented at several conferences, including Ignite, VeeamOn, TechReady, TechMentor and as an active part of the MVPDays team.
View Info
Hide Info
In today's evolving threat landscape, where backup data is both a target and a critical recovery asset, cybersecurity demands a new kind of visibility – one that seamlessly connects IT and security operations. Join Shankar Subramaniam, VP/GM of Security at Druva, as he explores how integrating backup telemetry into Security Information and Event Management (SIEM) and Extended Detection and Response (XDR) platforms is reshaping threat detection and accelerating response times. This session will delve into the future of cyber resilience, spotlighting how data protection tools, when part of the security fabric, provide actionable insights that reduce risk, enhance compliance, and minimize downtime after cyber incidents. Gain practical knowledge on building a unified strategy that uses backup data as both a shield and a sensor.
You will learn:
Shankar Subramaniam
Druva
Druva
Shankar Subramaniam has over 20 years of experience in bringing customer value with security and AI products. At Druva, he is responsible for growing Druva’s security business with offerings in ransomware resilience (detection/response/recovery), Data Security Posture Management (DSPM) and eDiscovery. He was previously the founder and CTO of Concentric AI, having envisioned, architected and led market adoption of the AI-powered DSPM product. Shankar spent most of his career at startups incubating and building products for mass adoption at Niara as a co-founder, Aruba Networks, Andiamo Systems and Shasta Networks.
View Info
Hide Info
Level: Intermediate to Advanced
This session will look at some of the caveats with AAD Graph API. My research found that if you have a token for these APIs, you have pretty much unhindered access for reading and exporting anything that uses AAD Graph.
Including, reading Conditional Access Policies as an end user.
The session will go through how this is possible, how to do it and demoing the toolkit I created for exporting all of this data as an end user.
You will learn:
Viktor Hedberg
Truesec
Truesec
Senior Technical Architect, Truesec
Viktor is a security consultant with a focus on Microsoft Security either on-prem or in the cloud, and a blueteamer at heart. Viktor has worked within IT for the past 10 years always within Cyber Security. Working for public sector in Sweden for years but now as a specialist at Truesec AB focusing on proactive security measures, DFIR and advises on all things cyber.
View Info
Hide Info
Level: Intermediate
For many organizations, moving to Microsoft 365 is a given these days. The lure of collaboration, simple(ish) licensing, and built in security checks all the boxes. Unfortunately, just because it is in the cloud, and you have security features, doesn't mean they are enabled or enforced in an effective way.
Do you think the default is good enough? You already got all the security licenses, right?
In this session we will take you through the top security related considerations when it comes to hardening default out of the box Entra ID environments. From applications, to groups, to conditional access, all of which can be used and leverage as a grounds of attack, so know understand the risks, and how to mitigate against them.
At the end of this session, you will be forewarned and forearmed to deal with the fires within your tenant that you did not know were there.
You will learn:
Jan Ketil Skanke
CloudWay
CloudWay
Partner, Security MVP, Enterprise Mobility MVP, CloudWay
Jan Ketil is a Security MVP and Enterprise Mobility MVP. He is working as a COO and Principal Cloud Architect at CloudWay in Norway. He has been working in the industry for Microsoft Partners and Microsoft for more than 20 years. He loves to speak about anything around Security, Identitet, Enterprise Mobility, Identity and Automation. He is also the lead for both community conferences Experts Live Norway and Nordic Virtual Summit. Jan Ketil has presented at large industry conferences like Microsoft Ignite and Microsoft Inspire. He is also a regular speaker at MMS MOA, TechMentor HQ, Experts Live Europe, WPNinja Europe and NIC Conference in Oslo.
View Info
Hide Info
Level: Intermediate to Advanced
Most backup solutions will cover things like hardware, overwritten files, flooding, fire, etc, etc. For the last 4 years I have been working in CSIRT, and so far, what the customer hoped for, did not work at all.
You will learn:
Mikael Nystrom
Truesec
Truesec
Principal Technical Architect, TrueSec
Mikael Nystrom is a Microsoft MVP and Principal Technical Architect at Truesec, with an extremely broad field of competence. He has worked with all kinds of infrastructure tasks, in all kinds of environments, enterprise to small business. He is currently working in the CSIRT where he is Rebuilding, Recovering, Deploying, Configuring and Restoring organizations hit by cyberattacks or other incidents. Mikael is a very popular instructor and speaker at major conferences such as Security Summit and MMS
View Info
Hide Info
Level: Everyone
Join us for an innovative session that reframes cybersecurity through the lens of digital wellness and collective resilience. This presentation explores how protecting our digital infrastructure goes beyond defensive measures to create spaces where technology serves humanity's highest potential. Through practical examples and interactive discussions, participants will discover how cybersecurity principles can be applied to foster trust, strengthen communities, and build a more secure digital future for all.
Key discussion points include:
This session is designed for security professionals, organizational leaders, and anyone interested in the intersection of technology, security, and social impact. Participants will leave with actionable insights for creating digital environments that are both secure and supportive.
John O'Neill, Sr.
JONeillSr@awesomewildstuff.com
JONeillSr@awesomewildstuff.com
Chief Technologist, AWS Solutions
John’s professional IT career began as a teenager, taking him on many wonderful adventures over the past 30 years. John’s IT path started with programming but branched out quickly. Opportunities from the Help Desk to the Corner Office shape his IT journey. Specializing in CyberSecurity, Cloud, and Infrastructure technologies, John’s broad skillset includes Business Systems (ERP/CRM/HRMS), Desktop and Server OS, Identity Management, Endpoint Management, Public/Private/Hybrid Cloud, Networking Services, Network Architecture, IP Telephony, CyberInsurance, and CyberSecurity. Passionate about giving back to the IT community, John develops relevant, timely content that IT Pros take advantage of immediately. Part of the MVPDays team, he develops both online and in-print content. In addition, John authored material as a contributing editor for the Petri.co.il online community as well as a senior contributor to Tom’s IT Pro, Redmond Magazine, Netwrix, and both Thomson-Reuters' Aspatore Books and Exec Blueprints publications. Helping others succeed and advance in IT drives John to share knowledge. Speaking at conferences worldwide, developing technology training courses for Pluralsight’s online training library, and leading webinars are all regular investments by John in the current and next generation of IT professionals. Blending high-tech education with a bit of entertainment, attendees at John’s sessions regularly rate him as one of their favorite speakers. Attendees rated John top speaker for TechMentor Redmond 2019 and again in 2022. John is proud to be honored by industry organizations, leaders, and especially his peers. A four-time recipient of Microsoft’s MVP Award, John received NEOSA’s CIO of the Year Award in 2012.
View Info
Hide Info
Level: Intermediate to Advanced
This presentation delves into my new research and methodologies for attacking Deep Neural Networks (DNNs) and AI models in black-box environments (without access to internal parameters.). Traditionally, adversarial attacks require access to the model's internals (white-box access), limiting their application in black-box settings. However, this talk introduces **two innovative techniques** to bypass this restriction. Attendees will gain a deep understanding of how these techniques work, from identifying a model’s architecture through **model enumeration** to adapting **white-box attack strategies** for black-box models.
I will also provide practical demonstrations of how **white-box attacks** and other real world vulnerabilities widely deployed AI applications. can be adapted to black-box models once the discussed techniques were utilized, with **a live demo** and mitigations to defend against this attacks.
The presentation demystifies these attacks, making them accessible to security professionals without requiring deep mathematical expertise.
You will learn:
Chen Shiri
Accenture Security
Accenture Security
Cyber Security Researcher, Accenture Security
Chen Shiri is a cyber security researcher, hacker, known for his research on low-level security and isolation, working with leading security firms, government organizations and Fortune 500 companies. His research has revealed significant flaws within widely-used services and prominent vendors. In addition to its research on Accenture, he published research with early examples of weaknesses in microservices and container-based web apps. Additionally, Chen specializes in deep learning, with a focus on computer vision, and conducts research on the utilization of AI for cyber, including attacking models and penetration testing for AI models.
View Info
Hide Info
Level: Introductory to Intermediate
In the dynamic landscape of cybersecurity threats, organizations must constantly evolve to stay ahead of adversaries. Microsoft Sentinel, a cloud-native SIEM (Security Information and Event Management) solution, empowers organizations with robust capabilities for ingesting, analyzing, and acting upon threat intelligence data.
This session will delve into best practices for leveraging Microsoft Sentinel Threat Intelligence to fortify your organization's security posture. Participants will learn how to seamlessly integrate threat intelligence feeds into Sentinel, enabling proactive threat detection and response.
Key topics include:
Whether you're a security analyst, SOC (Security Operations Center) engineer, or IT professional, this session offers valuable guidance on maximizing Microsoft Sentinel's capabilities. Join us to discover how to stay ahead of threats, enhance your security posture, and protect your organization's assets and data with Microsoft Sentinel.
You will learn:
Marcos Nogueira
Sounoga Technologies
Sounoga Technologies
Principal Cloud Solution Architect
Marcos Nogueira is a Principal Cloud Solution Architect with more than 20 years of experience in Datacenter and Cloud Architecture. He is an expert in Public and Hybrid Cloud, focusing on Microsoft Azure, Amazon Web Services, Security, DevOps, automation and Microsoft 365. He has worked around the globe in Aerospace, Transportation, Energy, Manufacturing, Financial Services, Government, Health Care, Telecoms, IT Services, and Oil & Gas industries. Marcos is a Canadian Azure MVP with 20+ years of experience as a Microsoft Certified Trainer. He has over 175+ Microsoft certifications, such as MCT and Azure Solution Expert and is also certified in AWS, VMware, CompTIA and ITIL v3. He assisted Microsoft in developing workshops and special events on Private, Hybrid and Public Cloud, Azure, System Center, Windows Server, and Hyper-V. Marcos has been a speaker at several worldwide Microsoft Ignite and Microsoft community events.
View Info
Hide Info
Level: Intermediate to Advanced
Learn 5 things that could have helped customers to avoid being hit by Ransomware and/or Cyberattacks. Based on 33.000 hours of Incident Response work, I can say that I KNOW what prevent attacks and what doesn't. Join this session to learn what actually make a difference
You will learn:
Mikael Nystrom
Truesec
Truesec
Principal Technical Architect, TrueSec
Mikael Nystrom is a Microsoft MVP and Principal Technical Architect at Truesec, with an extremely broad field of competence. He has worked with all kinds of infrastructure tasks, in all kinds of environments, enterprise to small business. He is currently working in the CSIRT where he is Rebuilding, Recovering, Deploying, Configuring and Restoring organizations hit by cyberattacks or other incidents. Mikael is a very popular instructor and speaker at major conferences such as Security Summit and MMS
View Info
Hide Info
Level: Introductory to Intermediate
Your company has made significant investments in Microsoft 365—through licenses, solutions, and dedicated staff. With growing threats to the Microsoft ecosystem, it's crucial that you understand your role in responding to cyber attacks. Every Microsoft 365 professional needs to be aware of the NIST 2.0 framework and the expectations of your role to ensure a swift, effective defense.
In this session, you will deepen your knowledge in these critical areas, empowering you to protect your organization and contribute to a more effective, coordinated response to cyber attacks.
You will learn:
Vanessa Toves
Druva
Druva
Microsoft 365 Solutions Architect, Druva
Vanessa Toves is a Microsoft 365 Solutions Architect. Vanessa has worked in the information technology field for over 25 years. Vanessa has dedicated most of that to Microsoft technologies such as SharePoint, Microsoft’s BI suite to Microsoft 365. As an avid speaker, she enjoys sharing her knowledge and empowering individuals and organizations to better use Microsoft technologies. As a Microsoft 365 subject matter expert for Druva, Vanessa works across departments from sales to engineering supporting the security of customer data.
View Info
Hide Info
Level: Introductory to Intermediate
This session tackles the often-overlooked challenge of aligning management, leadership, and HR with the non-negotiable demands of modern cybersecurity. We explore effective strategies for presenting compelling arguments that transcend the common misconceptions of security as a hindrance to convenience. By delving into real-world examples, attendees will learn how to foster a culture that values security as a foundational principle, including how to engage non-technical stakeholders in meaningful discussions about risk management, compliance, and the potential impacts of security breaches on the organization’s bottom line. Emphasizing communication, education, and strategic negotiation, this session equips participants with the tools needed to turn skepticism into support, paving the way for the successful implementation of advanced security measures. Join us to transform the security conversation within your organization, ensuring that your digital defenses are not just tolerated, but actively championed by all levels of leadership.
You will learn:
Émile Cabot
TriCon Elite Consulting
TriCon Elite Consulting
Principal Consultant, TriCon Elite Consulting
Microsoft MVP
Émile has been an annual recipient of the Microsoft Most Valuable Professional (MVP) Award since 2015. He started in the industry during the mid-90s working at an ISP and designing web sites for celebrities. He has a strong background specializing in datacenter, deployment, and virtualization solutions and has spent many years performing infrastructure analyses, solution implementations, datacenter and workplace modernization for some of the largest, and smallest, organizations in the world. Émile organizes the Calgary Microsoft User Group, blogs on CheckYourLogs.net, and has presented at several conferences around the world. Émile organizes the Calgary Microsoft User Group, blogs on CheckYourLogs.net, and has presented at several conferences, including Ignite, VeeamOn, TechReady, TechMentor and as an active part of the MVPDays team.
Steve LaBeau
Principal Technology Solutions
Principal Technology Solutions
Principal Systems Engineer, Principal Technology Solutions
My career in technology is built on a foundation of distinguished Naval service, where I first developed technical skills and a deep commitment to excellence. After military service, I transitioned into Information Technology and Computer Systems, earning a Systems Analyst degree that equipped me with the analytical and problem-solving skills necessary for the field. My technical expertise has grown to encompass various Systems Engineering skills. All involved in Designing, Developing, Testing, Deploying, Managing, Troubleshooting, and Upgrading. My commitment to professional development and integrity is always a top priority. I aim to position myself and my clients with the best possible opportunities for satisfaction and success.
View Info
Hide Info
Level: Intermediate
The Security World is great at training pentesters by the dozens. This success has hidden the fact that the same approach does not work for training Software Engineers. This will cover how security emerges from engineering and how Security Assurance can optimally interact with developers without hindering developer velocity.
You will learn:
Alton Crossley
Software Engineer in Security
Alton Crossley is an Application Security Engineer with 20+ years of professional Software Engineering and Security experience. Among his numerous certifications, Alton is a Microsoft Certified Solutions Developer as well as a Certified Ethical Hacker. With further competencies in network engineering and automation design, Alton has a holistic perspective on application development, design, and security.
View Info
Hide Info
Level: Intermediate to Advanced
Entra ID has become a main point of entry in a lot of incidents around the world.
This session will cover common tactics used by threat actors and how you can start building your Entra ID as safe as possible.
You will learn:
Viktor Hedberg
Truesec
Truesec
Senior Technical Architect, Truesec
Viktor is a security consultant with a focus on Microsoft Security either on-prem or in the cloud, and a blueteamer at heart. Viktor has worked within IT for the past 10 years always within Cyber Security. Working for public sector in Sweden for years but now as a specialist at Truesec AB focusing on proactive security measures, DFIR and advises on all things cyber.
View Info
Hide Info
Level: Introductory
Delve into the world of physical computer security by revisiting the good old fashioned USB port, and all the threats to your computer and network that can originate from USB devices. From USBKillers, Juicejackers (malevolent charging ports), and Rubber Duckies, we'll cover the whole gamut of threats posed from by USB drives, cables, charging ports, and Human Input Devices, and how to protect yourself from them. We might even fry a laptop or two for fun during the session!
You will learn:
Andy Milford
RDPSoft
RDPSoft
CEO, RDPSoft
Andy Milford is a veteran software entrepreneur in the Windows networking and security space. Prior to founding RDPSoft, Andy was the CEO and founder of a Windows event log management company, Dorian Software Creations, Inc., which was acquired by Ipswitch Software in 2009. While at Ipswitch, Andy served as Vice President of Business Intelligence Products and was responsible for expansion of the log management and similar product lines. Andy left Ipswitch in 2012 and founded RDPSoft to begin development on Remote Desktop Reporter, a comprehensive metric tracking and reporting solution for server based computing platforms like Microsoft RDS, Citrix, and VMWare Horizon View. In 2016, Andy was recognized as a Microsoft MVP in the Enterprise Mobility / Remote Desktop Services category, and has remained an MVP ever since. He also enjoys educating IT pros about Remote Desktop Services and Windows Virtual Desktop, and has been a guest speaker at TechMentor and BriForum in the past.
View Info
Hide Info
Level: Intermediate to Advanced
As cyber threats evolve in complexity and sophistication, organizations must fortify their defense mechanisms to safeguard their digital assets. Microsoft 365 Defender offers a comprehensive suite of tools designed to detect, investigate, and respond to modern cyber threats across multiple platforms.
This session will dive into the realm of custom detections within M365 Defender, providing attendees with a thorough understanding of how to tailor their defense strategies to their unique organizational needs. Participants will gain insights into leveraging custom detections effectively.
You will learn:
Mattias Borg
Cyber Security Geek
Incident Response Specialist with focus on Threat hunting in the Microsoft defense stack. Cyber Security consultant and Threat Hunter. Researching vulnerabilities when not working for customers.
Stefan Schörling
Onevinn AB
Onevinn AB
Cloud Security and Infra Geek, Onevinn AB
Stefan Schörling has over 20 years of experience from working with Cybersecurity. Today Stefan is helping customers to be successful with implementing and adopting Cloud Security with a focus on Azure and Microsoft 365. For the last 10+ years he has been awarded as a Microsoft MVP for his contributions in the community. He also holds several certifications in Incident Response and Forensics, CISM, CISSP among other Microsoft Certifications including Microsoft Certified Trainer.
HPE
READ BIOHPE
Andrew Silva is a strategic, results-driven leader with extensive experience in technology and a strong business orientation. Skilled at building and nurturing productive relationships with both partners and customers. An effective public speaker, adept at creating and delivering compelling presentations on complex topics. Proficient in leveraging modern frameworks, proven methodologies, and industry best practices to drive success.
Druva
READ BIODruva
Shankar Subramaniam has over 20 years of experience in bringing customer value with security and AI products. At Druva, he is responsible for growing Druva’s security business with offerings in ransomware resilience (detection/response/recovery), Data Security Posture Management (DSPM) and eDiscovery. He was previously the founder and CTO of Concentric AI, having envisioned, architected and led market adoption of the AI-powered DSPM product. Shankar spent most of his career at startups incubating and building products for mass adoption at Niara as a co-founder, Aruba Networks, Andiamo Systems and Shasta Networks.
Druva
READ BIODruva
Microsoft 365 Solutions Architect, Druva
Vanessa Toves is a Microsoft 365 Solutions Architect. Vanessa has worked in the information technology field for over 25 years. Vanessa has dedicated most of that to Microsoft technologies such as SharePoint, Microsoft’s BI suite to Microsoft 365. As an avid speaker, she enjoys sharing her knowledge and empowering individuals and organizations to better use Microsoft technologies. As a Microsoft 365 subject matter expert for Druva, Vanessa works across departments from sales to engineering supporting the security of customer data.
Intelligink
READ BIOIntelligink
Owner & Chief Consultant, Microsoft Cloud Architect and Microsoft 365 MVP, Intelligink
Ben is a Microsoft MVP, MCT, and the owner and chief consultant at Intelligink, where he focuses on Microsoft 365 and Azure. He has worked with SharePoint for 15+ years and Microsoft 365 and Azure for 10+ years. Since starting his career with Microsoft cloud, he has done work for professional sports organizations, government organizations, and organizations ranging in size from as few as 25 employees up to organizations of several thousand employees spread around the globe. Ben is also a co-host of the MS Cloud IT Pro Podcast - https://msclouditpro.com, where he discusses the latest technologies in the Microsoft Office 365 and Azure space from an IT Pro point of view. You can find him on Twitter- @benstegink, YouTue - https://www.youtube.com/@ben_stegink, and his blog - https://www.benstegink.com.
CloudWay
READ BIOCloudWay
Partner, Security MVP, Enterprise Mobility MVP, CloudWay
Jan Ketil is a Security MVP and Enterprise Mobility MVP. He is working as a COO and Principal Cloud Architect at CloudWay in Norway. He has been working in the industry for Microsoft Partners and Microsoft for more than 20 years. He loves to speak about anything around Security, Identitet, Enterprise Mobility, Identity and Automation. He is also the lead for both community conferences Experts Live Norway and Nordic Virtual Summit. Jan Ketil has presented at large industry conferences like Microsoft Ignite and Microsoft Inspire. He is also a regular speaker at MMS MOA, TechMentor HQ, Experts Live Europe, WPNinja Europe and NIC Conference in Oslo.
Accenture Security
READ BIOAccenture Security
Cyber Security Researcher, Accenture Security
Chen Shiri is a cyber security researcher, hacker, known for his research on low-level security and isolation, working with leading security firms, government organizations and Fortune 500 companies. His research has revealed significant flaws within widely-used services and prominent vendors. In addition to its research on Accenture, he published research with early examples of weaknesses in microservices and container-based web apps. Additionally, Chen specializes in deep learning, with a focus on computer vision, and conducts research on the utilization of AI for cyber, including attacking models and penetration testing for AI models.
Onevinn AB
READ BIOOnevinn AB
Cloud Security and Infra Geek, Onevinn AB
Stefan Schörling has over 20 years of experience from working with Cybersecurity. Today Stefan is helping customers to be successful with implementing and adopting Cloud Security with a focus on Azure and Microsoft 365. For the last 10+ years he has been awarded as a Microsoft MVP for his contributions in the community. He also holds several certifications in Incident Response and Forensics, CISM, CISSP among other Microsoft Certifications including Microsoft Certified Trainer.
CyberSaint
READ BIOCyberSaint
Founder and Chief Innovation Officer, CyberSaint
Padraic O'Reilly is Founder and Chief Innovation Officer at CyberSaint, where he leads product innovation and development. His experience as a Harvard-trained economist, IT risk and compliance consultant, and his rapid exposure to cybersecurity led him to seek out CISOs, CIOs, and Boards of Directors at global organizations to pursue the answer to the question - how can cyber be managed, measured, and understood like any other business function? Padraic’s current activity spans working directly with organizations from public agencies to private companies across the globe to understand how to measure and manage cyber risk from assessment to boardroom. Working closely with large, highly regulated enterprise teams and CISOs, Padraic is dedicated to driving tangible value through linking cyber risks to controls, innovating with financial models and AI, and enhancing cyber to business communication. Padraic was a key member of the group providing feedback on the NIST Cybersecurity Framework during its development, and is an expert in regulatory standards both in security and privacy, including the NIST Risk Management and NIST Privacy Frameworks. An expert in Artificial Intelligence (AI) and economic modeling, Padraic works with members of the Global 500 to research and deploy risk quantification, risk intelligence gathering, and risk reporting and communication strategies. Padraic also holds a patent entitled, “System And Method for Monitoring And Grading A Cybersecurity Framework” which has inspired much of his work on cohesive IT and cyber risk management approaches. Padriac has been featured in publications and TV stations such as CNN, Wall Street Journal, Forbes, Fortune, New York Times, and Bloomberg discussing the role of the security leader in business.
AWS Solutions
READ BIOAWS Solutions
Chief Technologist, AWS Solutions
John’s professional IT career began as a teenager, taking him on many wonderful adventures over the past 30 years. John’s IT path started with programming but branched out quickly. Opportunities from the Help Desk to the Corner Office shape his IT journey. Specializing in CyberSecurity, Cloud, and Infrastructure technologies, John’s broad skillset includes Business Systems (ERP/CRM/HRMS), Desktop and Server OS, Identity Management, Endpoint Management, Public/Private/Hybrid Cloud, Networking Services, Network Architecture, IP Telephony, CyberInsurance, and CyberSecurity. Passionate about giving back to the IT community, John develops relevant, timely content that IT Pros take advantage of immediately. Part of the MVPDays team, he develops both online and in-print content. In addition, John authored material as a contributing editor for the Petri.co.il online community as well as a senior contributor to Tom’s IT Pro, Redmond Magazine, Netwrix, and both Thomson-Reuters' Aspatore Books and Exec Blueprints publications. Helping others succeed and advance in IT drives John to share knowledge. Speaking at conferences worldwide, developing technology training courses for Pluralsight’s online training library, and leading webinars are all regular investments by John in the current and next generation of IT professionals. Blending high-tech education with a bit of entertainment, attendees at John’s sessions regularly rate him as one of their favorite speakers. Attendees rated John top speaker for TechMentor Redmond 2019 and again in 2022. John is proud to be honored by industry organizations, leaders, and especially his peers. A four-time recipient of Microsoft’s MVP Award, John received NEOSA’s CIO of the Year Award in 2012.
mikael.nystrom@truesec.se
READ BIOmikael.nystrom@truesec.se
Principal Technical Architect, TrueSec
Mikael Nystrom is a Microsoft MVP and Principal Technical Architect at Truesec, with an extremely broad field of competence. He has worked with all kinds of infrastructure tasks, in all kinds of environments, enterprise to small business. He is currently working in the CSIRT where he is Rebuilding, Recovering, Deploying, Configuring and Restoring organizations hit by cyberattacks or other incidents. Mikael is a very popular instructor and speaker at major conferences such as Security Summit and MMS
Sounoga Technologies
READ BIOSounoga Technologies
Principal Cloud Solution Architect
Marcos Nogueira is a Principal Cloud Solution Architect with more than 20 years of experience in Datacenter and Cloud Architecture. He is an expert in Public and Hybrid Cloud, focusing on Microsoft Azure, Amazon Web Services, Security, DevOps, automation and Microsoft 365. He has worked around the globe in Aerospace, Transportation, Energy, Manufacturing, Financial Services, Government, Health Care, Telecoms, IT Services, and Oil & Gas industries. Marcos is a Canadian Azure MVP with 20+ years of experience as a Microsoft Certified Trainer. He has over 175+ Microsoft certifications, such as MCT and Azure Solution Expert and is also certified in AWS, VMware, CompTIA and ITIL v3. He assisted Microsoft in developing workshops and special events on Private, Hybrid and Public Cloud, Azure, System Center, Windows Server, and Hyper-V. Marcos has been a speaker at several worldwide Microsoft Ignite and Microsoft community events.
RDPSoft
READ BIORDPSoft
CEO, RDPSoft
Andy Milford is a veteran software entrepreneur in the Windows networking and security space. Prior to founding RDPSoft, Andy was the CEO and founder of a Windows event log management company, Dorian Software Creations, Inc., which was acquired by Ipswitch Software in 2009. While at Ipswitch, Andy served as Vice President of Business Intelligence Products and was responsible for expansion of the log management and similar product lines. Andy left Ipswitch in 2012 and founded RDPSoft to begin development on Remote Desktop Reporter, a comprehensive metric tracking and reporting solution for server based computing platforms like Microsoft RDS, Citrix, and VMWare Horizon View. In 2016, Andy was recognized as a Microsoft MVP in the Enterprise Mobility / Remote Desktop Services category, and has remained an MVP ever since. He also enjoys educating IT pros about Remote Desktop Services and Windows Virtual Desktop, and has been a guest speaker at TechMentor and BriForum in the past.
andymalone.org
READ BIOandymalone.org
Worldwide Speaker, YouTuber, Tech Instructor, Author
Winning the coveted Microsoft Speaker Idol competition in 2006 catapulted Andy into a prestigious international speaking career. Today, Andy is not only a world class conference speaker but is also a renowned security & technology expert who has delivered ground-breaking content to hundreds of thousands of delegates worldwide. His passionate style of delivery combined with a sense of fun has become his trademark and have won him multiple awards and global acclaim at events including, Microsoft Ignite, NIC, TechMentor, Spiceworld, The Cybercrime Security Forum, and many more. Although teaching and consulting on cloud and cybersecurity remain his primary focus. Andy also loves to inspire, and with technology ever changing, there's often an interesting story to be told.
Adminize.com
READ BIOAdminize.com
Chief Research Officer, Adminize
Sami Laiho is one of the world's leading professionals in the Windows OS and Security. Sami has been working with and teaching OS troubleshooting, management, and security for over 25 years. Sami has been a Microsoft MVP in the Windows OS since 2011. Since 2019 Sami has been chosen by TiVi-magazine as one of the top 100 influencers in IT in his country, and is in Top10 of the most followed people in his field in Finland. At Microsoft Ignite 2018, Sami's "Behind the Scenes: How to build a conference winning session" and "Sami Laiho: 45 Life Hacks of Windows OS in 45 minutes" sessions were ranked as #1 and #2 out of 1,708 sessions! Before that, at Ignite 2017, Sami was evaluated as the Best External Speaker! Sami works as a Chief Research Officer and Senior Technical Fellow for Adminize.com. More info at https://samilaiho.com/. Follow Sami on Twitter @samilaiho.
Principal Technology Solutions
READ BIOPrincipal Technology Solutions
Principal Systems Engineer, Principal Technology Solutions
My career in technology is built on a foundation of distinguished Naval service, where I first developed technical skills and a deep commitment to excellence. After military service, I transitioned into Information Technology and Computer Systems, earning a Systems Analyst degree that equipped me with the analytical and problem-solving skills necessary for the field. My technical expertise has grown to encompass various Systems Engineering skills. All involved in Designing, Developing, Testing, Deploying, Managing, Troubleshooting, and Upgrading. My commitment to professional development and integrity is always a top priority. I aim to position myself and my clients with the best possible opportunities for satisfaction and success.
dkawula@triconelite.com
READ BIOdkawula@triconelite.com
Principal Consultant, TriCon Elite Consulting
Dave Kawula is an Enterprise Consultant, Technology Evangelist, Best Selling Author, and all around geek. He loves Microsoft Technology and is considered one of the best in his field. He holds over 50 + Microsoft Certifications and is also a Microsoft MVP. Dave is also a Veeam Vanguard, Alumni Cisco Champion, and Nutanix NTC. Dave is the Conference Co-Chair for TechMentor and in 2017 was a top 5 speaker in his track at Microsoft Ignite. In 2018 Dave tied for #1 top session at Microsoft Ignite. He can be followed on twitter @davekawula
Truesec
READ BIOTruesec
Senior Technical Architect, Truesec
Viktor is a security consultant with a focus on Microsoft Security either on-prem or in the cloud, and a blueteamer at heart. Viktor has worked within IT for the past 10 years always within Cyber Security. Working for public sector in Sweden for years but now as a specialist at Truesec AB focusing on proactive security measures, DFIR and advises on all things cyber.
Software Engineer in Security
Alton Crossley is an Application Security Engineer with 20+ years of professional Software Engineering and Security experience. Among his numerous certifications, Alton is a Microsoft Certified Solutions Developer as well as a Certified Ethical Hacker. With further competencies in network engineering and automation design, Alton has a holistic perspective on application development, design, and security.
TriCon Elite Consulting
READ BIOTriCon Elite Consulting
Principal Consultant, TriCon Elite Consulting
Microsoft MVP
Émile has been an annual recipient of the Microsoft Most Valuable Professional (MVP) Award since 2015. He started in the industry during the mid-90s working at an ISP and designing web sites for celebrities. He has a strong background specializing in datacenter, deployment, and virtualization solutions and has spent many years performing infrastructure analyses, solution implementations, datacenter and workplace modernization for some of the largest, and smallest, organizations in the world. Émile organizes the Calgary Microsoft User Group, blogs on CheckYourLogs.net, and has presented at several conferences around the world. Émile organizes the Calgary Microsoft User Group, blogs on CheckYourLogs.net, and has presented at several conferences, including Ignite, VeeamOn, TechReady, TechMentor and as an active part of the MVPDays team.
Cyber Security Geek
Incident Response Specialist with focus on Threat hunting in the Microsoft defense stack. Cyber Security consultant and Threat Hunter. Researching vulnerabilities when not working for customers.
Trusec
READ BIOTrusec
Principal Forensic Consultant, Truesec
Alexander is a Principal Forensic Consultant at the cyber security company Truesec, where he focuses on incident response, threat intelligence, and security research. Alexander spends most of his time providing incident response to companies that have suffered from a cyber attack. He has performed hundreds of complex investigations over the last years. Alexander also performs offensive and forensic research, and is responsible for developing Truesec's forensic tooling.
Truesec
READ BIOTruesec
Principal Cybersecurity Advisor, Truesec
Hasain, also known as "The Wolf", is an industry-leading cyber security expert with more than 26 years of experience. He has extensive and deep expertise from numerous design projects, security audits, advanced implementation projects, incident response, digital forensic, threat hunting and penetration testing. He helps customers understand and build solutions to protect, detect and respond to cyber threats for enterprises, government agencies, banks, military organizations among others. Due to his expertise, he is a sought-after advisor, speaker and a popular instructor. For his many achievements over the years, Hasain has been awarded recognition as “Sweden’s leading IT security expert” and Microsoft MVP in Enterprise Security and Cloud & Datacenter.
Lorem Ipsum is text of the printing and type setting industry. Lorem Ipsum has been the industry's standard dummy text ever since.
Lorem Ipsum is text of the printing and type setting industry. Lorem Ipsum has been the industry's standard dummy text ever since.
Lorem Ipsum is text of the printing and type setting industry. Lorem Ipsum has been the industry's standard dummy text ever since.