Petri's Editorial Director, Russell Smith, kicks off the conference with a quick overview of the day's sessions and why identity and privilege access management are critical in securing your data, servers, and endpoints.
In this session, I will explain the concept of hybrid identities including the two core Microsoft identity solutions today - Active Directory (AD) and Azure Active Directory (AAD). Then, I'll explain how you can use Azure AD Connect to synchronize your user identities from AD to AAD, keeping security front of mind. To conclude, I'll go over all the high-level aspects of Azure AD Connect including installation, configuration, and the various settings to keep your hybrid identities safe, secure, and how to keep your users productive, no matter where they are.
Dean Ellerby, Chris Hills, and Michael Reinders join Petri's Editorial Director, Russell Smith, for a 30-minute roundtable session where Russell finds out more about how to solve common identity management and PAM problems in enterprise environments.
As weak, stolen and cracked passwords are at the root of 80% of cybersecurity incidents, Passwordless has the potential to change the world.
Under the covers, Windows Hello for Business, Microsoft's Passwordless solution, has already changed the authentication paradigm for Active Directory. Regardless of the device being domain-joined, hybrid Azure AD-joined or Azure AD-joined, you can access organizational resources without specifying credentials using single sign-on, both on-premises and in the cloud.
In this session, Sander Berkouwer explains how Windows Hello works in all three scenarios and what you need to get access going seamlessly within your organization!
Fortunately, this malware variant has a critical weakness. No matter how it is delivered, almost all ransomware requires privileges to execute its payload, encrypt data, and further spread its tendrils. Mitigating ransomware risks ransomware isn’t impossible. The single most powerful measure you can take towards this immunity is to secure and control your privileged access. In this upcoming session Chris Hills, Chief Security Strategist at BeyondTrust will cover the current landscape of ransomware, why ransomware is winning against so many organizations, and how to create a blended ransomware defense built to break the ransomware attack chain at point of first contact.
In this session, you'll learn how to use Intune to manage local admin accounts endpoints and Credential Guard configuration. You'll also get an overview of new functionality coming to Intune for managing privileged access called Elevation Rules.
Azure AD isn't just for authenticating end users. Designed from the ground up for cloud-native apps, developers can also use open standards with Azure AD for authentication. In this session, you'll learn how to work with protocols like OAUTH and SAML.